568 lines
26 KiB
Groff
568 lines
26 KiB
Groff
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
= =
|
|
- WELCOME TO THE SECOND ISSUE OF -
|
|
= =
|
|
- -=>PHANTASY<=- -
|
|
= =
|
|
- A MONTHLY PUBLICATIOM AND NEWSLETTER OF -
|
|
= =
|
|
- THE -
|
|
= INTERNATIONAL =
|
|
- INFORMATION -
|
|
= RETREIVAL =
|
|
- GUILD -
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Volume Number One,Issue Number Two Dated 11/12/90
|
|
|
|
Table of Discontents:
|
|
|
|
[1] The IIRG meets the FBI (Part 2)
|
|
[2] Hacker Information and Where to obtain it
|
|
[3] High-Explosives for Fun and Profit
|
|
[4] The I.I.R.G. attends the 8th Annual Ct. CES Show
|
|
[4] PHANTASY NEWS
|
|
[5] Listing of PHANTASY Distribution Sites
|
|
|
|
|
|
OFFICIAL DISLAIMER...
|
|
|
|
All information in PHANTASY is from USER contributed material
|
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
|
any liability from any damages of any type that reader or
|
|
user of information contained within this newsletter may encounter
|
|
from the use of said information.
|
|
|
|
PHANTASY is (C) 1990 by The IIRG
|
|
IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982
|
|
|
|
|
|
Editors Note- PHANTASY is a Free-world Publication
|
|
Distribute Freely
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
Section One: The International Information Reteival Guild
|
|
Meets the FBI (Part Two)
|
|
|
|
To Clarify a few things,Let us just state we're reporting on how this
|
|
informal gathering took place. We in NO-Way trusted this agent or
|
|
took anything he said seriously. Several of us are former military service
|
|
members and know the Governments Policy of DISINFORMATION.
|
|
We're just reporting on what took place at this meeting and nothing
|
|
more. We believe that this Agents comments should be taken for there
|
|
entertainment value only and nothing more.
|
|
|
|
Now on with Part II...
|
|
|
|
FBI AGENT-I guess a senator Ribicoff back in 1979,he had the foresight to
|
|
institute the proposed legislation in that area.
|
|
It took them from 1979 to 1984 to finally get the bill passed,and
|
|
out of our office there's only been two prosecutions since 1984.
|
|
and you look at some of the reasons why and one of the biggest
|
|
ones would be they don't want to report it. A bank doesn't want
|
|
to report they have someone in there computer fooling around with
|
|
all there accounts. They don't want to let people know that
|
|
basically there money is unsafe and that at any moment there
|
|
accounts can be all fouled up,Which usually there fouled up
|
|
nine out of Ten times anyway.
|
|
|
|
Anonymous-It takes a while for people to realize things are being
|
|
manipulated, I'm a computer operator and if somebody was logging
|
|
onto our system illegally it would be hard to find out until
|
|
after a while.
|
|
|
|
FBI AGENT-Thats why I alluded to the beginning,with a lot of cases it takes
|
|
so long to figure out whats going on and then it takes even longer
|
|
to identify the problem.
|
|
I know in Federal Court its called the Counterfeit Access Device
|
|
and Computer Fraud Act, thats based on illegal or unauthorized
|
|
access to a computer that in itself is a crime because getting
|
|
into one of the computers that has the protected items such as
|
|
Natinal Defense,(anything along those lines) so the mere
|
|
accessing of those is a Federal Crime.
|
|
The other ones go beyond that, You have to obtain information
|
|
and you have to make a fianancial gain.
|
|
Then the penalties are accordingly, the one regarding the Defense
|
|
Systems and things like that carries up to a Ten year imprisonment
|
|
and up to a Fifty Thousand Dollar Fine.
|
|
The ones where you make a fianancial gain, your penalty is as much
|
|
up to twice the gain you made plus up to Twenty years in Jail.
|
|
So everything depends on whats been obtained.
|
|
|
|
The third aspect of the crime that I guess is a watered down
|
|
version of what Senator Ribicoff had proposed has to do with
|
|
getting in a computer and destroying or changing different files.
|
|
That carries with it up to a Ten year imprisonment and up to
|
|
twice as much as the damage you caused or fianancial gain as
|
|
your fine.
|
|
Then all three of those have the Conspiracy Statute thats
|
|
attached to them where more than three people have to actually
|
|
take part in the Conspiracy. That crime,I mean that Statute
|
|
seems to be pretty significant.
|
|
Like I said, Who do you have thats going to sit down all day and
|
|
actually try to develop a case. Thats what you don't have in Law
|
|
Enforcement right now, You don't have anyone that specifically
|
|
looks for computer crimes, they have to be reported.
|
|
Its not like the drug cases where you can walk right down the
|
|
street and and find someone somewhere in the city of (DELETED)
|
|
selling drugs. You can find that anywhere in any city.
|
|
Its the same way as a Crime Patrol Police Officer can go
|
|
around and find someone breaking into cars, nobody is going to
|
|
be able to sit there and right now and justify there existence
|
|
what would be computer crimes.
|
|
What it takes I guess is one hand washing the other,the people
|
|
whose computers are being accessed have got to want to come
|
|
forward,and have to want to provide the help after they do.
|
|
Now do I have any questions?
|
|
|
|
Knighthack- What about prosecuting Computer Piracy Violations,have there
|
|
been any.
|
|
|
|
FBI AGENT- As towards illegaly copying software,No. They seem to be more
|
|
concerned with theft of computer services.
|
|
Now as far as the state level I know we've had none in our
|
|
offices.
|
|
|
|
Anonymous- What do you mean By theft of Computer Services?
|
|
|
|
Mercenary- He means hacking into Compuserve or another pay for access
|
|
service or using Government computers with a valid users
|
|
Id and password.
|
|
|
|
Old Timer-Like the young guy in California who was tying up the
|
|
DOD's Sattelite system and bouncing his signal to Europe
|
|
|
|
FBI AGENT-Well let me ask you.. How safe do you feel our computer systems
|
|
are?
|
|
|
|
Knighthack- If its got a modem attached to it and its online its unsafe.
|
|
|
|
Mercenary- But of course, None of us here would do that now, Right Guys?
|
|
|
|
Whole room- Laughter
|
|
|
|
FBI AGENT-Tell me more about that California case, How did he get into
|
|
the Department of Defense's System?
|
|
|
|
Old Timer-Apparently he hacked into the system and was an experienced
|
|
sattelite person and figured out how to get into there
|
|
operating system, he's serving time now It wasn't too
|
|
publicized.
|
|
|
|
FBI AGENT- Well like I said we don't find out too much up here ourselves
|
|
we have to watch CNN.
|
|
|
|
|
|
At this Point the meeting broke into small individual talking groups
|
|
and we departed before everyone else. We do have some documents that
|
|
were distributed and will be presenting those later in Upcoming issues.
|
|
This was a meeting of a local Users group in which we were invited
|
|
to attend by there president and would thank him here.
|
|
Any Anonymous comments were made by a Local User and we didn't catch
|
|
his name.
|
|
|
|
Section Two: Hacker Information and Where to Obtain It.
|
|
|
|
|
|
One of the most frequently asked questions the IIRG receives from the
|
|
multitude of new day Hackers and Phreaks is where do I obtain information
|
|
on phreaking and hacking.
|
|
Now I don't want to get into a psychological debate on what a new day
|
|
hacker is,but lets for safetys sake say its a kid who just got a modem
|
|
and happened to grab a copy of Phantasy off of a bulletin board or had
|
|
obtained another hack/phreak electronic newsletter.
|
|
Ok,they've taken that first plunge and its wetted there appetites for
|
|
more information. Now they run down to there local pc-mart and look
|
|
through its racks of books and magazines and the few articles they did manage
|
|
to find portray a hacker as a budding Charlie Manson behind a keyboard.
|
|
Well the IIRG has had enough of these portrayals by the media and
|
|
we've decided to assign Section 2 of every upcoming Phantasy as a brief
|
|
article on where to obtain information for novices or the curious.
|
|
The very first step of a curious novice would be to obtain a private mail
|
|
box,preferably NOT a Post Office Box. There are plenty of private mail
|
|
services springing up and finding one close to your home should be no
|
|
problem. These addresses are usually called Suites or just use a number.
|
|
The price range on these boxes is usually 6 to 9 dollars a month
|
|
and can be easily afforded even by a teenager. I said preferably NOT a
|
|
post office box for two simple reasons, One,I distrust any government agency
|
|
and find they cooperate very easily when they want to. And Two, if you do
|
|
receive more "covert" mail its just a good idea not to be involed with
|
|
any branch of the government.
|
|
Ok,now that you've run out and gotten a mailbox you say "Well now what
|
|
the Hell do I do with it?", Well thats a good question and an easily
|
|
answered one,you fill it up son!
|
|
Now the very first thing we suggest is laying aside some serious cash
|
|
or hitting up the slush fund for your expenses. Because expenditures for
|
|
hacking information aren't cheap and especially figuring this after what
|
|
you've probably spent on your equipment.
|
|
We're not saying that all these books or equipment are needed
|
|
for your library,there just nice to have around.
|
|
|
|
We advise sending for these Books:
|
|
|
|
1. Defending Secrets,Sharing Data: New locks and Keys for Electronic
|
|
Information GPO Stock Number:052-003-01083-6
|
|
Last Known Price:$8.50
|
|
Available From:
|
|
|
|
Superintendent of Documents
|
|
Government Printing Office
|
|
Washington,DC 20402-9325
|
|
|
|
2. Get the Privacy Catalog from Eden Press
|
|
They've got too many titles to list,
|
|
but some of the best we like are:
|
|
|
|
Privacy:How to get it,How to Enjoy it. #400 $18.95
|
|
Are you now or have you ever been in the FBI Files? #403 $12.95
|
|
Electronic Record Systems and Individual Privacy #614 $14.95
|
|
Telephone Security #652 $9.95
|
|
Telephone Debugging #653 $15.95
|
|
A Study of Telephone Records #630 $19.95
|
|
|
|
Call 1-800-338-8484 for there catalog.
|
|
|
|
3. A liitle old, its from 1985 but still a nice book to read
|
|
THE COMPUTER UNDERGROUND by M. Harry
|
|
Order #L40036 Price-$14.95
|
|
This book is available from several sources and
|
|
the order number given here is from ANVIL Publishing.
|
|
There Catalog is HUGE!!,get a copy call 1-915-755-2665
|
|
|
|
4. CRB Research sells the Computer Underground as well as many
|
|
other worthwhile titles,but definitly grab.
|
|
|
|
The Hackers Handbook Cat# HACK $12.95
|
|
|
|
Order there catalog for $1.00
|
|
|
|
CRB Research Books
|
|
P.O. Box 56
|
|
Commack,NY. 11725
|
|
|
|
Well That should cover the basics,like I said some of the catalogs you'll
|
|
go crazy over,theres always something for everyone in them.
|
|
But now onto more books and magazines,
|
|
|
|
Go down to your local book store and look these titles up,or have them
|
|
order them for you..
|
|
|
|
1. Old but good reading- Out of the Inner Circle by Bill Landreth
|
|
1985 by Microsoft Press $9.95
|
|
|
|
2. Hackers by Steve Levy- A good guide for the Ethics of a hacker..
|
|
Dell Publishing Company 1984 $4.50
|
|
|
|
3. The Cuckoos Egg by Clifford Stoll
|
|
Originally out in hardback at $19.95,but at the time of the
|
|
editing of this article its now in the stores on paperback
|
|
(Story of the Hannover Hacker and his ultimate downfall)
|
|
|
|
4. Definitly and an absolute must,Subscribe to:
|
|
|
|
2600:The Hackers Quarterly
|
|
Call (516)-751-2600,or FAX line (516)-751-2608
|
|
|
|
There are many more worthwhile books and magazines that could be listed
|
|
on and on, But we feel these selections will present to you a good
|
|
broad range of topics and interests. Some other worthy footnotes would be
|
|
to look up Consumertronics,they offer a large but expensive listing of
|
|
hacker/phreaker related material,(ED NOTE-Call (505)-434-0234) and to
|
|
find a bbs that has a large selection of Hacker Text files such as
|
|
PHANTASY,PHRACK,CUD,ATI etc. The IIRG's BBS along with many others offer
|
|
these files and finding them is no real difficulty.
|
|
This should drain your checkbook effectively for a while,or at least till
|
|
next months article on what is useful and noteworth on your newly obtained
|
|
hacker library.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
Section 3: High Explosives for Fun and Profit!
|
|
By:(Name withheld by Request)
|
|
|
|
EDITORS NOTE:The Procedures discussed in this article are
|
|
extremely dangerous. Therefore,the Author and
|
|
publisher (The IIRG) disclaim any liability
|
|
from any damages or injuries of any type that the
|
|
reader or user of information contained within
|
|
this article may encounter from the use of said
|
|
information. This article is intended for
|
|
entertainment purposes only!
|
|
|
|
Since Hacking is truly a state of mind and a Hacker can branch his
|
|
talents into many fields,I present this article to you on the God given
|
|
rights of this country and my constitutional right of Freedom of speech.
|
|
Ever since a lazy summer day in the Maine backwoods,spent blowing off
|
|
fireworks with my father and uncle,I've had a true love for explosives
|
|
of almost any type. A six year stint in the Marines only further
|
|
encouraged this love of noise.
|
|
What I present here to you are some well known formulas with
|
|
a sprinkle of my own modifications.
|
|
This first formula will allow you to concoct roughly the equivalent
|
|
of dynamite,not a military grade explosive but a great fishing bait!
|
|
|
|
First obtain some Potassium Chlorate, a rather cheap and easy to
|
|
acquire chemical usually obtainable at any chmeical distributor.
|
|
If they ask you what you need it for,do what I do and claim your
|
|
picking it up for your company and have no idea,the boss just sent
|
|
you to get it. I have this routine down pat and even stick around
|
|
with the owner of the warehouse and have coffee. If they really
|
|
are curious claim its for Hydroponics experiments.
|
|
|
|
Now take the KC1O3 (Potassium Chlorate) and grind it into a fine powder
|
|
almost the rough equivalent of flour or talcum powder. This is a must!
|
|
|
|
Carefully measure 5 level teaspoons of Vaseline and place in a plastic
|
|
bowl with 5 level teaspoons of beeswax. Then pour 1/3 of a cup of white
|
|
gas (Coleman liquid fuel) and dissolve the wax and vaseline mixture.
|
|
|
|
Now take 90 premeasured level teaspoons of powdered KC1O3 and hand knead
|
|
it into the bowl and form into blocks as the mixture hardens or place in
|
|
cardboard rolls (towel or toilet paper) and seal with wax.
|
|
|
|
Your explosive is now done but requires a blasting cap to set it off
|
|
and since these are almost impossible to obtain legally,here a do it
|
|
yourself cap.
|
|
|
|
Get some .25 ID (inner diameter) aluminum tubing at the old
|
|
hardware store
|
|
|
|
get some hexamine tablets down at the old military surplus shop
|
|
and grind into a fine powder like the above KC1O3
|
|
|
|
Take 2 1/2 tablespoons of crushed hexamine and mix with 4 1/2 tablespoons
|
|
of Citric acid (available at most grocery stores) in a glass jar
|
|
mix well with stirring rod and add 1 tablespoon of 20-30% peroxide
|
|
and place jar in a cool spot for 12 hours
|
|
Run mixture through a coffee filter,pour rubbing alcohol over mix in filter
|
|
(four or five spoons worth),to clean mix.
|
|
Let powder dry on towel and prepare tube,
|
|
|
|
Crimp one end of tube ( 3 1/2 inces long total)
|
|
fill tube with powder and place very thin wire into mix in tube
|
|
or a model rocket igniter,seal with glue and allow to dry.
|
|
|
|
Ok,take your homemade cap,place into your main charge and run
|
|
about 50 feet of wire from fuse to a 12 volt battery
|
|
When its all clear hook up your juice (Voltage) and kiss that
|
|
charge goodbye.
|
|
Some of my favorites are blasting for fish,make sure charge is totally
|
|
watertight in this case or blasting out old stumps.
|
|
JUST BE CAREFUL,The CAPS are EXTREMELY SHOCK SENSITIVE and are
|
|
powerful enough to blow your hand off.
|
|
|
|
Have Phun,and be careful. I had a blast for sure!
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section 3: The I.I.R.G. Attends the 8th Annual Connecticut
|
|
Computer and Electronics Show
|
|
By:Mercenary
|
|
|
|
|
|
On November 7th the I.I.R.G. Attended the 8th Ct. CES show,
|
|
The show seemed to be smaller than last year but the IIRG picked through
|
|
the venders booths with the zeal of drowning men looking for a life preserver.
|
|
Vagabond spent a large portion of his time dealing with a SNET
|
|
represenative discussing the workings of the CONN-NET system but was
|
|
able to get some valuable information from some other venders as well
|
|
which we'll present in this article.
|
|
Knighthack seemed to have a good laugh when the Prodigy demonstraters
|
|
couldn't seem to get on the system. (P.S.-He had to show em how)
|
|
Myself,well I sat through the Intro to Lans Seminar and the Wiring
|
|
your Network Seminar but couldn't take any more after that.
|
|
Heres what we were able to dig up at the show though,
|
|
|
|
1. Intergrated Services Digital Network Applications in the
|
|
Army Environment
|
|
|
|
It seems that the U.S. army is trying to develop specific end user
|
|
applications which solely depend upon the ISDN technologies of the Army.
|
|
The ARMY has identitfied the ISDN as part of the communications
|
|
archetectures of the future. Extensive field trials of ISDN have been
|
|
conducted to demonstrate the potential benefits of such technology.
|
|
But the limited number of user applications has prevented the
|
|
full realization of such services.
|
|
|
|
|
|
2. It seems the NAVY is concentrating on Computer Security Problems in
|
|
a BIG way. We saw 8 specific Computer Security projects laid out for
|
|
developers.
|
|
|
|
2A-High Assurance Trusted Systems-Seems there investigating
|
|
new approches for achieving high assurance for trusted systems
|
|
that accomadate innovative designs.
|
|
2B-Characteristics of Processing Elements with Respect to
|
|
Multilevel Security.
|
|
2C-Security Features for Work-Stations-seems they want better
|
|
techniques.
|
|
2D-Technology to Establish and Support the Role of Man in
|
|
Computer Security Systems.
|
|
2E-Expert System for Multilevel Security.
|
|
2F-The Inference Problem in Multilevel Secure database Management
|
|
systems.
|
|
2G-Placement of Network Security Services for Secure Data Exchange
|
|
2H-Composibility Constraints Of Multilevel Secure Systems
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
IIRG Disclaimer-All the above information was PUBLIC DOMAIN information
|
|
placed in open View for the PUBLIC at the 8th Annual CES Show.
|
|
and in no way compromises any agency or vendor as these are
|
|
open contracts for proposed Equipment placed on the open
|
|
FREE market for Bidding.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section 4: Hacker News and Interesting Footnotes
|
|
(More Info obtained at show)
|
|
By:Vagabond
|
|
|
|
|
|
MIT'S ATHENA TECHNOLOGY
|
|
|
|
MAYNARD, Mass."Athena," the innovative
|
|
computing environment developed at the Massachusetts Institute of
|
|
Technology (MIT), will be up and running at two new campuses this
|
|
winter.
|
|
|
|
North Carolina State University (NCSU) and Iowa State University
|
|
(ISU) signed contracts totaling $7 million with Digital
|
|
Equipment Corporation to install the Athena systems software and
|
|
link together hundreds of Digital workstations.
|
|
|
|
On each campus, the result will be a large-scale, high-
|
|
performance network designed to support students, faculty, and
|
|
researchers using UNIX based systems.
|
|
|
|
"Athena offers a new model for managing large numbers of workstations
|
|
in a network," said Barry Braunstein, Digital manager of Research
|
|
and Science/Engineering Solutions in the Education Market.
|
|
"Computing resources are centrally managed and highly accessible
|
|
to users completely location independent. Users can walk up to
|
|
any workstation on the network and log on, and access the same
|
|
files, software, and electronic mail."
|
|
|
|
Athena software services developed at MIT are freely redistributable.
|
|
Digital is offering support in planning, installation, and staff
|
|
training to universities who want to adopt the system.
|
|
|
|
At Iowa State, the Athena environment will include users from
|
|
engineering, the sciences, and a variety of other disciplines. "The
|
|
initial focus of the project is to stimulate high-quality research
|
|
by putting powerful tools into the hands of our faculty and graduate
|
|
students," said George Strawn, Director of Iowa State's Computation
|
|
Center.
|
|
|
|
Strawn said that researchers will benefit from speed and
|
|
power of workstations, and from the 'visualization' of research
|
|
data, which is made possible by computer graphics, things not
|
|
previously available in their existing computing environment.
|
|
|
|
The network will also make it easier to connect to off-campus
|
|
resources such as the National Science Foundation's supercomputers.
|
|
|
|
At North Carolina State University, the network's primary
|
|
function is to support engineering education.
|
|
|
|
"In the `real world,' computers are an integral part of engineering,"
|
|
said William Willis, Director of Engineering Computing Operations.
|
|
"Yet there's no consistent exposure to computers in the
|
|
undergraduate curriculum. Our goal is to ensure that a new
|
|
generation of students is comfortable using these modern tools."
|
|
|
|
This fall, only freshmen engineering students will use the
|
|
Athena environment. Over time, all engineering students will use
|
|
the workstations for design projects, simulation and modeling,
|
|
sharing data, writing papers, and solving homework problems.
|
|
|
|
Braunstein explained that Project Athena resolved many
|
|
technical problems that had made it expensive and technically
|
|
difficult to manage UNIX workstations in a network. Two key areas
|
|
were system security and the cost of network management.
|
|
|
|
"Athena's `Kerberos' network authentication system ensures a
|
|
very high level of security," said Braunstein. "And the automated
|
|
`Moira' Service Management System makes it possible to deploy a
|
|
large number of workstations in a cost-effective way, using a
|
|
client-server model, under central management.
|
|
|
|
"Cost-conscious institutions can support a large-scale
|
|
environment with a relatively small staff. For example, MIT runs an
|
|
installation of 1,000-plus workstations with a staff of six people
|
|
in hardware operations and systems administration"
|
|
|
|
Both NCSU and ISU had similar reasons for choosing to work with
|
|
Digital. Strawn explained, "Iowa State has a long relationship with
|
|
Digital, dating back to the 1960s. For this project, Digital
|
|
workstations offered excellent price/performance, and Digital's
|
|
proposal was the most innovative in terms of the Athena software."
|
|
|
|
Dr. Willis said, "In implementing the Athena technology, NCSU
|
|
was really looking for a partner. We reviewed three excellent
|
|
proposals. But Digital had much more experience with Athena and
|
|
has much stronger educational programs."
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
DECstation is a trademark of Digital Equipment Corporation.
|
|
|
|
UNIX is a registered trademark of American Telephone & Telegraph Co.
|
|
|
|
Project Athena, Kerberos Authentication Service and Moira Service
|
|
Management System are registered trademarks of Massachusetts
|
|
Institute of Technology.
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
A STEALTH MODEM
|
|
|
|
No,we've not been staring at the CRT too long,it seems that the
|
|
Air Force is trying to develop a Tactical Modem for Stealth Communications.
|
|
The Trend towards intelligent jamming mandates demands that future tactical
|
|
communications systems possess Electronic Counter-countermausures (ECCM)
|
|
responsive formats. A modem processing modular architechture is needed
|
|
that supports up to 50 MHz input sampling rate while providing the needed
|
|
adaptive processing. It must be an adaptive modem that can receive signals
|
|
corrupted by real world interference.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
Section 5: Phantasy Distribution Sites
|
|
|
|
Phantasy's Distributions Site's have changed,we apologize if you called a
|
|
board and didn't find the Mag. But were organized a little better now and
|
|
these will be the permanent sites as long as these systems are up and
|
|
operating.
|
|
|
|
1. IIRG Headquarters- The Rune Stone BBS - 1200/2400 Baud 24 Hours
|
|
Call for the Earliest possible releases of Phantasy and other
|
|
IIRG files. Our system will be going private so call Now while
|
|
you still can, at (203) 485-0088.
|
|
|
|
2. Lightning Systems- 24 hours - at (414) 363-4282
|
|
|
|
3. Sycamore Elite- 24 Hours - at (815) 895-5573
|
|
|
|
4. TAP BBS at (502) 499-8933
|
|
|
|
To get PHANTASY by mail on a 1.2 meg or 360K floppy mail the following
|
|
to this address:
|
|
|
|
Mail 12 Disks and $5.00 in stamps to
|
|
|
|
The I.I.R.G.
|
|
862 Farmington Ave
|
|
Suite-306
|
|
Bristol,Ct. 06010
|
|
|
|
Specify Format of Disk Please!
|
|
We will include any of the IIRG's releases for that month on disk
|
|
(Space Permitting)
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
END THIS ISSUE OF PHANTASY
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
(C)IIRG 1990
|
|
May Odin Guide Yor Way!
|
|
|