home *** CD-ROM | disk | FTP | other *** search
- Cybertek Electric: Issue #4 7/30/96
-
- óss es flestra ferdha för; en skálpr es sverdha
- / |\ /| /|\ |\ |\ /| |-\ \ /
- / | \ / | / | \ | \ | \ / | | \ \ /
- / | \ / | / | \ | \ | \ / | | > / \ /
- / | \/ | / | \ | / | \/ | | / / / /
- \ | | | | < | | | \ / / \
- \ | | | | \ | | | > \ / \
- \ | | | | \ | | | / \ \
- \ | | | | \ | | |-/ \ \
- I know a fifteenth, which Thiodhroerir the dwarf sang before Delling's door.
- He sang might to the Aesir, power to the elves, and understanding to Odin.
-
- Cybertek Electric: Issue Four
- July 30, 1996
- edited by Thomas Icom/IIRG
- <ticom@l0pht.com> <thomas.icom@iirg.com>
-
- Complements of OCL/Magnitude's Project Blackthorn,
- and The International Information Retrieval Guild (IIRG)
-
-
- Table of Contents
- =================
- * Hacking the Human Body
- by Mujahadin
- * From Crossbows to Cryptography: Techno-Thwarting The State
- by Chuck Hammill
- * Vesoft and the Hewlett Packard 3000
- by Black IC
-
- ---/////---
-
- Hacking the Human Body
- by Mujahadin
-
- Many of us in the computer 'underground' are used to seeing various postings
- about bugs and backdoors in various pieces of software and hardware that make
- up this vast culture that we are a part of. But how many of us know, that for
- example, the human body contains many weaknesses, bugs if you will, that can
- be exploited just as easily as Wu_ftp?
-
- The reasons for this knowledge not being widely available are obvious. The
- people who hold these secrets are like the master hackers who only give out
- these powerful secrets to those they implicitly trust, or to those who have
- shown their worth by diligent study and application of requisite materials. It
- is not my purpose here to disseminate such information recklessly. Rather it
- is to impart the reader with a respect for the capabilities of the human body
- and the weaknesses contained therein, and of some of the basic ways these can
- be used to protect yourself against a physical attack in the most effective
- way possible....you don't want your aggressor to get back up. It NEVER pays
- to be a nice guy during the escalation of a physical confrontation. Only in
- the movies do the nice guys walk away, and not have to turn around.
-
- First some background concerning body mechanics. The human body, whether
- through evolution or divine creation, moves with circular motion on many axes
- simultaneously. Next time you walk to the bathroom or to the refrigerator to
- refill your beer stein, try walking rigid, like a robot would, using just
- linear motion. You will see immediately that this is an UNnatural method of
- movement and how uncomfortable it is and to help me prove the theory behind
- this article, just how much motion is wasted by this linear activity. It
- takes a CONCERTED effort to maintain balance in this robotic movement. So now
- we see the economy of motion and ease of action that the natural way our
- bodies want to move gives us. Using this economy of motion and ease of action
- now takes us to my next point, physically manipulating the human body in an
- unnatural fashion.
-
- While many parts of the human body are very flexible, we can say that nothing
- has full 360 degree rotation, and it is in this area I will address most of
- this article to. Joint manipulation is the easiest way to start the
- discussion. The best way to describe a joint manipulation is by example.
- Open your right hand exposing the palm upward. Then place the index finger
- of your left hand (with the rest of the fingers tucked in) into the right
- palm. Now close your right hand around your index finger. Rotate your
- right hand around feeling the limits of movement and committing them to
- memory. Open the right hand back up and put the index finger AND the middle
- finger of the left hand both in the palm, closing it. Rotate the right hand
- once again sensing the difference this makes in this technique. Two fingers
- are ALWAYS better than one, however, make sure that the two fingers you plan
- on seizing are located next to each other on the hand.. or else you may lose
- your grasp due to the difficult to grab shape this makes. One can also grab
- separate fingers on an attackers same hand using both of your hands. This
- is a great technique and is called separating the bone. Try this on a friend
- (or enemy), but if on a friendly victim be sure to be careful, and have the
- action performed on you so you know what this feels like.
-
- Moving to the wrist. There are plenty of things to do with the wrists but
- for the sake of clarity I wont be discussing these much because placement of
- the hands is very important and since I don't have the tools at my disposal
- to include photographs, then I wouldn't want anyone to feel secure with just
- a text example. But I will say this: get a friend and try out the rotational
- limits of the wrist using one hand and then two. That's as easy as I can make
- it without photos and for the sake of wasted bandwidth. The elbow is a very
- self-explanatory structure, limitwise.
-
- The forearm has some rotation from the elbow due to the radial and ulna, but
- this is secondary to the lack of real movement that the elbow has. This makes
- it an extremely vulnerable architecture when it does become accessible for a
- technique. This is the problem though, because the elbow tends to stay
- behind the weapon that precedes it. Namely the fist or whatever the fist is
- holding. If one was truly skilled at circular motion then it would be no
- problem to simply circle around an attack to make the elbow more accessible,
- or avert an attack and depend on the attackers over exertion of his own
- sphere of influence....his own over extension of his circular motion, which
- by the way helps us make another point.
-
- Depending on the attacker to not be in tune with his own natural motion, to be
- clumsy and aloof, ignorant of how he moves, can also be a great key in
- overcoming an opponent. Sort of like a buffer overwrite.... get the attacker
- to overcommit...when he/she does, then take the advantage. If you happen to
- get this far then personally I wouldn't go for the elbow at this juncture, but
- for the purpose of discussion if you get in a bind and you have hold of an
- arm, then pull downward violently to shake the opponent, causing a mild shock
- to the back of the head where it meets the neck (this actually happens). Do
- your best to take advantage in this moment of weakness by turning the arm over
- placing another hand on the outside of the elbow pressuring downwards.
- Experimentation with this pressure is absolutely necessary for you to feel how
- this works. Also don't place the hand too high or too low... this can cause
- the attacker to fold his elbow, opening you up to a vicious counterattack with
- one of the body's most powerful weapons. Interesting that one of the bodies
- weakest structures at its opposition, can become one of the strongest weapons
- the body has. As for the shoulder, just move your own shoulder around to its
- extremes and you will easily see how its weaknesses can be exploited.
-
- Continuing our discussion of the elbow from above, once the elbow is locked,
- hopefully you would have enough forethought to make sure your attacker is
- slightly away from you and bent over. Take this opportunity to jam his
- shoulder with plenty of force in the direction of his jaw. This is a neat
- little bonus of the straight elbow lock. Also preemptive striking to the
- shoulder lessens any force of an incoming blow. This is what Bruce Lee called
- a 'stop hit'. But this takes flawless timing and is out of context for this
- article.
-
- Visiting the neck area we see several options. The throat provides us with
- much soft collapsible mass which can be accessed quite easily, as long as
- speed and accuracy are on your side. A quick and powerful jab to the larynx,
- either above or below, gains us some time to explore more possibilities in our
- defensive posture. We can now become the offensive party if we are successful
- here. Note that also on the sides of the neck exist sternomatocollastoid
- muscle structures (for exact placement of these check your Gray's Anatomy
- Coloring Book) which give us ample space to access several 'pressure points'
- which if manipulated (read SQUEEZED) properly will cause the brain to prompt
- the body to lift up on the toes, thereby weakening any effort of your attacker
- to strike with any force. I have only met one person completely immune to the
- initial pain sequence produced by this technique, and it made for lots of
- interesting experimentation, and unfortunately for our immune friend, lots of
- bruises as well. Also within this muscle structure are the carotid arteries.
- A well placed strike to the outsides of the neck will seize the muscles up,
- causing the blood supply to the brain to be shut off. Contrary to popular
- belief, this is how a strike to the temples work as well. To revive from such
- a strike requires massage and gentle rotation of the neck structure to return
- the muscles to their previous state.
-
- The eyes are an obvious weakness as is the nose, be it from straight on,
- upwards, sideways, or even downwards. The ears are interesting because of
- the occasional airtight capabilities. Have you ever been slapped on the
- ear? The air pressure involved with that is tremendous for such a little
- canal. Its no small wonder then that partial and often full deafness arises
- out of such little force. There are also several pressure points located
- beneath the ear which have differing effects, depending on how utilized. There
- also exists on the back of the skull at the base where the vertebrae end which
- when struck causes yet another shutdown of the brain due to the contraction of
- muscles. Don't forget this key clue: where the head goes.... the body follows.
-
- Moving in a downward direction we have the ribs, where nerve fibers weave
- in and out between the ribcage members. This takes practice but finding
- these aren't too difficult. There is a term where nerves are exposed to
- the underside of the flesh when running between muscle bundles. Its called
- a cavity, and cavity striking is an acquired skill. Bodybuilders are known
- for their extra musculature. Obviously. But with this muscularity comes a
- nice big weakness which can be exploited by someone with little or no muscle
- mass at all.....justice ;). It seems as though with this extra muscle comes
- extra cavity space...i.e., more exposed nerve fiber. Need I say more on
- this?
-
- The floating ribs are susceptible to becoming dislodged from their location,
- given the right angle of approach. The abdominal area is naturally tense and
- as well should be, unless trained in advanced deep abdominal conditioning
- which has been a protected secret for centuries. I have seen examples of this
- training and it is quite impressive. No tricks involved. I can spot a fake
- from a thousand miles away. Real 'Iron Body' practitioners can be struck with
- a variety of implements using full force with no damage done. All this is
- done with complete relaxation of the abdominal muscle wall. But there is a
- flaw in even the tensing of the abdominal area. The muscles that make up this
- area are primarily weaved in a direction that naturally opposes force from the
- front. If we introduce a spirryllic action slightly downwards to this mass
- then we have exploited the weakness in the weave.
-
- The groin structure is really self explanatory, save for the few fanatical
- practitioners of several martial arts who practice for hours a technique
- where the testicles are drawn up inside the scrotum. But these guys are a
- dead giveaway, wherein they must stand in a particular posture for this to
- happen, exposing other areas to vulnerability.
-
- On the sides and slightly to the back of the thigh belong the sciatic nerves.
- Repeated strikes to this area will definitely cause weakness in the legs, and
- eventually an inability to stand straight without wavering. The knees, when a
- person is standing straight up, are extremely vulnerable to being sheared
- downward or to the side... this is very violent and should only be used in a
- VERY life threatening situation. When slightly flexed then the knees are
- vulnerable from the sides and back. Actually, the knees are ALWAYS weak from
- the sides. There exist many pressure points on the thigh, shin and arch of the
- foot that I will not address, as these require pinpoint accuracy to administer
- to and this is beyond the scope of this treatment, however I will say that I
- heard a story of a Special Forces Sergeant who, after being injured in Vietnam
- had to walk with a cane, became so adept with the cane that in a particular
- barfight all he had to do to subdue his attacker was stomp the cane down on
- the arch of the foot, thereby disrupting the intricate pattern of bone and
- ligament causing separation of said bone and ligament many times over.
- Needless to say, with ZEN-like simplicity, the altercation was over before it
- started. With this in mind, when in a bear hug type situation, never fail to
- stomp down on the arch of the foot, unless you are suspended in the air. Then
- it is a simple matter of using your head to make your point, while kicking at
- the knees or shins.
-
- There are many more areas to address here and I have selectively left much out
- because of the damaging nature of the techniques. I didn't pay too much
- attention to the circular nature of the body in the offensive posture because
- this is very advanced thought. To sum up this circular theory, think of
- spinning a yo-yo around in a circle while the string is fully unwraped from
- the axle.... what makes it spin faster?? what opposing forces are involved
- here?? and where is the actual fulcrumatic action?? These are clues that if
- experimented with to even a slight degree, will give the reader a great
- understanding as to how a greater amount of force can be generated by using
- the natural endowments of the body.
-
- Greets to the guys in VLAD, GHeap, DrHavoc, prophet, Special Forces then,
- now, and forever, and to Thomas Icom.
- Mujahadin - the real Desert Storm.
-
- -///-
-
- FROM CROSSBOWS TO CRYPTOGRAPHY: TECHNO-THWARTING THE STATE
- by Chuck Hammill
- weaponsrus@aol.com
-
- Given at the Future of Freedom Conference, November 1987
- Public Domain: Duplicate and Distribute Freely
-
- You know, technology--and particularly computer
- technology--has often gotten a bad rap in Libertarian cir-
- cles. We tend to think of Orwell's 1984, or Terry Gilliam's
- Brazil, or the proximity detectors keeping East Berlin's
- slave/citizens on their own side of the border, or the so-
- phisticated bugging devices Nixon used to harass those on
- his "enemies list." Or, we recognize that for the price of
- a ticket on the Concorde we can fly at twice the speed of
- sound, but only if we first walk thru a magnetometer run by
- a government policeman, and permit him to paw thru our be-
- longings if it beeps.
-
- But I think that mind-set is a mistake. Before there
- were cattle prods, governments tortured their prisoners with
- clubs and rubber hoses. Before there were lasers for
- eavesdropping, governments used binoculars and lip-readers.
- Though government certainly uses technology to oppress, the
- evil lies not in the tools but in the wielder of the tools.
-
- In fact, technology represents one of the most promis-
- ing avenues available for re-capturing our freedoms from
- those who have stolen them. By its very nature, it favors
- the bright (who can put it to use) over the dull (who can-
- not). It favors the adaptable (who are quick to see the
- merit of the new( over the sluggish (who cling to time-
- tested ways). And what two better words are there to de-
- scribe government bureaucracy than "dull" and "sluggish"?
-
- One of the clearest, classic triumphs of technology
- over tyranny I see is the invention of the man-portable
- crossbow. With it, an untrained peasant could now reliably
- and lethally engage a target out to fifty meters--even if
- that target were a mounted, chain-mailed knight. (Unlike
- the longbow, which, admittedly was more powerful, and could
- get off more shots per unit time, the crossbow required no
- formal training to utilize. Whereas the longbow required
- elaborate visual, tactile and kinesthetic coordination to
- achieve any degree of accuracy, the wielder of a crossbow
- could simply put the weapon to his shoulder, sight along the
- arrow itself, and be reasonably assured of hitting his tar-
- get.)
-
- Moreover, since just about the only mounted knights
- likely to visit your average peasant would be government
- soldiers and tax collectors, the utility of the device was
- plain: With it, the common rabble could defend themselves
- not only against one another, but against their governmental
- masters. It was the medieval equivalent of the armor-
- piercing bullet, and, consequently, kings and priests (the
- medieval equivalent of a Bureau of Alcohol, Tobacco and
- Crossbows) threatened death and excommunication, respec-
- tively, for its unlawful possession.
-
- Looking at later developments, we see how technology
- like the firearm--particularly the repeating rifle and the
- handgun, later followed by the Gatling gun and more advanced
- machine guns--radically altered the balance of interpersonal
- and inter-group power. Not without reason was the Colt .45
- called "the equalizer." A frail dance-hall hostess with one
- in her possession was now fully able to protect herself
- against the brawniest roughneck in any saloon. Advertise-
- ments for the period also reflect the merchandising of the
- repeating cartridge rifle by declaring that "a man on
- horseback, armed with one of these rifles, simply cannot be
- captured." And, as long as his captors were relying upon
- flintlocks or single-shot rifles, the quote is doubtless a
- true one.
-
- Updating now to the present, the public-key cipher
- (with a personal computer to run it) represents an equiv-
- alent quantum leap--in a defensive weapon. Not only can
- such a technique be used to protect sensitive data in one's
- own possession, but it can also permit two strangers to ex-
- change information over an insecure communications
- channel--a wiretapped phone line, for example, or
- skywriting, for that matter)--without ever having previously
- met to exchange cipher keys. With a thousand-dollar com-
- puter, you can create a cipher that a multi-megabuck CRAY
- X-MP can't crack in a year. Within a few years, it should
- be economically feasible to similarly encrypt voice communi-
- cations; soon after that, full-color digitized video images.
- Technology will not only have made wiretapping obsolete, it
- will have totally demolished government's control over in-
- formation transfer.
-
- I'd like to take just a moment to sketch the mathemat-
- ics which makes this principle possible. This algorithm is
- called the RSA algorithm, after Rivest, Shamir, and Adleman
- who jointly created it. Its security derives from the fact
- that, if a very large number is the product of two very
- large primes, then it is extremely difficult to obtain the
- two prime factors from analysis of their product. "Ex-
- tremely" in the sense that if primes p and q have 100
- digits apiece, then their 200-digit product cannot in gen-
- eral be factored in less than 100 years by the most powerful
- computer now in existence.
-
- The "public" part of the key consists of (1) the prod-
- uct pq of the two large primes p and q, and (2) one fac-
- tor, call it x , of the product xy where xy = {(p-1) *
- (q-1) + 1}. The "private" part of the key consists of the
- other factor y.
-
- Each block of the text to be encrypted is first turned
- into an integer--either by using ASCII, or even a simple
- A=01, B=02, C=03, ... , Z=26 representation. This integer
- is then raised to the power x (modulo pq) and the resulting
- integer is then sent as the encrypted message. The receiver
- decrypts by taking this integer to the (secret) power y
- (modulo pq). It can be shown that this process will always
- yield the original number started with.
-
- What makes this a groundbreaking development, and why
- it is called "public-key" cryptography," is that I can
- openly publish the product pq and the number x , while
- keeping secret the number y --so that anyone can send me
- an encrypted message, namely
- x
- a (mod pq) ,
- but only I can recover the original message a , by taking
- what they send, raising it to the power y and taking the
- result (mod pq). The risky step (meeting to exchange cipher
- keys) has been eliminated. So people who may not even trust
- each other enough to want to meet, may still reliably ex-
- change encrypted messages--each party having selected and
- disseminated his own pq and his x , while maintaining
- the secrecy of his own y .
-
- Another benefit of this scheme is the notion of a "dig-
- ital signature," to enable one to authenticate the source of
- a given message. Normally, if I want to send you a message,
- I raise my plaintext a to your x and take the result (mod
- your pq) and send that.
-
- However, if in my message, I take the plaintext a and
- raise it to my (secret) power y , take the result (mod my
- pq), then raise that result to your x (mod your pq) and
- send this, then even after you have normally "decrypted" the
- message, it will still look like garbage. However, if you
- then raise it to my public power x , and take the result
- (mod my public pq ), so you will not only recover the ori-
- ginal plaintext message, but you will know that no one but I
- could have sent it to you (since no one else knows my secret
- y ).
-
- And these are the very concerns by the way that are to-
- day tormenting the Soviet Union about the whole question of
- personal computers. On the one hand, they recognize that
- American schoolchildren are right now growing up with com-
- puters as commonplace as sliderules used to be--more so, in
- fact, because there are things computers can do which will
- interest (and instruct) 3- and 4-year-olds. And it is pre-
- cisely these students who one generation hence will be going
- head-to-head against their Soviet counterparts. For the
- Soviets to hold back might be a suicidal as continuing to
- teach swordsmanship while your adversaries are learning
- ballistics. On the other hand, whatever else a personal
- computer may be, it is also an exquisitely efficient copying
- machine--a floppy disk will hold upwards of 50,000 words of
- text, and can be copied in a couple of minutes. If this
- weren't threatening enough, the computer that performs the
- copy can also encrypt the data in a fashion that is all but
- unbreakable. Remember that in Soviet society publicly ac-
- cessible Xerox machines are unknown. (The relatively few
- copying machines in existence are controlled more inten-
- sively than machine guns are in the United States.)
-
- Now the "conservative" position is that we should not
- sell these computers to the Soviets, because they could use
- them in weapons systems. The "liberal" position is that we
- should sell them, in the interests of mutual trade and
- cooperation--and anyway, if we don't make the sale, there
- will certainly be some other nation willing to.
-
- For my part, I'm ready to suggest that the Libertarian
- position should be to give them to the Soviets for free, and
- if necessary, make them take them . . . and if that doesn't
- work load up an SR-71 Blackbird and air drop them over
- Moscow in the middle of the night. Paid for by private sub-
- scription, of course, not taxation . . . I confess that this
- is not a position that has gained much support among members
- of the conventional left-right political spectrum, but, af-
- ter all, in the words of one of Illuminatus's characters, we
- are political non-Euclideans: The shortest distance to a
- particular goal may not look anything like what most people
- would consider a "straight line." Taking a long enough
- world-view, it is arguable that breaking the Soviet govern-
- ment monopoly on information transfer could better lead to
- the enfeeblement and, indeed, to the ultimate dissolution of
- the Soviet empire than would the production of another dozen
- missiles aimed at Moscow.
-
- But there's the rub: A "long enough" world view does
- suggest that the evil, the oppressive, the coercive and the
- simply stupid will "get what they deserve," but what's not
- immediately clear is how the rest of us can escape being
- killed, enslaved, or pauperized in the process.
-
- When the liberals and other collectivists began to at-
- tack freedom, they possessed a reasonably stable, healthy,
- functioning economy, and almost unlimited time to proceed to
- hamstring and dismantle it. A policy of political
- gradualism was at least conceivable. But now, we have
- patchwork crazy-quilt economy held together by baling wire
- and spit. The state not only taxes us to "feed the poor"
- while also inducing farmers to slaughter milk cows and drive
- up food prices--it then simultaneously turns around and sub-
- sidizes research into agricultural chemicals designed to in-
- crease yields of milk from the cows left alive. Or witness
- the fact that a decline in the price of oil is considered as
- potentially frightening as a comparable increase a few years
- ago. When the price went up, we were told, the economy
- risked collapse for for want of energy. The price increase
- was called the "moral equivalent of war" and the Feds swung
- into action. For the first time in American history, the
- speed at which you drive your car to work in the morning be-
- came an issue of Federal concern. Now, when the price of
- oil drops, again we risk problems, this time because Ameri-
- can oil companies and Third World basket-case nations who
- sell oil may not be able to ever pay their debts to our
- grossly over-extended banks. The suggested panacea is that
- government should now re-raise the oil prices that OPEC has
- lowered, via a new oil tax. Since the government is seeking
- to raise oil prices to about the same extent as OPEC did,
- what can we call this except the "moral equivalent of civil
- war--the government against its own people?"
-
- And, classically, in international trade, can you imag-
- ine any entity in the world except a government going to
- court claiming that a vendor was selling it goods too
- cheaply and demanding not only that that naughty vendor be
- compelled by the court to raise its prices, but also that it
- be punished for the act of lowering them in the first place?
-
- So while the statists could afford to take a couple of
- hundred years to trash our economy and our liberties--we
- certainly cannot count on having an equivalent period of
- stability in which to reclaim them. I contend that there
- exists almost a "black hole" effect in the evolution of
- nation-states just as in the evolution of stars. Once free-
- dom contracts beyond a certain minimum extent, the state
- warps the fabric of the political continuum about itself to
- the degree that subsequent re-emergence of freedom becomes
- all but impossible. A good illustration of this can be seen
- in the area of so-called "welfare" payments. When those who
- sup at the public trough outnumber (and thus outvote) those
- whose taxes must replenish the trough, then what possible
- choice has a democracy but to perpetuate and expand the tak-
- ing from the few for the unearned benefit of the many? Go
- down to the nearest "welfare" office, find just two people
- on the dole . . . and recognize that between them they form
- a voting bloc that can forever outvote you on the question
- of who owns your life--and the fruits of your life's labor.
-
- So essentially those who love liberty need an "edge" of
- some sort if we're ultimately going to prevail. We obvi-
- ously can't use the altruists' "other-directedness" of
- "work, slave, suffer, sacrifice, so that next generation of
- a billion random strangers can live in a better world."
- Recognize that, however immoral such an appeal might be, it
- is nonetheless an extremely powerful one in today's culture.
- If you can convince people to work energetically for a
- "cause," caring only enough for their personal welfare so as
- to remain alive enough and healthy enough to continue
- working--then you have a truly massive reservoir of energy
- to draw from. Equally clearly, this is just the sort of ap-
- peal which tautologically cannot be utilized for egoistic or
- libertarian goals. If I were to stand up before you tonight
- and say something like, "Listen, follow me as I enunciate my
- noble "cause," contribute your money to support the "cause,"
- give up your free time to work for the "cause," strive
- selflessly to bring it about, and then (after you and your
- children are dead) maybe your children's children will actu-
- ally live under egoism"--you'd all think I'd gone mad. And
- of course you'd be right. Because the point I'm trying to
- make is that libertarianism and/or egoism will be spread if,
- when, and as, individual libertarians and/or egoists find it
- profitable and/or enjoyable to do so. And probably only
- then.
-
- While I certainly do not disparage the concept of poli-
- tical action, I don't believe that it is the only, nor even
- necessarily the most cost-effective path toward increasing
- freedom in our time. Consider that, for a fraction of the
- investment in time, money and effort I might expend in try-
- ing to convince the state to abolish wiretapping and all
- forms of censorship--I can teach every libertarian who's in-
- terested how to use cryptography to abolish them
- unilaterally.
-
- There is a maxim--a proverb--generally attributed to
- the Eskimoes, which very likely most Libertarians have al-
- ready heard. And while you likely would not quarrel with
- the saying, you might well feel that you've heard it often
- enough already, and that it has nothing further to teach us,
- and moreover, that maybe you're even tired of hearing it. I
- shall therefore repeat it now:
-
- If you give a man a fish, the saying runs, you feed him
- for a day. But if you teach a man how to fish, you feed him
- for a lifetime.
-
- Your exposure to the quote was probably in some sort of
- a "workfare" vs. "welfare" context; namely, that if you
- genuinely wish to help someone in need, you should teach him
- how to earn his sustenance, not simply how to beg for it.
- And of course this is true, if only because the next time he
- is hungry, there might not be anybody around willing or even
- able to give him a fish, whereas with the information on how
- to fish, he is completely self sufficient.
-
- But I submit that this exhausts only the first order
- content of the quote, and if there were nothing further to
- glean from it, I would have wasted your time by citing it
- again. After all, it seems to have almost a crypto-altruist
- slant, as though to imply that we should structure our ac-
- tivities so as to maximize the benefits to such hungry
- beggars as we may encounter.
-
- But consider:
-
- Suppose this Eskimo doesn't know how to fish, but he
- does know how to hunt walruses. You, on the other hand,
- have often gone hungry while traveling thru walrus country
- because you had no idea how to catch the damn things, and
- they ate most of the fish you could catch. And now suppose
- the two of you decide to exchange information, bartering
- fishing knowledge for hunting knowledge. Well, the first
- thing to observe is that a transaction of this type
- categorically and unambiguously refutes the Marxist premise
- that every trade must have a "winner" and a "loser;" the
- idea that if one person gains, it must necessarily be at the
- "expense" of another person who loses. Clearly, under this
- scenario, such is not the case. Each party has gained some-
- thing he did not have before, and neither has been dimin-
- ished in any way. When it comes to exchange of information
- (rather than material objects) life is no longer a zero-sum
- game. This is an extremely powerful notion. The "law of
- diminishing returns," the "first and second laws of
- thermodynamics"--all those "laws" which constrain our possi-
- bilities in other contexts--no longer bind us! Now that's
- anarchy!
-
- Or consider another possibility: Suppose this hungry
- Eskimo never learned to fish because the ruler of his
- nation-state had decreed fishing illegal. Because fish
- contain dangerous tiny bones, and sometimes sharp spines, he
- tells us, the state has decreed that their consumption--and
- even their possession--are too hazardous to the people's
- health to be permitted . . . even by knowledgeable, willing
- adults. Perhaps it is because citizens' bodies are thought
- to be government property, and therefore it is the function
- of the state to punish those who improperly care for govern-
- ment property. Or perhaps it is because the state gener-
- ously extends to competent adults the "benefits" it provides
- to children and to the mentally ill: namely, a full-time,
- all-pervasive supervisory conservatorship--so that they need
- not trouble themselves with making choices about behavior
- thought physically risky or morally "naughty." But, in any
- case, you stare stupefied, while your Eskimo informant re-
- lates how this law is taken so seriously that a friend of
- his was recently imprisoned for years for the crime of "pos-
- session of nine ounces of trout with intent to distribute."
-
- Now you may conclude that a society so grotesquely
- oppressive as to enforce a law of this type is simply an
- affront to the dignity of all human beings. You may go far-
- ther and decide to commit some portion of your discretion-
- ary, recreational time specifically to the task of thwarting
- this tyrant's goal. (Your rationale may be "altruistic" in
- the sense of wanting to liberate the oppressed, or
- "egoistic" in the sense of proving you can outsmart the
- oppressor--or very likely some combination of these or per-
- haps even other motives.)
-
- But, since you have zero desire to become a martyr to
- your "cause," you're not about to mount a military campaign,
- or even try to run a boatload of fish through the blockade.
- However, it is here that technology--and in particular in-
- formation technology--can multiply your efficacy literally a
- hundredfold. I say "literally," because for a fraction of
- the effort (and virtually none of the risk) attendant to
- smuggling in a hundred fish, you can quite readily produce a
- hundred Xerox copies of fishing instructions. (If the tar-
- geted government, like present-day America, at least permits
- open discussion of topics whose implementation is re-
- stricted, then that should suffice. But, if the government
- attempts to suppress the flow of information as well, then
- you will have to take a little more effort and perhaps write
- your fishing manual on a floppy disk encrypted according to
- your mythical Eskimo's public-key parameters. But as far as
- increasing real-world access to fish you have made genuine
- nonzero headway--which may continue to snowball as others
- re-disseminate the information you have provided. And you
- have not had to waste any of your time trying to convert id-
- eological adversaries, or even trying to win over the unde-
- cided. Recall Harry Browne's dictum from "Freedom in an
- Unfree World" that the success of any endeavor is in general
- inversely proportional to the number of people whose persua-
- sion is necessary to its fulfilment.
-
- If you look at history, you cannot deny that it has
- been dramatically shaped by men with names like Washington,
- Lincoln, . . . Nixon . . . Marcos . . . Duvalier . . .
- Khadaffi . . . and their ilk. But it has also been shaped
- by people with names like Edison, Curie, Marconi, Tesla and
- Wozniak. And this latter shaping has been at least as per-
- vasive, and not nearly so bloody.
-
- And that's where I'm trying to take The LiberTech
- Project. Rather than beseeching the state to please not en-
- slave, plunder or constrain us, I propose a libertarian net-
- work spreading the technologies by which we may seize
- freedom for ourselves.
-
- But here we must be a bit careful. While it is not (at
- present) illegal to encrypt information when government
- wants to spy on you, there is no guarantee of what the fu-
- ture may hold. There have been bills introduced, for exam-
- ple, which would have made it a crime to wear body armor
- when government wants to shoot you. That is, if you were to
- commit certain crimes while wearing a Kevlar vest, then that
- fact would constitute a separate federal crime of its own.
- This law to my knowledge has not passed . . . yet . . . but
- it does indicate how government thinks.
-
- Other technological applications, however, do indeed
- pose legal risks. We recognize, for example, that anyone
- who helped a pre-Civil War slave escape on the "underground
- railroad" was making a clearly illegal use of technology--as
- the sovereign government of the United States of America at
- that time found the buying and selling of human beings quite
- as acceptable as the buying and selling of cattle. Simi-
- larly, during Prohibition, anyone who used his bathtub to
- ferment yeast and sugar into the illegal psychoactive drug,
- alcohol--the controlled substance, wine--was using technol-
- ogy in a way that could get him shot dead by federal agents
- for his "crime"--unfortunately not to be restored to life
- when Congress reversed itself and re-permitted use of this
- drug.
-
- So . . . to quote a former President, un-indicted co-
- conspirator and pardoned felon . . . "Let me make one thing
- perfectly clear:" The LiberTech Project does not advocate,
- participate in, or conspire in the violation of any law--no
- matter how oppressive, unconstitutional or simply stupid
- such law may be. It does engage in description (for educa-
- tional and informational purposes only) of technological
- processes, and some of these processes (like flying a plane
- or manufacturing a firearm) may well require appropriate li-
- censing to perform legally. Fortunately, no license is
- needed for the distribution or receipt of information it-
- self.
-
- So, the next time you look at the political scene and
- despair, thinking, "Well, if 51% of the nation and 51% of
- this State, and 51% of this city have to turn Libertarian
- before I'll be free, then somebody might as well cut my
- goddamn throat now, and put me out of my misery"--recognize
- that such is not the case. There exist ways to make your-
- self free.
-
- If you wish to explore such techniques via the Project,
- you are welcome to give me your name and address--or a fake
- name and mail drop, for that matter--and you'll go on the
- mailing list for my erratically-published newsletter. Any
- friends or acquaintances whom you think would be interested
- are welcome as well. I'm not even asking for stamped self-
- addressed envelopes, since my printer can handle mailing la-
- bels and actual postage costs are down in the noise compared
- with the other efforts in getting an issue out. If you
- should have an idea to share, or even a useful product to
- plug, I'll be glad to have you write it up for publication.
- Even if you want to be the proverbial "free rider" and just
- benefit from what others contribute--you're still welcome:
- Everything will be public domain; feel free to copy it or
- give it away (or sell it, for that matter, 'cause if you can
- get money for it while I'm taking full-page ads trying to
- give it away, you're certainly entitled to your capitalist
- profit . . .) Anyway, every application of these principles
- should make the world just a little freer, and I'm certainly
- willing to underwrite that, at least for the forseeable fu-
- ture.
-
- I will leave you with one final thought: If you don't
- learn how to beat your plowshares into swords before they
- outlaw swords, then you sure as HELL ought to learn before
- they outlaw plowshares too.
-
- --Chuck Hammill
-
- THE LIBERTECH PROJECT
-
- -///-
-
- ┌─────────────────────────────────────┐
- │ Vesoft and the Hewlett Packard 3000 │
- │ by Black IC │
- └─────────────────────────────────────┘
-
- There have been numerous articles written about the Hewlett Packard
- 3000 and how to break the system. This write up does not deal solely with
- the HP3000 but with the addon for tighter security by the VESOFT corporation.
-
- As time goes on and people begin to see the need for better security
- and a more productive system, it's becoming harder to exploit any weakness
- that could be on said system. That's where VESOFT comes in.
-
- VESOFT
- 1135 S. Beverly Dr.
- Los Angeles, CA
- 90035-1119
-
- (310) 282-0420
- (310) 785-9566 (Fax)
-
- They have been supporting Hewlett Packards since 1980 with excellent
- addons for the HP3000. In the following paragraphs I discuss the various
- utilites that VESOFT employs and what you might expect on a VESOFT secured
- system.
-
- ┌───────────┐
- │ MPEX 3000 │
- └───────────┘
-
- The MPEX addon emulates and implements virtually all of the MPE/iX
- user interface features (variables, command files, implied :RUN, :CALC,
- :COPY, :PRINT, etc) on MPE/V. Not only does this add a lot of power to the
- MPE/V system, but it also lets you use the same job streams on MPE/V and on
- the MPE/iX (If the owner of the Hewlett Packard has both setups!)
-
- So initially you wont see a difference with the target system. Also
- if the system has VESOFT installed and not on the other systems their,
- that's not an issue right now cause if you are experienced with the 3000
- series and the likes you will be able to navigate with out a problem.
-
- ┌───────────────┐
- │ VE AUDIT 3000 │
- └───────────────┘
-
- The Audit program from VESOFT is a resecurement utility very similar
- to the SATAN program for UNIX. The purpose of VE AUDIT is to check the
- system for loopholes and to assist the Manager/System Administrator in
- resecuring the system. VE AUDIT takes the laborous job of checking accounts
- (LISTACCT), users (LISTUSER), and groups (LISTGROUP) to see who has what
- access, capabilities, no passwords, etc. The program goes through everything
- and then reports to manager what loopholes (if any) are found and what is the
- suggested step to resecure that system. This program can also be used to
- alter the system accounting structure as well as look at it with a new set
- of commands.
-
- The program is run when you set the attributes (password, capability,
- access mask). List them in one or two line object format. Create an MPEX
- command file that will rebuild the accounting structure when the program is
- executed. Purge them after prompting.
-
- As you can see this program will assist the manager/system
- administrator in an easy to use manner and allows the system security to be
- tightened in a way that was not as easy on the standard HP3000.
-
- ┌───────────────┐
- │ SECURITY 3000 │
- └───────────────┘
-
- The VESOFT security program works in several ways to secure the
- Hewlett Packard system. Most HP3000 systems will allow users to log on to
- the system using a non-unique name and generic session name with a session
- password (i.e. JOE.PAYROLL as opposed to JOE,CLERK.PAYROLL). The VESOFT
- program will no matter what format the system uses to establish identity
- allow the use of a session name and a password for that individual, thus
- increasing the security 10-fold. It will also eliminate the annoying habit of
- users omitting the session name since the MPE operating system considers it
- optional.
-
- Changing of passwords become manditory through the security program.
- Saving the account manger time by having a set time period for the users
- to change their passwords (i.e. every 30 days or as set).
-
- Some HP3000 systems when accessed give the user access to the MPE
- prompt ":" which most users don't need access to all the commands. VESOFT now
- sets up a menu of options which allows the user to use the given choices
- and nothing else.
-
- If the system has dial-ups the security program allows passwords on
- a terminal by terminal basis thus adding in a second password to protect the
- system. Thus anyone calling up not only has to get past the dial-up sequence
- but they also have to log in to the system as if they were at the console.
-
- If the system is run on networks then the program will synchronize the
- network and allow file transfers with out actually logging into the
- receiving system. Users will also have to login to a system at a different
- terminal just as if they were at that console.
-
- Embedded passwords are probably one of the biggest threats to HP3000
- systems along with shared passwords and passwords that have not been changed
- in a long time. It then is easier for someone to access the system seeing as
- it will be easier to figure out. Once a password has become embed the ability
- to change it in a job stream is very hard and time consuming. The security
- program comes with what is called the "STREAMX" module which will do all the
- handy work for the account manager.
-
- Logoff now has a built in timer so those users that are idle or leave
- the system unattended for a given amount of time will automatically be logged
- off and the integrity of the system brought back to normal.
-
- This covers the basics of the VESOFT programs. As you can see any
- entry into an HP3000 using VESOFT will not react as usual and the
- accessibility has been changed to that of seriously protected. I'll save the
- coverage of surveillance social engineering and dumpster diving for others.
- What I will say is you need to have a firm grasp of the target system and its
- users.
-
- ┌────────────┐
- │ DEFAULTS │
- └────────────┘
-
- The following is a list of some of the defaults in the Hewlett Packard
- MPEX System used on the 3000 and the likes. Keep in mind that a resecured
- system is going to have the defaults removed and replaced with a tighter
- setup. Remote login maintenance has been a pride and joy of Hewlett packard
- owners. It is also one of the most exploited in terms of malicious entry.
- With the VESOFT programs properly installed the usual one password entry
- for remote will now be two. The default accounts are almost always open if
- they still exist. Aside from "dumpster diving" you should consider social
- engineering names and as much info as possible about the system you are
- attempting to get in on, just incase you are asked for a password. Sometimes
- you will come across a system that uses the "terminal password" at login.
- This is an old option and thus being an option does not have any defaults.
-
-
- operator.cognos mgr.hpword field.hpword
- manager.hpoffice mgr.hpoffice wp.hpoffice
- spoolman.hpoffice mailman.hpoffice advmail.hpoffice
- mail.hpoffice field.support operator.support
- operator.sys rsbcmon.sys pcuser.sys
- operator.system operator.disc mgr.xlserver
- manager.itf3000 sys.telesup manager.security
- mgr.conv mgr.rje mgr.hpp187
- mgr.hpp189 mgr.hpp196 field.hpp187
- mgr.intx3 mgr.carolian manager.tch
- mgr.word mgr.telesup field.service
- operator.disc mgr.ccc field.hpunsup
- field.hp mgr.hpp189 mgr.hpp196
- mail.mail mail.netbase mgr.rego
- mgr.rje mgr.robelle mgr.cnas
- mgr.hpdesk mgr.robelle mgr.vesoft
-
-
- I hope this write up will provoke more interest in the Hewlett Packard
- systems namely the HP3000. If you have any comments or wish to discuss these
- systems more indepth please feel free to contact me at the following e-mail
- address:
-
- black.ic@iirg.com
-
- Hope to hear from some of you.
-
- Black IC/IIRG
-
- ---/////---
-
- Unless otherwise noted Cybertek Electric is Copyright (C)1996 by
- OCL/Magnitude, P.O. Box 64, Brewster, NY 10509. All Rights Reserved.
- Noncommercial reproduction is encouraged provided this electronic publication
- is redistributed in its entirety with credits intact. Cybertek Electric is
- published for educational purposes only; under The First Amendment of The
- United States Constitution. No illegal use is implied or suggested. If you
- have a problem with this, too fucking bad. SUBMISSIONS WANTED. If you can read
- and understand this e-zine then you should know what we're interested in.
- Please send any feedback, questions, and/or submissions to either of the email
- addresses in the signature below.
-
-
- |\ /| /\ / |\ | Thomas Icom/IIRG
- | >< | < > / | \ |\ The Blackthorn Project
- |/ \| \/ < | | > <ticom@l0pht.com> <thomas.icom@iirg.com>
- | | /\ \ \ | |/ International Information Retrieval Guild
- | | / \ \ \| | "May Odin guide your way!"
- Madhr er manna gaman, ok moldar auki, ok skipa skreytir.
-
- <End of Text>