home *** CD-ROM | disk | FTP | other *** search
- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo
-
- ----=[ CISSD ]=---- takes undue credit for the publication of Issue #1 of
- __
- |__| :
- _____ _____:_____ ________|___ __|__ _
- | . | __| | | | | | | |
- ---===[ | / __| /| | / _ | |__ ]===---
- __|__|__|_____|___/ |__|___/__|__|_____|
- | . | :
- . . : .
- .
- - INTRODUCTION -
-
- =========================================================================
- THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY JAN (C) 1992/93
- -------------------------------------------------------------------------
-
- As I type, IDIX(Texas), Short Man(Ontario), Lister(ON), and
- The Dope Man(ON), eat my phone bill for christmas dinner.. and in
- that order. In an attempt to justify being WHQ for a text mag, i finally
- sit to produce an issue.
-
- Let us contemplate Mailing addresses temporarily. Send questions,
- comments, kitchen utensils to:
-
- TX c/o CISSD
- 37 Woolsthorpe Cres.
- Thornhill, ON
- L3T-4E1
- CANADA
-
- - TX
-
-
-
-
-
- ---
-
- 5 MOST FREQUENTLY ASKED CUSTOMER ASSISTANCE QUESTIONS(in order):
-
- 1. Who are you?
-
- 2. Where are you?
-
- 3. What are you?
-
- 4. Why are you?
-
- 5. How are you.
-
-
- - IDIX
-
-
-
-
- ---
-
- FOOLING BELL 800 ANI
-
- Bell Canada 1-800 numbers are all blessed with the gift from bell
- hell... Automatic Number Identification. And all is fine and well if you
- are PBX'ing, but why?! The following is a simple, and consistent method
- with which to fool BELL ani, to the extent where they only know what city
- you are in.
-
- You must train your ear... on just about every phone call you make,
- you hear a faint 1300Hz tone accompanied by white noise. Each '='
- representing this sound, and '-' representing silence, the pattern of sound
- for a 1-800 number is approximately this:
-
-
- ----==========--==-----------------===========================RING
-
- As a hacker, it is your duty to link to your three way node(where a
- trusty hacker freind is waiting) at the '*' in the following illustration:
-
- ----==========--==-*---------------===========================BEEP!
-
- 'Your number please sir??'
-
- '800 666 girl'
-
- 'Your number *AGAIN* please sir????'
-
- 'Oooops, that was my sisters number.. mine is [my area]-[my
- exchange]-random four digits!'
-
- 'Thank you for (ab)using Bell Canada'
-
- - TX
-
-
-
-
-
- ---
-
- ADDITIONAL WAYS TO FOOL BELL ANI
-
-
- You have just read a method of fooling Bell ANI for anyone equipped
- with a 3-way line. However, some of you may not have 3-way, or may require
- another method. Thus this article, Alternate methods of fooling Bell ANI.
-
- The first step to fooling Bell Ani is very simple. We must connect with
- the operator. Divert if you wish, but it is not neccessary. Once you have
- gotten the operator say the follwing being careful to say EXACTLY what
- I have written.
-
- "Hello. Could I please speak with ANI?"
-
- This is a keyphraze that will instantly gain you access to ANI. AT this
- point we must fool ANI, and lull all suspicions. The following works for
- me as a general rule.
-
- "Hi ANI. I really love you! I'm VERY sorry about last night.....
- let me take you out again tonight and make it up to you! I REALLY LOVE
- YOU! I'll give you my real phone number! And I won't use aliases anymore!
- I promise! I don't know what I'd do without you! Please give me another
- chance. We can meet at my place...."
-
- This is generally a safe way to fool ANI. After this, the most difficult
- phaze is completed, it is up to you to close the conversation quickly
- (can only talk to a bitch for so long....) and meet her after she
- gets off work.
-
- If this is done properly, You will gain access to wonderful crevices of Bell
- employee property that will keep ypu going for weeks. However, be warned,
- as with codes, an ANI is only good for so long.... after a week or two
- it is best to find a new ANI.
-
- - DOPE
-
-
-
-
- ---
-
- TELEPHONE PIRATES - NOT JUST HACKERS ANYMORE
-
-
- Excuse the numerous typos in this file, as it was taken from a recording
- dicatated to me over a poor recording device... some words were
- misheard/not heard at all and some information might be garfunkled...
- sorry.
-
-
- BEGIN _|
-
- Telephone Pirates. Not just hackers anymore by Gerry Blackwell
- -------------------------------------------
-
- Two years ago, a teenage hacker 'broke into' westing house canada inc. sl1
- PBX in missisauga, and stole $5000 worth of long distance telephone calls.
-
- The company was lucky. It was petty crime commited by a not very clever
- kid. That amount was peanuts. Still, westinghouse canada took a stand. It
- tracked down the perpetrator and unlike other companies in similar
- circumstances, brought the police in and went public with the story. 'We
- were determined not to get a reputation for backing down.', says telecom
- manager Al Addis.
-
- Westing House had set up an 800 line terminating at a direct inward service
- access(DiSA) port on the SL1. Executives on the road or at home could call
- in to the switch, then dial out on the outWATS line to make their long
- distance calls. Each executive had a four digit authorization code, and the
- company monitor call detailed records regularily. The problem surfaced when
- one senior executive long distance calling throught the disa port suddenly
- skyrocketed.
-
-
- DISA PORT BREACHED
- ------------------
-
- It wasn't hard to figure out what had happened. Somebody had found out the
- telephone number of the DISA port, possibly by using a PC program and a
- modem to repeatedly dial numbers in sequence until it hit one that answered
- with the wright kind of tone. Then a different PC program repeatedly dialed
- then number, each time trying a different authorization code until one
- worked.
-
- That's the high tech method. It may be the theif learned the number by
- shear accident. Westing house, like many other companies, had not stressed
- the importance of keeping DISA numbers confidential. The kid who did the
- hacking in this case only used the authorization code for his calls to
- freinds and computer bulletin boards. The long distance charges appeared on
- the Westing phone bill.
-
- The company was lucky. The kid didn't, as many have, pass the authorization
- code around to all his buddies, or worse, broadcast it on a hackers
- bulletin board. Telecom staff at wessingtn house started phoning some of
- the unnacountable numbers on the executive CDR printout. They ended up
- talking to the parents of a freind of the perpatrator.
-
- Again, they were lucky, this was an inexperienced hacker who didn't bother
- to cover his tracks. 'It is unusual that the freinds parents were willing to
- help.', Addis adds.
-
- At that point, Westing House called the police, who went to the suspects
- home with a search warrant. They found a PC set up for hacking. The company
- stopped short of prosecuting, and eventually had to write off the $5000.
- Westing House has now re-configured it's DISA ports so callers can only
- access local lines, thus minimizing potential financial loss from further
- hacking.
-
- A BILLION DOLLAR INDUSTRY
- -------------------------
-
- THe Westing house case, unfortunately, is only the tip of the iceburg.
- Theft of the telephone service and, more importantly, from customers is
- endemic. Estimates in the US aggregate losses by customers at somewhere
- between 500 million and 1 billion dollars a year.
-
- Bell canada director of regional security in Ontario estimates losses by
- phone company customers in Canada 'in the millions'. Srgt. Val King, in
- charge of the computer crime unit of the RCMP economic crime directorate in
- Ottawa has investigated at least one case in which the victims losses
- topped $50 000. Other involved amounts of $20000 - $30000 and $40000
- dollars.
-
- EMBARRASSED VICTIMS
- -------------------
-
- The only thing remarkable about the Westing House case, is that the company
- freely admits it happened. Most victims wont talk about the problem out of
- the embarrasment, or fear of losing investors confidence, or the mistaken
- idea that clamming up will prevent other criminals from figuring out how to
- do it. "It can be a problem if you're not carefull", was the comment, all
- too typical of the telecom manager of a large Canadian resourse company.
- "But the less talking about it, the better."
-
- That's the kind of attitude, said atlanta based security consultant Larry
- Rigdon of communications consultants Ltd. that makes DISA fraud the
- dirty little secret of the telecom industry.
-
- "It's a major major problem", he said, yet nobody's talking about it. Not
- even the media. In one of the hush hush cases, Rigdon claims the city of
- New York was hit for $750 000 in a year, "But they won't admit it", he
- says, "It's all political."
-
- The RCMP's Val King says the unwillingness of coorporations to prosecute, or
- even report a phone fraud case is one of the major problems in bedeviling
- police work in this area.
-
- "Even if a company doesn't wish to prosecute, we still like to know about
- it.", he said, "it might help in advising companies on how to prevent other
- crimes, AND you may actually have evidence that could help us prosecute a
- criminal in another case.".
-
- KIDS AREN'T THE REAL PROBLEM
- ----------------------------
-
- But even with more help from the victims, prosecuting phone crooks won't be
- easy. Rigdon and other security experts say, juvenile hackers are not
- really the problem.
-
- "If a company gets hit for $1000 in a month, maybe that's a kid", says
- Rigdon, "But when it's $10 000, $50 000, $250 000, that's not a kid. That's
- a proffesional who knows exactly what he's doing".
-
- Says King, "it's falsely to think that hackers are all kids. It's just that
- they're the ones who are easy to catch. As they get more experienced, they
- learn to cover their tracks better.". Rigdon, and another US based security
- consultant, Jim Ross, of Ross Engeneering Inc., in Adams Town(?) MD believe
- many of the most dramatic cases of DISA fraud in the US can be traced to
- drugs, trafficers, and other organised criminals. Bell Canada knows that
- some of the cases investigated in Canada involve drugs or organised crime.
- King admits some of the cases the RCMP investigated had links to organised
- crime.
-
- IN one US Case criminals stung a Harrisburg PA coorporation for $250 000
- over a period of months. When the company discovered the fraud initially,
- it upgraded security on its DISA ports so callers had to enter six digit
- authorization codes instead of a four digit code. That didn't stop them for
- long. All the calls were going to Columbia. When investigators finally
- traced them back, they found the calls originated from a bogus construction
- trailer set up on a vacant lot in manhatten. Of course the trailer was long
- gone by the time investigators got there.
-
-
- $50 000 in 8 days
- -----------------
-
- In another case, criminals bilked a chicago company of $50 000 in 8 days.
-
- The same magnitude of loss can result when amateurs broadcast a DISA number
- and authorization code on a Bulletin Board, Ross Says. For a few days,
- hundreds of hackers may use the numbers wracking enormous phone bills for
- the companies victimised.
-
-
- HARD TO PROSECUTE
- ----------------
-
- Inexperienced Phreakers(the term for telephone hackers), such as the kid
- who stung Westing House are hard to prosecute, even when they leave a track
- of muddy footprints behind them.
-
- "Suppose you find the house where the calls are originating.", says
- Detective Dave Hodgson of the Metro Toronto Police Fraud Squad. "There may be
- five people in there. How do you know who commited the offence? You also
- have to be there when they're doing it to charge them.". Hodgson has
- investigated 'half a dozen' cases of phone theft in the last year, and
- wasn't able to lay charges in any of them. King says his unit success rate
- in prosecuting phone crooks is 'Less than 25%'.
-
-
- THE VOICE MAIL DOOR
- -------------------
-
- The other major weak spot in modern telecommunication systems is the Voice
- Messaging System.
-
- In one case in the US, hackers broke access codes on a new
- voice mail and automated attendant system installed in the Los Angelos
- based certified grocers of california. The system included an 800 number for
- the convinience of the grocery, wholesalers, employees, and customers.
-
- Criminals broke into the system and temporarily commandeered 200 of 300 mail
- boxes. They replaced the mail boxes owners greetings with recorded messages
- giving up to the minute new york cocain prices and information about
- hookers services. The company didn't detect the situation until it noticed
- a suddent increase in the use of its 800 numbers.
-
- Only in America you say? Think again. RCMP Srgt. Val King in charge of the
- forces computer crime unit in Ottawa says there have been almost identical
- cases in Canada, involving drugs and prostitution.
-
- In one instance a hacker posing as the system administrator, broadcast a
- message to select user saying the company suspected there was fraudulant
- use of the system and was investigating. Could they please assist by giving
- him a private message leaving their passwords, and ID? Luckily someone
- checked with the real system administrator, and blew the whistle.
-
- Hackers can easily, and will, if they haven't already, call into a Voice
- Mail System, and through dial to the public switching network. If the line
- is busy, or ringing no answer, the system allows callers to dial 0, and
- then dial another extention rather than leaving a voice message for the
- original recipiant. On many systems you can dial 0 and then 9 for an
- outside line. From there, you can dial anywhere in the world.
-
- So is there a problem with phone theft in Canada? you bet. How big is
- harder to say, but if you accept estimates from experts like Ross and
- Rigdon who say it's a billion dollar program in the US, it must be worse
- than it seems in Canada, or it's soon going to get worse.
-
-
- * Gerry Blackwell is a canadian journalist specialising in
- telecommunications issues, and a contributing editor to telemanagement.
-
- |~ END
-
-
- In addition to this letter, a page was recieved detailing methods that
- Canadaian companies shoud, and undoubtedly will use to protect themselves.
- Hackers, take out your cyberdecks:
-
- BEGIN _|
-
-
- 1. Best Defence:
- Disconnect all DISA ports, using calling cards instead.
-
- 2. Next Best Defence:
- Block all trunk calls to DISA ports or ??? All overseas calls.
- (The biggest theft has involved overseas calls.)
-
- 3. Turn off DISA ports at night. Many fraudulant calls are made late
- at the night.
-
- 4. Set the system to wait at least five rings before answering, and
- don't answer with a steady tone. Answer with dead air, or a voice
- message. (Hackers use many programs to automatically dial numbers
- in search of DISA ports. They count the hit when the number answers
- on the first or second ring with a steady tone.)
-
- 5. Issue a different DISA authorization code to each user. Do not
- implement one code for all users.
-
- 6. Set mailbox password at a minimum six digits, and enforce frequent
- password changes every 30 days if the feature is avaliable.
-
- 7. If users select their own authorization codes, set a poilicy and
- make it stick that they can not use extention numbers, company ID,
- or social insurance number. Make someone responsible for testing
- codes for hackability.
-
- 8. Delete all Authorization codes programed into your PBX for testing
- and service. Purge codes of former employees, or any code a former
- employee might have known.
-
- 9. Implement DISA ports so that entering an invalid authorisation code
- causes the system to drop the line.
-
- 10. Monitor the system continually through alarms status logs.
-
- 11. Study call detail reports on a regular basis to spot fraud related
- calling patterns early.
-
- |~ END
-
- - TX
-
- ---
-
- SO YOU KILLED THE MUTHA FUCKA. NOW WHAT?
-
- The computer underground offers files which instruct in everything from
- the weapons of death to methods of murder without remorse or being caught.
- However, one encounters a fatal flaw in these ACSII councellors when one
- actually commits a murder. As for the killing, we will assume
- that you are capable of pulling this off yourself. Various creative methods
- will be discussed in future editions, for now, however, we deal with the
- after-effect.
-
- Guns are always an easy way out. So, say you have just shot some bitch
- ... NOW what are you going to do? If you are reading this you are not made of
- the stuff that would have you sit down and cry. Perhaps flight has entered
- your mind? Well, running is not advised. In the before mentioned scenario
- of having shot a woman, one is presented with a multitude of wonderous,
- once-in-a-lifetime opertunities. For all eternity man has been obbsesed with
- putting his penis in women. Vagina, mouth, butt, if its a hole, we stick it
- in gleefully. So, now your looking at a WHOLE NEW HOLE! While unconventional,
- this is a wonderful oppertunity.
-
- Before even considering entry, one must take a few precautions. We are not
- animals after all. Firstly, clear the entrance of any bone fragments that
- could hurt poor ol' Jimmy. That done, finding a latex condom is advised since
- the whore probably has aids. Now, get to it. Intercourse like its never been
- before! You will find that various organs and mucle formations add and
- decrease from the effect in very interesting ways. If you are fast enough to
- do this while blood is still flowing, it is a very pleasant feeling.
-
- I will discuss other things to try in the future also. However, before
- I go, I will leave you with two other ideas. A nice slit with a knife
- thats a bit tight also offers possiblity. Secondly, you may say, sure its
- good fun, but I am going to get caught! Well, fear not. Murder usually
- gets you caught anyway, and this will present an IDEAL insanity plea,
- even though we know your not!
-
- - DOPE
-
-
-
- ---
-
- #1 WITH A BULLET
-
- This article extracted from the Toronto Star Dec 26, 1992.
-
- BEGIN _|
-
- Montreal inventor touts a new age in ballistics
- -----------------------------------------------
-
- MONTREAL (CP) -
-
- Picture the scene: a police officer finds a spent bullet at the scene
- of killing.
-
- Whose gun fired it?
-
- Ask Michael Barrett.
-
- Barett has come up with a system to automate the identification of
- bullets after their discharge.
-
- Every fired bullet bears markings from the gun that are just as
- distinctive as a single fingerprint.
-
- Barrett's computerized system, which is called Bulletproof, was developed by
- forensic technology division of Walsh Automation Inc, a Montreal firm.
- Barett says it advances ballistics - the science of projectiles and
- firearms - into the next century.
-
- The system carries a $500,000 pricetag, which may explain why there hasn't
- been a rush to buy it, although ballistics experts throughout the world
- have shown interest.
-
- Barrett, of Montreal, said in a recent interview his microscope-data system
- can identify and store data taken from test bullets from every registered
- firearm in Canada.
-
- He says the system can also:
-
- - Trasmit data to any law enforcement agency or crime laboratory
- in the world. That could alert authorities to the possibilty that
- a security killer may be operating, and help track the movements
- of criminals orginizations or terrorists,
-
- - Help law-enforcement agencies solve crimes involving shooting.
-
- - Save forensic examiners thousands of hours of tedious work
- trying to link slugs to specific firearms.
-
- - Cut down the handling of bullets used as court exibits, reducing
- the chance of their damage or loss.
-
- "Its an interesting, but expensive system," said Yves Ste-Marie, head
- of Quebec's police labratory.
-
- Gaylan Warren, a member of Association of Firearms and Toolmark Examiners,
- a global organization, said the system has great potential.
-
- "I've been to Montreal twice to look at the Walsh system and I'm convinced
- that it does what they claim it can do," Warren a firearms examiner,
- said in a telephone interview from his home in Newport, Wash.
-
- "In ballistics you're dealing with cylindrical objects, and at times it takes
- hours of painstaking work at the microscope before you can arrive at the
- verdict."
-
- Barrett's invention advances the microscope by years, Warren said. It has
- a computer operated motor that can stop 50,000 times a revolution.
- The slug can be videotaped and freeze-frames producd.
-
- John W. Matthews, who was the RCMP's cheif scientist for firearms until he
- retired in 1989, agreed with Warren that examining bullets takes a great
- deal of time.
-
- "Four to eight hours isn't uncommon."
-
- Matthews, interviewed by telephone from his home in Ottawa, was excited
- about the possibility that ballistics examiners could compare notes via
- computer link.
-
- Matthews, who said Barrett asked him to critique the system, termed it
- "progressive. And when it gets on ine, (it) should prove a time-saver
- for harried ballistics examiners.""
-
- |~ END
-
-
-
- Well, there's no real advance in technology here.. but the idea is
- good, and it sounds like implementation might be welcomed by the wealthier
- law enforcement agencies. The 8 hours examining a bullet could be the
- escape of a criminal, or worse(in most cases), the death of another
- individual.
-
- On the other hand, aren't we surcomming to the enemy?.. What ever
- happened to anti-big brother ideology? I'll show you my serial number if
- you show me yours...
-
- - DOPE(sourced/typed)
- - TX (commentary )
-
-
-
-
-
- ---
-
- C I S S D 's ANARCHY SERIES: UNDERWATER ANARCHY
-
- Things that make you go BOOM!
-
-
- Water. You can't set it on fire, and it makes a lousy bomb. Most of the time
- it actually Impedes any attempt at being anarchic. However, water contains one
- thing that can open new and unexplored forms of anarchy and physical violence:
-
- The Scuba Diver.
-
- Yes, the Diver. Scuba Divers love to explore new depths and flash their
- high-tech and expensive gear all over the place. Divers are often upper class
- middle aged men, which makes them an ideal target. Rich thrill seakers who
- can flaunt their money, and in great quantitiy . Divers are also many times
- the neuveau-riche, the very polluters of our society. No matter how you look
- at it, Divers are filthy rich and are stinking bastards - the best kind for
- attacks of anarchy.
-
- In response, from the twisted depths of the CISSD's Collective Penii, I
- present to you the Famed Underwater Diver Bomb.
-
- Materials Needed:
-
- 1 Fairly Large Jar or othen type of Sealable Bottle.
- Enough oil to fill half of the bottle
- Enough Potassium to Fill the other Half of the bottle
- Some kind of Trinket, or Toy (Preferable Shiny) to entice the Diver.
-
- Remember, Potassium will burn quickly when exposed to air, and explodes in
- water but not Oil.
-
- What to Do Beforehand:
-
- 1) Take the Oil and fill the jar half way with it.
- 2) Place the Trinket inside, so it is quite Visible to anyone seeing the jar.
- 3) Fill the Other half of the jar with the Potassium and Close the lid as
- Quickly as possible to Prevent YOUR injury.
- 4) Go to your local (or if you're on holliday, the beach) area where divers
- Hang out and dive/explore and plant the bottle Underwater somewhere,
- in a place where it can be seen easily, and attract a Diver's attention.
- 5) WAIT for the Fun and Fireworks.
-
- Just what the hell does this sucker do anyways?:
-
- Whats happening here is Simple, Potassium is a chemical that burns with air
- and EXPLODES when comes in contact with water. The Oil Removes all the Air
- from the jar as so the Potassium will not Burn and waste the Bomb. The
- Shiny object or trinket is there merely to make the diver interested enough
- in the Jar as to Open it.
-
- Because OIL is LIGHTER than WATER, the oil floats away, and the water rushes
- into the jar and hits the Potassium. Now, we all know what happens to the
- Potassium when the ater hits it. By Bye Mr. Scuba Diver. Have PHUN!
-
- - LISTER
-
-
-
-
-
- ---
-
- SOON TO COME
-
-
- Terminator X -=- AC's and DC's
- 1993 Updated list of Area Codes and some usefull
- Direct Connect to out of area operators
-
- Lister -=- JOYS OF THE HATCH
- Report on our findings from our post-christmas
- hatch hunting extraviganza
-
- EUROPEAN SPACE AGENCY REPORT
-
-
- ---
-
- CREDIT CARD FRAUD PREVENTION
-
-
- Taken from the Toronto Star Dec 26, 1992.
-
-
- BEGIN _|
-
- You can't leave store without it
- --------------------------------
-
- Gucci leather it's not. But Totes' vinyl credit card "safe" wins
- hands down when it comes to function over form.
-
- Did that store clerk forget to return your MasterCard? This gadget
- won't let you leave the counter without it.
-
- Totes in Loveland, Ohio, has devised a case that holds seven charge
- cards in plastic pockets with an electronically charged safety band. If you
- close the black vinyl case without returning a card to its pocket, an alarm
- (similar to a phone ringing) activates.
-
- Totes' Credit Card Safe sells for $15, which includes a lithium
- battery that operates the alarm system."
-
- |~ END
-
- I know several locals who steal cards this way and get away with it,
- amazingly enough. I have released this article in attempt to curb
- the habits of these persons and others before they are busted.
- Why anyone would steal a card regardless of preventitive measures is
- beyond me. Especially when its so much easier to write down the info...
-
- - DOPE
-
-
-
-
-
- ---
-
- C I S S D 's ANARCHY SERIES: GUIDE TO FRIED CHOOK
-
- The LIVE Dead Chicken
-
- [ This is a re-published article.. reminding us of CSSD in it's early days
- of amateur hackerdom.. enjoy. - Ed ]
-
- FRONTn'
- ------
-
- Well, I'll have you all know that I do not recomend using any information
- found within this file or archive and cannot be held responsible for
- anything whatsoever since I'm not responsible anyway. Bla Bla blah blah
- blah blah bla.
-
- I also do not recomened reading this file if you are weak of heart, under
- the age of 14, have ever spelt cool "c00L", upset by typos,
- or are exicited by the idea of dressing in the oposite sex's clothing.
-
-
- HISTORY
- -------
-
- Ok, by this point most of you will be wondering WHAT THE FUCK is a LIVE
- dead chicken. Well, let me explain first with the breif history of the
- chicken:
-
- A year or so ago (1990), it occured to me that while people frequently
- spoke of Cat Bombs and the like, nothing new had come out in quite a while
- in this area. And I have a need to be origional. Also, liking my cat, I
- did not like the idea of exploding feliones.
-
- However, I have a DEEP and NUTURED hatred for Chickens, thus, the
- LIVE dead chicken was born! You will find this 'recipe' is also an
- effective weapon - read on to see.
-
-
- THE REAL SHIT
- -------------
-
- There are two versions of the LIVE dead chicken. The first is effective, but
- its much weaker. The second is MUCH more powerfull.
-
- Ok, now, here is what all y'all people FUCKED UP 'nuff to try this (like me)
- will need:
-
- 1 Chicken. It is best that the chicken be alive, or atleast recently dead,
- however, a (un)frozen whole chicken will suffice with lesser results.
-
- Several film canisters and/or any other smallish container.
-
- A generous supply of Red phosphorus and Sodium Chlorate.
-
- Sewing materials and/or Industial stapler
-
- Duck Tape
-
- Knife and other blunt instuments.
-
-
-
- All right. Now that you have run about collecting everything, we start the
- fun.
-
- Assuming you have a live chicken, You will now need to end is filthy
- life. Holding it down and making a lenghtways incision up its belly
- is functional, but not so fun. I recomend beatting it a bit first and
- various other stupid things that come to mind are always fun.
- We ALL know its fun to cut their heads off, but don't. Makes the bomb
- non-functional. Do that with another chicken tomorrow.
-
- Now that the chicken is dead we need to worry about explosives.
- In the weaker recipe (still not too weak), we use a sodium chlorate mixture.
- This particular mix is IMPACT sensitive, so BE CAREFULL OUT THERE!
- Anyway, mix the red phoshorus and sodium chlorate in 1:1 proportions
- and fill whatever containers you have chosen. The containers should then
- sealed and taped with duck tape.
-
- At this poin you MAY want to hurl a container of the explosive at something a
- little way away so you know how well you made the mix, and what you are
- getting into. Play with them and see exactly how hard an impact they need,
- thus, you will not accidently blow you face off.
-
- Now, you will have to make a judgement call. I recomend taking SOME guts out
- to fit more canisters of explosive in. See, the guts cusion impact thus
- making the chances of explosion less likely. I recomand a small amount of
- inards be removed an a rock be added in with the explosives. BUT, I leave
- this to your discretion.
-
- Once you have every conceivable item inside the chicken (you could even leave
- a message in a steel container!) you will want to sew up ALL holes in the chicken.
- Sewing should be done well, ie: stiches less that 3mm apart, for best effect.
- You may noe tape up the chicken a bit. It help the blast, but dont tape
- too much - you want the feathers free!
-
-
- Basically, what you now have is an impact projectile. Drop/throw the sucka
- and you get fireworks!
-
- Now you see the beauty of this 'grenade'. You can FUCK someone up with it
- in is powerfull forms, AND people will LAUGH! Imagine the hummilation
- of dying from a Chicken bomb! Lying dead as the feathers settle around
- corpse! heh, Also, one gets a good chance at a get-away. People tend to
- stand transfixed wondering why a chicken exploded - or why the exposion
- put feathers everywhere, and whether the guts on themself are the chickens
- or from a victim. NO ONE will be paying attention to you most of the time!
-
-
- Even better - terrorism and assassanation. WHO would stop someone with a
- chicken?? You can carry this explosive pretty well anywhere with only a few
- odd looks!
-
- booooooooOOOOOOOOM !
- --------------------
-
- Now I will introduce the 'alternate' LIVE dead chicken ideas.
-
- The following is the LIVE dead chicken but MUCH more powerfull:
-
- Astrolite G is a form of ROCKET FUEL. It has a detonation velocity of
- 8600mps (meters per second) while TNT only packs 6900mps!
- Now, astrolite g is made by:
- mixing 2 parts by weight ammonia nitrate with 1 part anhydrous hydrazine.
- This will make a clear liquid explosive! Note, you can spill this shit
- on the grass - have it rain - come back 4 days later - it'll still blow up.
-
- SO, ya pack a canister or two of this (maybe even a plastic lunch baggie)
- with the rest of the explosive, and your BOOM is MUCH bigger.
-
- I have also receive suggestions for the NAPALM CHICKEN. In this one would
- replace the explosives with a full plastic baggie of Joy and gasoline[Ed:
- or your favorite napalm recepie ], and place several ammonia pellets in the
- chicken. When the bag breaks - there should be much napalm! This sorta
- defeats the purpose of having a chicken with feathers.... but napalm is fun.
- Especially when used in combonation with several unsuspecting police
- officers.
-
- - DOPE
-
-
-
-
-
- ---
-
- BRAIN TO COMPUTER HOOKUP
-
-
- Baltimore Local Paper - Harry - October '91
-
- This paper MYSTERIOUSLY dissapeared after this issue was published.. [Ed:
- Thanks IDIX ]
-
- BEGIN _|
-
- How would you like to recall what you thought as you were being born? A new
- computer, being tested in Cupertino CA, connected to your brain and is able
- to print out your entire memory. Every fact and feeling you have
- experienced thorought your lifetime will be avaliable to you with the push
- of a button.
-
- Hideo Masayama, Japans leading computer designer, unvailed plans for the
- device at this years computer expo in Yolkahama. The only catch is that, in
- order to have this information avaliable to you, you must have a small plug
- installed in your head. Masayama demonstrated the ease with which the
- device is used once the emplant has been installed, by plugging a small
- connector into a recepticle behind his own ear, and punching up the year
- 1948 on his computer. In an instant, his printer was in furious operation,
- spewing out page after page of information, some of which was passed out to
- the media in attendance. The scientist, who was 22 in 1948, talked to the
- assembled press conference while the printout was in progress, and didn't
- show any ill effects from the tap on his brain. The first printout page
- passed out to the media had to do with his first day on the job at a
- construction site where he worked while attending graduate school. The page
- dated April 22, 1948, was in chronological order, according to the time of
- day. "6 am.," it read. "Awake to terror and depression about first day on
- job. Can't get out of bed. Can't get out of bed.
-
- "6:04 am: Get out of bed and walk to the bathroom. Feel sad, because I know
- I am too intelligent for this construction job, but since americans bombed
- us into submission, can't find anything else. Hope to god, country can pull
- out of it, so I can become the scientist I know I can be."
-
- The printout went on to chronicle all the feelings and experiences of the
- day.
-
- "Clearly, this is a breakthrough unlike any other we have ever seen.", said
- Masayama. "I am not going to share with you my birth memories, but I will
- pass among you copies of a womans memories of her own birth. Her identity
- is to remain, however, anonymous."
-
- The womans birth memory printout began with the first light she shaw when
- emerging from the woumb. It read, in part, "Dim light, brighter, brighter.
- BLINDING LIGHT!! DANGER!! DANGER!! MEN!! WOMEN!! HANDS!! Hands holding me.
- CUTTING ME!! DANGER!! DANGER!! THEY HAVE CUT MY CORD!! OH MY GOD!! THEY CUT
- MY CORD!! WAKING ME!! BLOOD!! BLOOD!! FEAR!! FEAR!! PAIN!! PAIN!! TERROR!!
- TERROR!! Wrapping me! Giving me to my mother. Oh, oh to be with my mother,
- my mother."
-
- Dr. Masayama claims that this process will teach people much mor about
- themselves and their minds then they ever knew before. So many mental
- ilnesses, he says, are caused by repressing bad things that happened to us,
- and then having the bad memories come out in other harmful ways. If we
- understand what has happened to us in the past, from birth to the present,
- we have a head start in understanding what makes us tick, and what does
- not. When asked about the operation to emplant the receptacle in the skull
- Masayama described the procedure as simple. "No problem, really. We shave
- an eighth inch of your hair behind the ear, and then drill a tiny hole in
- the head directly to the brain."
-
- The operation takes an hour, and can be done in a doctors office. The only
- problem is that it's difficult to find a doctor experienced enough to do
- the drilling, since the probe goes into the skull several inches deep, and
- connects directly to the brain. "This is a problem at the present, but we
- feel this is going to become so popular it will be as avaliable as ear
- peircing."
-
- Aside from the deep dark secrets locked up in our memories, which this will
- let us in on, the computer brain memory printout has it's practical side.
- "Forgetting simple everyday things will be a thing of the past. Where you
- left your car keys, a forgotten telephone number, an important paper you
- locked away? All of these things can be called up from the computer with
- the push of a button."
-
- Some experts are predicting that printouts of the partners involved will be
- required to be avaliable to all persons getting married. They must be
- required in some business deals, and there is worry that wives might plug
- into husbands brians in order to check up on their sexual activity. The
- future for brain computer memory devices is expected to be unlimited, and
- could spell the end to civilisation as we know it. Think about it.
-
- Dr. Masayama says the device could be on the market in time for valentines
- day.
-
-
- |~ END
-
- - IDIX(sourced/dictated)
- - TX (typed )
-
-
-
- ---
-
- CREDITS
-
-
- Well, to wrap up for this issue, I'd basically like to say Thank You.
- It's been a SHITTY year, but thank you anyways. Y'see, however shitty, it
- has allowed me to be exposed to more cruelty, feel more emotions, taste more
- flavours of life, and be more people than any other year has.
-
- It's time to settle down. Time to understand the cruelty, explore the
- emotions, savour the flavour, and be myself. I finally love myself..
- because however much i search for myself, I haven't the foggiest idea who i
- am.
-
- I know who the rest of these people are though.. [signing off.. TX]
-
-
- LISTER LIST 416 519 705 Link - Overseas/Canada Relations
- Sysop of 'the Revolutionary front'
- +1 416 936 6663 CISSD Canada/HQ
-
- TERMINATOR X TX USA/Canada Relations - Intergroup Relations
- Editor of 'REVIVAL' magazine
- +1 416 886 5745 CISSD WHQ Voice
-
- THE DOPE MAN DOPE Director of +1 416
- Sysop of 'the Downtown Militarized Zone'
- +1 416 450 7087 CISSD WHQ Data
-
- IDIX IDIX US Contact - Director of +1 410
- Concept design and development
-
- -------------------------------------------------------------------------
- THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY (C) 1992/93
- -------------------------------------------------------------------------
-
-