home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 38.3 KB | 1,218 lines |
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Three, File 4 of 27
-
-
- // // /\ // ====
- // // //\\ // ====
- ==== // // \\/ ====
-
- /\ // // \\ // /=== ====
- //\\ // // // // \=\ ====
- // \\/ \\ // // ===/ ====
-
- ******************************************************************************
-
- PHRACK TRIVIA
-
- This is pretty damn hard. In fact, some of it is downright obscure.
- And the bonuses? Forget about it. Answer the questions, expand the
- acronyms, explain the numbers.
-
- The five highest scorers by the next issue (or the first 5 to get
- perfect scores) win COOL STUFF!
-
- Send your answers to phrack@well.sf.ca.us
-
-
- 1) CCIS
-
- 2) Stimpson J. Cat's Roommate is?
-
- 3) Name the cracker.
-
- 4) METAL AE password.
-
- 5) Who invented the TeleTrial?
-
- 6) Name Bloom County's hacker.
-
- 7) What was the Whiz Kids' computer named?
-
- 8) Western Union owned what long distance service?
-
- 9) What computer read both Apple ][ and IBM PC disks?
-
- 10) Who made the "Charlie" board?
-
- 11) How many credits for a CNE?
-
- 12) What was in the trunk of the Chevy Malibu?
-
- 13) Name three bands A. Jourgensen had a hand in.
-
- 14) SYSTEST Password:
-
- 15) What computer makes the best SimStim decks?
-
- 16) What magazine brought the telephone underground to national
- attention in 1971?
-
- 17) What is the significance of 1100 + 1700 hz?
-
- 18) What magazine was raided for publishing black box plans?
-
- 19) What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ?
-
- 20) CLASS
-
- 21) What computer responds "OSL, Please" ?
-
- 22) RACF secures what OS?
-
- 23) The first person to create a glider gun got what?
-
- 24) QRM
-
- 25) PSS
-
- 26) What PSN was acquired by GTE Telenet?
-
- 27) 914-725-4060
-
- 28) April 15, 1943
-
- 29) 8LGM
-
- 30) WOPR
-
- 31) What happened on March 1, 1990?
-
- 32) Port 79
-
- 33) Who starred in the namesake of Neil Gorsuch's UNIX security
- mailing list?
-
- 34) What Dutch scientist did research in RF monitoring?
-
- 35) What was the author of GURPS Cyberpunk better known as?
-
- 36) Who would "Piss on a spark plug if he thought it would do
- any good?"
-
- 37) What thinktank did Nickie Halflinger escape from?
-
- 38) NCSC
-
- 39) Who is Pengo's favorite astronomer?
-
- 40) What language was Mitnik's favorite OS written in?
-
- 41) Abdul Alhazred wrote what?
-
- 42) The answer to it all is?
-
- 43) Who is the father of computer security?
-
- 44) Who wrote VCL?
-
- 45) What kind of computer did Cosmo have?
-
- 46) Hetfield, Ulrich, Hammet, Newstead
-
- 47) What company wrote the computer game "Hacker?"
-
- 48) Who does Tim Foley work for?
-
- 49) Who played Agent Cooper?
-
- 50) Vines runs over what OS?
-
- 51) Mr. Peabody built what?
-
- 52) Who makes SecurID?
-
- 53) What's in a Mexican Flag?
-
- 54) Who created Interzone?
-
- 55) JAMs (as led by John Dillinger)
-
- 56) Abbie Hoffman helped start what phreak magazine?
-
- 57) What was once "Reality Hackers?"
-
- 58) Gates and Allen "wrote" BASIC for what computer?
-
- 59) Tahoe is related to what OS?
-
- 60) CPE 1704 TKS is what?
-
- 61) Telemail's default was what?
-
- 62) "Do Androids Dream of Electric Sheep" became what?
-
- 63) What broadcasts between roughly 40 and 50 mhz?
-
- 64) Who created Tangram, Stratosphere, and Phaedra among others?
-
- 65) What was Flynn's most popular video game?
-
- 66) Who lived in Goose Island, Oregon?
-
- 67) 516-935-2481
-
- 68) What is the security of ComSecMilNavPac?
-
- 69) What has the "spiral death trap?"
-
- 70) Who was the Midnight Skulker?
-
- 71) TMRC
-
- 72) Who wrote "Jawbreaker?"
-
- 73) 213-080-1050
-
- 74) What is the Tetragrammaton represented as?
-
- 75) Who is Francis J. Haynes?
-
- 76) Who ran into one of the Akira test subjects?
-
- 77) What had "Munchies, Fireballs and Yllabian Space Guppies?"
-
- 78) PARC
-
- 79) Alex and his droogs hung out where?
-
- 80) Jane Chandler in DC's "Hacker Files" is based on who?
-
- 81) The Artificial Kid lives on what planet?
-
- 82) 208057040540
-
- 83) What are the two most common processors for cellular phones?
-
- 84) Who came up with the term "ICE?"
-
- 85) What group is hoped might help the "Angels" contact RMS?
-
- 86) Who is Akbar's friend?
-
- 87) What company's games was David Lightman after?
-
- 88) 26.0.0.0
-
- 89) Who was Mr. Slippery forced to locate?
-
- 90) Who is "The Whistler?"
-
- 91) What use would a 6.5536 crystal be?
-
- 92) .--. .... .-. .- -.-. -.-
-
- 93) The Dark Avenger likes what group?
-
- 94) What book spawned the term "worm?"
-
- 95) Michael in "Prime Risk" wanted money for what?
-
- 96) Automan's programmer worked for who?
-
- 97) What signal filled in keystrokes on TOPS-20?
-
- 98) ITS
-
- 99) (a/c)+121
-
- 100) What drug kept the scanners sane?
-
- Bonus 1
- 3 pts Name three bodies of work by Andrew Blake.
-
- Bonus 2
- 3 pts Name three currently available titles with N. L. Kuzma.
-
- Bonus 3
- 4 pts Why would I hate Angel Broadhurst?
-
- *****************************************************************************
-
- IF SECURITY TYPES WERE K-RAD
-
- ----------------------------------------------------------------
-
-
- IRC log started Fri June 18 01:14
- *** Value of LOG set to ON
- <Pat> bye peter
- *** Signoff: hackman (slavin' to da' MAN at TRW)
- <Ed> Dudez, I HATE filling out thez incident Rep0rtz
- <bartman> MUAHAHA Tuff J0b edd1e!
- <Ed> Funni
- *** zen (zen@death.corp.sun.com) has joined channel #CERT
- <Ed> re dan, just missed yer pal peety
- <Pat> Hi Dan!
- <zen> pal? right. ask the wife...
- <venom> re
- <zen> d00dz, we have SO many bugz. sux 2 be me.
- *** venom has left channel #CERT
- *** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
- *** venom has left channel #CERT
- *** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
- *** venom has left channel #CERT
- *** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
- <venom> ARG!
- <bartman> WTF Weitse?
- <venom> s0rri
- <zen> Where is everyone? Anyone seen spaf?
- <Pat> I have. He was going to install something. He should be bak.
- <zen> ah
- *** Action: Ed throws darts at a cracker
- <zen> heh
- <venom> muaha
- *** bartman is now known as Cracker
- *** Action: Cracker hacks Cert with an axe
- <venom> dats a good 1
- *** Action Ed kicks cracker in the nuts
- <Cracker> OUCH!
- *** Signoff: donn (Bad Link?)
- <Cracker> [high voice] fuk u CERT!
- <Ed> heh.
- *** Action: Pat is ROFL
- <Cracker> wonder who's on #hack? Mebbe i should go log em.
- <Ed> Yeah. Oh hey, I got certbot online. Ill send it to go log.
- *** certbot (ed@cert.org) has joined channel #CERT
- *** certbot has left channel #CERT
- <Ed> this will be fun.
- <venom> Hey, letz deop them and take over the channel.
- <zen> thats L A M E
- <Cracker> Ooooh. OPWARZ! I'll go make their channel +i muahaha
- *** Cracker has left channel #CERT
- *** Casper (casper@fwi.uva.nl) has joined channel #CERT
- <Casper> re all
- <Venom> hey dik-head.
- <zen> re
- <Pat> hahahaha hi d00d.
- <Casper> funni whitesey venombreath
- <Ed> lame.
- *** donn (parker@bandit.sri.com) has joined channel #CERT
- <donn> 'sup?
- <Ed> re, oh great bald one
- <donn> eat me
- <zen> bahhahaha
- <Pat> Now now boyz.
- *** spaf (spaf@cs.purdue.edu) has joined channel #CERT
- <Pat> Spaffie!
- <zen> 3l33t SPAF!
- <Ed> re spaf
- <spaf> Yo.
- <venom> spaf...your book sucks.
- <spaf> oh fuck off dutch boy.
- <Casper> HEY!$!@%
- *** spaf has been kicked off channel #CERT by Casper
- <venom> thx dude
- <Ed> oh gawd...feetball
- *** spaf (spaf@cs.purdue.edu) has joined channel #CERT
- <spaf> lame
- *** Mode change "+o -o spaf Casper" on channel #CERT by Pat
- <spaf> thanks sweetie.
- <Casper> op!
- *** Mode change "+o Casper" on channel #CERT by venom
- <Casper> thx d00d
- <Ed> Hey dan, you got those patches online?
- <zen> maybe. What YOU got?
- <donn> WAREZZ
- <Pat> heh
- <Ed> I dunno. Ill dcc you a filelist.
- <zen> kool
- *** zardoz (neil@cpd.com) has joined channel #CERT
- <zardoz> HEY ... anyone want to contribute to my new list?
- <Ed> not me
- <zen> mebbe. Whats this one called? Coredoz?
- <donn> what list?
- <spaf> BAH. Fuck your list man. More crackrs have them than we do!
- <zardoz> who pissed in your coffee gene?
- <donn> heh
- *** zardoz is now known as neil
- <spaf> bah... I'm sick of those dicks using my own holes against me!
- <venom> Your holes? Yer a-hole?
- <Pat> What is your list about this time?
- <neil> same thing. Its called REWT!
- *** neil is now known as REWT
- <REWT> SEND ME YER BUGZ!@#
- *** Action: spaf sends REWT a 50 gig coredump
- <Pat> :)
- <REWT> u r lame.
- *** REWT is now known as neil
- <Ed> I hate these reports. I wish I got to travel more.
- <Pat> come see me!
- <Casper> oooohhhh....netsex!
- <spaf> tramp. :P
- *** bill (whmurray@dockmaster.ncsa.mil) has joined channel #CERT
- <bill> word!
- <Pat> hi bill.
- <donn> Bill! D00d! I am gonna be in Ct. next week!
- <bill> RAD! call me voice at werk. we'll thrash!
- <donn> you know it!
- <zen> oh puh-lease...the geriatric partiers :)
- <donn> farmboy
- <Ed> ***** ***** ***** *****
- <Ed> * * * * *
- <Ed> * *** **** *
- <Ed> * * * * *
- <Ed> ***** ***** * * *
- <Ed>
- <Ed> ***** * * * ***** ***** **
- <Ed> * * * * * * * **
- <Ed> **** * * * *** ***** **
- <Ed> * * * * * * *
- <Ed> * * ***** ***** ***** ***** **
- <Pat> No DUMPING!
- <zen> cert freshens your breath
- <donn> ACK!
- <venom> hee! certs haha
- *** ray (kaplan@bpa.arizona.edu) has joined channel #CERT
- <ray> hey guys!
- <Ed> ugh. Cracker lover alert.
- <donn> commie
- <bill> Hey ray, come to snoop for your little cracker friends?
- <ray> come on, give it a rest guys.
- <Pat> hi ray
- <venom> ?
- *** Action: spaf spits on ray
- <spaf> heh
- *** ray has been kicked off channel #CERT by spaf
- *** Mode change "+b *!*@bpa.arizona.edu" on channel #CERT by spaf
- <neil> hey I wanted to talk to him about my list...
- <spaf> tough shit.
- <donn> heh.
- *** bartman (ddrew@opus.tymnet.com) has joined channel #CERT
- <Pat> re
- <Ed> how goes the takeover?
- <venom> didja kick em?
- <bartman> #hack is +i! muahahaha
- <zen> how exciting. not
- <donn> they deserve it...they are all punks.
- <spaf> hmm..did you get emails? I may want to call their admins.
- <bartman> nope damn.
- <Ed> certbot was there. He got it.
- <spaf> coolness
- *** Signoff: bill (Bad link?)
- <Casper> ne1 going to hactics thing?
- <venom> me
- <Casper> besides you. duh.
- <Ed> dunno.
- <bartman> not me. I have no desire to pay for anything done by hackers
- <Ed> That reminds me. Did anyone subscribe to Phrack?
- <Pat> nope.
- <bartman> oops. HAHAHAHAHAHA
- <Ed> heh.
- <donn> Whats phrak?
- <neil> nope. my list is better. Who wants on it?
- <Pat> me!
- <donn> what list?
- <Pat> OOH! I have mail! bye!
- <bartman> itz an ansi bomb!
- <Ed> bye Pat
- <Spaf> l8r
- <neil> heh.
- *** Signoff: Pat (Hugs to all)
- <Casper> well, i better do something productive 2. cya
- <venom> slatez d00d.
- *** Signoff: Casper (Hi ho hi ho its off to work I go)
- <donn> man its late. I better go. I gotta speech in the morn
- <Ed> you are getting old.
- <donn> am not
- <Ed> are so
- <donn> am not
- <Ed> are too! infinity
- <donn> hasta
- *** Signoff: donn (|/dev/null)
- <Ed> laterz
- <Spaf> geez. what a bunch of lamers.
- (ray/#CERT) UNBAN ME!
- <Spaf> hahaha
- <Ed> never gives up does he?
- <neil> seriously ed, Ive helped you guys out, send me stuff for REWT.
- <Ed> ill think about it
- <spaf> not
- <neil> it will be most savory. I promise. And secure!
- <spaf> pfft...and monkeys might fly out of my butt
- <Ed> Ill think about it.
- <zen> heh, I should do one called Supernova. Exploding suns. hehe
- <Ed> heh
- <spaf> dats tha tr00f!
- <bartman> i like my sun
- <Ed> i know a bunch of crackerz who like bt's suns too.
- <spaf> hahahahahahahahahaha
- <venom> oh shit. Im late.
- *** Signoff: venom (LATE!)
- <Ed> late 4 what?
- <spaf> his vasectomy. har har
- <neil> heh
- *** REVENGE (kaplan@ai.bpb.arizona.edu) has joined channel #CERT
- *** Mode change "+o REVENGE" on channel #CERT by eff.org
- <Ed> whoops
- *** Mode change "+i" on channel #CERT by REVENGE
- <spaf> fuCK! KICK HIM!
- *** spaf has been kicked off channel #CERT by REVENGE
- *** neil has been kicked off channel #CERT by REVENGE
- *** bartman has been kicked off channel #CERT by REVENGE
- *** Ed has been kicked off channel #CERT by REVENGE
- *** zen has been kicked off channel #CERT by REVENGE
- *** REVENGE is now known as ray
- <ray> hehe
-
- ---------------------------------------------------------------------
-
- ****************************************************************************
-
- Phrack Library of Periodicals
-
- 2600
- Subscription Department
- P.O. Box 752
- Middle Island, NY 11953-0752
- $21.00/Year
-
- Animation Magazine
- 5889 Kanan Road, Suite 317
- Agoura Hills, CA 91301
- $21.00/Year
-
- Bank Technology News
- Faulkner & Gray, Inc.
- Eleven Penn Plaza
- New York, NY 10117-0373
- $50.00/Year
-
- Ben Is Dead
- P.O. Box 3166
- Hollywood, CA 90028
- $20.00/Year
-
- Boardwatch Magazine
- 7586 West Jewell Ave., Suite 200
- Lakewood, CO 80232
- $36.00/Year
-
- Boing Boing
- 11288 Ventura Blvd. #818
- Studio City, CA 91604
- $14.00/Year
-
- Communications of the ACM
- 1515 Broadway
- New York, NY 10036
- $30/Year
-
- CQ - The Radio Amateur's Journal
- 76 North Broadway
- Hicksville, NY 11801-9962
- $22.95/Year
-
- Details
- P.O. Box 50246
- Boulder, CO 80321
- 12.00/Year
-
- Dirt
- 230 Park Ave
- New York, NY 10169
- (Supplement to Sassy & Marvel Comics)
-
- Electronics Now
- Subscription Service
- P.O. Box 51866
- Boulder, CO 80321-1866
- $17.97/Year
-
- Farout
- 9171 Wilshire Blvd. Suite 300
- Beverly Hills, CA 90210
- $3.95/Issue
-
- Fate
- 170 Future Way
- P.O. Box 1940
- Marion, OH 43305-1940
- $18.00/Year
-
- Femme Fatales
- P.O. Box 270
- Oak Park, IL 60303
- $18.00/Year
-
- Film Threat
- Subscriptions Department
- P.O. Box 16928
- N. Hollywood, CA 91615-9960
- $11.85/Year
-
- Film Threat Video Guide
- P.O. Box 3170
- Los Angeles, CA 90078-3170
- $12/Year
-
- Fringe Ware Review
- P.O. Box 49921
- Austin, TX 78765
- $12.00/Year
-
- Future Sex
- 1095 Market Street, Suite 809
- San Francisco, CA 94103
- $18.00/Year
-
- Gray Areas
- P.O. Box 808
- Broomall, PA 19008-0808
- $18.00/Year
-
- High Times
- P.O. Box 410
- Mt. Morris, IL 61054
- $29.95/Year
-
- IEEE Spectrum
- 445 Hoes Lane
- P.O. Box 1331
- Piscataway, NJ 08855-1331
- 800-678-IEEE for info
-
- The "I Hate Brenda" Newsletter
- c/o Ben Is Dead
- P.O. Box 3166
- Hollywood, CA 90028
- $2.00
-
- InfoSecurity News
- P.O. Box 3168
- Lowell, MA 01853-3168
- $40.00/Year
-
- International UFO Library Magazine
- 11684 Vewntura Blvd. #708
- Studio City, CA 91604
- $15.00/Year
-
- Magical Blend
- 1461 Valencia St. Dept. GA
- San Francisco, CA 94110
- $14.00/Year
-
- Midnight Engineering
- 1700 Washington Ave.
- Rocky Ford, CO 81067-9900
- $19.95/Year
-
- Mobile Office
- Subscription Department
- 21800 Oxnard St. Suite 250
- Woodland Hills, CA 91367-9644
- $23.90/Year
-
- Mondo 2000
- P.O. Box 10171
- Berkeley, CA 94709
- $24.00/Year
-
- Monitoring Times
- P.O. Box 98
- 140 Dog Branch Road
- Brasstown, NC 28902-0098
- $19.95/Year
-
- New Media
- P.O. Box 1771
- Riverton, NJ 08077-9771
- $48.00/Year
-
- The Nose
- 1095 Market Street, #812
- San Francisco, CA 94103-9654
- $15.00/Year
-
- Nuts & Volts
- 430 Princeland Court
- Corona, CA 91719-9938
- $17.00/Year
-
- Popular Communications
- 76 North Broadway
- Hicksville, NY 11801-9962
- $19.95/Year
-
- Sassy
- P.O. Box 50093
- Boulder, CO 80321-0093
- $9.97/Year
-
- Security Insider Report
- 11511 Pine St. North
- Seminole, FL 34642
- $99.00/Year
-
- SunExpert Magazine
- 1330 Beacon St.
- Brookline, MA 02146-3202
- $60.00/Year
-
- Tech Connect
- 12407 MoPac Expwy. N. #100-374
- Austin, TX 78758-2499
- $12.00/Year
-
- Telephone Engineer & Management
- Advanstar Communications, Inc.
- P.O. Box 6100
- Duluoth, MN 55806-9822
- $24.00/Year
-
- UFO
- 1536 S. Robertson Blvd.
- Los Angeles, CA 90035
- $21.00/Year
-
- Wild Cartoon Kingdom
- 9171 Wilshire Blvd., Suite 300
- Beverly Hills, CA 90210
- $3.95/Issue
-
- Wired
- P.O. Box 191826
- San Francisco, CA 94119-1826
- $20.00/Year
-
- *****************************************************************************
-
- !!!!POST EVERYWHERE!!!!
-
- THE WORLD'S FIRST NOVEL-ON-THE-NET (tm) SHAREWARE!!!
- By Inter.Pact Press
-
- "TERMINAL COMPROMISE"
- by Winn Schwartau
-
- A high tech thriller that comes from today's headlines!
-
- "The Tom Clancy of computer security."
- Assoc. Prof. Dr. Karen Forcht, James Madison University
-
- "Terminal Compromise" is a highly praised novel about the inva-
- sion of the United States by computer terrorists.
-
- Since it was first published in conventional print form, (ISBN:
- 0-962-87000-5) it has sold extremely well world-wide, but then
- again, it never hit the New York Times Bestseller List either.
- But that's OK, not many do.
-
- Recently, someone we know very well came up with a real bright
- idea. They suggested that INTER.PACT Press take the unprece-
- dented, and maybe slightly crazy, step to put "Terminal Compro-
- mise" on the Global Network thus creating a new category for book
- publishers. The idea is to offer "Terminal Compromise," and
- perhaps other titles at NOVEL-ON-THE-NET SHAREWARE(tm) rates to
- millions of people who just don't spend a lot of time in book-
- stores. After discussions with dozens of people - maybe even
- more than a hundred - we decided to do just that. We know that
- we're taking a chance, but we've been convinced by hackers and
- phreakers and corporate types and government representatives that
- putting "Terminal Compromise" on the net would be a fabulous step
- forward into the Electronic Age, (Cyberspace if you will) and
- would encourage other publishers to take advantage of electronic
- distribution. (It's still in the bookstores, though.)
-
- To the best of our knowledge, no semi-sorta-kinda-legitimate
- -publisher has ever put a complete pre-published 562 page book on
- the network as a form of Shareware. So, I guess we're making
- news as well as providing a service to the world's electronic
- community. The recommended NOVEL-ON-THE-NET SHAREWARE fees are
- outlined later (this is how we stay in business), so please read
- on.
-
- WE KEEP THE COPYRIGHTS!
-
- "Terminal Compromise" is NOT being entered into the public
- domain. It is being distributed electronically so hundreds
- of thousands more people can enjoy it and understand just where
- we are heading with our omnipresent interconnectedness and the
- potential dangers we face. INTER.PACT Press maintains all copy-
- rights to "Terminal Compromise" and does not, either intentionally
- or otherwise, explicitly or implicitly, waive any rights to
- this piece of work or recourses deemed appropriate. (Damned
- lawyers.)
-
- (C) 1991, 1992, 1993, Inter.Pact Press
-
-
-
- TERMINAL COMPROMISE - THE REVIEWS
-
- " . . . a must read . . ."
- Digital News
-
- "Schwartau knows about networks and security and creates an
- interesting plot that will keep readers turning the pages."
- Computer World
-
- "Terminal Compromise is fast-paced and gripping. Schwartau
- explains complex technology facilely and without condescension."
- Government Computer News
-
- "An incredibly fascinating tale of international intrigue . . .
- action . . . characterization . . . deserves attention . . .
- difficult to imagine a more comprehensive resource."
- PC Laptop
-
- "Schwartau . . . has a definite flair for intrigue and plot
- twists. (He) makes it clear that the most important assets at
- risk are America's right to privacy and our democratic ideals."
- Personal Identification News
-
- "I am all too familiar with the appalling realities in Mr.
- Schwartau's book. (A) potentially catastrophic situation."
- Chris Goggans, Ex-Legion of Doom Member.
-
- " . . . chilling scenarios . . . ", "For light summer reading
- with weighty implications . . . ", " . . . thought provoking,
- sometimes chilling . . . "
-
- Remember, it's only fiction. Or is it?
-
-
-
- TERMINAL COMPROMISE: SYNOPSIS
-
- "It's all about the information . . . the information."
- From "Sneakers"
-
- Taki Homosoto, silver haired Chairman of Japan's huge OSO Indus-
- tries, survived Hiroshima; his family didn't. Homosoto promises
- revenge against the United States before he dies. His passion-
- ate, almost obsessive hatred of everything American finally comes
- to a head when he acts upon his desires.
-
- With unlimited resources, he comes up with the ultimate way to
- strike back at the enemy. Miles Foster, a brilliant 33 year old
- mathematician apparently isn't exactly fond of America either.
- The National Security Agency wanted his skills, but his back-
- ground and "family" connections kept him from advancing within the
- intelligence community. His insatiable - borderline psychotic-
- sex drive balances the intensity of waging war against his own
- country to the highest bidder.
-
- Scott Mason, made his fortune selling high tech toys to the
- Pentagon. Now as a New York City Times reporter, Mason under-
- stands both the good and the evil of technology and discovers
- pieces of the terrible plot which is designed to destroy the
- economy of the United States.
-
- Tyrone Duncan, a physically huge 50-ish black senior FBI agent
- who suffered through the Hoover Age indignities, befriends Scott
- Mason. Tyrone provides the inside government track and confusion
- from competing agencies to deal with the threats. His altruistic
- and somewhat pure innate view of the world finally makes him do
- the right thing.
-
- As Homosoto's plan evolves, Arab zealots, German intelligence
- agents and a host of technical mercenaries find the weaknesses in
- our techno-economic infrastructure. Victims find themselves
- under attack by unseen adversaries; Wall Street suffers debili-
- tating blows; Ford and Chrysler endure massive shut downs. The
- U.S. economy suffers a series of crushing blows.
-
- From the White House to the Pentagon to the CIA to the National
- Security Agency and FBI, a complex weaving of fascinating politi-
- cal characters find themselves enmeshed a battle of the New World
- Order. Sex, drugs, rock'n'roll: Tokyo, Vienna, Paris, Iraq,
- Iran. It's all here.
-
- Enjoy reading "Terminal Compromise."
-
-
-
- SHAREWARE - NOVEL FEES:
-
- We hope that you enjoy "Terminal Compromise" as much as everyone
- else has, and that you will send us a few shekels according to
- the following guidelines.
-
- The NOVEL-ON-THE-NET SHAREWARE(tm) fees for us as a publishing
- company are no different than the fees for software application
- shareware publishers, and the intent is the same. So please, let
- us continue this form of publishing in the future.
-
-
- NOVEL-ON-THE-NET SHAREWARE Fees For The People:
-
- The suggested donation for individuals is $7. If you hate Termi-
- nal Compromise after reading it, then only send $6.50. If you're
- really, really broke, then tell a hundred other people how great
- it was, send us a rave review and post it where you think others
- will enjoy reading it, too. If you're only a little broke, send
- a few dollars. After all, this is how we stay in business. With
- each registration, we will also send a FREE! issue of "Security
- Insider Report," a monthly security newsletter also published by
- Inter.Pact Press.
-
-
- NOVEL-ON-THE-NET SHAREWARE Fees For Businesses:
-
- We hope that you put "Terminal Compromise" on your internal
- networks so that your employees will have the chance to enjoy it
- as well. It's a great way to increase security awareness amongst
- this country's 50,000,000 rank and file computer users. Plus,
- it's a hell of a good read.
-
- One company plans on releasing a chapter every few days
- throughout its E-Mail system as a combination of security aware-
- ness and employee 'perc'. Try it; it works and your employees
- will appreciate it. Why? Because they'll all talk about it -
- bringing security awareness to the forefront of discussion.
-
- FEES
-
- Distribution for up to 100 people on a single network: $ 500
- (Includes 1 Year subscription to "Security Insider Report.")
-
- Distribution for up to 1000 people on a single network: $ 3000
- (Includes 10 1 Year subscriptions to "Security Insider
- Report.")
-
- Distribution for up to 2500 people on a single network: $ 6250
- (Includes 1 Year electronic Corporate site license to
- "Security Insider Report.")
-
- Distribution for up to 5000 people on a single network: $ 10000
- (Includes 1 Year electronic Corporate site license to
- "Security Insider Report.")
-
- Distribution for up to 10000 people on a single network: $ 15000
- (Includes 1 Year electronic Corporate site license to
- "Security Insider Report.")
-
- Distribution for up to 25000 people on a single network: $ 25000
- (Includes 1 Year electronic Corporate site license to
- "Security Insider Report.")
-
- Distribution for more than that - Please call and we'll figure it
- out. Would you like us to coordinate a special distribution
- program for you? Would you like in Postscript or other visual
- formats? Give us a call and we'll see what we can do.
-
- * * * * * * * * * *
- Please DO NOT UPLOAD AND DISTRIBUTE "Terminal Compromise"
- into your networks unless you intend on paying the recom-
- mended fees.
-
- * * * * * * * * * *
-
-
- NOVEL-ON-THE-NET SHAREWARE Fees for Universities: FREE!
-
- "Terminal Compromise" has been used by many schools and universi-
- ties as a teaching supplement. Recognized Educational institu-
- tions are entitled to use "Terminal Compromise" at NO COST, as
- long as you register with us that you are doing so. Please pro-
- vide: School name, address, etc., the course, the instructor, and
- the reason for using it. Also, we'd like to hear from you and
- tell us how it went. Thanks.
-
-
- SHAREWARE-NOVEL Fees for Local, State and Federal Governments.
-
- You have the money. :-) Please send some back by following
- the same fee guidelines as those for businesses.
-
- Government employees: You are The People - same fees are
- appreciated.
-
- * * * * * * * * * *
-
- Agencies: Do not upload and distribute "Terminal Compromise"
- unless you plan on paying the fees.
-
- * * * * * * * * * * *
-
-
- NOVEL-ON-THE-NET SHAREWARE Fees for the International Community
- Make payments in $US, please.
-
- GETTING TERMINAL COMPROMISE:
-
- You can get your copy of Terminal Compromise from a lot of
- sites; if you don't see it, just ask around. Currently the novel is
- archived at the following sites:
-
- ftp.netsys.com
- /pub/novel
-
- wuarchive.wustl.edu
- /doc/misc
-
- soda.berkeley.edu
- /pub/novel
-
- It consists of either 2 or 5 files, depending upon how you re-
- ceive it. (Details at end of this file.)
-
- Feel free to post all five files of "Terminal Compromise" any-
- where on the net or on public or private BBS's as long as this
- file accompanies it as well.
-
-
- Please forward all NOVEL-ON-THE-NET SHAREWARE fees to:
-
- INTER.PACT PRESS
- 11511 Pine St. N.
- Seminole, FL., 34642
-
- Communications:
-
- Phn: 813-393-6600
- Fax: 813-393-6361
- E-Mail: p00506@psi.com
- wschwartau@mcimail.com
-
- We will accept checks, money orders, and cash if you must, and we
- mean if you must. It's not the smartest thing in the world to
- send cash through the mail. We are NOT equipped at this point
- for credit cards.
-
- Remember, "Terminal Compromise is copyrighted, and we will vigor-
- ously pursue violations of that copyright. (Lawyers made us say
- it again.)
-
- If you ABSOLUTELY LOVE "Terminal Compromise," or find that after
- 50 pages of On-Screen reading, you may want a hard copy for your
- bookshelf. It is available from bookstores nationwide for
- $19.95, or from Inter.Pact directly for $19.95 + $3.50 shipping
- and handling. If you first paid the $ 7 NOVEL-ON-THE-NET SHARE-
- WARE fee, send in proof and we'll deduct $ 7 from the price of
- the hard copy edition.
-
- ISBN: 0-962-87000-5
-
- Enjoy "Terminal Compromise" and help us make it an easy decision
- to put more books on the Global Network.
-
- Thank you in advance for your attention and your consideration.
-
-
-
- The Publishers,
- INTER.PACT Press
-
-
-
- READING "TERMINAL COMPROMISE"
-
- "Terminal Compromise" will come to you in one of two ways:
-
- 1) Original Distribution Format From Inter.Pact Press contains
- only two -2- files.
-
- TC_READ.ME 13,927 Bytes
-
- That is this file you are now reading and gives an overview of
- "Terminal Compromise" and how NOVEL-ON-THE-NET Shareware works.
-
- TERMCOMP.ZIP 605,821 Bytes
-
- This is the total content of "Terminal Compromise". Run PKUNZIP
- to expand the file into four -4- readable ASCII files.
-
- 2) Some locations may choose to post "Terminal Compromise" in
- readable ASCII form. There will then be four files in addition
- to the TC_READ.ME file.
-
- TERMCOMP.1 250,213 Bytes
-
- contains the Introduction and Chapters 1 through 5.
-
- TERMCOMP.2 337,257 Bytes
-
- contains Chapters 6 through 14.
-
- TERMCOMP.3 363,615 Bytes
-
- contains Chapters 15 through 21.
-
- TERMCOMP.4 388,515 Bytes
-
- contains Chapters 22 through 30 and the Epilogue.
-
-
- Enjoy "Terminal Compromise!" and pass it on to whomever you
- think would enjoy it, too!
-
- Thank You!
-
- ****************************************************************************
-
- THE STATE OF SECURITY IN CYBERSPACE
-
- SRI International conducted a worldwide study in 1992 of a broad range of
- security issues in "cyberspace." In brief, cyberspace is the full set of
- public and private communications networks in the United States and elsewhere,
- including telephone or public switched telephone networks (PSTNs), packet data
- networks (PDNs) of various kinds, pure computer networks, including the
- Internet, and wireless communications systems, such as the cellular telephone
- system. We did not address security vulnerabilities associated with
- classified, secure communications networks used by and for governments.
-
- The study was conducted as part of our ongoing research into the
- vulnerabilities of various software components of cyberspace. Our approach was
- to conduct research through field interviews with a broad range of experts,
- including people we characterize as "good hackers," about security issues and
- vulnerabilities of cyberspace and the activities of the international
- "malicious hacker" community.
-
- While the specific results of the study are proprietary to SRI, this brief
- report summarizes our general conclusions for the many individuals who kindly
- participated in our field interviews. As we indicated during our field
- interviews, the original research for this project was not part of any other
- kind of investigation, and we have not revealed the identify of any of our
- respondents.
-
- The study aimed to understand "malicious hackers," that is, people who have and
- use the technical knowledge, capability, and motivation to gain unauthorized
- access, for various reasons, to systems in cyberspace. It is important to
- understand that by no means all hackers are malicious nor does most hacking
- involve unauthorized access to cyberspace systems; indeed, only a small
- fraction of computer hacking involves such activities but gives hacking an
- otherwise undeserved bad reputation. While we attempted to focus on technical
- (software) vulnerabilities, our interviews led us to look more at the broader
- motivations and different approaches to cracking into various networks and
- networked systems.
-
- MAIN CONCLUSIONS
-
- Our main conclusion is that social, organizational, and technological factors
- still combine in ways that make much of cyberspace relatively vulnerable to
- unauthorized access. The degree of vulnerability varies from one type of
- communications system to another. In general, the PSTN is the least vulnerable
- system, the PDNs are somewhat more vulnerable than the PSTN, the Internet is
- relatively insecure, and as is widely known, the cellular phone system is the
- most vulnerable of the four major areas we addressed.
-
- The main vulnerabilities in most communications networks involves procedural,
- administrative, and human weaknesses, rather than purely technical
- vulnerabilities of network management, control systems, and hardware, and
- software. There are technical vulnerabilities--poor system design and specific
- security flaws in software--but they are mainly exploitable because of the
- above problems.
-
- Highlights of the study's conclusions include:
-
- o Malicious attacks on most networks and networked systems cannot be completely
- prevented, now or in the future. More than enough information is publicly
- available to hackers and other technically-literate people to preclude attempts
- at prevention of intrusions.
-
- o It is possible individuals or groups could bring down individual systems or
- related groups of systems, on purpose or by accident. However, security is
- generally improving as a result of dealing with past threats and challenges to
- system security. For instance, responses to the most recent serious threat to
- the Internet, the so-called Internet Worm in 1989, included improved security
- at sites vulnerable to this sort of worm.
-
- o We found no evidence that the current generation of U.S. hackers is
- attempting to sabotage entire networks. On the contrary, doing so is
- inconsistent with the stated ethics and values of the hacker community, which
- are to explore cyberspace as a purely intellectual exercise without malicious
- intent or behavior. Some individuals who operate outside this informal ethical
- framework, however, can and do damage specific systems and occasionally use
- systems for personal gain or vindictive activities.
-
- o There is some evidence that the newest generations of hackers, may be more
- motivated by personal gain than the traditional ethic of sheer curiosity. This
- development could mean that networks and networked systems could become more
- likely targets for attacks by hardened criminals or governments' intelligence
- services or their contractors (i.e., employing malicious hackers). This threat
- does not appear to be significant today but is a possible future scenario.
-
- o The four major areas of vulnerability uncovered in our research have little
- or nothing to do with specific software vulnerabilities per se. They relate
- more to the ways in which hackers can gain critical information they need in
- order to exploit vulnerabilities that exist because of poor systems
- administration and maintenance, unpatched "holes" in networks and systems, and
- so on.
- - The susceptibility of employees of businesses, public organizations, schools,
- and other institutions to "social engineering" techniques
- - Lax physical and procedural controls
- - The widespread availability of non-proprietary and of sensitive and
- proprietary information on paper about networks and computer systems
- - The existence of "moles," employees of communications and computer firms and
- their suppliers who knowingly provide proprietary information to hackers.
-
- o The vulnerabilities caused by shortcomings in software-based access controls
- and in hardware-related issues constitute significantly lower levels of risk
- than do the four areas discussed above on more secure networks such as the PSTN
- and PDNs. However, on the Internet and similar systems, software-based access
- controls (for instance, password systems) constitute significant problems
- because of often poor system maintenance and other procedural flaws.
-
- RECOMMENDATIONS
-
- Based on our research, we recommend the following:
-
- 1. Protection of organizational information and communications assets should be
- improved. Issues here range from those involving overall security systems to
- training employees and customers about maintenance of security on individual
- systems, handling and disposition of sensitive printed information, and dealing
- with "social engineering."
-
- 2. Techniques used to protect physical assets should be improved. For example,
- doors and gates should be locked properly and sensitive documents and equipment
- guarded appropriately.
-
- 3. Organizations and their employees should be made aware of the existence and
- role of moles in facilitating and enabling hacker intrusions, and care taken in
- hiring and motivating employees with the mole problem in mind.
-
- 4. Software- and hardware-based vulnerabilities should also be addressed as a
- matter of course in systems design, installation and maintenance.
-
- 5. Organizations concerned with information and communications security should
- proactively promote educational programs for students and parents about
- appropriate computer and communications use, personal integrity and ethics, and
- legitimate career opportunities in the information industry, and reward
- exemplary skills, proficiency and achievements in programming and ethical
- hacking.
-
- 6. Laws against malicious hacking should be fairly and justly enforced.
-
- SRI's believes that the results of this study will provide useful information
- to both the operators and users of cyberspace, including the hacker community.
- We are planning to continue our research in this area during 1993 within the
- same framework and conditions (i.e., anonymity of all parties and
- organizations) as we conducted the 1992 research. We invite hackers and others
- who are interested in participating in this work through face-to-face,
- telephone or email interviews should contact one of the following members of
- the SRI project team:
-
- A. J. Bate
- SRI International
- Phone: 415 859 2206
- Fax: 415 859 3154
- Email: aj_bate@qm.sri.com,
- aj@sri.com
-
- Stuart Hauser
- SRI International
- Phone: 415 859 5755
- Fax: 415 859 3154
- Email: stuart_hauser@qm.sri.com
-
- Tom Mandel
- SRI International
- Phone: 415 859 2365
- FAX: 415 859 7544
- Email: mandel@unix.sri.com
-
- *****************************************************************************
-