home *** CD-ROM | disk | FTP | other *** search
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- = =
- - WELCOME TO THE SECOND ISSUE OF -
- = =
- - -=>PHANTASY<=- -
- = =
- - A MONTHLY PUBLICATIOM AND NEWSLETTER OF -
- = =
- - THE -
- = INTERNATIONAL =
- - INFORMATION -
- = RETREIVAL =
- - GUILD -
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Volume Number One,Issue Number Two Dated 11/12/90
-
- Table of Discontents:
-
- [1] The IIRG meets the FBI (Part 2)
- [2] Hacker Information and Where to obtain it
- [3] High-Explosives for Fun and Profit
- [4] The I.I.R.G. attends the 8th Annual Ct. CES Show
- [4] PHANTASY NEWS
- [5] Listing of PHANTASY Distribution Sites
-
-
- OFFICIAL DISLAIMER...
-
- All information in PHANTASY is from USER contributed material
- The Publishers and Editors of PHANTASY and THE IIRG disclaim
- any liability from any damages of any type that reader or
- user of information contained within this newsletter may encounter
- from the use of said information.
-
- PHANTASY is (C) 1990 by The IIRG
- IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982
-
-
- Editors Note- PHANTASY is a Free-world Publication
- Distribute Freely
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section One: The International Information Reteival Guild
- Meets the FBI (Part Two)
-
- To Clarify a few things,Let us just state we're reporting on how this
- informal gathering took place. We in NO-Way trusted this agent or
- took anything he said seriously. Several of us are former military service
- members and know the Governments Policy of DISINFORMATION.
- We're just reporting on what took place at this meeting and nothing
- more. We believe that this Agents comments should be taken for there
- entertainment value only and nothing more.
-
- Now on with Part II...
-
- FBI AGENT-I guess a senator Ribicoff back in 1979,he had the foresight to
- institute the proposed legislation in that area.
- It took them from 1979 to 1984 to finally get the bill passed,and
- out of our office there's only been two prosecutions since 1984.
- and you look at some of the reasons why and one of the biggest
- ones would be they don't want to report it. A bank doesn't want
- to report they have someone in there computer fooling around with
- all there accounts. They don't want to let people know that
- basically there money is unsafe and that at any moment there
- accounts can be all fouled up,Which usually there fouled up
- nine out of Ten times anyway.
-
- Anonymous-It takes a while for people to realize things are being
- manipulated, I'm a computer operator and if somebody was logging
- onto our system illegally it would be hard to find out until
- after a while.
-
- FBI AGENT-Thats why I alluded to the beginning,with a lot of cases it takes
- so long to figure out whats going on and then it takes even longer
- to identify the problem.
- I know in Federal Court its called the Counterfeit Access Device
- and Computer Fraud Act, thats based on illegal or unauthorized
- access to a computer that in itself is a crime because getting
- into one of the computers that has the protected items such as
- Natinal Defense,(anything along those lines) so the mere
- accessing of those is a Federal Crime.
- The other ones go beyond that, You have to obtain information
- and you have to make a fianancial gain.
- Then the penalties are accordingly, the one regarding the Defense
- Systems and things like that carries up to a Ten year imprisonment
- and up to a Fifty Thousand Dollar Fine.
- The ones where you make a fianancial gain, your penalty is as much
- up to twice the gain you made plus up to Twenty years in Jail.
- So everything depends on whats been obtained.
-
- The third aspect of the crime that I guess is a watered down
- version of what Senator Ribicoff had proposed has to do with
- getting in a computer and destroying or changing different files.
- That carries with it up to a Ten year imprisonment and up to
- twice as much as the damage you caused or fianancial gain as
- your fine.
- Then all three of those have the Conspiracy Statute thats
- attached to them where more than three people have to actually
- take part in the Conspiracy. That crime,I mean that Statute
- seems to be pretty significant.
- Like I said, Who do you have thats going to sit down all day and
- actually try to develop a case. Thats what you don't have in Law
- Enforcement right now, You don't have anyone that specifically
- looks for computer crimes, they have to be reported.
- Its not like the drug cases where you can walk right down the
- street and and find someone somewhere in the city of (DELETED)
- selling drugs. You can find that anywhere in any city.
- Its the same way as a Crime Patrol Police Officer can go
- around and find someone breaking into cars, nobody is going to
- be able to sit there and right now and justify there existence
- what would be computer crimes.
- What it takes I guess is one hand washing the other,the people
- whose computers are being accessed have got to want to come
- forward,and have to want to provide the help after they do.
- Now do I have any questions?
-
- Knighthack- What about prosecuting Computer Piracy Violations,have there
- been any.
-
- FBI AGENT- As towards illegaly copying software,No. They seem to be more
- concerned with theft of computer services.
- Now as far as the state level I know we've had none in our
- offices.
-
- Anonymous- What do you mean By theft of Computer Services?
-
- Mercenary- He means hacking into Compuserve or another pay for access
- service or using Government computers with a valid users
- Id and password.
-
- Old Timer-Like the young guy in California who was tying up the
- DOD's Sattelite system and bouncing his signal to Europe
-
- FBI AGENT-Well let me ask you.. How safe do you feel our computer systems
- are?
-
- Knighthack- If its got a modem attached to it and its online its unsafe.
-
- Mercenary- But of course, None of us here would do that now, Right Guys?
-
- Whole room- Laughter
-
- FBI AGENT-Tell me more about that California case, How did he get into
- the Department of Defense's System?
-
- Old Timer-Apparently he hacked into the system and was an experienced
- sattelite person and figured out how to get into there
- operating system, he's serving time now It wasn't too
- publicized.
-
- FBI AGENT- Well like I said we don't find out too much up here ourselves
- we have to watch CNN.
-
-
- At this Point the meeting broke into small individual talking groups
- and we departed before everyone else. We do have some documents that
- were distributed and will be presenting those later in Upcoming issues.
- This was a meeting of a local Users group in which we were invited
- to attend by there president and would thank him here.
- Any Anonymous comments were made by a Local User and we didn't catch
- his name.
-
- Section Two: Hacker Information and Where to Obtain It.
-
-
- One of the most frequently asked questions the IIRG receives from the
- multitude of new day Hackers and Phreaks is where do I obtain information
- on phreaking and hacking.
- Now I don't want to get into a psychological debate on what a new day
- hacker is,but lets for safetys sake say its a kid who just got a modem
- and happened to grab a copy of Phantasy off of a bulletin board or had
- obtained another hack/phreak electronic newsletter.
- Ok,they've taken that first plunge and its wetted there appetites for
- more information. Now they run down to there local pc-mart and look
- through its racks of books and magazines and the few articles they did manage
- to find portray a hacker as a budding Charlie Manson behind a keyboard.
- Well the IIRG has had enough of these portrayals by the media and
- we've decided to assign Section 2 of every upcoming Phantasy as a brief
- article on where to obtain information for novices or the curious.
- The very first step of a curious novice would be to obtain a private mail
- box,preferably NOT a Post Office Box. There are plenty of private mail
- services springing up and finding one close to your home should be no
- problem. These addresses are usually called Suites or just use a number.
- The price range on these boxes is usually 6 to 9 dollars a month
- and can be easily afforded even by a teenager. I said preferably NOT a
- post office box for two simple reasons, One,I distrust any government agency
- and find they cooperate very easily when they want to. And Two, if you do
- receive more "covert" mail its just a good idea not to be involed with
- any branch of the government.
- Ok,now that you've run out and gotten a mailbox you say "Well now what
- the Hell do I do with it?", Well thats a good question and an easily
- answered one,you fill it up son!
- Now the very first thing we suggest is laying aside some serious cash
- or hitting up the slush fund for your expenses. Because expenditures for
- hacking information aren't cheap and especially figuring this after what
- you've probably spent on your equipment.
- We're not saying that all these books or equipment are needed
- for your library,there just nice to have around.
-
- We advise sending for these Books:
-
- 1. Defending Secrets,Sharing Data: New locks and Keys for Electronic
- Information GPO Stock Number:052-003-01083-6
- Last Known Price:$8.50
- Available From:
-
- Superintendent of Documents
- Government Printing Office
- Washington,DC 20402-9325
-
- 2. Get the Privacy Catalog from Eden Press
- They've got too many titles to list,
- but some of the best we like are:
-
- Privacy:How to get it,How to Enjoy it. #400 $18.95
- Are you now or have you ever been in the FBI Files? #403 $12.95
- Electronic Record Systems and Individual Privacy #614 $14.95
- Telephone Security #652 $9.95
- Telephone Debugging #653 $15.95
- A Study of Telephone Records #630 $19.95
-
- Call 1-800-338-8484 for there catalog.
-
- 3. A liitle old, its from 1985 but still a nice book to read
- THE COMPUTER UNDERGROUND by M. Harry
- Order #L40036 Price-$14.95
- This book is available from several sources and
- the order number given here is from ANVIL Publishing.
- There Catalog is HUGE!!,get a copy call 1-915-755-2665
-
- 4. CRB Research sells the Computer Underground as well as many
- other worthwhile titles,but definitly grab.
-
- The Hackers Handbook Cat# HACK $12.95
-
- Order there catalog for $1.00
-
- CRB Research Books
- P.O. Box 56
- Commack,NY. 11725
-
- Well That should cover the basics,like I said some of the catalogs you'll
- go crazy over,theres always something for everyone in them.
- But now onto more books and magazines,
-
- Go down to your local book store and look these titles up,or have them
- order them for you..
-
- 1. Old but good reading- Out of the Inner Circle by Bill Landreth
- 1985 by Microsoft Press $9.95
-
- 2. Hackers by Steve Levy- A good guide for the Ethics of a hacker..
- Dell Publishing Company 1984 $4.50
-
- 3. The Cuckoos Egg by Clifford Stoll
- Originally out in hardback at $19.95,but at the time of the
- editing of this article its now in the stores on paperback
- (Story of the Hannover Hacker and his ultimate downfall)
-
- 4. Definitly and an absolute must,Subscribe to:
-
- 2600:The Hackers Quarterly
- Call (516)-751-2600,or FAX line (516)-751-2608
-
- There are many more worthwhile books and magazines that could be listed
- on and on, But we feel these selections will present to you a good
- broad range of topics and interests. Some other worthy footnotes would be
- to look up Consumertronics,they offer a large but expensive listing of
- hacker/phreaker related material,(ED NOTE-Call (505)-434-0234) and to
- find a bbs that has a large selection of Hacker Text files such as
- PHANTASY,PHRACK,CUD,ATI etc. The IIRG's BBS along with many others offer
- these files and finding them is no real difficulty.
- This should drain your checkbook effectively for a while,or at least till
- next months article on what is useful and noteworth on your newly obtained
- hacker library.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- Section 3: High Explosives for Fun and Profit!
- By:(Name withheld by Request)
-
- EDITORS NOTE:The Procedures discussed in this article are
- extremely dangerous. Therefore,the Author and
- publisher (The IIRG) disclaim any liability
- from any damages or injuries of any type that the
- reader or user of information contained within
- this article may encounter from the use of said
- information. This article is intended for
- entertainment purposes only!
-
- Since Hacking is truly a state of mind and a Hacker can branch his
- talents into many fields,I present this article to you on the God given
- rights of this country and my constitutional right of Freedom of speech.
- Ever since a lazy summer day in the Maine backwoods,spent blowing off
- fireworks with my father and uncle,I've had a true love for explosives
- of almost any type. A six year stint in the Marines only further
- encouraged this love of noise.
- What I present here to you are some well known formulas with
- a sprinkle of my own modifications.
- This first formula will allow you to concoct roughly the equivalent
- of dynamite,not a military grade explosive but a great fishing bait!
-
- First obtain some Potassium Chlorate, a rather cheap and easy to
- acquire chemical usually obtainable at any chmeical distributor.
- If they ask you what you need it for,do what I do and claim your
- picking it up for your company and have no idea,the boss just sent
- you to get it. I have this routine down pat and even stick around
- with the owner of the warehouse and have coffee. If they really
- are curious claim its for Hydroponics experiments.
-
- Now take the KC1O3 (Potassium Chlorate) and grind it into a fine powder
- almost the rough equivalent of flour or talcum powder. This is a must!
-
- Carefully measure 5 level teaspoons of Vaseline and place in a plastic
- bowl with 5 level teaspoons of beeswax. Then pour 1/3 of a cup of white
- gas (Coleman liquid fuel) and dissolve the wax and vaseline mixture.
-
- Now take 90 premeasured level teaspoons of powdered KC1O3 and hand knead
- it into the bowl and form into blocks as the mixture hardens or place in
- cardboard rolls (towel or toilet paper) and seal with wax.
-
- Your explosive is now done but requires a blasting cap to set it off
- and since these are almost impossible to obtain legally,here a do it
- yourself cap.
-
- Get some .25 ID (inner diameter) aluminum tubing at the old
- hardware store
-
- get some hexamine tablets down at the old military surplus shop
- and grind into a fine powder like the above KC1O3
-
- Take 2 1/2 tablespoons of crushed hexamine and mix with 4 1/2 tablespoons
- of Citric acid (available at most grocery stores) in a glass jar
- mix well with stirring rod and add 1 tablespoon of 20-30% peroxide
- and place jar in a cool spot for 12 hours
- Run mixture through a coffee filter,pour rubbing alcohol over mix in filter
- (four or five spoons worth),to clean mix.
- Let powder dry on towel and prepare tube,
-
- Crimp one end of tube ( 3 1/2 inces long total)
- fill tube with powder and place very thin wire into mix in tube
- or a model rocket igniter,seal with glue and allow to dry.
-
- Ok,take your homemade cap,place into your main charge and run
- about 50 feet of wire from fuse to a 12 volt battery
- When its all clear hook up your juice (Voltage) and kiss that
- charge goodbye.
- Some of my favorites are blasting for fish,make sure charge is totally
- watertight in this case or blasting out old stumps.
- JUST BE CAREFUL,The CAPS are EXTREMELY SHOCK SENSITIVE and are
- powerful enough to blow your hand off.
-
- Have Phun,and be careful. I had a blast for sure!
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section 3: The I.I.R.G. Attends the 8th Annual Connecticut
- Computer and Electronics Show
- By:Mercenary
-
-
- On November 7th the I.I.R.G. Attended the 8th Ct. CES show,
- The show seemed to be smaller than last year but the IIRG picked through
- the venders booths with the zeal of drowning men looking for a life preserver.
- Vagabond spent a large portion of his time dealing with a SNET
- represenative discussing the workings of the CONN-NET system but was
- able to get some valuable information from some other venders as well
- which we'll present in this article.
- Knighthack seemed to have a good laugh when the Prodigy demonstraters
- couldn't seem to get on the system. (P.S.-He had to show em how)
- Myself,well I sat through the Intro to Lans Seminar and the Wiring
- your Network Seminar but couldn't take any more after that.
- Heres what we were able to dig up at the show though,
-
- 1. Intergrated Services Digital Network Applications in the
- Army Environment
-
- It seems that the U.S. army is trying to develop specific end user
- applications which solely depend upon the ISDN technologies of the Army.
- The ARMY has identitfied the ISDN as part of the communications
- archetectures of the future. Extensive field trials of ISDN have been
- conducted to demonstrate the potential benefits of such technology.
- But the limited number of user applications has prevented the
- full realization of such services.
-
-
- 2. It seems the NAVY is concentrating on Computer Security Problems in
- a BIG way. We saw 8 specific Computer Security projects laid out for
- developers.
-
- 2A-High Assurance Trusted Systems-Seems there investigating
- new approches for achieving high assurance for trusted systems
- that accomadate innovative designs.
- 2B-Characteristics of Processing Elements with Respect to
- Multilevel Security.
- 2C-Security Features for Work-Stations-seems they want better
- techniques.
- 2D-Technology to Establish and Support the Role of Man in
- Computer Security Systems.
- 2E-Expert System for Multilevel Security.
- 2F-The Inference Problem in Multilevel Secure database Management
- systems.
- 2G-Placement of Network Security Services for Secure Data Exchange
- 2H-Composibility Constraints Of Multilevel Secure Systems
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- IIRG Disclaimer-All the above information was PUBLIC DOMAIN information
- placed in open View for the PUBLIC at the 8th Annual CES Show.
- and in no way compromises any agency or vendor as these are
- open contracts for proposed Equipment placed on the open
- FREE market for Bidding.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section 4: Hacker News and Interesting Footnotes
- (More Info obtained at show)
- By:Vagabond
-
-
- MIT'S ATHENA TECHNOLOGY
-
- MAYNARD, Mass."Athena," the innovative
- computing environment developed at the Massachusetts Institute of
- Technology (MIT), will be up and running at two new campuses this
- winter.
-
- North Carolina State University (NCSU) and Iowa State University
- (ISU) signed contracts totaling $7 million with Digital
- Equipment Corporation to install the Athena systems software and
- link together hundreds of Digital workstations.
-
- On each campus, the result will be a large-scale, high-
- performance network designed to support students, faculty, and
- researchers using UNIX based systems.
-
- "Athena offers a new model for managing large numbers of workstations
- in a network," said Barry Braunstein, Digital manager of Research
- and Science/Engineering Solutions in the Education Market.
- "Computing resources are centrally managed and highly accessible
- to users completely location independent. Users can walk up to
- any workstation on the network and log on, and access the same
- files, software, and electronic mail."
-
- Athena software services developed at MIT are freely redistributable.
- Digital is offering support in planning, installation, and staff
- training to universities who want to adopt the system.
-
- At Iowa State, the Athena environment will include users from
- engineering, the sciences, and a variety of other disciplines. "The
- initial focus of the project is to stimulate high-quality research
- by putting powerful tools into the hands of our faculty and graduate
- students," said George Strawn, Director of Iowa State's Computation
- Center.
-
- Strawn said that researchers will benefit from speed and
- power of workstations, and from the 'visualization' of research
- data, which is made possible by computer graphics, things not
- previously available in their existing computing environment.
-
- The network will also make it easier to connect to off-campus
- resources such as the National Science Foundation's supercomputers.
-
- At North Carolina State University, the network's primary
- function is to support engineering education.
-
- "In the `real world,' computers are an integral part of engineering,"
- said William Willis, Director of Engineering Computing Operations.
- "Yet there's no consistent exposure to computers in the
- undergraduate curriculum. Our goal is to ensure that a new
- generation of students is comfortable using these modern tools."
-
- This fall, only freshmen engineering students will use the
- Athena environment. Over time, all engineering students will use
- the workstations for design projects, simulation and modeling,
- sharing data, writing papers, and solving homework problems.
-
- Braunstein explained that Project Athena resolved many
- technical problems that had made it expensive and technically
- difficult to manage UNIX workstations in a network. Two key areas
- were system security and the cost of network management.
-
- "Athena's `Kerberos' network authentication system ensures a
- very high level of security," said Braunstein. "And the automated
- `Moira' Service Management System makes it possible to deploy a
- large number of workstations in a cost-effective way, using a
- client-server model, under central management.
-
- "Cost-conscious institutions can support a large-scale
- environment with a relatively small staff. For example, MIT runs an
- installation of 1,000-plus workstations with a staff of six people
- in hardware operations and systems administration"
-
- Both NCSU and ISU had similar reasons for choosing to work with
- Digital. Strawn explained, "Iowa State has a long relationship with
- Digital, dating back to the 1960s. For this project, Digital
- workstations offered excellent price/performance, and Digital's
- proposal was the most innovative in terms of the Athena software."
-
- Dr. Willis said, "In implementing the Athena technology, NCSU
- was really looking for a partner. We reviewed three excellent
- proposals. But Digital had much more experience with Athena and
- has much stronger educational programs."
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- DECstation is a trademark of Digital Equipment Corporation.
-
- UNIX is a registered trademark of American Telephone & Telegraph Co.
-
- Project Athena, Kerberos Authentication Service and Moira Service
- Management System are registered trademarks of Massachusetts
- Institute of Technology.
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- A STEALTH MODEM
-
- No,we've not been staring at the CRT too long,it seems that the
- Air Force is trying to develop a Tactical Modem for Stealth Communications.
- The Trend towards intelligent jamming mandates demands that future tactical
- communications systems possess Electronic Counter-countermausures (ECCM)
- responsive formats. A modem processing modular architechture is needed
- that supports up to 50 MHz input sampling rate while providing the needed
- adaptive processing. It must be an adaptive modem that can receive signals
- corrupted by real world interference.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- Section 5: Phantasy Distribution Sites
-
- Phantasy's Distributions Site's have changed,we apologize if you called a
- board and didn't find the Mag. But were organized a little better now and
- these will be the permanent sites as long as these systems are up and
- operating.
-
- 1. IIRG Headquarters- The Rune Stone BBS - 1200/2400 Baud 24 Hours
- Call for the Earliest possible releases of Phantasy and other
- IIRG files. Our system will be going private so call Now while
- you still can, at (203) 485-0088.
-
- 2. Lightning Systems- 24 hours - at (414) 363-4282
-
- 3. Sycamore Elite- 24 Hours - at (815) 895-5573
-
- 4. TAP BBS at (502) 499-8933
-
- To get PHANTASY by mail on a 1.2 meg or 360K floppy mail the following
- to this address:
-
- Mail 12 Disks and $5.00 in stamps to
-
- The I.I.R.G.
- 862 Farmington Ave
- Suite-306
- Bristol,Ct. 06010
-
- Specify Format of Disk Please!
- We will include any of the IIRG's releases for that month on disk
- (Space Permitting)
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- END THIS ISSUE OF PHANTASY
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- (C)IIRG 1990
- May Odin Guide Yor Way!
- Downloaded From P-80 International Information Systems 304-744-2253
-