1695 lines
84 KiB
Plaintext
1695 lines
84 KiB
Plaintext
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
= =
|
|
- WELCOME TO THE EIGHTEENTH ISSUE OF -
|
|
= =
|
|
- -=>PHANTASY<=- -
|
|
= =
|
|
- A PUBLICATION AND NEWSLETTER OF -
|
|
= =
|
|
- THE -
|
|
= INTERNATIONAL =
|
|
- INFORMATION -
|
|
= RETRIEVAL =
|
|
- GUILD -
|
|
= =
|
|
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
|
= =
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Volume Number Four,Issue Number Eighteen Dated 08/12/93
|
|
Editor is Mercenary : mercenar@works.UUCP
|
|
|
|
Article Submissions: The Mercenary/IIRG
|
|
862 Farmington Avenue
|
|
Suite 306
|
|
Bristol,Ct 06010
|
|
|
|
IIRG World Headquarters BBS: The Rune Stone
|
|
14.4K HST Courier
|
|
All H/P/A, 3000+ Files
|
|
(203)-832-8441
|
|
NUP: Conspiracy
|
|
|
|
Table of Discontents:
|
|
|
|
[1] "Ionizer" - IIRG Site Sysop Arrested
|
|
A Report By The IIRG
|
|
|
|
[2] What Really Happened at "Pump-Con"
|
|
(An Interview With Thomas Icom)
|
|
Interview By: Mercenary
|
|
|
|
[3] Bencrypt Encryption
|
|
By: Ben Sodenkamp
|
|
|
|
[4] Hacker OPSEC (Operational Security)
|
|
By: Thomas Icom/IIRG
|
|
|
|
[5] The Libertarian Responsibility of The Cyberpunk Movement
|
|
By: Thomas Icom/IIRG
|
|
|
|
[6] FOR THE PEOPLE
|
|
Supplied By: Those Wacky Secret Service Agents
|
|
Edited by: Mercenary
|
|
|
|
1. Secret Service Agents Get Free Vacation
|
|
|
|
[7] The Rumor Mill (Unconfirmed Rumors From the Underground)
|
|
Edited By: Mercenary
|
|
|
|
1. Han Solo Sells Out to the Empire?
|
|
2. Dr. Detergent of TDT Retires?
|
|
3. Fear and Loathing BBS Busted
|
|
|
|
[8] PHANTASY TIDBITS: News and Views of Interest
|
|
|
|
1. SNET Operators Forwarding ANI Data
|
|
2. FCC Releases Frequencies
|
|
3. Put Your Hands in the Air, and Give Me Those Chips
|
|
4. ATM Bandits Nabbed
|
|
5. FBI Calls for Gun Licensing
|
|
|
|
[9] Listing of IIRG Distribution Sites
|
|
|
|
[10] Listing of PHANTASY Distribution Sites
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
OFFICIAL DISLAIMER...
|
|
|
|
All information in PHANTASY is from USER contributed material
|
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
|
any liability from any damages of any type that the reader or
|
|
user of such information contained within this newsletter may encounter
|
|
from the use of said information. All files are brought to you for
|
|
entertainment purposes only! We also assume all information infringes
|
|
no copyrights and hereby disclaim any liability.
|
|
|
|
PHANTASY is (C) 1990 by The IIRG
|
|
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [1]: "Ionizer" - IIRG Site Sysop Arrested
|
|
A Report By The IIRG
|
|
|
|
(Portions of this article were taken from a Taped Conversation with Ionizer
|
|
from the Hartford,CT. County Jail to Mercenary at IIRG HQ.)
|
|
|
|
Ionizer the sysop of the Ware House was arrested on Monday August 2nd as he
|
|
entered a pretrial hearing at the Hartford Superior Court,Hartford Connecticut,
|
|
to face charges of his alleged connection for a break-in at Hall High School on
|
|
October 11th,1992.
|
|
Ionizer was arrested for "Inciting Injury to Persons or Property", a felony,
|
|
and "Risk of Injury to a Minor".
|
|
Apparently Ionizer was taken to the West Hartford,CT. police department and
|
|
was quickly photographed and fingerprinted and then was whisked away to the
|
|
West Hartford Superior Court and was arraigned,(without his lawyer being
|
|
present) and was ordered held on a $500,000 dollar bond.
|
|
West Hartford police are attempting to keep the case sealed, but the
|
|
charges against Ionizer are for having Anarchist files available for download
|
|
on his BBS, The Ware House.
|
|
In our discussion with Ionizer from jail, the police have apparently used
|
|
strong-arm "Big-Brother" tactics on a 14 year-old by the handle of,
|
|
"Misguided Youth" who had access to the Ware House.
|
|
Reportedly police approached him and threatened to drag him into court if he
|
|
didn't sign an affidavit that he downloaded the file "ANARC2.ZIP" from the Ware
|
|
House.
|
|
When Ionizer first heard wind of police hassling users of his system, he
|
|
supplied his entire system log (Ionizer kept his system log since day 1 of
|
|
the system being up) to an IIRG member for analysis.
|
|
We have analyzed the Meg Plus file and have found no record of Misguided Youth
|
|
ever downloading the file from Ionizer's BBS. In fact only 2 users have ever
|
|
downloaded ANARC2.ZIP that we could find.
|
|
|
|
1. HITMAN
|
|
18:56 05/23/93 LIBRARY FILE DOWNLOAD
|
|
User Hitman download ANARCHY\ANARC2.ZIP
|
|
|
|
2. HOLLYWOOD
|
|
14:35 05/24/93 LIBRARY FILE DOWNLOAD
|
|
User Hollywood download ANARCHY\ANARC2.ZIP
|
|
14:50 05/24/93 LIBRARY FILE DOWNLOAD
|
|
User Hollywood download ANARCHY\ANARC2.ZIP
|
|
|
|
Now apparently it seems that the West Hartford police department feels it can
|
|
either intimidate anyone it feels like, or fabricate evidence.
|
|
Several other Ware House users have been contacted by phone by police and
|
|
questioned, We know "Mastermind" was contacted and was asked "Are you good
|
|
friends with Ionizer?' and "Did he ever mention anything about the making of
|
|
pipe bombs to you?'.
|
|
According to Ionizer, the police are claiming an undercover police officer
|
|
with the West Hartford Narcotics division is claiming to also have downloaded
|
|
the file.
|
|
Hitman has also been contacted by police and asked to supply a copy of the file
|
|
in question, and this is events we were told happened,
|
|
|
|
Quote from Hitman -
|
|
Date : 08 Aug 93 10:19:14
|
|
|
|
I'll tell you the whole story, as I told it to Ionizer
|
|
last night (he called me from jail). When I was out one
|
|
day, the detective Mr. Anielwiski (or something like that)
|
|
called. I wasn't home, so, he talked to my dad. My dad
|
|
thought I was doing all of this shit too, so, he took it
|
|
way out of proportion. I got home, and he made me search
|
|
for a file 'ANARC.*' on my hard drive. Since it is
|
|
really his computer and his phone line, there is nothing
|
|
that I could have done, since he could have easily done
|
|
it himself. Anyways, he said to delete it, so I wiped it
|
|
via Norton's WIPE program, so it couldn't be recovered.
|
|
Anyways, I guess the detective called back, and my dad said
|
|
that I had the file. But, it was wiped. Anyways, my dad
|
|
thought we'd just undelete it, but, he didn't realize that
|
|
the file would just be a null file when we did so. The
|
|
rest of the story is what he told me, as I was at work the
|
|
rest of the day. The detective came over, and I guess my
|
|
dad copied the null file onto a floppy, but, I think the
|
|
floppy was bad anyways. At any rate, to my knowledge, there
|
|
is no information at all on the floppy, and, I've got no other
|
|
copy of it on my hard drive.
|
|
|
|
--Hitman
|
|
|
|
Now the file in question is ANARC2.ZIP, which is ANARCHY FOR FUN AND PROFIT
|
|
By: The Deth Vegetable Volume 1,Issue 2.
|
|
It seems that this file is being singled out by the police because of its
|
|
high bomb making instructions content and this message in the header of the
|
|
file,
|
|
----------------------------------------------------------------------------
|
|
/--------------------------------------\
|
|
! Note to Law-enforcement type people: !
|
|
! This file is intended to promote !
|
|
! general havoc and *ANARCHY*, and !
|
|
! since your going to be the first !
|
|
! assholes up against the wall.. there !
|
|
! isnt a damn thing you can do about !
|
|
! it, pigs! !
|
|
\--------------------------------------/
|
|
------------------------------------------------------------------------------
|
|
None of the information contained in ANARC2.ZIP could be considered
|
|
classified or secret as the information in the file is easily obtainable in
|
|
any book store in books like "The Anarchists Cookbook" or "Ragnar's Guide
|
|
to The Home and Recreational Use of High explosives".
|
|
We did a little investigating and found "The Anarchists Cookbook",
|
|
By William Powell on the shelf at "Barnes and Noble" bookstore in
|
|
West Hartford,CT. (Hey Police, better run over and shut them down!!).
|
|
We also found "The Anarchists Cookbook" at the Tunxis Community College
|
|
Library in Farmington,CT. (HX 844 P68) and at the University of Connecticut at
|
|
Storrs Library (SPEC APC BK f33), so it is available at public libraries for
|
|
underage children to read and enjoy.
|
|
Also after a little searching on the international network of computers known
|
|
as "Internet" look what we found available for download by "ANYONE" with a
|
|
computer and modem, (Including Under-age Children).
|
|
|
|
--------------------------------------------------
|
|
Host cs.ubc.ca (137.82.8.5)
|
|
Last updated 03:33 28 May 1993
|
|
Location: /mirror3/EFF/cud/misc
|
|
FILE rw-r--r-- 7936 Mar 8 1992 anarch.man
|
|
|
|
Host kragar.eff.org (192.88.144.4)
|
|
Last updated 00:05 17 Apr 1993
|
|
Location: /pub/cud/misc
|
|
FILE r--r--r-- 7936 Mar 8 1992 anarch.man
|
|
|
|
Host nic.funet.fi (128.214.6.100)
|
|
Last updated 06:11 22 Mar 1993
|
|
Location: /pub/doc/cud/misc
|
|
FILE r-xr-xr-x 7936 Mar 8 1992 anarch.man
|
|
|
|
Host cs.ubc.ca (137.82.8.5)
|
|
Last updated 03:33 28 May 1993
|
|
Location: /mirror3/EFF/academic/books/zzz
|
|
FILE rw-r--r-- 99 Apr 24 17:06 anarchists_handbook.d
|
|
|
|
Host kragar.eff.org (192.88.144.4)
|
|
Last updated 00:05 17 Apr 1993
|
|
Location: /pub/academic/books/zzz
|
|
FILE rw-rw-r-- 81 Oct 23 05:29 anarchists_handbook.d
|
|
|
|
Host cs.ubc.ca (137.82.8.5)
|
|
Last updated 03:33 28 May 1993
|
|
Location: /mirror3/EFF/academic/books
|
|
FILE rwxrwxrwx 25 Oct 11 1992 anarchists_handbook
|
|
-> zzz/anarchists_handbook.d
|
|
|
|
Host kragar.eff.org (192.88.144.4)
|
|
Last updated 00:05 17 Apr 1993
|
|
Location: /pub/academic/books
|
|
FILE rwxrwxrwx 25 Dec 2 04:31 anarchists_handbook
|
|
-> zzz/anarchists_handbook.d
|
|
|
|
Host wpi.wpi.edu (130.215.24.1)
|
|
Last updated 03:31 22 Jul 1993
|
|
Location: /
|
|
DIRECTORY rwxr-xr-x 512 Jul 7 09:20 anarchy
|
|
|
|
Host unix.hensa.ac.uk (129.12.21.7)
|
|
Last updated 01:46 26 Jun 1993
|
|
Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
|
|
FILE rw-r--r-- 8613 Jan 8 03:36 anarchism.today.Z
|
|
Location: /pub/uunet/doc/political/umich-poli/Essays/Chomsky
|
|
FILE rw-r--r-- 22156 Sep 17 1992 notes.on.anarchism.Z
|
|
FILE rw-r--r-- 55985 Feb 2 16:09 notes.on.anarchism.ps.Z
|
|
Location: /pub/uunet/doc/political/umich-poli/Spunk
|
|
FILE rw-r--r-- 861 Mar 1 20:37 README.practical.anarchy.Z
|
|
Location: /pub/uunet/usenet/control/alt
|
|
FILE rw-r--r-- 1535 Sep 11 1992 alt.society.anarchy.Z
|
|
|
|
Host nic.cic.net (192.131.22.2)
|
|
Last updated 01:14 22 Mar 1993
|
|
Location: /pub/nircomm/gopher/e-serials/alphabetic/p
|
|
DIRECTORY rwxr-xr-x 512 Mar 19 16:11 practical-anarchy
|
|
Location: /pub/nircomm/gopher/e-serials/alphabetic/p/practical-anarchy
|
|
FILE rwxr-xr-x 54325 Mar 18 23:02 practical-anarchy.v1n3
|
|
Location: /pub/nircomm/gopher/e-serials/general/politics
|
|
FILE rw------- 92 Mar 21 23:38 .practical-anarchy
|
|
|
|
Host unix.hensa.ac.uk (129.12.21.7)
|
|
Last updated 01:46 26 Jun 1993
|
|
Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
|
|
FILE rw-r--r-- 3550 Mar 18 21:17 anarchism.and.power.Z
|
|
FILE rw-r--r-- 23063 Mar 6 19:45 anarchy-faq-0.1.Z
|
|
|
|
Host charon.mit.edu (18.70.0.224)
|
|
Last updated 02:34 26 Jul 1993
|
|
Location: /pub/usenet-by-group
|
|
DIRECTORY rwxrwxr-x 512 Jul 12 02:46 alt.anarchism
|
|
|
|
Host cs.columbia.edu (128.59.16.20)
|
|
Last updated 10:24 26 Jul 1993
|
|
Location: /archives/mirror2/faq
|
|
DIRECTORY rwxrwxr-x 512 Jul 12 09:54 alt.anarchism
|
|
|
|
Host wiretap.spies.com (130.43.43.43)
|
|
Last updated 03:06 22 Jul 1993
|
|
Location: /Library/Article/Socio/.cap
|
|
FILE rw-r--r-- 28 Apr 5 19:08 anarchy.bib
|
|
Location: /Library/Article/Socio
|
|
FILE rw-r--r-- 23565 Dec 24 1992 anarchy.bib
|
|
|
|
Host unix.hensa.ac.uk (129.12.21.7)
|
|
Last updated 01:46 26 Jun 1993
|
|
Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
|
|
FILE rw-r--r-- 3196 May 11 17:35 anarchist.revolution.Z
|
|
FILE rw-r--r-- 5621 May 11 17:37 macsimin.anarchist.federation.Z
|
|
|
|
Host wpi.wpi.edu (130.215.24.1)
|
|
Last updated 03:31 22 Jul 1993
|
|
Location: /anarchy
|
|
FILE rw-r--r-- 44492 Jul 7 09:19 anarchy.tar.Z
|
|
FILE rw-r--r-- 61332 Jul 7 09:20 anarchy.tar.Z.uu
|
|
|
|
Host wiretap.spies.com (130.43.43.43)
|
|
Last updated 03:06 22 Jul 1993
|
|
Location: /Library/Article/Socio/.cap
|
|
FILE rw-r--r-- 39 May 28 06:28 anarchy.faq
|
|
Location: /Library/Article/Socio
|
|
FILE rw-r--r-- 45315 May 28 06:28 anarchy.faq
|
|
|
|
Host charon.mit.edu (18.70.0.224)
|
|
Last updated 02:34 26 Jul 1993
|
|
Location: /pub/usenet-by-hierarchy/alt
|
|
DIRECTORY rwxrwxr-x 512 Jul 12 02:46 anarchism
|
|
|
|
Host nctuccca.edu.tw (140.111.3.21)
|
|
Last updated 01:04 13 Jul 1993
|
|
Location: /USENET/Periodic_Postings/alt
|
|
DIRECTORY rwxr-xr-x 512 Jul 12 1993 anarchism
|
|
|
|
Host orchid.csv.warwick.ac.uk (137.205.192.5)
|
|
Last updated 05:41 31 Jul 1993
|
|
Location: /pub/cud/misc
|
|
FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z
|
|
|
|
Host clover.csv.warwick.ac.uk (137.205.192.6)
|
|
Last updated 05:04 26 Jul 1993
|
|
Location: /pub/cud/misc
|
|
FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z
|
|
-------------------------------------------------
|
|
|
|
Our point is simple, this material is publicly available almost everywhere
|
|
and the last time we checked (Despite Clinton), we still lived in a FREE
|
|
country with the constitutional right of free speech.
|
|
This is a plain and simple case of Police Harassment against Ionizer.
|
|
We are not claiming he is an angel or saint by any means, as he has had
|
|
numerous encounters with the West Hartford police including his arrest in 1988
|
|
for illegal use of credit cards,computer crime,larcency, and the illegal
|
|
possesion of fireworks.
|
|
But to arrest an individual for having a file on his computer that is public
|
|
domain (Not Copyrighted) and setting a half million dollar bail is complete
|
|
bullshit.
|
|
The EFF has been contacted and we hope the will come to the aid of Ionizer,
|
|
because this may determine what you may have online as a sysop.
|
|
Ionizers preliminary court date is scheduled for August 17th,1993, and we will
|
|
provide you with an update in Phantasy 19.
|
|
|
|
FREE IONIZER!!!
|
|
-=The IIRG 1993=-
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [2]: What Really Happened at "Pump-Con"
|
|
(An Interview With Thomas Icom)
|
|
Interview By: Mercenary
|
|
|
|
For those of you not familiar with Thomas Icom, I'd like to provide this
|
|
brief synopsis before I get to the interview.
|
|
Tom is the Editor/Publisher of Cybertek (The Cyberpunk Technical Journal)
|
|
and is a highly respected writer with credits to his name such as 3 books for
|
|
Consumertronics and articles appearing in such publications as 2600,
|
|
Full Disclosure, and US Militia, (and now Phantasy).
|
|
With the dis-information that is currently circulating in some circles, we
|
|
thought we'd give you the readers of Phantasy the "REAL" story.
|
|
So now onto the interview........
|
|
|
|
Merc: Tom, probably the first question on everyones mind, Is what were the
|
|
real behind the scene going-ons at Pump-Con.
|
|
|
|
Tom: Well, besides your usual drunk and disorderly antics, there were some
|
|
real foolish individuals running around.
|
|
|
|
Merc: For Instance??
|
|
|
|
Tom: We had people practicing their lock-picking skills on the hotels
|
|
vending machines,and breaking and entering into other guests rooms.
|
|
Some individual called and carded a pizza and donuts and the noise
|
|
level was probably being monitored in California.
|
|
|
|
Merc: Without going into explicit details, tell us about the activities
|
|
you witnessed of some amateurish individuals.
|
|
|
|
Tom: As for security, there was none. Individuals had calling cards
|
|
laying out in plain sight. There were notes and notebooks just waiting
|
|
to be confiscated. The hotel door was taped open and we had roughly
|
|
20 people crowded into one room with a constant traffic of people
|
|
flowing in and out. Combined with the noise, and all the activity of
|
|
the people coming in and out we probably attracted plenty of unwanted
|
|
attention.
|
|
|
|
Merc: Ok, theres no security and bedlam everywhere. Lets get to the real
|
|
dirt. Who was responsible for the monitored phone calls?
|
|
|
|
Tom: Well, I'm not sure who was actually responsible. There was a lot of
|
|
"Toll-fraud" activity coming out of the hotel. It got to the point
|
|
where the payphones were alledgedly red-flagged and then we have
|
|
"Ixom Codex".
|
|
|
|
Merc: Ahhh... a name quite familiar to the readers of Phantasy...
|
|
What was Mr. Ixom up to this time?
|
|
|
|
Tom: It apparently seems that Ixom was involved in some sort of scam
|
|
against Bobs Stores (Formerly Bobs Surplus). From what I could
|
|
determine he was working on this project for some time before
|
|
Pump-Con.
|
|
|
|
Merc: Ok theres no security, bedlam everywhere and a known informant in the
|
|
room. Whats next??
|
|
|
|
Tom: Ixom had raised some flags as a result of his little forays into Bobs
|
|
system. When he called from Pump-Con, somebody was waiting and
|
|
watching. After the raid, when the Boys in Blue checked the phone
|
|
records, it was all over.
|
|
|
|
Merc: Theres been alot of talk about who really "Raided" Pump-Con, can you
|
|
provide some insight into this?
|
|
|
|
Tom: Yes, the reason for the Pump-Con raid was due to all the noise and
|
|
possibly the other bedlam that went on. Since there was alot of
|
|
minors going in and out of the hotel room, there was also a potential
|
|
drug profile raised. The cops came in, saw all the minors with alcohol,
|
|
the computers, and calling cards laying in plain view.
|
|
As far as it being a federal case, thats Bullshit...
|
|
The indictments came down from the NY State Grand Jury and the
|
|
investigation was being handled by the Westchester County DA's office.
|
|
The phone company was called in to provide records as evidence,
|
|
and perhaps to give the arresting agency (Greenburgh Police),
|
|
a clue as to what they found. But thats about it.
|
|
|
|
Merc: Now, Ixom and some of his Supporters have been trying to sand-bag
|
|
you. Whats the scoop??
|
|
|
|
Tom: Ixom seemed to have cast his lot with certain elements of a well
|
|
known virus group. Or maybe they cast their lot with him.
|
|
The reason behind it is probably because I bitched at them for
|
|
acting stupid, which resulted in them being raided a week after
|
|
Pump-Con. However their raid had nothing to do with Pump-con.
|
|
Thats another story.
|
|
|
|
Merc: Now its well known by now that something occured which resulted
|
|
in Ixom's and Nightmares arrest and fingers are pointed at you.
|
|
|
|
Tom: Yes... I had to do something or everyone was hosed by one stupid
|
|
individuals actions. So I made sure that only those who deserved to
|
|
take responsibility for their actions did so.. And in this case it
|
|
was Ixom. Rumor has it that Ixom is possibly a party to a
|
|
larger operation against hackers, a reincarnation of the Govt's
|
|
Cointelpro program and after speaking with you numerous times on the
|
|
phone I am inclined to believe this is true. His actions at
|
|
Pump-Con indicate to me that he is either the single most stupid
|
|
individual I've had the bad luck of running into or he was actively
|
|
trying to get the Con busted or get certain people busted afterwards.
|
|
I've also heard from a very reliable source down in DC that Ixom
|
|
was not kicked out of the military for hacking, but assigned to
|
|
something called "Project: Marigold". Supposedly having to do with
|
|
anti-hacker Cointelpro activity, However at this time I have no
|
|
concrete proof of this. As for Nuclear Nightmare he was just an
|
|
innocent bystander who was in the wrong place at the wrong time.
|
|
Its my belief that he was busted because hw was in the room with Ixom
|
|
and the following quote attributed to him, which went along the
|
|
lines of "The only thing that was penetrated tonite was your
|
|
daughter in the back room, officer"
|
|
Damage control was done and all charges against him were dismissed.
|
|
|
|
Merc: What were Ixom's actions that made you think of this?
|
|
|
|
Tom: For Starters, he was hacking out of the hotel room, a strict
|
|
conference No-No since the Summer-Con filmings. Especially with
|
|
all the call accounting that hotels have. Why not just yell out the
|
|
window, Come and get me!!
|
|
The lamer also had the nerve to post my handle on the system that
|
|
he trashed to the tune of a couple thousand dollars that evening.
|
|
|
|
Merc: Well thanks for your time Tom and for clearing up these stupid
|
|
fly by nite rumors that have been flying around.
|
|
|
|
Tom: No problem, glad to oblige....
|
|
|
|
|
|
There you have it folks, In this corner a well known and respected writer
|
|
and in the other corner, a known informant with no morals or honor.
|
|
Sure, I may be biased.. but consider what each has done for the Hacking
|
|
community at large and I think you can see my point.
|
|
I recieved a call on my home phone after we published our original warning
|
|
about Ixom and he of course denied all allegations made by unknown individuals
|
|
against him. but when I offered to publish his side of the story, we never
|
|
recieved anything from him.
|
|
Thus, the IIRG will side with the more respected individual and not a
|
|
born loser.. Thats why Tom Icom has joined our ranks and we're glad to have
|
|
him.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [3]: Bencrypt Encryption
|
|
By: Ben Sodenkamp
|
|
|
|
|
|
BENCRYPT ENCRYPTION
|
|
|
|
Cryptography is the art and science of hiding things in plain sight.
|
|
It is also the art and science of stealing data in plain sight.
|
|
|
|
(Lary Loen)
|
|
***Why Encryption is Important***
|
|
|
|
In today's world of government raids such as OPERATION SUNDEVIL and the
|
|
raid on Steven Jackson Games any Cracker, Hacker, Phreaker, Pirate or other
|
|
techno-outlaw needs to protect himself against the reaching tentacles of
|
|
government "information control".
|
|
As anybody who has ever been busted knows, when they come to your door,
|
|
they take everything that they can find,(toasters,extension cords) that is
|
|
in any way electrical.
|
|
When they analyze your computer(s), they hold anything illegal,
|
|
(Pirated software, Hack(ed) programs,information, userlists) against you in
|
|
court or attempt to us the information to bust your friends.
|
|
If you have any form of illegal data,(or something -THEY- consider illegal),
|
|
on your computer, the only way to protect yourself is to encrypt the data.
|
|
|
|
***How Encryption Works***
|
|
|
|
There are many encryption programs out there. Most rely on a mathematical
|
|
algorithm or a password. The problem with this is that once the algorithm is
|
|
found, or the password guessed, the encryption can be cracked.
|
|
You don't want to watch sweating, as the FED computer specialist tries
|
|
different combinations on your encryption.
|
|
Seeing a need for an unbreakable public encryption system, I began to work on
|
|
BENCRYPT. BENCRYPT does not use a password or an algorithm. It encrypts
|
|
according to a key file. I wish the feds luck 'cause I haven't come up with a
|
|
way to break it yet.
|
|
|
|
Here's how it works:
|
|
|
|
|
|
During the encryption, each byte in the source file will be altered by a
|
|
corresponding byte in the key file. If the key file is smaller than the
|
|
source file, (they usually are) then any given byte in the key file will
|
|
alter more than one byte in the source file. Since having all of the bytes
|
|
in the right values and the right places must be essential for decryption,
|
|
I decided to add the locations of the bytes in the key file to the formula.
|
|
This may be a little confusing, so let me try to show it mathematically.
|
|
Lets say that the 285344'th byte in the key file happens to be assigned to
|
|
the 2342433'rd byte in the source file. The value of the byte in the source
|
|
file happens to be 233 and the value of the byte in the key file happens to
|
|
be 56.
|
|
|
|
First, the (Key Byte) and (Key Location) are multiplied:
|
|
|
|
285344 * 56 = 15979264.
|
|
|
|
Then the product is divided by 255:
|
|
(using integer division to get a remainder)
|
|
|
|
285344 / 255 = 62663
|
|
with a remainder of 199.
|
|
|
|
The remainder is added to the (Source Byte):
|
|
|
|
199 + 233 = 432
|
|
|
|
If the number is over 255, then 255 is subtracted from it:
|
|
|
|
432 - 255 = 177
|
|
|
|
177 is then put in the output file(encryption) in location 2342433.
|
|
Just as 233 was in the source file.
|
|
|
|
The same process is used in the decryption except you subtract 177 rather
|
|
than adding it. Using this system, you must have ALL of the right data in
|
|
ALL if the right places to decrypt.
|
|
The only way to crack it would be to guess the key file. If the key
|
|
file was 1 meg, then they would have to go through 255 to the millionth
|
|
power combinations.
|
|
|
|
*** How You Get It ***
|
|
|
|
The Demo of BENCRYPT (BENCRYPT.ZIP) can be download at any of the following
|
|
fine boards:
|
|
|
|
Buffalo Creek BBS (515)-225-8196 (Easy ACCESS)
|
|
|
|
Jump Start BBS (907)-373-5361 (Easy ACCESS)
|
|
|
|
Rune Stone BBS (203)-832-8441 (NUP:CONSPIRACY)
|
|
|
|
Rusty-N-Eddies BBS (216)-726-3589 14.4,
|
|
(216)-726-3619 9600,
|
|
(216)-726-3620 9600,
|
|
(216)-726-2620 2400.
|
|
|
|
I realize that it would probably be not too much trouble to just crack the
|
|
demo so that it works like the original, but since I am only asking $15, I
|
|
assume that most of you will have the courtesy to register it.
|
|
|
|
PS: Thanx to the IIRG and Mercenary for the ink(data).
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [4]: Hacker OPSEC (Operational Security)
|
|
By: Thomas Icom/IIRG
|
|
|
|
Recently, it seems that cracking down on hackers is in vogue again. All
|
|
it seems to take is one wrong move on your part, or if you don't hack, being
|
|
somewhat affiliated with someone who does. Next thing you know, some
|
|
representat
|
|
to take away your computer and other techno-toys. You don't even have to be
|
|
doing anything illegal! All they need to do is state that seizing your shit
|
|
might aid them in their investigation somehow.
|
|
One of the things that mortifies me is how some hackers out there are top
|
|
experts in defeating security, and yet are so inexperienced in instituting
|
|
security, particularly in regards to their own operational setup. They then
|
|
go get raided, and in addition to getting themselves screwed, their lack of
|
|
OPSEC (Operational Security) gets others screwed, like for example when the
|
|
Secret Service finds a list of other hackers' names and numbers on their hard
|
|
drive. There is simply no excuse for stupidity like that to occur.
|
|
With this in mind, it's time to start discussing some basics of hacker
|
|
OPSEC. Hacker OPSEC, will be defined as the procedures someone in the hobby
|
|
takes to keep himself out of trouble, and to keep his acquaintances from
|
|
getting hassled as a result of something that might happen to him. There's
|
|
nothing complicated about these techniques, and when you're done reading them
|
|
you'll probably say "That's all common sense", however it would appear that
|
|
common sense doesn't seem too common anymore.
|
|
The first and foremost rule of hacker OPSEC is to know what you can, and
|
|
more importantly cannot, mess with. No matter how good you may be, there are
|
|
just certain things that shouldn't be hacked. There are a lot of interesting
|
|
things to play with out there, if you look around a bit. Most of them are
|
|
pretty safe to check out, so for your own safety don't hassle anything that
|
|
will most likely get you screwed if they discover you.
|
|
The main entities you want to avoid playing with are the government, and
|
|
corporations doing R&D work for the government. Now you may say, "Well, xxxx
|
|
is ok. Their security sucks, and the people there are clueless." That may be
|
|
the case, but is it really worth the risk? If they are clueless, then chances
|
|
are very good that if they do discover you they'll overreact and do something
|
|
extreme like have the U.S. Special Operations Command drop a SEAL team on your
|
|
roof. ("I don't know how he did it. He just waltzed into our system! He
|
|
must be working for Arab terrorists! I just read _Terminal Compromise_ and
|
|
everything in the book is happening to us!"). "National Security" is a very
|
|
powerful driving force, and allows them to justify doing a whole lot of
|
|
things.
|
|
The other thing you want to avoid is anything dealing with money,
|
|
particularly banks and other financial institutions. Money is as much a
|
|
driving force as national security, and if "they" assume that you played or
|
|
are going to play games with their money, they'll exert their considerable
|
|
influence on the powers that be to have you tracked down and dealt with. On a
|
|
side note, systems that deal with monetary matters usually do nothing else.
|
|
Since there is usually nothing cool on them anyway, why bother?
|
|
The second rule of hacker OPSEC is to not do anything illegal over your
|
|
home phone, or any other phone which is traceable to you. The government,
|
|
phone companies, and big corporations have always had the capability to know
|
|
where you're calling from since the '60s. Now with Caller-ID, that capability
|
|
is extended to everyone. Doing shit over your home phone these days is asking
|
|
for trouble, and an easy way to get caught.
|
|
Payphones are still the number one way to cover your tracks. Random
|
|
payphone usage is safe for the most part. The only exceptions are in
|
|
instances where the payphones in a given area are being used for drug
|
|
trafficking and are being monitored because of that, or when some idiot has
|
|
been phreaking heavily from the same small area for the past few months, and
|
|
the phone company decided it's cheaper to do something about it than continue
|
|
to absorb the loss. My personal experience is that airports are the best
|
|
place to use payphones from. There are usually payphones which have modular
|
|
jacks so you don't need an acoustic coupler, and people from all walks of life
|
|
are there, so you won't look out of place. My personal experience has also
|
|
indicated that hotels are usually the worst place to do anything from. Hotel
|
|
employees are always suspicious, and thus are always asking questions of the
|
|
people in their hotel, particularly if they haven't checked in. Also, as the
|
|
participants of Pumpcon can attest, hotels are often quick to call the police
|
|
when something doesn't quite fit into their reality picture.
|
|
Another favorite phone phreak OPSEC trick is known by the terms "canning",
|
|
"pedestal hacking", "beige boxing", and "hardwiring". This basically entails
|
|
hooking into a random phone line somewhere, and using it to make outgoing
|
|
calls. The first three techniques are usually used to indicate a temporary
|
|
connection. One usually walks up to a test point on the phone company's
|
|
outside plant, and hooks in. These test points are commonly called "bridging
|
|
heads", "b-boxes", "(phone) cans", or "pedestals". The forth term is usually
|
|
used to indicate a more permanent set up; in essence a clandestine extension
|
|
of the target phone line.
|
|
One fun thing to try is to power a cordless phone base by means of a large
|
|
capacity rechargeable battery, and then hook it up to a phone can somewhere.
|
|
This keeps you from having to stand suspiciously at the can for hours a end.
|
|
(A common problem when canning) So even if they do trace the call back to the
|
|
phone line you're using and send in the Bellcore Rapid Deployment Force to
|
|
adjust your attitude, you'll still be a football field away when the shit hits
|
|
the fan. It should also be noted that by adding an external antenna to the
|
|
base station, (a 60 inch 1/4 wave ground plane would be cheap to make and
|
|
perform decently) you can increase the range on most phones up to 1/2 mile.
|
|
(and get the FCC pissed off at you if they found out you did this. So be a
|
|
nice law-abiding person and obey FCC Part 15 Regs. Then they might leave you
|
|
alone, maybe.)
|
|
There are also many other techniques that you can use. If you are
|
|
interested in learning more about the technical procedures of covering your
|
|
tracks in cyberspace, you should check out "2600: The Hacker Quarterly",
|
|
"TAP", and (excuse the self-promotion) "Cybertek: The Cyberpunk Technical
|
|
Journal". They all contain a wealth of technical hacking and phreaking info.
|
|
Now that you are not doing anything over any phone traceable to you, your
|
|
next step is to keep your activities to yourself. Yes, hacking is a often a
|
|
big ego boost, but talking about your latest accomplishment is likely to get
|
|
you into trouble. If "they" get wind of what you're doing, it makes it that
|
|
much easier for them to get you, no matter what precautions you might be
|
|
taking. In the same vein, avoid getting involved with large groups. If you
|
|
must do something which involves more than one person, then make sure you
|
|
intimately know the people you will be involved with, and keep the group as
|
|
small as possible. My criteria for trusting someone is that I've known them
|
|
for at least a few years, know their real name, and have physically hung out
|
|
with them extensively for a couple years. My gut reactions to the person also
|
|
have a big say in whether or not I trust him or her. Believe it or not, we
|
|
all have a sixth sense which can be developed over time, and is very helpful
|
|
in keeping us out of trouble.
|
|
Despite the fact that you've been careful, you still might be noticed by
|
|
someone somewhere, and as a result get hit with a search warrant or be the
|
|
victim of a Cointelpro-style black bag job. To combat this, don't keep
|
|
anything sensitive at your house. Store all your good stuff off site, so you
|
|
won't lose it. Any sensitive data you have to keep at your home should still
|
|
be backed-up at an off-site location, and encrypted.
|
|
There are a lot of good encryption systems out there. The current rave in
|
|
encryption software is PGP, "Pretty Good Privacy". It's available on any good
|
|
BBS system, and seems to be what everyone is going to be using. The nice
|
|
thing about PGP is since it's a "Public Key" system, it allows for secure
|
|
communications without having to exchange keys. If you don't give a shit
|
|
about exchanging data with strangers or have a secure way to exchange keys,
|
|
then there's Video Vindicator's "VinCrypt". It's also available on any decent
|
|
system.
|
|
Another good one is Consumertronics' "Absolute Computer Security". More
|
|
a set of applied encryption ideas and concepts; as opposed to a strictly
|
|
defined system, ACS is capable of being totally customized by it's user, and
|
|
while the original software is for MS-DOS machines; can be ported over to
|
|
other systems. It should be noted that the effective use of ACS requires some
|
|
applied intelligence on behalf of its user. If that's a problem with you,
|
|
then you'd be better off using something else.
|
|
One favorite of mine is the "one-time" cipher system. Basically the one-
|
|
time system uses a randomly generated non-repeating key which is then used to
|
|
encrypt your data. Most people think that one-time cipher systems are a pain
|
|
in the ass to use, but they are unbreakable as long as your key is kept
|
|
secure. I'll talk about it more in the next chapter.
|
|
No matter what encryption system you use, it won't be worth a damn if you
|
|
use poor judgement in the selection and protection of your encryption keys.
|
|
Make your key as long as possible, hard to guess, and not restricted to just
|
|
alphanumerics. Any encryption system will fail if it prompts you for a key
|
|
and you enter "SECRET". And since you're an intelligent person I won't insult
|
|
you by reminding you to keep your encryption key secure, and to use a
|
|
different key for each file you want to protect.
|
|
If it is possible for you to do so, I would also hide the data on the
|
|
floppy so that it appears invisible to the average user. Some of the ideas
|
|
that quickly come to mind are tacking the encrypted data on the end on a legit
|
|
executable file, or putting the data on a sector which is then marked "bad" so
|
|
it won't be overwritten.
|
|
A really good idea, if your serious about OPSEC, is to use arcane or
|
|
custom hardware and software. While you won't be compatible with the rest of
|
|
the world, you'll at least be secure. ("But then I won't be able to play
|
|
"Leisure Suit Larry" like I can on my PC!") Someone should design an MS-DOS
|
|
version of Beagle Bros. "Dos Boss" Apple II DOS Customizer, which would allow
|
|
changing of DOS command names. You could change "TYPE" to "DELETE", so anyone
|
|
attempting to read your files would instead wipe them. An even more fantastic
|
|
idea would be a custom secure operating system based on the one used in Robert
|
|
A. Heinlein's book, _The Number of the Beast_. He wrote about a "double
|
|
bookkeeping" system which looked ordinary, but unless it received certain
|
|
discrete keystrokes, would display a set of decoy data, while erasing the real
|
|
data hidden on the system. Doing a setup like that shouldn't be a problem to
|
|
an experienced programmer.
|
|
Now if you've followed all these guidelines, you can consider your
|
|
operation secure, and have little to worry about. Hacker OPSEC really boils
|
|
down to two things, Common Sense and Caution. On the other hand, you
|
|
feel that these precautions are little bit on the paranoid side. Just
|
|
remember two things. The first is that hacking and phreaking are currently
|
|
looked down upon by those in power. The second thing you should remember is
|
|
what happened during Operation Sundevil.
|
|
|
|
-Thomas Icom
|
|
International Information Retrieval Guild
|
|
"May Odin guide your way."
|
|
|
|
Sources Mentioned:
|
|
|
|
Consumertronics
|
|
2011 Crescent Dr.
|
|
Alamogordo, NM 88310
|
|
505-434-0234
|
|
|
|
Absolute Computer Security:
|
|
Manual & MS-DOS diskette -$29
|
|
Manual alone -$19
|
|
|
|
2600: The Hacker Quarterly
|
|
P.O. Box 752
|
|
Middle Island, NY 11953
|
|
516-751-2600
|
|
Subscriptions: $18/year
|
|
|
|
TAP
|
|
P.O. Box 20262
|
|
Louisville, KY 40250
|
|
Sample issue: $2
|
|
Write for more info.
|
|
|
|
Cybertek
|
|
P.O. Box 64
|
|
Brewster, NY 10509
|
|
Subscriptions: $15/6 Issues
|
|
Sample: $2.50
|
|
|
|
PGP: Pretty Good Privacy and VinCrypt
|
|
Available on most decent BBSes.
|
|
Try: Uncensored (914)-761-6877 or the Rune Stone (203)-832-8441
|
|
NUP:Conspiracy
|
|
Libertarian's in '96!
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [5]: The Libertarian Responsibility of The Cyberpunk Movement
|
|
By Thomas Icom/Cybertek/IIRG
|
|
|
|
With the moves that various government powers have been taking to
|
|
institute a totalitarian form of government in this country, it has now
|
|
become the responsibility of the Cyberpunk movement to take such measures as
|
|
to prevent these actions from occurring and reverse what damage has already
|
|
occurred. When one takes into account the various factors involved in
|
|
reclaiming a democratic state from totalitarian rule, it will be found that
|
|
the Cyberpunk movement is the best equipped to handle the task. The movement
|
|
has the necessary political attitudes, equipment, and knowledge to prevent
|
|
further government progress into totalitarian rule and reverse the steps
|
|
that have already been taken by various government entities towards that
|
|
direction. The Cyberpunk movement also has a personal stake in the
|
|
prevention of totalitarian rule; which has an equal footing with altruism.
|
|
It is for these reasons that the movement should be at the forefront of "The
|
|
Second American Revolution", and contribute their knowledge and attitudes to
|
|
its success, and the restoration of a libertarian form of government to the
|
|
United States of America.
|
|
The Cyberpunk movement has always had the libertarian attitude of "The
|
|
government which governs best, governs least.", and "Technology belongs in
|
|
the hands of the people". These attitudes follow in the footsteps of the
|
|
country's founding fathers. The lack of such an attitude by those in power
|
|
has been a major factor in the totalitarian slides this country has been
|
|
experiencing. The Cyberpunk movement has also stayed away from the
|
|
forefront of politics; preferring to stay in the background, let others "run"
|
|
things, and act as "watchers"; keeping vigilant for lapses in judgement by
|
|
the ruling powers. This attitude is precisely what is needed for those who
|
|
will be at the forefront of The Second American Revolution, for once the
|
|
initial job is done, "disinterested" parties will be needed to ensure the
|
|
mistakes of the past are not repeated. The existence of well-equipped
|
|
Cyberpunk "Watchers" will act as a future deterrent to those wishing to
|
|
revert back to totalitarian ways.
|
|
The Cyberpunk movement has always given a high priority to acquiring
|
|
knowledge in many different technological and other fields. They have also
|
|
been adamant about implementing the mass-distribution of such information.
|
|
These two factors alone are qualifiers for any group conducting low
|
|
intensity conflict towards the institution of a libertarian form of
|
|
government. In addition, the Cyberpunk movement stresses practical
|
|
"hands-on" applications of the knowledge they collect and disseminate. This
|
|
is another factor that makes the movement well suited for the task at
|
|
hand.
|
|
Since the Cyberpunk movement has the proper attitudes and knowledge
|
|
available to it, they are well suited for the task of ensuring the United
|
|
States regains and maintains a libertarian form of government. Just as the
|
|
founding fathers had a responsibility to create the United States, the
|
|
freest country in the world; it is now the responsibility of the Cyberpunk
|
|
movement to restore the freedom that this once great country lost, and to
|
|
take on the responsibility towards the operational aspects of The Second
|
|
American Revolution and the re-establishment of a libertarian form of
|
|
government in this country. There is, however, an even more important and
|
|
pressing reason as to why the movement should act.
|
|
Throughout history, even in benign and democratic governments, there has
|
|
been prejudice towards individuals and groups who have the capability of
|
|
self-sufficiency. Such groups have been persecuted severely, with their
|
|
members often facing death. This has occurred even if such groups have had
|
|
no political leanings whatsoever. They were simply viewed as a threat to
|
|
the powers that be, and dealt with. By taking a look around, any astute
|
|
observer will be able to see this beginning to happen with the Cyberpunk
|
|
movement. In this instance, we have the greatest responsibility of all, the
|
|
responsibility to ourselves to ensure our survival.
|
|
One must remember that our responsibility to the revolution does not
|
|
imply we should organize any more than we already have. In fact, our
|
|
activities should be kept to small groups, and be as disorganized overall as
|
|
possible, as to better stay hidden and difficult to track down. Twenty small
|
|
groups operating on their own will be harder to track down than one large
|
|
group. If everyone just simply does there part, there will be no problem
|
|
winning this one. Our shadowy existence and characteristic of being
|
|
"everywhere and nowhere" will also act as a deterrent to keep the future
|
|
government leaders from acting as stupid as the ones we presently have in
|
|
existence.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [6]: FOR THE PEOPLE
|
|
Supplied By: Those Wacky Secret Service Agents
|
|
Edited by: Mercenary
|
|
-------------------------------------------------------------------------------
|
|
|
|
Secret Service Agents Get Free Vacation
|
|
|
|
Rumor has it that the Secret Service security detail of Secretary of Defense
|
|
Les Aspin were provided with a swank 6 day/5 night holiday in Venice,Italy
|
|
|
|
Courtesy of U.S. Taxpayers.
|
|
|
|
It seems that Aspin finished off an official business trip in Europe with a
|
|
jaunt to Italy. Although Mr. Aspin payed for his own expenses and his
|
|
girlfriends, the SS Agents were provided with $500.00 to $700.00 a nite rooms
|
|
in the 5-Star Hotel Danieli, courtesy of you and me.
|
|
Must be nice, probably a reward for harrassing innocent civilians.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [7]: The Rumor Mill (Unconfirmed Rumors From the Underground)
|
|
Edited By: Mercenary
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
HAN SOLO SELLS OUT TO THE EMPIRE??
|
|
|
|
I am writing to update you on yet another 203 lamer (this area code seems to
|
|
be chock full of em) named Rob A. (aka Han Solo and sometimes Lurker).
|
|
He turned me in to Yale for supposedly hacking an account on their VMS system.
|
|
They will probably be calling me shortly. His reasons are that I purportedly
|
|
"screwed him over" with a little deal we had.
|
|
The deal was, I'd give him a UNIX account at SCSU in exchange for the use of
|
|
his account on a very nice elite BBS. Things went fine until he got it in his
|
|
head that I'd shared that unix account with someone else, which was not true.
|
|
He then took it upon himself, as a "security measure" to turn me in.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
DR. DETERGENT OF TDT RETIRES??
|
|
|
|
June 15, 1993
|
|
Dr. Detergent / TDT 1993
|
|
|
|
|
|
I herby officially retire from the scene. Got an excellent job which
|
|
takes me all over the world, so I don't have time for this stuff any more.
|
|
To all the sysops worldwide, please delete my accounts on your boards.
|
|
If there are any new applications under my name, you may rest assured
|
|
that it's not me.
|
|
It was great serving the Elite underground. Take care all ya boiz - my
|
|
friends, and maybe some enemies (don't remember having any thou!)
|
|
All ya groups, keep up the good work ya do for the pirate scene - as you
|
|
know without you, there would be nothing.
|
|
This is a very short msg, compared to most of the docs I write, but it's
|
|
all that's needed.
|
|
|
|
Till sometime in the future.
|
|
Take care.
|
|
|
|
Dr. Detergent : VEC/GB/INT/PHX/INC/DW/UNT/THG/TDT. 1988 - 1993.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
FEAR AND LOATHING BBS BUSTED
|
|
|
|
Hello,
|
|
|
|
Well, there is some TERRIBLE NEWS here.
|
|
|
|
The FEAR & LOATHING BBS in Las Vegas,Nevada was BUSTED today, Aug. 3, 1993.
|
|
|
|
At 8 am. - The FBI from Birmingham, Alabama came in and presented a Search
|
|
Warrant dated 7/29/93 and proceded to swipe every piece of Electronics
|
|
from The Doctor - SYSOP of the Fear & Loathing.
|
|
|
|
What they told the Doctor was this..... to paraphrase .
|
|
|
|
"Didn't you learn a lesson from Rusty 'n' Edies?
|
|
We have been subscribing to the Fear for about a year, and we have
|
|
capture screens of your Board.
|
|
We know you have NOVELL and Quarterdeck stuff on your Board."
|
|
|
|
(When Doc protested that he did NOT and had a strict NO-NOVELL Policy,
|
|
they said that he DID have NOVELL stuff on - about 3 months ago.
|
|
They also spoke informatively of the files and messages that had passed
|
|
thru the Fear)
|
|
|
|
Two NOVELL guys and one Quarterdeck guy were in on the Raid.
|
|
It was ALL FBI and no LOCAL Cops were involved.
|
|
All Doc's Computers and Electronic Gear were taken away, "to be studied in DC"
|
|
|
|
All Fear Users should know that the Doc kept NO PERSONAL, or USER INFO on his
|
|
system. In fact,despite that I feel SICK to my STOMACH and that next to Doc,
|
|
I have lost more in this bust than any other user, as I was Cosysop and
|
|
Top Uploader - having ULed almost half a GIG.
|
|
I must ask WHY the Feds would go after the Fear,a Big BBS but not the Biggest,
|
|
a fast BBS but not the FASTEST, a NICE sysop but one who didnt even USE the
|
|
wares he had. They asked him where all his DISKS were, but since he didnt USE
|
|
the wares, he truly didnt HAVE any!
|
|
|
|
They saw a MiniCam VCR Camera he had and asked him where the Tapes he
|
|
made of his BBS Screens were. When Doc protested that he did not MAKE Videos of
|
|
his screens and why should he? .. the Feds said .. EVERYBODY does !
|
|
|
|
Well, this is one of the saddest days in my life.
|
|
Of course its nothing compared to what the Doc is going thru.
|
|
Yet, the Doc remains cheerful. He needed the Fear & Loathing and BBSing like
|
|
a Hole in his Head.
|
|
The Pirate community knows that the Doctor did not even call out and had maybe
|
|
one or two accounts on ANY other Pirate BBSs, and those he almost never used.
|
|
The Doctor lost the Hardware for a BBS that was 7 Nodes and about 7 Gigs, all
|
|
the computers and USR 16.8k Modems and LAN Network etc,etc.
|
|
Gotta be worth probably at LEAST $15,000.
|
|
Anyway, the Fear Bust will have minimal impact on other BBSs as the
|
|
Doctor truly almost NEVER called out and really doesnt KNOW anything
|
|
about other Pirates and Groups and Boards.
|
|
As the Fear was a TDT and ECR Member BBS, Those Groups suffer in losing a good
|
|
BBS. We must wonder, after the Bust of the Lite House, another TDT BBS.
|
|
Whether TDT BBSs are being targeted.. however... I think NOT,as the Lite House
|
|
was a purely LOCAL Bust. NO FBI involved there,and was the result of some Kids
|
|
getting caught with stolen CC's. More on this later below.
|
|
|
|
THE FEAR NEVER WAS INVOLVED IN H/P/A/V Stuff
|
|
We NEVER had any Credit Carding info online.
|
|
|
|
BECAUSE we had no CC info, my first thought was that this was the first case
|
|
of a BBS being busted that was a PURE Pirate BBS.
|
|
|
|
BUT .. THE LESSON OF THE FEAR BUST IS THIS......
|
|
|
|
SUBSCRIBERS WILL DO YOU IN !!
|
|
|
|
Upon some one hours' thought after learning of the Fear Bust.
|
|
I realized from the info I listed above - that the FBI had said that they
|
|
had SUBSCRIBED (A PAID ACCESS ACCOUNT) that the pathway to DOOM for
|
|
the FEAR was just that .... ALLOWING SUBSCRIBERS to "PAY FOR WARES" .
|
|
|
|
YES... we DID have some NOVELL stuff online for a very short time ...
|
|
but so does almost every other Pirate BBS.. it is the large number of
|
|
Subscribers that I suspect opened the Window of Vulnerability.
|
|
|
|
My advice to my brother Pirate Boards is to ELIMINATE SUBSCRIBER ACCESS.
|
|
SUBCRIPTION ACCESS seems now to have been earmarked as NOT ALLOWABLE by
|
|
the FEDS. We all know that the Feds and AT&T have the capability to
|
|
bust any and every Pirate BBS in the USA ... but they DON'T .
|
|
|
|
The ONLY "crime" of the Fear outside of Regular Piracy was allowing
|
|
SUBSCRIBERS and PAID Access.
|
|
Again... we had NO Credit Cards info or XXX rated files etc etc...
|
|
|
|
Off the top of my head ... the Davy Jones Locker Case comes to mind ...
|
|
but THERE I believe the Sysop ( Jackson - ?? ) WON his defense as I
|
|
recall .. BUT the circumstances were quite different.
|
|
The APL case may be a closer comparison.
|
|
|
|
The terrible IRONY of this bust is that ... the Fear had been slowly
|
|
REDUCING the number of subscribers ... and if the Doc had wanted to screw
|
|
the Users.. he would have preferred to ELIMINATE ALL Subscription access
|
|
MONTHS AGO ... as SUBSCRIBERS ARE LAMERS and contribute NOTHING to
|
|
BBSing. Well.. any experienced Sysop knows THAT .
|
|
|
|
The Fear was TOO NICE.
|
|
|
|
And now.... one great Sysop, a Gentlemen, a Physician MD, and one of
|
|
the Best Human Beings I have ever known is now in Bad Trouble.
|
|
He is fortunate in that he has a great Life, can afford the $$ loss of
|
|
the Hardware and to make his own Legal Defence.
|
|
I am sure he will soon put all this behind him ... the BBS had been a
|
|
Pain in the Ass for him anyway ... and I think that He (and I) have
|
|
slowly been growing away from the scene .
|
|
|
|
So ... the Fear and Loathing ...over 10 years old.. is DOWN FOREVER.
|
|
|
|
The BBS has been having Hardware problems anyway and the Doctor just
|
|
doesn't need the Headaches. He had a great Run and I think made a
|
|
difference in the Pirate Scene.... The Fear and Loathing was a FRIENDLY
|
|
Place to be ... and as I consider the loss of my favorite place to call...
|
|
it occurs to me that maybe *I* have some blame in this .
|
|
|
|
When I became a Cosysop of the Fear .... it was not as Fast or as
|
|
Big as it ended up. In fact ... it was a bit of a Sleepy Southern BBS.
|
|
Perhaps it was due to my efforts to make the Fear - a Fast KickAss BBS ...
|
|
to join up with TDT and ECR .. to get a whole new bunch of Great Users..
|
|
and to advertize the BBS.. perhaps the increased exposure, the Groups, the
|
|
Fast Wares .. did the Doctor in. Maybe the Fear could have remained a
|
|
nice medium Board for another 10 years.
|
|
|
|
But before I throw up ... I am reminded that the Feds DID say that they
|
|
had been subscribing to the Fear for about a year .. maybe even more.
|
|
|
|
That would mean that they were on the Fear even before I became a
|
|
cosysop there...altho' I have been a Fear User for over 4 years.
|
|
But the point is then ... that.. if they were on for THAT long ... then
|
|
probably the Bust was just in the Cards.. and was bound to happen
|
|
sooner or later.
|
|
|
|
In fact.. the Fear was DOWN all last week due to hardware problems
|
|
even on July 29th when the Search Warrant was issued... and only came
|
|
back online ..about 2 days ago.... maybe THAT was the reason for the
|
|
Bust NOW...OR maybe it was that the shitty NOVELL DOS wares that are going
|
|
around the Boards ... had just been ULed to the Fear .
|
|
|
|
The Fear and Loathing was started a bit after Plato's Place- an old THG
|
|
BBS. The Doctor only wanted to become as Big or Bigger than Plato's,
|
|
he suceeded quite well in doing just that .
|
|
|
|
|
|
Some other Comments that come to mind follow below ; I have just learned
|
|
about this less than an hour ago and my thoughts are not quite coherent
|
|
and set in place just yet .. and imagine the Doctor...after the FBI
|
|
came to his Home and spent the last 4 hours of this morning going thru
|
|
his house ... jeesus....:
|
|
|
|
As usual they arrested all the HARDWARE .. but the Doctor has not been
|
|
indicted.... YET! They said that the case will take between 1 and 5
|
|
years to process and that he faces a JAIL term if convicted.
|
|
Personally , I think Jail is very unlikely for Property ... not Violent
|
|
Criminal acts.... and for a first time offender with a good job and who
|
|
is credit to his community.
|
|
|
|
But who the hell wants to face even the POSSIBILITY of Jail ? And to
|
|
have to live with that over your head for the next year or years ??
|
|
|
|
The Doctor is a victem of pure Novell GREED.
|
|
The Novell guys asked him if he knew how much Money the Software
|
|
Companies were losing because of him ??
|
|
|
|
This is a BAD JOKE... as the Fear had never much more than 500 Users...
|
|
of which... what... how many would be really active and of THOSE how many
|
|
people would be INTERESTED in DLing NOVELL products..... maybe 50 ??
|
|
and of THOSE how many people would have the DL Bytes available or
|
|
access to DL a Huge ware like Novell... you KNOW that these Big Pirate
|
|
Wares are NEVER DLed much ... thats why CD-ROMshit is not allowd on
|
|
many BBSs.. and anyone who knows anything knows that Novell is WAY too
|
|
complex a ware to try and use by simply DLing a Pirate version of it...
|
|
so Novell lost maybe 10-20 Possible Sales....or certainly .. far less.
|
|
|
|
BUT .... HOW MANY PIRATES .. IF THEY WERENT GETTING THE SHIT FOR ALMOST
|
|
FREE... WOULD ACTUALLY BUY ANY OF THE WARE THEY DLed!!
|
|
|
|
AND .. how many wares they DL are actually WORTH BUYING !!??
|
|
( THIS is why piracy EXISTS )
|
|
|
|
The Doctor was that rare Sysop who DID BUY SOFTWARE. HE DID BUY PCBOARD.
|
|
He DID BUY LANTASTIC .He DID BUY PRODOOR (which he didn't like or use).
|
|
He DID BUY the stuff he LIKED.
|
|
|
|
AND.. Irony of Ironies... because the Fear had outgrown Lantastic having
|
|
7 busy Nodes ... he was all ready to BUY NOVELL 3.11 NEXT WEEK !!!
|
|
|
|
SO .. intelligent NOVELL actually LOST ONE GURANTEED SALE of NOVELL
|
|
Products with the Fear Bust . They could have Milked the Doc for YEARS
|
|
with Paid Support and Addon Products... but this is not to be.
|
|
|
|
A FINAL NOTE OF WARNING :
|
|
=======================
|
|
|
|
The FBI said that they had subscribed to the Fear for about a Year.
|
|
|
|
THEY SAID THAT THEY HAD BEEN ESTABLISHING THIS ACCOUNT HANDLE FOR ABOUT
|
|
5 YEARS !! AND THAT THEY WERE GOING TO GO AFTER OTHER BBSs !!!!!
|
|
|
|
THEREFORE WE KNOW IT WAS SOMONE FAIRLY WELL KNOWN WHO WAS A SUBSCRIBER.
|
|
RIGHT NOW WE ARE COMBING THRU THE FEAR SUBSCRIBER LIST ... IT HAS TO BE
|
|
SOMEONE THEREFORE WHO IS ON MANY OTHER BBSs .. A WELL KNOWN USER .. BUT
|
|
PROBABLY NOT A BIG TIME PIRATE ... OR ELSE THEY PROBABLY WOULDNT HAVE
|
|
BEEN A SUBSCRIBER. SO... probably NOT A EUROPEAN.
|
|
|
|
WE MAY MAKE THE FEAR SUBSCRIBER LIST PUBLIC AND LET OTHER SYSOPS LOOK
|
|
THRU THE LIST AND COMPARE AND SEE WHO THE USER ACCOUNTS NAMES THEY HAVE
|
|
IN COMMON WITH THE FEAR LIST..AND THUS NARROW DOWN WHO THE "MOLE" MIGHT
|
|
BE THAT IS THE FBI/NOVELL TRAITOR PIRATE.
|
|
|
|
SOMONE HAD MENTIONED TO ME THAT THERE WAS A NOVELL REP PIRATE ON MANY TOP
|
|
BBSs BUT REFUSED TO GIVE ME THE NAME. THEY ALSO PREDICTED THAT SOME
|
|
BBSs WOULD GO DOWN " IN A MONTH" .
|
|
THAT WAS A MONTH AGO .... MAYBE NOW THEY WILL GIVE ME THAT NAME.
|
|
|
|
Personally , I have just made a back up of all my Computers and have
|
|
hidden away all my Disks, Tapes and Anything and EVERYTHING Pirate Related
|
|
and have Cleaned off of my computers any Pirate Wares or Copyrighted
|
|
Software or BBS numbers so I am cool ... I have never heard of the Feds
|
|
going after Cosysops .. but I am ready . I have hidden all this stuff
|
|
off of my property .
|
|
My accounts on other BBSs are cool because I always have unique
|
|
passwords on each and every BBS I call and so the psws I had on the
|
|
Fear are NOT used on any other accounts I have.
|
|
|
|
*************************************************************************
|
|
**BUT ALL FEAR & LOATHING USERS WHO HAVE ANY ACCOUNTS ON ANY OTHER BBSs**
|
|
**THAT USE THE SAME PASSWORDS AS WERE USED ON THE FEAR & LOATHING BBS .**
|
|
**MUST CHANGE THOSE PASSWORDS IMMEDIATELY ! **
|
|
*************************************************************************
|
|
|
|
THE FEDS DO HAVE THE FEAR's COMPUTERS AND HARD DRIVES.. THEY DO HAVE
|
|
THE USER LISTS !!!
|
|
|
|
As for me - I am obviously diminished as a Pirate Influence but
|
|
will still be a Trader... in fact .... my own phone bills will
|
|
probably be much much less without the long distance calls of an hour or
|
|
two a day to the Fear...and the Doctor will be saving much $$ and Time
|
|
spent running a BBS who's wares he didnt even USE.
|
|
|
|
I may even start a BBS of my own someday.. one reason I wanted to be a
|
|
Cosysop was to see what running a BBS was like.
|
|
If I do start a BBS.... RULE # 1 = NO SUBSCRIBERS !
|
|
|
|
The Doctor remains in an upbeat mood.. altho' perhaps in a state of shock.
|
|
He is a strong confident successful hard working man and will weather
|
|
this storm very well I am sure.
|
|
|
|
Most Top BBS have a MUCH greater majority of good Users who are on many
|
|
other BBSs. Or I should
|
|
Users...for sadly.. I must speak now in the Past Tense when I talk of
|
|
the Fear and Loathing.
|
|
But ... on the Fear ... the 170 or so subscribers were for the most
|
|
part... WITHOUT other good BBSs to call... thats why they subscribed to
|
|
the Fear. It is THESE Users who will be the most affected the loss of
|
|
their favorite Board .
|
|
|
|
The Doc will survive fine without the Fear ... but he will not be a
|
|
member of the Pirate Community any longer and from the info above
|
|
here.. you may have learned that ... while he ran a large Pirate BBS...
|
|
he was not widely known ..nor did he care or need the Pirate Wares that he
|
|
himself provided to others thru the Fear and Loathing BBS.
|
|
|
|
He didnt have the Time and he didnt have the Interest.
|
|
And he certainly doesnt NOW !
|
|
|
|
And as I mentioned to him.. compared to the REALLY Sick patients he
|
|
sees in the Operating Rooms... he may very well be better off to be rid of
|
|
something that was becoming a Pain in the Ass....running a large BBS is
|
|
cool at first... but after 10 years.. it does tend to become a CHORE...
|
|
especially as more and more "old-timers" are leaving the scene as
|
|
Piracy is not what it once was.
|
|
|
|
I remain a Pirate. But I think I will slow down . A lot of the FUN
|
|
has now gone out of the scene for me. I enjoyed trying to help the
|
|
Fear and Loathing to Grow... I enjoyed trying to help out the busy Doctor
|
|
in the running of his BBS . I enjoyed the interchange with all the
|
|
good Users I met on the Fear and I hope I can keep in touch with them
|
|
in the Future... as I certainly intend to keep in touch with the Doctor.
|
|
I will still trade and indeed .. will have more time now to do so ...
|
|
... after time mends my broken heart.
|
|
|
|
It is due to the fact that the Doctor had never bothered to call out
|
|
very much and get accounts on many BBSs that he asked me to inform the
|
|
Pirate Community at large of the Demise of the Fear ... and the Lessons
|
|
that can be learned .
|
|
|
|
Those of you that know me ... know that my worst vice is that I write
|
|
Email that is WAY TOO LONG.... and Ive done it again... but perhaps for
|
|
the last time.
|
|
|
|
I hope that people will remember the Fear and Loathing in Las Vegas BBS,
|
|
----- after all 10 years is a long time .
|
|
|
|
I know I will . It was one of my First Pirate BBSs !
|
|
The Doctor let me have access on my first call when upon filling out the
|
|
New Users application... he interrupted me to Chat and upon learning
|
|
that I was a Plato's Place guy and did have some new Wares and one or
|
|
two other BBSs.. accessed me on the spot.
|
|
I never forgot that act of Generosity and was loyal to Him and the Fear
|
|
ever since. I hope I gave more than I received.... but the lessons I
|
|
have learned and people and friends I have made through the Fear far
|
|
outweigh whatever I may have contributed to the Fear BBS.
|
|
|
|
Piracy is NOT just about WARES.... Its also about PEOPLE .
|
|
|
|
Novell may have won one round here against the Fear but they can NOT win
|
|
the Pirate War... there will always be New Sysops willing to fight against
|
|
Outrageously Priced Software, Over Hyped, Non-Working or
|
|
non-functioning features-as-advertised, expensive micro-Updates every
|
|
few months and so on and on ...beyond the scope of this message.
|
|
|
|
And I must say that the Vast Majority of you , my Pirate Brothers,
|
|
I have found to be excellent , very friendly and intelligent people.
|
|
|
|
But there ARE MOLES and TRAITORS among us Pirates... these scum of the
|
|
Earth... who will DL and enjoy many Wares on the unfortunate Boards
|
|
they are on .... and then Bust those Boards .... perhaps even after
|
|
being the ULers of their own NOVELL Wares themselves in a Sting operation
|
|
( we are checking this out too ) .. those scum are doomed by their own
|
|
natures to be worthless, friendless creatures ... for what sort of
|
|
human beings can they be... and no one likes a snitch... and anyone who
|
|
DOES these acts .. surely will be having a shitty life ... as who else
|
|
but a totally shitty low-paid small-minded person would do such things.
|
|
|
|
The Revenge of the Fear is that the Traitor Pirate will be found out in
|
|
the Legal Proceedings OR SOONER & that Novell is doomed anyway
|
|
... with UNIX COSE Networking beoming friendlier & even Microsoft getting
|
|
into the Networking Competition. Through its Pricing and Service and Bugs.
|
|
Novell's own Life expectancy may not be too high.
|
|
|
|
In fact ... Novells' Stock Prices today at 20&3/4 on the NASDAQ exchange
|
|
is down today .... they have my sincere wishes for a swift and complete
|
|
fall into Chapter 11 Bankruptcy.
|
|
He laughs Best who Laughs Last. Novell may have some Bad Luck in the
|
|
Future as doing Bad Deeds always comes back to haunt the perpetrator
|
|
sooner or later and they have made many Enemies..
|
|
|
|
So I close ... but on a positive note .... Piracy Lives and in fact
|
|
there are MORE and MORE Pirate Boards now as Piracy becomes more
|
|
"MainStream" into society with cheap fast Modems and Cyperpunks on MTV.
|
|
|
|
I am just old enough to have experienced the "60's",and I have always
|
|
regarded Piracy and Pirates as some of the few true remnants of the "60's"
|
|
Underground Movements .
|
|
|
|
I am happy if I have helped the Doctor - the most unselfish Sysop I
|
|
have ever known - and one of the FASTEST Sysops... I've seen him
|
|
Install a Door on all SEVEN Nodes in about 15 minutes ! There won't be
|
|
another SYSOP like HIM. It was his HOBBY and he was in it for the FUN.
|
|
|
|
Examples of what the Doctor had achieved - 7 Nodes,and 7 Gigs
|
|
there are very few BBSs PD or Pirate of THAT Size. PLUS the Fear was one of
|
|
only two BBSs in USA that KEPT ITS WARES for OVER 2 YEARS, ALL ONLINE!!
|
|
The First ACiD ANSI ACQUISITION was composed and ULed to the Fear.
|
|
The Doc was one of the 1rst BBSs in USA to go with the new PCBoard V15.0 Betas.
|
|
The Doctors' BBS was chosen to become a TDT Member BBS and was also
|
|
chosen to be the ECR Courrier HQ in USA ...AND many many Big Pirates and
|
|
Group Members on the scene now .... got their start on the Fear &
|
|
Loathing. In fact ... we used to joke that the Fear was a College for
|
|
Pirates !
|
|
|
|
He had Plans to Improve and Increase his BBS even further when he had time.
|
|
Just last night in fact ... The Doctor installed the ZYRION Protocol.
|
|
|
|
No matter HOW Big his BBS became.. the Doctor ALWAYS had time to answer
|
|
his Users' Mail . ANd just imagine how exciting it must have been for
|
|
him to answer questions like .. " How do I use the Zippy Scan" after 10
|
|
years of SYSOPing !
|
|
When I say he was generous... I mean GENEROUS. Armed Forces Veterans
|
|
were allowed high access for free ; those users cash-poor or Wares-poor
|
|
were almost ALWAYS allowed MEGS and MEGS of free credits... in his 10
|
|
years of SYSOPing ... maybe ONE person was booted off the Fear and even
|
|
THAT user could have re-applied for access had the system not
|
|
automatically booted him off for not ULing a single file. Id say that
|
|
in the last year alone .. the Doc GAVE AWAY over 300 Megs in Free Credits
|
|
..virtually anyone who asked him for help .. went away well satisfied.
|
|
EVEN LOCALS were allowed on and given High Access so they wouldnt be
|
|
begging for credits. Now how many other BBSs allow THAT !?
|
|
He tried to fulfill ANY Users requests and always had a polite word for
|
|
any user. He was NOT one of those new Sysops-with-an-attitude -2
|
|
Node-2 Megs-Im so kewl-type of guys.
|
|
|
|
There is so much I could say ... but I impose too long on anyone who has
|
|
read this far.... and I thank you for reading this far .
|
|
|
|
All I know is that a BBS that I have had great pleasure calling almost
|
|
every day for OVER FOUR YEARS is now gone .... and one of the few
|
|
pleasures in my over-worked life is now no more. When I went to my BBS
|
|
Directory ... it was the first BBS I called each night.. and the last
|
|
before I went to bed. I had just Chatted with the Doc last night on
|
|
how the BBS was improving and all the plans we had to make it even
|
|
better. You guys woulda really seen something .... there was more
|
|
growth potential at the Fear than at almost any other BBS I know.
|
|
All we lacked was TIME .
|
|
|
|
But as Fab said when he "semi-retired" ... how long can you do stuff to
|
|
impress 15 year old kids ?
|
|
|
|
This is one Hobby with a nasty after-taste. So ... SYSOPS take warning!.
|
|
|
|
For the Doctor and me ... its ....
|
|
|
|
ChildHood's End .
|
|
C'ya,
|
|
|
|
Empedocles
|
|
Cosysop - Fear & Loathing in Las Vegas BBS .
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [8]: PHANTASY TIDBITS: News and Views of Interest
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
SNET Operators Now Fowarding ANI Data
|
|
by Thomas Icom/IIRG/Cybertek
|
|
|
|
A recent experiment conducted by the IIRG has confirmed that
|
|
Southern New England Telephone is now fowarding ANI data from
|
|
operator assisted calls. In the past, it was posssible to defeat
|
|
ANI by having the operator place a call for you. This piece of
|
|
information has been passed around and accepted as gospel on many
|
|
different H/P/A boards.
|
|
To detrmine if your RBOC is fowarding ANI data from operator
|
|
assisted calls, have the operator dial 1-800-235-1414 for you. This
|
|
is an ANI service run by Full Disclosure Magazine (P.O. Box 903,
|
|
Libertyville, IL 60048) and 1-900-STOPPER. If you receive correct
|
|
ANI data, then your RBOC is passing the data along.
|
|
One should also note that while 1-900-STOPPER will defeat Caller
|
|
ID and ANI, it is still a simle matter to suponea the phone company
|
|
for both incomming ANI and outgoing AMA data from 1-900-STOPPER.
|
|
These can then be cross-referenced to find out who called whom.
|
|
Your best bets for privacy are still payphones and buttsets.
|
|
Let's all be careful out there.
|
|
|
|
IIRG UPDATE: Full Dislosure is now only running an ad for their 900-STOPPER
|
|
service on the number given in this article.
|
|
You can however use, 1-800-852-9932 to test the techniques
|
|
in Icom's article. (Valid as of 8/10/93)
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
FCC Releases Frequencies
|
|
|
|
The FCC has set aside narrowband 901-902,930-931, and 940-941 MHz for
|
|
wireless communications services or (PCSs) Personal Communications Services
|
|
such as paging,electronic mail and faxing. The FCC has not chosen a selection
|
|
process to pick providers of narrowband PCSs, but has said it will pick 11
|
|
nationwide licensees and 13 regional licensees and 10 local providers.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Put Your Hands in The Air and Give Me Those Chips!
|
|
|
|
A string of armed robberies is haunting Silicon Valley, recently 10 young
|
|
men armed with handguns forced their way into Bestronics Inc in San Jose
|
|
and subdued the workers before carting off $15,000 in memory chips.
|
|
Apparently their MO is to handcuff,beat and torture employees until their
|
|
told where the parts are stored.
|
|
Hot items are memory and 386 and 486 CPUs. Youth gangs are cruising
|
|
industrial parks loking for easy targets. At least 3 companies have been hit
|
|
in the last month.
|
|
|
|
UPDATE!!:
|
|
|
|
The San Jose Police have arrested a 20-year-old male who they believe is
|
|
the individual responsible for the recent wave of robberies.
|
|
Police pulled the man over after noticing the car he was driving had 2 two
|
|
different license plates. One was from a stolen car used in one of the
|
|
robberies.
|
|
After obtaining a search warrant for the mans home, police found memory
|
|
chips,police scanners,two-way radios,firearms,and hand-cuffs.
|
|
Police are still searching for 9 more individuals.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
ATM Bandits Nabbed
|
|
|
|
On Wed. July 7th, a Federal Grand Jury indicted Alan Scott Pace,30, and
|
|
Gerald Harvey Greenfield,50, both of Tucson,Arizona for installing a fake
|
|
automated teller machine at the Buckland Hills Mall in Manchester,CT.
|
|
The two men allegedly put a Fujitsu Model 7020 ATM machine that had been
|
|
modified to record users accounts and PIN's. without paying out cash.
|
|
They then made duplicates of the cards and used them at banks throughout
|
|
the country at valid ATM machines.
|
|
The eight-count indictment charges them with bank fraud counterfeiting of
|
|
ATM cash cards,interstate transportation of stolen property,and conspiracy.
|
|
Pace was arrested on June 23rd by the Secret Service in New York and
|
|
Greenfield surrendered to the Secret Service five days later.
|
|
They now face 60 years in prison on the combined charges.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
FBI Calls For Gun Licensing
|
|
By NEAL KNOX
|
|
|
|
|
|
Incredibly the story of the FBI recommendations has only run in the
|
|
July 8, 1993 New York Times on an inside page and in USA Today on July 9,
|
|
1993. No other major newspapers or TV news outlets have even mentioned
|
|
this proposal as of today, July 10. It is necessary for each and every
|
|
one of our readers to contact their local legislators and present them with the
|
|
NRA press release and make your opinions known.
|
|
|
|
|
|
NEAL KNOX REPORT
|
|
|
|
WASHINGTON, D.C. (July 11) -- FBI Director William Sessions
|
|
has recommended to Attorney General Janet Reno that the Clinton
|
|
Administration call for a wide range of new firearms laws,
|
|
including licensing the possession of handguns after mandatory
|
|
training, with "appropriate reimbursement" for firearms of those
|
|
who can't pass the training or who voluntarily turn in their
|
|
guns.
|
|
|
|
This incredible document, which notes that the FBI does not
|
|
publicly comment on political matters to avoid "destroy(ing)
|
|
confidence" in the agency, says "(t)he proliferation of firearms"
|
|
and their use in violent crimes justifies "an extraordinary,
|
|
singular departure from this policy."
|
|
|
|
The last item of Sessions' 10-point recommendation -- which
|
|
the FBI refuses to release -- calls for the FBI Office of Press
|
|
and Congressional Affairs to "develop a media strategy to
|
|
publicize and develop support for the FBI's position."
|
|
|
|
In short, the FBI Director is recommending to Attorney
|
|
General Janet Reno that she authorize violation of Section 1913
|
|
of Title 18, U.S. Criminal Code -- which prohibits lobbying with
|
|
appropriated funds.
|
|
|
|
Naturally, the FBI recommends enactment of the "Brady Bill,"
|
|
though raising questions about the accuracy of state criminal
|
|
records checks and other "technical problems."
|
|
|
|
The FBI also recommends "a complete prohibition upon the
|
|
transfer, importation, transport or possession of assault
|
|
firearms" -- which are not defined, except as high capacity and
|
|
"fast firing."
|
|
|
|
Sessions calls for "a complete prohibition upon the
|
|
possession of armor piercing ammunition," which would be defined
|
|
"upon performance standards, not composition" -- presumably on
|
|
the basis of penetration of aluminum plates such as the FBI used
|
|
in its mid-1980's tests of AP ammo.
|
|
|
|
Much conventional high-velocity handgun ammo can penetrate
|
|
the Kevlar bullet-resistant vests worn by police. However,
|
|
because the FBI's recommendation is not limited to handgun
|
|
ammunition, it could be used to ban almost all center fire rifle
|
|
ammunition.
|
|
|
|
Finally, the FBI recommends "reallocation of existing
|
|
resources to increase the regulation and oversight of" Federal
|
|
licensees -- and, among other things, increase license fees,
|
|
require an existing place of business, and a background check
|
|
with fingerprinting of potential dealers. That just happens to
|
|
jibe with the FBI's long ambition to have BATF's firearms
|
|
enforcement powers.
|
|
|
|
The "FBI Working Group" which prepared the recommendations
|
|
"discussed at length whether the FBI should recommend a general
|
|
ban on the possession of handguns. After careful consideration,
|
|
the group concluded that a proposed ban would not receive
|
|
sufficient support."
|
|
|
|
Clearly, they really wanted an outright handgun ban, but
|
|
didn't think it would pass and, as they wrote, "would likely
|
|
place us outside the scope of the current debate over firearms,
|
|
and thus perhaps marginalize our overall impact."
|
|
|
|
I first thought that the FBI proposal was a trial balloon to
|
|
make the Administration's firearms recommendations in the omnibus
|
|
crime bill (due out later this month) appear modest by
|
|
comparison. But, amazingly, neither of the Washington newspapers
|
|
has said a word about the FBI's landmark proposals.
|
|
|
|
That indicates that the anti-gun "Washington Post" doesn't
|
|
want to talk about the Clinton Administration's "next step" until
|
|
the "first step Brady Bill" has been signed and sealed.
|
|
The "New York Times" and other newspapers which have
|
|
reported the FBI recommendations have focussed on their support
|
|
for the "Brady Bill," with little or nothing about the radical
|
|
handgun licensing and "assault weapons" (whatever that is) ban.
|
|
|
|
Those reports have speculated that Sessions -- whose job has
|
|
been hanging by a thread since being charged with ethics
|
|
violations at the end of the Bush Administration -- was merely
|
|
currying favor with Reno and the White House.
|
|
|
|
Nonsense. No bureaucrat, or "Working Group" of bureaucrats,
|
|
would make such a radical recommendation, or openly move to
|
|
politicize the FBI, without orders -- or at the very least, a
|
|
wink and a nod -- from someone much higher up.
|
|
|
|
I think we're getting a look at the Clinton firearms
|
|
platform -- and we'll see all of it before the next four years
|
|
are over.
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [9]: IIRG Distribution Sites
|
|
(or Gateways to Oblivion)
|
|
|
|
////// ////// /////// ////////
|
|
// // // // //
|
|
// // /////// // ////
|
|
// // // // // //
|
|
////// * ////// * // // * /////////
|
|
|
|
|
|
IIRG World HQ: The Rune Stone BBS
|
|
14.4k HST
|
|
Phantasys Home Board
|
|
Complete IIRG Archives 3000+ Files
|
|
(203)-832-8441
|
|
NUP: Conspiracy
|
|
|
|
IIRG Distribution Site 1: BluePhishen' BBS
|
|
Fidonet 1:2603/406
|
|
IIRG Distribution Site
|
|
Sysop: Global Death
|
|
(212)-924-9627
|
|
|
|
IIRG Distribution Site 2: Deadcity
|
|
Sysop: RoughNeck
|
|
Australia
|
|
Criminal Intent HQ
|
|
+61-3-417-2060
|
|
|
|
|
|
IIRG Distribution Site 3: The Sanitarium
|
|
Sysops: Morbid Angel [INC/ACID]
|
|
Spectral Illusion [ACID/RAZOR]
|
|
IIRG Distribution Site
|
|
ACID Member Board
|
|
INC Courier Board
|
|
RAZOR 1911 Courier Board
|
|
VISA World Headquarters
|
|
(817)PRI-VATE
|
|
|
|
IIRG Distribution Site 4: The WareHouse
|
|
(203)-TMP-DOWN
|
|
Curently Under Investigation
|
|
Sysop: Ionizer
|
|
|
|
IIRG Distribution Site 5: Hollow Tree Productions
|
|
Sysop: Phantasm
|
|
TWA Distro
|
|
IIRG Phantasy Distro
|
|
Extreme*Net
|
|
(313)-EXE-TREME
|
|
|
|
IIRG Distribution Site 6: The Web
|
|
(203)869-0938
|
|
Oblivion/2 Beta Site
|
|
9600-14.4k v.32bis
|
|
SysOps: Spyder Man &
|
|
egghead <ACiD>
|
|
ACiD Member Board
|
|
Ecstatic Sound Productions
|
|
IIRG Distribution
|
|
OOFNet / CyberCrime Network
|
|
|
|
IIRG Distribution Site 7: Lost Horizon BBS
|
|
ZyXEL 16.8k [v.32bis/v.42bis]
|
|
203.667.4953
|
|
Virulent Graffiti Distro Site
|
|
IIRG Distro Site
|
|
NO File Ratios
|
|
|
|
IIRG Distribution Site 8: The Hawks Nest
|
|
(201)-PRI-VATE
|
|
300-14.4K BPS
|
|
Modernz Distro Site
|
|
High tech Hoods Site
|
|
|
|
IIRG Distribution Site 9: Liquid Euphoria
|
|
Phalcon/Skism
|
|
Sysop: Hawkmoon
|
|
(914)-PRI-VATE
|
|
|
|
IIRG Distribution Site 10: The Black Lodge
|
|
LodgeNet Member Site
|
|
Sysop: The Brit
|
|
(5o8)-PRI-VATE
|
|
|
|
IIRG Distribution Site 11: Kaotic Attractor
|
|
Sysop: Mr Wyzard
|
|
(5o8)-PRI-VATE
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [10]: Phantasy Distribution Sites
|
|
|
|
Phantasy's Distribution Site's are continually growing,we apologize if you
|
|
called a board and didn't find the Mag. Network Distribution Sites will
|
|
have the Issues first, we suggest calling one of them if a problem does
|
|
arise.
|
|
|
|
|
|
1. Lightning Systems
|
|
(414) 363-4282
|
|
200 Million Bytes OnLine
|
|
USRobotics Dual Standard HST/V.32bis
|
|
2400 thru 14.4k v.32bis/HST
|
|
|
|
2. The Works BBS
|
|
Waffle Net v1.65
|
|
[617]/861-8976
|
|
3/12/24/96/14400b 7dy/24hr N,8,1
|
|
Lexington, MA
|
|
200 Megabytes of Storage
|
|
99.44% pure textfiles
|
|
Remote cDc Node (Very remote)
|
|
|
|
3. The Dickinson Nightlight
|
|
(713)-337-1452
|
|
Phantasy Distro Site
|
|
|
|
4. Abiogenesis,
|
|
3/12/24/96/14400 Practical Peripherals 14400FXSA
|
|
Fidonet 1:280/310.
|
|
Phone (816)734-4732
|
|
|
|
5. Uncensored Communications
|
|
Cybertek Magazine SIG
|
|
(914)-761-6877
|
|
|
|
Phantasy is also available on these systems,
|
|
|
|
Ripco II BBS The Hell Pit Pipers Pit BBS Cybernetic Violence
|
|
(312)-528-5020 (708)-459-7267 (203)-PRI-VATE (514)-PRI-VATE
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
Next Issue:
|
|
|
|
More on the Ionizer Persecution
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
PHANTASY(C) IIRG 1991,1992,1993
|
|
May Odin Guide Your Way!
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
May You Be Feasting and Drinking in Valhalla For a Full Night
|
|
Before the Christian God Knows You're Dead
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|