home *** CD-ROM | disk | FTP | other *** search
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- = =
- - WELCOME TO THE THIRD ISSUE OF -
- = =
- - -=>PHANTASY<=- -
- = =
- - A MONTHLY PUBLICATIOM AND NEWSLETTER OF -
- = =
- - THE -
- = INTERNATIONAL =
- - INFORMATION -
- = RETREIVAL =
- - GUILD -
- = =
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Volume Number One,Issue Number Three Dated 12/16/90
-
- Table of Discontents:
-
- [1] Phone and Home Security
- By: The Mercenary.
-
- [2] An Insiders View of the Information Game
- By: Name Withheld by Request
-
- [3] "NAPALM" (The Ultimate Home Barbecue Starter)
- By: Knight Hack
-
- [4] Chlorine Bombs!
- By: Name Withheld by Request
-
- [5] PHANTASY TIDBITS
-
- [6] Listing of PHANTASY Distribution Sites
-
- [7] End of the Year Comments
- By: The I.I.R.G.
-
- OFFICIAL DISLAIMER...
-
- All information in PHANTASY is from USER contributed material
- The Publishers and Editors of PHANTASY and THE IIRG disclaim
- any liability from any damages of any type that the reader or
- user of such information contained within this newsletter may encounter
- from the use of said information. All files are brought to you for
- entertainment purposes only!
-
- PHANTASY is (C) 1990 by The IIRG
- IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section One: Phone and Home Security
- By: The Mercenary
-
-
- How Vulnerable are Hacker's to the threat of Electronic Invasion?
-
- Sources have speculated that during the last several years, more than
- 200,000 to 300,000 bugs have been planted in Homes,Businesses and by
- employers.
- Cheap bugs that will suffice for "Joe Shmoe" can be bought through catalogs
- for as low as $10.00 and up to $1000.00. These bugs only take seconds to
- install and if you think your "SAFE", please read this article.
- Now assuming that most people reading this article are one way or another
- connected with the computer underground, We'll look at the risk of each.
-
- 1. The Software Pirate: Your chances of being bugged are minimal, your
- main threat comes from not dealing with trustworthy contacts or
- balanced individuals. Most likely you will never be bugged with
- the possible exception of a Major Cracking Group.
- Most likely some jealous teenager will turn you in for a reward from
- the Software Publishers Association or similar organization.
-
- 2. The Hacker: Your Chances of being bugged are minimal to good, depending
- upon your proficiency and whose systems your tinkering with.
- If your hacking through a Network such as Telenet or similar node,
- you increase your chances of detection. Don't let anyone fool you, with
- the proper warrants they can trace you coast to coast in 8 to 10 minutes.
-
- 3. The Phreaker: Your chances of being bugged are good to excellent, I've
- never seen a phreaker who really gets too upset about it though.
- Most likely your being monitored by the company your "Borrowing" time
- and resources from. Phreakers are tolerated to an extent by communication
- companies because they are a GOOD Tax write-off.
- If what they put on there tax returns was the actual amount of time
- used by Phreakers, they would never have any legitimate users.
- But I'm digressing- Politics and Hacking just don't mix.
-
-
- Well, lets deal with sweeping your Computer Room first...
-
- Now for the average Hacker/Phreaker, you don't want to run out and buy a
- couple thousand dollars of anti-bug hardware. But these are some basic,simple
- things you can do to protect yourself.
-
- Federal Agencies seem to have a love affair with light-switches and electrical
- sockets,( Plus they don't think Civilians are intelligent ). Just unscrew
- your plates and look for a Bug wired across the switch (Or socket). In the
- case of a switch bug, it will be wired so that its active only when the lights
- are on (In most cases),an electrical socket bug will be always on.
- P.S.- Check your power strips too!!, These are parasitic bugs in that you are
- supplying the power to them and this is also a great place to hide them.
- A colleague of mine spent One whole afternoon reciting dirty-limericks to
- his light switch bug at college. Needless to say when he got back from
- classes the next day the bug was gone. (Guess the people investigating him
- had no sense of humor, or just didn't like his recording debut??)
-
- I've always advocated Cheap 1 piece phones, In that the mouthpiece can be
- unscrewed to place a bug in the handset, and by superglueing the body a
- parasitic bug cant be implanted into the phones circuit board.
- Also obtaining some "Void if removed" stickers and placing them across
- the cross sections is another wise idea. (Don't strictly count on them
- though,whatever you can buy..Big brother can too..)
- In this way I've secured my phone locally, and if tampered with a replacement
- will only cost me $10.00 to $20.00 dollars.
- If you must have a phone that can be unscrewed or Violated, follow these
- precautions.
-
- 1. Check the hand set for anything that is wired across the
- connections. This is an old method and is only used
- by amatuers nowdays. Most agencies replace the whole
- mouthpiece with a self-contained bug thats undetectable to
- the naked eye.
-
- 2. If you just bought your phone, save the schematics and
- take a polaroid of the circuit board. Compare these to
- your phone on a regular basis.
-
- 3. Place a scratch on the handset and mouthpiece cover
- thats barely visible, line this up at all times and
- look at it frequently. If they dont match up someones
- been in your phone!
-
- 4. Avoid all this hassle and buy a 1 piece phone!
-
-
- Another place to think about is your windows, Most hackers will go
- outside and visually inspect there windows two to three times a week.
- Look for a glob of epoxy or clear silicon with a bug placed inside the
- goop. This is a quick way for an agency to bug your room without actually
- entering it. Also direct sound surveillance and laser monitoring of window
- sound vibrations are a possibility. These are easily defeated by doing what
- the pentagon does, Place a boom box right up to the window and play it at
- a level just like you would normally. This masks basic conversation.
-
- ON A NOTE: Most Agents prefer a steady mix of music, I's suggest play a mix
- of Black Sabbath, Led Zeppelin,and Blue Oyster Cult.
- On Sundays please me mellow, a few Barry Manilow and Englebert tunes
- should send your benefactors off to la-la land very quickly.
-
- Desktop items such as trinkets,lamps,rolodexes are also a prime area for
- voice or keycap bugs. (A keycap bug is a bug that will monitor what keys on
- your typewriter or computer you are pressing)
- Just a good basic visual inspection will turn-up any of these or run a
- metal detector over plastic items.
-
- Your biggest and most damaging Item is your computer and modem, Check the
- internals frequently as well as your keyboard and desk itself.
- A parasitic bug can be easily placed in any of your computers or modems
- circuits in less than 10 minutes.
- External microwave monitoring of your computers CRT through a fiber-optic
- hole or window is a possibility. Monitor the room with a Microwave leakage
- detector available at Rat (Radio) Shack and you will know if this is being
- used. As for what to do if this happens to you, search your walls for a fiber
- hole or put up some curtains lined with aluminum foil.
- A normal spy vid-cam can also use a fiber hole, search the walls with
- a magnifying glass or just paint the walls heavily, frequently.
-
- Mini-tape recorders are most frequently used by private-dicks and
- reporters. These will usually be spliced into your phone cable or at your
- junction box. Search these for wired bugs and mini-tapes frequently.
- Most phone techs can be bribed very easily and will take you on a tour of
- your line to the box for a $20 or case of beer. If he refuses just increase
- the bid.. We've never had one refuse in this neck of the woods yet.
- Or if your more adventurous do it yourself, but read up on line-bugs
- or you'll skip right over one.
- Finding and avoiding bugs is just good plain common sense, if your lax
- and don't check, your vulnerable. On the other hand don't run out and
- do everything immediatly as if your bugged you'll draw undue attention
- to yourself.
- Never say anything when you do find a bug. either make up phony info
- to feed them (Disinformation isn't just a Govt. Practice) or make your
- location Sterile (Get rid of anything Damaging) Burn,Erase,Format and
- never leave the chance of Data Recovery (AKA-Norton Utils,PCTOOLS)
- and call in the Feds, Nothing like having them remove there own bugs.
- Then stay clean until your out of the "Lime-Light"
- Although most hackers like to make things sterile then recite
- useless babble to the bug. This of course tips your hand and the bug
- will disappear or the Suits will show up at the door.
- We discourage Phreaks from using this approach. as the evidence on you
- has probably been acumulated for some time.
- Well thats it for now, have a "silent" Holiday Season and from
- myself a Hearty Merry Christmas and a Happy New Year.
-
- Mercenary.... 12/10/90
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section Two: An Insiders View of the Information Game.
- From : Name withheld by Request
- Date : Fri Nov 30, 1990
-
-
- An Insiders View of the Information Game.
-
- Did you ever wonder what happens when a computer system is hacked?
-
- Of course there is the anti-computer phobia of people destroying
- systems, but that is not the real danger that the F.B.I. or S.S. is worried
- about.
- The Electronic Spy Game is real and its in every city in the country.
- The U.S. is one of the most vulnerable countries because of the many
- different types of business's that are housed here. The one Business
- that we the Americans can say is most beneficial is the telephone
- communication industry. Many people know how to make boxes and many
- have heard of wiping phone bills, but there are folks out there that sell
- just about every piece of information the main computers house, including
- future stock sales.
- The folks who I refer to are not some kid who wants to call long distance for
- free. These are adults who sell unpublished numbers and sell a list of phone
- numbers going to any address. Going rate is 35 bucks for an unlisted number
- and up to 125 bucks for the list of numbers that called a number.
- The computer can tell who calls any number at any time.
- Example... If someone wanted to know who hacks a particular system,
- all the F.B.I. has to do is trap that number. Then a list of numbers
- of telephones calling that system has been hacked.
- The computer hangs on to the list for around 62 days before it is
- cycled. So if a breech of security has taken place a list of numbers is
- generated to see who called the system.
- This process takes as long as the speed of the printer. The next step is
- getting locations of the dialing systems. Then checking that against the
- list of people and systems with access to the system."Bang" a
- whopping 42 seconds later a list of all unauthorized calls is
- generated and that list includes a profile of the people making the
- call. By the way that profile system is in Chicago.
- There are a variety of things for sale on the insiders open market,
- just about anything that you can imagine. From the people who hack
- the Social Security system to stealing earnings histories, To the guy who
- sells the information out of the NCIC system. Yes they are real!, One
- was busted in California earlier this year.
- They are the real problem although the guys who found the way into the
- NYSE system now have a knife in the countries jugular. Hacking can be fun but
- please use restraint when going into systems, and also who you tell when
- you get in.
- If you tell the wrong person you may just end up in a trunk, with a guy
- named "Vito" laughing at dockside as you slowly sink to the bottom of a river.
- "JUST For PHUN?????"
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Phantasy Section Three: NAPALM!! (The Ultimate Barbeque Starter)
- By: Knight Hack
-
- Napalm is very simple to make,Basically all it is 1 part gasoline
- and 1 part soap.
- I realize some of you out there might not know what soap is, but thats the
- stuff you see in those silly little dishes over sinks.
- But heres how you make the stuff,
-
- 1. Get a double boiler, fill the bottom half with water and bring to a boil.
- 2. Remove from the stove and go outside with it.
- 3. Now place the top half over the boiling water.
- 4. Fill the top with very small amounts of gasoline
- 5. Allow it to heat as much as possible from the still hot water
- 6. Add 1 part Ivory soap flakes to the gas and stir until it thickens
- 7. (The flakes must melt or the concotion is useless)
- 8. Allow to cool, Pour into bottles, add a rag , light rag and throw!
-
- Some Notes: Heated gasoline is EXTREMELY DANGEROUS, make small batches
- to start and never smoke,have near an open flame,or anything that would
- cause a spark!!!
- This file is for the enlightenment of its readers and should only be tried
- by the knowledgeable chemist or hobbyist!!
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Phantasy Section Four: Chlorine Bombs
- By: Name Withheld by Request
-
-
- Chlorine Bomb #1
- ------------------
-
- Ok this is fairly simple, all you need is some sort of jar or bottle with a
- cap (I like 16 oz. - 2 liter plastic soda bottles the best, theyre the
- loudest). You also need maybe a tablespoon or two of granular pool chlorine,
- now this stuff is expensive, so I suggest stealing a 50lb. tub of it from
- someone with a pool, This is more then enough chlorine to meet anyones needs..
- (I've been making these for 2 years out of the same half-tub of chlorine).
- Stealing it is the best, because a tub that size costs around $150 or $200 to
- buy... ( I think, Figuring that a 7lb bucket of the stuff runs about $35).
- Anyway, What you do, is take a clean, DRY bottle, and put the chlorine in it.
- (just pour it in). Ok now you need a little bit of soda ( I recommend Coca Cola
- , It seems to work the best). I put the Soda In a squeeze bottle like
- Dishwashing liquid soap, or pancake syrup come in, that way you can get it out
- fast. Ok heres the set up, You really need two people for this... one to
- Hold the bottle with the chlorine in it, and in the other hand hold the cap
- ready to put on HURRIEDLY. The Other person Squirts the Coke in, and as soon
- as he squirts in about a tablespoon (use your brain and estimate, dont
- measure, fools.) of soda, the other person must QUICKLY screw on the cap and
- throw the bomb, It will explode quickly... Allright, now this bomb is VERY
- loud, and when it explodes it makes Chlorine Gas (which is poisonous, so don't
- walk away after bomb just exploded, unless you LIKE poisonous gasses, and
- death.. that sort of thing...).
- It is also a defoliant (or something else produced in the
- reaction is.. ) So if you throw it on someones lawn, chances are there will
- be big swaths of dead grass left (at least thats what it did to my lawn...)
- One more thing, I suggest bending the bottle in the middle (like push one side
- in) before you add the soda, so that the person who is holding it knows
- that as soon as he feels it expanding (theres heat too) he has too throw it
- THEN, whether the cap is on or not (otherwise It'll blow Chlorine Gas in your
- face... this is NOT fun <it happened to me, but I was smart enough not to
- breathe, but My eyes stung for a week>)
-
-
-
- Chlorine Bomb #2
- ------------------
-
- Basically this is the same as the other one, except you use Brake Fluid
- instead of Soda as the liquid. Also, this sometimes takes longer, the reaction
- can take up to two minutes or more to happen, so after you throw the bomb, if
- it doesnt explode right away, DONT go pick it back up! But this Explosion is
- much more spectacular, you get a fireball.... Also a cloud of thick white
- smoke (which I think may be poisonous as well, at least my friend came out of
- it coughing and gagging horribly, threw up.. ).
- Ok, Now just a couple practicle uses for these two things:
- Riots: Throw them in the midst of the police lines, its better then teargas.
- Killing Spree: Throw them in the Midst of everyone, its better then teargas.
-
- ah well... The riots one could be useful, If they start trying to draft people
- for an imperialist invasion of Iraq, then we might actually have rioting,
- wherever people stand up to the oppression of the government. (thats my bit of
- leftist dogma for the day... ).
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- = The International Information Retreival Guild =
- - -=>Presents<=- -
- = Phantasy Tidbits =
- - (A collection of News and Views) -
- = Compiled and Edited by: Mercenary =
- -=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- Dateline: Dec 5th, 1990
-
- Editors Note:- Once again more BAD publicity for the hacking community
-
- Washington (Associated Press)- A thief can steal more money with a computer
- than with a gun and a terrorist can spread more chaos with a keyboard than
- with a bomb, experts said today.
- "We are at risk." the National Research Council said in a 300-page report.
- "Increasingly, America depends on computers. They control power delivery,
- communications,aviation and financial services".
- "They are used to store vital information.from medical records to business
- plans to criminal records. Although we trust them,they are vulnerable."
- The report, titled "Computers at risk," calls for a coherent national effort
- to develop security systems and increase public awareness of the dangers
- posed by vulnerable computers to accidents and deliberate attack.
- "To date,we have been remarkably lucky," the council said.
- It pointed out that although money and information have been stolen,lives
- have been lost because of computer errors and communications and financial
- systems have been disrupted, there has been no systematic attempt to subvert
- critical computing systems.
- "Unfortunately,there is reason to believe that our luck will soon run out,"
- the report said. "Thus far we have relied on the absence of malicious people
- who are both capable and motivated. We can no longer do so. We must instead
- attempt to build computer systems that are secure and trustworthy."
- As evidence of how untrustworthy computers are,the report listed these
- examples:
-
- 1. A nearly succesful attempt to use thousands of phony Bank of America
- automatic teller machine cards fabricated with personal identification
- numbers stolen from an on-line data base.
-
- 2. Thousands of reported virus attacks and hundreds of different viruses
- identified such as Stoned,Devils Dance,1260,Jerusalem,Yankee Doodle,
- Pakistani Brain,Icelandic-2,Ping Pong,and December 24.
-
- 3. A software design error that froze much of AT&T's long distance
- network.
-
- 4. The German Chaos Computer Club break-ins to the NASA Space Physics
- Analysis Network.
-
-
- EDITORS COMMENTS:
-
- Ok, once again we see some gross inacuracies on the part of the
- established media. Virus,Virus,Virus... Thats all we hear from the
- government controlled media. If they have thousands of reported attacks
- lets see them back up there claims with substantial proof.
- According to our sources 92% of all virus problems come from buying
- pirated software or downloading pirated software from BBS systems.
- So does this mean Uncle Sams cronies are down-leeching pirated
- software or buying it from back-alley copiers??
- I think not... That 92% figure comes from HOME users of software
- not government networks or systems. Get your facts straight boys!!
- You've only got an 8% ratio!!!
-
- Also show me one person who's been killed by a hacker modifying
- a patients medical records. If you can prove that one to me, I'll
- personally buy you a 10 course dinner.
- I've worked in a hospital and its not possible. We enter what we've
- given the patient not read what he's supposed to get.
- Your incompetence truly amazes us.
-
- And lordy,lordy get your stories straight boys according to the
- Secret Service, "Acid Phreak" was supposed to have caused the AT&T system
- crash, Oh well, I suppose when you lie for a living you get you stories
- crossed from agency to agency.
-
-
- Dateline: Nov 11th, 1990
-
- WARNING: FBI to investigate Anti-war Movement!
-
- FBI agent Steve Sterrit, Legal advisor to the FBI in Las Vegas,
- announced on 11/08/90 that the agency was actively investigating those who
- oppose Bush's war effort in the Mideast.
-
- EDITORS NOTE: Hmmmm... Since many of you out there do oppose the fight to
- keep Japans oil safe. I tacked this one on the news...
-
-
- Dateline: Jan 91-June 91
-
- DECnet Vax Network Security Seminars
- Length 2-days Price $795.00
-
- Boston Mass. at Back Bay Hilton Jan 10-11 (617)236-1100
- Orlando,FL. at Hotel Royal Plaza Feb 21-22 (800)248-7890
- Los Angeles,Ca. at L.A. Airport Hilton Mar 7-8 (213)410-4000
- Boston Mass. at Vista International Mar 28-29 (617)290-5600
- Los Angeles,Ca. at L.A. Airport Hilton Jun 6-7 (213)410-4000
- Philadelphia,Pa. at Sheraton Valley Forge Jun 27-28 (215)337-2000
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section 6: Phantasy Distribution Sites
-
- Phantasy's Distributions Site's have changed,we apologize if you called a
- board and didn't find the Mag. But were organized a little better now and
- these will be the permanent sites as long as these systems are up and
- operating.
-
- 1. IIRG Headquarters- The Rune Stone BBS - 1200/2400 Baud 24 Hours
- Call for the Earliest possible releases of Phantasy and other
- IIRG files, at (203) 485-0088.
-
- 2. Lightning Systems- 24 hours - at (414) 363-4282
-
- 3. Sycamore Elite- 24 Hours - at (815) 895-5573
-
- 4. BlitzKrieg BBS at (502) 499-8933
-
- 5. The Works BBS at (617-861-8976)
- Largest Text Files BBS in the world, 3500+ text files online. 300-2400bps
-
- To get PHANTASY by mail on a 1.2 meg or 360K floppy mail the following
- to this address:
-
- Mail 12 Disks and $5.00 in stamps to
-
- The I.I.R.G.
- 862 Farmington Ave
- Suite-306
- Bristol,Ct. 06010
-
- Specify Format of Disk Please!
- We will include any of the IIRG's releases for that month on disk
- (Space Permitting)
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Phantasy Section Seven: End of the Year Comments...
-
- Well, hopefully with the new year upon us the Feds,Media,and public will
- have a better understanding of the Hacking Community in general.
- Negative news potrayals and Sun-Devil were unwarranted and only an attempt
- to draw attention from the real culprits, The Government itself!!!
- Why is the Army,NSA,and CIA recruiting Virus writers and Worm programmers?
- Because Uncle Sam wants to invade other countries computer systems!!
- We believe when history reveals itself, the Govt. will be shown as the
- major Computer Vandals they truly are and not the Hacking community...
- Some of there experiments have escaped from the lab!! Oh well...
-
- Phantasy will be published monthly (Hopefully), and we hope to keep you
- up to date as to whats going on in the community for 1991.
- So for now, Merry Christmas and a Hacking New Year...
-
- The I.I.R.G. and the Phantasy Staff
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- END THIS ISSUE OF PHANTASY
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- (C)IIRG 1990
- May Odin Guide Yor Way!
- Downloaded From P-80 International Information Systems 304-744-2253
-