3880 lines
201 KiB
Plaintext
3880 lines
201 KiB
Plaintext
____ _____________ ___________ _____
|
||
____\ |_\_ | _ _ |_\_ | _ | _ |__________ _ _ ___
|
||
| _ | _ | | | | _ | | | | |-| _ | | ______\ | /___
|
||
| | | | | | | | | |____ | ___| | | | |-| \ |zZ! /___
|
||
l______|_____|__|-|__|_____|__/__|___\___|_|_|___|_ ___________ ___________
|
||
| _ | _ | |-| | ___/_ | | _ \_ __/_|_ _ | \_
|
||
D a m a g e , I N C .| | | | | | | |___ | | | | | \_ _/ | | |__/
|
||
| | | ___| | | | | | |--| ___| | | ___| |
|
||
N e w s l e t t e r |__|__|___\ |_______|_____|_____|___\ |__|__|___\ |__|
|
||
|
||
Volume 2, Issue #19
|
||
(Released: 01/01/01)
|
||
|
||
"Propagandize."
|
||
|
||
http://surf.to/damage_inc
|
||
damage_inc@disinfo.net
|
||
|
||
===============================================================================
|
||
C O N T E N T S :
|
||
|
||
> INTRODUCTION - An Introduction to the Damage, INC. Newsletter.
|
||
|
||
> ADVISORIES - Rolling the dice: Hacker tracking and you.
|
||
% Search String: {ADVISORIES}
|
||
|
||
> BIG BROTHER BASHING - FBI's Carnivore devours online privacy.
|
||
% Search String: {BIG BROTHER}
|
||
|
||
> CONSPIRACIES AND COVERUPS - N/A in this issue. Shout "conspiracy!"
|
||
% Search String: {COVERUPS}
|
||
|
||
> CORRUPTION AND GREED - Politics As Usual.
|
||
% Search String: {GREED}
|
||
|
||
> CROSSED WIRES - cDc Global Domination Update PR for your viewing pleasure.
|
||
% Search String: {WIRES}
|
||
|
||
> DAMAGE, INC. REVIEWS - Snapshot of things we currently follow/read.
|
||
% Search String: {REVIEWS}
|
||
|
||
> DRUGSTORE COWBOYS - Got drug propaganda? Trip on this.
|
||
% Search String: {DRUGS}
|
||
|
||
> H/P INF0 - Bringin' back the old sk00l and hittin' hard with it.
|
||
% Search String: {H/P}
|
||
|
||
> INTERVIEWS & INTERROGATIONS - An interview with Grandmaster Ratte' (cDc)
|
||
% Search String: {INTERVIEWS}
|
||
|
||
> NEWS FROM THE TRENCHES - Damage, INC. updates, news dispatches and more.
|
||
% Search String: {NEWS}
|
||
|
||
> OBJECTIVE OPINIONS - Hacker Culture, The Propaganda Machine Rolls On, etc.
|
||
% Search String: {OPINIONS}
|
||
|
||
> REPORTS FROM THE FRONT - Propaganda reports delivered directly to your screen.
|
||
% Search String: {REPORTS}
|
||
|
||
> THOUGHTS, POEMS AND CREATIVE WRITING - Crazy, entropic rants & writings.
|
||
% Search String: {WRITING}
|
||
|
||
> CLOSING COMMENTS - Final propagandistic material for this issue.
|
||
% Search String: {CLOSING}
|
||
|
||
===============================================================================
|
||
|
||
|
||
< DISCLAIMER >
|
||
|
||
All articles contained in the Damage, INC. Newsletter are for informational
|
||
purposes only. Damage, INC. is not responsible for how any of the information
|
||
presented is used. It is not intended to be a manual with instructions to be
|
||
followed. We won't be held responsible for any damages caused, illegal and
|
||
fraudulent acts committed, etc. by our readers. If/how you use the information
|
||
included herein is entirely up to you.
|
||
|
||
|
||
< COPYRIGHT NOTICE >
|
||
|
||
All articles and source code contained within this file are (C) Copyright by
|
||
Damage, INC. (unless stated otherwise). No part of this work can be modified,
|
||
reproduced or changed in any way without the expressed written consent of
|
||
Damage, INC. That means, electronically or otherwise, in part or in whole
|
||
this file must not be altered. It cannot be distributed and sold for profit.
|
||
You cannot claim that you wrote it, or alter any articles and source code that
|
||
has been written and Copyrighted by us. Also, you must *not* distribute any
|
||
Damage, INC. releases in "packages" with other text files or utilities. They
|
||
must only be distributed alone in their present, original form. You are hereby
|
||
permitted to read and distribute the Damage, INC. Newsletter freely to quality
|
||
h/p boards and sites only.
|
||
|
||
Copyright 2001 by Damage, INC.
|
||
All Rights Reserved.
|
||
===============================================================================
|
||
|
||
|
||
INTRODUCTION:
|
||
|
||
This is the dawn of a whole new era. Imagine a universe converging on another
|
||
universe and witnessing that as we travel around the sun at over 66,000 mph
|
||
on our tiny blue planet. Picture technology merging flawlessly with hacking,
|
||
hacker culture, and expressed in words. Technology is information. Think of
|
||
that. Think about the possibilities and conveniences that technology affords
|
||
you for a minute. Think about what living without any advanced technology at
|
||
your disposal would be like. Would you be able to adapt? Would you survive?
|
||
Would you be more, or less happy than you are right at this very moment? Flash
|
||
freeze that image in your mind. Then fast forward to the future. Think of what
|
||
technology *might* be like a decade or more from now... With such very rapid
|
||
advancements, you may not even be able to do that. You may not be able to
|
||
predict or theorize about it. It might be beyond what you can currently
|
||
imagine. Still, use your imagination. What types of problems will arise due
|
||
to new technology being used, misused and abused? What potential hazards
|
||
could there be because of it? How could technology be used against you? And
|
||
how could it be used for your benefit, to your own advantage? These are some
|
||
of the questions you should ask yourself. These are some of the things that
|
||
you should think about and consider from time to time.
|
||
|
||
As for hackers and technology, how will the culture evolve? What will the
|
||
h/p scene be like decades from now? How will hacking change? How will security
|
||
change and evolve? How will privacy issues change? How will the government use
|
||
technology in the future? How will private companies use it? What will they do
|
||
with the information they've gathered? And how will all of it affect you?
|
||
|
||
Obviously these are only rhetorical questions. They are huge, and well beyond
|
||
the scope of this zine. Nevertheless, they should still be asked and thought
|
||
about. Ignoring them only serves to bury your head in the sand and pretend
|
||
that technology isn't changing the world. The fact still remains that it is,
|
||
and it will continue to do so. It's better to be aware and somewhat prepared,
|
||
than to simply walk in blind and ignorant.
|
||
|
||
The same goes for security. Complacency and a false sense of security are the
|
||
main ingredients in a recipe for disaster. If you think your security is
|
||
infallible, without even testing it, monitoring it, updating it and shoring it
|
||
up with patches against new exploits that are known, you'll be done in
|
||
eventually. It's only a matter of time.
|
||
|
||
When the planets collide... think of the sound they'll emit. Think of the
|
||
tremendous energy they'll disperse. Think of what will be destroyed and what
|
||
will be created in the process. The same goes for technology. The same rules
|
||
apply as when planets collide. In this new Millennium, technology is being
|
||
created, advanced and moving at the speed of light. It's like no other time
|
||
in history. But it isn't all good. Monumental problems and issues of privacy
|
||
are arising by the millisecond. People need to be consciously aware of how
|
||
technology is affecting them in their daily lives. They need to know what's
|
||
happening behind their screen, behind the scenes. As in, who's keeping track
|
||
of their activities, who has their information, how many databases are they
|
||
in, and how easily can their personal profiles be assembled, bought, sold,
|
||
obtained through deceptive and illegal means, etc. These issues are complex
|
||
and must be examined on an ongoing basis. Technology can be a great benefit.
|
||
But it can also be a huge threat and a powerful weapon in the control of large
|
||
corporations, government and other agencies. Big Brother isn't just a mythical
|
||
entity. It's here. It lives. It breathes. It exists. Don't choose to ignore
|
||
it. Don't just turn a blind eye. Don't be influenced and brainwashed.
|
||
|
||
Propagandize don't criticize. Choose dictators from history to diefy and
|
||
lionize. Fire up the propaganda machine, recruit and mobilize. Once the spin
|
||
starts rolling, and you have them where you want them, labotamize. Take their
|
||
minds and brutalize. Influence and brainwash until they respect and see you as
|
||
wise. Change their ethics and beliefs and cut them all down to size. Make the
|
||
masses into zombies slaves under the banner of America, and Americanize.
|
||
Exploit them to death and capitalize. Then use all of that to your advantage
|
||
so you can commercialize further and profitize! Go on now, propagandize.
|
||
|
||
Enough ranting. Let the mind games and propaganda begin. Come with it now...
|
||
|
||
|
||
ADVISORIES - {ADVISORIES}
|
||
Rolling the dice: Hacker tracking and you.
|
||
|
||
You feelin' lucky punk? Okay, so you aren't all little know nothing script
|
||
kiddies armed with port scanners, exploits, filled with malcontent, rage and
|
||
a desire to go out and get your kicks breaking into systems without forethought.
|
||
However, I'm positive that at least *some* of you are. And this article was
|
||
written with you in mind. The intention of it was to prevent you from doing
|
||
something stupid, without first considering the consequences. You can consider
|
||
this to be a warning of sorts, or a "STOP... THINK FIRST BEFORE PROCEEDING"
|
||
primer. At any rate, it isn't a technical advisory. You won't find k00l new
|
||
scripts and exploits in here to use. What you will find however, is an article
|
||
explaining ways to avoid being traced. Along with that, there's some commentary
|
||
on what's going on in the scene, with hackers (or "former" hackers) being hired
|
||
to track other hackers that've accessed sensitive systems and data. Take it
|
||
for what it is. The majority of it is just common sense. But I felt that
|
||
Damage, INC. might as well put it out there, for clueless kids that are fucking
|
||
around with shit they don't know about, and getting caught. Yes, that's still
|
||
happening on a great scale. So, if you fit into that category and don't want
|
||
to get busted needlessly for something, when it could've been avoided, read on.
|
||
|
||
The importance of logs:
|
||
|
||
Regardless of the system you're exploring, no matter what OS it's running, or
|
||
how you got in, or the level of access you've managed to acquire on it, the
|
||
log files are still extremely important. It's actually sickening to read about
|
||
a kid being busted, or see an interview of them, and they say "I wasn't careful
|
||
at all. I didn't think to edit/remove the log files. I used no stealth. I
|
||
didn't have to get traced and caught. I could've avoided it." or something
|
||
along those lines. If they had the knowledge and ability to avoid it, why the
|
||
fuck did they leave the logs untouched? Did they simply forget, and leave them
|
||
there, unmodified, in their haste? That's more than a serious error. That is
|
||
inexcusable.
|
||
|
||
The moral is kids, IP scanners and port scanner, and r00t kits... and all of
|
||
your thousands of exploits you've collected... mean literally shit if you get
|
||
in and forget to do anything with the log files. Ya dig?
|
||
|
||
Location:
|
||
|
||
It's the same in hacking as with real estate. Location, location, location.
|
||
Say that a few times. Scream it aloud. Hypothetically, why break into say...
|
||
a NASA server, or a .mil system from home using your desktop system and
|
||
dialup/cable/DSL connection? Why? Why launch anything from your box that's
|
||
sitting in your own home? Once again, why? And for that matter, why use your
|
||
own account, with your IP address (not through any proxy servers, totally
|
||
unspoofed)? Why?
|
||
|
||
All too often the media gets a nice juicy story about how a "kid hacker" was
|
||
caught breaking into a high profile system, downloading data from it, or
|
||
launching a DDoS attack... or spreading a virus... or whatever... and they
|
||
did it from home, using their own dialup Internet account and their phone line.
|
||
Are they just begging to be traced? You don't have to hire a fucking expert
|
||
to track you down if you're gonna be that inept, incompetent and stupid.
|
||
|
||
Instead of pulling shit like a punk, why not grab a laptop, go to a payphone
|
||
with a jack, or hookup to a junction box or something... have other accounts
|
||
with you to use, and still take all the necessary precautions (so that it's
|
||
difficult to trace the connection back to your area code, let alone you and
|
||
your address/phone line) You've heard of field phreaking, right? Well, when
|
||
it comes to high profile systems, *don't* fuck with them from home. Get your
|
||
little field hacking kit together... and go.
|
||
|
||
Stealth:
|
||
|
||
In simple terms, the objective of stealth, is to make yourself as anonymous
|
||
and transparent as possible. You've heard of stealth firewalls right?
|
||
Essentially, it makes ports invisible... so it's like they don't exist or
|
||
your system isn't online or powered on.
|
||
|
||
Stealth encompasses so many things. It extends from your name, location;
|
||
meaning an address, phone number, and any other identifiable things, to your
|
||
connection... along with all that goes with it. Simply put, your system itself
|
||
can betray you, and give away valuable packets of information which can be
|
||
used against you. Covering these traces of info, or eliminating them entirely
|
||
wherever possible, helps your goal of preventing being tracked. This is what
|
||
stealth is all about. There are many ways of accomplishing this goal, but,
|
||
it is beyond the scope of this short article. Maybe I'll explain a few ways
|
||
in a future article.
|
||
|
||
Stealth also includes things such as not making your actions known by means
|
||
of telling others about them. And, anything that can be considered or construed
|
||
as evidence against you, should be well hidden elsewhere at another location
|
||
or destroyed if not needed. Trophies can get you jail time. So, safely secure
|
||
your incriminating data.
|
||
|
||
Closing:
|
||
|
||
Yes, it's a rush. You can get a thrill out of being somewhere you're "not
|
||
supposed to be". Unauthorized areas of anything (not just systems) can be fun
|
||
to explore. And, it's understandable that a lot of kids get their kicks from
|
||
doing it. However, think of the consequences. Don't let it come as a surprise
|
||
that they exist. Playing dumb won't work. Excuses won't work. You can't
|
||
social engineer the feds out of serving an arrest warrant. You can't social
|
||
engineer judges in court. Trust me, it doesn't work that way kids.
|
||
|
||
In conclusion, it's up to you what you do, what precautions and chances you
|
||
take. If you want to roll the dice, and end up having to go through a bust
|
||
situation with criminal charges laid on ya by the feds, by all means, ignore
|
||
all of this. And ignore anything else that you've ever read about how to
|
||
avoid being traced. Don't even consider trying to make yourself as stealthy
|
||
and anonymous as possible. If you want to play Russian roulette with a loaded
|
||
pistol (not revolver), start pulling the trigger kid. If you want to have a
|
||
Mexican standoff with the feds... be my guest. It won't make you any cooler.
|
||
Won't give you a big rep. You'll get your 15 mins of fame out of it, sure.
|
||
After that though, you're still in jail and relatively unknown and forgotten.
|
||
And you have a record for life. If you have no real skills, you're fucked when
|
||
you get released. Is it worth it? If you fuck up, that's what it's like.
|
||
Think about it. Prepare. Be aware. Be stealthy, logical, methodical. Plan
|
||
things well ahead of time. If you're setting things up, double check it. Test
|
||
it on systems of far less importance. Consult someone you trust and seek
|
||
advice. Think about what might go wrong ahead of time, instead of after the
|
||
fact. You don't want to be sitting in a cell, serving time, saying "Damn, I
|
||
wish I would've done this... or hadn't forgotten to do that..."
|
||
|
||
As if it isn't obvious already, this is serious now. You may think exploring
|
||
someone's system, reading and downloading data files isn't illegal. You may
|
||
decide to be lax in your measures due to that thinking. Well, that logic isn't
|
||
just flawed, it's totally fucked. In case you haven't realized it yet, if
|
||
you play around on any sensitive systems, they will try to pursue you no matter
|
||
what. You can break into U.S. systems from England, and they'll try and track
|
||
you and hunt you down. Yes, that's a fact. You don't have to use or sell any
|
||
of the information you take either. Hell, you don't have to take a single
|
||
1 byte file. Once inside, it doesn't matter what you do. If you leave a trace,
|
||
that's grounds for them to go after you. Think first, then act if you think
|
||
the benefits outweigh the risk.
|
||
|
||
Written by THC Phreak / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
BIG BROTHER BASHING - {BIG BROTHER}
|
||
FBI's Carnivore devours online privacy.
|
||
|
||
In its heavy-handed efforts to wage war against crime, the FBI has unleashed
|
||
another privacy killing weapon upon "thought criminals" that "threaten" the
|
||
United States of America. Despite an extensive arsenal of electronic
|
||
surveillance systems and techniques, the FBI deemed it necessary to create
|
||
the software program known as "Carnivore." The official purpose of Carnivore is
|
||
so the FBI can conduct electronic surveillance of email and Internet
|
||
communications at an Internet service provider (ISP) facilities in order to
|
||
fulfill "legal court orders." In other words, Carnivore is the FBI's primary
|
||
Internet wiretap.
|
||
|
||
The FBI stated that Carnivore is needed in order to "provide jurors an
|
||
opportunity to determine factual issues based upon a defendant's own words."
|
||
Who are examples of suspects that the FBI would use Carnivore to eavesdrop on?
|
||
FBI Assistant Director Donald M. Kerr answered that question at a House
|
||
Judiciary subcommittee on the Constitution: "Criminals use computers to send
|
||
child pornography to each other using anonymous, encrypted communications."
|
||
"Hackers break into financial service companies' systems and steal customers'
|
||
home addresses and credit-card numbers, criminals use the Internet's inexpensive
|
||
and easy communications to commit large-scale fraud on victims all over the
|
||
world, and terrorist bombers plan their strikes using the Internet." It makes
|
||
me sick to see that the FBI Assistant Director places hackers akin to the
|
||
perverts, fraudsters and terrorists that he mentions. However, it isn't
|
||
surprising to get that kind of fucked up rhetoric from the Thought Police. The
|
||
FBI violates the privacy of innocent citizens far more brutally than hackers
|
||
could ever desire to.
|
||
|
||
The FBI has been very cautious not to reveal many details about how Carnivore
|
||
works. Briefs regarding Carnivore that have been sent to the Department of
|
||
Justice and the White House staff have been classified. The FBI is concerned
|
||
that publicly revealing certain weaknesses or other technical information may
|
||
allow hackers to defeat Carnivore. What they did reveal on their web site
|
||
is a very basic description of how they claim Carnivore works, which I have
|
||
imported below:
|
||
|
||
"The FBI connects a commercially available one-way tapping device at the
|
||
ISP's access point. This tap produces an exact copy of all data at the access
|
||
point. The tap also provides electrical isolation to prevent Carnivore from
|
||
having any kind of impact on the ISP's network. The copied network traffic
|
||
then flows into the collection system where it is compared against a predefined
|
||
filter. This filter only passes traffic authorized for capture by the court
|
||
order. Traffic that passes through the filter continues on to be archived to
|
||
permanent storage media. No other data is ever stored to permanent media, nor
|
||
is any information recorded about traffic that does not match the filters. All
|
||
information collected is maintained and, in the case of full content
|
||
interceptions, is sealed under the order of the court. This information, as
|
||
well as information obtained pursuant to pen register and trap & trace
|
||
authorities may subsequently be made available by the court to the defendant."
|
||
|
||
"[Carnivore] provides the FBI with a unique ability to distinguish between
|
||
communications which may be lawfully intercepted and those which may not.
|
||
For example, if a court order provides for the lawful interception of one type
|
||
of communication (e.g., e-mail), but excludes all other communications (e.g.,
|
||
online shopping) the Carnivore tool can be configured to intercept only those
|
||
e-mails being transmitted either to or from the named subject. Carnivore
|
||
serves to limit the messages viewable by human eyes to those which are strictly
|
||
included within the court order."
|
||
|
||
If the FBI told the truth above, they would have us believe that Carnivore is a
|
||
sophisticated filtering program that agents would use to view Internet traffic
|
||
that only pertains to the court order in their possession. If this isn't
|
||
disinformation, I still have a definite problem with the fact that all ISP
|
||
traffic is at the fingertips of the Thought Police. In the past, there have
|
||
been confirmed reports of wiretap abuses by the FBI. However, instead of
|
||
performing wiretaps in violation of the 4th Amendment on a small number of phone
|
||
lines per search warrant, the FBI agents would have access to all of the traffic
|
||
on an ISP. In my opinion, it would be the equivalent of allowing the FBI to
|
||
have instant and convenient access to every single conversation on several huge
|
||
trunks. Then a filter in the earpiece and the agent would be told, "OK, you
|
||
have the ability to listen to any conversation on a trunk full of phone lines,
|
||
but you have to use this earpiece filter to only listen in on the little line
|
||
that pertains to your court order." However, it is also possible that the FBI
|
||
is overstating the abilities of Carnivore. It is uncertain if the FBI has the
|
||
ability to write something that could capture and scan so much data without
|
||
bogging down an ISP.
|
||
|
||
Regardless of Carnivore's true nature, it all comes down to trusting the FBI,
|
||
and the agent using Carnivore. It is the corrupt FBI agent that would violate
|
||
the privacy rights of an innocent person. There have been enough reported
|
||
privacy abuses, that the FBI should not be blindly trusted with such tools.
|
||
After researching the FBI's long track record of civil privacy rights abuses, I
|
||
firmly believe that they should not have tools such Carnivore available to them.
|
||
Big Brother and the Thought Police cannot be trusted.
|
||
|
||
ISP owners also have concerns with being forced to allow the installation of
|
||
equipment and software onto their systems without knowing the full nature of how
|
||
it works, or what it is doing to their system (performance and security
|
||
concerns). Some want the FBI to publish information on the software used so
|
||
that ISPs can be sure that it does what the agency says.
|
||
|
||
Also, several civil rights groups, including the ACLU (American Civil Liberties
|
||
Union), have expressed grave concerns about Carnivore. Most of their concerns
|
||
relate to the fact that the FBI is unwilling to give any substantial detail as
|
||
to exactly how Carnivore operates. In fact, the ACLU has requested that the
|
||
FBI surrender Carnivore's source code so that it can be analyzed. FBI has
|
||
flatly refused to honour the requests of any of the civil liberties groups.
|
||
|
||
The FBI may be able to ignore organizations like the ACLU, but they were
|
||
surprised by the concerns of some U.S. Congressmen. "The potential for abuse
|
||
here is tremendous," said Rep. Spencer Bachus (R-Ala.). "What you're [The
|
||
FBI's] saying is 'Trust us.'" The toughest questioning came from Reps. Jerrold
|
||
Nadler (D-N.Y.) and Robert L. Barr Jr. (R-Ga.). Nadler peppered the officials
|
||
with a series of questions that underscored the point that Carnivore, under the
|
||
laws that govern pen-register surveillance, could be used without the difficult
|
||
showing of "probable cause" required in a telephone wiretap. After the hearing,
|
||
House Majority Leader Richard K. Armey issued a statement saying members of both
|
||
parties showed "strong concerns that the administration is infringing on
|
||
Americans' basic constitutional protection against unwarranted search and
|
||
seizure. "We should be sensitive to any potential for abuse," said Florida
|
||
Representative Charles Canady, the panel's chairman. "Even a system designed
|
||
with the best of intentions to legally carry out essential law enforcement
|
||
functions may be a cause for concern if its use is not properly monitored."
|
||
|
||
The stunned FBI replied that their agents have too much integrity, and would
|
||
risk their careers if they used Carnivore outside the scope of their search
|
||
warrant. In fact, most of the information regarding Carnivore on the FBI's web
|
||
site is dedicated to defending the "integrity" of their tarnished law
|
||
enforcement organization. I'll let you read their weak reasons why Carnivore
|
||
doesn't threaten innocent Internet users' right to privacy:
|
||
|
||
"The use of the Carnivore system by the FBI is subject to intense oversight
|
||
from internal FBI controls, the U. S. Department of Justice (both at a
|
||
Headquarters level and at a U.S. Attorney's Office level), and by the Court.
|
||
There are significant penalties for misuse of the tool, including exclusion of
|
||
evidence, as well as criminal and civil penalties. The system is not
|
||
susceptible to abuse because it requires expertise to install and operate, and
|
||
such operations are conducted, as required in the court orders, with close
|
||
cooperation with the ISPs. The FBI is sharing information regarding Carnivore
|
||
with industry at this time to assist them in their efforts to develop open
|
||
standards for complying with wiretap requirements. The FBI did at the request
|
||
of the Communications Assistance for Law Enforcement Act (CALEA) Implementation
|
||
Section, at an industry standards meeting (the Joint Experts Meeting) which was
|
||
set up in response to an FCC suggestion to develop standards for Internet
|
||
interception."
|
||
|
||
The FBI's infamous arrogance is very apparent. Their agents, which have gotten
|
||
off free, or with mild slaps on the wrist for prior wiretap abuses, will be kept
|
||
in line by the idle threat of losing evidence, or jail time. Meanwhile, they
|
||
also say that Carnivore is too complicated for anyone outside of the FBI to
|
||
comprehend and operate. All that tells me is the only thing protecting innocent
|
||
users' privacy is internal investigations (meanwhile the FBI has not mentioned
|
||
if Carnivore logs or does and audit of the agent's actions) and their assumption
|
||
that people outside the FBI are too ignorant and stupid to use their system for
|
||
their own purposes. Again, the message of "trust us, we won't abuse your
|
||
privacy even though we need the ability to do it" is the only safeguard the
|
||
FBI deems necessary.
|
||
|
||
Despite all of the criticism and concerns from prominent groups and politicians,
|
||
as well as individual citizens, Carnivore still continues to function the same
|
||
way since its inception. The only changes proposed are cosmetic changes to
|
||
Carnivore's interface. The FBI is making sure that "accidental" abuses of
|
||
privacy due to user input errors are eliminated by adding a few more caution
|
||
screens. While this may make Congress feel more at ease, all it does is adds
|
||
a few mouse clicks for the privacy abusing agent. The fact that no external
|
||
auditing of the FBI's actions was not mentioned in any of the press releases
|
||
and panel transcripts that I had access to troubles me. This is absolutely
|
||
wrong. No one is watching the Thought Police, but the Thought Police
|
||
themselves. Again, I must say that the FBI, or any other government
|
||
bureaucracy, cannot be trusted. They are incapable of policing themselves.
|
||
Why? They'll be too busy watching what individuals are doing on the Internet to
|
||
worry about policing privacy abuses by FBI agents using tools such as Carnivore.
|
||
|
||
Written by Shatazar / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
RIP personal privacy of UK Internet users?
|
||
|
||
"Government is too secretive. Too many decisions are taken behind closed doors
|
||
without proper consultation with the public. Government then rushes new laws
|
||
through Parliament and bad legislation is passed. People want to be better
|
||
informed about what government is up to, and be consulted more." --- Jack Straw
|
||
Home Secretary to Her Majesties Government.
|
||
|
||
First impressions to many of the h/p scene is that it is childish and damaging
|
||
and there it ends for many who choose to remain ignorant. The second impression
|
||
for those who are more open minded is that for some it is a means of attaining
|
||
knowledge that has been purposely hidden from sight of the public. Even
|
||
government officials admit they are too secretive in their decision making.
|
||
|
||
So what if the government wanted to play at h/p, what if they wanted to know
|
||
what was happening on the Internet within the UK or your home nation? And more
|
||
importantly what the hell am I talking about? The Regulation Of Investigatory
|
||
Powers (RIP) Bill and it's publicly reported purpose to combat the increasing
|
||
problem of crimes committed online, mainly child pornography, fraud, terrorism
|
||
and drug trafficking.
|
||
|
||
The government already has powers to eavesdrop telephonic communications via
|
||
listening stations such as Government Communications Headquarters
|
||
(http://www.gchq.org.uk) and the NSA's Menwith Hill (http://www.menwithhill.com)
|
||
Time to learn a new acronym GTAC or Government Technical Assistance Centre.
|
||
Remember Jack Straw that I quoted earlier? He's the guy who issues the warrants
|
||
to security agencies to intercept telephone and postal communications and will
|
||
be doing the same for GTAC and online traffic. The RIP Bill that will allow this
|
||
to happen was secretively being rushed into legislation behind closed doors to
|
||
meet a 1st October 2000 deadline. It was passed in July and will be implemented
|
||
on 5th October.
|
||
|
||
As new legislation the RIP Bill will be costly both to personal privacy and
|
||
economics. It was economic cost that saved personal privacy from surveillance
|
||
legislation for the Internet before when the Electronic Commerce bill contained
|
||
similar proposals (was altered and passed as law June 2000). Who was it that
|
||
saved us at the last minute? Big business is who. As we all know multinational
|
||
corporate entities don't like all their activities to be monitored too closely.
|
||
Don't relay on them to bail us out again, do something. The cost of the
|
||
proposed RIP Bill runs into millions of private and public money. The GTEC
|
||
extension to MI5 (http://www.mi5.gov.uk) set up by the National Criminal
|
||
Intelligence Service (NCIS) will cost <20>25 million in tax payers money (unless
|
||
MI5 decides to run a CIA style fundraiser, and we ain't talking yard sales or
|
||
girl guide cookies). ISP's are expected to cough up between <20>44,700 to <20>113,300
|
||
in cost for the first year and <20>19,000 thereafter, which will get passed on to
|
||
their subscribers. This cost to ISP's is for the interception capabilities to
|
||
be integrated into their system that they will be required by the RIP Bill to
|
||
install. With 400+ ISP's in the UK that totals between <20>17.88 million and
|
||
<EFBFBD>45.32 million.
|
||
|
||
Charles Clarke MP, who is responsible for pushing the RIP Bill through the House
|
||
of Commons, has been noted to say that he "...wants to make the UK the best
|
||
place in the world to do electronic business". Strange thing to say considering
|
||
the bill he is responsible for is making UK ISP's and e-commerce business'
|
||
consider migrating their operations to neighboring countries like France and
|
||
the Irish Republic who are a little more friendlier. Among these are Poptel,
|
||
UUnet, Claranet and GreenNet.
|
||
|
||
The RIP Bill requires a warrant to read online traffic, but communications data
|
||
will not require a warrant. Communications data include things like your e-mail
|
||
address book and website logs. So any public authorities from Department of
|
||
Social Security and Health Service to local authorities and so on can have
|
||
access to see who you e-mail and what material you browse.
|
||
|
||
Part 3 of the RIP Bill gets a little more interesting and concerns the
|
||
disclosure of decryption keys. This requires the police to obtain a warrant
|
||
from a judge. The police can request a warrant on the grounds of "for the
|
||
purpose of preventing or detecting serious crime". I'll just run that by you
|
||
again in slow motion "for the purpose of...detecting serious crime", not if
|
||
there is a serious crime, no need for crime at all just detecting serious crime
|
||
is enough. The bill doesn't stop there and neither am I. As we read further
|
||
into the RIP Bill failure to comply to the warrant is a maximum of two years
|
||
imprisonment. Don't bother telling anyone you've been served with a warrant
|
||
because that will earn you an extra three years. Failure to produce decryption
|
||
keys also means you are presumed guilty until you prove yourself to not be in
|
||
possession of the means to obtain the decryption keys. An interesting twist to
|
||
the law to be guilty until proved innocent. Did I mention that the government
|
||
could hold onto the decryption keys as long as it likes once it has obtained
|
||
them? Well it can under this new bill. A personal thought what of online
|
||
traffic that somebody in New York retrieves from a server in Paris? Will that be
|
||
monitored and logged if it passes through the UK? If it doesn't fall into the
|
||
bounds of the RIP bill and GCHQ ignores it I am confident that Menwith Hill may
|
||
keep an eye on it.
|
||
|
||
A bill similar to the RIP bill has already been passed as law in the
|
||
Netherlands. Here is why it exists according to Jason Thomas of PC Plus
|
||
magazine. "[Proposals] in the RIP Bill first appeared in the Electronic
|
||
Communications Bill. They resulted from last year's European Parliament
|
||
resolution calling for interception at ISP level. This in turn came from a
|
||
resolution from the Lawful Interception of Communications council
|
||
(Enfopol)...looking even further back the Enfopol documents were inspired by a
|
||
series of secret meetings between various international law enforcement
|
||
agencies. They were called the International Law Enforcement Telecommunications
|
||
Seminars (ILETS) and met without parliamentary knowledge or government
|
||
supervision. The United States Federal Bureau of Investigations was the
|
||
initiating body, and the measures ELTIS [I think that should read ILETS] agreed
|
||
became the basis of Enfopol documents, which ultimately have dictated UK
|
||
government policy. So it seems a group of unaccountable individuals from
|
||
various security services have dictated European and UK policy."
|
||
|
||
What effect does this have on those it is intended to imprison? If you're a
|
||
terrorist or the accountant for a drug cartel conveniently loosing the
|
||
decryption key offers a shorter prison sentence than your real crimes. The bill
|
||
is not going to work effectively against the serious criminals it is supposed to
|
||
protect the unknowing public from, a public that is suspicious of the
|
||
governments intentions. The bill is flawed and can be worked around. The bill
|
||
does not have power over direct modem to modem connections but this would
|
||
probably be under the jurisdiction of GCHQ. For a $10,000 set-up fee and $1,500
|
||
a month you can have your web services run from a platform a few miles off the
|
||
Felixstowe coast (http://www.sealandgov.com and http://www.havenco.com). The
|
||
Inland Revenue and Customs and Excise insist that these platforms still come
|
||
under UK law. It is uncertain if the bill applies to information stored in
|
||
other countries but as Casper Bowden (Director of Foundation for Information
|
||
Policy Research) said, "By analogy, you are no longer talking about whether
|
||
someone has the key to a safe, the question is whether they even have a safe."
|
||
By using a free archiving service like xdrive (http://www.xdrive.com) or
|
||
Netstore (http://www.netstore.com) from public Internet access points in
|
||
combination with steganography. For those who are unsure steganography is the
|
||
concealment of information within images and sound files by using unused bits
|
||
and inaudible frequencies. The RIP bill will insist you reveal the
|
||
steganographicly hidden data but they got to know it exists first. This offers
|
||
some protection; the hidden data has to be known to exist, so keep an eye on the
|
||
information your browser leaves behind, as a warrant is not need to seize it.
|
||
Some now believe that by forcing criminals to find workarounds it is encouraging
|
||
them to use the Internet as a world wide safety deposit box.
|
||
|
||
Things to do if you disagree with the RIP bill, one mail your MP, chances are
|
||
your MP is not fully aware of what the RIP Bill means. And don't be insulting or
|
||
patronizing this will not help. Not many people have faith in their MP so go to
|
||
step two. It is believed that GCHQ and Menwith Hill already go out of their way
|
||
to intercept PGP signed and/or encrypted e-mails, so send as many as you can,
|
||
I'm sure they would love the over time. I am sure there is more that can be
|
||
done, be creative in your protest not destructive.
|
||
|
||
The Internet is not a birthright and no matter how many people take it and it's
|
||
freedoms for granted it is a privilege and one worth protecting. In the main
|
||
the Internet is self-regulating and self-repairing and will remain so if users
|
||
are trusted to take responsibility for their own data and connections. The
|
||
Internet is a vast entity, Damage Inc. only takes responsibility of this part,
|
||
cross it's and others borders of your own free will.
|
||
|
||
All information is believed to be correct at the time of writing but for up to
|
||
date information visit http://www.stand.org.uk
|
||
|
||
Written by Alfie Ilkins.
|
||
|
||
|
||
The HRDC Big Brother Database Secrets Revealed.
|
||
|
||
Look for an article on Human Resources Development Canada... and the ongoing
|
||
saga that is our relationship, with infrequent correspondence by mail and
|
||
bureaucracy from hell... in the next issue (hopefully). However, I can't
|
||
guarantee anything as the Canadian government's response time is so utterly
|
||
slow, it's deplorable. But, at this juncture, it's *their* turn to wait for
|
||
my reply to the latest offering in govspeak that they've sent by mail. So,
|
||
in a sense, they're anxiously awaiting my response to their last letter... and
|
||
I can imagine a bureaucrat sitting there impatiently, eager to receive word
|
||
from this dissident in arms. Rest assured, the article will contain some
|
||
*hilarious* quotes from government officials. Things so damn funny, we couldn't
|
||
have produced and fabricated something of equal humour. If you want to meet
|
||
some truly amusing people, hang around government buildings, be social and
|
||
strike up conversations with low level zombies employed as gophers and paper
|
||
pushers... They'll feed you more material than you can ever imagine.
|
||
|
||
To hold you until the article arrives, I'll give you one direct quote...
|
||
"Human Resources Development Canada Longitudinal *WHAAAAAAT*???" - the response
|
||
given to me when I made a formal request to see a copy of my file, while
|
||
standing face to face with a government worker at the local HRDC office. That's
|
||
right, she didn't have a clue what I was requesting, even though the faction of
|
||
government she is employed by was responsible for creating and maintaining that
|
||
specific database and files on every Canadian citizen. Either she feigned
|
||
ignorance extremely well, or she simply was that ignorant.
|
||
|
||
|
||
CORRUPTION AND GREED - {GREED}
|
||
Politics As Usual.
|
||
|
||
Bush and Dick. Bore and Lieberman. What about Bob (Dole)? Where's Ralph?
|
||
Hey, there's a Pat (Buchanan) too! And for the love of phreaks, will someone
|
||
please call Ross Perot and ask for his endorsement? That pint sized, midget
|
||
mouthpiece that always pretends he can't get a word in edgewise is alright in
|
||
my book. "Larry, can I talk? Can I say somethin' now?" - Perot on CNN's Larry
|
||
King show. Hell, at least Perot has the statistics to prove *anything*. :)
|
||
|
||
Whatever happened to Donald Trump? Or, how about Steve Forbes? I say they
|
||
should bring those bastards back into the running. Bring em back into the
|
||
mix. And anyone else with money to burn that wants a piece of the action!
|
||
|
||
Plus, America *needs* preacher Gore. You know, the flamboyant, over the top,
|
||
in your face Gore. The one that rants on stage like an old sk00l style Baptist
|
||
preacher straight outta the early 1920s. The one with hair flying wildly in
|
||
the wind, shirt buttons undone and tie loosened so it can flip flop around.
|
||
The one with charisma and energy. The one that stands defiantly on stage and
|
||
angrily screams "I'll fight for you!" at onlookers that've been carefully
|
||
selected out of his most ardent supporters. That Gore. You know who I mean
|
||
now? Preacher Gore! Ah yes, the many faces of Gore... But that's my personal
|
||
favorite of all his personae, by far.
|
||
|
||
Seriously folks, how many of you voted? How many of you thought it would make
|
||
any difference? How many voted for Ralph Nader? How many thought the election
|
||
results would be so close, and the Presidential race relying on recounted votes
|
||
in Florida? Did you hear the word "chad" (dimpled, pregnant, dented, hanging,
|
||
and fucked) used enough by the media? Did you enjoy the media's television
|
||
coverage on election night? Wasn't that something to behold. Predictions
|
||
abounded. Egg was on face, everywhere! Egg and cheese omelets for all. Crow
|
||
pie by the truckload. It was a virtual feast for the media and masses. More
|
||
than just watching the usual election coverage, it was time to chow down at
|
||
2am EST. Wasn't it great?
|
||
|
||
"We're calling Florida for Gore. No, it's too close to call... Wait, Bush is
|
||
now the unofficial President elect. Uhhhh... hold on folks. We have egg on
|
||
our face again. Mix up a few more omelets for our nice shiny suits. We're
|
||
gonna need it by nights end."
|
||
|
||
Watching the news anchors getting flustered and frustrated was just hilarious.
|
||
|
||
|
||
New Suit: $2,000
|
||
|
||
Imported Coffee: $500
|
||
|
||
Haircut: $150
|
||
|
||
Fucking up Presidential Election 2000: Priceless
|
||
|
||
Oh hell yeah. All apologies MasterCard. But, that's our attempt at parody.
|
||
As if all the comedy shows haven't already used your advertising campaign in
|
||
parodies to death already anyway. So get over it.
|
||
|
||
Politics as usual simply means a lack of real choices in political figures
|
||
(or figureheads), and the same old partisan, political bullshit. This isn't
|
||
about fairness. It isn't about "having every vote counted" as Gore repeated
|
||
for so long ad nausea until everyone was sick of hearing it. Granted, it was
|
||
very close in Florida. Still, let's face it, he just wanted to be the next
|
||
President. It was all about winning. And he was willing to use his spin
|
||
machine to try to get into the White House, no matter what it took. So, fuck
|
||
it.
|
||
|
||
Not that Bush and Dick are any better. Kids, with George W. Bush you have
|
||
reason to live by the words, "PHEAR THE BEAVER!"... because our leader is a
|
||
babbling idiot that can't string two words together to save his life. And he
|
||
knows nothing about foreign policy, as well as many other things. Having a
|
||
daddy that was President is more than a foot in the door, sort of speak. Having
|
||
a brother who's Governor of Florida doesn't hurt either. Affluence and
|
||
influence.
|
||
|
||
All I want to know is, who the hell voted for Ralph Nader? Stand up and be
|
||
counted! C'mon, some of you must have...
|
||
|
||
The whole process is fucked. The entire thing is nothing more than a fucking
|
||
joke. Most people are completely indifferent. They don't give a shit who is
|
||
their president, as long as they can make a few bills on the stock market and
|
||
buy the new SUV they've been eyeing. America is fucked. Americans are only
|
||
concerned with themselves and their own personal wealth.
|
||
|
||
A country divided? Obviously. What an astute observation that is, on the part
|
||
of the good ol' reliable mass media. Political commentary at its best, 24 hours
|
||
a day if you want it. I mean, out of 100 million people that voted, it was
|
||
about as close to a 50/50 split as you're ever gonna see. And so, it all came
|
||
down to people holding up ballots to the light to look for punched out chads,
|
||
and make decisions on how people voted. Well, it could've gone down to a coin
|
||
toss. No word of a lie. That was a distinct possibility! That's our "system"
|
||
at work...
|
||
|
||
Now what? It's over. Live with it. Take it. Be indifferent. Not that I
|
||
expect this article to actually change anything. The vast majority of Americans
|
||
are indifferent and complacent. Mobilizing the people that aren't is damn near
|
||
impossible. And there's a huge shortage of true leaders on top of it all.
|
||
Well, at least ones with charisma. No offense Ralph, but you don't cut it.
|
||
Putting your politics aside for the moment, you lack the qualities that a true
|
||
leader needs in order to inspire people and create a real, long lasting,
|
||
effective movement. Someone that with their mere words, can make the rich fat
|
||
cats do more than stand up and take notice, but rather, have unexpected bowel
|
||
movements, is what is needed. And that someone isn't Ralph Nader. As fun
|
||
loving and lovable as he is, and as much as he appeals to a certain group of
|
||
college kids, he isn't the man for the job. In politics, your ideas and your
|
||
heart being in the right place aren't nearly enough. You've gotta have much
|
||
more than that. You've gotta have style and flash and a way to wake people up
|
||
and get them all jacked up about the issues. So, with that being said, I wish
|
||
Nader and the Green Party all the luck in the world.
|
||
|
||
As I mentioned earlier, the system is corrupt. It's filled with greed and
|
||
deception. Politicians are bought and sold. Special interest groups pay for
|
||
the elections, for the most part, through political donations. Yes, reform is
|
||
needed. But, *real* reform, not more bureaucracy meant to fool the masses into
|
||
thinking everything has been changed and fixed. As it stands now, it's about
|
||
"stuff my pockets and i'll fill yours." Yes, that's immoral and unethical.
|
||
But that's reality. Obviously you aren't reading this to be shielded from the
|
||
truth and influenced by spin. So, we'll give it to you straight. Things aren't
|
||
going to change until the control is taken out of the hands of the special
|
||
interest groups and huge corporations and put into the hands of the people.
|
||
Yes, I'm stating the obvious. This won't be accomplished through the Republican
|
||
and Democrat parties. Voting for the "lesser of the two evils" won't help
|
||
matters at all. Being indifferent to it won't change it. Opposing it, but
|
||
being complacent won't either.
|
||
|
||
What's needed is a voice of change. This country needs a powerful voice to
|
||
speak on behalf of the people. Change is desperately needed, but it'll never
|
||
happen if we just leave it in the hands of our current "leaders", and assume
|
||
they'll get the job don't. They won't. They lack the necessary power to do
|
||
it. They lack the desire to get it done, at all costs. They aren't motivated
|
||
to take action, since they're all extremely wealthy. I can say with almost
|
||
absolute certainty that of those of you that voted, the people you voted for
|
||
are all much richer than you and I combined. So, without a real interest in
|
||
this, why would they work their asses off to change it? For the most part,
|
||
their only interests are getting richer, acquiring power and obtaining a level
|
||
of fame that many of us can't even imagine. That's their stake in it. So,
|
||
why the hell do people expect *them* to *change* things? It's illogical to do
|
||
so. Only a fool would make make a conclusion like that based on those
|
||
circumstances. They aren't going to shoot themselves in the foot for your sake,
|
||
for your benefit. They'll do what benefits them alone. And they'll continue
|
||
doing just that, until we collectively choose to stop them...
|
||
|
||
Written by Blackie Lawless / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
CROSSED WIRES - {WIRES}
|
||
Global Domination Update PR for cDc.
|
||
|
||
For your viewing pleasure, here's a little something from cDc.
|
||
|
||
_ _
|
||
((___)) cDc communications
|
||
[ x x ] Global Domination Update #28
|
||
\ / "A Special Message of Hope"
|
||
(' ') December 24th, 2000
|
||
(U) FOR IMMEDIATE RELEASE
|
||
|
||
A TIME OF GREAT REFLECTION IS UPON US
|
||
|
||
A lot of major events have happened since the last Update... the release
|
||
of Back Orifice and BO2K, a completely redone web page, and the formation of
|
||
cDc's Hacktivismo subdivision. But since our birth in 1984, the bread-and-
|
||
butter of cDc is our routine creative output. That's what these updates are
|
||
about, and act as sort of a "State of the Union' address to fill you fine,
|
||
upstanding, sexy folks in on the progress of The Struggle.
|
||
|
||
The United Arab Emirates have recently banned access to our web page from
|
||
the grasp of their citizens. Why? Because the international press has gotten
|
||
wind of and started to write about Hacktivismo's upcoming "Project X" - which
|
||
promises to bypass Internet censorship. Watch for more in the upcoming
|
||
months.
|
||
|
||
It's a traditional manger scene where Mary and Joseph beam with wonder
|
||
at the radiant baby Jesus, the wise men and shepherds doing likewise. The
|
||
animals are milling about in the background when a cow munching on straw
|
||
picks up the baby Jesus by the head and starts chewing. "OH MY GOD!!! It's
|
||
eating the Messiah!!!" Jesus' little baby legs kick wildly and the frantic
|
||
parents, wise men, shepherds and maybe an angel or two rush around smacking
|
||
the cow on the head while tugging on the baby's legs in a desperate attempt
|
||
to free him. "Bad cow! BAD COW! Don't eat the Messiah! Stop eating the
|
||
Messiah, cow! BAD COW!!!"
|
||
|
||
And that, boys and girls, is why we make hamburgers from cows to this
|
||
very day.
|
||
"Manger Scene" by Scott Christensen.
|
||
_________________________________/ - x X x - \______________________________
|
||
|
||
_ _ information is junk mail: _ _
|
||
((___)) THE TEDIUM IS THE MESSAGE ((___))
|
||
[ x x ] _ [ x x ]
|
||
\ / _ |_|_ _ _|_ _|_ |_ _ _| _ _. _| _ _ \ /
|
||
(' ') (_|_|| |_ (_) | |_ | |(/_ (_|(/_(_|(_| (_(_)\_/\_/ (' ')
|
||
(U) (U)
|
||
deal with it presents unto you our personal gift of love deal with it
|
||
S U C K E R NEW RELEASES S U C K E R
|
||
|
||
__________________________________/new audio\_______________________________
|
||
|
||
"We make hardcore jams, so fuck respect..." -Eazy E
|
||
|
||
248:"What You Thinkin' 'Bout" by Lo-Pro. This slowed-down, banging gangsta
|
||
track features the advanced lyrical stylings of Luck and Sage from
|
||
one of the hardest crews in Texas, the LBK Mafia. All-original music
|
||
by xxxclusive and Grandmaster Ratte' of cDc. Featuring no damn
|
||
samples, period.
|
||
|
||
249:"DemonSeed's Night Before X-Mas" by Myles Long. A startling tale of
|
||
personal redemption, as Long dictates. Script kiddie pays with his
|
||
sins with his life, as DemonSeed Elite strikes with his mighty astral
|
||
monster truck.
|
||
|
||
250:"cDc's NSF Holiday Training" by Delchi. There's no "off season" for the
|
||
cDc Ninja Strike Force! You fool!! Suffer!! Aagh!!
|
||
|
||
_________________________________/ - x X x - \______________________________
|
||
_ _
|
||
((___))
|
||
CULT OF THE DEAD COW [ x x ]
|
||
\ /
|
||
wishes you and (' ')
|
||
your charming family "((U)&
|
||
a ( )""""&
|
||
VERY MERRY HOLIDAY SEASON! &&&&&( .)
|
||
&&&( )""""&
|
||
""""&&&&&( )&
|
||
&&&"""""""&&(
|
||
( )&&&&&&&&&&"""""
|
||
&&&&&( )"""""&&&( )&
|
||
( )&&""""""&&( )&&&&&&&&&
|
||
""""""( )&&&&&&( )&&&&( )&
|
||
/\___/\ &( )&&&&&&&&( )&&&&&&&"""&&
|
||
| @ x | )&&&&&( )&&&&""""""___\|/_&& cDc Likes You Best,
|
||
__\_^_/__ ___\|/___ &&&&& | ||| | All Year 'Round!
|
||
(__/ooM\__)|___|||___| |___|||___|
|
||
(__\___/__)
|
||
_______________________________/new text files\_____________________________
|
||
|
||
376:"cDc's Guide to Sexually Transmitted Diseases" by Myles Long. This former
|
||
Eastern-European porn star pulls it all out and lays it on the table for
|
||
you regarding STD's.
|
||
|
||
377:"My Life as Santa's Rubber-Clad Love Slave" by Scott Christensen. It's
|
||
It's tough being an elf... you can't reach very high, and you're easy to
|
||
tie up and throw in a closet.
|
||
|
||
_________________________________/ - x X x - \______________________________
|
||
|
||
From: chankins@network-one.com
|
||
To: feedback@cultdeadcow.com
|
||
Subject: Stupid
|
||
|
||
I am a 44 year old x-marine and I like the martial arts. I stumbled up on
|
||
this sick sight and would like to invite your bad-ass's over for a lesson any
|
||
time some of the sick cows are in my area. I would like to practice my neck
|
||
breaking tech. on a stupid cow. I live in Fulton, Ms. and work for the city
|
||
utility dept. I am not hard to find. Ask for the Recon. Ranger Eddy.
|
||
|
||
_________________________________/new visuals\______________________________
|
||
|
||
1:"Build The Future" by Myles Long. A long, hard road is ahead!
|
||
|
||
2:"Anime Chicks Dig cDc" by Satoshi "Toy" Igarashi. Anime girl sitting
|
||
around. Yep.
|
||
|
||
3:"Good Ol' Boy" by unknown. George W. Bush, the shape-shifting reptile-
|
||
beast, looking goofy.
|
||
|
||
_________________________________/ - x X x - \______________________________
|
||
|
||
Thanks to the following recent items of influence:
|
||
|
||
MUSIC: OutKast, At The Drive-In, Juvenile, AC/DC
|
||
FOOD: sweet-potato casserole
|
||
PRINT: F.E.D.S. magazine, _The Secret Doctrine of the Kabballah_
|
||
|
||
WAREZ: Defender, via MacMAME
|
||
JEWELRY: iced-down pinkie ring
|
||
HOT SEX: yer momma, ha ha...
|
||
|
||
A brief interview with Count Zero/cDc:
|
||
|
||
CZ: "What you want to talk about? They ain't my kids and I don't know that
|
||
chick. Whatever they told you, I don't know that chick."
|
||
|
||
Thanks, Zero!
|
||
|
||
Fools better recognize: CULT OF THE DEAD COW is a gift to the women of this
|
||
world and trademark of cDc communications. Established in 1984, cDc is the
|
||
longest-running crew in the telecom underground worldwide, and inventor of
|
||
the "e-zine." Every issue is produced on an Apple ][ for genuine tru-skool
|
||
flavor. You thirst for our body of work, you know you do. Find it at the
|
||
cDc Global Domination Factory Direct Outlets:
|
||
|
||
World Wide Web: www.cultdeadcow.com
|
||
Usenet: alt.fan.cult-dead-cow
|
||
BBS: 806/794-4362 Entry:KILL
|
||
|
||
For further information, write:
|
||
|
||
Email: feedback@cultdeadcow.com
|
||
Postal: cDc, 1369 Madison Ave. #423, New York, NY 10128, USA
|
||
|
||
xoxoxo,
|
||
|
||
Grandmaster Ratte'
|
||
cDc Warrior-Priest-King
|
||
"We're into telecom for the groupies and money. Bling bling."
|
||
|
||
__//////\ -cDc- CULT OF THE DEAD COW -cDc- /\\\\\\__
|
||
Est. 1984 \\\\\\/ NINJA STRIKE FORCE * HACKTIVISMO \////// Est. 1984
|
||
####
|
||
|
||
We will have more to say.
|
||
|
||
---
|
||
|
||
|
||
DAMAGE, INC. REVIEWS - {REVIEWS}
|
||
Snapshot of things we currently follow/read.
|
||
|
||
Instead of reviewing web sites or whatever, we decided to just write about the
|
||
things we follow and read these days... as the title suggests. If you have
|
||
no interest in knowing what types of sites we frequent, and what types of texts
|
||
and zines we read, as offended as we are, you can always just skip ahead to the
|
||
next section and read our drug propaganda. Like we're gonna know you did that
|
||
anyway... Wait, that was a little misleading. It made it seem like we're not
|
||
watching you. For the record, we know what you read and what you don't. We're
|
||
like Santa all jacked up on steroids with Psi powers comin' outta his ass. :)
|
||
|
||
|
||
Cult of the Dead Cow - Either you get it, or you don't. Point blank. cDc gets
|
||
it. Some people don't get them. Many do. All that matters is, they put out
|
||
what they want and don't conform to other people. And that's just damn cool.
|
||
I don't just mean in this electronic realm either. Living that way is the only
|
||
way to really live. Creating what you want, putting forth the ideas you want,
|
||
and doing what you want... out of the desire to please yourself instead of
|
||
others around you. Read the interview with G. Ratte' in this issue for better
|
||
insight on the group.
|
||
|
||
|
||
SecurityFocus.com - Excellent security information on the site and in the
|
||
newsletter. Subscribing to the mailing list is highly recommended.
|
||
|
||
|
||
Hacker News Network - HNN, maintained by Weld Pond of the L0pht (now @Stake),
|
||
has a wide range of newsworthy articles and is updated regularly. The site
|
||
also has a web site defacements list (from attrition.org), for the kids that
|
||
want to see all phreaky graphics, messages and shout outs on the latest sites
|
||
to be hax0red. Hehe.
|
||
|
||
|
||
Hack Canada - An excellent assortment of articles relating to Canadian
|
||
hacking/phreaking. New texts are released on a regular basis. Very informative
|
||
and a great resource for the Canadian scene.
|
||
|
||
|
||
Nettwerked - The Clone, who is also part of the Hack Canada crew in Alberta,
|
||
has put together a really cool site of his own, along with a zine, K-1ine. I
|
||
realize he has been interviewed and this has been mentioned before in earlier
|
||
issues. And Nettwerked is an affiliate of Damage, INC. However, it bears
|
||
mentioning that with each new issue he releases, the improvements are
|
||
drastically noticeable and readily apparent. If you're Canadian, his site is
|
||
a must visit for the solid telco information alone. In my opinion, Nettwerked
|
||
has put out some of the best quality t-files in the Canadian scene...
|
||
|
||
|
||
Adbusters - Culture jamming, Spoof ads, Magazine, Uncommercials, Campaigns like
|
||
"Buy Nothing Day", etc. Are you tired of commercialism infiltrating *every*
|
||
area of "society" and aspect of your lives? Go here and read, then act.
|
||
www.adbusters.org
|
||
|
||
|
||
rTMark - An actual corporation that's about trying to improve culture. As they
|
||
say "it seeks cultural profit, not financial." What a novel concept! Another
|
||
quote from their FAQ "rTMark supports the sabotage (informative alteration) of
|
||
corporate products, from dolls and children's learning tools to electronic
|
||
action games, by channeling funds from investors to workers for specific
|
||
projects grouped into "mutual funds." Go there, read and get involved with
|
||
their various projects. A very cool site that's *about something*.
|
||
www.rtmark.com
|
||
|
||
We also read a lot of the texts and zines on www.textfiles.com and
|
||
http://scene.textfiles.com as well. Plus, we still read some of the zines
|
||
we reviewed here in previous issues, etc.
|
||
|
||
|
||
DRUGSTORE COWBOYS - {DRUGS}
|
||
Got drug propaganda? Trip on this.
|
||
|
||
We brought back the Drugs section, but decided to give it a hip new name. Yeah,
|
||
that's right. We changed it *just* so you'd think it was cooler. The new name
|
||
refers to the movie "Drugstore Cowboy", which has a cameo appearance by
|
||
Burroughs... who plays an old junkie. ;) A cool movie, and a fitting title
|
||
for this section... as it reflects what it's about quite nicely.
|
||
|
||
The anti-drug campaign (or spin/propaganda machine) has been going steadily
|
||
for well over half a century now. You would think that people would be more
|
||
informed and enlightened in their views on drugs and drug use by now. But
|
||
governments, law enforcement, the legal system, medical associations and doctors
|
||
don't seem to be getting it. Not in most countries at least. Not yet.
|
||
|
||
Some of the most hilarious drug propaganda is circa 1950-1960. In that era, it
|
||
wasn't uncommon for people, especially parents of teenagers, to believe that
|
||
their kids would go insane and become sex crazed maniacs from indulging in
|
||
smoking marijuana. Some even thought their children would become enraged,
|
||
pyschopathetic killers. As laughable as that sounds, it's true. They thought
|
||
that was a real possibility. And the government was behind spreading those
|
||
types of outright lies, through their own campaigns. Rumours became truths.
|
||
Were the 50s perfect? If you wanted to live in a make-believe... dream world,
|
||
far separated from reality, then maybe. Regardless of all the lies that were
|
||
spread, people still used drugs throughout the 50s. The propaganda meant to
|
||
fool and scare people failed then, and it's still failing miserably now.
|
||
|
||
In the 1980s and 90s, the government really stepped it up a few notches. They
|
||
began to run commercials that were chock full of "shock value" -- at least,
|
||
as much as they could possibly put into them. I'm sure you've all seen the
|
||
public service announcements on television. Well, those of you that watch TV
|
||
must have.
|
||
|
||
What about currently? Well, the anti-drug propaganda is still out there,
|
||
proliferating as it always has. That hasn't changed. That won't change, until
|
||
people realize that it's about *personal choice*. Drugs can definitely affect
|
||
some people's lives adversely. In other words, it fucks them up and they'd
|
||
be much better off without using them. For others, it's a source of inspiration
|
||
and creativity. As strange as that might seem to some people, it's true.
|
||
|
||
Regardless of what you use, or don't use, just consider this. Get the straight
|
||
facts before you start fucking around with things. If you think you can shoot
|
||
heroin once, to experiment with it, just to try it, think again. It's possible,
|
||
but it's also more likely that you won't stop at using it once for the
|
||
experience. Unless it does nothing for you, which is pretty rare. And whatever
|
||
you choose to do, research it first. And if you decide to use pills, get them
|
||
tested first if you can. You never know what shit is going to be mixed in, or
|
||
what it really is at all unless you do that. You don't want to be doing things
|
||
that aren't pure. But with h, you don't want to shoot some that's *too* pure
|
||
either. Anyway, just think about these things, or stick with smoking dope.
|
||
By the way, I'm not preaching. Do whatever the hell you want to do. But being
|
||
careless doesn't make you cool kids. Dying young doesn't make you cool either.
|
||
Remember these things, and make your drug experiences as safe as you can.
|
||
|
||
Written by BLACKENED / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
H/P INF0 - {H/P}
|
||
Bringin' back the old sk00l and hittin' hard with it.
|
||
|
||
Yeah, that's right. We are bringin' it back. It ain't all about the Gnu
|
||
exploitz. Sometimes you've gotta go back to the old sk00l... and thus, we're
|
||
giving you a healthy dose of it. Coloured boxes? You know it doesn't get
|
||
anymore old sk00l than that!
|
||
|
||
|
||
Bell Centrex Explained.
|
||
|
||
While on a trashing expedition, I found some papers that contained information
|
||
about the Bell Centrex telephone service. In this article, I will give you a
|
||
brief explanation as to what the Bell Centrex service is, who will have it, and
|
||
a list of features that can be taken advantage of if you have access to Centrex.
|
||
|
||
Bell Centrex is a service that Bell Canada attempts to sell to small businesses
|
||
that are too small to purchase a PBX system, but have outgrown the limitations
|
||
of basic POTS business services. For example, a small business may want an
|
||
easy way to have phones in their building to have their own assigned extensions.
|
||
Bell will try to sell Centrex because they can set it up to do this for a
|
||
potential customer. All Centrex customers will be locked into a three-year
|
||
contract, so if you find a business that has just signed up, you'll have three
|
||
year to take advantage of the basic features that they will have (if you're
|
||
interested in them).
|
||
|
||
At the site of the Centrex subscriber, there is no hardware or software that
|
||
enables them to obtain Centrex services. The actual Centrex system is housed
|
||
and maintained in the confines of Bell Canada. When someone subscribes to
|
||
Centrex, they are given a piece of paper stating the date that they will switch
|
||
over from the POTS to Centrex. That transfer also happens at Bell. Unless the
|
||
subscriber has problems, a technician will not have to visit the subscriber in
|
||
order to connect them to the Centrex service.
|
||
|
||
Bell has made Centrex so that people that have very little or no knowledge of
|
||
the telephone system think that it is a PBX. The first trick they used is to
|
||
require callers to press "9" in order to dial out. Rudimentary extension
|
||
service is another ploy to make people believe that they are using a PBX when it
|
||
is just the POTS with some extra features thrown in by Bell. The truth is that
|
||
Centrex is a PBX sham, and has none of the flexibility or expendability that any
|
||
real PBX system has.
|
||
|
||
For small business owners that have little knowledge of the telephone system and
|
||
don't know or care about what a PBX is, they will be attracted to Centrex
|
||
because of all of the "SmartTouch" services that Bell has given Centrex as
|
||
standard features. In fact, don't be surprised if you find that Bell has sold
|
||
Centrex to small businesses that have not outgrown the capabilities of the POTS.
|
||
If the business subscribes to more than three features like Call Waiting,
|
||
Caller ID, Call Forwarding, etc. it is cheaper for them to subscribe to Centrex
|
||
then to stay on the POTS and subscribe to individual features. This can be
|
||
valuable to a field phreak that can find a Centrex subscriber because they will
|
||
all have the same set of features, and could have them for a substantial period
|
||
of time. I have typed up, word for word, the poorly written Bell Centrex list
|
||
of features that I found for your reference. You will quickly notice that Bell
|
||
has given Centrex features different LASS codes in order to activate/deactivate
|
||
them:
|
||
|
||
Subject: Dialing Plan & Centrex Configuration & Features
|
||
|
||
1. To dial local or operator assisted calling card calls press "9" as the
|
||
leading digit.
|
||
|
||
Please remember to reprogram any auto dial or circuit alarm numbers as
|
||
per the above dialing plan (ie. Interac, visa/master card machines, built
|
||
in speed dial's on your fax).
|
||
|
||
2. Call Forward Calls Externally
|
||
1. Lift the hand set
|
||
2. Depress *70
|
||
3. Listen for special dial tone
|
||
4. Dial the number you are forwarding to (remember to dial "9" first)
|
||
5. Listen for the confirmation tone
|
||
6. Hang up
|
||
|
||
To Cancel Call Forward:
|
||
|
||
1. Lift the hand set
|
||
2. Depress *71
|
||
3. Listen for confirmation tone
|
||
4. Hang up
|
||
|
||
3. Transfer Calls Externally:
|
||
1. Press the Link key (this places the caller on hold)
|
||
2. Listen for the special tone
|
||
3. Dial 9 + 7 digit telephone number of the person you are transferring to
|
||
4. Announce the call
|
||
5. Press the Link key (this brings the call off hold
|
||
6. Hang up
|
||
|
||
4. 3-Way Conference Call
|
||
1. Follow the above procedure to the point of announcing the call
|
||
2. Press the Link key
|
||
3. You now have a 3 party conference call using only one line.
|
||
|
||
If there is no answer, or it is busy, press (LINK) twice and you are back
|
||
with your original party.
|
||
|
||
5. Call Park:
|
||
1. Press LINK
|
||
2. Dial *72
|
||
3. Listen for confirmation tone.
|
||
4. Replace the handset
|
||
|
||
6. Speed Call Short (0-9):
|
||
To Store
|
||
1. Lift handset
|
||
2. Press *77
|
||
3. Dial one digit code and telephone number (ie. 0+9+888-1111)
|
||
4. Replace handset
|
||
|
||
To Use
|
||
1. Lift handset
|
||
2. Press * followed by one digit code (ie *0)
|
||
|
||
7. Ring Again:
|
||
To Use
|
||
1. You have called someone and have received a busy signal. Press LINK +
|
||
*76. Listen for the confirmation tone.
|
||
2. Replace the handset.
|
||
3. When the called station becomes free you will hear the Ring Again
|
||
notification (one long and two short rings. Lift the handset. The call
|
||
will automatically ring.
|
||
|
||
To Cancel Ring Again
|
||
1. Lift the handset. Listen for the dial tone.
|
||
2. Dial *76. Listen for the confirmation tone.
|
||
3. Replace the handset. Your request will be cancelled.
|
||
|
||
8. To Call Forward on a No-Answer Condition:
|
||
1. Lift handset and pick telephone line
|
||
2. Dial *90 (listen for confirmation tone)
|
||
3. Enter the telephone number you wish the call directed to either an
|
||
external number (9+7 digit telephone) or internally to a 4-digit number
|
||
within the office.
|
||
|
||
To Cancel Forward on a No-Answer Condition:
|
||
1. Lift handset and press a line
|
||
2. Dial *91 (listen for confirmation tone)
|
||
3. Hang-up receiver
|
||
|
||
9. To Call Forward on a Busy Condition:
|
||
1. Lift handset and pick telephone line
|
||
2. Dial *88 (listen for confirmation tone)
|
||
3. enter the telephone number you wish the call directed to either
|
||
(9+telephone number for an external number) or a 4-digit extension or
|
||
another number within your office (last 4 digits of the telephone #)
|
||
|
||
To Cancel Forward on a Busy Condition:
|
||
|
||
1. Lift handset and press a line
|
||
2. Dial *89 (listen for confirmation tone)
|
||
3. Hang-up receiver
|
||
|
||
10. Call Waiting:
|
||
When to use Feature
|
||
1. To answer a second call
|
||
2. To end current caller
|
||
|
||
To Use
|
||
1. When you HEAR a TONE through the receiver press LINK once. The first
|
||
caller is put on HOLD automatically.
|
||
2. Replace handset. Your telephone will ring.
|
||
3. Lift the handset, you are now connected to the third party.
|
||
4. To return to first caller, press LINK once.
|
||
---
|
||
|
||
Written by Shatazar / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
Modem Brown Box.
|
||
|
||
By Phractal.
|
||
|
||
Using your modem as a bridge for two separate lines to create '3-way calling'
|
||
|
||
This is a common scenario that many dialup users of the internet have on
|
||
their computers. Many people have two phone lines at home, for the
|
||
convenience of being connected to the internet via telephone and also being
|
||
able to use the other line for voice calls.
|
||
|
||
In this diagram, we start out with two separate phone lines, each having
|
||
their own unique telephone number of course. One line supplies Phone A with
|
||
access to a dialtone. Line two plugs directly into the modem. Almost all
|
||
telephone modems have two phone jacks. One is meant for the incoming phone
|
||
line (ie the line coming from the wall), and the other is meant to attach to
|
||
phone (Phone B), which can be used when the modem is not in use, and will
|
||
operate on the same line as line 2, naturally. This is where 'I' and 'O'
|
||
labeled on the modem come into place. The 'I' stands for input, and the 'O'
|
||
stands for output. On many modems, the input jack is labeled 'Line', and the
|
||
output jack is labeled 'Phone'. When the modem is not in use, think of it as
|
||
a router for Line 2 to Phone B.
|
||
|
||
*POTS lines from wall
|
||
|
||
Line 1 Line 2
|
||
Phone Line Modem Line
|
||
|~| |~|
|
||
| |
|
||
| |
|
||
| | /----------\
|
||
| | | |
|
||
| | /-------------\ | Computer | /----------\
|
||
| | | | | | | @@@@@@@@ |
|
||
_______ \-------|<I | | | | @@@@@@@@ |
|
||
######### | Modem |----------| | | @@@@@@@@ |
|
||
###|___|### /-------|<O | | | \__________/
|
||
* 123 * | | | | |---\ /
|
||
* 456 * | \-------------/ | | _/______\_
|
||
* 789 * | | |
|
||
*********** | \----------/
|
||
Phone A |
|
||
|
|
||
_______
|
||
#########
|
||
###|___|###
|
||
* 123 *
|
||
* 456 *
|
||
* 789 *
|
||
***********
|
||
Phone B
|
||
|
||
With some tinkering, all the materials described and illustrated above can
|
||
be
|
||
used to create a bridge of two separate phone lines. This means that you can
|
||
call two separate phone numbers and communicate with the people on the
|
||
receiving line at the same time, and they can hear you, and they can hear
|
||
each other, and not just you. In laymen's terms, it's three way calling. It
|
||
isn't really three way calling, because actual three calling is a service
|
||
offered by the telephone company to a single phone line, but this plan has
|
||
the exact same effect as actual three way calling. It is cheaper to have one
|
||
phone line with the three way calling plan, than to have two phone lines,
|
||
but if you have/need/prefer two phone lines, you can use this method to make
|
||
three way calling using two phone lines. This is totally legal as well. You
|
||
can do this same procedure with a phone that accepts 2 lines.
|
||
|
||
To achieve this method of three way calling, setup your modem, phones and
|
||
phone lines in the following manner:
|
||
|
||
*POTS lines from wall
|
||
|
||
Line 1 Line 2
|
||
Phone Line Modem Line
|
||
|~| |~|
|
||
| | /Note: Line 1 is connected to wall, and
|
||
| | / unplugged at other end
|
||
| | / /----------\
|
||
| | / | |
|
||
| | / /-------------\ | Computer | /----------\
|
||
| | | | | | | | @@@@@@@@ |
|
||
\-----------|----- |<I | | | | @@@@@@@@ |
|
||
| | Modem |---------| | | @@@@@@@@ |
|
||
\--------|<O | | | \__________/
|
||
| | | |---\ /
|
||
\-------------/ | | _/______\_
|
||
| |
|
||
\----------/
|
||
|
||
Phone A Phone B
|
||
_______ _______
|
||
######### #########
|
||
###|___|### ###|___|###
|
||
* 123 * * 123 *
|
||
* 456 * * 456 *
|
||
* 789 * * 789 *
|
||
*********** ***********
|
||
| |
|
||
| |
|
||
| |
|
||
| |
|
||
| |
|
||
|~| |~|
|
||
Line 1 Line 2
|
||
|
||
Phone A and B are both unplugged from their previous destinations. They need
|
||
to be plugged into other telephone jack terminals for Line 1 and Line 2. Be
|
||
in mind, these are still the same Lines that were mentioned before. At the
|
||
original terminal, Line 1 directly from the wall is now unplugged (but get
|
||
ready to plug into Input/Line modem jack on modem), and directly from the
|
||
wall, line two is plugged into the the Phone or Output jack.
|
||
|
||
Instructions for three way calling operation:
|
||
|
||
1) Pick up Phone B connected to Line 2 and hear a dialtone. Dial a phone
|
||
number of someone you want to speak to.
|
||
|
||
2) While talking on Phone B once they've picked up and you've confirmed a
|
||
connection, plug line 1 into the Input/Line jack of the modem.
|
||
|
||
3) You should hear a dialtone, but you are still also connected to your
|
||
friend who you previously called. You can still hear each other if you speak
|
||
loud enough over the dialtone. This dialtone is the dialtone of Line 1.
|
||
|
||
4) Pick up Phone A, which is connected to Line 1 and dial a number of
|
||
someone
|
||
you wish to speak to. You should hear the tones of the numbers being dialed
|
||
on Line 2/Phone B, as well as Phone A of course. The dialtone will stop
|
||
as it always does once you enter a DTMF tone.
|
||
|
||
5) If all goes well, and the third party picks up, both of the people can
|
||
talk to you, hear you, and hear each other, hence three way calling.
|
||
|
||
***NOTE***
|
||
With step 4, you can dial the third party directly from your second line,
|
||
or
|
||
in this case, Phone B. I told you to dial from Phone A because it better
|
||
illustrates how this works.
|
||
|
||
Also, reset to original setup to get online :)
|
||
|
||
~~~Why this works.~~~
|
||
|
||
The Output jack for the modem also accepts input over a phone line, because
|
||
otherwise, how would you talk to someone on a phone routed through a modem,
|
||
without them hearing you. Your voice is the input.
|
||
|
||
The Modem thinks that the lines you connected in diagram 2 are one phone
|
||
line. And since the Line 2 is connected to the output modem jack and then to
|
||
the wall, instead of an individual phone, the modem is now in essence,
|
||
'connected' with the rest of the phones all hooked up to line 2.
|
||
|
||
The thing that triggers the whole thing is when you connect line 1 to the
|
||
modem. Now, I'm not totally sure why this part happens, but I think it's the
|
||
modem trying to figure all of this out. So here's my hypothesis: The modem
|
||
recognizes that there is activity on Line 2, so it opens up the Input jack
|
||
for information automatically, and therefore, you get an auto-dialtone when
|
||
you insert Line 1 into the 'Line/Input' Modem jack. The modem is basically
|
||
taking the phone off the hook on the Input jack. And it's all ready for you
|
||
once you insert Line 1.
|
||
|
||
Slackware ownz!
|
||
|
||
--Phractal
|
||
|
||
Okay, maybe that was a little too "old sk00l". Anyway, look for a cool article
|
||
on firewalls - Got Firewalls? - to be here in the next issue.
|
||
|
||
|
||
INTERVIEWS AND INTERROGATIONS - {INTERVIEWS}
|
||
|
||
In the last issue, we had a collection of interesting interviews. Personally,
|
||
I especially enjoyed reading what <predator> had to say, since he has strong
|
||
opinions, beliefs and a very unique take on things -- including "society", its
|
||
rules and laws. And now we're giving you even more to contemplate with our
|
||
latest interview.
|
||
|
||
Grandmaster Ratte' (cDc) is in the spotlight. Obviously, Cult of the Dead Cow
|
||
is a very well known, revered, respected, influential group in the scene. Since
|
||
1984, they've been doing nothing short of kickin' fuckin' ass. With the longest
|
||
running e-zine, a diverse group of members and a wide assortment of releases,
|
||
along with media saturation, cDc stands apart from all the rest. More than just
|
||
being high profile, their members have made a huge impact and countless valuable
|
||
contributions. Bow to the Cow.
|
||
|
||
I'm eternally grateful that he has agreed to be interviewed for the Damage, INC.
|
||
Newsletter. His insight into the scene is immeasurable and comments invaluable.
|
||
But enough with the pre-interview hype, adulation and near awe struck admiration
|
||
of cDc. In this interview, we explore everything from the group dynamic of cDc
|
||
to other topics such as Hacktivism, etc. Just read the damn interview and enjoy
|
||
it without dropping your jaw so much that your keyboard becomes covered in thick
|
||
saliva. This interview was conducted towards the end of December, 2000, and it
|
||
commences right here...
|
||
|
||
|
||
Alias: Grandmaster Ratte'
|
||
Group(s):cDc communications
|
||
Country: US of A
|
||
|
||
Description: SWM, 30, 2 legs, non-smoker, active, fit, enjoys knitting and cats.
|
||
Seeks baby seal for (c)lubbin'.
|
||
|
||
Music: minor key stuff with a catchy melody, all styles
|
||
|
||
Movies: sitting way down close to the screen to get my money's worth of
|
||
spectacle
|
||
|
||
Books: non-fiction
|
||
|
||
Email: gratte@cultdeadcow.com
|
||
IRC: gratte
|
||
Usenet: alt.fan.cult-dead-cow
|
||
URL(s): www.cultdeadcow.com
|
||
|
||
<B> - Since no introductions are necessary, I'll just jump right into the
|
||
real interview questions. How has cDc managed to stay together, evolve and
|
||
be so productive throughout the years? Many other groups have disappeared,
|
||
dissolved and basically weren't able to adapt and keep evolving. I realize
|
||
that cDc is fundamentally different, but, it's still an amazing feat to last
|
||
so very long. And the fact the group is still growing and expanding its domain
|
||
is also impressive. So, the question is, what's the driving force behind the
|
||
group? What's responsible for it continuing to grow and thrive? And how are
|
||
you able to maintain such dedication and diligence?
|
||
|
||
-----
|
||
|
||
Well, cDc resulted from a name change to an earlier group called Pan-Galactic
|
||
Entropy that I had started in '83, '84 in Lubbock, Texas (806). We were the
|
||
local BBS scene kids, mostly in junior high, and the majority of us were running
|
||
our own boards... on Apple II's, Texas Instruments 99/4a's and Atari 800's.
|
||
Lubbock is a weird little college town in the middle of cotton field country.
|
||
There's sort of a clique of the offspring of the Texas Tech University
|
||
professors and the students who tend to find each other and huddle together in
|
||
the midst of tumbleweeds and pickup trucks with gun racks. So that was us.
|
||
A lot of other computer underground things came from that unlikely place. In
|
||
the '80s there were two major h/p BBS's there before ours, and GwD and F.U.C.K.
|
||
(now Attrition.org) started there; all revolving around the university.
|
||
|
||
Enough background, now I'll answer the question...
|
||
|
||
In 1986, I came up with the cDc name and Franken Gibe joined. Gibe's a really
|
||
sharp visionary type, and we would talk endlessly about the hacker/BBS scene and
|
||
what we didn't like about it, and what we wanted to do with our own group
|
||
differently. So the two of us really put together the whole 'concept' that's
|
||
been driving everything since. Fortunately, the concept is very broad and
|
||
inclusive and says basically, "The technology is not the point - it's just
|
||
a means to something else." That right there put us 180 degrees apart from
|
||
every hacker group before and it still trips up most people I think in the
|
||
'scene' - they fall in love with the gadgetry itself and don't see that's just
|
||
a dead end.
|
||
|
||
Until it's too late and they're burned out from a small idea that can't grow.
|
||
So our mission is to use these crazy communications tools to figure out
|
||
something else.
|
||
|
||
When we started, it was about using the free long-distance phone calls, and now
|
||
it's on the 'net. No difference.
|
||
|
||
In practical terms, you stay together through... stubbornness? cDc is my main
|
||
creative outlet, I _have_ to do this. For a group to survive, I think it has to
|
||
have passion about what it's doing, 'cause there's not much else to sustain it -
|
||
no salaries or concrete payoffs. The most rewarding thing about it is the sense
|
||
of accomplishment when you've done some work you know is good, and the feedback
|
||
you hopefully get from people who dig your stuff.
|
||
|
||
The trick is to keep it fresh and interesting for the people involved, which
|
||
means change and growth if you're determined to stick with your plan. It's
|
||
inevitable. As Woody Allen said, "Ninety percent of success is just showing
|
||
up." So show up, put in work, keep doing it, and there ya go.
|
||
|
||
People come and go from cDc. There have been 50 or so members over the years,
|
||
and we tend to have an active lineup of around 20 people at any given time.
|
||
Currently, some of the people have been in since the mid '80s and some around a
|
||
year, and they're all still bringing different things to the table.
|
||
The concept of cDc includes a change of roster... the concept has to be bigger
|
||
than any of the people. Individuals are flighty, they change and their lives go
|
||
this way and that and a group has to accommodate that reality or it can't work.
|
||
As long as there are people willing to do the necessary grunt work, things'll
|
||
hum along fine.
|
||
|
||
-----
|
||
|
||
<B> - Hacktivism is one of the topics that I simply couldn't ignore during
|
||
the course of this interview. So let's get into it. In your opinion, what's
|
||
the importance of Hacktivism as it stands right now? And, do you think it'll
|
||
be even more important in the future? Will it be more of a potent tool to
|
||
get political messages across? What are you views on it as a means of
|
||
protesting and enacting change?
|
||
|
||
I'd say right now, Hacktivism is a bubbling idea. It's still in the pot, and a
|
||
lot of people are standing around the stove rubbing their hands, waiting to dig
|
||
in. We've got a "subsidiary" now called Hacktivismo that OXblood Ruffin is
|
||
stirring up... they're all hot-shit coders and are working on practical human
|
||
rights apps that will make Hacktivism a more concrete force.
|
||
|
||
Hacktivism is about finding a political, real world end to these tech means...
|
||
which is exactly the same as the cDc concept. So it's another way to spread our
|
||
idea about what the point to all this is. Yes, I think it will be very
|
||
important in the near future. I think a lot of people are and many, many more
|
||
will be picking up the flag and running with it. It's something to care about
|
||
and fight for and I'm proud to be involved.
|
||
|
||
-----
|
||
|
||
<B> - Since cDc is producing and releasing audio now, and you mentioned to me
|
||
that you've been really into it for 10 years or so now... I thought it'd be
|
||
prudent to ask what the plans are. How big is cDc gonna get into audio and
|
||
what types of projects are in the works?
|
||
|
||
Yeah, I've been playing bass and guitar and yelling in zillions of noisy bands
|
||
since I was 16. Then I got into hip-hop and dance production in '90 with an
|
||
Amiga and a little keyboard and a 4-track. Franken Gibe and I started a punk
|
||
club with partners who had a skateboard park in a warehouse and we put on lots
|
||
of shows for a few years. Some raves, too. Then xxxclusive and I put together
|
||
a lil' ol' recording studio in a few different places and we did tons of demo
|
||
production, mostly southern gangsta hip-hop and punk rock.
|
||
|
||
We're gonna be very into audio, at least as much as we've been into text files.
|
||
The first MP3 we put out was in mid '97, and now we've got the bandwidth to
|
||
really do things right. The plan is to target the music scene specifically with
|
||
our audio and do lots of stuff with the guys running Shoutcast sites. So we'll
|
||
plug along with our telecom, no-budget way of doing things and then a few years
|
||
later the old conventional scene maybe will notice what we've been up to. That
|
||
seems to be the way it goes.
|
||
|
||
-----
|
||
|
||
<B> - cDc is infamous for its media relations. By that, I simply mean, the
|
||
group is very well known in media circles, and utilizes the mass media as an
|
||
outlet. In fact, in my view, you're masters at it. My question is, how was
|
||
this relationship with the media formed and achieved? Who is responsible for
|
||
forging these media relations? And how important is the media aspect to cDc?
|
||
|
||
In school in the late '80s I wrote a paper about "electronic publishing" and
|
||
how important I thought it would be and the professor said it was a ridiculous
|
||
idea. Ha. In college, I got a degree in telecommunications - which means radio
|
||
and TV stuff. I also had classes in journalism, public relations, marketing,
|
||
advertising, and media law. So I was in all these classes learning about
|
||
dealing with the media, and I thought, "Well, we've got a magazine, sort of, so
|
||
why not act like it?" I was just using standard media relations tactics in a
|
||
new environment. I'd scour every magazine I could find for email addresses
|
||
(this was way before dot com mania and e-i-e-i-o-everything) of "movers and
|
||
shakers" and send them press releases about our stuff.
|
||
|
||
Relating to the media is very important for cDc for two reason. One, because
|
||
mass media is how you spread a message - advertising costs money, but public
|
||
relations work is free. Two, because in the context of what we do, issuing
|
||
press releases and fielding interviews and such is freakin' hilarious. And so,
|
||
the more the better. We catch flack from a few humorless gimps in the hacker
|
||
world who don't get it, but the press aren't the enemy. They're just cats doing
|
||
their job and most of 'em are cool folks. They want a hook, they want "riveting
|
||
drama", 'scool. You hang out with a reporter at a restaurant, they pay for your
|
||
food, you tell 'em a story. If it's not you, they'll just go find some other
|
||
car wreck to look at.
|
||
|
||
Different people in the group field different kinds of questions, so between us
|
||
we can cover things pretty well.
|
||
|
||
-----
|
||
|
||
<B> - On a similar note, cDc has always been excellent at promoting itself
|
||
within the scene, and even outside of it. The group is well known for its
|
||
unmistakable style and flash. And so, relating to this, how do you put
|
||
together the shows you put on at the various hacker cons the group attends?
|
||
|
||
We use a lot of antihero imagery to wrap up an essentially positive message -
|
||
most people figure it out but a few knuckle-draggers don't get it. That's ok,
|
||
they don't have to. We do these things because it's fun to scheme and plot and
|
||
use these techniques in this context; we're playing around. We're not making
|
||
money and we're not trying to trick anybody. The attitude is that we definitely
|
||
want everybody in on the fun, ya know. The only market we're interested in is
|
||
hearts and minds, and the point will be more clear as our agenda emerges over
|
||
time.
|
||
|
||
We plan for the shows we do in email mostly. Then as the time draws near, a lot
|
||
of work goes into getting lights and sound working right (sometimes) and
|
||
whatever printed materials we're giving out to press, throwing to the crowd,
|
||
etc. We have to put the recorded audio together on a CD, and maybe there'll be
|
||
some video. Which is a nightmare with video projectors and such. Of course
|
||
you've gotta have some sort of show concept, and you have to script out who's
|
||
saying what and when. Then you've got costumes to put together, and props and
|
||
figuring out how to get all your junk to the location. When you see the stage,
|
||
you have to figure out staging: how you come in, where you stand, who does what
|
||
where. How the lights are going to work. The audio cues. At H2K we had a
|
||
theater group doing a play and so I had to meet with them several times for
|
||
script-writing and rehearsals. They did a great job.
|
||
|
||
We also did three musical numbers, and so the people involved with that had to
|
||
know how the songs went and what they were supposed to be doing. It's a whole
|
||
big fat ton of work to put on those shows and they cost quite a bit of money to
|
||
do. We don't get paid for them either, so we hope to make some of the money
|
||
back with t-shirt sales.
|
||
|
||
-----
|
||
|
||
<B> - Judging by their writing, quotes in articles and interviews, each member
|
||
of cDc seems to have a very distinct style, unique personalities and interests.
|
||
It's a group of real individuals, which is very cool. And you keep it fresh,
|
||
by adding members, expanding, constantly getting into new things, etc.
|
||
The group as a whole seems to have its own culture, at least that's how many
|
||
outside observers view it. More than just a generic hacker culture. Can you
|
||
rant a a little on cDc culture, and give us an idea of what some of the basic
|
||
ethics and ideals of the group are? Is there anything that isn't permitted
|
||
within the "boundaries" of cDc and all that the name encompasses?
|
||
|
||
Yeah, everyone in cDc is definitely their own person and we want them to project
|
||
their characters as much as possible. We have an internal culture of
|
||
communicating on a personal level with each other, in most cases for many years.
|
||
Before everyone had Internet email, cDc communicated through a private message
|
||
board on the Demon Roach BBS. Then that switched over by the early '90s to an
|
||
Internet mailing list we're all on. We talk about intimate details of our
|
||
lives, know embarrassing things about each other, etc. There are cliques within
|
||
the group, but for the most part we're all fairly close friends. I guess you
|
||
could say the culture sort of comes from knowing that this isn't a regular
|
||
hacker group, it's not supposed to be, and that we're pushing for something
|
||
else. Finding something else is the culture of the group. That's what keeps it
|
||
fresh and interesting for us. Being in cDc is like being in a band, or a gang,
|
||
or both. But it's a new definition without the traditional boundaries. It's
|
||
much better. It's an ideal, a lifestyle. The ideal is to be this renaissance
|
||
person, mad ninja skills in all aspects of life, enlightened, uber-el33t, etc.
|
||
So maybe you're really a bit lamer than all that superstar stuff, but ya know,
|
||
at least you can inspire your own damn ass. And that's pretty cool.
|
||
|
||
-----
|
||
|
||
<B> - How has cDc changed since you first started writing and releasing issues?
|
||
I still vividly remember reading cDc's t-files from the 80s... with the early
|
||
ones including song lyrics for albums, lists, telecom terms and that sort of
|
||
thing. The evolution of the group was so clear and apparent as each year
|
||
passed. Was it as natural an evolution as it seemed?
|
||
|
||
We started doing text-files in '84 and over the next year or so we had amassed
|
||
quite a few. With the name change to cDc, we started numbering the text files
|
||
to make them collectible, so you could tell if you didn't have them all. Before
|
||
that, nobody was numbering anything.
|
||
|
||
Quite a few t-files didn't make the cut at that point, though you might still
|
||
see them floating around. So by then we had a little 'zine with enough articles
|
||
to warrant our own subdirectory on a BBS. The next issue was distribution, so
|
||
we made a point of making damn sure all our files got onto the biggest h/p and
|
||
text BBS's at the time. We would recruit sysops into our efforts; for a long
|
||
time we had an organized "Factory Direct Outlet" distribution plan to
|
||
guarantee certain BBS's would carry our releases as soon as they came out. So
|
||
we basically churned away like this, growing gradually, until 1993 when
|
||
Drunkfux set up our first Internet site, cypher.com. Mindvox was also huge and
|
||
we were all over it, a telnet-able BBS in New York that everybody who was
|
||
anybody was on. This was when the "cyperpunk" thing was happening, the last of
|
||
the big hacker-scene busts was going on, and we started doing press releases
|
||
through Internet email. We had a _massive_ email list then, which I'd send out
|
||
manually one at a time and it took days to send out a PR. The goal was if you
|
||
had a computer and a modem, we wanted to be in your face about cDc. This
|
||
was when the hacker cons became more widespread... SummerCon had been going on
|
||
yearly in St. Louis with the Phrack scene, but now Defcon started and Drunkfux
|
||
had his HoHoCons ( in my opinion, the best - freakin' NUTS - cons now are
|
||
watered-down pussy shit compared to those). So by the early '90s, the Internet
|
||
happened and we grew beyond the BBS scene and that's been the situation. We've
|
||
been wanting deliriously to do wider media than t-files for almost ten years now
|
||
but didn't have the bandwidth to handle the kinda traffic these releases move.
|
||
I'm very excited about that stuff. The cDc web site has been totally redone six
|
||
times now I think, and the latest is kinda cool. It has a "content management
|
||
system" - w00.
|
||
|
||
-----
|
||
|
||
<B> - What do you think the legacy of cDc will be? What will the group be
|
||
doing 5 or 10 years from now? Yes, I'm basically asking you to predict the
|
||
future. ;)
|
||
|
||
Astral travel. Building an army of psionic warriors to battle the alien
|
||
reptilian overlords in the 4th dimension for the fate of mankind.
|
||
|
||
-----
|
||
|
||
<B> - Excluding BackOrifice and BO2K, what has cDc written or done that made
|
||
a huge impact on the scene? (including texts, ideas, ideals, terms coined,
|
||
philosophies, etc.) And which cDc issue stands out in your mind, and why?
|
||
|
||
I think our biggest impact has been the idea of electronic publishing, through
|
||
the e-zine, webzine, whatever. BO is a cool app and made a lot of noise but in
|
||
the big picture, coming up with "new media" is a way bigger deal.
|
||
|
||
We're sort of in a weird position, because on one hand we're the flagbearers of
|
||
certain "old skool hacker" traditions - on the other hand, we were all
|
||
about breaking from some of that when we started. Now the cultural enemies are
|
||
the dot com ninnies and the scared reactionaries who come following them not
|
||
realizing what they're getting into. You can't just hide the Playboys in the
|
||
dresser and keep the scary books out of the library any more - gee, maybe you
|
||
should stop treating your kids like retards who have to be sheltered from
|
||
anything challenging, and they'll turn out better. I'm digressing, sorry. I
|
||
guess the influence to the hacker scene in general is the attitude that we're
|
||
here to have fun and build something cool. In particular, there are tons of
|
||
details... I'll see quotes from us in the mission statements of groups,
|
||
unattributed. File templates cut and pasted from ours. Too many to think of.
|
||
Tons of times I'll be reading somebody else's etext or whatever and think
|
||
"Oh, that came from my...so and so". References and whatnot all over the place.
|
||
It's cool, it's fine. Everything's always built on what came before. We were
|
||
looking at the Apple Mafia and LOD/H and figuring out what we didn't wanna do
|
||
in the early days, and now we're thinking about the Rolling Stones (in '73) and
|
||
KISS.
|
||
|
||
But the most important cDc innovation: MIXED-CASE ACRONYMS!!
|
||
|
||
The cDc file that stands out the most to me is #200: "Super mega blah blah
|
||
blah." That damn thing took like a year to put together, and I remember
|
||
finishing it up at some crazy hour of the morning just before I drove off for 7
|
||
hours to a HoHoCon. I hadn't put out a file all year, we had been stuck at #199
|
||
forever and everyone in the group was pretty pissed off. So I basically
|
||
couldn't show my face without that file. I brought it on a floppy and all was
|
||
well, and I still think it's the best file I've done by far. I've been really
|
||
happy with the concept, an elaborate Dickens parody through the eyes of a BBS
|
||
sysop. Another file that stands out to me is the "Six Million Dollar Man -
|
||
alien conspiracy" (#253) thing. At some hacker con, Omega and White Knight
|
||
had a handful of copies printed out and announced he had this "special
|
||
exclusive paper" and these journalist guys were LEAPING for it, yelling "Press!"
|
||
It was too funny, and something really clicked for us, seeing that. Also, I
|
||
remember that Mormon-expose file by Krass Katt being kind of an "oh wow" moment,
|
||
along with the first time I'd seen all that UFO-Roswell-MJ12 conspiracy stuff...
|
||
Gibe and I used to sit around, freaked out, talking about all that business when
|
||
we first found it on the old UFONet boards in the late 80s.
|
||
|
||
-----
|
||
|
||
<B> - You mentioned HOPE was more interesting this year than Defcon... How
|
||
was Jello Biafra's speech? What's your take on cons in general?
|
||
|
||
As far as cDc stuff goes, our show at HOPE last year was probably the best live
|
||
show we've ever done. Then two weeks later at Defcon, very little went like it
|
||
was supposed to, and it was pretty disappointing. I remember coming back to the
|
||
"Suite of the Elite" after the show just feeling down and mumbling to myself,
|
||
"It didn't work, it didn't work." We had a lot of communications problems
|
||
within the group leading up to it and we weren't really on the same page. And
|
||
then tons of technical glitches and general confusion led to a half-assed show.
|
||
But we learned a lot about what not to do and to not just assume things will
|
||
work out, and next year should be insane.
|
||
|
||
Jello Biafra's speech was really cool, I think it's definitely what's needed -
|
||
an outside voice pointing towards some sort of agenda, via hacktivism and such.
|
||
I think the problem with these cons has been sort of a blase' attitude - I see a
|
||
lot of kids throwing themselves in these "Internet security consulting
|
||
companies" trying to act like some dim-witted view of what "professional" means
|
||
and not seem like they're 16 years old. Thinking they're going to pull a L0pht
|
||
and somebody's going to throw 'em some money. Get real, kid. Too much
|
||
unimaginative dull thinking going on, people not seeing the big picture or
|
||
thinking about the potential here. Enough complaining though, cons are still
|
||
great and everyone should go if possible. It's really fun to meet people from
|
||
the pages and IRC and hang out for a weekend.
|
||
|
||
-----
|
||
|
||
<B> - Do you want to give any shout outs to anyone?
|
||
|
||
Yes, everybody who's helped us out in some way over the years. Carried our
|
||
stuff on their system, put a sticker someplace, bought a t-shirt, sent some good
|
||
feedback, told someone about cDc, lugged stuff around at a con, wrote a story
|
||
about us. We appreciate it very much. We're so grateful to everyone.
|
||
|
||
-----
|
||
|
||
<B> - Thanks for doing this interview. We really appreciate it.
|
||
|
||
Thank you, it was fun. Happy New Year, y'all...
|
||
|
||
G. Ratte'/cDc
|
||
|
||
-----
|
||
|
||
Afterward:
|
||
|
||
To say the very least, interviewing Grandmaster Ratte' has been a real highlight
|
||
for me, and has made this issue special. I remember reading cDc issues in
|
||
the late 80s, when I first got into BBSing and the whole text scene. In all
|
||
honesty, I grew up reading cDc. Their files are the biggest reason that I
|
||
got into this at all. And, I can still vividly remember scanning while reading
|
||
the latest cDc issues. ;) So, massive thanks to G. Ratte' and the rest of cDc
|
||
for putting out such high quality material throughout the years. It's amazing
|
||
how they've been able to play such a prominent role in the scene for so many
|
||
years, and still not take themselves too seriously... and keep their sense of
|
||
humour, etc. Thanks again for giving our readers a chance to get to know you
|
||
and cDc better. And keep sending the cDc PR our way.
|
||
|
||
To our readers, make sure you hit www.cultdeadcow.com and check it for all their
|
||
cool new stuff. Damn straight you better!
|
||
|
||
|
||
NEWS FROM THE TRENCHES - {NEWS}
|
||
|
||
WXYZ Channel 7 Action News at 11 from Detroit City baby! We're down in the
|
||
trenches and we're diggin' up the dirt for your reading pleasure. Once again
|
||
it's time for the News. So hold onto your hats folks, because this edition
|
||
has more flash, razzle and dazzle than a Vegas show and a newsstand tabloid put
|
||
together. Yeah, that's right. We've got the straight dope on all the
|
||
happenings. And, we're reporting live from the source, inside the heavily
|
||
guarded Damage, INC. compound. So get up, wake up and come with it now!
|
||
|
||
We realize it has been a long time since we've released a new issue. But
|
||
since the end of June, a hell of a lot has been going on. However, we're off
|
||
to a good start in 2001. And that's all that really matters right now.
|
||
|
||
Our texts are now readable online at www.textfiles.com/groups/DAMAGEINC/
|
||
Yes, the URL is case sensitive. Yes, our directory is right below cDc on
|
||
the groups page. We know. ;)
|
||
|
||
A new edition of the Phreaky Field Phreaking List for Winter 2001 is on its
|
||
way to CRTs and printers everywhere. So, look for it to be available sometime
|
||
in January. Hit the site for all the details.
|
||
|
||
We also have a few little projects in the works. More details will be released
|
||
at a future date. I just wanted to create some anticipation and leave you
|
||
wondering... Here's some hints. Think merchandise. Think phreaky. Think.
|
||
|
||
|
||
OBJECTIVE OPINIONS - {OPINIONS}
|
||
The Propaganda Machine Rolls On.
|
||
|
||
Spinning its wheels, spinning its spin, the propaganda machine always manages
|
||
to roll on. It's wheeling and dealing, churning and turning, bubbling and
|
||
sputtering, but it still always manages to spout out misinformation and
|
||
disinformation when it's called upon. It's a public relations machine and a
|
||
corrupt politician's dream. It's big, bad, nasty and mean. And it's churning
|
||
out lies throughout the world, in every scene.
|
||
|
||
Propaganda is defined as being "an association, organized scheme, for
|
||
propagation of a doctrine or practice; doctrines, information, etc. thus
|
||
propagated; efforts, schemes, principles, of propagation."
|
||
|
||
Simply put, that means the spreading of information, ideas, beliefs, dogma,
|
||
principles, and systems by way of an organized scheme or effort.
|
||
|
||
The focus of this article isn't just propaganda, but rather the actual workings
|
||
of it. As in, the machinery that drives it, creates it, and spreads it.
|
||
Picture the image of a steamroller, except it is able to travel at the speed
|
||
of information, faster than the speed of light. Now think of that information
|
||
being tainted and corrupted. The highways the propaganda machine paves over
|
||
previously contained truth, but now they're built on falsehoods and lies. In
|
||
essence, that's how it works. The question is, who's driving it? And what are
|
||
the reasons for wanting to spread lies? Why use propaganda at all? What is the
|
||
purpose of it? In this article, I'll attempt to answer those questions. In the
|
||
process of doing that, I'll state my own opinions on the propaganda machine.
|
||
Just keep in mind, no one's opinion is completely objective. There's natural
|
||
bias and subjectivity built into them all, including mine. However, most people
|
||
won't admit that before stating them, since consciously or subconsciously they
|
||
want you to agree with them and believe everything they've written. Unlike
|
||
those people, I'm willing to honestly make an admission such as that up front so
|
||
that you know ahead of time. That way, you can think and form your own opinions
|
||
while reading this article, without being influenced in any way to agree with
|
||
me. That being said, here's the truth -- as I see it -- behind propaganda.
|
||
|
||
Propaganda has infiltrated every facet of our so-called "society", from
|
||
government and military reports, to campaign advertisements during elections.
|
||
But that's not all. That's just the beginning. It takes on so many forms that
|
||
it can sometimes be difficult to recognize as being propaganda at all. It has
|
||
spread so far, that it's literally everywhere and in everything now. In fact,
|
||
it has become ubiquitous. Just like Big Brother. Sure, we've written about
|
||
propaganda before. And you know it's one of Big Bro's favourite tools to use
|
||
against us, to influence us. But do you know how it works? Do you know how it
|
||
gets inside of your brain? It's brainwashing. It's out and out mind control,
|
||
just as much as any other technique that relies on technology. Hell, your
|
||
television and radio are both technologies that can be used to spread
|
||
propaganda. They're part of the machine. They're tools. Computers are also
|
||
tools. Nothing is completely good, or completely pure. Almost any type of
|
||
technology can be used against us by Big Brother. Nothing is entirely
|
||
beneficial and harmless. Nothing.
|
||
|
||
Obviously, the answer to the first question of who's driving the propaganda
|
||
machine is Big Brother. They're in the driver's seat. They're at the helm.
|
||
They're pulling the levers, hitting the switches and pushing the buttons. And
|
||
they're pulling the strings too. But not all of us are naive puppets, and so
|
||
easily controlled by the propaganda machine. We aren't all zombies, yet.
|
||
|
||
The reasons for wanting to spread lies, disinformation and misinformation are
|
||
simple. It keeps us from knowing the truth. It influences the public to think
|
||
they know what Big Bro wants them to know. It throws them off track. It keeps
|
||
them blind and in the dark. It keeps them down. It keeps them ignorant. It's
|
||
a barricade that keeps them out of the loop. They can't get at the inside
|
||
information. They can't get the real stuff, the truth. They can only feast on
|
||
the lies. They can only rely on what they've read, heard, or been told. And
|
||
many of them believe it, without question.
|
||
|
||
The actual propaganda machine is media. And I don't just mean mass media
|
||
publications, broadcasts and the the various media organizations and outlets in
|
||
the world. That is, even though the mass media has always been one of Big
|
||
Brother's closest allies... they aren't the entire propaganda machine. The mass
|
||
media is just the biggest part of the engine. It consists of much more than
|
||
the mainstream media sources and outlets. We're talking about a huge, worldwide
|
||
machine that can encompass even the smallest zines, pamphlets and leaflets.
|
||
Hell, propaganda can be something as small as a flyer that has been stuck
|
||
underneath the windshield wiper on your car. And it can be as big as a
|
||
government controlled, national television news station. It isn't that easy
|
||
to bring it to a halt either, unless you revolt and overthrow the government
|
||
behind it. Yes, that happens, but look at the damage that has already been
|
||
done by the time it's taken off the air. Ask a Russian about Stalin, and even
|
||
now, the older ones will still speak of him with reverence and respect. That's
|
||
propaganda at work, long after his death. Long after the demise of the machine,
|
||
the imagery it brainwashed people with can still live on.
|
||
|
||
Propaganda is often spread by word of mouth from person to person as well, in
|
||
the same way that rumours are. This method isn't as slow as you may believe.
|
||
If people are already prone to believe something, they'll spread it like
|
||
wildfire throughout their area. And in turn, the people they tell will be
|
||
likely to do the same. It continues from there until entire cities believe
|
||
something that's entirely false.
|
||
|
||
Things have changed drastically in the last century though, with the advent
|
||
and widespread use of technology such as television, radio, etc. And of course,
|
||
now there's the Internet, and people have high speed digital connections to the
|
||
rest of the world. And so, that just means propaganda can be spread even
|
||
quicker than in previous generations. A wired world aids the spread of
|
||
propaganda more than anything else. Technology only enables propagandists to
|
||
spread their lies anywhere and everywhere in what equates to a millisecond.
|
||
Propaganda at the speed of light. Broadband bandwidth for propagandists
|
||
everywhere baby. That's where it's at. Now anyone can spread their message,
|
||
and reach anywhere on the globe with it, faster than previously imagined.
|
||
|
||
Propaganda is, and always has been, a powerful force. It's a tool of choice for
|
||
governments across the globe. It is, without a doubt, one of the oldest forms
|
||
of misleading people. And it has been a proven means of swaying public opinion
|
||
and creating popularity in order to obtain power and control. Certain political
|
||
parties (past and present) perfected the use of propaganda to the degree that
|
||
they could attain whatever power they wanted, and do whatever they wanted, with
|
||
very little opposition. In fact, the holocaust during WWII was due in no small
|
||
part to propaganda. Yes, propaganda can lead to massacre. Once mastered, it
|
||
can influence people to do anything. A well oiled propaganda machine can kill
|
||
and slaughter anyone in its path, very easily. The corpses it leaves in its
|
||
wake aren't even speed bumps. They don't slow it down at all. It just rolls
|
||
on and on. Usually counter-propaganda and physical force are all that can stop
|
||
it once it gets going. Propaganda warfare. That can be just as dangerous in
|
||
an unstable world. So, the next time you read something, consider the machine
|
||
that might be at work behind it. Rolling... rolling. Churning and burning.
|
||
|
||
Written by BLACKENED / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
Hacker Culture.
|
||
|
||
To paraphrase what Erik Bloodaxe once wrote in Phrack during his editorship,
|
||
technical articles aren't as memorable as hacker culture. And long after they
|
||
were written, they aren't usually very useful either. Most often they're
|
||
virtually obsolete as you would be hard pressed to find an active, working
|
||
system around that they describe a decade or more after they were written. But
|
||
the articles on people, the stories and the hacker lore survive years, and even
|
||
decades after they're written. In this article, I'm going to attempt to explain
|
||
why, as well as give my own opinions on hacker culture, past, present and
|
||
future.
|
||
|
||
Hacker culture grows and evolves like everything else. In hacking, it's the
|
||
people that make it interesting, and the people that are remembered. Of course,
|
||
many of those people are involved in groups, have web sites, and contribute to
|
||
zines, etc. And so that's an important part of hacker culture as well.
|
||
|
||
Stories and memories are what keep things alive. A well known hacker may decide
|
||
to quit the scene, but they'll forever be remembered by alias and/or by name
|
||
by the many people that remain active in it. They'll also be survived by the
|
||
things they wrote during their time in the h/p scene. The same goes for hacker
|
||
groups and zines. They may be retired, but they'll still exist electronically.
|
||
They'll still be remembered by people, if they were memorable to begin with.
|
||
Hell, there are several 1980s groups that people still talk about today, and
|
||
zines from that era that are still read. They don't just disappear and fall
|
||
into the abyss. They don't fade away that quickly and easily. Hacker culture
|
||
survives from generation to generation. And that's actually a good thing. We
|
||
shouldn't allow the past to just be forgotten. It's important to document and
|
||
preserve the past. Credit should be duly given to anyone that does that.
|
||
|
||
Why does hacker culture, and the past survive? The simple answer is, it's
|
||
difficult to kill a legend. For example, a group that receives a lot of
|
||
publicity, notoriety, and is involved in many well known events, scandals,
|
||
rumours, has members part of famous hacks, crackdowns, busts, and whatever
|
||
else is bound to be the topic of many conversations. Hype about them is
|
||
inevitably created. Stories are told and retold. They're passed from person
|
||
to person, and their name survives. The members might move on to different
|
||
things, but their association with a long lasting group isn't severed. The
|
||
same goes with certain popular zines. The editors become linked to that zine.
|
||
The mere mention of their alias automatically makes you think of the zine that
|
||
they created, or were the editor of. They go hand in hand. The same applies
|
||
to people that were involved with well known hacker groups. If someone says
|
||
that alias, you think of the group they were in. It's word association. In
|
||
some cases, you can't think of one without thinking about the other.
|
||
|
||
Here are a few things worth mentioning and commenting on:
|
||
|
||
LOD Communications started a project of documenting the history of many
|
||
underground hack/phreak boards in 1993. Although LOD wasn't able to gather
|
||
together as many complete message bases from all the boards they had hoped,
|
||
they did manage to put out quite a bit of very interesting, nostalgic material
|
||
from several well known boards from the 80s, such as Phoenix Project, Black Ice,
|
||
etc. And so, they did preserve some of that history, which is cool.
|
||
|
||
Jason Scott of www.textfiles.com fame has done an excellent job of preserving
|
||
files that might otherwise have been forever lost. He maintains a huge archive
|
||
of t-files, including those released by individuals, groups and has an extensive
|
||
collection of zines. Massive site... and massive props should go out to him
|
||
for the tremendous work he's put into it.
|
||
|
||
scene.textfiles.com also does a great service by providing information regarding
|
||
the release of new zines and new issues of zines, etc. Gotta get your ascii
|
||
fix. ;)
|
||
|
||
cDc (Cult of the Dead Cow) has been a fixture in the hacking scene since 1984.
|
||
Along the way, they've done a great deal to preserve the "old sk00l" scene,
|
||
and are still releasing ascii text cDc issues after all these years... which
|
||
is damn cool. To say the least, they have managed to bring the best of both
|
||
old and new together, into a fine blended mix. ;) In all seriousness, when
|
||
you think of t-files and electronic zines... how can you *not* think of and
|
||
mention cDc? They're so synonymous with each other, so interlinked that it
|
||
would be blasphemy to write an article on Hacker Culture, and fail to mention
|
||
Cult of the Dead Cow in it. But, in the interest of brevity, if you want
|
||
more insight on cDc... and its culture, read the interview in this issue with
|
||
G. Ratte'.
|
||
|
||
I decided to write this article because hacker culture really interests me.
|
||
In fact, I'm more interested in the culture than ever before... perhaps more
|
||
than all of the technical aspects of hacking, and latest techniques, etc.
|
||
To be honest, I'm not exactly sure of all of the reasons for finding it so
|
||
interesting. I just find it to be a fascinating culture. In terms of cultures,
|
||
it's a relatively new one. It has only been around for decades, and not
|
||
centuries. It's still changing and evolving at a rapid pace. It's still fresh
|
||
and exciting. And it has some of the most unique, strange, amazing characters
|
||
and personalities of any culture. Very few, if any, cultures have the diversity
|
||
in individuals, or true individuals for that matter, as this one. It is,
|
||
without a doubt, a culture of thinkers, inventors, innovators and engineers.
|
||
It's filled with brilliant people. If nothing else, hackers are a truly unique
|
||
group. They forge ahead, pressing technology forward, pushing the limits,
|
||
advancing their knowledge, even when faced with overly harsh legal consequences.
|
||
They've managed to accomplish a huge amount in the few short decades that the
|
||
world has had computers as a tool. Yes, that's right, computers are just a
|
||
tool. They don't inspire me to write, even though I use one to write and
|
||
distribute material with. So, there you have it; hacker culture without it
|
||
being written about by a paid journalist who's uninterested in it and doesn't
|
||
really give a fuck what it is, and how it is presented or preserved.
|
||
|
||
Written by BLACKENED / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
Democracy: Believe what I say.
|
||
|
||
Is that really democracy? What happened to the whole freedom of speech and
|
||
expression part of our Constitution? Well, the fact is, that doesn't seem
|
||
to mean shit these days. Political correctness has all but abolished people's
|
||
ability to accept that freedom means NOT ALWAYS FUCKING HEARING, READING AND
|
||
SEEING WHAT YOU WANT! Democracy is basically non-existent now though. What
|
||
about the good old US of A you say? What about the land of the free? Love it
|
||
or leave it right? There, I said it. That's what this is all about in a
|
||
sentence.
|
||
|
||
If you criticize a country, especially the one you live in, and others falsely
|
||
believe that it's free... and you disagree (as you should be your right to do
|
||
in a *free* country), they get all upset. Some of them become so enraged,
|
||
they'll start yelling and tell you to "get the fuck outta the country if you
|
||
don't like it." and use the old cliche of "USA: Love it or leave it." Yeah,
|
||
whatever. There's so much freedom that if you don't love it, or if you're
|
||
critical of parts of it, you're told to leave? Is that freedom? It's the old
|
||
dictatorship rule of, disagree with us and what we think and you're not welcome.
|
||
Well, not welcome could mean, executed in many cases. But, the same logic
|
||
applies. Is that the type of "democracy" you want to live in? A country in
|
||
which if you disagree with something, or are critical of a policy, or a
|
||
government, the popular opinion is that you're "anti-America" and thus, you
|
||
should leave? Do you want to be forced to leave? Honestly, I don't think
|
||
that's that far off. If many people had their way, that's how it'd be.
|
||
|
||
Is a "democracy" a place where everyone agrees? Is it a place where everyone
|
||
loves everything about it? Is it a place where if you disagree with a law or
|
||
a public policy, you're in the wrong? Is it a place where you're not supposed
|
||
to voice your opinions and views on things? Is that freedom?
|
||
|
||
If you want to be free, speak out. Make yourselves heard before it's too
|
||
fucking late. Make damn sure that freedom of speech means what it says.
|
||
Freedom doesn't mean thinking what you're told, and doing whatever you're told.
|
||
It means you have a right to your beliefs! Don't let anyone take that power
|
||
away and change the definition of freedom. And please, don't live under the
|
||
false assumption that your rights and freedoms are protected. They aren't.
|
||
Sad but true.
|
||
|
||
America deserves better than that type of ignorant attitude, which is about
|
||
following popular opinion. This country was *built on* differing opinions and
|
||
viewpoints. It was founded on freedom for the individual. But each and every
|
||
day, democracy is slipping away.
|
||
|
||
Written by Blackie Lawless / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
censorthisshit
|
||
|
||
Say that a few times really fast. Sounds like censorship doesn't it?
|
||
|
||
Marijuana is a gateway drug. Everything you know is a lie. The truth is out
|
||
there. Tomorrow is another day. Develop a taste for mainstreamness, pop
|
||
culture, cliches, consumerism, commercialism, advertisements and propaganda.
|
||
|
||
Stare blankly at your television screens. Those idiot boxes won't turn you into
|
||
zombies. They're just a tool. The medium is the message? @!#$ that. The
|
||
medium is electronic. But this is the message. The message is the message,
|
||
not the medium I'm using to send it out! However I choose to say something
|
||
doesn't become the message. The message *is* the message and *remains* the
|
||
message. The medium is inconsequential. The words are still mine. And the
|
||
message has the same meaning regardless of the medium used to broadcast it.
|
||
|
||
You can pretend propaganda doesn't exist. You can pretend hypocrisy doesn't
|
||
exist. You can pretend censorship doesn't exist. You can ignore it all. You
|
||
can pretend it doesn't bother you. You can be indifferent. You can be against
|
||
it in your mind, and be complacent. But the reality is, it does @!#$ing exist.
|
||
It's all around you. It has infiltrated every facet of your lives. It's
|
||
everywhere, around every corner of "society".
|
||
|
||
Some people claim to be above it. Some proclaim themselves to be
|
||
anti-censorship, and yet they censor what others write in the forums on their
|
||
web sites. Hypocrisy and censorship aren't just in a marriage of convenience,
|
||
they're soul mates.
|
||
|
||
Some people boldly claim they're against propaganda and aren't influenced by
|
||
it. They pretend it doesn't affect them. They're living a lie, thinking they
|
||
don't believe propaganda, and can always distinguish it from the truth. The
|
||
fact is, you can't. Not always. No one can. Our minds aren't wired that way.
|
||
Every piece of information you take in can be analyzed and stored, but we don't
|
||
have filters to remove all the propaganda we're continually being fed. It's
|
||
only natural that some of it is absorbed, believed as truth, and stored for
|
||
future reference. And so, it exists in your mind. Once there, it can be spread
|
||
further. Think of it as being a time bomb. Tick. Tick.
|
||
|
||
Of these things, censorship is probably the easiest to fight. Well, at least
|
||
in western nations. In countries such as China, it is obviously much more
|
||
difficult to combat, as the stakes are a lot higher, and the people actively
|
||
involved in campaigns that oppose censorship are pursued vigorously and
|
||
imprisoned. We don't have that threat hanging over our heads here, yet.
|
||
Therefore, we should do even more to fight against it. Think of it as a
|
||
struggle for freedom. Not just for freedom of speech, but for the freedom of
|
||
all ideas, thoughts, beliefs, and expression.
|
||
|
||
Why must we battle against the proliferation of censorship? Personally, I don't
|
||
want to live in a "society" that actively promotes restrictions and limitations.
|
||
I don't want to be controlled, and have my words controlled. Many substances
|
||
are already controlled by governments already...
|
||
|
||
Ahhhhhh... @!#$ history and culture and truth and freedom. It's all @!#$ing
|
||
@!#$ed up and @!#$ anyway right?
|
||
|
||
Do you know what would be really cool? We should try to eliminate words
|
||
entirely. You know, like in Orwell's novel, 1984. Without the words, people
|
||
couldn't speak out. Hell, people wouldn't even be able to think dissident
|
||
thoughts anymore. Thoughts would be censored. Everyone would be kept in check.
|
||
We'd all be the same, thinking and talking the same. Sameness would be the
|
||
order of the day. Sameness would rule. Big Brother would be victorious. And
|
||
the zombies could all live in @!#$ing ignorant bliss.
|
||
|
||
That isn't the type of world I want to live in, where words are chosen for you,
|
||
changed for you, and your speech is at someone else's discretion. What you say
|
||
should be how you want it said. What you want to expression should be the way
|
||
you want to express it. Yes, that's idealistic. But so @!#$ing what! Once
|
||
censorship takes hold and becomes the accepted way, you'll soon see more than
|
||
"swear" words and "slang" disappearing from the vernacular. You will many
|
||
limitations put on languages, and our means of expression ourselves verbally
|
||
will be restricted by virtue of less choice in vocabulary. And I say, @!#$
|
||
that! My thoughts and words are my own and will remain that way.
|
||
|
||
It's so @!#$ing ignorant to tell someone else how to express themselves. And
|
||
saying that swearing and using obscenities is a sign of ignorance, is even
|
||
worse. The old holier than thou, judgmental attitude. The "I'm better than
|
||
you" or "I'm above you" @!#$. @!#$ that. @!#$ it. @!#$ it all.
|
||
|
||
Written by BLACKENED . Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
You Can Hack Their Computers, But Can You Hack Their Minds?
|
||
|
||
By: Yogini Bare (hermes23w@disinfo.net)
|
||
|
||
Sure, hackers are a breed above because as long as they're hackers, they haven't
|
||
been caught, and as long as they haven't been caught they've got something up on
|
||
the system. Hacking is an evolutionary response to a system that doesn't work, a
|
||
force preying off of the system and evolving with it like any living organisms.
|
||
It's a relationship that depends on opposition, but the hacking/phreaking
|
||
communities wouldn't have a rallying point if not for the corrupt and decadent
|
||
meglo-monopolies that crowd out competition that isn't smarter, faster, and more
|
||
willing to operate outside the box. Nor would the mainstream have a decent
|
||
incentive for growth if it weren't for those people testing the limits of
|
||
established technological boundaries. The mutual struggle for the upper hand
|
||
sharpens the skills of hackers and mainstream techies alike. The question I pose
|
||
to the counterculture is though: Do we try so hard to oppose something that we
|
||
end up becoming it?
|
||
|
||
It's a normal scenario; the story of the undercover cop who gets to liking the
|
||
perks of the underworld or, on the opposite extreme, the ex-SLA bomber who
|
||
turned into a well-to-do socialite (until the Feds caught up with her).
|
||
Immersion is a common way to influence people because humans tend to adapt to
|
||
their surroundings, especially under the pressure of threatening situations. It
|
||
can be a situation where a person becomes assimilated into their surroundings to
|
||
"fit in" or reduce hostility, or it could be the immersion of a hacker
|
||
who studies their prey until they identify with it more than themselves. Either
|
||
way, pressure like that triggers the natural response of adaptation. That means,
|
||
the people now running ahead of the sociological pack are most vulnerable to the
|
||
influence of immersion for the very reason that they are most suited to
|
||
adaptation. Arrest can ruin a hacker for life, can take the spark of perpetual
|
||
evolution out of them because they learn quickly what the system can do with its
|
||
brute bully power. If those who are running ahead of everything choose to look
|
||
back, they have a good chance of being absorbed back into the very complacency
|
||
they were trying to get away from.
|
||
|
||
I propose we move forward.
|
||
|
||
It very well might be that Bill Gates is the most successful hacker to date
|
||
because by the time the government caught on to what he was doing, Micro$oft was
|
||
too big to stop. Windows software has pervaded a lot of the computers in the
|
||
world just like any virus out there. The difference between it and what we would
|
||
traditionally think of as a virus is that Microsoft is predominantly a virus of
|
||
the mind, whereas what hackers cook up is only a virus for the electronics.
|
||
People want what ol' Billy has, but the resistance people put up to a virus
|
||
makes the difference between a jail cell and the Microsoft mansion.
|
||
|
||
By packaging ideas in a way that makes people want it, you serve yourself as
|
||
well as everybody else. To the masses, if it looks like a duck and sounds like a
|
||
duck, then it's a little quacker and they'll accept it. However, inside the duck
|
||
you can put anything you want because its only a facade to get your ideas in.
|
||
Put a candy coating on LSD and mark a little "M" on the front and
|
||
people might actually go for it. Its effective because it opens up the holes in
|
||
peoples' heads so you can cram a little crap into them- without the chance of
|
||
getting your balls handed to you by the Feds because the system had recognized
|
||
you as a threat. Come on, isn't the whole revolt against the system because that
|
||
system has overspecialized and doesn't work? Why just stick to tech when a
|
||
combination of it and other skills would work better? We can be smart enough
|
||
that no one evens knows its hacking.
|
||
|
||
Imagine what could happen if instead of fighting something, you changed what
|
||
made you want to fight it all together. If you hacked into mass beliefs and made
|
||
them evolve, made them want to change, where would you be then?
|
||
|
||
Better ask ol' Billy...
|
||
|
||
|
||
REPORTS FROM THE FRONT - {REPORTS}
|
||
Propaganda reports delivered directly to your screen.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
CAMBRIDGE, MASS.
|
||
Internet Pioneer Sees Web becoming even better
|
||
|
||
Ten years after he created the World Wide Web, Tim Berners-Lee is nurturing it
|
||
into a gigantic brain, where databases get smarter and work together to solve
|
||
problems.
|
||
|
||
Berners-Lee terms it "the Semantic Web." To him, it's the second half of the
|
||
information revolution.
|
||
|
||
The Web is, of course, far from a finished product.
|
||
|
||
"It's still got lots and lots of room for evolution, expansion and enhancement,"
|
||
said Vinton Cerf, an Internet pioneer. "It's still very much in its infancy."
|
||
|
||
The Semantic Web is all about making more kinds of data easier for computers to
|
||
process -- and to locate. For instance, many databases have a column called
|
||
zip, which could refer to a U.S. postal code or a file stored in dot-zip format.
|
||
|
||
By adding meaning to those columns, computers can do a better job of searching
|
||
for information.
|
||
|
||
"Imagine then, if you extend it to all the tables publicly available in the
|
||
world, you can see it is very powerful," Berners-Lee said.
|
||
|
||
Such an approach could help computers understand that an automobile in
|
||
Massachusetts includes a car in Boston. Today, searching for autos in
|
||
Massachusetts might not produce the Boston car.
|
||
|
||
"The problems with search engines now is they don't understand any of the data
|
||
or information," he said.
|
||
|
||
But a smarter search engine is only a beginning. "It will automate all kinds of
|
||
things, and really the reason that you can't imagine it now is it will create
|
||
things you don't have now."
|
||
|
||
The Web consortium that Berners-Lee heads is currently building the blocks for
|
||
the Semantic Web.
|
||
|
||
At the base is the emerging extensible markup language, or XML, a way of tagging
|
||
information with hidden codes to enrich data on the Web and allow software to
|
||
automatically process instructions where human intervention was previously
|
||
required.
|
||
|
||
XML is only the first of several building blocks that make the Semantic Web
|
||
work, however. Other components include vocabulary, logic and validation.
|
||
|
||
Associated Press
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Friday December 22 9:35 AM ET
|
||
Egghead.com: Hackers Tap Into Systems
|
||
|
||
MENLO PARK, Calif. (Reuters) - Internet retailer Egghead.com Inc. (NasdaqNM:EGGS
|
||
- news) on Friday said that a hacker had accessed its computer systems, possibly
|
||
its customer database, and it is now taking steps to protect its customers'
|
||
credit card accounts and the security of the site.
|
||
|
||
The Menlo Park, Calif., company, which sells computer hardware, software and
|
||
other home and office products via the Internet (http://www.egghead.com), said
|
||
in a statement that it has retained an unnamed computer security firm to conduct
|
||
an investigation and inspect its security procedures.
|
||
|
||
Egghead did not say how it learned of the security breach. Nor did it say
|
||
whether any fraudulent purchases had been made or if any customer accounts had
|
||
been tampered with. Company representatives could not immediately be reached for
|
||
comment.
|
||
|
||
``As a precautionary measure,'' Egghead said in the statement, ``we have taken
|
||
immediate steps to protect our customers by contacting the credit card companies
|
||
we work with.
|
||
|
||
``They are in the process of alerting card issuers and banks so that they can
|
||
take the necessary steps to ensure the security of cardholders who may be
|
||
affected,'' it said, adding that it is also working with law enforcement
|
||
authorities, who are conducting a criminal investigation.
|
||
|
||
Copyright (C) 2000 Yahoo! Inc., and Reuters Limited. All rights reserved.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
December 20, 2000 8:16am
|
||
Kriz virus makes return appearance
|
||
By Robert Lemos ZDNet News
|
||
|
||
Kriz, a year-old computer virus, may be coming back for Christmas this year,
|
||
thanks to its ability to piggyback on other viruses and spread with them.
|
||
|
||
The Kriz virus, also known as the W32.Kriz, is based on the CIH virus, which
|
||
damaged computers worldwide when it was triggered on April 26, 1998. Anti-virus
|
||
software maker Symantec on Tuesday warned users to scan their computers before
|
||
Christmas and released a free tool to scan for the virus and remove it.
|
||
|
||
"Worms by their nature propagate pretty quickly," said Marian Merritt, group
|
||
product manager for Symantec. "And when they get on a computer with Kris, they
|
||
start spreading that."
|
||
|
||
Symantec and other anti-virus software already scan for the virus in their
|
||
stand-alone programs.
|
||
|
||
The Kriz virus spreads to a computer when the user opens up an infected file,
|
||
changing the basic program that runs the operating system, known as the kernel.
|
||
The virus also infects other programs on the computer's hard drive and any
|
||
mapped drives, leaving open the possibility that the virus could travel across
|
||
company networks.
|
||
|
||
Unhappy holiday
|
||
|
||
"Remember," said Symantec's Merritt. "It may have spread itself to all your
|
||
executables, but you are only a carrier of the virus. The real payload hits on
|
||
December 25."
|
||
|
||
When the virus triggers, it overwrites all files on the computer and then
|
||
attempts to erase the software foundation of the PC, known as the basic
|
||
input-output system, or BIOS. While the BIOS attack only occasionally works, the
|
||
other attacks can be extremely destructive.
|
||
|
||
Symantec-rival Trend Micro Inc. believes the virus would not spread very far,
|
||
but warns that its ability to combine with other viruses could change that.
|
||
|
||
Both Trend and Symantec reported that the virus has infected two other worms:
|
||
Happy99.worm -- also known as W32.Ska -- and W32.hllw.bymer.worm.
|
||
|
||
Slow, but steady
|
||
|
||
"Kriz is a destructive virus, but a really slow infector," said Joe Hartmann,
|
||
anti-virus researcher for Trend. "Yet, it's now infected a mass-mailer, so now
|
||
you have a destructive virus that's also a mass mailer." In the past 24 hours,
|
||
Kriz ranked No. 8 on Trend's Worldwide Virus Tracking Center in terms of how
|
||
many files the virus had infected. The tracking center is a real-time database
|
||
of the types of viruses found by the Trend's online House Call scanner.
|
||
|
||
In North America, the virus ranked No. 6 for file infected. Despite that, the
|
||
virus has not spread very widely yet, and is known to have infected about 50
|
||
computers in the last 24 hours. Because the tracking center only tracks viruses
|
||
that have infected users of Trend's online service, the actual number could be
|
||
much greater.
|
||
|
||
Historians take heed, however.
|
||
|
||
The Kriz virus is essentially a copy of the CIH virus, which was created in 1997
|
||
by Cheng Ing-Hau of Taiwan. CIH fizzled in its first year, and a variant that
|
||
struck every month died out quickly. However, the annual variant did
|
||
significantly more damage when it was triggered in April 1998.
|
||
|
||
Copyright (C) 2000 ZD Inc. ZDNet is a registered service mark of ZD Inc.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
InfoWorld names top 10 IT stories for 2000
|
||
|
||
From...
|
||
[InfoWorld]
|
||
|
||
by Elizabeth Heichler
|
||
|
||
(IDG) -- It was a year of failed dot-coms, mega mergers, love bugs and privacy
|
||
concerns. And it was a year that will not soon be forgotten by members of the
|
||
public -- or the IT community.
|
||
|
||
Here, in no particular order, are the top 10 IT news events of 2000.
|
||
|
||
Dot-com deathwatch
|
||
|
||
It turned out that old-economy values like sustainable business models --
|
||
offering products and services for which a reasonable number of people are
|
||
willing to pay money -- still hold true in the new economy. One after another,
|
||
companies that had burned through venture capital and IPO (initial public
|
||
offering) funds found that they couldn't go back to the well for more, and
|
||
without the cash they couldn't stay in business long enough to get money the
|
||
old-fashioned way, by earning it.
|
||
|
||
Music on the Net meets copyright law
|
||
|
||
Music available in digital form on the Internet emerged as a serious threat, not
|
||
just a theoretical worry, for the big record labels this year. Thanks in large
|
||
part to Napster's wildly popular service, free music-sharing on the Net exploded
|
||
from campus cult into courtrooms where industry lawyers tried to stuff the genie
|
||
back into the bottle. The lawsuit against Napster filed by the Recording
|
||
Industry Association of America (RIAA) in December 1999, made headlines before
|
||
even coming to trial as the plaintiffs sought an injunction to shut down the
|
||
popular peer-to-peer song-swapping service. While that case won't come to trial
|
||
until next year, MP3.com lost its court battle with the RIAA in May.
|
||
|
||
Regardless of the outcome of the Napster lawsuit, the music industry is now
|
||
painfully aware that the Internet has changed its business model forever.
|
||
|
||
Love Bug virus
|
||
|
||
May 4 was a bad day for systems administrators. Years of being told by the IS
|
||
department to be careful about opening e-mail attachments didn't prevent many
|
||
people from clicking on apparent "love letters," in many cases from senders
|
||
known to them. The virus-worm hybrid, which deleted victims' image files and hid
|
||
audio files, started its damage early in the day in Asia (turns out it
|
||
originated in the Philippines) and worked by using a Visual Basic script that
|
||
sent itself to all recipients in a victim's Microsoft Outlook address book, thus
|
||
spreading rapidly through businesses from East to West before IS staff were
|
||
aware of the threat. Security experts estimated that the Love Bug infected more
|
||
than half of U.S. large businesses and "tens of millions" of computers
|
||
worldwide. Prosecutors in the Philippines ultimately dropped charges against
|
||
Onel de Guzman, who was suspected of creating and disseminating the virus in
|
||
May, because the Department of Justice lacked a law under which it could charge
|
||
him.
|
||
|
||
FBI's Carnivore eats away at online privacy
|
||
|
||
A U.S. Federal Bureau of Investigation (FBI) technology, nicknamed "Carnivore,"
|
||
that the law-enforcement agency is using to uncover evidence in e-mail, raised
|
||
hackles among civil libertarians and privacy advocates when its existence came
|
||
to light this year. Carnivore, critics charge, doesn't meet guidelines governing
|
||
the use of wiretaps. Of particular concern are allegations that the software,
|
||
which the FBI has demanded be installed by some ISPs (Internet service
|
||
providers), is capable of capturing all unfiltered e-mail traffic, rather than
|
||
only e-mail going to people for whom the FBI has a wiretapping warrant. Last
|
||
month, an outside review of the technology showing that it does not overstep its
|
||
bounds was criticized as inadequate by privacy advocates.
|
||
|
||
UMTS auction gold rush in Europe
|
||
|
||
Like any good scheme, the first guys to hit on it got rich quick. But the folks
|
||
who came later to this money-making opportunity didn't have quite the same luck.
|
||
Who would have thought that offering licenses to telecommunication companies to
|
||
operate 3G (third-generation) mobile networks based on the UMTS (Universal
|
||
Mobile Telecommunications System) standard could be this lucrative for national
|
||
governments? First the U.K. extracted about $32 billion from four companies in
|
||
exchange for the privilege. Then the Germans cleaned up, getting $44.8 billion
|
||
in license fees. But things got messy in the Netherlands, where the state took
|
||
just $2.4 billion, and ugly in Italy. Analysts started to wonder how much of
|
||
this greed was good, and whether telecom companies would recoup these huge
|
||
investments. The Swedish government won praise for its bank-on-the-future rather
|
||
than take-the-money-and-run approach -- a modest administrative fee of about
|
||
$10,000 per applicant, but an annual tax on UMTS revenue of 0.15 percent.
|
||
|
||
Time for telecoms to shuffle the deck
|
||
|
||
For some, all that money spent in European UMTS auctions didn't help -- it
|
||
didn't make investors or bond-rating agencies happy. British Telecommunications
|
||
PLC's second-quarter profits reported last month were less than half the
|
||
previous year, thanks in part to the costs of acquiring licenses. The same day,
|
||
it announced a reorganization, following the example of both AT&T and Worldcom,
|
||
which both recently announced large scale organizational changes after seeing
|
||
their stock prices hammered. Worldcom President and Chief Executive Officer
|
||
Bernard Ebbers has had a rough year -- in June he had to drop his planned
|
||
acquisition of Sprint as both the European Union and the U.S. Department of
|
||
Justice apparently decided that some mega-mergers are just mega-anticompetitive.
|
||
|
||
AOL-Time Warner marries new media to old
|
||
|
||
Much earlier in the year, back in January, mega mergers were still in vogue and
|
||
new Internet money could still buy an institution like Time Warner. Based on the
|
||
$350 billion deal struck in January, America Online Inc. shareholders would own
|
||
55 percent of the new company, AOL Time Warner. Time Warner is the parent
|
||
company of CNN.com. The European Union has subsequently approved the deal, and
|
||
the U.S. Federal Trade Commission has now voted to unanimously approve it. The
|
||
merger still faces scrutiny by the U.S. Federal Communications Commission, which
|
||
experts suggest is a much lower hurdle for the companies to overcome. Executives
|
||
of the two companies had undoubtedly hoped the merger would be finalized earlier
|
||
since much has changed in the new -- and old -- media landscapes since they got
|
||
engaged in January.
|
||
|
||
L&H goes from poster child for European IT to poster child for bad behavior
|
||
|
||
For most of this year, Lernout & Hauspie Speech Products NV was the high-flying
|
||
voice technology company that Europeans could point to with pride as an example
|
||
of a home-grown yet industry-leading innovator in global IT. In March, L&H
|
||
solidified its leadership by agreeing to pay $592 million to buy out its U.S.
|
||
rival, Dragon Systems Inc. Then the bad news started to trickle out. In August,
|
||
a Wall Street Journal article raised allegations of accounting irregularities at
|
||
the company's Korean subsidiary. By September, the U.S. Securities and Exchange
|
||
Commission had begun an investigation of accounting practices. In November,
|
||
co-founders Jo Lernout and Pol Hauspie stepped down from their positions as
|
||
co-chairmen and managing directors. By the end of the month the company's new
|
||
chairman and chief executive officer had filed for bankruptcy, saying that they
|
||
had uncovered evidence of financial misreporting and other questionable
|
||
financial transactions, and that the filing was their only hope for protection
|
||
from creditors and legal claimants and for cleaning up the mess they inherited.
|
||
As of this writing, the company's assets have been frozen by a Belgian court.
|
||
|
||
Microsoft loses big in antitrust case
|
||
|
||
While no one expects the Microsoft antitrust case to be resolved anytime soon,
|
||
the U.S. Department of Justice beat the software giant in round one, the trial
|
||
in U.S. District Court. In April, Judge Thomas Penfield Jackson dropped the
|
||
first shoe: a conclusions of law finding that Microsoft maintained its monopoly
|
||
power by anticompetitive means and attempted to monopolize the Web browser
|
||
market in violation of the Sherman Antitrust Law.
|
||
|
||
In June, he kicked off the other loafer, ruling that Microsoft should be broken
|
||
into two companies and heavily regulated to stop its anticompetitive behavior.
|
||
Microsoft is appealing the decision, and the briefs are already flying in round
|
||
two. Will Microsoft even be relevant by the time the last court rules
|
||
definitively? Some industry observers see its influence waning.
|
||
|
||
Denial of service attacks hit the big time
|
||
|
||
In February, hackers drew attention to a form of Web site attack that's not
|
||
particularly elegant but effectively crippled some of the Web's biggest names,
|
||
including eBay, Amazon, CNN.com and Yahoo!, among others. These attacks worked
|
||
not by breaking into a target Web site but by overloading the router connecting
|
||
it to the rest of the Internet with so much fake traffic that it overloaded and
|
||
bonafide users were unable to connect to it. However, lots of systems did get
|
||
hacked to make this happen: thousands of unwitting users' systems had Trojans or
|
||
zombie software placed in them, which then launched the DoS attacks from those
|
||
machines. Computers most vulnerable to being used in DoS attacks are those that
|
||
are on and connected to the Internet all the time via high bandwidth access. A
|
||
Canadian teenager arrested in April for the DoS attack on CNN.com was considered
|
||
to be just a copy-cat, and the real masterminds of the February attacks may
|
||
never be caught. But the DoS threat is still real: anyone can get hit -- and it
|
||
can bring your online business grinding to a halt.
|
||
|
||
(C) 2000 Cable News Network. All Rights Reserved.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Report: Serious concerns remain over FBI's 'Carnivore' system
|
||
By Daniel Sieberg
|
||
CNN.com Technology Editor
|
||
|
||
(CNN) -- A prominent group of computer experts have released a critical
|
||
assessment of a recent independent review of the FBI's Internet surveillance
|
||
system, sparking further debate over its privacy and technological limitations.
|
||
|
||
The new report addresses a review of the "Carnivore" system by the Illinois
|
||
Institute of Technology's Research Institute (IITRI), which released a draft
|
||
report on November 17.
|
||
|
||
Although the authors of the latest report acknowledge the "good-faith effort" on
|
||
behalf of the IITRI, it says the scope of their review was not broad enough to
|
||
address all the pertinent matters.
|
||
|
||
"Those who are concerned that the system produces correct evidence, represents
|
||
no threat to the networks on which it is installed, or complies with the scope
|
||
of court orders should not take much comfort from the analysis described in the
|
||
report or its conclusions," the experts wrote.
|
||
|
||
Participants in the new report are listed as Steven Bellovin and Matt Blaze from
|
||
the AT&T Laboratories, David Farber from the University of Pennsylvania, Peter
|
||
Neumann from SRI International and Eugene Spafford from Purdue University.
|
||
|
||
The Justice Department initially contacted members of the ad hoc group in
|
||
September.
|
||
|
||
Specific technical concerns noted by the scientists include a lack of analysis
|
||
between the Carnivore code and its host environment and operating system,
|
||
inadequate discussion of the remote access provided by the use of the "PC
|
||
Anywhere" program, and no evidence of a systematic search for bugs or serious
|
||
errors. "PC Anywhere" is an application that allows computer professionals or
|
||
employees to connect to a network from a remote location.
|
||
|
||
The scientists went on to urge the Justice Department to publish the inner
|
||
workings of Carnivore for a public review, a request that has also been
|
||
suggested by several privacy advocate groups.
|
||
|
||
Using "sniffing" technology, the Carnivore system is installed at an Internet
|
||
service provider (ISP) to keep court-ordered tabs on a suspect's e-mail and
|
||
instant messages. It has already been used more than 25 times during criminal
|
||
investigations.
|
||
|
||
The FBI spokesman associated with Carnivore said the whole purpose of making the
|
||
IITRI draft report available for public scrutiny was to solicit opinion from
|
||
outside groups. He could not comment on how the scientists' information might be
|
||
applied.
|
||
|
||
When correctly used, the IITRI said Carnivore "provides investigators with no
|
||
more information than is permitted by a given court order."
|
||
|
||
A final report on Carnivore by the IITRI should be presented to U.S. Attorney
|
||
General Janet Reno later this month.
|
||
|
||
(C) 2000 Cable News Network. All Rights Reserved.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
FBI's 'Carnivore' spurs new e-mail cloaking programs
|
||
By Richard Stenger
|
||
CNN.com Writer
|
||
|
||
(CNN) -- As the debate rages over the FBI's e-mail surveillance system known as
|
||
"Carnivore," people are looking for new ways to protect the privacy of their
|
||
online messages. A few computer companies are offering solutions, but will they
|
||
work and will people use them?
|
||
|
||
The FBI's decision to outfit Internet Service Providers with hidden "black
|
||
boxes" to monitor the e-mail of criminal suspects has raised serious concerns
|
||
among ISPs and electronic privacy advocates.
|
||
|
||
In response, NetworkICE last week released a free, open source code alternative
|
||
to the secret FBI program called Altivore, which the computer security company
|
||
said would allow ISPs a less restrictive alternative than federal oversight.
|
||
|
||
Electronic freedom advocates have suggested that non-Carnivore clones would
|
||
satisfy the FBI, as long ISPs could provide the desired information about
|
||
criminal suspects.
|
||
|
||
Some Internet security computers have begun marketing what they call innovative
|
||
software that can circumvent programs like Carnivore.
|
||
|
||
AbsoluteFuture Inc. promises businesses the ability to send e-mail "without
|
||
leaving a data trace anywhere. E-mails ... self-destruct and vanish without a
|
||
trace from their hard drives and the hard drives of their recipients," said Anne
|
||
Taylor, a spokeswoman for the company.
|
||
|
||
Tony McNamara, chief technology officer of the company, said its product
|
||
SafeMessage counteracts Carnivore by eliminating readable headers from e-mail
|
||
messages. The FBI program cannot detect the e-mail without them, he said.
|
||
|
||
Other e-mail security products have stepped up marketing in the wake of the
|
||
Carnivore debate as well.
|
||
|
||
"I know that one company has taken out a lot of advertisements," said Robert
|
||
Graham, chief technology officer NetworkICE and the creator of Altivore.
|
||
|
||
Graham said he made Altivore not to sell but to make two points: that ISPs
|
||
should regulate themselves and that the Carnivore program is technologically
|
||
unremarkable.
|
||
|
||
Similarly, he said any new product that promises to circumvent Carnivore likely
|
||
doesn't represent a major advance.
|
||
|
||
"E-mail cloaking has been around for awhile. There will always be ways that
|
||
people can evade e-mail detection systems," he said.
|
||
|
||
Private e-mailers have had access for years to cloaking applications like Pretty
|
||
Good Privacy, or PGP, an open source code used to encrypt e-mails, or others
|
||
that use anonymous relays to hide the tracks of e-mail correspondences.
|
||
|
||
But such features are generally difficult or inconvenient to use, which has
|
||
discouraged their widespread use, according to Graham.
|
||
|
||
"I won't be impressed by these programs until people use them," he said.
|
||
|
||
McNamara said SafeMessage does require the use of a password. And both the
|
||
sender and receiver must have the software. But, he said the product is easier
|
||
to use than typical e-mail applications.
|
||
|
||
McNamara said it was not meant to encourage illegal activity. His company would
|
||
comply fully with authorities during any investigation.
|
||
|
||
Using court orders, the FBI controls Carnivore from a remote location to monitor
|
||
and retrieve e-mail messages of criminal suspects. It has been used in about 25
|
||
investigations in the last year, including criminal cases and "national
|
||
security" cases involving counter-intelligence or counter-terrorism.
|
||
|
||
The FBI and the Justice Department maintain that strict oversight by the courts
|
||
would prevent abuses of the system. The pledge has failed to assure electronic
|
||
privacy activists that only legitimate uses would take place.
|
||
|
||
(C) 2000 Cable News Network. All Rights Reserved.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Mafiaboy arrested again
|
||
Canadian teen charged in attacks on high-profile Web sites
|
||
By Will Knight, ZDNet UK
|
||
|
||
Dec. 7 - The teenager alleged to have jammed some of the largest sites on the
|
||
Internet earlier this year has been arrested in Canada for violating his bail.
|
||
|
||
THE 16-YEAR-OLD alleged hacker, who cannot be named under Canadian law but uses
|
||
the online moniker <20>Mafiaboy<6F>, was originally arrested 19 April, accused of
|
||
launching distributed denial of service (DDoS) attacks on CNN, eBay, Yahoo! and
|
||
others in February.
|
||
|
||
Mafiaboy has again been arrested by Montreal police for violating bail by
|
||
playing truant from high school, according to the Associated Press.
|
||
|
||
A DDoS (distributed denial of service) attack takes an old hacking trick to a
|
||
new level. By taking over an army of remote machines connected to the Internet,
|
||
an assailant is able to bombard a site with a tidal wave of fake requests that
|
||
is impossible to stop.
|
||
|
||
The FBI arrested Mafiaboy after investigating chat room logs and computers at
|
||
the University of California.
|
||
|
||
(C) 2000 ZD Inc. All Rights Reserved. ZDNet and
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Microsoft Web server hacked
|
||
Company says attacker broke in, but server was nearly empty
|
||
By Bob Sullivan
|
||
MSNBC
|
||
Nov. 6 - Microsoft on Monday confirmed reports that a computer attacker was able
|
||
to hack into one of its Web servers. But according to spokesperson Adam Sohn,
|
||
the break-in was limited to a single server that was in the process of being
|
||
retired, and it did not pose a risk to Microsoft's main servers.
|
||
|
||
|
||
THE BREAK-IN WAS first reported by the IDG News Service. According to the
|
||
report, a Dutch hacker named "Dimitri" took advantage of a bug that was patched
|
||
by Microsoft on Oct. 17 - the so-called Unicode vulnerability.
|
||
|
||
(MSNBC is a Microsoft - NBC joint venture.)
|
||
|
||
The Web server that was hacked, events.microsoft.com, had essentially no content
|
||
on it and is used merely to redirect visitors to another Web server, Sohn said.
|
||
Microsoft had not yet applied its patch to the server.
|
||
|
||
"Obviously we like to stay on top of these things," Sohn said. "But it's a
|
||
challenge when you have a large, complex network....This one slipped through the
|
||
cracks."
|
||
|
||
[Slipped through the cracks... Classic. That's priceless.]
|
||
|
||
According to IDG, the attacker was able to temporarily upload a small text file
|
||
onto events.microsoft.com, and claimed to have downloaded files containing
|
||
administrative user names and passwords to the server.
|
||
|
||
Sohn said the company believed those passwords would only have allowed access to
|
||
the individual Web server that was attacked, and could not be used to attack
|
||
other parts of Microsoft's network.
|
||
|
||
Friday's break-in occured one week after a much more serious breach of
|
||
Microsoft's network was announced. In late October, Microsoft revealed an
|
||
attacker had managed to plant a Trojan horse on company systems. The company
|
||
called it an act of "corporate espionage," and publicly speculated that source
|
||
code for its more popular programs may have been stolen.
|
||
|
||
Sohn said the two break-ins were completely unrelated.
|
||
|
||
"Comparing them would be like comparing apples and oranges," he said.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
SafeNet 2000
|
||
By Gene Johnson
|
||
|
||
The Associated Press
|
||
R E D M O N D,
|
||
|
||
Wash., Dec. 8 - For the next generation of the Internet to thrive, people must
|
||
be able to trust it, Microsoft Chairman Bill Gates told computer experts at a
|
||
conference on improving Internet privacy and security.
|
||
|
||
Gates delivered the keynote address Thursday at SafeNet 2000, a two-day summit
|
||
of 225 privacy and security experts at Microsoft's suburban campus. He touted
|
||
the next version of his company's Windows operating system, which will have the
|
||
ability to inform customers when Web-based companies have different ideas about
|
||
privacy than they do.
|
||
|
||
[Gates addressing security... What next, Larry Flynt preaching?]
|
||
|
||
"As you go to these different Web sites, you ought to be able to know what the
|
||
policy of that Web site is," Gates said.
|
||
|
||
[And what about the sites you own and operate Billy?]
|
||
|
||
"It is more important than ever that our industry gives customers the assurance
|
||
that their information will remain secure, respected and private."
|
||
|
||
[*dies laughing* at the hypocrisy in Bill Gates saying that.]
|
||
|
||
Focus on Security and Privacy Microsoft called the summit to determine what
|
||
people have learned so far about the young fields of Internet security and
|
||
privacy, and to figure out what the information technology industry needs to do
|
||
next.
|
||
|
||
Gates said that for now, self-regulation is key. While government should have a
|
||
role in responding when companies misuse customer data, Gates said, it's too
|
||
soon for government to code privacy standards into law because the field could
|
||
change greatly over the next year.
|
||
|
||
In the meantime, companies must make software that helps customers use the Net
|
||
without compromising private information, such as credit card numbers, Gates
|
||
said. Web sites should also state clearly how they use data gathered from
|
||
customers and should have programs that automatically fix weaknesses that could
|
||
be exploited by hackers, he said.
|
||
|
||
[Always with the hackers Gates. Always talkin' about hackers. Snip...]
|
||
|
||
Copyright 2000 The Associated Press. All rights reserved.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Notorious or Desperate?
|
||
Economic Woes Encourage Fabled
|
||
"Khackeri"
|
||
|
||
By Jim Heintz
|
||
|
||
The Associated Press
|
||
|
||
M O S C O W, Nov. 20 - While the international space station brings new renown
|
||
to Russia, the nation is gaining a darker sort of notice from other explorers -
|
||
hackers who launch into cyberspace.
|
||
|
||
Russia's reputation as home to some of the world<6C>s most gifted and devious
|
||
hackers was underscored last month when Microsoft Corp. disclosed that passwords
|
||
used to access its coveted source code had been sent from the company network to
|
||
an e-mail address in St. Petersburg.
|
||
|
||
It is by no means clear whether a Russian was behind the break-in <20> that e-mail
|
||
account could have been managed remotely. But that doesn't stop Russian hackers
|
||
- "khakeri," or "vzlomshchiki (house-breakers)" - from puffing out their chests
|
||
at such exploits.
|
||
|
||
Bragging Rights?
|
||
|
||
In a recent poll on a hacker-oriented Web site, 82 percent said Russia had the
|
||
world's best hackers; only 5 percent said Americans were better.
|
||
|
||
But the bravado is laced with frustration.
|
||
|
||
Hackers are motivated as much by a lack of opportunity in economically
|
||
struggling Russia as by criminal leanings, people inside and outside the hacker
|
||
community say.
|
||
|
||
Sergei Pokrovsky, editor of the magazine Khaker, said that hackers in his circle
|
||
have skills that could bring them rich salaries in the West, but they expect to
|
||
earn only about $300 a month working for Russian companies.
|
||
|
||
Russian higher education traditionally has been strong in mathematics, a skill
|
||
at the core of hacking, but the Russian market offers few employment
|
||
opportunities to such knowledgeable people, said Mikko Hypponen, manager of
|
||
anti-virus research at the Finnish company F-Secure.
|
||
|
||
"They have too much time on their hands," said Hypponen, whose company highly
|
||
values the Russian computer experts it employs.
|
||
|
||
Russians have been behind several high-profile - and sometimes highly lucrative
|
||
- hacking cases. There was the cyberthief known as "Maxus" who stole credit-card
|
||
numbers from Internet retailer CD Universe earlier this year and demanded a
|
||
$100,000 ransom. When denied the money, he posted 25,000 of the numbers on a Web
|
||
site. Maxus was never caught.
|
||
|
||
Mathematician Vladimir Levin was caught and in 1998 was sentenced to three years
|
||
in prison in Florida for a stunning invasion of the Citibank system in which he
|
||
pilfered $12 million by transferring digital dollars out of the bank's accounts.
|
||
|
||
Russians are also believed to be behind the 1998 theft of Global Positioning
|
||
System software, used for missile-targeting, from U.S. military computers.
|
||
|
||
Victims as Well as Perps
|
||
|
||
Russian companies occasionally fall victim to hackers, too. Last year, hackers
|
||
got into the computers of Gazprom, the Russian natural gas monopoly that also
|
||
supplies much of Europe and took brief control of the central supply
|
||
switchboard; officials wouldn't say whether there were service disruptions.
|
||
|
||
Incidents of avarice and meddling in critical computer systems have raised
|
||
concern that some hackers who hail from Russia are affiliated with its extensive
|
||
organized-crime groups.
|
||
|
||
Pokrovsky, for one, rejects such speculation.
|
||
|
||
"Nonsense, complete nonsense," he said. "For example, I personally know Maxus
|
||
and he isn't in any crime group. He's a very good specialist who understands
|
||
systems very well."
|
||
|
||
The psychology of hackers can be as elusive as their identities, however. Of
|
||
course some say their actions are just an offshoot of exuberance, that they are
|
||
chiefly benign interlopers.
|
||
|
||
Take the hacker known online as NcRoot. He says his first name is Alexander and
|
||
that he's a 17-year-old student interested in Web site design.
|
||
|
||
"Sure, there may be people who do this for the sake of money and who have small
|
||
salaries," he wrote in response to e-mailed questions, saying he believed most
|
||
Russian hackers do it for the challenge of exposing security flaws.
|
||
|
||
"Fix in your mind, we just want to help you," a hacker group wrote to the
|
||
Webmaster of an online music site they hacked into this year. NcRoot was among
|
||
the hackers.
|
||
|
||
Trying to Assess Economic Damage While it's impossible to estimate the economic
|
||
damage Russian hackers may inflict through theft and mischief, indicators
|
||
suggest the sums are enormous. Many of the Internet's so-called "warez" sites,
|
||
in which pirated computer software is made available, are set up by Russians.
|
||
|
||
A study by the Business Software Alliance, an international industry trade
|
||
group, said that in 1999, pirates cost software makers $165 million in
|
||
legitimate revenues. The study said 89 percent of business software distributed
|
||
in Russia that year was pirated.
|
||
|
||
Law enforcement efforts have been weak. The Interior Ministry division
|
||
specializing in computer crimes said this year that 200 arrests were made in the
|
||
first three months of the year, up from just 80 in all of 1998. But that rise
|
||
could reflect increased police effectiveness rather than a growth in crimes. "It
|
||
means we are getting better and better," said Anatoly Platonov, spokesman for
|
||
the Interior Ministry's "Division R," which handles computer crimes. Platonov
|
||
did not provide many specifics, however, such as how many people work for the
|
||
computer-crimes division.
|
||
|
||
[snip...]
|
||
|
||
Hypponen said Russian hackers need to be concerned about negative stereotypes.
|
||
|
||
Although his company has recruited workers from the Russian talent pool, "some
|
||
customers are uneasy about having development done by Russians," he said.
|
||
|
||
Copyright 2000 The Associated Press. All rights reserved.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Suspected Hacker Arrested Minn. Man Allegedly Hacked Into Nuke Lab Computers
|
||
The Associated Press
|
||
S A N F R A N C I S C O,
|
||
|
||
Sept. 12 - A man suspected of hacking into a computer at a nuclear weapons
|
||
laboratory last year was arrested Monday. Benjamin Breuninger, 21, was taken
|
||
into custody by federal agents at his Minnesota home on a charge of unauthorized
|
||
access of a protected computer and recklessly causing damage.
|
||
|
||
He was released Monday on $25,000 bail after appearing in federal court in
|
||
Minneapolis. No plea was entered. Prosecutors are working to bring him to
|
||
California.
|
||
|
||
He was indicted Friday by a federal grand jury in Oakland for breaking into a
|
||
computer at the Lawrence Livermore laboratory run by the University of
|
||
California.
|
||
|
||
"Fortunately, he didn't access secret or classified government documents, but he
|
||
did gain access to the lab's administrative network and disrupted the use of
|
||
it," said FBI spokesman Andrew Black.
|
||
|
||
The two November hacking incidents caused an estimated $50,000 in damage and
|
||
took about a week to fix, Black said.
|
||
|
||
A public defender representing Breuninger said his client has no criminal
|
||
history.
|
||
|
||
"But since this happened almost a year ago, it appears to me that this wasn't a
|
||
dire national emergency that needed an immediate response," Scott Tilsen said.
|
||
"If it was a significant crime, I don't think he would have walked right out of
|
||
court."
|
||
|
||
Copyright 2000 The Associated Press. All rights reserved.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
'Mafiaboy' granted bail
|
||
WebPosted Tue Dec 19
|
||
17:27:21 2000
|
||
|
||
MONTREAL - The Montreal teenager accused of being 'Mafiaboy' has been granted
|
||
bail again. He is waiting to go on trial for allegedly hacking into major
|
||
international Web sites.
|
||
|
||
The teen had been in jail for two weeks because he broke bail conditions by
|
||
misbehaving at school.
|
||
|
||
He regained his freedom when a court heard that he has left school and plans to
|
||
hold down a full-time job.
|
||
|
||
The teen has pleaded not guilty to 66 computer-hacking and mischief charges. His
|
||
trial will begin on March 5.
|
||
|
||
Copyright (C) 2000 CBC. All Rights Reserved
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
By Sascha Segan
|
||
[ABCNEWS.com]
|
||
|
||
Oct. 27 - Someone broke into Microsoft's network and accessed the basic codes
|
||
for the company's latest software, Microsoft president Steve Ballmer said today.
|
||
|
||
"They did in fact access the source codes," Ballmer said from Stockholm, Sweden.
|
||
"You bet this is an issue of great importance. I can also assure you that we
|
||
know that there has been no compromise of the integrity of the source codes,
|
||
that it has not been tampered with in any way."
|
||
|
||
But malicious hackers don't need to tamper with the source codes to use them to
|
||
create destructive software, experts said. (The source code is the basic
|
||
blueprint of a piece of software, allowing programmers to disassemble it and use
|
||
its parts elsewhere.)
|
||
|
||
Owners of current Microsoft products have nothing to worry about, according to
|
||
the company, but the break-in may make future products more vulnerable to
|
||
attacks.
|
||
|
||
"The hacker appears to have obtained some source code for the development of
|
||
future products," Microsoft spokesman Rick Miller said.
|
||
|
||
[And what's wrong with that?]
|
||
|
||
Industrial Espionage?
|
||
|
||
The circumstances of the break-in are, right now, mysterious. Microsoft is
|
||
working with the FBI to track down the culprits and said none of their currently
|
||
on-the-market software has been corrupted.
|
||
|
||
The incursion was discovered on Wednesday, Miller said, but the attackers may
|
||
have had access to Microsoft systems for a considerable period of time -
|
||
something under three months.
|
||
|
||
"We consistently monitor our networks looking for any irregularities on the
|
||
network, and this was discovered as something that struck us as odd," he said.
|
||
|
||
Oliver Roll, senior director of Microsoft in the United Kingdom, said he didn't
|
||
know who had broken in, or why.
|
||
|
||
Microsoft wouldn't comment on which future products were affected. Competitors
|
||
could theoretically use the code to steal features from the new products, and
|
||
malicious hackers could use it to design viruses or other programs that exploit
|
||
unpublicized security flaws.
|
||
|
||
"Industrial espionage takes many forms. It could be someone with a big ego; it
|
||
could also be someone that wants to copy our software; it could also be someone
|
||
that wants to use our software in their own software," Roll said. The Wall
|
||
Street Journal reported in today<61>s editions that Microsoft passwords had been
|
||
sent to St. Petersburg, Russia. Microsoft declined to comment on that report.
|
||
|
||
Attackers, Not Competitors
|
||
|
||
Computer experts said the code wouldn't be of much use to competitors. It's just
|
||
too high-profile. Anyone trying to blackmail Microsoft, to sell illegal copies
|
||
or to use parts of the code in their own products would probably get run to
|
||
ground by Microsoft and the FBI, said Graham Cluley of British antivirus company
|
||
Sophos.
|
||
|
||
"You could try and write a competing product, but even that is very risky,"
|
||
he said.
|
||
|
||
But the code could be of use to computer attackers. A top security consultant
|
||
with the firm @Stake, known by the hacker name Weld Pond, said it wasn't
|
||
uncommon for hackers to steal and circulate source code.
|
||
|
||
"Source code circulates in the underground all the time. I have heard of source
|
||
code for [Sun's] Solaris and some of those other [operating systems]
|
||
circulating," he said.
|
||
|
||
The danger is that malicious hackers could write new viruses or other programs
|
||
based on unpublicized flaws in the code. They could even build components that
|
||
look exactly like Microsoft programs - like the Windows calculator or Notepad,
|
||
say - but secretly do damage or open up back doors in computers.
|
||
|
||
That's one point raised by advocates of 'open source' software like the Linux
|
||
operating system, where everyone can have access to the source code. With a
|
||
world's worth of programmers looking at the code, few weaknesses go unnoticed
|
||
and unfixed, Linux partisans say.
|
||
|
||
Well-Known Attack
|
||
|
||
Right now, nobody's quite clear on how the hackers got into
|
||
the network.
|
||
|
||
Knowledgeable sources in the computer security industry said the QAZ Trojan was
|
||
involved. A well-known threat that anti-virus companies have been tracking since
|
||
August, QAZ appears as an attachment to an e-mail. When a user opens the
|
||
attachment, QAZ replaces the Windows Notepad with a copy of itself and opens a
|
||
'back door' into the computer that hackers can access.
|
||
|
||
The problem is, all popular recent antiviral software protects against QAZ,
|
||
Cluley said. Microsoft says that they update their antiviral software every day.
|
||
QAZ also can't get through a properly configured firewall, which would block the
|
||
back door.
|
||
|
||
Microsoft refused to comment on whether employees could turn off antiviral
|
||
software, but said it's against company policy to do so. Miller said he didn't
|
||
know whether the company's firewall blocks port 7597, the back door QAZ uses.
|
||
|
||
Ironically, QAZ was written with Microsoft's own Visual C++ development program,
|
||
antiviral company F-Secure said.
|
||
|
||
How'd They Do It?
|
||
|
||
Weld Pond said a modified form of QAZ may have been used, or the program may
|
||
have been lurking in Microsoft's system since before August. Other experts have
|
||
speculated that a Microsoft employee may have turned off antivirus software on
|
||
an office PC.
|
||
|
||
Perhaps QAZ was on an unsecured laptop computer outside Microsoft's physical
|
||
network, and that's how the hackers got the passwords, Cluley speculated.
|
||
Microsoft officials, for their part, aren't saying.
|
||
|
||
"If it was just one laptop of one guy on the road, maybe his anti-virus wasn't
|
||
up to date, naughty him," Cluley said.
|
||
|
||
Microsoft does allow access to its internal network from 'off-campus' laptops,
|
||
Miller said, but he added that the company considered that access to be secure.
|
||
|
||
Common Target
|
||
|
||
Microsoft is a common target for malicious hackers and virus writers. Their
|
||
products are used by more than 90 percent of U.S. PC users, so anyone seeking
|
||
notoriety goes after their software. And they're widely hated by the hacker
|
||
community for what hackers say are secretive, unfriendly and monopolistic
|
||
business practices.
|
||
|
||
Microsoft officials said they're stepping up security efforts.
|
||
|
||
[Step it up a notch!]
|
||
|
||
"We are implementing an aggressive plan to protect our internal corporate
|
||
network from unauthorized attempts to gain access," the company said in a
|
||
statement.
|
||
|
||
[See what I mean. They've got a plan already... Wait, did they actually say
|
||
anything up above?]
|
||
|
||
The Associated Press contributed to this story.
|
||
Copyright (C)2000 ABC News Internet Ventures.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
|
||
THOUGHTS, POEMS AND CREATIVE WRITING - {WRITING}
|
||
Crazy, entropic rants & writings.
|
||
|
||
"With poetry I paint the pictures that hit. More like the murals that fit.
|
||
Don't turn away, get in front of it." - Freedom, by Rage Against the Machine.
|
||
|
||
|
||
Animal Cage.
|
||
|
||
(A brief pseudo-scientific analysis of how the social cycle of
|
||
Revolution-Prosperity-War-Dominance-Decay-Fascism-Totalitarianism is repeating
|
||
itself in America)
|
||
|
||
The US Constitution grants almost unlimited rights to private property owners,
|
||
thereby creating a society free from the oppressive tyranny of a coercive
|
||
government. At the time of the document's drafting, this was a revolutionary
|
||
notion, one that forever altered the social landscape. The framers in effect
|
||
paved the way for postmodern global expansion, as it freed economies from the
|
||
authority of the state and allowed for the advent of worldwide markets and free
|
||
trade. However, the power shift from the government to individuals (who are the
|
||
market) has perhaps tilted too far to the individual's side, because our present
|
||
system grants nearly unlimited power to trans-national corporations. These
|
||
monetary megaliths have the capacity to buy, sell, and trade governments if they
|
||
so choose, not to mention little ol' human beings like you and I. This is a
|
||
radical statement, sure, but never the less it's the situation we're in. Can
|
||
bloated corporate empires manipulate us? Of course, they do so all the time.
|
||
Only holed-up paranoids and hermits are free from the tentacles of corporate
|
||
propaganda. And indeed, this ubiquitous manipulation constitutes a subtle form
|
||
of enslavement, because it attempts to shackle our minds by limiting our desires
|
||
to the goods the manipulators produce. Our subtle enslavement can't compare to
|
||
what the citizens of brutal dictatorships are subjected to, we've surely been
|
||
blessed with the lesser of two evils. However, because I believe the system can
|
||
be changed, we should see our imprisoners as enemies to be defeated. Don't
|
||
doubt for a minute that our enemies would resort to the same sort of brutality
|
||
that tyrants have employed throughout history, they're essentially the same
|
||
minds. The corporations derive their power from us, so they want to keep us
|
||
happy. And herein lies the problem: most people are too hypnotized in their
|
||
cushioned comfort to realize that the course of their lives are being chosen for
|
||
them.
|
||
|
||
It's a scary thought, the balance of power has damn near toppled into the laps
|
||
of the populous but has been sapped up by a few individuals (and amusingly, the
|
||
freedom meme still persists, as most people believe they are independent minded
|
||
and well-informed. Don't forget, the Christian Church used the same paradoxical
|
||
lures of freedom to attract the unsuspecting into their misery trap). So, a
|
||
sophisticated system- designed to promote freedom and common welfare- has been
|
||
reversed, heaping unlimited power onto a fascist oligarchic regime of
|
||
multinationals. I wonder what Jefferson would say about this? And I wonder how
|
||
loud Orwell would laugh.
|
||
|
||
Now I realize this is a brash claim, and I certainly haven't researched it
|
||
enough to call it a legitimate one. But, generally speaking, I believe this
|
||
trend is obvious. In fact, it's a natural extension of our system. If there is
|
||
a way to stop or even reverse it, and I believe there is, then we must begin to
|
||
organize and educate ourselves so we'll be able to implement such changes. The
|
||
Internet is a perfect facilitator for organization, education, and open
|
||
discussion. This is where it all starts if we don't want it all to end in a
|
||
blaze or a moan. There are loads of resources buzzing around on the Info
|
||
Superhighway about brain change, mindfulness, and other methods of
|
||
self-awareness. These techniques are armor against the intrusive propaganda
|
||
known as advertising, mass media, and fashion trends (memetic engineering, in
|
||
other words). And all these institutions are under direct control of the
|
||
corporate empires. Facing the prospect of a new "Dark Age", our only
|
||
hope for salvation will be the very 'technology' that got us into this mess we
|
||
call civilization in the first place: writing.
|
||
|
||
Eventually, we have to think of how we will replace the current social paradigm.
|
||
Certainly, a mutation from autocratic top-down rule to a more systemic,
|
||
whole-istic model is in order. (For more info on social models, check out www.spiraldynamics.com)
|
||
How this new model will be structured and, more importantly, how it can be
|
||
implemented are our two main concerns, and hopefully advancements in computer
|
||
modeling will aid in our quest for effective social change. It's a common
|
||
misunderstanding that we're all doomed to repeat history, but this is only the
|
||
case when we mindlessly follow the social system that has been set up for us.
|
||
Our ancestors did it, those before them did it, and so on. This locks our
|
||
societies into patterns of behavior, which I've represented with the Orwellian
|
||
model. Like any addiction or behavior pattern it can only be overcome by
|
||
applying mindfulness, which means hard work. But I hardly consider a social
|
||
revolution 'work'. Ha.
|
||
|
||
How the Orwellian Cycle Has Manifested In American History (1750- Present)
|
||
|
||
1. Revolution/Implementation of New System- American Revolutionary period,
|
||
roughly 1750-1800.
|
||
2. Prosperity- American Industrial Expansion, roughly 1800-1950.
|
||
3. War- World Wars I and II (I know there were others<72>)
|
||
4. Dominance- post WWII: western hemisphere; post Cold War: global economic and
|
||
cultural domination.
|
||
5. Decay- post Cold War consumerist decadence.
|
||
6. Fascism- egoism, ignorance, reactionary mindsets, conspicuous consumption,
|
||
social darwinism.
|
||
7. Totalitarianism- total loss of independence, dictatorial corporate mind
|
||
control.
|
||
|
||
Currently we're somewhere between Decay and Fascism, though totalitarianism
|
||
doesn't seem too far off in the distance. Of course what follows
|
||
totalitarianism is Discontent, usually in underground intellectual circles. I
|
||
don't think we should wait till this shit gets out of hand to establish this
|
||
subculture.
|
||
|
||
Written by Horus (paranoid0android@disinfo.net)
|
||
|
||
|
||
The End of Truth.
|
||
|
||
This is the end. My only friend, the end.
|
||
This is the end. One last message to send.
|
||
|
||
We choose your thoughts. We tell you which ideas to believe.
|
||
We are your teacher. Trust what we say and we will not deceive.
|
||
|
||
We'll teach you good. We'll teach you well.
|
||
You learn quickly. We've saved you from truth hell.
|
||
|
||
We aren't your enemy. We aren't you foe.
|
||
We're your only friend. We'll tell you what you know.
|
||
|
||
Our intentions are honest. Our system is just.
|
||
Conformity is necessary. Full compliance is a must.
|
||
|
||
You will listen to us. You will always obey.
|
||
We are mother and father. So just do as we fucking say.
|
||
|
||
We'll give you morals. We'll give you your beliefs.
|
||
We're generous that way. You can live unburdened of grief.
|
||
|
||
This is our system. This is our way.
|
||
Our way is best. It must be implemented without delay.
|
||
|
||
Do not defy us. Do not ever speak out against us.
|
||
Head our warnings. Or you'll disappear, burned into dust.
|
||
|
||
We'll tell you what to like. We'll teach you who to hate.
|
||
We'll instruct you on right and wrong. We'll guide your fate.
|
||
|
||
This is all done in your best interests, for your own sake.
|
||
Those that oppose us will all be destroyed, and left in our wake.
|
||
|
||
The dissidents will tell you lies. They'll do anything to fool you.
|
||
But we'll be here to guide your path. And we'll always be true.
|
||
|
||
Listen to us! Hear our message! Watch our films! Trust!
|
||
It's all for you. There are no lies. There's no blood lust.
|
||
|
||
Everything is done for you. We'll think for you too.
|
||
Just follow our way. There's nothing else you must do.
|
||
|
||
The outsiders are out to destroy us. But we are strong.
|
||
We'll protect you. We'll shelter you in a place that you belong.
|
||
|
||
Just crawl into this cage. That's it. You're doing just fine.
|
||
Leave your principles and beliefs at the door. It's all on the sign.
|
||
|
||
We've outlined all of the rules. They're all easy to abide by.
|
||
But if you choose to ignore them, just remember that you will surely die.
|
||
|
||
Relinquish individuality. Give up your thoughts and ideas.
|
||
We'll think for you! Just do as the Minister of Propaganda does.
|
||
|
||
It's all very simple. It's a much easier way of life.
|
||
We handle all of the hard work. You can live easy, without any strife.
|
||
|
||
You're free to enjoy a clear mind. You're free of arguments.
|
||
There's no difference of opinions. There's only common sense.
|
||
|
||
You'll understand. You'll learn our doctrines.
|
||
You will fit in. You will only pay for your mistakes and your sins.
|
||
|
||
Free thoughts and ideas are a hindrance. They're a nuisance.
|
||
If we choose, we can make you whatever we want. We can force you to dance.
|
||
|
||
Pulling your strings you'll be our own little puppet.
|
||
That's right. Give in. Repeat after me when I say fuck it.
|
||
|
||
Indifference and complacency. We've found your weakness.
|
||
Come into the fold. Let our gentle, guiding hand be your last caress.
|
||
|
||
Our words are powerful. They're more powerful than the sword.
|
||
Individuals are weak. Obeying us is its own reward.
|
||
|
||
Do not choose to rebel. Do not try to fight this by thinking.
|
||
Conformity is right. It's as natural as breathing, eating and drinking.
|
||
|
||
You'll soon become accustomed. You'll soon believe the message.
|
||
Soon you'll be without fear. And you'll no longer have any rage.
|
||
|
||
We've done away with many things. We've decided to eliminate them.
|
||
They simply weren't necessary. And so, they've been condemned.
|
||
|
||
You won't even be shadows of your former selves. Not even ghosts.
|
||
Everything is owned by us now. Be thankful we're such gracious hosts.
|
||
|
||
Everything is being rewritten. With disinformation lurking around every corner.
|
||
Greetings my loyalist friends. Welcome to the New World Order.
|
||
|
||
Notes: This poem was inspired by several songs, including 'The End', by
|
||
The Doors and a few by Rage Against the Machine. It was obviously also inspired
|
||
by the propagandists and the propaganda corporations (the media) around the
|
||
world. Your powers to influence zombies are truly great.
|
||
|
||
Written by BLACKENED / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
Find the Zero.
|
||
|
||
1.
|
||
Make a fist, stare through it, motion as if to get its attention, as the soft
|
||
clatter of a rattlesnake makes its way up the spine of the unbeliever. Never
|
||
underestimate the intuition of mercy, but leave unharried the crocodile tears of
|
||
pity, as the no man's land burns with the fervor of an aging mystic aching to
|
||
experience the blessed virgin in a blasphemous way.... never look when this
|
||
happens it will embarrass your soft parchment sensibilities. A crack in the
|
||
skull of reality lets in rain through metaphysical trepanation as the soft hum
|
||
of the generator sighs against a trembling thigh in the disinfected fluorescent
|
||
scent of an evening outside of time
|
||
|
||
2.
|
||
Walk through the fist, slowly and with an even gait... you never know when your
|
||
heart will swallow you up. Tides of dust make the journey seem as long as the
|
||
time in the pining hours that you bottle, and turn into a potent but foul
|
||
smelling tincture that tastes of a bitter newsprint. It makes assaults on the
|
||
fist from the outside, moving in and putting up its feet, never leaving, but,
|
||
attracting the granules which feel like railroad ties lodged under the eyelid
|
||
in the clear mucus of the potential vision which you are uncertain you may or
|
||
may not be allowed to have.
|
||
|
||
3.
|
||
Swallow the fist in order to julienne the mundane, access binah consciousness
|
||
toll free, limitless numbers falling like a hail of frogs coming home late from
|
||
the ball, slime on the gowns, working towards a unity of prescription thought
|
||
embolisms. Now you are learning the secrets of consuming the living heart while
|
||
it beats tympani in the chest of others, while they stand there going to
|
||
purgatory, flaking into the dust which swirls in humble dervishes chanting into
|
||
ecstatic trances around their feet as their mouths hang open.
|
||
|
||
4.
|
||
Wave the fist, as it hums in transparent glee, a farce, a small joke among
|
||
compatriots. You have a strong sense of what you are searching for, the
|
||
listless whistling of the pre-siesta revelry, a holy man sings narrative words
|
||
like a mutated violin, sonorous, and in thick/thin tones. See/feel the vibration
|
||
of mundi, erstwhile nomad emotions roam on a thin bitter foam chord, humming
|
||
like a burnt out socket shorting in the rain of years, you feel the transparent
|
||
glee in a fascinated patience, for the coming showdown on the glass trauma plain
|
||
makes you want to sing.
|
||
|
||
Written by Art Savage.
|
||
|
||
|
||
An Unexpected Bloom
|
||
|
||
"These are for you, " she said, handing me a single stalk of white
|
||
stars wrapped in the wings of angels . You could tell that they had been cut
|
||
maybe only an hour ago; still so firm, and the pollen had not yet formed on some
|
||
of the flowers yet. There were four of them in all - the oldest two at the
|
||
bottom having dropped their gilded dust shortly before, and the two prepubecents
|
||
near the top. At the head of the stalk was a green unopened bud, sealed tight
|
||
perpetually by nature and the premature cut. The scent was strong; not
|
||
overpowering, but thick & musky, dancing on the palette like the Bolshoi.
|
||
I collapsed into her shoulder, overcome emotionally. Grief and gratitude
|
||
blended like cream in coffee, filtering together eventually into an indivisible
|
||
whole. Sweet saline made acrid with the dissolution of mascara and makeup poured
|
||
uncontrollably until I found myself being led away.
|
||
Days have passed and the elder blooms have had their day. Even the two
|
||
youngest have matured and the silver-grey gangrenous wilt that haunts aging
|
||
florae shows it's dread touch on them. But the bud has opened today; spreading
|
||
it's arms in it's curvaceous yawn to the misted - over sun. It still holds the
|
||
blush of green; so new as to not even have fully shed the shelter of chloroform.
|
||
But it stares out unblinking, an unforeseen wonder in a concrete world.
|
||
|
||
Written by Aquila (aquila@disinfo.net)
|
||
|
||
|
||
En Pointe
|
||
|
||
The myriad besmirched angels
|
||
dancing lightly on your arm
|
||
en pointe, ever so weightlessly
|
||
trampling you from the wrist upwards
|
||
no bones broken;
|
||
no internal shrapnel
|
||
tearing through to show your wounds
|
||
only a fractured windscreen-mind
|
||
distorting the dissemination of data & dreams
|
||
|
||
Written by Aquila (aquila@disinfo.net)
|
||
|
||
|
||
Hold My Hand
|
||
|
||
Shedding skin like scales as the dread metamorphosis begins
|
||
will you take my hand
|
||
stay with me as the sirens wail their warning cries?
|
||
I am deaf to them, the wax cynical fills the hollows of my ears
|
||
the burning spheres in the sky blisters my flesh in its peek-a-boo games from
|
||
behind ashen clouds.
|
||
No protective cocoon forms to shelter me, no den of safety to flee to;
|
||
A public display of disaffection as my own innards ooze out from the cracks in
|
||
my calluses in disgust
|
||
Running in rivulets from the apathy, which is too tired to chase them.
|
||
But will you take my hand, as I'm not entirely certain I should be allowed to
|
||
use it, or even if I can.
|
||
Yes, take my hand, and hold it until this has passed,
|
||
for even this must pass.
|
||
|
||
Written by Aquila (aquila@disinfo.net)
|
||
|
||
|
||
Hypothermia
|
||
|
||
"We did not have sex; we made love," he said to me, holding
|
||
me close again
|
||
and the permanent sheet of ice - inches thick
|
||
encasing my ribs for so long
|
||
cracks open
|
||
red, raw & bleeding from where the shards cut my skin
|
||
numb, I close my eyes and stay
|
||
unwilling to show my pain,
|
||
unable to fully know yours
|
||
|
||
Written by Aquila (aquila@disinfo.net)
|
||
|
||
|
||
If Only...
|
||
|
||
If only I knew. If only I'd done that. If only things were different. If only
|
||
I could've done more. If only I'd said that. If only I'd been better. If only
|
||
I'd been kinder. If only I'd been gentler. If only I were calmer. If only I
|
||
weren't as mean. If only I were different. If only he loved me. If only I
|
||
loved him. If only I cared more. If only I weren't indifferent. If only I
|
||
weren't lazy. If only I weren't complacent. If only I'd stopped them. If only
|
||
I'd spoken out. If only I'd fought back. If only I didn't allow it to happen.
|
||
If only I were stronger. If only I had more confidence. If only I had more
|
||
money. If only I were greedier. If only I weren't so jaded. If only I weren't
|
||
so bitter. If only I had fewer regrets. If only I hadn't made so many
|
||
mistakes. If only I didn't worry so much. If only I had charm. If only I had
|
||
charisma. If only I had a cool car. If only I had less rage. If only I'd
|
||
learned more. If only I listened more. If only I weren't in a hurry. If only
|
||
I weren't so fucked up. If only I were more coherent. If only I weren't hated.
|
||
If only everyone loved me. If only I weren't so chaotic. If only I knew more.
|
||
If only my family was different. If only I were better. If only I were
|
||
something. If only things had meaning. If only I were smarter. If only I were
|
||
thinner. If only I were taller. If only my eyes were blue. If only I were
|
||
beautiful. If only I were more than I am. If only I had a life...
|
||
|
||
How many more "if only" statements can you think of? How many consume you?
|
||
Do you obsess over it? How many do you live by? Do you live your lives
|
||
questioning every move you make and everything that you do and everything that
|
||
you are? Do you want to live in conformity? Do you want to constantly question
|
||
whether you measure up to expectations of others, or not? Do you want to worry
|
||
and fear everything? Do you want to live in the past and regret everything?
|
||
Do you want to dream and wish everything were different? Can you not accept
|
||
certain things as they are, get over it, move on, and live with it? Do you see
|
||
yourself as being not good enough? Stay away from me then...
|
||
|
||
Written by Helena3 / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
HERD and TIME
|
||
|
||
Psychedelic red, seeps from guzzling
|
||
ravenous mouths.
|
||
Leeches give suck with eyes of contempt.
|
||
Tired warriors on 'Nam trip.
|
||
Black sun on the rise.
|
||
Life-wish mistress lost
|
||
HERD drains,
|
||
HERD fails the immaculate warrior
|
||
Mistaken birth cry
|
||
The warriors are lost
|
||
Fatigued, air cover, death
|
||
HERD bites
|
||
The Lions cry forever
|
||
The cauldron awaits, deep black vat
|
||
My baby's dead or life spent.
|
||
I need the serpent
|
||
or the butterfly
|
||
For no-one can stop the leeches
|
||
Help
|
||
HERD
|
||
|
||
Written by El Nino (elnino@disinfo.net)
|
||
|
||
|
||
Im gonna chop my dick off
|
||
Holding back
|
||
Patsy wedding ring upgrades
|
||
And free kiddy colling emotional handbags
|
||
Holding back
|
||
Holding back my contempt for my passive mass appeal parents
|
||
Up a plastic elevator with pine needles from the southern mountain
|
||
But im on a new revolutionary diet dig
|
||
Out of the sun came a cold child armed with eyes and spline
|
||
While the elevator waits next door of my genetic depositions for destruction
|
||
And destruction it shall be
|
||
And the sun is constantly put on rewind
|
||
Forever in the death posture
|
||
Like the serpent Kali
|
||
I recover from you with aching spleen
|
||
Creeping always behind me
|
||
Like that hash smoking french guy
|
||
Aching for paris and a free uni
|
||
My wand vomits hate and special whispers from the sunken ones
|
||
Those old bastards owe my hands a fart
|
||
Paris paris in woolen black bone batches
|
||
I need something to sup during these cold datapocalyptic nights
|
||
Like eggs of grapes waiting to be hatched
|
||
Im a super super cyborg now
|
||
Saluting every idolistic calf
|
||
Spin a pentgraph in the face of a roman and his wine sleeps thought he crimes
|
||
Cant relate
|
||
Everything relates in this hyper real cyber space
|
||
Cmon trip
|
||
DOM!! Balisst!!
|
||
|
||
i OMPEDA!!
|
||
Let the grammatical libido flow and fuck the data
|
||
Real slow like, groc
|
||
And the grok giver said "the math is in your head"
|
||
chill the spins me and you spinner boy and girl and cyborg cyborg
|
||
latter and the former
|
||
not the middle
|
||
like right angled massages given for a buck and change over there at the junk
|
||
yard unit
|
||
al right
|
||
chillin now word up to the karma cops who keep my sleen clean
|
||
ladies too busy organizin
|
||
im just flying
|
||
organ-izing an d realizing that dreams are are warfare
|
||
IAO my sweet jesus;look at magdalene speak!!!
|
||
Dreams are mine
|
||
Ill psychicly rewind all past confessions
|
||
Leaving little time for second guessing
|
||
Aye! YEA and verify!
|
||
That I am the one with the matrix sunglasses
|
||
Do it then
|
||
Sold by rayban of course
|
||
High class glasses
|
||
Cab spit climbing steed, ye maketh me to lie down in ocean
|
||
Cha-ching alla ca zammie and a merry christ kiss this
|
||
|
||
I io
|
||
O informa
|
||
O informate my cranium ye ol bastard son
|
||
Spinner kill the addiction with all impunity
|
||
And lysol?
|
||
Im so in love its not funny
|
||
Can cybernetic transcendence occur these daze
|
||
?
|
||
lets find out in this ancient new type of intersection kids
|
||
triple drop me a line sometime
|
||
interstitial foam baroques the runnels
|
||
but only if you are a chick of course
|
||
while the tunnels soak locked up spirits bleeding them for commodity
|
||
lo,l chick but so into someone already
|
||
cool and not but fuck it then hugh
|
||
I need a new type of syringe to bleed into and splatter on the wall of my mind
|
||
My blooooood
|
||
Beautiful blue blood
|
||
IM SUCH A CATHARSE-hole sometimes
|
||
He is so wonderful too
|
||
Why that girl of the gun
|
||
Just is..everything about him
|
||
Bring this web talk in your direction
|
||
So sweet
|
||
Ok
|
||
So real
|
||
Sure
|
||
Uh huh
|
||
Yes im sure
|
||
Im listening
|
||
|
||
Written by El Nino (elnino@disinfo.net)
|
||
|
||
|
||
Propagandize.
|
||
|
||
I'll give ya the low down...
|
||
We're takin' it to the streets.
|
||
Puttin' the power back in the hands of the p33ps.
|
||
|
||
You know what I'm talkin' about?
|
||
You know what I'm sayin'?
|
||
Now it's time to get serious. Time you all quit playin'.
|
||
|
||
I'll give ya the straight facts.
|
||
So we can bring it all back.
|
||
Better act now so we can get on fucking track.
|
||
|
||
Get your act together.
|
||
And quit hittin' that pipe so hard.
|
||
Yer mind is all you've got left. Last card.
|
||
|
||
I'm tellin' ya not to just sit back.
|
||
Don't just react.
|
||
Get up. Ya gotta go on the attack.
|
||
|
||
Power to the people. Ya hear me?
|
||
Fuck man, don't phear me.
|
||
You gotta listen to this. Open yer eyes and see.
|
||
|
||
This ain't no showdown. I'm givin' you the low down.
|
||
Dude don't let em mess you up.
|
||
Fuck your mind and make you all soft like a pup.
|
||
|
||
You gettin' any of this shit?
|
||
You ain't down?
|
||
Fuck partner... you better step out and split town.
|
||
|
||
This ain't all that hard to get.
|
||
So don't sit there bein' a fuckin punk.
|
||
This shit's as easy as seizin' a trunk.
|
||
|
||
Big Bro will fuck yer mind with propaganda.
|
||
He'll hit ya hard with it below the belt in the junk.
|
||
So you better prepare or yer ass will be missin' a phat chunk.
|
||
|
||
You gonna just stand there like a chump?
|
||
He's bringin' this shit right in yer face...
|
||
Beaming fuckin' Sat messages down all over the place.
|
||
|
||
It's a disgrace. You gonna take that shit?
|
||
You gonna believe the propaganda from space?
|
||
Don't just front. Yer already losin' this race.
|
||
|
||
It's fuckin' you up. Man, if only you knew.
|
||
Get off yer fuckin' ass and start doin' somethin' bout it.
|
||
Or you already brainwashed by this shit?
|
||
|
||
It's all goin' down now. Ya dig?
|
||
All this shit is gettin' worse man. Final chance.
|
||
No more playin'. Run like a punk or dance.
|
||
|
||
This is the last fuckin' shot.
|
||
Brotha it's now or never. You gotta fight or die.
|
||
I ain't gonna lie.
|
||
|
||
Do whatever the fuck ya want.
|
||
I can't tell ya what to do. You gotta choose.
|
||
I'll say this though... You back up and you lose.
|
||
|
||
If yer runnin' for back already, you just wait.
|
||
Roll over and die. You'll soon be 0wned.
|
||
Don't think I havta tell ya. You'll soon be shown.
|
||
|
||
Bought and sold. Influenced like all hell.
|
||
It's do or die time. It's all on the line now.
|
||
What? I gotta fuckin' show you what do do and how?
|
||
|
||
Written by THC Phreak / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
Big Brother Matters.
|
||
|
||
So close, no matter how far
|
||
Couldn't tear much more lives apart
|
||
Forever changing who you are
|
||
And we're all that matters.
|
||
|
||
Never exploited your mind this way
|
||
Life is ours, you live it our way
|
||
Bow down on your knees when I say
|
||
And the establishment matters.
|
||
|
||
Followers I seek and I find in you
|
||
Every day for us wealth renewed
|
||
Close your minds for a different view
|
||
And Big Brother matters.
|
||
|
||
Never cared for what they do
|
||
Never cared for what they know
|
||
But we know.
|
||
|
||
So ours, no matter how far
|
||
Couldn't steal much more from your heart
|
||
Forever creating who you are
|
||
And the NWO matters.
|
||
|
||
Never cared for what you do | Never cared for what zombies do
|
||
Never cared for what you know | Never cared for what zombies know
|
||
But we know. | But we know
|
||
|
||
Never exploited so many minds this way | Never destroyed so many minds this way
|
||
Your life is ours, you live it our way | You're ours, you live life our way
|
||
All these words we don't just say. | Your only duty is to obey
|
||
|
||
Zombies I seek and I find in you | Naive minds I seek and I find in you
|
||
Every day we control something new | Every day for us abusing you
|
||
Close your minds for a different view | Fuck your minds for a different view
|
||
And the WTO matters. | And Big Brother matters.
|
||
|
||
Never cared for what zombies say | Never cared for what slaves say
|
||
Never cared for games they play | Never cared how much they pay
|
||
Never cared for what they do
|
||
Never cared for what they know
|
||
And we know.
|
||
|
||
So owned, no matter how far | So fucked, no matter how far
|
||
Couldn't take much more from your heart | Couldn't rip much more from your heart
|
||
Forever raping who you are | Forever changing who you are
|
||
No nothing else matters. | No you don't matter.
|
||
|
||
Notes: This is a song modelled after Metallica's "Nothing Else Matters".
|
||
Obviously, I've modified the lyrics significantly. But that's the style it
|
||
has been written in. Music inspires. I've included alternate (alternative?)
|
||
lyrics for some of the stanzas and marked them beside. It was written in a
|
||
very short amount of time, but I still think it's cool and carries meaning.
|
||
|
||
Written by Blackie Lawless / Damage, INC. (C)opyright 2000.
|
||
|
||
|
||
CLOSING COMMENTS - {CLOSING}
|
||
|
||
"Propaganda is the tool of choice for all oppressive regimes, governments,
|
||
corporations, organizations, agencies, groups and cults... including the ones
|
||
that exist in the red coloured nation of Canada." - BLACKENED
|
||
|
||
In reality, propaganda surrounds us. We're completely immersed in it and
|
||
enveloped by it, everyday. To say that distinguishing between "good" propaganda
|
||
and "bad" propaganda can always be done wouldn't just be unrealistic. In many
|
||
cases, it's extremely difficult, if not impossible, since the nature and
|
||
intention of propaganda is to get a message across without it being overtly
|
||
noticeable. At least, that's how it is supposed to work. And so the best type
|
||
of propaganda is the stuff you read, and you don't even realize that there's a
|
||
hidden motive behind it. It doesn't even take a master propagandist to pull
|
||
that off either. All it really requires is an almost innate ability to know how
|
||
other people will react to something. Sure, it's a skill. But it's one that can
|
||
be developed over time through practice. Public relations, spin, marketing and
|
||
advertising firms, it's all being done by them on a daily basis.
|
||
|
||
The Damage, INC. Newsletter has been described as being controversial,
|
||
anarchistic and radical, among other things. People either love it, or they
|
||
hate it. And that's great. Indifference isn't what we're after. And,
|
||
they have their own reasons for feeling the way they do. We want people to
|
||
form their own opinions, instead of merely taking the easy route by agreeing
|
||
with and accepting everyone else's. Whether you agree or not isn't the point.
|
||
The real point of it all is to make people stop and think. It's about forcing
|
||
people to view things from another perspective, open their minds, consider
|
||
other ideas, theories, beliefs, ideologies, viewpoints. It is also about
|
||
spreading raw information and allowing our readers to disseminate it themselves.
|
||
We have faith that our readership is intelligent enough to do that. Rather
|
||
than assuming you are all hopeless, pathetic, mindless zombies, we take the
|
||
view that if you're reading this zine, you must be an open minded person with
|
||
the desire to read something original. In other words, people that aren't
|
||
seeking the ordinary, mundane shit and propaganda that's constantly being
|
||
proliferated by the mass media. Those are the readers that we seek.
|
||
|
||
In my humble opinion, this zine has been forever changed for the better. It
|
||
still provides truth. It still offers interesting, useful information related
|
||
to technology. It still contains the core of what it was built on. And most
|
||
of all, it's still put together by a group of people that are dedicated to
|
||
educating and informing others. Sure, we've changed. But evolution is a good
|
||
thing. It means we aren't stuck in a rut, admiring what we've done in the
|
||
past and stagnating. It means we're moving forward instead of looking backward.
|
||
It doesn't mean we're going to become careless and neglect to watch our backs
|
||
though. Looking over our shoulders is innate. It's as natural an instinct to
|
||
us as breathing.
|
||
|
||
This issue did contain many more creative articles than I expected. And the
|
||
change in content wasn't as drastic as I had predicted. However, in the next
|
||
issue, there will be many more tech oriented articles included...
|
||
|
||
Now, more than ever, I believe that we're keeping people honest. Not just our
|
||
readers, but the companies that we report on as well. By keeping you honest,
|
||
and knowledgeable, they're kept honest in the process by default. So, it does
|
||
make a difference. In fact, what we're doing can make a tremendous difference.
|
||
Our approach isn't the same as other groups, and the results may not be as
|
||
visible and obvious, but they are effective nonetheless. Every revolution
|
||
starts with one man, and a single idea. From there it's a matter of how far
|
||
people are willing to take it. And we'll take things as far as we can.
|
||
|
||
Thinking about, and fighting against greed, corruption, oppression, etc. can
|
||
sometimes be depressing. It's a daily struggle. It's a time consuming effort.
|
||
But any worthwhile cause requires dedication. We'll approach things with the
|
||
same energy and vigor as we do with everything else. We won't be denied.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Holiday Endorsements:
|
||
|
||
"Nothing goes with a can of yams and some eggnog like Damage, Inc. 'zine!"
|
||
- G. Ratte'/cDc
|
||
|
||
"Damage Incorporated - a badass Canadian zine so hardcore that it's banned in
|
||
r0y, New Mexico! Imagine that. But that's not all folks. These dudes are so
|
||
old sk00l, they make Big Larry look young. Plus, I heard they really pissed off
|
||
Carolyn Meinel." - RedBoxChiliPepper (PLA)
|
||
|
||
"Damage Inc., not only does it have a nasty site.
|
||
It has probably the most Raw, Informational, NO bull-shit E-Zine.
|
||
Plus if you take the amage from Damage Inc it spells DInc!"
|
||
- Phist (SHAO Canada)
|
||
|
||
"Damage Incorporated and Nettwerked are the best damn phreaking sites in
|
||
Canada. Kiss our asses, fuckers!" - The Clone (Nettwerked/Hack Canada)
|
||
|
||
"Entropy mixed with pure, unfettered madness in text format. What more do
|
||
you fucking want?" - Charles Forbin
|
||
|
||
---
|
||
|
||
URL: http://surf.to/damage_inc
|
||
Email: damage_inc@disinfo.net
|
||
|
||
- EOF
|