####################################### # # # # # ======== =\ = ====== # # == = \ = = # # == = \ = ====== # # == = \ = = # # == = \= ====== # # # # # # # # ''''''''''''''''''''' # # # # # # > Written by Dr. Hugo P. Tolmes < # # # # # ####################################### Issue Number: 10 Release Date: November 19, 1987 Most of this issue will detail with the events concerning the bust of Shadow Hawk. First there will be an article that describes the bust. Here it is: $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Youth is a Suspect in Theft of Software FROM: The Chicago Tribune DATE: September 17, 1987 A 17-year-old North Side youth is under investigation by the U.S. Secret Service and the U.S. attourney's office for allegedly breaking into AT&T computers across the nation and stealing sophisticated software valued in the thousands of dollars. The youth is also suspected of advertising AT&T's security devices over a network in Texas that is used as a "bulletin board" by computer enthusiasts. The sole purpose of the computer network in Texas, known as "Phreak Class-2600" is "to educate computer enthusiasts ... to penetrate industrial and government sector computer systems," according to a sworn affidavit filed in U.S. District Court by Assistant U.S. Atty. William J. Cook. On Sept. 4, Secret Service agents carrying a search warrant raided the home of the youth, identified as Herbert D. Zinn Jr., of 6211 N. Artersian Ave. The agents confiscated computers and the software that was stolen during the break-ins, according to a U.S. Atty. Anton R. Valukas. A sworn affidavit filed in U.S. District Court by Secret Service Agent Patrick Convery said the the youth, using the code-name "Shadow Hawk" is suspected of breaking into an AT&T computer at NATO Maintenance and Supply Headquarters in Burlington, N.C. and an AT&T computer at Robins Air Force Base, Georgia, during the last five months. In addition, he also broke into AT&T computers at Bell Labs in Naperville and New Jersey, according to the affidavit. Among the software stolen during the break-ins was an artificial intelligence program that is not yet on the market, the affidavit said. A single copy of the software is valued at $5,000, but AT&T told the Secret Service that the program has an estimated market value of $1 million. An analysis of long distance calls made from Zinn's telephone disclosed that attempts also were made to gain access to computers at the accounts payable department of the Washington Post newspaper, a hostpital in South Bend, Ind.; and computers in Colombus, Ohio; Rye, N.Y., and Pipe Creek, Tex., according to the government. Zinn's father, Herbert D. Zinn Sr., declined to comment. However, the affidavit said, the elder Zinn had recently retired from an auto radio installationfederal investigators that Zinn's son was "a bright boy" whose father had bragged at work that his son's interest in computers "had just taken off." "We consider this to be very serious," Valukas said. "We have said from the beginning that we would take an aggressive stance in this area. We are currently reviewing the matter and no charges have been filed." A 17-year-old is considered a juvenile under federal law. Valudas characterized the software taken from NATO and the Air Force base as "low level in terms of sensitivity." Kathyryn Clark, a spokesman for AT&T, said "I'm aware of it. Our security systems alert us when there is this type of break. It's in the hands of the U.S. attorney." Last June 6, Henry Kluepfel, an AT&T corporate security official tuned into the Phreak Class-2600 and spotted messages from Shadow Hawk, the affidavit said. Shadow Hawk braged in the messages that he had successfully gained access to AT&T computer files and said he was interested in creating some "Trojan horses" in the AT&T network. A Trojan horse, in computer lingo, is an unauthorized computer program placed into a computer. Later that month, another AT&T corporate security official spotted a statement made by Shadow Hawk on another computer bulletin board in Chicago. In that message, Shadow Hawk provided the names, telephone numbers, passwords and other critical information needed to gain access to seven different AT&T computers, according to the affidavit. On July 7, a computer break-in at the Bell Labs computer in Naperville was discovered and a record of the intruder's telephone number was spotted on the compromised computer, the affidavit said. Illinois Bell then began using a device known as a dial number recorder to log all calls made from the telephone number, the affidavit said. From July 17 through July 19, the Zinn computer gained access to the NATO computer by using and unauthorized passowrd, according to the government. The Zinn computer transferred software packages valued at $21,000 from the NATO computer, the affidavit said. On July 23, the AT&T software program with an estimated $1 million market value vanished from the Bell Labs computer in New Jersey. And, on July 27, $3,000 worth of software was taken from Bell Labs. On July 31, the Zinn computer, according to the affidavit, entered an AT&T computer that was holding a software program used by the regional Bell System companies to record telephone service requirements for customers. That program, "if manipulated can give free telephone service and it can be used to disrupt or halt telephone communications," the affidavit said. On Aug. 1 and Aug. 3, 16 entries into the Naperville computer were made and $40,000 worth of software used to support AT&T's electronic switching system was stolen, according to the government. On Aug. 28, the Zinn computer broke into the AT&T computer at Robins Air Force Base and stole software that was used to back up a switching system used by the Department of Defense, the affidavit said. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: It seems that Shadow Hawk was severely busted for hacking. If he does not go back into the hacking world, he should be remembered as one of the better hackers (much better than most hackers). Shadow Hawk made several scans of local exchanges and was known to have broken into many computers. He was very good with the Unix operating system and definitely knew what he was doing. As I said before, he should be remembered as one of the better hackers of the hack/phreak world. Now I will go into the article in detail with some explanations on different things mentioned. ====================================== "The sole purpose of the computer network in Texas, known as 'Phreak Class-2600' is 'to educate computer enthusiasts ... to penetrate industrial and government sector computer systems.'"- The bbs described as "Phreak Class-2600" is actually "Phreak Klass Room 2600." The current number to this bulletin board is (806) 799-0016. The board isn't the greatest but it does have some very knowledgable people on it. As described in the article, Phreak Klass is meant to educate people to phreaking and hacking. If you would like to learn more about phreaking and hacking, then please call. The current login is: EDUCATE. The board is public and does not print codes or passwords to systems. The board is up for educational purposes and codes or passwords are not tolerated. ====================================== "Henry Kluepfel, an AT&T corporate security official, tuned into the Phreak Class-2600 and spotted messages from Shadow Hawk"- This would indicate that there is currently an AT&T security official on Phreak Klass. It is also likely that this security official, named Henry Kluepfel, is on other bulletin boards related to the topics of phreaking and hacking. Although this security official was/is monitoring messages on Phreak Klass, it is unknown whether or not he had anything to do with the bust of Shadow Hawk. He might still be there and it is not known by which handle he goes by. Although many names are definitely not the informant, it should be assumed that one of the users on this list is Henry Kluepfel (PK Userlist): 1. D,DR. 2. EWING,JR - 3. !,DOC PHUN 4. !,FUSION 5. !,KARATE KID 6. !,ZACK 7. (TUFF),TRACKER 8. -----,OMEGA 9. ., EVADER 10. .,BAUHAUS 11. .,EASTWIND 12. .,EVADER 13. .,LOKI 14. .,MERLIN 15. .,OBERHIEMAN 16. .,RYCHE 17. .,SABRO 18. .,THE SHUFFLER 19. .,WOLFMAN 20. ...,PENDRAGON 21. 0PERATOR,THE 22. 1,VANDAL 23. 666,LUCIFER 24. ADAM,MIKE 25. ADEPT,BLUE 26. ADEPT,MAGNUS 27. ADVENGER,DEMON 28. AGENT,ADEPT 29. ALAND,PATRICK 30. ANARCHIST,ARMCHAIR 31. ANDREX,THE 32. ANGEL,DEATH 33. ANONYMOUS,RODNEY 34. ASHAD,ABDUL 35. ASSAULT,SILENT 36. ASSOCIATES,BREW 37. ATLANTIC,BILL 38. ATTACK!,OPERATIO AVOCADO,THE FLYING 40. AXIS,AGENT 41. BACARDI,DR 42. BAND,REZ 43. BANDIT,THE 44. BANDIT,TIME- 45. BARD,THE 46. BARON,RED 47. BARON,THE BAUD 48. BEEBLEBROX,ZAPHOD 49. BELLCON,MR 50. BERSITUS,BEN 51. BLACK,MR. 52. BLASTER,BYTE 53. BLIP,MR 54. BOBO,BOBO 55. BOUDREAUX,SMASHER 56. BREAKER,CIRCUIT 57. BREAKER,CODE 58. BREAKER,THE 59. BRIGGS,SIR 60. BROWN,DAVE 61. BUDMAN,THE 62. BULT,BUCKWEAT 63. BUM,DIGITAL 64. C,CTRL 65. CHANGE,RECENT 66. CHARLIE,COSMIC 67. CHEMIST,RENEGADE 68. CHEUNG,SLYDE 69. CHICKEN,THUNDER 70. CHOUINARD,JAY 71. CITIZEN,CONCERNED 72. COIL,VERTICAL 73. COLONEL,THE 74. CONNECT,CROSS 75. COOL J,LL 76. COOL,FIRECRACKER 77. COUNT,THE 78. CRACKER,THE 79. CRACKER,THE UNKNOWN 80. CREAPER,DARK 81. CRIMINAL,CORPORATE 82. CULPRIT,CARRIER 83. D MEN TOR,THE 84. DARKONE,THE 85. DEATH,COMMANDER 86. DEATH,CREEPING 87. DEATH,CRIMSON 88. DEATH,DRUIDIC 89. DECEIVER,THE 90. DELETE THIS.,THE DRUID 91. DEMON,DISK 92. DEMON,THE GUARDIAN 93. DENT,ARTHUR 94. DEVIL,ARCH 95. DIAMOND, KING 96. DOG,THE JUNKYARD 97. DRAKE,SIR FRANCIS 98. DROW,THE 99. DUDE,THE 100. DUKE,THE 101. DUTCHMAN,THE 102. EDGE,THE 103. ELIMINATOR,THE 104. ELITE,PURE 105. EQUALIZER,THE 106. ERICKSON,S.K. 107. EVANS,MARK 108. EXECUTIONER,THE 109. EXORCIST,THE 110. EXTERMINATOR,THE 111. FACTOR,DOMINANT 112. FALCON,GREY 113. FALCON,THE 114. FINGERS,FINEOUS 115. FLASH,GRANDMASTER 116. FLINT,CAPTAIN 117. FLOYD,PHREAKY 118. FLYER,MIDNIGHT 119. FOG,SINISTER 120. FOREHEAD,PORCELAIN 121. FOUL,LORD 122. FREAKER,PHILLIPPINO 123. FREEZE,THE 124. FRESH,DOUG 125. FUGATIVE,THE 126. FUGITIVE,THE 127. FUGITIVE-,-THE 128. GAMELORD,SIR 129. GHOST,GREY 130. GIBE,FRANKEN 131. GRAHAM,MICHAEL 132. GREEL,MAGNUS 133. GREEN,TYRONE 134. GREYHOUND,GRANTIN 135. GRIFFIN, THE 136. GRIFFIN,THE 137. GUARDIAN,THE 138. HACK,MULTI 139. HACK,TRASH 140. HALEN,VAN 141. HARRY,DIRTY 142. HATTER,MAD 143. HAVOC,MAJ. 144. HAWK,NIGHT 145. HAWK<_),(_>SHADOW 146. HEADROOM,MAX 147. HEART,PURPLE 148. HEARTS,JACK OF 149. HELIX,DOUBLE 150. HIEROPHANT,THE ARCANE 151. HOFFMAN,GREG 152. HOLMES,SHERLOCK 153. HORSE,CRAZY 154. I AM,SAM 155. ICOM,MR. 156. IDAP,IOWD 157. IDLE,BILLY 158. III,EPSILON 159. INSIDER,THE 160. INSTRUCTOR,THE 161. JACK,CRACKA 162. JAGGERS,BOB 163. JAMES,JESSE 164. JAY,EVIL 165. JENI,JINN 166. JOE,G.I. 167. JOHN,CRACKER 168. JOHNSON,FRED 169. KAY,DR. 170. KEY,DEGARMO & 171. KHAN,KERRANGHT,BLACK 173. KNIGHT,THE CELESTIAL 174. KNIGHT,WHITE 175. KODIAK <-,-> 176. KOMMISAR,DER 177. KOUSIDIS,IVAN 178. KRACKER,THE 179. LAMBO,PIRATESOFT 180. LAWLESS,LORD 181. LEFTIST,THE 182. LEMIEUX,MARIO 183. LESTAT,VAMPIRE 184. LIGHT,BUD 185. LIGHTNING, KNIGHT 186. LOGIC,DIGITAL 187. LOOP,DEAD 188. LORD,SHADOW 189. LOVER,THE EGYPTIAN 190. LUCAS, THE 0PERATOR 191. LUTHOR,LEX 192. M.D.,DR. CRAZY 193. MAC,SIR 194. MACK,T- 195. MAD,MR 196. MAGICIAN,ZORLOFF 197. MAIDEN,IRON 198. MAN,HAC 199. MAN,TERMINAL 200. MAN,THE PHONE 201. MANIPULATOR,CODE 202. MARAUDER,THE 203. MARTYR,THE 204. MASTER, HATCHET 205. MASTER,CODES 206. MASTER,DELTA- 207. MASTER,STAR 208. MAX,MAD 209. MECHANIC,CHIEF 210. MENTOR,THE 211. MIDNITE,CAPTAIN 212. MINDED,ABSENT 213. MIRANDA,QUINTON J. 214. MONGREL,SPLIFF 215. MONK,CHIP 216. MUAD'DIB,PAUL 217. MURDERER,AX 218. MYRIAD,LORD 219. NELSON,_-STYLE-_ 220. NICE,MR. 221. NOTCH,TOP 222. NUDITY,FRONTAL 223. OF IMRRYR,ELRIC 224. OF REALITY,MASTER 225. OIL,EWING 226. OMEN,THE 227. ONE,HANDSOMEST 228. ONE,KATO 229. OPPOSITION,PSYCHOTIC 230. ORACLE,THE 231. OUTRIDER,THE 232. OUTWORLD,FLINT OF 233. OVERLORD,THE 234. PANDEMONIUM,WASTED 235. PECHACEK,JOHN 236. PENGUIN,THE 237. PETRA, ACE 238. PEZ,MR. 239. PHLASH,JUMPIN' JACK 240. PHONESUCKER,THE 241. PHREAK,NYNEX 242. PHREAK-A-ZOID,THE 243. PHREAKER,PHANTOM 244. PHREAKO,PHREAKO 245. PIRATEER,BADGER 246. POLTERGEIST,ASTABULA 247. POPE,THE 248. PREFICT,FORD 249. PRODIGAL,THE 250. PROPHET,DOOM 251. PROPHET,THE 252. PSYCHEDELIC,THE 253. QUEST,ORYAN 254. QUITO,DON 255. RADIX,OTHO 256. RAVEN,STAR 257. RANGER,THE 258. RAT,SWAMP 259. REAPER,CHROMATIC 260. REQUEST,INTERRUPT 261. RIDER,GHOST 262. RIDER,MIDNIGHT 263. ROLLOVR,DETH 264. ROTTEN,JOHNNY 265. RUNNER,BLADE 266. RUNNER,SHADOW 267. RUSSO,FRANK 268. SALERNO,MIKE 269. SAXON,ANGLO 270. SECTOR,TWISTED 271. SENSEI,NINJA 272. SENSEI,THE 273. SEVEN,CONRAD 274. SHARP,FARLEY 275. SHERMAN,ROBERT 276. SHERWOOD,JOHN 277. SINISTAR,SILICON 278. SLASHER,MASTER 279. SMITH,BOOMER 280. SMITH,WINSTON 281. SQUIRE,THE 282. STALKER,DEATH 283. STARR,DAVE 284. STATE,SOLID 285. STEIN,PHREAKEN 286. STERN,HOWARD 287. STEVENS,FRANKLIN 288. STYLE,MR. 289. SWANN, DAVID 290. SWINDLER,SILICON 291. T. DISASTER,MAJOR 292. TERMINATOR,THE 293. THE DUCK,HOWARD 294. THE HACK,ZACK 295. THE PROLONGED,AGRAJAG 296. THE RIPPER,JACK 297. THIEF,THE 298. TONE,DIAL 299. TRADER,THE 300. TUCBBS,TUC 301. VICIOUS,SID 302. VIGILAN WAR,WIZARD OF 304. WARLOCK LORD,THE 305. WATCHER,THE 306. WATCHER,WOMAN 307. WATCHER,WOMEN 308. WATSON,SHITHEAD 309. WAVE,SHOCK 310. WAVE,SHORT 311. WEED,TUMBLE 312. WILLIAMS,REMO 313. WIZ KID,COMPUTER 314. WOLF,LONE 315. WONDERFUL,MR. 316. XEROX,MR. 317. YOUNG,TODD 318. ZAP,CAPT This security agent "spotted messages from Shadow Hawk". Here are some of Shadow Hawk's posts from Phreak Klass: Numb: 31 Subj: SHIT. From: SHADOW HAWK Date: MON MAY 11 2:08:53 AM Looks like I've got a lot to learn as far as the TELE part of telecom goes... I've got a question about trunks: Would someone mind explaining just how they work, how you can 'drop into' a trunk w/2600, what a physical trunk (assuming its just wires) looks like, etc. Also, around here there are these weird green manholes that look more like portholes to tanks than manhole covers. They usually are accompanied by a box of the same shade, which usually has a red light (enclosed) as an appendage. My question is, what the hell are they? There are none close enough to my locale for me to actually attempt to enter one, but if their 'insides' are as hi-tech as the outside looks... you get the picture Later, (_>Shadow Hawk<_) Numb: 32 Subj: Boxing From: SHADOW HAWK Date: FRI MAY 22 1:24:56 PM I don't think it would be THAT hard. Probably just a small sequencer & about 16 bits of DRAM, as well as a timer & of course the tone generator and keyboard encoder. Now that may sound complicated but with todays electronics it could all be done with probably around 6 ICs. I had something like this in mind a while ago, the ultimate Telecom/computer tool. IT goes something like this: a 1 MHZ A/D and a 1 MHZ D/A converter (16 bit resolution each) are connected basically to whatever you want, and to the computer via an RS-232 interface. 'Whatever you ˙ant' is your phone line, your ham radio, or even your LAN. It's basically a computer controlled oscilliscope/waveform generator, except that there's no way it could run at full 1mhz without about 16 megs of 16 bit ram & a REALLY fast coprocessor to convert the raw waveform data into more easily convertable data. I've been looking for a tech to help me out with this one for a long time, but to no avail. (the purpose, in case it wasn't readily apparent from the above, is to 1) tone dial, 2) MF dial, 3) generate ANY modem standard, 4) FAX, 5) 'scope, 6) voice recognition? The list goes on and on...) Enough ramblings;Later, Fnord, (_>Shadow Hawk<_) Numb: 36 Subj: Autovon From: SHADOW HAWK Date: MON JUN 1 9:20:07 PM Executioner: I'm fairly certain that the '*' (I'm assuming that you mean the D key on a modified touch tone keypad) connects you only to a testing device of some sort. If my assumption was wrong, would you please explain how to do it? It sounds interesting... (_>SH Numb: 35 Subj: mail? what mail? From: SHADOW HAWK Date: MON JUN 1 9:25:28 PM I know of the multitude orating TH's, but that method was(is) for a particular system where I can't even chown; I've got access to everything else though. Mail: As the title says, what mail? I thought I'd responded to your last mail, but I guess not... Call me! (_>Shadow Hawk<_) Numb: 7 Subj: Reply to Question/Mercenary From: SHADOW HAWK Date: FRI MAY 22 1:09:44 PM I've never had any problems with just dialing straight through 1 (one) sprint 950. Call me crazy, stupid, or an excessive taker of risks, but I've never even had a run in with Sprint Security. Probably because I don't hack the codes out myself, but that's another story. (_>Sh Numb: 33 Subj: BUGS From: SHADOW HAWK Date: MON MAY 11 2:17:12 AM This should really go on the phreak board, BUT... If you're referring to the bugs that are sold by deco industries, and you can tell by their ads: they always compare their bugs to a dime or a quarter, they're actually not that bad a deal. The phone line bug that they sell will trasmit about a quarter to a half a block, and is powered completely from the phone line. Their other bug, the one that's powered by (I think) a 9 volt battery & is itself the size of a quarter, will go about 1-2 blocks. This is without any real antenna, (except of course the phone line, or the battery wires, respectively) which would be pretty good, except that they transmit on the FM band. If you can find a spot on FM where theres no station, and can tune both your receiver and the bug-transmitter to the same frequency, then you've got it made. As to construction, they're actually pretty easy to build if you've ever used a soldering iron in your life. If not, make friends with a tech. and ask her/him to do it, it is little more than a 5 minute assembly job for anyone with ANY experience. Later, (_>Shadow Hawk<_) ====================================== "Shadow Hawk braged in the messages that he had successfully gained access to AT&T computer files and said he was interested in creating some 'Trojan horses' in the AT&T network."- This statement in the article refers to the following messages that this security official read on Phreak Klass. Here are the messages posted by Shadow Hawk as well as the appropriate responses (all from PK, of course): Numb: 39 Subj: another 'stuff' already. From: SHADOW HAWK Date: MON MAY 11 2:21:47 AM I better make this quick, 2 minutes left. I've got all this source code (Notesfiles, UnAxcess, *ALL system 5 source) as well as this list (399K) of AT&T Unixes on their net, and nothing to do with them. Anyone out there wanna help me make some serious 'trojans?' I REALLY like abusing the net... Later, (_>Shadow Hawk<_) Numb: 38 Subj: uucp From: SHADOW HAWK Date: SUN MAY 31 2:16:59 AM I've got this idea for a trojan horse type of deal... A shellscript, run under nohup, with the 'victim' tty being the one I'm on, and linked to the nohup.out file. I log out, and the nohup starts doin' it's thing. I think you can figure out the rest for yourself. The question is, will itit right now but I'm doing an 8 meg uucp transfer through it at the moment. Later, (_>SH Numb: 30 Subj: my first born... From: DRUIDIC DEATH Date: WED MAY 13 2:36:54 PM I7ll trade you my first born for a chance to hack those systems. I'm pretty good at TH and decoy programming, so sure I'll help you. I'd love to download the 399K list for you too. Let's work out a deal, how about it? DRU' Numb: 31 Subj: unix from the top down From: THE PROPHET Date: THU MAY 14 6:17:23 AM I'd like to point out one thing about my file first... A rather embarrassing errr. In the original version, I said "chown" was used to change file modes, when the correct command is "chmod". This was purely a typo, as I know the difference between the two commands. The format for the command, though, was correct. SState- there is one slight flaw in your trojan shell script. If the LOGNAME variable is not set by root, it will not unprotect the password file when it is run by the superuser. It's better to check the logname by using the logname command, which is accomplished by using logname in place of $LOGNAME in the script. Shadow Hawke was asking about less easily detectable trojan horses. An easy way to subvert a utility that normally has the uid bit set, like su, is to make a copy of the utility and hide it in an out of the way directory, with the uid bit NOT set. Then make a c program which does the following: if a certain argument is given to the program (which replaces the real utility), it executes the shell using the execvp C command. otherwise, execute the copy of the utility. Then set change ownership of the file to root, and set the uid bit, and name it "su" (or whatever), and replace the real utility with it. Since su always has the uid bit set and is always owned by root, it will be less easily detected, unless the administrators notice the file size. This is easy to do, requires only a minimal knowledge of C, and does not require the source code for the subverted utility. -TP ====================================== "Kathyryn Clark, a spokesman for AT&T, said 'I'm aware of it. Our security systems alert us when there is this type of break'".- I'm so sure. Shadow Hawk broke into many more systems than the ones they busted him for. ====================================== "Later that month, another AT&T corporate security official spotted a statement made by Shadow Hawk on another computer bulletin board in Chicago."- This bulletin board is most likely Ripco (Ripco International). Shadow Hawk was a user at this bulletin board and took part in phreak/hack discussions (and possibly posted hacked computers). Do not quote me on this. This is only an assumption and has not been verified. The current telephone number to Ripco is (312) 528-5020. It should also be noted that this was a different AT&T corporate security official. A DIFFERENT one.... as if AT&T has been monitoring all phreak/hack bulletin boards??? Both of these security officials are being paid to monitor boards. Is it poss security officials monitor phreak/hack bulletin boards?? Henry Kluepfel and this security official are certainly monitoring bulletin boards! ====================================== "In that message, Shadow Hawk provided the names, telephone numbers, passwords and other critical information needed to gain access to seven different AT&T computers"- It is not certain if any of these computers were the ones that Shadow Hawk was buste˙ for breaking into. And of course an AT&T security official (one of those paid to monitor boards) read Shadow Hawk's message. ====================================== The story of Shadow Hawk's bust is continued in TNS Issue #11. [OTHER WORLD BBS] Downloaded From P-80 International Information Systems 304-744-2253