1062 lines
48 KiB
Plaintext
1062 lines
48 KiB
Plaintext
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
= =
|
||
- WELCOME TO THE SIXTEENTH ISSUE OF -
|
||
= =
|
||
- -=>PHANTASY<=- -
|
||
= =
|
||
- A PUBLICATION AND NEWSLETTER OF -
|
||
= =
|
||
- THE -
|
||
= INTERNATIONAL =
|
||
- INFORMATION -
|
||
= RETRIEVAL =
|
||
- GUILD -
|
||
= =
|
||
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
||
= =
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Volume Number Four,Issue Number Sixteen Dated 04/15/93
|
||
Editor is Mercenary : mercenar@works.UUCP
|
||
|
||
Article Submissions: The Mercenary/IIRG
|
||
862 Farmington Avenue
|
||
Suite 306
|
||
Bristol,Ct 06010
|
||
|
||
IIRG World Headquarters BBS: The Rune Stone
|
||
14.4K HST Courier
|
||
All H/P/A, 3000+ Files
|
||
(203)-832-8441
|
||
|
||
Table of Discontents:
|
||
|
||
[1] The "Rune Stone" Returns
|
||
By: Anubis
|
||
|
||
[2] Ripco : Not Dead Yet (Two News File Bulletins)
|
||
By: Dr. Ripco of Ripco II BBS
|
||
|
||
[3] Phone Preak Techniques
|
||
By: Mercenary
|
||
|
||
[4] DEF CON I Announcement
|
||
|
||
[5] FOR THE PEOPLE
|
||
Supplied By: Bulletin Boards Across the Country
|
||
Edited by: Mercenary
|
||
|
||
1. American Dissident Voices
|
||
2. PHAGE Magazine Information
|
||
|
||
[6] The Rumor Mill (Unconfirmed Rumors From the Underground)
|
||
Edited By: Mercenary
|
||
|
||
1. PE vs TDT
|
||
2. TDT vs PE
|
||
3. SeCT News Announcement
|
||
4. IIRG Note on SeCT News Announcement
|
||
|
||
[7] PHANTASY TIDBITS: News and Views of Interest
|
||
|
||
1. Pupils Had Bomb Guide
|
||
2. Highway Sign Has Officials Blushing
|
||
3. Vulgar Highway Messages an Outside Job, Police Say..
|
||
4. IIRG Note on Highway Sign
|
||
|
||
[8] Listing of IIRG Distribution Sites
|
||
|
||
[9] Listing of PHANTASY Distribution Sites
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
OFFICIAL DISLAIMER...
|
||
|
||
All information in PHANTASY is from USER contributed material
|
||
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
||
any liability from any damages of any type that the reader or
|
||
user of such information contained within this newsletter may encounter
|
||
from the use of said information. All files are brought to you for
|
||
entertainment purposes only! We also assume all information infringes
|
||
no copyrights and hereby disclaim any liability.
|
||
|
||
PHANTASY is (C) 1990 by The IIRG
|
||
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [1]: The "Rune Stone" Returns
|
||
By: Anubis
|
||
|
||
The Runes are there, for any fool to read.
|
||
But only he who has Hung on the Tree,as did Father Odin.
|
||
One who has gazed on the Abyss and suffered its emptiness,
|
||
May know their true meanings or tap the Power that lies within.
|
||
|
||
After almost 18 months, the long awaited event has arrived.
|
||
|
||
The return of The Rune Stone BBS
|
||
|
||
|
||
At last the Public Node of the Rune Stone BBS has been re-installed for
|
||
the readers of Phantasy and the H/P Community at large.
|
||
We hope those of you with an interest in Hacking or of the Underground
|
||
community will call and join.
|
||
We have No-Online Charges and no connect time charges.
|
||
Online are the IIRG Archives of nearly 3000 files consisting of Hack/Phreak
|
||
Text files,Magazines,Newsletters,etc. etc. with NO RATIOS!!
|
||
Please, if you were on the old Rune Stone, call back and set up an
|
||
account on the New system.
|
||
|
||
The Rune Stone BBS
|
||
(203)-832-8441
|
||
IIRG World Heaquarters
|
||
NUP: Conspiracy
|
||
14.4 HST
|
||
|
||
|
||
IIRG NOTE: Starting with Computer Underground Digest #5.26
|
||
the Rune Stone BBS will be listed as a CUD Distro Site.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [2]: Not Dead Yet
|
||
From: DR. RIPCO
|
||
|
||
Were not dead yet, but getting there...
|
||
|
||
Well folks, things didn't quite work out as we planned, no surprise with
|
||
messing with Unix based OS. Because of a limitation in the OS and the
|
||
hardware on this end, the expected closing is going to be delayed for a while.
|
||
|
||
We'll probably be playing with the new system on a different machine so
|
||
things here will be normal, or as close to it for a while.
|
||
|
||
Things are a bit screwed up though, since everything was transfered off and
|
||
returned back in a different order a few minor items got messed up. I'll be
|
||
tweaking things on and off so hang on to your shorts if you run into a
|
||
problem.
|
||
|
||
Dr. Ripco
|
||
|
||
RIPCO II BBS (312)-528-5020
|
||
-------------------------------------------------------------------------------
|
||
|
||
Date: Sun 4-11-93, 10:26 pm
|
||
From: DR. RIPCO
|
||
To: All
|
||
Subject: System Closing Update
|
||
|
||
Just to clear up the situation around here and to answer the bunch
|
||
o'questions I've received in e-mail...
|
||
First off, the system will be gone sooner or later. Some things jumped the
|
||
gun without proper forethought but since somewhat new ground is being broken
|
||
around here, the earlier annoucement probably should not have been made when
|
||
it was.
|
||
Secondly the new system at this point in time will be a complete second
|
||
system totally disconnected from this one. It'll be that way until the
|
||
second system is stablized enough to run on it's own.
|
||
I've even been toying with the idea of letting this system run on it's own,
|
||
probably on a different phone number even after the second system gets
|
||
going. Not sure on this matter, it depends much on how the newer system
|
||
looks to me and what it's capable of doing.
|
||
In any case, to answer the question of when and if it's worthwhile calling
|
||
here for the mean time, the answer is soon, probably by mid-summer at the
|
||
earliest and no later than fall. If things don't come together by then, I
|
||
doubt if it'll come to pass at all.
|
||
To answer the question of "why" is simple. The new system presented itself
|
||
much easier in thought than in real execution. Everything is going along but
|
||
each step taken creates another fork in the road. Rather than killing the
|
||
current system off and making the users pay for it in frustration of it
|
||
being here one day and not the next, it was decided to start from scratch
|
||
and all the "messing around" will be done on another computer system.
|
||
So consider things to be "as usual" for the immediate future.
|
||
|
||
Dr. Ripco
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [3]: Phone Phreak Techniques
|
||
By: Mercenary
|
||
|
||
As companies attempt to secure there phone systems, many phreakers are once
|
||
again turning to residential systems to secure there on-line time.
|
||
I feel this may be the kiss-of-death for many of you out there.
|
||
For everytime phreakers abuse residential systems a general uproar is usually
|
||
started in certain Law-Enforcement circles after numerous complaints from
|
||
residential customers.
|
||
I present to you here some more of the popular scams being used by the
|
||
phreaking community at this time.
|
||
|
||
1. THIRD PARTY BILLING
|
||
|
||
This scam usually is pulled on someone the phreaker knows, but dislikes.
|
||
It works well with traveling salesmen or others who's job requires them to
|
||
spend a large amount of time away from home but leaves their family behind.
|
||
The Phreaker will pose as the individual who is away and will have the
|
||
operator call the real individuals home.
|
||
The operator will inform the family Member that their "Loved-one" is making
|
||
a third-party call and will they accept the charge.
|
||
The unsuspecting family member will say, Yes we'll accept the charges
|
||
thinking it is their real "Loved-one"
|
||
And thus the phreaker has secured his access.
|
||
|
||
2. JUST SAY YES!
|
||
|
||
With this scam the phreaker will pose as a Security Representative of an
|
||
individuals long distance carrier (Sprint,AT&T,MCI) and say someone is using
|
||
your phone line for some form of illegal activity.
|
||
He will inform the unsuspecting "mark" that if he will accept a request to
|
||
charge a long-distance call to his phone from the operator who will call him
|
||
in several moments, it will allow them to trace the "criminal".
|
||
The phreaker will of course explain to his "mark" that he will credit their
|
||
account and they will not really be billed for the call.
|
||
Being a law abiding "Americas Most Wanted" viewer, the mark will of course
|
||
help the "Security Representative" get his man and accept the charges.
|
||
Once again the phreaker has secured his access.
|
||
|
||
3. CALL FORWARDING SCAMS
|
||
|
||
A phreaker posing as a telephone company technician will go to a "marks"
|
||
house and present a legitimate looking ID they will have either scanned
|
||
(stolen from a real employee) or created with a desktop publisher.
|
||
He will inform the "mark" that they are having problems with the lines in
|
||
his area and could he come in and do a quick check on the "marks" line.
|
||
The phreaker will go to the "marks" phone and do what looks like just a
|
||
quick check of the "marks" phone, but in reality he is call-forwarding the
|
||
phone to a payphone where his accomplice will answer the phone.
|
||
He will inform the "mark" that everything is fine and will leave.
|
||
In the meantime, his accomplice will be answering the payphone and saying
|
||
yes, I'll accept the charges for half of their phreaking buddies around
|
||
the country placing third-party-calls.
|
||
Sometimes the phreakers will not even enter your home to call forward your
|
||
phone. they will clip into your lines with a homemade linemans handset and
|
||
call forward from there. This is known as "Call Clipping".
|
||
This particular technique works well in apartment complexes where almost
|
||
all the junction boxes are located in the basement.
|
||
|
||
4. SOCIAL ENGINEERING
|
||
|
||
In this scam, the Phreaker will call his "mark" posing as a police detective
|
||
or some form of Law-enforcement official. The Phreaker will inform the "mark"
|
||
that they have caught a family member or close friend commiting telephone
|
||
fraud.
|
||
The Phreaker will say that he cannot give out the name of the individual,
|
||
because if he's innocent, the police do not want to make his name public.
|
||
The phreaker will then ask the "mark" if they would help clear their family
|
||
member or friend by accepting a collect call so they could trace the call to
|
||
the real "criminal".
|
||
Once again the phreaker gets his time.
|
||
|
||
----------- *** -------------
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [4]: DEF CON I Announcement
|
||
|
||
Hey Schlenises:
|
||
|
||
Pulled from the fringeware@wixer.cactus.org
|
||
|
||
Finalized Announcement: 4/09/1993
|
||
|
||
We are proud to announce the 1st annual Def Con.
|
||
|
||
If you are at all familiar with any of the previous Con's, then you
|
||
will have a good idea of what DEF CON I will be like. If you don't have any
|
||
experience with Con's, they are an event on the order of a pilgrimage to
|
||
Mecca for the underground. They are a mind-blowing orgy of information
|
||
exchange, viewpoints, speeches, education, enlightenment... And most of all
|
||
sheer, unchecked PARTYING. It is an event that you must experience at least
|
||
once in your lifetime.
|
||
The partying aside, it is a wonderful opportunity to met some of the
|
||
celebrities of the underground computer scene. And those that shape its
|
||
destiny - the lawyers, libertarians, and most of all the other There will
|
||
be plenty of open-ended discussion on security, telephones and other
|
||
topics. As well as what TIME magazine calls the "Cyberpunk Movement".
|
||
Las Vegas, is as you might have guessed a great choice for the Con.
|
||
Gambling, loads of hotels and facilities, cheap air fare and room rates.
|
||
It's also in the West Coast making it more available to a different crowd
|
||
than the former Cons have been.
|
||
Your foray into the scene and your life will be forever incomplete
|
||
if by some chance you miss out on DEF CON I. Plan to be there!
|
||
|
||
WHO: You know who you are.
|
||
WHAT: Super Blowout Party Fest, with Speakers and Activities.
|
||
WHERE: Las Vegas, Nevada
|
||
WHEN: July 9th, 10th and 11th (Fri, Sat, Sun) 1993
|
||
WHY: To meet all the other people out there you've been talking to for
|
||
months and months, and get some solid information instead of rumors.
|
||
|
||
|
||
DESCRIPTION:
|
||
So your bored, and have never gone to a convention? You want to meet
|
||
all the other members of the so called 'computer underground'? You've been
|
||
calling BBS systems for a long time now, and you definitely have been
|
||
interacting on the national networks. You've bullshitted with the best,
|
||
and now it's time to meet them in Vegas!
|
||
We cordially invite all hackers/phreaks, techno-rats, programmers,
|
||
writers, activists, lawyers, philosophers, politicians, security officials,
|
||
cyberpunks and all network sysops and users to attend.
|
||
DEF CON I will be over the weekend in the middle of down town Las
|
||
Vegas at the Sands Hotel. Why Las Vegas? Well the West Coast hasn't had
|
||
a good Convention that I can remember, and Las Vegas is the place to do
|
||
it.
|
||
Cheap food, alcohol, lots of entertainment and, like us, it never sleeps.
|
||
We will have a convention room open 24 hours so everyone can meet and plan
|
||
and scheme till they pass out. Events and speakers will be there to
|
||
provide distraction and some actual information and experiences from this
|
||
loosely knit community.
|
||
This is an initial announcement. It is meant only to alert you to
|
||
the time, dates and location of the convention. Future announcements will
|
||
inform you about specific speakers and events.
|
||
An information pack is FTPable off of the internet at nwnexus.wa.com,
|
||
in the cd/pub/dtangent directory. The IP# is 192.135.191.1 Information
|
||
updates will be posted there in the future as well as scanned map images and
|
||
updated speaker lists.
|
||
|
||
FINAL NOTES:
|
||
|
||
COST:
|
||
|
||
How you get there is up to you, but United Airlines will be the
|
||
official carrier (meaning if you fly you get a 5% to 10% price reduction
|
||
off the cheapest available fare at the time of ticket purchase) When
|
||
buying airline tickets, call 1-800-521-4041 and reference meeting ID# 540ii.
|
||
Hotel Rooms will cost $62 per night for a double occupancy room. Get your
|
||
friends -- together and split the cost. Food is inexpensive.
|
||
The entertainment is free inside the hotel.
|
||
Reference the DEF CON I convention when registering, as we have a block of
|
||
rooms locked out, but once they go it will be first come, fist serve.
|
||
Call 1-800-634-6901 for the reservations desk.
|
||
The convention itself will cost $30 at the door, or $15 in advance.
|
||
Mail checks/money orders/cashiers checks to: DEF CON I, 2709 East Madison
|
||
Street, Seattle, WA, 98112. Make them payable to: "DEF CON" we're not trying
|
||
to make money, we will be tring to cover costs of the confrence room and
|
||
hotel plus air fair for the speakers who require it.
|
||
Don't bother mailing it a week in andvance, that just won't happen.
|
||
Advanced registration gets you a groovy pre-generated name tag.
|
||
Include with your payment the name you want listed,
|
||
your association/group affiliation/bbs/whatever, email address, and/or bbs
|
||
number for syops. Last day for the registrations to reach me will be july
|
||
1st.
|
||
|
||
SPEAKERS:
|
||
|
||
We are soliciting speakers from all aspects of the computer underground and
|
||
associated culture (Law, Media, Software Companies, Cracking Groups,
|
||
Hacking Groups, Magazine Editors, Artists, Etc.) If you know of someone
|
||
interested in speaking on a self selected topic, please contact
|
||
The Dark Tangent to discuss it.
|
||
|
||
FOR MORE INFORMATION:
|
||
|
||
For initial comments, requests for more information, information
|
||
about speaking at the event, or maps to the section where prostitution is
|
||
legal outside Las Vegas (Just Kidding) Contact The Dark Tangent on any of
|
||
the following networks in the general conversation echos:
|
||
CyberCrime, Platinum Net, Thunder Net, Scurvy Net, The Crime Syndicate,
|
||
~TOP~, Net, HiT Net, Shark Net. Leave the comments in the general
|
||
message sections.
|
||
Or leave me mail at: dtangent@dtangent.wa.com on the Internet.
|
||
Or call: A Dark Tangent System at: 206.722.7357 (This # will change 6/1/93)
|
||
Or Snail Mail (U.S. Postal Service) it to DEF CON, 2709 East Madison
|
||
Street, Seattle, WA, 98112.
|
||
Future information updates will pertain to the speaking agenda.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
DEF CON I CONVENTION [PROPOSED SPEAKING SCHEDULE 4.9.1993]
|
||
|
||
Saturday the 10th of July
|
||
|
||
INTRODUCTION Welcome to the convention
|
||
*The Dark Tangent (CON Organizer)
|
||
|
||
Keynote speaker Cyberspace, Society, crime and the future.
|
||
|
||
Civil Libertarians
|
||
|
||
-CPSR Computer Privacy/1st Ammendment/
|
||
-EFF The future of Internet/Who owns it
|
||
-USC Comp. Law Legalities of BBS Operation, message content
|
||
laws and network concerns.
|
||
*Allen Grogan, Editor of Computer Lawer
|
||
|
||
'The Underworld'
|
||
|
||
-Networking Concerns of National Networking of CCi Net.
|
||
*Midnight Sorrow.
|
||
|
||
-Pirating Concerns of a Pirating/Cracking Organization.
|
||
Concerns of a Major BBS operator
|
||
Why run the Risk?
|
||
-Virus Virus Creation/Explanation
|
||
|
||
Corporations
|
||
-Packet Switching
|
||
|
||
SPRINT Concerns/security and the future
|
||
MCI of packet switching.
|
||
(*Jim Black, MCI Systems Integrity)
|
||
|
||
Internet
|
||
|
||
-CERT Changing rolls / Changing environmnets
|
||
-CIAC
|
||
|
||
System 75 Information on the System 75
|
||
*Scott Simpson
|
||
|
||
-System Administrator Security Concerns of an Administrator
|
||
*Terminus
|
||
|
||
The 'Underworld'
|
||
-Internet The security problems with Internet/Networks
|
||
Overview of hacking
|
||
*Dark Druid
|
||
|
||
-Getting Busted The process of getting "busted"
|
||
*Count Zero
|
||
|
||
-PBX Defeating ANI/PBX Q&A
|
||
*Anonymous
|
||
|
||
-How to be a nobody Hiding your identity in the high-tech future, or
|
||
The payphone is your friend.
|
||
*Anonymous
|
||
|
||
Other Institutions
|
||
|
||
-The Secret Service Their Defined Roll/Priorities/Q&A
|
||
*Nevada Secret Service Office
|
||
|
||
-The Prosecutors Their concerns/problems and
|
||
Hacker Hunters suggestions for the 'underworld'/Q&A
|
||
|
||
-The Media The effect of the media on public perceptions
|
||
*Erik Bloodaxe / Phrack Magazine
|
||
|
||
CONCLUSION General Q&A
|
||
|
||
|
||
This itenerary is proposed, and topics and speakers will be marked as
|
||
permanant once a confirmation is recieved. This is by no means the exact
|
||
format of DEF CON I. Any Questions / Comments Contact:
|
||
|
||
dtangent@dtangent.wa.com
|
||
A Dark Tangent System 206-722-7357
|
||
|
||
[> A Dark Tangent System 206.722.7357 <]
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [5]: FOR THE PEOPLE
|
||
Supplied By: Bulletin Boards Across the Country
|
||
Edited by: Mercenary
|
||
-------------------------------------------------------------------------------
|
||
|
||
Listen To,
|
||
AMERICAN DISSIDENT VOICES
|
||
A radio program for real Americans!!
|
||
|
||
Nationwide and Worldwide: Every Saturday evening at 9:00 PM Eastern Time,
|
||
6:00 PM Pacific Time on 7355 KHz (shortwave) from WRNO, New Orleans.
|
||
The signal covers all of North America and most of the rest of the world.
|
||
|
||
Regional listeners:
|
||
|
||
Arkansas : Every Saturday morning at 10:00 AM from KMTL, 760 on your AM dial.
|
||
The Signal covers most of Arkansas.
|
||
|
||
California : Every Sunday evening at 6:00 PM from KPLA, 770 on your AM dial.
|
||
The signal covers much of northern and central California.
|
||
|
||
Florida : Every Saturday morning at 11:30 AM from WTIS, 1110 on your AM dial.
|
||
The signal covers a wide area of West-central Florida.
|
||
|
||
Virginia : Every Saturday night at 10:30 PM from WKGM, 940 on your AM Dial
|
||
The signal covers most of tidewater Virginia.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
PHAGE Magazine Information Package (March 1993)
|
||
|
||
Welcome To The Future
|
||
---------------------
|
||
|
||
Hello. Our names are Andy Hawks and Paul Leonard, and we are the publishers
|
||
of a new zine called PHAGE. PHAGE is a new magazine for people who are
|
||
living on the new edge, surfing along the new wave of radical thought.
|
||
This magazine was born from the need for a forum for new ideas in a print
|
||
media.
|
||
|
||
Andy Hawks has been producing an electronic mailing list called Future
|
||
Culture for the last two years, catering to the desires of modern
|
||
thinkers. This list, along with the Frequently Asked Questions file which
|
||
is a primer for the list,arose out of an interest primarily in cyberpunk
|
||
fiction, particularly the idea that "cyberpunk is really about the present".
|
||
From there, the spectrum of information contained in the FutureCulture
|
||
list spread to include a wide snapshot of aspects of modern culture
|
||
that are ahead of the mainstream, oriented towards the near-future.
|
||
This includes all realms of what is commonly called "new edge",
|
||
"technoculture", or "cyberculture" -- a mishmash of postmodernism,
|
||
psychedelics, hacking, raves, cyberspace, industrial music, cyberpunk
|
||
fiction and realities, etc., that are proving to be important
|
||
constructs in the evolution of world culture.
|
||
|
||
The list and file continues to grow and morph, gaining a wide audience
|
||
including,at one time or another, a variety of sociologists and
|
||
anthropoligists, authors and writers, hackers, scientists, students,
|
||
and prominent "cyber-" oriented figures.Those who share an interest
|
||
in the topics discussed in the file can participate in in-depth or
|
||
light-hearted discussions via the FutureCulture E-list.
|
||
|
||
Concurrently, and independantly, Paul Leonard has been releasing fiction
|
||
into the cybersphere through the Cult of The Dead Cow. The goals of cDc
|
||
, since it's inception in 1986, have always been to create a culture within
|
||
the new world of cyberspace. He has also ventured into the realm of print
|
||
publishing with FNORD! Magazine, from 1989 to present.
|
||
|
||
The two of us came together through the FutureCulture mailing list, along
|
||
with the Leri & Aleph mailing lists. The bond was solidified over
|
||
discussions on the Internet Relay Chat #leri conference. After a long period
|
||
of deliberation it was decided that we should allow our ideas to propagate
|
||
to as many people as possible. We decided that the best way to do this
|
||
at this time was to start a print magazine based around our ideals. We
|
||
live in a world where paper and television are the informational
|
||
messengers of choice to the masses.
|
||
|
||
The magazine will be designed and produced on the Macintosh computer, in
|
||
an 8 1/2 x 11" format, and each issue will be in the area of 64 pages. We
|
||
are planning to sell the magazine at a cover price of $3.50 (US), but
|
||
until costs are measured, we cannot say for sure.
|
||
|
||
We are looking for submissions and assistance with this project from all
|
||
angles: fiction writers, essayists, ranters, graphic designers,
|
||
artists, poets, etc. Submissions are welcome in any form, in any
|
||
style, in any tone, though that is not a guarantee that everything we
|
||
receive will be printed. We are looking for submisisons as soon as
|
||
possible, but feel free to send them in whenever you like. For first
|
||
issue, send them in by the second week of April.
|
||
|
||
Due to lack of available resources, we are unable, for now, to reward
|
||
monetarily those who contribute to PHAGE. We have have little money, and
|
||
our primary interest is producing the highest-quality magazine possible,
|
||
containg an immense spectrum of information.
|
||
|
||
If you would like to contribute to PHAGE in any way, please send all
|
||
queries, submissions, tips, words of wisdom, etc., to us on the Internet
|
||
at:
|
||
|
||
obscure@mindvox.phantom.com
|
||
or
|
||
ahawks@nyx.cs.du.edu
|
||
|
||
If you do not have Internet access, please send mail to:
|
||
|
||
PHAGE Magazine
|
||
PO Box 10821
|
||
Green Bay, Wisconsin 54307-0821
|
||
________________________________________________________________________
|
||
|
||
Possible Content Material
|
||
________________________________________________________________________
|
||
|
||
Focusing on the Edges of Culture, examining the Fringes of Reason and
|
||
the Reasons of Fringe, the Here and Now and Soon-to-Be, via
|
||
unstrcutured Tones that Ebb and Flow from In-Form Information to
|
||
Formless Rants of Altered States.
|
||
|
||
The following are groups of potential topics that we have divided into
|
||
categories to make things more coherant.
|
||
|
||
GENESYS
|
||
-------
|
||
Notes from the Editor, Leters from those that Grep and/or Grok
|
||
the Infinite Edge.
|
||
|
||
|
||
nuMEMES
|
||
-------
|
||
Soundbytes of the World, Unite and Take Over. Blurbs
|
||
pertaining to interesting news and products, quotes,
|
||
technology, factoids, etc.
|
||
|
||
|
||
MODERN
|
||
------
|
||
Cultural Commentary - Realizing, Focusing, and Morphing
|
||
the PostModern World. Rants, Essays, Theses, Observations,
|
||
Predictions, Analyses, Streams and Rivers of Consciousness.
|
||
|
||
|
||
-SUB
|
||
----
|
||
The Depths of the Underground Subcultures. Rants, Essays,
|
||
Theses, Observations, Predicions, Analyses, and Information.
|
||
|
||
|
||
E+
|
||
--
|
||
The Virtual World. News, Notes, Notables and Quotables, Rants,
|
||
Essays, Theses, Observations, Predictions, Analyses,
|
||
Communication, Teknologies.
|
||
|
||
|
||
Inner-View
|
||
----------
|
||
Interviews (I-Views) and E-Views with those who Surf, Ride,
|
||
Make and Break the Edges of Culture.
|
||
|
||
|
||
STREAMZ
|
||
-------
|
||
Fiction on The Edge: Transreal, Hyperreal, SlipStream,
|
||
Cyberpunk, Post-Cyberpunk, [insert_any_word_here], etc.
|
||
|
||
|
||
MEDIA
|
||
-----
|
||
Reviewing, Analyzing, and Commentary regarding Popular and
|
||
Underground Media: Books, Magazines, Zines, E-Zines, E-Books,
|
||
Hypertext, Music, Film, Video, Television, Software, etc.
|
||
|
||
|
||
MOEBIUS
|
||
-------
|
||
One Last Informational Fix, Closing Words, Late-Crashing News,
|
||
etc.
|
||
|
||
|
||
If you would like to contribute to PHAGE in any way, please send all
|
||
queries, submissions, tips, words of wisdom, etc.,to us on the Internet
|
||
at:
|
||
|
||
obscure@mindvox.phantom.com
|
||
or
|
||
ahawks@nyx.cs.du.edu
|
||
|
||
If you do not have Internet access, please send mail to:
|
||
|
||
PHAGE Magazine
|
||
PO Box 10821
|
||
Green Bay, Wisconsin 54307-0821
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [6]: The Rumor Mill (Unconfirmed Rumors From the Underground)
|
||
Edited By: Mercenary and Anubis
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
*** HARD CORE IS A THIEF AND HERE IS PROOF ***
|
||
|
||
All right before I start on the actual proof here I want to make shure that the
|
||
few well known facts are stated so that EVERYONEknows the real story!
|
||
|
||
1) Ultima 7 Part 2 was released by Public Enemy first it was uploaded
|
||
to Unlawfull Entry about 4-5 Hours before TDT's version was
|
||
released!
|
||
|
||
2) As I was starting to upload the third disk a TDT courier was
|
||
downloading Public Enemy's Crack file.
|
||
|
||
3) 4-5 hours later Hard Core nukes Public Enemys version saying the
|
||
original and the crack were stolen from TDT. (Hard Core in particular)
|
||
|
||
4) Hard Core's proof of the stolen crack consisted of blank lines that were in
|
||
our TSR file that were supposed to have originally had Hard Core's first
|
||
name in there twice ROB ROB.
|
||
|
||
|
||
Now these are known facts and im shure no one will dispute the fact that
|
||
this was the information that was being spread by TDT namely Hard Core.
|
||
Well I am here now to prove the thief to be Hard Core. First we will adress the
|
||
ROB ROB that was supposed to be in Hard Core'sTSR. If you look to Rob's TSR you
|
||
will find that the ROB ROB that is in there also has many other blank spaces
|
||
around it. You may ask yourself why are those other spaces there??
|
||
Well i'll tell you, the TSR that was used was written by TERMINATOR he took it
|
||
from a previous crack of his that he did while he was cracking for Fairlight a
|
||
little while back. That release was called MEGAFORTRESS. If you download that
|
||
release from any BBS you will find the TSR to be the same one with TERMINATOR'S
|
||
info filling those blank spaces perfectly! I will uploadthe TSR from that game
|
||
following this text file get it and compare orif you want to be 100% shure
|
||
download MEGAFORTRESS pull it apart and see for your self! Now if this is not
|
||
enough for you people who still dont believe I have a second piece of proof for
|
||
you! Download any TDT release that Hard Core supposedly wrote a TSR for and run
|
||
it. You ask what for?? because you will hear silence! Now do the samewith any
|
||
game TERMINATOR cracked and wrote a TSR for and run it. You will hear
|
||
Terminators LEGENDARY beep. Now the deciding factor run the TSR from TDT's
|
||
version of Ultima 7 and holy shit it fucking BEEPS! Now for a third piece of
|
||
information any of Hard Core's TSR's that you will look at stay in memory where
|
||
Terminators ALWAYS TERMINATE! The TSR that we supposedly stole from Hard Core
|
||
Terminates from memory! See what happened here is whoever stole TERMINATORS
|
||
crack for Ultima never took out his beep and put ROB ROB in there to try and
|
||
make it look like we stole it from Hard Core. Now I dont know if hard Core did
|
||
this or Hydro did this (since Hydro uploaded the crack file I dont know why)
|
||
but whatever the case Hard Core claimed this to be his own! So its very obvious
|
||
that Hard Core was NEVER able to crack this game!
|
||
To Hard Core if you really could not crack the game why not deal with it?
|
||
Did you really think you were going to get away with this?
|
||
I really cant believe this was done...
|
||
But at least the truth is nowout all that is left to say is
|
||
|
||
GREAT JOB TERMINATOR!
|
||
|
||
Speed Master/Blade Runner/The Hawk
|
||
|
||
===============================================================================
|
||
|
||
|
||
-//- T H E D R E A M T E A M -\\-
|
||
1993 - 3RD YEAR ANIVERSARY ON IBM
|
||
|
||
For all of you guys that wonder what the HELL is going on in the PIRATE scene
|
||
right now...
|
||
|
||
[1] Public Enemy is the first group on the IBM that took another groups
|
||
crack and game and released on their own, they are NEVER gonna get
|
||
respect on the scene since they fucked up so badly, they will always be
|
||
remembered as a NO BALLS GROUP.
|
||
|
||
[2] The Grim Reaper is NO LONGER affiliated with TDT since he tried to run
|
||
the group on his own and start to tell people this and that person was
|
||
out of TDT
|
||
I'm the only person in this group that can do that.
|
||
|
||
[3] There is no changes in TDT exept of one person i out of it. If you
|
||
have any questions about this contact me on Unlawful Entry.
|
||
|
||
PERSONAL NOTES:
|
||
|
||
THE HAWK - How can you be so lame and calling me a lie'er when you know
|
||
in your heart that you guys stole my crack and remove my name?
|
||
|
||
SPEED MASTER - Don't try to put an attitude on anyone, a lowlife like
|
||
will never kick ass like you always wanted, you should just
|
||
crawl back to your whole and keep shut up
|
||
|
||
BLADE RUNNER - Man, get a life. Your mates at PE dont even know how to spell
|
||
|
||
SCRIPT LANGUAGE - Dont tell me you loose respect for me for doing this,
|
||
you are the one loosing respect from everybody
|
||
|
||
RESET OF PE - How can you guys stay in such a lame as group, where you guys
|
||
dont have the balls even to admit you guys cant crack shit
|
||
|
||
THE SCENE - Don't ever respect anyone in PE LAME. You can rag, you can
|
||
bullshit, call each other lamers, but NEVER EVER steal
|
||
somebody elses CRACK that that person spent 4 days to do,
|
||
and then try to tell him he is a fuckhead. There were several
|
||
persons that got the game and even HAL9000 said he dont even
|
||
try on this one. NOBODY belives a slow fuck like terminator
|
||
could do it, and besides, he just needed to change my crack a
|
||
bit.
|
||
|
||
FINAL WORD - A few positions left in TDT, if you are the one that
|
||
want to be a part of a REAL CRACKING GROUP then contact
|
||
us today!
|
||
|
||
FIGHT AGAINST LAMERS!!!
|
||
==============================================================================
|
||
|
||
ATTENTION ATTENTION ATTENTION
|
||
|
||
SPA ALERT! SPA ALERT!
|
||
|
||
WHOOOP! WHOOOOP! WHOOOOP!!!!
|
||
|
||
This is a little text file warning to all Connecticut BBS's.
|
||
The SPA is lurking in CT. Now the story!
|
||
|
||
According to our information here at SeCT WHQ we have information for all
|
||
the users out there about some recent activity in the area. Kevin B****,
|
||
Yes the fool that writes the Connecticut BBS list, has called the SPA on
|
||
(IIRG Delete) This board was a killer board run by the (DELETED)
|
||
At this time we have no more information on why this was done, but we will
|
||
be conducting an interview with each of the people involved,to get the truth.
|
||
|
||
At this point we at SeCT think Kevin B**** is an asshole and should be
|
||
destroyed. Also according to other information he had two other people
|
||
who helped him do this their names are Lou R****** and Jason L*****. As I
|
||
said before when we conduct the interviews we will have more information
|
||
for you.
|
||
|
||
For now our suggestion to all bbs's to delete these people if they are on
|
||
your board and tighten security. Never know what board he will turn in next.
|
||
|
||
So to Kevin B***** and his friends we at SeCT think you are a fuck'in asshole.
|
||
|
||
P.S.- Kevin if you are reading this and feel we are in the wrong we will be
|
||
conducting an interview with you to get your sidfe of the story.
|
||
|
||
This has been a SeCT News Warning 03-22-93
|
||
|
||
|
||
SeCT Staff
|
||
|
||
All users please pass this file around unchanged to everywhere you call!
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
IIRG NOTE ON SECT NEWS ANNOUNCEMENT
|
||
|
||
The previous news file released by SeCT is partially correct.
|
||
The IIRG has recieved a tape of a phone conversation that was apparently
|
||
secretly recorded amongst some of the people mentioned in the SeCT file.
|
||
The truth of the matter in what we've transcribed so far is that the only
|
||
real person responsible was the person named "JASON".
|
||
Mercenary recieved an E-mail letter from one of the persons mentioned in
|
||
the file and this is what he recieved... (Edited of Course)
|
||
|
||
--------------------------------------------------------------------
|
||
|
||
Subject: SIN CITY BBS
|
||
To: The IIRG <works!mercenar@uunet.UU.NET>
|
||
|
||
Hello... this is Lou XXXXXXX... I have written to you in the past... I have
|
||
seen an article floating around recently accusing me of having helped out in
|
||
the turning in of XXX XXXXS... this is not true. it has come to my attention
|
||
that Muther has given you the JASON TAPES as I call them... I think you know
|
||
what I'm talking about... please help me clear my name... I was an active user
|
||
and contributed much to XXX XXXX before its demise... why would I want it
|
||
down? I had no motive whatsoever! Jason is fully responsible... not me, and
|
||
not Kevin XXXXX. Please transcribe the JASON TAPES in the next issue of
|
||
Phantasy so that justice may be done. Thank you, I appreciate this. please
|
||
reply
|
||
|
||
--------------------------------------------------------------------
|
||
|
||
The IIRG will be presenting a transcription of the Tape in Phantasy 17
|
||
and hopefully this will correct some of the dis-information floating
|
||
around out there and clear the matter up once and for all.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [7]: PHANTASY TIDBITS: News and Views of Interest
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
PUPILS HAD BOMB GUIDE
|
||
---------------------
|
||
|
||
150 - Page Manual Came from Computer
|
||
|
||
Lebanon,CT. - A 150-page manual on how to make bombs and homemade explosives
|
||
has been found in the hands of 13-year-olds in a Connecticut middle school.
|
||
The inch-thick book, chock full of tips on bomb building and vandalizing
|
||
schools was discovered last week at the Lebanon Middle School after a
|
||
Mathematics teacher overheard a discussion among a few of his pupils.
|
||
"It explained how to make bombs and how to cause mayhem at the school." said
|
||
resident State Trooper Mark Maynard, who was called in to investigate.
|
||
The manual had been obtained through a non-school computer bulletin board by
|
||
an older brother of one of the middle school pupils.
|
||
"The boy who obtained it is a computer whiz. He said he obtained it for the
|
||
purpose of doing a class project," Maynard Said.
|
||
But four or five copies of the manual wound up in the hands of middle school
|
||
pupils and were being sold to seventh- and eighth-graders for $10.00 apiece.
|
||
The older brother, a high-school student, apparently retrieved the computer
|
||
information about two months ago, but it did not surface at the middle school
|
||
until march 14th, not long after the bombing at the World Trade Center in New
|
||
York City.
|
||
"The first concern was that it was related to that," Maynard said. "It just
|
||
happened to surface right after it".
|
||
And while retrieving such information falls under Freedom of Speech and is
|
||
not illegal, it is against school rules to sell anything not for a school
|
||
Fund-raiser, said Bert Bosse, principal of the middle school.
|
||
Superintendent of Schools Albert Vertefeuille said some disciplinary actions
|
||
will be taken against the pupils for selling the computer document on school
|
||
grounds, but he declined to elaborate on what that action would be.
|
||
The computer information was not obtained through any school computers, but a
|
||
copy was later placed on one of the computers at nearby Lyman Memorial High
|
||
School. That also violated school rules, the school officials said.
|
||
"The thing that bothered us was that there was specific things on how to
|
||
terrorize schools,teachers,and principals," said Bosse. "My biggest concern
|
||
was not that any of the kids we dealt with would have used this for terrorism,
|
||
but they may have tried to attempt [to build explosives] themselves and caused
|
||
serious injuries."
|
||
Nationwide, hundreds of children and teenagers are maimed or killed every
|
||
year from experimentation with homemade explosives. Information obtained from
|
||
computer bulletin boards on homemade bomb making has been a major contributor
|
||
to such mishaps, police said.
|
||
"I think the problem is there is no law pertaining to this," Maynard Said.
|
||
In connecticut, teenagers learning how to manufacture bombs through home and
|
||
school computers contributed a nearly 50 percent increase in the number of
|
||
homemade explosives discovered last year by state police.
|
||
"We are definitely seeing more of it. Kids by nature experiment", said Sgt.
|
||
Kenneth Startz, who supervises the emergency services ddivision of the state
|
||
police, which includes the bomb squad.
|
||
"Bosse described the boys involved with the incident at the middle school as
|
||
good pupils who had not been in trouble before. He said he believed they were
|
||
driven by curiosity than anything else.
|
||
All of the kids were very cooperative, Bosse said. The parents were totally
|
||
shocked when they read what was in it".
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
HIGHWAY SIGN HAS OFFICIALS BLUSHING
|
||
|
||
Fairfield,CT.-Thousands of motorists traveling South-bound on Interstate-95
|
||
got a terse message on an electronic traffic sign: "YOU ALL SUCK".
|
||
We dont know how they did it," said State Police Lieut. Albert Masek of
|
||
troop G in Westport. "We thought maybe a computer hacker did it"
|
||
The incident was reported on the morning shift Sunday, Apr. 4th and
|
||
responding troopers could not disable the large, yellow lights on the
|
||
portable, 10-foot-high sign located near Exit 19. The sign displayed the
|
||
message for several hours until a state Department of Transportation crew
|
||
got it covered with a large tarp.
|
||
DOT spokesman William Keish said Monday that the sign can only be programmed
|
||
from DOT offices in Wethersfield or State Police headquarters in Meriden.
|
||
Bill Stoeckerd, director of DOT's incident management office reprogrammed it
|
||
Monday.
|
||
"Were taking steps with the contractor to upgrade our security," said
|
||
Stoeckerd. "We really don't know, whether [the pranksters] were able to come
|
||
into access accidentally or not."
|
||
He said the sign, in use since August, was recently the target of a similar
|
||
prank, but not the exact same wording.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
VULGAR HIGHWAY MESSAGES AN OUTSIDE JOB, POLICE SAY
|
||
|
||
Connecticut State Police have concluded a computer infiltrator is
|
||
responsible for two crude messages, the latest lambasting Gov. Lowell P.
|
||
Weicker Jr., that have flashed on a highway electronic message board in
|
||
Fairfield,Ct. in the past two weeks.
|
||
CT State Police Master Sgt. Scott O'Mara would not comment on reports that
|
||
police had identified a suspect, he said "the 10 day old investigation was
|
||
progressing".
|
||
The message board reportedly can only be operated from the state Department
|
||
of Transportation operations center in Wethersfield or the state police
|
||
communications center in Meiden,CT. but police believe the vulgar messages
|
||
did not come from either of those locations.
|
||
Instaed,"We believe it's a computer crime by modem through a phone line",
|
||
O'Mara Said.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
IIRG NOTE ON HIGHWAY SIGN
|
||
|
||
At the time of the completion of this issue of Phantasy, a suspect has been
|
||
caught in the Highway Prank situation in Fairfield,CT.
|
||
We'll bring you more details in Phantasy Issue 17
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [8]: IIRG Distribution Sites
|
||
(or Gateways to Oblivion)
|
||
|
||
|
||
|
||
////// ////// /////// ////////
|
||
// // // // //
|
||
// // /////// // ////
|
||
// // // // // //
|
||
////// * ////// * // // * /////////
|
||
|
||
|
||
|
||
|
||
IIRG World HQ: The Rune Stone BBS
|
||
14.4k HST
|
||
Phantasys Home Board
|
||
Complete IIRG Archives 3000+ Files
|
||
(203)-832-8441
|
||
|
||
|
||
IIRG Distribution Site 1: Wired World BBS
|
||
INC Europe
|
||
TPC Courier (WHQ)
|
||
THP
|
||
IIRG Distribution Site
|
||
Sysop: Digital Justice
|
||
+39-89-254138
|
||
|
||
IIRG Distribution Site 2: Cyberdyne Network Germany
|
||
United Forces
|
||
Sysop: E605
|
||
+49-5341-59004
|
||
+49-5341-54052
|
||
|
||
|
||
IIRG Distribution Site 3: The Sanitarium
|
||
Sysops: Morbid Angel [INC/ACID]
|
||
Spectral Illusion [ACID/RAZOR]
|
||
IIRG Distribution Site
|
||
ACID Member Board
|
||
INC Courier Board
|
||
RAZOR 1911 Courier Board
|
||
VISA World Headquarters
|
||
(817)PRI-VATE
|
||
|
||
IIRG Distribution Site 4: The WareHouse
|
||
(203)-231-8980
|
||
OVER A GIG ONLINE
|
||
Sysop: Ionizer
|
||
|
||
IIRG Distribution Site 5: Hollow Tree Productions
|
||
Sysop: Phantasm
|
||
Syndicate
|
||
Extreme*Net
|
||
(313)-EXE-TREME
|
||
|
||
IIRG Distribution Site 6: The Web
|
||
203-869-0938
|
||
OOFNet/CCiNet
|
||
ACiD Member Board
|
||
VECTOR World HQ
|
||
ESP Courier HQ
|
||
Phantasy Dist.
|
||
9600+ Only
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [8]: Phantasy Distribution Sites
|
||
|
||
Phantasy's Distribution Site's are continually growing,we apologize if you
|
||
called a board and didn't find the Mag. Network Distribution Sites will
|
||
have the Issues first, we suggest calling one of them if a problem does
|
||
arise.
|
||
|
||
|
||
1. Lightning Systems
|
||
(414) 363-4282
|
||
200 Million Bytes OnLine
|
||
USRobotics Dual Standard HST/V.32bis
|
||
2400 thru 14.4k v.32bis/HST
|
||
|
||
2. The Works BBS
|
||
Waffle Net v1.65
|
||
[617]/861-8976
|
||
3/12/24/96/14400b 7dy/24hr N,8,1
|
||
Lexington, MA
|
||
200 Megabytes of Storage
|
||
99.44% pure textfiles
|
||
Remote cDc Node (Very remote)
|
||
|
||
3. Pipers Pit BBS
|
||
19,200-9600 HST ONLY!!
|
||
24 Hours a Day
|
||
THG Distro Site 1300 Megs
|
||
(203)PRI-VATE [2 Nodes]
|
||
|
||
4. The Dickinson Nightlight
|
||
(713)-337-1452
|
||
Der WeltanSchauung Distro Site (World View Magazine)
|
||
Phantasy Distro Site
|
||
|
||
5. Abiogenesis,
|
||
3/12/24/96/14400 Practical Peripherals 14400FXSA
|
||
Fidonet 1:280/310.
|
||
Phone (816)734-4732
|
||
|
||
Phantasy is also available on these systems,
|
||
|
||
Ripco II BBS The Hell Pit
|
||
(312)-528-5020 (708)-459-7267
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
PHANTASY(C) IIRG 1991,1992,1993
|
||
May Odin Guide Your Way!
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- |