home *** CD-ROM | disk | FTP | other *** search
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- = =
- - WELCOME TO THE EIGHTEENTH ISSUE OF -
- = =
- - -=>PHANTASY<=- -
- = =
- - A PUBLICATION AND NEWSLETTER OF -
- = =
- - THE -
- = INTERNATIONAL =
- - INFORMATION -
- = RETRIEVAL =
- - GUILD -
- = =
- - Hacking,Phreaking,Anarchy,Survivalism,Commentary -
- = =
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Volume Number Four,Issue Number Eighteen Dated 08/12/93
- Editor is Mercenary : mercenar@works.UUCP
-
- Article Submissions: The Mercenary/IIRG
- 862 Farmington Avenue
- Suite 306
- Bristol,Ct 06010
-
- IIRG World Headquarters BBS: The Rune Stone
- 14.4K HST Courier
- All H/P/A, 3000+ Files
- (203)-832-8441
- NUP: Conspiracy
-
- Table of Discontents:
-
- [1] "Ionizer" - IIRG Site Sysop Arrested
- A Report By The IIRG
-
- [2] What Really Happened at "Pump-Con"
- (An Interview With Thomas Icom)
- Interview By: Mercenary
-
- [3] Bencrypt Encryption
- By: Ben Sodenkamp
-
- [4] Hacker OPSEC (Operational Security)
- By: Thomas Icom/IIRG
-
- [5] The Libertarian Responsibility of The Cyberpunk Movement
- By: Thomas Icom/IIRG
-
- [6] FOR THE PEOPLE
- Supplied By: Those Wacky Secret Service Agents
- Edited by: Mercenary
-
- 1. Secret Service Agents Get Free Vacation
-
- [7] The Rumor Mill (Unconfirmed Rumors From the Underground)
- Edited By: Mercenary
-
- 1. Han Solo Sells Out to the Empire?
- 2. Dr. Detergent of TDT Retires?
- 3. Fear and Loathing BBS Busted
-
- [8] PHANTASY TIDBITS: News and Views of Interest
-
- 1. SNET Operators Forwarding ANI Data
- 2. FCC Releases Frequencies
- 3. Put Your Hands in the Air, and Give Me Those Chips
- 4. ATM Bandits Nabbed
- 5. FBI Calls for Gun Licensing
-
- [9] Listing of IIRG Distribution Sites
-
- [10] Listing of PHANTASY Distribution Sites
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- OFFICIAL DISLAIMER...
-
- All information in PHANTASY is from USER contributed material
- The Publishers and Editors of PHANTASY and THE IIRG disclaim
- any liability from any damages of any type that the reader or
- user of such information contained within this newsletter may encounter
- from the use of said information. All files are brought to you for
- entertainment purposes only! We also assume all information infringes
- no copyrights and hereby disclaim any liability.
-
- PHANTASY is (C) 1990 by The IIRG
- IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section [1]: "Ionizer" - IIRG Site Sysop Arrested
- A Report By The IIRG
-
- (Portions of this article were taken from a Taped Conversation with Ionizer
- from the Hartford,CT. County Jail to Mercenary at IIRG HQ.)
-
- Ionizer the sysop of the Ware House was arrested on Monday August 2nd as he
- entered a pretrial hearing at the Hartford Superior Court,Hartford Connecticut,
- to face charges of his alleged connection for a break-in at Hall High School on
- October 11th,1992.
- Ionizer was arrested for "Inciting Injury to Persons or Property", a felony,
- and "Risk of Injury to a Minor".
- Apparently Ionizer was taken to the West Hartford,CT. police department and
- was quickly photographed and fingerprinted and then was whisked away to the
- West Hartford Superior Court and was arraigned,(without his lawyer being
- present) and was ordered held on a $500,000 dollar bond.
- West Hartford police are attempting to keep the case sealed, but the
- charges against Ionizer are for having Anarchist files available for download
- on his BBS, The Ware House.
- In our discussion with Ionizer from jail, the police have apparently used
- strong-arm "Big-Brother" tactics on a 14 year-old by the handle of,
- "Misguided Youth" who had access to the Ware House.
- Reportedly police approached him and threatened to drag him into court if he
- didn't sign an affidavit that he downloaded the file "ANARC2.ZIP" from the Ware
- House.
- When Ionizer first heard wind of police hassling users of his system, he
- supplied his entire system log (Ionizer kept his system log since day 1 of
- the system being up) to an IIRG member for analysis.
- We have analyzed the Meg Plus file and have found no record of Misguided Youth
- ever downloading the file from Ionizer's BBS. In fact only 2 users have ever
- downloaded ANARC2.ZIP that we could find.
-
- 1. HITMAN
- 18:56 05/23/93 LIBRARY FILE DOWNLOAD
- User Hitman download ANARCHY\ANARC2.ZIP
-
- 2. HOLLYWOOD
- 14:35 05/24/93 LIBRARY FILE DOWNLOAD
- User Hollywood download ANARCHY\ANARC2.ZIP
- 14:50 05/24/93 LIBRARY FILE DOWNLOAD
- User Hollywood download ANARCHY\ANARC2.ZIP
-
- Now apparently it seems that the West Hartford police department feels it can
- either intimidate anyone it feels like, or fabricate evidence.
- Several other Ware House users have been contacted by phone by police and
- questioned, We know "Mastermind" was contacted and was asked "Are you good
- friends with Ionizer?' and "Did he ever mention anything about the making of
- pipe bombs to you?'.
- According to Ionizer, the police are claiming an undercover police officer
- with the West Hartford Narcotics division is claiming to also have downloaded
- the file.
- Hitman has also been contacted by police and asked to supply a copy of the
- file in question, and this is events we were told happened,
-
- Quote from Hitman -
- Date : 08 Aug 93 10:19:14
-
- I'll tell you the whole story, as I told it to Ionizer
- last night (he called me from jail). When I was out one
- day, the detective Mr. Anielwiski (or something like that)
- called. I wasn't home, so, he talked to my dad. My dad
- thought I was doing all of this shit too, so, he took it
- way out of proportion. I got home, and he made me search
- for a file 'ANARC.*' on my hard drive. Since it is
- really his computer and his phone line, there is nothing
- that I could have done, since he could have easily done
- it himself. Anyways, he said to delete it, so I wiped it
- via Norton's WIPE program, so it couldn't be recovered.
- Anyways, I guess the detective called back, and my dad said
- that I had the file. But, it was wiped. Anyways, my dad
- thought we'd just undelete it, but, he didn't realize that
- the file would just be a null file when we did so. The
- rest of the story is what he told me, as I was at work the
- rest of the day. The detective came over, and I guess my
- dad copied the null file onto a floppy, but, I think the
- floppy was bad anyways. At any rate, to my knowledge, there
- is no information at all on the floppy, and, I've got no other
- copy of it on my hard drive.
-
- --Hitman
-
- Now the file in question is ANARC2.ZIP, which is ANARCHY FOR FUN AND PROFIT
- By: The Deth Vegetable Volume 1,Issue 2.
- It seems that this file is being singled out by the police because of its
- high bomb making instructions content and this message in the header of the
- file,
- ----------------------------------------------------------------------------
- /--------------------------------------\
- ! Note to Law-enforcement type people: !
- ! This file is intended to promote !
- ! general havoc and *ANARCHY*, and !
- ! since your going to be the first !
- ! assholes up against the wall.. there !
- ! isnt a damn thing you can do about !
- ! it, pigs! !
- \--------------------------------------/
- ------------------------------------------------------------------------------
- None of the information contained in ANARC2.ZIP could be considered
- classified or secret as the nformation in the file is easily obtainable in
- any book store in books like "The Anarchists Cookbook" or "Ragnar's Guide
- to The Home and Recreational Use of High explosives".
- We did a little investigating and found "The Anarchists Cookbook",
- By William Powell on the shelf at "Barnes and Noble" bookstore in
- West Hartford,CT. (Hey Police, better run over and shut them down!!).
- We also found "The Anarchists Cookbook" at the Tunxis Community College
- Library in Farmington,CT. (HX 844 P68) and at the University of Connecticut at
- Storrs Library (SPEC APC BK f33), so it is available at public libraries for
- underage children to read and enjoy.
- Also after a little searching on the international network of computers known
- as "Internet" look what we found available for download by "ANYONE" with a
- computer and modem, (Including Under-age Children).
-
- --------------------------------------------------
- Host cs.ubc.ca (137.82.8.5)
- Last updated 03:33 28 May 1993
- Location: /mirror3/EFF/cud/misc
- FILE rw-r--r-- 7936 Mar 8 1992 anarch.man
-
- Host kragar.eff.org (192.88.144.4)
- Last updated 00:05 17 Apr 1993
- Location: /pub/cud/misc
- FILE r--r--r-- 7936 Mar 8 1992 anarch.man
-
- Host nic.funet.fi (128.214.6.100)
- Last updated 06:11 22 Mar 1993
- Location: /pub/doc/cud/misc
- FILE r-xr-xr-x 7936 Mar 8 1992 anarch.man
-
- Host cs.ubc.ca (137.82.8.5)
- Last updated 03:33 28 May 1993
- Location: /mirror3/EFF/academic/books/zzz
- FILE rw-r--r-- 99 Apr 24 17:06 anarchists_handbook.d
-
- Host kragar.eff.org (192.88.144.4)
- Last updated 00:05 17 Apr 1993
- Location: /pub/academic/books/zzz
- FILE rw-rw-r-- 81 Oct 23 05:29 anarchists_handbook.d
-
- Host cs.ubc.ca (137.82.8.5)
- Last updated 03:33 28 May 1993
- Location: /mirror3/EFF/academic/books
- FILE rwxrwxrwx 25 Oct 11 1992 anarchists_handbook
- -> zzz/anarchists_handbook.d
-
- Host kragar.eff.org (192.88.144.4)
- Last updated 00:05 17 Apr 1993
- Location: /pub/academic/books
- FILE rwxrwxrwx 25 Dec 2 04:31 anarchists_handbook
- -> zzz/anarchists_handbook.d
-
- Host wpi.wpi.edu (130.215.24.1)
- Last updated 03:31 22 Jul 1993
- Location: /
- DIRECTORY rwxr-xr-x 512 Jul 7 09:20 anarchy
-
- Host unix.hensa.ac.uk (129.12.21.7)
- Last updated 01:46 26 Jun 1993
- Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
- FILE rw-r--r-- 8613 Jan 8 03:36 anarchism.today.Z
- Location: /pub/uunet/doc/political/umich-poli/Essays/Chomsky
- FILE rw-r--r-- 22156 Sep 17 1992 notes.on.anarchism.Z
- FILE rw-r--r-- 55985 Feb 2 16:09 notes.on.anarchism.ps.Z
- Location: /pub/uunet/doc/political/umich-poli/Spunk
- FILE rw-r--r-- 861 Mar 1 20:37 README.practical.anarchy.Z
- Location: /pub/uunet/usenet/control/alt
- FILE rw-r--r-- 1535 Sep 11 1992 alt.society.anarchy.Z
-
- Host nic.cic.net (192.131.22.2)
- Last updated 01:14 22 Mar 1993
- Location: /pub/nircomm/gopher/e-serials/alphabetic/p
- DIRECTORY rwxr-xr-x 512 Mar 19 16:11 practical-anarchy
- Location: /pub/nircomm/gopher/e-serials/alphabetic/p/practical-anarchy
- FILE rwxr-xr-x 54325 Mar 18 23:02 practical-anarchy.v1n3
- Location: /pub/nircomm/gopher/e-serials/general/politics
- FILE rw------- 92 Mar 21 23:38 .practical-anarchy
-
- Host unix.hensa.ac.uk (129.12.21.7)
- Last updated 01:46 26 Jun 1993
- Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
- FILE rw-r--r-- 3550 Mar 18 21:17 anarchism.and.power.Z
- FILE rw-r--r-- 23063 Mar 6 19:45 anarchy-faq-0.1.Z
-
- Host charon.mit.edu (18.70.0.224)
- Last updated 02:34 26 Jul 1993
- Location: /pub/usenet-by-group
- DIRECTORY rwxrwxr-x 512 Jul 12 02:46 alt.anarchism
-
- Host cs.columbia.edu (128.59.16.20)
- Last updated 10:24 26 Jul 1993
- Location: /archives/mirror2/faq
- DIRECTORY rwxrwxr-x 512 Jul 12 09:54 alt.anarchism
-
- Host wiretap.spies.com (130.43.43.43)
- Last updated 03:06 22 Jul 1993
- Location: /Library/Article/Socio/.cap
- FILE rw-r--r-- 28 Apr 5 19:08 anarchy.bib
- Location: /Library/Article/Socio
- FILE rw-r--r-- 23565 Dec 24 1992 anarchy.bib
-
- Host unix.hensa.ac.uk (129.12.21.7)
- Last updated 01:46 26 Jun 1993
- Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
- FILE rw-r--r-- 3196 May 11 17:35 anarchist.revolution.Z
- FILE rw-r--r-- 5621 May 11 17:37
- macsimin.anarchist.federation.Z
-
- Host wpi.wpi.edu (130.215.24.1)
- Last updated 03:31 22 Jul 1993
- Location: /anarchy
- FILE rw-r--r-- 44492 Jul 7 09:19 anarchy.tar.Z
- FILE rw-r--r-- 61332 Jul 7 09:20 anarchy.tar.Z.uu
-
- Host wiretap.spies.com (130.43.43.43)
- Last updated 03:06 22 Jul 1993
- Location: /Library/Article/Socio/.cap
- FILE rw-r--r-- 39 May 28 06:28 anarchy.faq
- Location: /Library/Article/Socio
- FILE rw-r--r-- 45315 May 28 06:28 anarchy.faq
-
- Host charon.mit.edu (18.70.0.224)
- Last updated 02:34 26 Jul 1993
- Location: /pub/usenet-by-hierarchy/alt
- DIRECTORY rwxrwxr-x 512 Jul 12 02:46 anarchism
-
- Host nctuccca.edu.tw (140.111.3.21)
- Last updated 01:04 13 Jul 1993
- Location: /USENET/Periodic_Postings/alt
- DIRECTORY rwxr-xr-x 512 Jul 12 1993 anarchism
-
- Host orchid.csv.warwick.ac.uk (137.205.192.5)
- Last updated 05:41 31 Jul 1993
- Location: /pub/cud/misc
- FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z
-
- Host clover.csv.warwick.ac.uk (137.205.192.6)
- Last updated 05:04 26 Jul 1993
- Location: /pub/cud/misc
- FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z
- -------------------------------------------------
-
- Our point is simple, this material is publicly available almost everywhere
- and the last time we checked (Despite Clinton), we still lived in a FREE
- country with the constitutional right of free speech.
- This is a plain and simple case of Police Harassment against Ionizer.
- We are not claiming he is an angel or saint by any means, as he has had
- numerous encounters with the West Hartford police including his arrest in 1988
- for illegal use of credit cards,computer crime,larcency, and the illegal
- possesion of fireworks.
- But to arrest an individual for having a file on his computer that is public
- domause of that, or when some idiot has
- been phreaking heavily from the same small area for the past few months, and
- the phone company decided it's cheaper to do something about it than continue
- to absorb the loss. My personal experience is that airports are the best
- place to use payphones from. There are usually payphones which have modular
- jacks so you don't need an acoustic coupler, and people from all walks of life
- are there, so you won't look out of place. My personal experience has also
- indicated that hotels are usually the worst place to do anything from. Hotel
- employees are always suspicious, and thus are always asking questions of the
- people in their hotel, particularly if they haven't checked in. Also, as the
- participants of Pumpcon can attest, hotels are often quick to call the police
- when something doesn't quite fit into their reality picture.
- Another favorite phone phreak OPSEC trick is known by the terms "canning",
- "pedestal hacking", "beige boxing", and "hardwiring". This basically entails
- hooking into a random phone line somewhere, and using it to make outgoing
- calls. The first three techniques are usually used to indicate a temporary
- connection. One usually walks up to a test point on the phone company's
- outside plant, and hooks in. These test points are commonly called "bridging
- heads", "b-boxes", "(phone) cans", or "pedestals". The forth term is usually
- used to indicate a more permanent set up; in essence a clandestine extension
- of the target phone line.
- One fun thing to try is to power a cordless phone base by means of a large
- capacity rechargeable battery, and then hook it up to a phone cansomewhere.
- This keeps you from having to stand suspiciously at the can for hours a end.
- (A common problem when canning) So even if they do trace the call back to the
- phone line you're using and send in the Bellcore Rapid Deployment Force to
- adjust your attitude, you'll still be a football field away when the shit hits
- the fan. It should also be noted that by adding an external antenna to the
- base station, (a 60 inch 1/4 wave ground plane would be cheap to make and
- perform decently) you can increase the range on most phonesup to 1/2 mile.
- (and get the FCC pissed off at you if they found out you did this. So be a
- nice law-abiding person and obey FCC Part 15 Regs. Then they might leave you
- alone, maybe.)
- There are also many other techniques that you can use. If you are
- interested in learning more about the technical procedures of covering your
- tracks in cyberspace, you should check out "2600: The Hacker Quarterly",
- "TAP", and (excuse the self-promotion) "Cybertek: The Cyberpunk Technical
- Journal". They all contain a wealth of technical hacking and phreaking info.
- Now that you are not doing anything over any phone traceable to you, your
- next step is to keep your activities to yourself. Yes, hacking is a often a
- big ego boost, but talking about your latest accomplishment is likely to get
- you into trouble. If "they" get wind of what you're doing, it makes it that
- much easier for them to get you, no matter what precautions you might be
- taking. In the same vein, avoid getting involved with large groups. If you
- must do something which involves more than one person, then make sure you
- intimately know the people you will be involved with, and keep the group as
- small as possible. My criteria for trusting someone is that I've known them
- for at least a few years, know their real name, and have physically hung out
- with them extensively for a couple years. My gut reactions to the person also
- have a big say in whether or not I trust him or her. Believe it or not, we
- all have a sixth sense which can be developed over time, and is very helpful
- in keeping us out of trouble.
- Despite the fact that you've been careful, you still might be noticed by
- someone somewhere, and as a result get hit with a search warrant or be the
- victim of a Cointelpro-style black bag job. To combat this, don't keep
- anything sensitive at your house. Store all your good stuff off site, so you
- won't lose it. Any sensitive data you have to keep at your home should still
- be backed-up at an off-site location, and encrypted.
- Tere are a lot of good encryption systems out there. The current rave in
- encryption software is PGP, "Pretty Good Privacy". It's available on any good
- BBS system, and seems to be what everyone is going to be using. The nice
- thing about PGP is since it's a "Public Key" system, it allows for secure
- communications without having to exchange keys. If you don't give a shit
- about exchanging data with strangers or have a secure way to exchange keys,
- then there's Video Vindicator's "VinCrypt". It's also available on any decent
- system.
- Another good one is Consumertronics' "Absolute Computer Security". More
- a set of applied encryption ideas and concepts; as opposed to a strictly
- defined system, ACS is capable of being totally customized by it's user, and
- while the original software is for MS-DOS machines; can be ported over to
- other systems. It should be noted that the effective use of ACS requires some
- applied intelligence on behalf of its user. If that's a problem with you,
- then you'd be better off using something else.
- One favorite of mine is the "one-time" cipher system. Basically the one-
- time system uses a randomly generated non-repeating key which is then used to
- encrypt your data. Most people think that one-time cipher systems are a pain
- in the ass to use, but they are unbreakable as long as your key is kept
- secure. I'll talk about it more in the next chapter.
- No matter what encryption system you use, it won't be worth a damn if you
- use poor judgement in the selection and protection of your encryption keys.
- Make your key as long as possible, hard to guess, and not restricted to just
- alphanumerics. Any encryption system will fail if it prompts you for a key
- and you enter "SECRET". And since you're an intelligent person I won't insult
- you by reminding you to keep your encryption key secure, and to use a
- different key for each file you want to protect.
- If it is possible for you to do so, I would also hide the data on the
- floppy so that it appears invisible to the average user. Some of the ideas
- that quickly come to mind are tacking the encrypted data on the end on a legit
- executable file, or putting the data on a sector which is then marked "bad" so
- it won't be overwritten.
- A really good idea, if your serious about OPSEC, is to use arcane or
- custom hardware and software. While you won't be compatible with the rest of
- the world, you'll at least be secure. ("But then I won't be able to play
- "Leisure Suit Larry" like I can on my PC!") Someone should design an MS-DOS
- version of Beagle Bros. "Dos Boss" Apple II DOS Customizer, which would allow
- changing of DOS command names. You could change "TYPE" to "DELETE", so anyone
- attempting to read your files would instead wipe them. An even more fantastic
- idea would be a custom secure operating system based on the one used in Robert
- A. Heinlein's book, _The Number of the Beast_. He wrote about a "double
- bookkeeping" system which looked ordinary, but unless it received certain
- discrete keystrokes, would display a set of decoy data, while erasing the real
- data hidden on the system. Doing a setup like that shouldn't be a problem to
- an experienced programmer.
- Now if you've followed all these guidelines, you can consider your
- operation secure, and have little to worry about. Hacker OPSEC really boils
- down to two things, Common Sense and Caution. On the other hand, you
- feel that these precautions are little bit on the paranoid side. Just
- remember two things. The first is that hacking and phreaking are currently
- looked down upon by those in power. The second thing you should remember is
- what happened during Operation Sundevil.
-
- -Thomas Icom
- International Information Retrieval Guild
- "May Odin guide your way."
-
- Sources Mentioned:
-
- Consumertronics
- 2011 Crescent Dr.
- Alamogordo, NM 88310
- 505-434-0234
-
- Absolute Computer Security:
- Manual & MS-DOS diskette -$29
- Manual alone -$19
-
- 2600: The Hacker Quarterly
- P.O. Box 752
- Middle Island, NY 11953
- 516-751-2600
- Subscriptions: $18/year
-
- TAP
- P.O. Box 20262
- Louisville, KY 40250
- Sample issue: $2
- Write for more info.
-
- Cybertek
- P.O. Box 64
- Brewster, NY 10509
- Subscriptions: $15/6 Issues
- Sample: $2.50
-
- PGP: Pretty Good Privacy and VinCrypt
- Available on most decent BBSes.
- Try: Uncensored (914)-761-6877 or the Rune Stone (203)-832-8441
- NUP:Conspiracy
- Libertarian's in '96!
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section [5]: The Libertarian Responsibility of The Cyberpunk Movement
- By Thomas Icom/Cybertek/IIRG
-
- With the moves that various government powers have been taking to
- institute a totalitarian form of government in this country, it has now
- become the responsibility of the Cyberpunk movement to take such measures as
- to prevent these actions from occurring and reverse what damage has already
- occurred. When one takes into account the various factors involved in
- reclaiming a democratic state from totalitarian rule, it will be found that
- the Cyberpunk movement is the best equipped to handle the task. The movement
- has the necessary political attitudes, equipment, and knowledge to prevent
- further government progress into totalitarian rule and reverse the steps
- that have already been taken by various government entities towards that
- direction. The Cyberpunk movement also has a personal stake in the
- prevention of totalitarian rule; which has an equal footing with altruism.
- It is for these reasons that the movement should be at the forefront of "The
- Second American Revolution", and contribute their knowledge and attitudes to
- its success, and the restoration of a libertarian form of government to the
- United States of America.
- The Cyberpunk movement has always had the libertarian attitude of "The
- government which governs best, governs least.", and "Technology belongs in
- the hands of the people". These attitudes follow in the footsteps of the
- country's founding fathers. The lack of such an attitude by those in power
- has been a major factor in the totalitarian slides this country has been
- experiencing. The Cyberpunk movement has also stayed away from the
- forefront of politics; preferring to stay in the background, let others "run"
- things, and act as "watchers"; keeping vigilant for lapses in judgement by
- the ruling powers. This attitude is precisely what is needed for those who
- will be at the forefront of The Second American Revolution, for once the
- initial job is done, "disinterested" parties will be needed to ensure the
- mistakes of the past are not repeated. The existence of well-equipped
- Cyberpunk "Watchers" will act as a future deterrent to those wishing to
- revert back to totalitarian ways.
- The Cyberpunk movement has always given a high priority to acquiring
- knowledge in many different technological and other fields. They have also
- been adamant about implementing the mass-distribution of such information.
- These two factors alone are qualifiers for any group conducting low
- intensity conflict towards the institution of a libertarian form of
- government. In addition, the Cyberpunk movement stresses practical
- "hands-on" applications of the knowledge they collect and disseminate. This
- is another factor that makes the movement well suited for the task at
- hand.
- Since the Cyberpunk movement has the proper attitudes and knowledge
- available to it, they are well suited for the task of ensuring the United
- States regains and maintains a libertarian form of government. Just as the
- founding fathers had a responsibility to create the United States, the
- freest country in the world; it is now the responsibility of the Cyberpunk
- movement to restore the freedom that this once great country lost, and to
- take on the responsibility towards the operational aspects of The Second
- American Revolution and the re-establishment of a libertarian form of
- government in this country. There is, however, an even more important and
- pressing reason as to why the movement should act.
- Throughout history, even in benign and democratic governments, there has
- been prejudice towards individuals and groups who have the capability of
- self-sufficiency. Such groups have been persecuted severely, with their
- members often facing death. This has occurred even if such groups have had
- no political leanings whatsoever. They were simply viewed as a threat to
- the powers that be, and dealt with. By taking a look around, any astute
- observer will be able to see this beginning to happen with the Cyberpunk
- movement. In this instance, we have the greatest responsibility of all, the
- responsibility to ourselves to ensure our survival.
- One must remember that our responsibility to the revolution does not
- imply we should organize any more than we already have. In fact, our
- activities should be kept to small groups, and be as disorganized overall as
- possible, as to better stay hidden and difficult to track down. Twenty small
- groups operating on their own will be harder to track down than one large
- group. If everyone just simply does there part, there will be no problem
- winning this one. Our shadowy existence and characteristic of being
- "everywhere and nowhere" will also act as a deterrent to keep the future
- government leaders from acting as stupid as the ones we presently have in
- existence.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section [6]: FOR THE PEOPLE
- Supplied By: Those Wacky Secret Service Agents
- Edited by: Mercenary
- -------------------------------------------------------------------------------
-
- Secret Service Agents Get Free Vacation
-
- Rumor has it that the Secret Service security detail of Secretary of Defense
- Les Aspin were provided with a swank 6 day/5 night holiday in Venice,Italy
-
- Courtesy of U.S. Taxpayers.
-
- It seems that Aspin finished off an official business trip in Europe with a
- jaunt to Italy. Although Mr. Aspin payed for his own expenses and his
- girlfriends, the SS Agents were provided with $500.00 to $700.00 a nite rooms
- in the 5-Star Hotel Danieli, courtesy of you and me.
- Must be nice, probably a reward for harrassing innocent civilians.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section [7]: The Rumor Mill (Unconfirmed Rumors From the Underground)
- Edited By: Mercenary
-
- -------------------------------------------------------------------------------
-
- HAN SOLO SELLS OUT TO THE EMPIRE??
-
- I am writing to update you on yet another 203 lamer (this area code seems to
- be chock full of em) named Rob A. (aka Han Solo and sometimes Lurker).
- He turned me in to Yale for supposedly hacking an account on their VMS system.
- They will probably be calling me shortly. His reasons are that I purportedly
- "screwed him over" with a little deal we had.
- The deal was, I'd give him a UNIX account at SCSU in exchange for the use of
- his account on a very nice elite BBS. Things went fine until he got it in his
- head that I'd shared that unix account with someone else, which was not true.
- He then took it upon himself, as a "security measure" to turn me in.
-
- -------------------------------------------------------------------------------
-
- DR. DETERGENT OF TDT RETIRES??
-
- June 15, 1993
- Dr. Detergent / TDT 1993
-
-
- I herby officially retire from the scene. Got an excellent job which
- takes me all over the world, so I don't have time for this stuff any more.
- To all the sysops worldwide, please delete my accounts on your boards.
- If there are any new applications under my name, you may rest assured
- that it's not me.
- It was great serving the Elite underground. Take care all ya boiz - my
- frienARE MOLES and TRAITORS among us Pirates... these scum of the
- Earth... who will DL and enjoy many Wares on the unfortunate Boards
- they are on .... and then Bust those Boards .... perhaps even after
- being the ULers of their own NOVELL Wares themselves in a Sting operation
- ( we are checking this out too ) .. those scum are doomed by their own
- natures to be worthless, friendless creatures ... for what sort of
- human beings can they be... and no one likes a snitch... and anyone who
- DOES these acts .. surely will be having a shitty life ... as who else
- but a totally shitty low-paid small-minded person would do such things.
-
- The Revenge of the Fear is that the Traitor Pirate will be found out in
- the Legal Proceedings OR SOONER & that Novell is doomed anyway
- ... with UNIX COSE Networking beoming friendlier & even Microsoft getting
- into the Networking Competition. Through its Pricing and Service and Bugs.
- Novell's own Life expectancy may not be too high.
-
- In fact ... Novells' Stock Prices today at 20&3/4 on the NASDAQ exchange
- is down today .... they have my sincere wishes for a swift and complete
- fall into Chapter 11 Bankruptcy.
- He laughs Best who Laughs Last. Novell may have some Bad Luck in the
- Future as doing Bad Deeds always comes back to haunt the perpetrator
- sooner or later and they have made many Enemies..
-
- So I close ... but on a positive note .... Piracy Lives and in fact
- there are MORE and MORE Pirate Boards now as Piracy becomes more
- "MainStream" into society with cheap fast Modems and Cyperpunks on MTV.
-
- I am just old enough to have experienced the "60's",and I have always
- regarded Piracy and Pirates as some of the few true remnants of the "60's"
- Underground Movements .
-
- I am happy if I have helped the Doctor - the most unselfish Sysop I
- have ever known - and one of the FASTEST Sysops... I've seen him
- Install a Door on all SEVEN Nodes in about 15 minutes ! There won't be
- another SYSOP like HIM. It was his HOBBY and he was in it for the FUN.
-
- Examples of what the Doctor had achieved - 7 Nodes,and 7 Gigs
- there are very few BBSs PD or Pirate of THAT Size. PLUS the Fear was one of
- only two BBSs in USA that KEPT ITS WARES for OVER 2 YEARS, ALL ONLINE!!
- The First ACiD ANSI ACQUISITION was composed and ULed to the Fear.
- The Doc was one of the 1rst BBSs in USA to go with the new PCBoard V15.0 Betas.
- The Doctors' BBS was chosen to become a TDT Member BBS and was also
- chosen to be the ECR Courrier HQ in USA ...AND many many Big Pirates and
- Group Members on the scene now .... got their start on the Fear &
- Loathing. In fact ... we used to joke that the Fear was a College for
- Pirates !
-
- He had Plans to Improve and Increase his BBS even further when he had time.
- Just last night in fact ... The Doctor installed the ZYRION Protocol.
-
- No matter HOW Big his BBS became.. the Doctor ALWAYS had time to answer
- his Users' Mail . ANd just imagine how exciting it must have been for
- him to answer questions like .. " How do I use the Zippy Scan" after 10
- years of SYSOPing !
- When I say he was generous... I mean GENEROUS. Armed Forces Veterans
- were allowed high access for free ; those users cash-poor or Wares-poor
- were almost ALWAYS allowed MEGS and MEGS of free credits... in his 10
- years of SYSOPing ... maybe ONE person was booted off the Fear and even
- THAT user could have re-applied for access had the system not
- automatically booted him off for not ULing a single file. Id say that
- in the last year alone .. the Doc GAVE AWAY over 300 Megs in Free Credits
- ..virtually anyone who asked him for help .. went away well satisfied.
- EVEN LOCALS were allowed on and given High Access so they wouldnt be
- begging for credits. Now how many other BBSs allow THAT !?
- He tried to fulfill ANY Users requests and always had a polite word for
- any user. He was NOT one of those new Sysops-with-an-attitude -2
- Node-2 Megs-Im so kewl-type of guys.
-
- There is so much I could say ... but I impose too long on anyone who has
- read this far.... and I thank you for reading this far .
-
- All I know is that a BBS that I have had great pleasure calling almost
- every day for OVER FOUR YEARS is now gone .... and one of the few
- pleasures in my over-worked life is now no more. When I went to my BBS
- Directory ... it was the first BBS I called each night.. and the last
- before I went to bed. I had just Chatted with the Doc last night on
- how the BBS was improving and all the plans we had to make it even
- better. You guys woulda really seen something .... there was more
- growth potential at the Fear than at almost any other BBS I know.
- All we lacked was TIME .
-
- But as Fab said when he "semi-retired" ... how long can you do stuff to
- impress 15 year old kids ?
-
- This is one Hobby with a nasty after-taste. So ... SYSOPS take warning!.
-
- For the Doctor and me ... its ....
-
- ChildHood's End .
- C'ya,
-
- Empedocles
- Cosysop - Fear & Loathing in Las Vegas BBS .
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section [8]: PHANTASY TIDBITS: News and Views of Interest
-
- -------------------------------------------------------------------------------
-
- SNET Operators Now Fowarding ANI Data
- by Thomas Icom/IIRG/Cybertek
-
- A recent experiment conducted by the IIRG has confirmed that
- Southern New England Telephone is now fowarding ANI data from
- operator assisted calls. In the past, it was posssible to defeat
- ANI by having the operator place a call for you. This piece of
- information has been passed around and accepted as gospel on many
- different H/P/A boards.
- To detrmine if your RBOC is fowarding ANI data from operator
- assisted calls, have the operator dial 1-800-235-1414 for you. This
- is an ANI service run by Full Disclosure Magazine (P.O. Box 903,
- Libertyville, IL 60048) and 1-900-STOPPER. If you receive correct
- ANI data, then your RBOC is passing the data along.
- One should also note that while 1-900-STOPPER will defeat Caller
- ID and ANI, it is still a simle matter to suponea the phone company
- for both incomming ANI and outgoing AMA data from 1-900-STOPPER.
- These can then be cross-referenced to find out who called whom.
- Your best bets for privacy are still payphones and buttsets.
- Let's all be careful out there.
-
- IIRG UPDATE: Full Dislosure is now only running an ad for their 900-STOPPER
- service on the number given in this article.
- You can however use, 1-800-852-9932 to test the techniques
- in Icom's article. (Valid as of 8/10/93)
-
- -------------------------------------------------------------------------------
-
- FCC Releases Frequencies
-
- The FCC has set aside narrowband 901-902,930-931, and 940-941 MHz for
- wireless communications services or (PCSs) Personal Communications Services
- such as paging,electronic mail and faxing. The FCC has not chosen a selection
- process to pick providers of narrowband PCSs, but has said it will pick 11
- nationwide licensees and 13 regional licensees and 10 local providers.
-
- -------------------------------------------------------------------------------
-
- Put Your Hands in The Air and Give Me Those Chips!
-
- A string of armed robberies is haunting Silicon Valley, recently 10 young
- men armed with handguns forced their way into Bestronics Inc in San Jose
- and subdued the workers before carting off $15,000 in memory chips.
- Apparently their MO is to handcuff,beat and torture employees until their
- told where the parts are stored.
- Hot items are memory and 386 and 486 CPUs. Youth gangs are cruising
- industrial parks loking for easy targets. At least 3 companies have been hit
- in the last month.
-
- UPDATE!!:
-
- The San Jose Police have arrested a 20-year-old male who they believe is
- the individual responsible for the recent wave of robberies.
- Police pulled the man over after noticing the car he was driving had 2 two
- different license plates. One was from a stolen car used in one of the
- robberies.
- After obtaining a search warrant for the mans home, police found memory
- chips,police scanners,two-way radios,firearms,and hand-cuffs.
- Police are still searching for 9 more individuals.
-
- -------------------------------------------------------------------------------
-
- ATM Bandits Nabbed
-
- On Wed. July 7th, Federal Grand Jury indicted Alan Scott Pace,30, and
- Gerald Harvey Greenfield,50, both of Tucson,Arizona for installing a fake
- automated teller machine at the Buckland Hills Mall in Manchester,CT.
- The two men allegedly put a Fujitsu Model 7020 ATM machine that had been
- modified to record users accounts and PIN's. without paying out cash.
- They then made duplicates of the cards and used them at banks throughout
- the country at valid ATM machines.
- The eight-count indictment charges them with bank fraud counterfeiting of
- ATM cash cards,interstate transportation of stolen property,and conspiracy.
- Pace was arrested on June 23rd by the Secret Service in New York and
- Greenfield surrendered to the Secret Service five days later.
- They now face 60 years in prison on the combined charges.
-
- -------------------------------------------------------------------------------
-
- FBI Calls For Gun Licensing
- By NEAL KNOX
-
-
- Incredibly the story of the FBI recommendations has only run in the
- July 8, 1993 New York Times on an inside page and in USA Today on July 9,
- 1993. No other major newspapers or TV news outlets have even mentioned
- this proposal as of today, July 10. It is necessary for each and every
- one of our readers to contact their local legislators and present them with the
- NRA press release and make your opinions known.
-
-
- NEAL KNOX REPORT
-
- WASHINGTON, D.C. (July 11) -- FBI Director William Sessions
- has recommended to Attorney General Janet Reno that the Clinton
- Administration call for a wide range of new firearms laws,
- including licensing the possession of handguns after mandatory
- training, with "appropriate reimbursement" for firearms of those
- who can't pass the training or who voluntarily turn in their
- guns.
-
- This incredible document, which notes that the FBI does not
- publicly comment on political matters to avoid "destroy(ing)
- confidence" in the agency, says "(t)he proliferation of firearms"
- and their use in violent crimes justifies "an extraordinary,
- singular departure from this policy."
-
- The last item of Sessions' 10-point recommendation -- which
- the FBI refuses to release -- calls for the FBI Office of Press
- and Congressional Affairs to "develop a media strategy to
- publicize and develop support for the FBI's position."
-
- In short, the FBI Director is recommending to Attorney
- General Janet Reno that she authorize violation of Section 1913
- of Title 18, U.S. Criminal Code -- which prohibits lobbying with
- appropriated funds.
-
- Naturally, the FBI recommends enactment of the "Brady Bill,"
- though raising questions about the accuracy of state criminal
- records checks and other "technical problems."
-
- The FBI also recommends "a complete prohibition upon the
- transfer, importation, transport or possession of assault
- firearms" -- which are not defined, except as high capacity and
- "fast firing."
-
- Sessions calls for "a complete prohibition upon the
- possession of armor piercing ammunition," which would be defined
- "upon performance standards, not composition" -- presumably on
- the basis of penetration of aluminum plates such as the FBI used
- in its mid-1980's tests of AP ammo.
-
- Much conventional high-velocity handgun ammo can penetrate
- the Kevlar bullet-resistant vests worn by police. However,
- because the FBI's recommendation is not limited to handgunammunition, it could be used to ban almost all center fire rifle
- ammunition.
-
- Finally, the FBI recommends "reallocation of existing
- resources to increase the regulation and oversight of" Federal
- licensees -- and, among other things, increase license fees,
- require an existing place of business, and a background check
- with fingerprinting of potential dealers. That just happens to
- jibe with the FBI's long ambition to have BATF's firearms
- enforcement powers.
-
- The "FBI Working Group" which prepared the recommendations
- "discussed atlength whether the FBI should recommend a general
- ban on the possession of handguns. After careful consideration,
- the group concluded that a proposed ban would not receive
- sufficient support."
-
- Clearly, they really wanted an outright handgun ban, but
- didn't think it would pass and, as they wrote, "would likely
- place us outside the scope of the current debate over firearms,
- and thus perhaps marginalize our overall impact."
-
- I first thought that the FBI proposal was a trial balloon to
- make the Administration's firearms recommendations in the omnibus
- crime bill (due out later this month) appear modest by
- comparison. But, amazingly, neither of the Washington newspapers
- has said a word about the FBI's landmark proposals.
-
- That indicates that the anti-gun "Washington Post" doesn't
- want to talk about the Clinton Administration's "next step" until
- the "first step Brady Bill" has been signed and sealed.
- The "New York Times" and other newspapers which have
- reported the FBI recommendations have focussed on their support
- for the "Brady Bill," with little or nothing about the radical
- handgun licensing and "assault weapons" (whatever that is) ban.
-
- Those reports have speculated that Sessions -- whose job has
- been hanging by a thread since being charged with ethics
- violations at the end of the Bush Administration -- was merely
- currying favor with Reno and the White House.
-
- Nonsense. No bureaucrat, or "Working Group" of bureaucrats,
- would make such a radical recommendation, or openly move to
- politicize the FBI, without orders -- or at the very least, a
- wink and a nod -- from someone much higher up.
-
- I think we're getting a look at the Clinton firearms
- platform -- and we'll see all of it before the next four years
- are over.
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section [9]: IIRG Distribution Sites
- (or Gateways to Oblivion)
-
- ////// ////// /////// ////////
- // // // // //
- // // /////// // ////
- // // // // // //
- ////// * ////// * // // * /////////
-
-
- IIRG World HQ: The Rune Stone BBS
- 14.4k HST
- Phantasys Home Board
- Complete IIRG Archives 3000+ Files
- (203)-832-8441
- NUP: Conspiracy
-
- IIRG Distribution Site 1: BluePhishen' BBS
- Fidonet 1:2603/406
- IIRG Distribution Site
- Sysop: Global Death
- (212)-924-9627
-
- IIRG Distribution Site 2: Deadcity
- Sysop: RoughNeck
- Australia
- Criminal Intent HQ
- +61-3-417-2060
-
-
- IIRG Distribution Site 3: The Sanitarium
- Sysops: Morbid Angel [INC/ACID]
- Spectral Illusion [ACID/RAZOR]
- IIRG Distribution Site
- ACID Member Board
- INC Courier Board
- RAZOR 1911 Courier Board
- VISA World Headquarters
- (817)PRI-VATE
-
- IIRG Distribution Site 4: The WareHouse
- (203)-TMP-DOWN
- Curently Under Investigation
- Sysop: Ionizer
-
- IIRG Distribution Site 5: Hollow Tree Productions
- Sysop: Phantasm
- TWA Distro
- IIRG Phantasy D