-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE EIGHTEENTH ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETRIEVAL = - GUILD - = = - Hacking,Phreaking,Anarchy,Survivalism,Commentary - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Four,Issue Number Eighteen Dated 08/12/93 Editor is Mercenary : mercenar@works.UUCP Article Submissions: The Mercenary/IIRG 862 Farmington Avenue Suite 306 Bristol,Ct 06010 IIRG World Headquarters BBS: The Rune Stone 14.4K HST Courier All H/P/A, 3000+ Files (203)-832-8441 NUP: Conspiracy Table of Discontents: [1] "Ionizer" - IIRG Site Sysop Arrested A Report By The IIRG [2] What Really Happened at "Pump-Con" (An Interview With Thomas Icom) Interview By: Mercenary [3] Bencrypt Encryption By: Ben Sodenkamp [4] Hacker OPSEC (Operational Security) By: Thomas Icom/IIRG [5] The Libertarian Responsibility of The Cyberpunk Movement By: Thomas Icom/IIRG [6] FOR THE PEOPLE Supplied By: Those Wacky Secret Service Agents Edited by: Mercenary 1. Secret Service Agents Get Free Vacation [7] The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary 1. Han Solo Sells Out to the Empire? 2. Dr. Detergent of TDT Retires? 3. Fear and Loathing BBS Busted [8] PHANTASY TIDBITS: News and Views of Interest 1. SNET Operators Forwarding ANI Data 2. FCC Releases Frequencies 3. Put Your Hands in the Air, and Give Me Those Chips 4. ATM Bandits Nabbed 5. FBI Calls for Gun Licensing [9] Listing of IIRG Distribution Sites [10] Listing of PHANTASY Distribution Sites -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- OFFICIAL DISLAIMER... All information in PHANTASY is from USER contributed material The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. PHANTASY is (C) 1990 by The IIRG IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: "Ionizer" - IIRG Site Sysop Arrested A Report By The IIRG (Portions of this article were taken from a Taped Conversation with Ionizer from the Hartford,CT. County Jail to Mercenary at IIRG HQ.) Ionizer the sysop of the Ware House was arrested on Monday August 2nd as he entered a pretrial hearing at the Hartford Superior Court,Hartford Connecticut, to face charges of his alleged connection for a break-in at Hall High School on October 11th,1992. Ionizer was arrested for "Inciting Injury to Persons or Property", a felony, and "Risk of Injury to a Minor". Apparently Ionizer was taken to the West Hartford,CT. police department and was quickly photographed and fingerprinted and then was whisked away to the West Hartford Superior Court and was arraigned,(without his lawyer being present) and was ordered held on a $500,000 dollar bond. West Hartford police are attempting to keep the case sealed, but the charges against Ionizer are for having Anarchist files available for download on his BBS, The Ware House. In our discussion with Ionizer from jail, the police have apparently used strong-arm "Big-Brother" tactics on a 14 year-old by the handle of, "Misguided Youth" who had access to the Ware House. Reportedly police approached him and threatened to drag him into court if he didn't sign an affidavit that he downloaded the file "ANARC2.ZIP" from the Ware House. When Ionizer first heard wind of police hassling users of his system, he supplied his entire system log (Ionizer kept his system log since day 1 of the system being up) to an IIRG member for analysis. We have analyzed the Meg Plus file and have found no record of Misguided Youth ever downloading the file from Ionizer's BBS. In fact only 2 users have ever downloaded ANARC2.ZIP that we could find. 1. HITMAN 18:56 05/23/93 LIBRARY FILE DOWNLOAD User Hitman download ANARCHY\ANARC2.ZIP 2. HOLLYWOOD 14:35 05/24/93 LIBRARY FILE DOWNLOAD User Hollywood download ANARCHY\ANARC2.ZIP 14:50 05/24/93 LIBRARY FILE DOWNLOAD User Hollywood download ANARCHY\ANARC2.ZIP Now apparently it seems that the West Hartford police department feels it can either intimidate anyone it feels like, or fabricate evidence. Several other Ware House users have been contacted by phone by police and questioned, We know "Mastermind" was contacted and was asked "Are you good friends with Ionizer?' and "Did he ever mention anything about the making of pipe bombs to you?'. According to Ionizer, the police are claiming an undercover police officer with the West Hartford Narcotics division is claiming to also have downloaded the file. Hitman has also been contacted by police and asked to supply a copy of the file in question, and this is events we were told happened, Quote from Hitman - Date : 08 Aug 93 10:19:14 I'll tell you the whole story, as I told it to Ionizer last night (he called me from jail). When I was out one day, the detective Mr. Anielwiski (or something like that) called. I wasn't home, so, he talked to my dad. My dad thought I was doing all of this shit too, so, he took it way out of proportion. I got home, and he made me search for a file 'ANARC.*' on my hard drive. Since it is really his computer and his phone line, there is nothing that I could have done, since he could have easily done it himself. Anyways, he said to delete it, so I wiped it via Norton's WIPE program, so it couldn't be recovered. Anyways, I guess the detective called back, and my dad said that I had the file. But, it was wiped. Anyways, my dad thought we'd just undelete it, but, he didn't realize that the file would just be a null file when we did so. The rest of the story is what he told me, as I was at work the rest of the day. The detective came over, and I guess my dad copied the null file onto a floppy, but, I think the floppy was bad anyways. At any rate, to my knowledge, there is no information at all on the floppy, and, I've got no other copy of it on my hard drive. --Hitman Now the file in question is ANARC2.ZIP, which is ANARCHY FOR FUN AND PROFIT By: The Deth Vegetable Volume 1,Issue 2. It seems that this file is being singled out by the police because of its high bomb making instructions content and this message in the header of the file, ---------------------------------------------------------------------------- /--------------------------------------\ ! Note to Law-enforcement type people: ! ! This file is intended to promote ! ! general havoc and *ANARCHY*, and ! ! since your going to be the first ! ! assholes up against the wall.. there ! ! isnt a damn thing you can do about ! ! it, pigs! ! \--------------------------------------/ ------------------------------------------------------------------------------ None of the information contained in ANARC2.ZIP could be considered classified or secret as the nformation in the file is easily obtainable in any book store in books like "The Anarchists Cookbook" or "Ragnar's Guide to The Home and Recreational Use of High explosives". We did a little investigating and found "The Anarchists Cookbook", By William Powell on the shelf at "Barnes and Noble" bookstore in West Hartford,CT. (Hey Police, better run over and shut them down!!). We also found "The Anarchists Cookbook" at the Tunxis Community College Library in Farmington,CT. (HX 844 P68) and at the University of Connecticut at Storrs Library (SPEC APC BK f33), so it is available at public libraries for underage children to read and enjoy. Also after a little searching on the international network of computers known as "Internet" look what we found available for download by "ANYONE" with a computer and modem, (Including Under-age Children). -------------------------------------------------- Host cs.ubc.ca (137.82.8.5) Last updated 03:33 28 May 1993 Location: /mirror3/EFF/cud/misc FILE rw-r--r-- 7936 Mar 8 1992 anarch.man Host kragar.eff.org (192.88.144.4) Last updated 00:05 17 Apr 1993 Location: /pub/cud/misc FILE r--r--r-- 7936 Mar 8 1992 anarch.man Host nic.funet.fi (128.214.6.100) Last updated 06:11 22 Mar 1993 Location: /pub/doc/cud/misc FILE r-xr-xr-x 7936 Mar 8 1992 anarch.man Host cs.ubc.ca (137.82.8.5) Last updated 03:33 28 May 1993 Location: /mirror3/EFF/academic/books/zzz FILE rw-r--r-- 99 Apr 24 17:06 anarchists_handbook.d Host kragar.eff.org (192.88.144.4) Last updated 00:05 17 Apr 1993 Location: /pub/academic/books/zzz FILE rw-rw-r-- 81 Oct 23 05:29 anarchists_handbook.d Host cs.ubc.ca (137.82.8.5) Last updated 03:33 28 May 1993 Location: /mirror3/EFF/academic/books FILE rwxrwxrwx 25 Oct 11 1992 anarchists_handbook -> zzz/anarchists_handbook.d Host kragar.eff.org (192.88.144.4) Last updated 00:05 17 Apr 1993 Location: /pub/academic/books FILE rwxrwxrwx 25 Dec 2 04:31 anarchists_handbook -> zzz/anarchists_handbook.d Host wpi.wpi.edu (130.215.24.1) Last updated 03:31 22 Jul 1993 Location: / DIRECTORY rwxr-xr-x 512 Jul 7 09:20 anarchy Host unix.hensa.ac.uk (129.12.21.7) Last updated 01:46 26 Jun 1993 Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy FILE rw-r--r-- 8613 Jan 8 03:36 anarchism.today.Z Location: /pub/uunet/doc/political/umich-poli/Essays/Chomsky FILE rw-r--r-- 22156 Sep 17 1992 notes.on.anarchism.Z FILE rw-r--r-- 55985 Feb 2 16:09 notes.on.anarchism.ps.Z Location: /pub/uunet/doc/political/umich-poli/Spunk FILE rw-r--r-- 861 Mar 1 20:37 README.practical.anarchy.Z Location: /pub/uunet/usenet/control/alt FILE rw-r--r-- 1535 Sep 11 1992 alt.society.anarchy.Z Host nic.cic.net (192.131.22.2) Last updated 01:14 22 Mar 1993 Location: /pub/nircomm/gopher/e-serials/alphabetic/p DIRECTORY rwxr-xr-x 512 Mar 19 16:11 practical-anarchy Location: /pub/nircomm/gopher/e-serials/alphabetic/p/practical-anarchy FILE rwxr-xr-x 54325 Mar 18 23:02 practical-anarchy.v1n3 Location: /pub/nircomm/gopher/e-serials/general/politics FILE rw------- 92 Mar 21 23:38 .practical-anarchy Host unix.hensa.ac.uk (129.12.21.7) Last updated 01:46 26 Jun 1993 Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy FILE rw-r--r-- 3550 Mar 18 21:17 anarchism.and.power.Z FILE rw-r--r-- 23063 Mar 6 19:45 anarchy-faq-0.1.Z Host charon.mit.edu (18.70.0.224) Last updated 02:34 26 Jul 1993 Location: /pub/usenet-by-group DIRECTORY rwxrwxr-x 512 Jul 12 02:46 alt.anarchism Host cs.columbia.edu (128.59.16.20) Last updated 10:24 26 Jul 1993 Location: /archives/mirror2/faq DIRECTORY rwxrwxr-x 512 Jul 12 09:54 alt.anarchism Host wiretap.spies.com (130.43.43.43) Last updated 03:06 22 Jul 1993 Location: /Library/Article/Socio/.cap FILE rw-r--r-- 28 Apr 5 19:08 anarchy.bib Location: /Library/Article/Socio FILE rw-r--r-- 23565 Dec 24 1992 anarchy.bib Host unix.hensa.ac.uk (129.12.21.7) Last updated 01:46 26 Jun 1993 Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy FILE rw-r--r-- 3196 May 11 17:35 anarchist.revolution.Z FILE rw-r--r-- 5621 May 11 17:37 macsimin.anarchist.federation.Z Host wpi.wpi.edu (130.215.24.1) Last updated 03:31 22 Jul 1993 Location: /anarchy FILE rw-r--r-- 44492 Jul 7 09:19 anarchy.tar.Z FILE rw-r--r-- 61332 Jul 7 09:20 anarchy.tar.Z.uu Host wiretap.spies.com (130.43.43.43) Last updated 03:06 22 Jul 1993 Location: /Library/Article/Socio/.cap FILE rw-r--r-- 39 May 28 06:28 anarchy.faq Location: /Library/Article/Socio FILE rw-r--r-- 45315 May 28 06:28 anarchy.faq Host charon.mit.edu (18.70.0.224) Last updated 02:34 26 Jul 1993 Location: /pub/usenet-by-hierarchy/alt DIRECTORY rwxrwxr-x 512 Jul 12 02:46 anarchism Host nctuccca.edu.tw (140.111.3.21) Last updated 01:04 13 Jul 1993 Location: /USENET/Periodic_Postings/alt DIRECTORY rwxr-xr-x 512 Jul 12 1993 anarchism Host orchid.csv.warwick.ac.uk (137.205.192.5) Last updated 05:41 31 Jul 1993 Location: /pub/cud/misc FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z Host clover.csv.warwick.ac.uk (137.205.192.6) Last updated 05:04 26 Jul 1993 Location: /pub/cud/misc FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z ------------------------------------------------- Our point is simple, this material is publicly available almost everywhere and the last time we checked (Despite Clinton), we still lived in a FREE country with the constitutional right of free speech. This is a plain and simple case of Police Harassment against Ionizer. We are not claiming he is an angel or saint by any means, as he has had numerous encounters with the West Hartford police including his arrest in 1988 for illegal use of credit cards,computer crime,larcency, and the illegal possesion of fireworks. But to arrest an individual for having a file on his computer that is public domause of that, or when some idiot has been phreaking heavily from the same small area for the past few months, and the phone company decided it's cheaper to do something about it than continue to absorb the loss. My personal experience is that airports are the best place to use payphones from. There are usually payphones which have modular jacks so you don't need an acoustic coupler, and people from all walks of life are there, so you won't look out of place. My personal experience has also indicated that hotels are usually the worst place to do anything from. Hotel employees are always suspicious, and thus are always asking questions of the people in their hotel, particularly if they haven't checked in. Also, as the participants of Pumpcon can attest, hotels are often quick to call the police when something doesn't quite fit into their reality picture. Another favorite phone phreak OPSEC trick is known by the terms "canning", "pedestal hacking", "beige boxing", and "hardwiring". This basically entails hooking into a random phone line somewhere, and using it to make outgoing calls. The first three techniques are usually used to indicate a temporary connection. One usually walks up to a test point on the phone company's outside plant, and hooks in. These test points are commonly called "bridging heads", "b-boxes", "(phone) cans", or "pedestals". The forth term is usually used to indicate a more permanent set up; in essence a clandestine extension of the target phone line. One fun thing to try is to power a cordless phone base by means of a large capacity rechargeable battery, and then hook it up to a phone cansomewhere. This keeps you from having to stand suspiciously at the can for hours a end. (A common problem when canning) So even if they do trace the call back to the phone line you're using and send in the Bellcore Rapid Deployment Force to adjust your attitude, you'll still be a football field away when the shit hits the fan. It should also be noted that by adding an external antenna to the base station, (a 60 inch 1/4 wave ground plane would be cheap to make and perform decently) you can increase the range on most phonesup to 1/2 mile. (and get the FCC pissed off at you if they found out you did this. So be a nice law-abiding person and obey FCC Part 15 Regs. Then they might leave you alone, maybe.) There are also many other techniques that you can use. If you are interested in learning more about the technical procedures of covering your tracks in cyberspace, you should check out "2600: The Hacker Quarterly", "TAP", and (excuse the self-promotion) "Cybertek: The Cyberpunk Technical Journal". They all contain a wealth of technical hacking and phreaking info. Now that you are not doing anything over any phone traceable to you, your next step is to keep your activities to yourself. Yes, hacking is a often a big ego boost, but talking about your latest accomplishment is likely to get you into trouble. If "they" get wind of what you're doing, it makes it that much easier for them to get you, no matter what precautions you might be taking. In the same vein, avoid getting involved with large groups. If you must do something which involves more than one person, then make sure you intimately know the people you will be involved with, and keep the group as small as possible. My criteria for trusting someone is that I've known them for at least a few years, know their real name, and have physically hung out with them extensively for a couple years. My gut reactions to the person also have a big say in whether or not I trust him or her. Believe it or not, we all have a sixth sense which can be developed over time, and is very helpful in keeping us out of trouble. Despite the fact that you've been careful, you still might be noticed by someone somewhere, and as a result get hit with a search warrant or be the victim of a Cointelpro-style black bag job. To combat this, don't keep anything sensitive at your house. Store all your good stuff off site, so you won't lose it. Any sensitive data you have to keep at your home should still be backed-up at an off-site location, and encrypted. Tere are a lot of good encryption systems out there. The current rave in encryption software is PGP, "Pretty Good Privacy". It's available on any good BBS system, and seems to be what everyone is going to be using. The nice thing about PGP is since it's a "Public Key" system, it allows for secure communications without having to exchange keys. If you don't give a shit about exchanging data with strangers or have a secure way to exchange keys, then there's Video Vindicator's "VinCrypt". It's also available on any decent system. Another good one is Consumertronics' "Absolute Computer Security". More a set of applied encryption ideas and concepts; as opposed to a strictly defined system, ACS is capable of being totally customized by it's user, and while the original software is for MS-DOS machines; can be ported over to other systems. It should be noted that the effective use of ACS requires some applied intelligence on behalf of its user. If that's a problem with you, then you'd be better off using something else. One favorite of mine is the "one-time" cipher system. Basically the one- time system uses a randomly generated non-repeating key which is then used to encrypt your data. Most people think that one-time cipher systems are a pain in the ass to use, but they are unbreakable as long as your key is kept secure. I'll talk about it more in the next chapter. No matter what encryption system you use, it won't be worth a damn if you use poor judgement in the selection and protection of your encryption keys. Make your key as long as possible, hard to guess, and not restricted to just alphanumerics. Any encryption system will fail if it prompts you for a key and you enter "SECRET". And since you're an intelligent person I won't insult you by reminding you to keep your encryption key secure, and to use a different key for each file you want to protect. If it is possible for you to do so, I would also hide the data on the floppy so that it appears invisible to the average user. Some of the ideas that quickly come to mind are tacking the encrypted data on the end on a legit executable file, or putting the data on a sector which is then marked "bad" so it won't be overwritten. A really good idea, if your serious about OPSEC, is to use arcane or custom hardware and software. While you won't be compatible with the rest of the world, you'll at least be secure. ("But then I won't be able to play "Leisure Suit Larry" like I can on my PC!") Someone should design an MS-DOS version of Beagle Bros. "Dos Boss" Apple II DOS Customizer, which would allow changing of DOS command names. You could change "TYPE" to "DELETE", so anyone attempting to read your files would instead wipe them. An even more fantastic idea would be a custom secure operating system based on the one used in Robert A. Heinlein's book, _The Number of the Beast_. He wrote about a "double bookkeeping" system which looked ordinary, but unless it received certain discrete keystrokes, would display a set of decoy data, while erasing the real data hidden on the system. Doing a setup like that shouldn't be a problem to an experienced programmer. Now if you've followed all these guidelines, you can consider your operation secure, and have little to worry about. Hacker OPSEC really boils down to two things, Common Sense and Caution. On the other hand, you feel that these precautions are little bit on the paranoid side. Just remember two things. The first is that hacking and phreaking are currently looked down upon by those in power. The second thing you should remember is what happened during Operation Sundevil. -Thomas Icom International Information Retrieval Guild "May Odin guide your way." Sources Mentioned: Consumertronics 2011 Crescent Dr. Alamogordo, NM 88310 505-434-0234 Absolute Computer Security: Manual & MS-DOS diskette -$29 Manual alone -$19 2600: The Hacker Quarterly P.O. Box 752 Middle Island, NY 11953 516-751-2600 Subscriptions: $18/year TAP P.O. Box 20262 Louisville, KY 40250 Sample issue: $2 Write for more info. Cybertek P.O. Box 64 Brewster, NY 10509 Subscriptions: $15/6 Issues Sample: $2.50 PGP: Pretty Good Privacy and VinCrypt Available on most decent BBSes. Try: Uncensored (914)-761-6877 or the Rune Stone (203)-832-8441 NUP:Conspiracy Libertarian's in '96! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [5]: The Libertarian Responsibility of The Cyberpunk Movement By Thomas Icom/Cybertek/IIRG With the moves that various government powers have been taking to institute a totalitarian form of government in this country, it has now become the responsibility of the Cyberpunk movement to take such measures as to prevent these actions from occurring and reverse what damage has already occurred. When one takes into account the various factors involved in reclaiming a democratic state from totalitarian rule, it will be found that the Cyberpunk movement is the best equipped to handle the task. The movement has the necessary political attitudes, equipment, and knowledge to prevent further government progress into totalitarian rule and reverse the steps that have already been taken by various government entities towards that direction. The Cyberpunk movement also has a personal stake in the prevention of totalitarian rule; which has an equal footing with altruism. It is for these reasons that the movement should be at the forefront of "The Second American Revolution", and contribute their knowledge and attitudes to its success, and the restoration of a libertarian form of government to the United States of America. The Cyberpunk movement has always had the libertarian attitude of "The government which governs best, governs least.", and "Technology belongs in the hands of the people". These attitudes follow in the footsteps of the country's founding fathers. The lack of such an attitude by those in power has been a major factor in the totalitarian slides this country has been experiencing. The Cyberpunk movement has also stayed away from the forefront of politics; preferring to stay in the background, let others "run" things, and act as "watchers"; keeping vigilant for lapses in judgement by the ruling powers. This attitude is precisely what is needed for those who will be at the forefront of The Second American Revolution, for once the initial job is done, "disinterested" parties will be needed to ensure the mistakes of the past are not repeated. The existence of well-equipped Cyberpunk "Watchers" will act as a future deterrent to those wishing to revert back to totalitarian ways. The Cyberpunk movement has always given a high priority to acquiring knowledge in many different technological and other fields. They have also been adamant about implementing the mass-distribution of such information. These two factors alone are qualifiers for any group conducting low intensity conflict towards the institution of a libertarian form of government. In addition, the Cyberpunk movement stresses practical "hands-on" applications of the knowledge they collect and disseminate. This is another factor that makes the movement well suited for the task at hand. Since the Cyberpunk movement has the proper attitudes and knowledge available to it, they are well suited for the task of ensuring the United States regains and maintains a libertarian form of government. Just as the founding fathers had a responsibility to create the United States, the freest country in the world; it is now the responsibility of the Cyberpunk movement to restore the freedom that this once great country lost, and to take on the responsibility towards the operational aspects of The Second American Revolution and the re-establishment of a libertarian form of government in this country. There is, however, an even more important and pressing reason as to why the movement should act. Throughout history, even in benign and democratic governments, there has been prejudice towards individuals and groups who have the capability of self-sufficiency. Such groups have been persecuted severely, with their members often facing death. This has occurred even if such groups have had no political leanings whatsoever. They were simply viewed as a threat to the powers that be, and dealt with. By taking a look around, any astute observer will be able to see this beginning to happen with the Cyberpunk movement. In this instance, we have the greatest responsibility of all, the responsibility to ourselves to ensure our survival. One must remember that our responsibility to the revolution does not imply we should organize any more than we already have. In fact, our activities should be kept to small groups, and be as disorganized overall as possible, as to better stay hidden and difficult to track down. Twenty small groups operating on their own will be harder to track down than one large group. If everyone just simply does there part, there will be no problem winning this one. Our shadowy existence and characteristic of being "everywhere and nowhere" will also act as a deterrent to keep the future government leaders from acting as stupid as the ones we presently have in existence. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: FOR THE PEOPLE Supplied By: Those Wacky Secret Service Agents Edited by: Mercenary ------------------------------------------------------------------------------- Secret Service Agents Get Free Vacation Rumor has it that the Secret Service security detail of Secretary of Defense Les Aspin were provided with a swank 6 day/5 night holiday in Venice,Italy Courtesy of U.S. Taxpayers. It seems that Aspin finished off an official business trip in Europe with a jaunt to Italy. Although Mr. Aspin payed for his own expenses and his girlfriends, the SS Agents were provided with $500.00 to $700.00 a nite rooms in the 5-Star Hotel Danieli, courtesy of you and me. Must be nice, probably a reward for harrassing innocent civilians. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary ------------------------------------------------------------------------------- HAN SOLO SELLS OUT TO THE EMPIRE?? I am writing to update you on yet another 203 lamer (this area code seems to be chock full of em) named Rob A. (aka Han Solo and sometimes Lurker). He turned me in to Yale for supposedly hacking an account on their VMS system. They will probably be calling me shortly. His reasons are that I purportedly "screwed him over" with a little deal we had. The deal was, I'd give him a UNIX account at SCSU in exchange for the use of his account on a very nice elite BBS. Things went fine until he got it in his head that I'd shared that unix account with someone else, which was not true. He then took it upon himself, as a "security measure" to turn me in. ------------------------------------------------------------------------------- DR. DETERGENT OF TDT RETIRES?? June 15, 1993 Dr. Detergent / TDT 1993 I herby officially retire from the scene. Got an excellent job which takes me all over the world, so I don't have time for this stuff any more. To all the sysops worldwide, please delete my accounts on your boards. If there are any new applications under my name, you may rest assured that it's not me. It was great serving the Elite underground. Take care all ya boiz - my frienARE MOLES and TRAITORS among us Pirates... these scum of the Earth... who will DL and enjoy many Wares on the unfortunate Boards they are on .... and then Bust those Boards .... perhaps even after being the ULers of their own NOVELL Wares themselves in a Sting operation ( we are checking this out too ) .. those scum are doomed by their own natures to be worthless, friendless creatures ... for what sort of human beings can they be... and no one likes a snitch... and anyone who DOES these acts .. surely will be having a shitty life ... as who else but a totally shitty low-paid small-minded person would do such things. The Revenge of the Fear is that the Traitor Pirate will be found out in the Legal Proceedings OR SOONER & that Novell is doomed anyway ... with UNIX COSE Networking beoming friendlier & even Microsoft getting into the Networking Competition. Through its Pricing and Service and Bugs. Novell's own Life expectancy may not be too high. In fact ... Novells' Stock Prices today at 20&3/4 on the NASDAQ exchange is down today .... they have my sincere wishes for a swift and complete fall into Chapter 11 Bankruptcy. He laughs Best who Laughs Last. Novell may have some Bad Luck in the Future as doing Bad Deeds always comes back to haunt the perpetrator sooner or later and they have made many Enemies.. So I close ... but on a positive note .... Piracy Lives and in fact there are MORE and MORE Pirate Boards now as Piracy becomes more "MainStream" into society with cheap fast Modems and Cyperpunks on MTV. I am just old enough to have experienced the "60's",and I have always regarded Piracy and Pirates as some of the few true remnants of the "60's" Underground Movements . I am happy if I have helped the Doctor - the most unselfish Sysop I have ever known - and one of the FASTEST Sysops... I've seen him Install a Door on all SEVEN Nodes in about 15 minutes ! There won't be another SYSOP like HIM. It was his HOBBY and he was in it for the FUN. Examples of what the Doctor had achieved - 7 Nodes,and 7 Gigs there are very few BBSs PD or Pirate of THAT Size. PLUS the Fear was one of only two BBSs in USA that KEPT ITS WARES for OVER 2 YEARS, ALL ONLINE!! The First ACiD ANSI ACQUISITION was composed and ULed to the Fear. The Doc was one of the 1rst BBSs in USA to go with the new PCBoard V15.0 Betas. The Doctors' BBS was chosen to become a TDT Member BBS and was also chosen to be the ECR Courrier HQ in USA ...AND many many Big Pirates and Group Members on the scene now .... got their start on the Fear & Loathing. In fact ... we used to joke that the Fear was a College for Pirates ! He had Plans to Improve and Increase his BBS even further when he had time. Just last night in fact ... The Doctor installed the ZYRION Protocol. No matter HOW Big his BBS became.. the Doctor ALWAYS had time to answer his Users' Mail . ANd just imagine how exciting it must have been for him to answer questions like .. " How do I use the Zippy Scan" after 10 years of SYSOPing ! When I say he was generous... I mean GENEROUS. Armed Forces Veterans were allowed high access for free ; those users cash-poor or Wares-poor were almost ALWAYS allowed MEGS and MEGS of free credits... in his 10 years of SYSOPing ... maybe ONE person was booted off the Fear and even THAT user could have re-applied for access had the system not automatically booted him off for not ULing a single file. Id say that in the last year alone .. the Doc GAVE AWAY over 300 Megs in Free Credits ..virtually anyone who asked him for help .. went away well satisfied. EVEN LOCALS were allowed on and given High Access so they wouldnt be begging for credits. Now how many other BBSs allow THAT !? He tried to fulfill ANY Users requests and always had a polite word for any user. He was NOT one of those new Sysops-with-an-attitude -2 Node-2 Megs-Im so kewl-type of guys. There is so much I could say ... but I impose too long on anyone who has read this far.... and I thank you for reading this far . All I know is that a BBS that I have had great pleasure calling almost every day for OVER FOUR YEARS is now gone .... and one of the few pleasures in my over-worked life is now no more. When I went to my BBS Directory ... it was the first BBS I called each night.. and the last before I went to bed. I had just Chatted with the Doc last night on how the BBS was improving and all the plans we had to make it even better. You guys woulda really seen something .... there was more growth potential at the Fear than at almost any other BBS I know. All we lacked was TIME . But as Fab said when he "semi-retired" ... how long can you do stuff to impress 15 year old kids ? This is one Hobby with a nasty after-taste. So ... SYSOPS take warning!. For the Doctor and me ... its .... ChildHood's End . C'ya, Empedocles Cosysop - Fear & Loathing in Las Vegas BBS . -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: PHANTASY TIDBITS: News and Views of Interest ------------------------------------------------------------------------------- SNET Operators Now Fowarding ANI Data by Thomas Icom/IIRG/Cybertek A recent experiment conducted by the IIRG has confirmed that Southern New England Telephone is now fowarding ANI data from operator assisted calls. In the past, it was posssible to defeat ANI by having the operator place a call for you. This piece of information has been passed around and accepted as gospel on many different H/P/A boards. To detrmine if your RBOC is fowarding ANI data from operator assisted calls, have the operator dial 1-800-235-1414 for you. This is an ANI service run by Full Disclosure Magazine (P.O. Box 903, Libertyville, IL 60048) and 1-900-STOPPER. If you receive correct ANI data, then your RBOC is passing the data along. One should also note that while 1-900-STOPPER will defeat Caller ID and ANI, it is still a simle matter to suponea the phone company for both incomming ANI and outgoing AMA data from 1-900-STOPPER. These can then be cross-referenced to find out who called whom. Your best bets for privacy are still payphones and buttsets. Let's all be careful out there. IIRG UPDATE: Full Dislosure is now only running an ad for their 900-STOPPER service on the number given in this article. You can however use, 1-800-852-9932 to test the techniques in Icom's article. (Valid as of 8/10/93) ------------------------------------------------------------------------------- FCC Releases Frequencies The FCC has set aside narrowband 901-902,930-931, and 940-941 MHz for wireless communications services or (PCSs) Personal Communications Services such as paging,electronic mail and faxing. The FCC has not chosen a selection process to pick providers of narrowband PCSs, but has said it will pick 11 nationwide licensees and 13 regional licensees and 10 local providers. ------------------------------------------------------------------------------- Put Your Hands in The Air and Give Me Those Chips! A string of armed robberies is haunting Silicon Valley, recently 10 young men armed with handguns forced their way into Bestronics Inc in San Jose and subdued the workers before carting off $15,000 in memory chips. Apparently their MO is to handcuff,beat and torture employees until their told where the parts are stored. Hot items are memory and 386 and 486 CPUs. Youth gangs are cruising industrial parks loking for easy targets. At least 3 companies have been hit in the last month. UPDATE!!: The San Jose Police have arrested a 20-year-old male who they believe is the individual responsible for the recent wave of robberies. Police pulled the man over after noticing the car he was driving had 2 two different license plates. One was from a stolen car used in one of the robberies. After obtaining a search warrant for the mans home, police found memory chips,police scanners,two-way radios,firearms,and hand-cuffs. Police are still searching for 9 more individuals. ------------------------------------------------------------------------------- ATM Bandits Nabbed On Wed. July 7th, Federal Grand Jury indicted Alan Scott Pace,30, and Gerald Harvey Greenfield,50, both of Tucson,Arizona for installing a fake automated teller machine at the Buckland Hills Mall in Manchester,CT. The two men allegedly put a Fujitsu Model 7020 ATM machine that had been modified to record users accounts and PIN's. without paying out cash. They then made duplicates of the cards and used them at banks throughout the country at valid ATM machines. The eight-count indictment charges them with bank fraud counterfeiting of ATM cash cards,interstate transportation of stolen property,and conspiracy. Pace was arrested on June 23rd by the Secret Service in New York and Greenfield surrendered to the Secret Service five days later. They now face 60 years in prison on the combined charges. ------------------------------------------------------------------------------- FBI Calls For Gun Licensing By NEAL KNOX Incredibly the story of the FBI recommendations has only run in the July 8, 1993 New York Times on an inside page and in USA Today on July 9, 1993. No other major newspapers or TV news outlets have even mentioned this proposal as of today, July 10. It is necessary for each and every one of our readers to contact their local legislators and present them with the NRA press release and make your opinions known. NEAL KNOX REPORT WASHINGTON, D.C. (July 11) -- FBI Director William Sessions has recommended to Attorney General Janet Reno that the Clinton Administration call for a wide range of new firearms laws, including licensing the possession of handguns after mandatory training, with "appropriate reimbursement" for firearms of those who can't pass the training or who voluntarily turn in their guns. This incredible document, which notes that the FBI does not publicly comment on political matters to avoid "destroy(ing) confidence" in the agency, says "(t)he proliferation of firearms" and their use in violent crimes justifies "an extraordinary, singular departure from this policy." The last item of Sessions' 10-point recommendation -- which the FBI refuses to release -- calls for the FBI Office of Press and Congressional Affairs to "develop a media strategy to publicize and develop support for the FBI's position." In short, the FBI Director is recommending to Attorney General Janet Reno that she authorize violation of Section 1913 of Title 18, U.S. Criminal Code -- which prohibits lobbying with appropriated funds. Naturally, the FBI recommends enactment of the "Brady Bill," though raising questions about the accuracy of state criminal records checks and other "technical problems." The FBI also recommends "a complete prohibition upon the transfer, importation, transport or possession of assault firearms" -- which are not defined, except as high capacity and "fast firing." Sessions calls for "a complete prohibition upon the possession of armor piercing ammunition," which would be defined "upon performance standards, not composition" -- presumably on the basis of penetration of aluminum plates such as the FBI used in its mid-1980's tests of AP ammo. Much conventional high-velocity handgun ammo can penetrate the Kevlar bullet-resistant vests worn by police. However, because the FBI's recommendation is not limited to handgun ammunition, it could be used to ban almost all center fire rifle ammunition. Finally, the FBI recommends "reallocation of existing resources to increase the regulation and oversight of" Federal licensees -- and, among other things, increase license fees, require an existing place of business, and a background check with fingerprinting of potential dealers. That just happens to jibe with the FBI's long ambition to have BATF's firearms enforcement powers. The "FBI Working Group" which prepared the recommendations "discussed atlength whether the FBI should recommend a general ban on the possession of handguns. After careful consideration, the group concluded that a proposed ban would not receive sufficient support." Clearly, they really wanted an outright handgun ban, but didn't think it would pass and, as they wrote, "would likely place us outside the scope of the current debate over firearms, and thus perhaps marginalize our overall impact." I first thought that the FBI proposal was a trial balloon to make the Administration's firearms recommendations in the omnibus crime bill (due out later this month) appear modest by comparison. But, amazingly, neither of the Washington newspapers has said a word about the FBI's landmark proposals. That indicates that the anti-gun "Washington Post" doesn't want to talk about the Clinton Administration's "next step" until the "first step Brady Bill" has been signed and sealed. The "New York Times" and other newspapers which have reported the FBI recommendations have focussed on their support for the "Brady Bill," with little or nothing about the radical handgun licensing and "assault weapons" (whatever that is) ban. Those reports have speculated that Sessions -- whose job has been hanging by a thread since being charged with ethics violations at the end of the Bush Administration -- was merely currying favor with Reno and the White House. Nonsense. No bureaucrat, or "Working Group" of bureaucrats, would make such a radical recommendation, or openly move to politicize the FBI, without orders -- or at the very least, a wink and a nod -- from someone much higher up. I think we're getting a look at the Clinton firearms platform -- and we'll see all of it before the next four years are over. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [9]: IIRG Distribution Sites (or Gateways to Oblivion) ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// IIRG World HQ: The Rune Stone BBS 14.4k HST Phantasys Home Board Complete IIRG Archives 3000+ Files (203)-832-8441 NUP: Conspiracy IIRG Distribution Site 1: BluePhishen' BBS Fidonet 1:2603/406 IIRG Distribution Site Sysop: Global Death (212)-924-9627 IIRG Distribution Site 2: Deadcity Sysop: RoughNeck Australia Criminal Intent HQ +61-3-417-2060 IIRG Distribution Site 3: The Sanitarium Sysops: Morbid Angel [INC/ACID] Spectral Illusion [ACID/RAZOR] IIRG Distribution Site ACID Member Board INC Courier Board RAZOR 1911 Courier Board VISA World Headquarters (817)PRI-VATE IIRG Distribution Site 4: The WareHouse (203)-TMP-DOWN Curently Under Investigation Sysop: Ionizer IIRG Distribution Site 5: Hollow Tree Productions Sysop: Phantasm TWA Distro IIRG Phantasy D