-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE FOURTEENTH ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETRIEVAL = - GUILD - = = - Hacking,Phreaking,Anarchy,Survivalism,Commentary - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Four,Issue Number Fourteen Dated 02/06/93 Editor is Mercenary : mercenar@works.UUCP Article Submissions: The Mercenary/IIRG 862 Farmington Avenue Suite 306 Bristol,Ct 06010 Phantasy Headquarters BBS: The Rune Stone 14.4K HST Invitation Only All H/P/A, 2500+ Files (203)-PRI-VATE IIRG World Headquarters BBS: Dark Shadows 19.2/9600 Baud HST 1.2 Gigs Online (Down at this Time) Table of Discontents: [1] Phantasy Distro Sites Needed By: IIRG [2] Rune Stone BBS Information By: Mercenary [3] "Operation Gray Chip Completed" By: Knight Hack [4] FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary 1. Blitzkrieg BBS Goes Down! 2. AT&T Smart Card Voice Prints Increase Security of NCR ATMs 3. DEA Security - Not That Secure! [5] The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary 1. Possible Loser Alert? 2. IBM Working on Super Drive? 3. Grim Reaper of TDT a Narc? (So says Pepsi Man) [6] PHANTASY TIDBITS: News and Views of Interest 1. Cellular Highway Robber 2. Phantasy Makes Honorable Mention 3. Wired Magazine Premieres 4. TIME Magazine Article 5. FREE Virtual Sex Poster 6. NCSA FREE Book Offer 7. Information Requests [7] Listing of IIRG Distribution Sites [8] Listing of PHANTASY Distribution Sites [9] IIRG Special Announcements -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- OFFICIAL DISLAIMER... All information in PHANTASY is from USER contributed material The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. PHANTASY is (C) 1990 by The IIRG IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: Phantasy Distro Sites Needed By: IIRG ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// ATTENTION ALL SYSOPS -------------------- The International Information Retrieval Guild is looking to expand its distribution network in 1993. We would prefer BBS's that mainly cater to the Hack/Phreak/Anarchy Underground. Two Forms of distribution are currently available to those sysops who choose to participate and meet certain criteria. 1. Phantasy Magazine Distribution 2. Complete IIRG File Distribution 1. Phantasy Distribution Phantasy is the IIRG's Online Newsletter/Magazine for the H/P/A community. Phantasy Distribution for your bbs means that all new Issues of Phantasy will be uploaded by a courier to your BBS within 12-24 Hours of its release date. Your only responsibility is to provide a File area. 2. IIRG File Distribution The IIRG Archives contain a vast wealth of information gathered over the years from the underground. IIRG file distribution will provide you with a courier and file list. Your responsibility will be to edit the file list to your tastes or Needs and provide it to your courier. Over a short period of time the courier will provide the files you've selected. As always this is a free service from the IIRG at no cost to you, the sysop. LIMITATIONS: The IIRG has no overseas couriers at this time, Overseas Sysops will be provided with a No Ratio, No Limit Account at an IIRG Distro Site and will be responsible for there own distribution until a courier can be provided. The IIRG May be Contacted Through Mercenary at: mercenar@works.UUCP or by Snail Mail at: Mercenary/IIRG 862 Farmington Ave. Suite 306 Bristol,CT. 06010 -=THE IIRG=- ------------------------------------------------------------------------------- Section [2]: Rune Stone BBS Information By: Mercenary Well Folks, I've got good news and I've got bad news..... First the bad news, The Rune Stones public line will not be installed most likely until May of 1993. This is due to the fact that I'm moving again. For those IIRG Members with access to the private line, please note that that the number will be changing. Please pick up the newest member package. My move is prompted by the current economy, hence where the money is, so am I. So whem Im settled in at my new location, so will the Rune Stone. Now the good news... The Rune Stone BBS number will be made generally available to all readers of Phantasy and when you log-on and become a Validated user,you will have access to over 3000 H/P/A Text Files. Please note that due to my changing locations, the next several Issues of Phantasy may be slow in appearing as I'll be busy and wont have much time to devote to the magazine till after the move. Thanks for the Help and Support Mercenary/IIRG ------------------------------------------------------------------------------- Section [3]: "Operation Gray Chip Completed" By: Knight Hack OPERATION GRAY CHIP COMPLETED The FBI,US Customs Service,and Internal Revenue Service along with detectives from Santa Clara,San Jose,and Fremont California have just completed a four month sting operation code-named "Operation Gray Chip". Undercover agents and detectives reportedly bought and sold allegedly stolen semiconductors and computer parts on the "Gray" Market. The sting operation targeted brokers and dealers in California,Taiwan, Argentina, and Singapore. Most of these dealers have reportedly been selling parts to legitimate computer companies in the United States and Far East for years. Some 30 "Gray" Market brokers have been arrested as a result of the sting operation. The sting operation is said to have been designed to send a message to those who purchase semiconductors,disk drives, and other parts from less than legitimate sources According to Sgt. Paul Kirby of the Santa Clara Police Department. Those individuals arrested have been charged with criminal conspiracy, and multiple counts of attempted receipt of stolen property. Names of those arrested and the companies involved are expected to be released soon. Parts for the sting were provided by Intel,Quantam Corp,and Conner Peripherals,along with other well known companies. The sting involved sales by undercover agents to brokers who thought they were getting a deal because the merchandise was HOT. More than 2 Million in Cash and 1.55 Million in parts were confiscated over the 4 month duration of the operation. ------------------------------------------------------------------------------- Section [4]: FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % The end of Blitzkrieg % % % % Transcribed by Phantasm [01/09/93] % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% The following text is transcribed from a message which was left on Predat0rs answering machine at 502-499-8933. Hello, this is John or Predat0r the former SysOp for Blitzkrieg BBS. I'd like to say as of the 12th of January, 5.00pm, 502-499-8933 will no longer be an active line which means the system's gone. When I get a new line and a new number I'll put it on Pentavia, Ripco, other real popular boards like that. I'd like to say thanks for everybody who supported the system while it was up. >From February of 1990 to January 1993 it had 27,834 callers. The last official user to call was Sinister Solution. I'd like to say when the new system goes back up it'll be bigger, better and even more underground than it was now. I officially retire as Predat0r and I officially retire Blitzkrieg. So when the new system goes up, I'll have a new handle and a new name for the board. If you need to get in touch with me, use the post office box, there still good and if you want my new voice number you'll figure out how to get it. Stay free and I'll see you all again real soon... -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- FOR RELEASE TUESDAY, DECEMBER 8, 1992 AT&T SMART CARD VOICE PRINTS INCREASE SECURITY OF NCR ATMs SAN ANTONIO, Texas -- NCR Corporation and AT&T Smart Cards have demonstrated a prototype of a new generation of automated teller machines (ATMs) they are developing that will use AT&T's contactless smart card technology to offer customers additional services, like a security system that works by verifying the cardholder's voice print. The prototype and several potential applications of the new terminals are being shown at the Retail Delivery Systems Con- ference here this week. The two AT&T units also announced that AT&T's smart card readers can be connected to NCR's point of sale terminals, and that they will begin working with banks to develop new smart card-based applications that will run on ATM and point of sale machines. NCR, a unit of AT&T, is the world's largest supplier of ATMs. AT&T Smart Cards is a leading supplier of contactless smart cards and applications. AT&T contactless smart cards look like other bank cards-- they're the same size and just as thin--but they have microprocessors and memory chips laminated within their plastic shells. Developed at AT&T Bell Laboratories in the United States, their electronic memory can hold the equivalent of several pages of typewritten information, personalized to the card's user. That data is accessed by a reader/writer device, which, in addition to being installed in an ATM, can be connected to a cel- lular or wired telephone, personal computer, automobile (for electronic toll collection), or other device. Because the reader has no moving parts, it is more reliable than contact-card readers. "Our smart card can be viewed as a secure, portable, per- sonal database that will provide banking customers with enhanced security and a broad spectrum of new services," said Diane Wetherington, president of AT&T Smart Cards. {familiar ATM into a new kind of financial transaction station," said Jim Adamson, vice president of NCR Self-Service and Financial Systems Division in Dundee, Scotland. "One obvious benef{ion beyond PINs (per- sonal identification numbers), which a thief might be able to find out. For example, one of the demonstrations at the Retail Delivery Systems Conference will be a voice-based security system that works by comparing the cardholder's voice print with one stored on the card. Unless the two match, access to the account is denied. "But that's just the beginning," Adamson adds. "Since much of a customer's account information is stored on the card, he or she doesn't necessarily need to go to an ATM if all they need to do is check that information. You can use a personal computer with a smart-card interface, for example, or a similarly equipped public telephone. "Of course, security features on the card will prevent users from changing the information on the card when they are not linked to their bank's computer network." When customers do go to an ATM, they are given customized menu options based on their account profile stored on their smart cards. This might even include offering them a connection to a financial institution not normally on the ATM network, such as a brokerage house where they have a money market account. In addition to convenience and security, another benefit of using AT&T contactless smart cards with NCR's terminals, is that a single card can be used for multiple applications--a solution to consumer complaints about the proliferation of cards they need to carry around. Using AT&T's communications network and NCR's installed base as a backbone, AT&T can develop and deploy applications for a variety of customers. For example, a single card could serve as an ATM card, an insurance information card, and a debit card for making purchases in a store, placing phone calls, paying highway, bridge and tunnel tolls, paying mass transit fares, and even buying from vending machines. Funds for each of these uses can be transferred at any ATM from the customer's bank account to the debit portion of the card. With a smart card reader/writer connected to an NCR point of sale terminal, the consumer has access to a full range of pay- ment options. AT&T smart cards also make it possible for ATMs to expand beyond mere banking functions. For example, "electronic tickets" for airline travel, sporting events, plays, or concerts could be purchased at an ATM and loaded onto the smart card. The card would then b------------------------------------------------------- TIME MAGAZINE ARTICLE For other collectors of information, be sure to grab the Feb. 8 edition of time magazine and check out the cover story article on Cyberpunks. ------------------------------------------------------------------------------- FREE VIRTUAL SEX POSTER Get a FREE poster of the Virtual Sex Scene in the "LAWNMOWER MAN" by calling 1-800-858-1810 and ask for Department C76. This is a free promotional offer from CYPRESS SEMICONDUCTOR and they will send along a copy of there Data Book with the poster. They may ask if you have time to answer a few questions as they did when we called, they're just looking for Company Background Info. ------------------------------------------------------------------------------- NCSA FREE BOOK OFFER The National Computer Security Association will send you a FREE copy of their "Information Security Wishbook" and may be obtained by calling (717)258-1816. We've obtained a copy of the book and its roughly a 24 page catalog of Books,Newsletters,and Research Reports with some "DISINFORMATION" charts thrown in to scare the novice system operator. For Example; Number of Hacker Attacks on US Workplace Computers 350,000 in 1989 395,000 in 1990 675,000 in 1991 Come on Guys. Give us a break Name the Companies that reported 675,000 attacks individualy and I'll eat your Jock Strap. ------------------------------------------------------------------------------- INFORMATION REQUESTS At the IIRG, we often recieve strange,bizarre, and sometimes normal requests. Although Mercenary does'nt have the time to answer everyone individually. He hopes to answer some of your Questions here as we recieve them. 1. Where can I get Info on Cellular Phreaking. Mercenary Reply: There are numerous files on Cellular Phreaking and Hardware hacking available on any larger Hack/Phreak BBS. If you don't want to spend the time looking for them I would suggest sending $49.95 plus $4.00 S/H to: DYNASPEK P.O. Box 564 Westmont,IL 60559 or COD orders may call (708)-971-1585 For your cash, They will send you a copy of, "The Cellular Telephone Hackers Guidebook" and this should guide you through the basics. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: IIRG Distribution Sites (or Gateways to Oblivion) ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// IIRG World HQ: Dark Shadows 19.2/9600 Baud HST 24 Hours a Day 1.2 Gigs Online Sysop: Anubis 2 Nodes (203)-PRI-VATE (TEMP DOWN AT THIS TIME) IIRG Distribution Site 1: Wired World BBS INC Europe TPC Courier (WHQ) THP IIRG Distribution Site Sysop: Digital Justice +39-89-254138 IIRG Distribution Site 2: Cyberdyne Network Germany United Forces Sysop: E605 +49-5341-59004 +49-5341-54052 IIRG Distribution Site 3: The Sanitarium Sysops: Morbid Angel [INC/ACID] Spectral Illusion [ACID/RAZOR] IIRG Distribution Site ACID Member Board INC Courier Board RAZOR 1911 Courier Board VISA World Headquarters (817)PRI-VATE IIRG Distribution Site 4: The WareHouse (203)-231-8589 14.4 (203)-231-8588 9600 OVER A GIG ONLINE Sysop: Ionizer IIRG Distribution Site 5: The Rune Stone BBS 14.4k HST Phantasys Home Board Complete IIRG Archives Invitation Only (203)-PRI-VATE -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: Phantasy Distribution Sites Phantasy's Distribution Site's are continually growing,we apologize if you called a board and didn't find the Mag. Network Distribution Sites will have the Issues first, we suggest calling one of them if a problem does arise. 1. Lightning Systems (414) 363-4282 Sixty Million Bytes OnLine USRobotics Dual Standard HST/V.32bis 2400 thru 14.4k v.32bis/HST 2. Sycamore Elite 19,200-1200 Baud HST, 24 Hours a day (815) 895-5573 3. The Works BBS (617-861-8976) Large Text Files BBS, 3500+ text files online. 2400-300 Baud, 24 Hours a day 4. Pipers Pit BBS 19,200-9600 HST ONLY!! 24 Hours a Day THG Distro Site 1300 Megs (203)PRI-VATE [2 Nodes] (Please Note, Numbers have Changed at Pipers Pit) 5. The Dickinson Nightlight (713)-337-1452 Der WeltanSchauung Distro Site (World View Magazine) Phantasy Distro Site 6. RIPCO II BBS (312)-528-5020 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [9]: IIRG SPECIAL ANNOUNCEMENT The IIRG has just released The IIRG's Acronym List [V7.00] and should be available on a H/P BBS near you. Also for IIRG members the New IIRG Member Encryption System has been released and can be Picked up on The Rune Stone BBS. The IIRG shall be releasing around June, the IIRG's Hackers Survival Guide for the 90's, note withstanding any problems with Mercenary's move. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PHANTASY(C) IIRG 1991,1992,1993 May Odin Guide Your Way! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- |shPnޏ }vZ'ύﰦ B^MV `7։WI/Z<+\%6\%1ɦ ZiU8m$DB'6|N)QROo.|1]9 V6ȁ9;b̓7AyVL|lDB 'Z33DŽJۛ7Uq>nQC ,W}>5&H 醋Z<ǵ4 =? R Y 餽:vI}ft >:_P@1u=]aЗ fm[66FKOb|ݖ<HWwW#ʐf5Ԫd=Y7N{\n+G`/1EIypdOs) ,KprEi5/^\_bAy#pV҆mjGfo.AMSG~֍eϱ3qN T|xж3xc9PK_q]= x6.Ցj?U]J6@BW4շ c$M<m*뉞j>3N ;Z"c9lo0s DX+|'W`Od.~:(Y 2ߠ0S3:Z?JY$[m0y"2yaq@v.F@v<9Ӟ4=ϩ:3v)Hq?TxzU᫘MҸGH tvJ؎}-˥6!o}ǻ=4<)~^Au[ v!nɝUM~=aqIQ4Jo$\o|^ӷfJh!紧'W8uN'C:Kݜ7́d?yՐ+&'V]ΌHܵOtj\"<.'?9P^[%yӮA0&T`cHqt%|kMMM=mlX39^XR^0 #y# 췓N&*8cIo/)5YQCN,7 :B'z+ cCI"5htg @̀Cp0xNo,>Q;}xzC vUeZ./H?4Mu\ڃI l^.\i ^p_˩Xs q -h4ؑ?"_m{?Z辰/ۨsd9+XPrݼ)an-,9-:õ$-U^顐 UVm?Ap"dg"PsaɈ]:u%M;ƒ6FTp+3KH{rWj\q0^77>m gڢÜӉh+Q~}筩!aV/#5Pӌ!ZEWôVNhL4f$'4q*c*rPsEJ/MCoO@Z$r=q[-_f_fw՟]{gBPZ)젬CvD>x)B2W0ƶs^{4o`>'}='dǽMD9h AcAPxׯ3^W;=֟+N"I(Y?wuˆFm9e}{uroc2v H\{50D+q͈B^6(e\#:+~M^˥]u >21*M䔶}6 0;HhCzo4r[;;Kz^=d%KcI=Îyx،<+Wx5ٷ.-6v]ʠZ>GǗt e;@֊_pD+Ͼpvْ8Ȃia.=yLbJ4Α[JvJ{Cbn8IP/S U1Mm^jh+L\q1,aA_ݯVػizm\#b|Z15.\SDRftŅwʙ:t!'o/{J^2?4ɜ0 i Zktl;F}nPJ oL+)yhwЍoagu[`&]׿j6(ҬB9J2=g$g/i%v:WڪAO;G*x2VSM!B|PoOC1;~bjE^_Us p7lMhoOWGֲ8KBp FU6ƬflaC$h40,rd\%7Y!F"㐇3iDy9Y\<5Dzm@vFa0}ҼNHa[;o *n$Ozn?/jCY~lu;Iu 2.FWRaΙneQ4qQD6d`kJM@\HՋ8ڿjY,WQAۣ|~̖YYqS£zhEQX=::.r]w4zwg䒳jO T۱|VpffI<JEE 6F)ʑ{tOcMq&Ӫhd/s.Ϻ{: ԣ&D'JJt'_,7PddH[~HkI K'SqT9X(Zx6 +q cM|3VMcL0}"3fAX&O$w)C0 IE a-el^q94˳  cGYZe 0+;0aE{$jGu+`! pP|6q%b^gY_>g_Sϡ.oڧRg' _OxMRI4̨F/ړf}VE-?[΀"~'+>3CC>E\֝Ĉ(we]/!M{n5N#Tqqr4CIVՅ6b(Po9M-m'N26WvRD6`/Z6#J0am9[ ?n<#lTH! v2ժB{")i[W,3N愬`<*~}4uzu({jT(:Ɍ`u"*49$@q㜼KJĽU]jܷϣD`z -]@teDGԔFI>_K5򾼚_/8\5Wj~RcmͶ:YZFFb#>$Pv 8Z~RMZuLU2)؛B4vqK~7.H)1LQQ. ?Hޢ?7T邇PBD}PB ѥ7݈* P(GJuASP`:;N>r  L t Ml4 b~;ФȪ2&x0?_8r2OJ_/;}m ]W=7S??.i֥GML#V}fB B$C H)My`hچFlk> ~A_euȤbgZ+$tYeutj:]V?_XھzU?#[f_qp)覠KP4,conғ.y-PЎ?Tsنq_(o &#dK7u:&"p| ^88~ {:KOS n=lj];x$0*Sf$j#`YY86k/Aj];;a߄ ;r|xD=7fh .M }zmK8JUĎr3A}s{8dmfBMty!Šbmυ6EO/Op2t"!A#xcL" `Kozfqiq619(`CtJ ήD ^~E{hކ&0%0E&fӆp.5# ץE4x(?hV{b~AI[k9EEt~.#vt5:؍w.1fBGbu 4>N<_+<)SrP$KM/{mm}*oyz놇H*_4l85D=q ҔhH*zBaA`Gy-!ia~5yT:P,I_%Gc~ffg`QZChI13{㪯abk;Li TGGFi]苤Vyx8B%%,ɤ@_YJu\c 5jp(cN8 z jWlbp> 8]ͳSt n -{{Rt9ͽ :1 Dƾ(5(f-&h_>)Ǜq*/"*קVg~1l<=w}F% 5yr[`_swˁ'׬Ԁ 1 aMG],:{  p,#HΥƈs o 7/P]umq(7 Ҡ3 ` :meU Һ"aL n{>HrT@zhDFr#@U6i?W21^r@CگKugm\k"6rj;B3> vci 8 ']:F afMr>XTkyPП ZbzrkhYZ3B,S%I(վrz ɽSs2a%y/FTB )LsIPj<y|Chj[tA9qZY}Y)*F>.ƕ([qA-kC:ž.ڠ]<Z-Ɣ9ɮ@@xU} !.~zs Q*']:-h;rhכ75x kP 뗣9qy>KjMYߗ7,O㯵_v4K !C Cr&RmB1[G_ br70궵,5&q\jѩLA2(_f|G+f0~m:@sYsNwRr,ghI]U*\+qh@FEPOEN䀉l8| 29 &('\};:>Z2Nۭ"njbИ5&9âԛA120Y9" [7ԓqtF:zXo.ݗ:C$ /[-xuPݶ @~6߸2 )5w_f!(rdr(Æ53O~YؑO"YxoZ݊緬OaCIޅօc ߣoF.ئ+DU/PPi-W(|Y cId)#$׫&kcYrO[b.0PQHXM!$ [Amg W^%@t"$jl 7qp={~(&?ҭ<`gJGKIuah)>>&&WѴRD4eό?GNƆԅCQ*-0jWJ#q}]Uv߾a~ :L3` Pcribers for alleged copyright violations. A computer bulletin board allows personal computer users to access a host computer by a modem-equipped telephone to exchange information, messages, files and computer software programs. Officials of the Software Publishers Association in Washington, D.C., said they alerted the FBI about Rusty & Edie's after they got complaints from members that their software was illegally distributed by the Hardenburghs. "We applaud the FBI's action." said Ilene Rosenthal, SPA general counsel. "This shows that the FBI recognizes...the seriousness of software piracy...and the harm that theft of intellectual property causes to one of the U.S.'s most vibrant industries." Software piracy cost the software industry $1.2 billion in 1991. Ken Wasch, SPA's executive director, said, "Many people may not realize that software pirates cause prices to be higher...to make up for publisher losses." ------------------------------------------------------------------------------- RUSTY & EDIE'S BBS SEIZED BY THE FBI Rusty & Edie's BBS touted the fact that they had only two rules: 1. Have fun and 2. No More Rules. It would appear they are going to soon add a third rule to their operation - No Commercial Software. After several years operating as the biggest open secret in BBSland, the 124 line BBS operated from the home of Russell And Edwina Hardenburgh in Boardman Ohio was raided by the FBI. On Saturday afternoon, January 30, FBI agents presented Rusty with a search warrant. Approximately 130 personal computers, modems, LAN cabling, software packages, and subscriber records were seized as evidence and hauled away - essentially terminating all operations. Claiming some 14,000 subscribers to a system sporting a registration fee of some $89 per year and 124 access telephone lines, Rusty & Edie's was one of the nation's largest bulletin board systems. They claimed some 3.4 million calls since going online and were receiving some 4000 calls daily when the system went offline. The system featured over a 100,000 shareware files on 19 Gigabytes of file storage. They were charged with distributing copyrighted commercial software on their BBS. And while the Software Publishers Association (SPA) was quick to step forward and take credit for the FBI action, it was actually quite late on the scene with this one. And therein lies a tale. Five years ago, Bob Fairburn had a heart attack. A restaurant manager in Kansas with a wife and children, Fairburn could not obtain life insurance and was assured by doctors that he had a life expectancy of five years or less. He pondered for months on how he could somehow assure his family an income after his death. And he decided that there were two things a man could do in America to generate ongoing income - write a book or invent something. So he set out to write the Great American Novel. After months of effort, he read through his manuscript and decided even he wouldn't buy it. So he cast about for something he could invent. But again, he found he just didn't have the inspiration to be an Edison. His son had a small personal computer and was already writing games in BASIC. Fairburn took a look at it and decided this was something he could do. He bought every book he could find on computer programming, and he signed up on Bob Mahoney's Shorewood Wisconsin EXEC-PC BBS. He downloaded hundreds of files from the BBS containing code fragments, examples, programming tutorials, and anything he could find on programming. Starting in BASIC, he eventually moved on to PASCAL. And he came up with an idea for a program. He called it HOME DESIGNER and it was basically a simple CAD package to design home floor plans, place and arrange furniture, and try out various designs for your home or office. Fairburn decided shareware wasn't the way to go to generate cash. So he solicited software distributors for months. Eventually, a company in Florida called Expert Software picked up the title and lnched Expert Home Design - at the staggering price of $14.95 retail. According to Fairburn, he only gets fifty cents for each copy sold, but the program caught on and he reached the point that he was making a living. He bought a farm outside of Leavenworth Kansas and to get needed physical exercise, began clearing it and converting it into a wildlife park. He hired an assistant, and continued software development. About a year ago, he dialed his old haunt at Bob Mahoney's EXEC-PC BBS, and there was his commercial software program listed in the download directory with BBS callers downloading it madly. Stunned, he called Bob Mahoney voice and asked him about. Mahoney immediately apologized and removed the file from the directory. In examining the file, they found a small file in it advertising that it came from Rusty & Edie's BBS. Mahoney explained that sometimes callers are confused by the difference between shareware software and commercial software and in an effort to contribute something, they upload commercial software to bulletin boards sometimes without realizing the impact. "Most BBS operators will remove it immediately if you call their attention to it," Mahoney assured him. So Fairburn dialed Rusty & Edie's BBS and did indeed find his program available for download there as well. He selected the editor and began drafting a message to the sysop explaining the situation and asking that the file be removed. According to Fairburn, while he was typing the message, Rusty broke into real-time chat and rather rudely told him that he wasn't responsible for every file that anybody uploaded to the BBS, that they received megabytes of file uploads each day, and that he would remove the file whenever he felt like it and got around to it. Despite the harsh tone, Fairburn accepted this explanation. But when he called a week later, the file was still there. "Understand," explains Fairburn, "I'm not Bill Gates. I only get fifty cents per copy sold, and my family depends on this for a living. This guy was running a giant bulletin board and taking in lots of subscriptions, and basically he was stealing my software. I just got mad about it." Fairburn called the FBI office in Kansas City and complained. They were quite nice but not very helpful during the call. But about a month later, Fairburn answered a knock on the door to find an FBI agent on the front porch - there to investigate his problem. Fairburn took the agent into the den and logged onto Rusty & Edie's BBS. They evlogged the session to disk and he showed him not only his own program in the directory, but copies of Borland's Software, Novell's LAN software, a number of Microsoft programs, Quicken, and according to Fairburn, "virtually every commercial game program made." Fairburn was discouraged to learn that the agent knew nothing about computers. But he gave him a disk with the logged session on it,