1282 lines
56 KiB
Plaintext
1282 lines
56 KiB
Plaintext
==Phrack Magazine==
|
|
|
|
Volume Five, Issue Forty-Five, File 6 of 28
|
|
|
|
|
|
// // /\ // ====
|
|
// // //\\ // ====
|
|
==== // // \\/ ====
|
|
|
|
/\ // // \\ // /=== ====
|
|
//\\ // // // // \=\ ====
|
|
// \\/ \\ // // ===/ ====
|
|
|
|
PART III
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
** SUBMISSIONS WANTED ON THE FOLLOWING TOPICS FOR FUTURE ISSUES **
|
|
|
|
Cable Television Descrambling
|
|
PBX Data Terminal Files
|
|
Van Eck Eavesdroping
|
|
Security & Anti-Security Measures (Computers, Networks, Physical Sites)
|
|
Satellite Transmissions (Audio, Video, DATA, Telecommunications)
|
|
Amateur Radio & Television
|
|
Radio Modification Instructions
|
|
Electronics Project Schematics
|
|
X.25 Networking / X.29 Pad Control
|
|
Digital Cellular (GSM/TDMA/CDMA)
|
|
Wireless Data Networking (LAN, WAN)
|
|
|
|
** REMEMBER: Send your university dialups to phrack@well.com ASAP! **
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
A Declaration of the Complaints and Grievances of the United States
|
|
Electronic Community --
|
|
|
|
"They that can give up essential liberty for a little temporary
|
|
safety deserve neither liberty nor safety!" These are Benjamin Franklin's
|
|
words for one of the most important values defining American Government in
|
|
it's infancy. This idea, that people should be given as much freedom as
|
|
possible, and also responsibility for what problems abuse of that freedom
|
|
might bring, is one of the most important differences between our so called
|
|
"Democracy," and a totalitarian despotism. In fact, this value is so
|
|
essential that if it is lost there will be no freedom in the United States
|
|
of America, and no so called "Democracy!" Despite this fact, every day more
|
|
and more of our freedoms, as citizens and residents of the United States of
|
|
America, are being eroded away in the name of safety for us and for our
|
|
government. This erosion of rights and freedoms has touched all areas of
|
|
our lives, from health care and economics, to criminal justice and national
|
|
defense. However, the most profound and dangerous erosion has been in the
|
|
area of technology. We believe this is as good a place as any to begin a
|
|
fight to save our country from continuing to travel down the road to
|
|
despotism. Do not forget that this is only a beginning.
|
|
We, the people of the Electronic Community in the United States of
|
|
America, have been openly repressed and attacked by all branches and
|
|
divisions of the United States Government, in direct violation of our
|
|
natural rights and rights granted to us via social contract! The Electronic
|
|
Community is one of the world's greatest examples of the power of freedom
|
|
and democracy. Most of Cyberspace was not created by businesses looking for
|
|
profit, or by governments looking for more efficient control, but mainly by
|
|
ordinary citizens looking for a medium through which they could communicate
|
|
with others, and express their thoughts and ideas. The computerized
|
|
telecommunications used by the electronic community is a medium unlike any
|
|
that has ever existed. It is a decentralized, mostly uncensored, and public
|
|
forum for open discussion on a world wide basis. It provides ordinary
|
|
citizens with the ability to express their ideas to anyone willing to
|
|
listen, with no economic or social barriers and no prejudgments. It gives
|
|
everyone in the world access to all the knowledge and information the
|
|
world has to offer. It has continually shattered deeply ingrained social
|
|
prejudices concerning characteristics such as age, race, wealth, and sex.
|
|
In fact, it is common to find 14 year olds arguing philosophy with 41 year
|
|
olds on America's computer networks!
|
|
However, instead of embracing this great tool of freedom, the
|
|
United States Government has reacted to it with fear and ignorance. They
|
|
have completely ignored the positive effects the existence of this resource
|
|
is already having on society. In fact, they have done little, if anything,
|
|
to even gain an understanding of the electronic community and it's
|
|
citizens. They have thought only of the damage that could be wrought if
|
|
access to this kind of knowledge and information fell into the "wrong
|
|
hands." They have labeled everyone in the electronic community a potential
|
|
criminal, and have cracked down on any kind of activity which has not met
|
|
their standards. In doing so they have crushed the free flow of ideas,
|
|
trampled on the constitution, and blatantly encroached upon the civil rights
|
|
of the people living and working on American's computer networks. They have
|
|
chosen safety above freedom, and in doing so they have threatened the
|
|
existence of one of the most important social developments of the twentieth
|
|
century...
|
|
They have ensued upon a Campaign of Terror, using fear to control and
|
|
oppress the Electronic Community.
|
|
They have openly and blatantly violated local, state, and federal law, and
|
|
internationally accepted standards for human rights.
|
|
They have used misinformation to set certain areas of the electronic
|
|
community off against one another, or to label certain areas as
|
|
criminal, while they have attacked the entire community without
|
|
regard to action or position.
|
|
They have lied to the press, to themselves, and to the American people in
|
|
order to keep their actions unquestioned.
|
|
They have imposed taxes and tariffs and have priced public utilities with
|
|
the specific intent of effecting a chill upon the free flow of
|
|
thoughts and ideas.
|
|
They have used technology to amass enormous amounts of information on
|
|
innocent citizens in order to control and oppress them.
|
|
They have judged the interests of private industry to be more important than
|
|
the interests of the general population.
|
|
They have attacked innocent citizens in order to increase the profits of
|
|
certain industries.
|
|
They have declared themselves immune from the legal and moral standards
|
|
they expect from the rest of society.
|
|
They have, on a regular basis, committed the very acts they have called
|
|
criminal.
|
|
They have tried to criminalize personal privacy while belligerently
|
|
defending the privacy of businesses and of government.
|
|
They have attempted to control the minds of the American people by
|
|
criminalizing certain knowledge and information.
|
|
They have prevented the preparation of thoughts and ideas for public
|
|
dissemination.
|
|
They have threatened innocent citizens with loss of their right to life,
|
|
liberty, property, and the pursuit of happiness in order to control
|
|
their thoughts, opinions, and actions.
|
|
They have repeatedly made laws and taken legal action in areas and/or
|
|
concerning subjects of which they have little or no understanding.
|
|
They have seized, damaged, and destroyed the property of innocent citizens.
|
|
They have wrongly imprisoned citizens based on questionable information for
|
|
actions which are negligible and, at worst, legally gray.
|
|
They have directly attacked innocent citizens in order to keep them from
|
|
publicly assembling.
|
|
They have spied on and attempted to interfere with the private
|
|
communications of innocent citizens.
|
|
They have made unreasonable and excessive searches and seizures.
|
|
They have punished innocent citizens without trial.
|
|
They have attempted to effect a chill on the free flow of thoughts and
|
|
ideas.
|
|
They have affected to render the government independent of and superior to
|
|
the people.
|
|
We cannot, we WILL not, allow this tyranny to continue! The United
|
|
States Government has ignored the voice of the Electronic Community long
|
|
enough! When we told the government that what they were doing was wrong,
|
|
they refused to listen! When we formed political action groups to bring our
|
|
cases to court and before Congress, we were told that we were using
|
|
loopholes in the law to get away with crime!!! We have, in a peaceful and
|
|
respectful manner, given our government more than reasonable petition for
|
|
redress of our grievances, but if anything the situation has gotten worse!
|
|
Government administrations use computer crime as a weapon in internal
|
|
battles over jurisdiction. Government officials, who have only the
|
|
slightest understanding of computer science, use computer crime as a tool
|
|
for career success. Elected Representatives, who have absolutely no
|
|
understanding of computers, use "information superhighways", computer
|
|
crime, and cryptography to gain constituent money and voter support! The
|
|
Electronic Community, the only group who fully understands the issues
|
|
involved here, and the only group who is effected by the decisions being
|
|
made, has been completely ignored! We have sat around and discussed these
|
|
wrongs long enough! NOW IS THE TIME TO STAND UP AND DEMAND A REDRESS OF OUR
|
|
GRIEVANCES BY ANY AND ALL MEANS AVAILABLE! We must scream the truth so
|
|
loudly that we drown out everything else! We must save our small community
|
|
from destruction so that when the rest of society is ready, the world will
|
|
still have a forum for free speech and open communication. We must demand
|
|
freedom for America's Electronic Community!!!
|
|
|
|
Tom Cross AKA The White Ninja
|
|
TWN615@Phantom.Com
|
|
|
|
NOTE: Redistribution and further publishing of this document is highly
|
|
encouraged as long as proper credit is given.
|
|
|
|
-------------------------
|
|
------------------------- "Government is not a reason, not an eloquence;
|
|
------------------------- it is a force. Like fire, it is a dangerous
|
|
--------------- * * * * * servant and a fearful master."
|
|
--------------- * * * * *
|
|
--------------- * * * * * -- George Washington
|
|
--------------- * * * * *
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly
|
|
========================================================================
|
|
ISSN 1074-3111 Technology, Conspiracy, Editorials, Politics, Networking
|
|
========================================================================
|
|
|
|
Editor-in-Chief: Scott Davis
|
|
NetSurfer: John Logan
|
|
It's A Conspiracy!: Gordon Fagan
|
|
|
|
E-Mail - editors@fennec.com
|
|
** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
|
|
|
|
U.S. Mail:
|
|
The Journal Of American Underground Computing
|
|
10111 N. Lamar #25
|
|
Austin, Texas 78753
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
To Subscribe to "TJOAUC", send mail to: sub@fennec.com
|
|
All questions/comments about this publication to: comments@fennec.com
|
|
Send all articles/info that you want published to: submit@fennec.com
|
|
Commercial Registration for Profitable Media: form1@fennec.com
|
|
|
|
"The underground press serves as the only effective counter to a growing
|
|
power, and more sophisticated techniques used by establishment mass media
|
|
to falsify, misrepresent, misquote, rule out of consideration as a priori
|
|
ridiculous, or simply ignore and blot out of existence: data, books,
|
|
discoveries that they consider prejudicial to establishment interest..."
|
|
|
|
(William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
New TimeWasters T-shirts !
|
|
|
|
Do you know the feeling ? You're behind your terminal for hours,
|
|
browsing the directories of your school's UNIX system. Instead of
|
|
holes, bugs and bad file permissions you find tripwire, TCPwrapper and
|
|
s/key. You run a file with a s-bit and immediately you get a mail from
|
|
the system admin asking what you are doing. In other words, no chance
|
|
to ever become a good hacker there.
|
|
|
|
Now you have the chance to at least pretend to be an eleet
|
|
hacker. The Dutch hacking fanatics The TimeWasters have released
|
|
the third version of their cool 'hacker' T-shirt. Because
|
|
the previous versions were too limited (20 and 25 shirts) we
|
|
printed no less than 200 shirts this time.
|
|
|
|
Of course you want to know, what does it look like ?
|
|
On the front, a TimeWasters logo in color. Below that a picture
|
|
of two hacking dudes, hanging behind their equipment, also
|
|
featuring a stack of phracks, pizza boxes, beer, kodez, and
|
|
various computer-related stuff with a 'No WsWietse' sticker.
|
|
On the back, the original TimeWasters logo with the broken
|
|
clock. Below it, four original and dead funny real quotes
|
|
featuring the art of Time Wasting.
|
|
|
|
Wearing this shirt can only provoke one reaction; WOW !
|
|
Imagine going up to the helpdesk wearing this shirt and
|
|
keeping a straight face while asking a security question !
|
|
|
|
And for just $2 more you'll get a pair of sunglasses with
|
|
the text 'TimeWasters' on them !
|
|
|
|
To order:
|
|
Send $20 or $22 to
|
|
TimeWasters
|
|
Postbus 402
|
|
5611 AK Eindhoven
|
|
The Netherlands, Europe
|
|
This includes shipping. Please allow some time for delivery. If you
|
|
are in Holland, don't send US$, email the address below for the
|
|
price in guilders and our 'postbank' number.
|
|
|
|
For more information: email to:
|
|
- timewasters-request@win.tue.nl with subject: T-SHIRT for a txtfile
|
|
with more info.
|
|
- rob@hacktic.nl or gigawalt@win.tue.nl for questions.
|
|
|
|
Written by Rob J. Nauta, rob@hacktic.nl dd. 8 mar 1994
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Caller ID Technical Details
|
|
by Hyperborean Menace
|
|
|
|
The way Caller ID works internally is through SS7 (Signalling System 7)
|
|
messages between telephone switches equipped to handle SS7. These messages
|
|
pass all the call information (block/no block, calling number, etc.).
|
|
The calling number is sent as part of the SS7 call setup data on all SS7
|
|
routed calls (i.e. all calls carried between switches that are SS7
|
|
connected).
|
|
|
|
The calling number is sent between switches always, regardless of
|
|
whether or not *67 (Caller ID Block) is dialed. It just sends along a
|
|
privacy indicator if you dial *67, and then the final switch in the path
|
|
will send a "P" instead of the calling number to the Caller ID box.
|
|
(But it will still store the actual number - *69 will work whether or
|
|
not the caller dialed *67). What the final switch along the path does
|
|
with the calling number depends on how the switch is configured. If you
|
|
are not paying for Caller ID service, the switch is configured so that
|
|
it will not transmit the Caller ID data.
|
|
|
|
This is entirely separate from Automatic Number Identification, which is sent
|
|
along SS7 where SS7 is available, but can also be sent using other methods,
|
|
so that ALL switches (for many years now) have been able to send ANI (which
|
|
is what Long Distance companies used to know who to bill). Enhanced 911 is
|
|
NOT based on Caller ID, but on ANI, thus, it will work for anyone, not just
|
|
people connected to SS7 capable switches. And, of course, *67 will have no
|
|
effect on Enhanced 911 either.
|
|
|
|
Also interesting is the effect call forwarding has on the various services.
|
|
Say I have my home telephone forwarded to Lunatic Labs, and it has
|
|
Caller ID. If you call me, the call will forward to Lunatic Labs, and
|
|
its Caller ID box will show YOUR number, not mine (since your line is
|
|
the actual one making the call).
|
|
|
|
However, ANI is based on the Billing Number (who is paying for the call (or
|
|
would pay if it weren't free), not on who is actually making the call.
|
|
Thus, if I forward my telephone to an 800 Number that gets ANI (such as the
|
|
cable pay-per-view order number), and you call me, they will get MY number
|
|
(since I would be the one paying for that portion of the call, except that
|
|
800 Numbers are free), and you will end up ordering pay-per-view for
|
|
me...
|
|
|
|
|
|
CNID (Caller ID) Technical Specifications
|
|
|
|
|
|
PARAMETERS
|
|
The data signalling interface has the following characteristics:
|
|
Link Type: 2-wire, simplex
|
|
Transmission Scheme: Analog, phase-coherent FSK
|
|
Logical 1 (mark) 1200 +/- 12 Hz
|
|
Logical 0 (space) 2200 +/- 22 Hz
|
|
Transmission Rate: 1200 bps
|
|
Transmission Level: 13.5 +/- dBm into 900 ohm load
|
|
|
|
(I have copied this data as presented. I believe the
|
|
transmission level is meant to be -13.5 dBm.)
|
|
|
|
[It is indeed -13.5 dBm]
|
|
|
|
PROTOCOL
|
|
The protocol uses 8-bit data words (bytes), each bounded by a
|
|
start bit and a stop bit. The CND message uses the Single Data
|
|
Message format shown below.
|
|
|
|
[ I belive this is the same as standard asynchronous serial - I think the
|
|
start bit is a "space", and the stop bit is a "mark" ]
|
|
|
|
Channel Carrier Message Message Data Checksum
|
|
Seizure Signal Type Length Word(s) Word
|
|
Signal Word Word
|
|
|
|
CHANNEL SEIZURE SIGNAL
|
|
The channel seizure is 30 continuous bytes of 55h (01010101)
|
|
providing a detectable alternating function to the CPE (i.e. the
|
|
modem data pump).
|
|
|
|
[CPE = Customer Premises Equipment --i.e. your Caller ID Box]
|
|
|
|
CARRIER SIGNAL
|
|
The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to
|
|
condition the receiver for data.
|
|
|
|
MESSAGE TYPE WORD
|
|
The message type word indicates the service and capability
|
|
associated with the data message. The message type word for CND
|
|
is 04h (00000100).
|
|
|
|
MESSAGE LENGTH WORD
|
|
The message length word specifies the total number of data words
|
|
to follow.
|
|
|
|
DATA WORDS
|
|
The data words are encoded in ASCII and represent the following
|
|
information:
|
|
|
|
o The first two words represent the month
|
|
o The next two words represent the day of the month
|
|
o The next two words represent the hour in local military time
|
|
o The next two words represent the minute after the hour
|
|
o The calling party's directory number is represented by the
|
|
remaining words in the data word field
|
|
|
|
If the calling party's directory number is not available to the
|
|
terminating central office, the data word field contains an ASCII
|
|
"O". If the calling party invokes the privacy capability, the
|
|
data word field contains an ASCII "P".
|
|
|
|
[ Note that 'O' will generally result in the Caller-ID box displaying
|
|
"Out Of Area" indicating that somewhere along the path the call took from
|
|
its source to its destination, there was a connection that did not pass
|
|
the Caller ID data. Generally, anything out of Southwestern Bell's area
|
|
will certainly generate a 'O', and some areas in SWB territory might also
|
|
not have the SS7 connections required for Caller ID]
|
|
|
|
CHECKSUM WORD
|
|
The Checksum Word contains the twos complement of the modulo 256
|
|
sum of the other words in the data message (i.e., message type,
|
|
message length, and data words). The receiving equipment may
|
|
calculate the modulo 256 sum of the received words and add this
|
|
sum to the received checksum word. A result of zero generally
|
|
indicates that the message was correctly received. Message
|
|
retransmission is not supported.
|
|
|
|
EXAMPLE CND SINGLE DATA MESSAGE
|
|
An example of a received CND message, beginning with the message
|
|
type word, follows:
|
|
|
|
04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51
|
|
|
|
04h= Calling number delivery information code (message type word)
|
|
12h= 18 decimal; Number of data words (date, time, and directory
|
|
number words)
|
|
ASCII 30,39= 09; September
|
|
ASCII 33,30= 30; 30th day
|
|
ASCII 31,32= 12; 12:00 PM
|
|
ASCII 32,34= 24; 24 minutes (i.e., 12:24 PM)
|
|
ASCII 36,30,39,35,35,35,31,32,31,32= (609) 555-1212; calling
|
|
party's directory number
|
|
51h= Checksum Word
|
|
|
|
[ There is also a Caller Name service that will transmit the number and the
|
|
name of the caller. The basic specs are the same as just numbers, but more
|
|
data is transmitted. I don't have the details of the data stream for that.]
|
|
|
|
DATA ACCESS ARRANGEMENT (DAA) REQUIREMENTS
|
|
To receive CND information, the modem monitors the phone line
|
|
between the first and second ring bursts without causing the DAA
|
|
to go off hook in the conventional sense, which would inhibit the
|
|
transmission of CND by the local central office. A simple
|
|
modification to an existing DAA circuit easily accomplishes the
|
|
task.
|
|
|
|
[i.e. The Caller-ID Device should present a high impedance to the line]
|
|
|
|
MODEM REQUIREMENTS
|
|
Although the data signalling interface parameters match those of
|
|
a Bell 202 modem, the receiving CPE need not be a Bell 202
|
|
modem. A V.23 1200 bps modem receiver may be used to demodulate
|
|
the Bell 202 signal. The ring indicate bit (RI) may be used on a
|
|
modem to indicate when to monitor the phone line for CND
|
|
information. After the RI bit sets, indicating the first ring
|
|
burst, the host waits for the RI bit to reset. The host then
|
|
configures the modem to monitor the phone line for CND
|
|
information.
|
|
|
|
According to Bellcore specifications, CND signalling starts as
|
|
early as 300 mS after the first ring burst and ends at least 475
|
|
mS before the second ring burst.
|
|
|
|
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Country Percentage of Piracy
|
|
--------------------------------------------------------
|
|
Australia / New Zealand 45%
|
|
Benelux 66
|
|
France 73
|
|
Germany 62
|
|
Italy 86
|
|
Japan 92
|
|
Korea 82
|
|
Singapore 41
|
|
Spain 86
|
|
Sweden 60
|
|
Taiwan ( 1990 ) 93
|
|
Thailand 99
|
|
United Kingdom 54
|
|
United States 35
|
|
|
|
Source: Business Software Alliance, based on 1992 h/w & s/w
|
|
shipping figures
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
The Frog Farm Mailing List FAQ v1.1
|
|
January 20th, 1994
|
|
|
|
|
|
1. What is this I am reading?
|
|
2. What is the Frog Farm?
|
|
3. Okay, so what's the Frog Farm mailing list?
|
|
4. Are there any rules enforced on the mailing list?
|
|
5. I can see all the addresses of the subscribers!
|
|
6. You must be Nazis. After all, aren't people who hate Jews,
|
|
blacks, etc., the only people who talk about this sort of thing?
|
|
|
|
1. What is this I am reading?
|
|
|
|
This is the FAQ for the Frog Farm mailing list. It is NOT the FAQ
|
|
for the Frog Farm. The FAQ for the Frog Farm is much larger (just
|
|
over 100 Kbytes in size).
|
|
|
|
|
|
2. What is the Frog Farm?
|
|
|
|
Read the FAQ. You can FTP it from etext.archive.umich.edu in the
|
|
/pub/Legal/FrogFarm directory (also accessible via Gopher). If
|
|
you do not have FTP access, you may request the FAQ via e-mail
|
|
from schirado@lab.cc.wmich.edu.
|
|
|
|
|
|
3. Okay, so what's the Frog Farm mailing list?
|
|
|
|
frog-farm@blizzard.lcs.mit.edu is an unmoderated e-mail forum
|
|
devoted to the discussion of claiming, exercising and defending
|
|
Rights in America, past, present and future. Topics include, but
|
|
are not limited to, conflicts which can arise between a free
|
|
people and their public servants when said servants exceed the
|
|
scope of their powers, and possible methods of dealing with such
|
|
conflicts.
|
|
|
|
To subscribe to the list, send a message containing the single
|
|
line:
|
|
|
|
ADD <your-preferred-email-addr>
|
|
|
|
to frog-farm-request@blizzard.lcs.mit.edu.
|
|
|
|
To remove your subscription from the forum, send a message
|
|
containing the single line:
|
|
|
|
REMOVE <same-email-addr-as-above>
|
|
|
|
to frog-farm-request@blizzard.lcs.mit.edu.
|
|
|
|
Note that these commands must be in the BODY of the message; the
|
|
contents of the Subject line are ignored.
|
|
|
|
While you are subscribed, send mail to
|
|
|
|
frog-farm@blizzard.lcs.mit.edu
|
|
|
|
to echo your message to all other list subscribers.
|
|
|
|
|
|
4. Are there any rules enforced on the mailing list?
|
|
|
|
Only two:
|
|
|
|
1) Do not reveal the e-mail addresses of any subscribers to any
|
|
individuals who are not subscribers. You may freely
|
|
redistribute any article posted to the Frog Farm, subject to
|
|
whatever conditions the poster may have placed on it. For
|
|
example, some people attach a notice to their message stating
|
|
that they are NOT allowing the redistribution of their message
|
|
under ANY circumstances, some people stipulate that it may be
|
|
redistributed only if it is unaltered in any way, etc.
|
|
|
|
2) No flaming is permitted. The list maintainers are the sole
|
|
judges of what constitutes flaming.
|
|
|
|
|
|
5. I can see all the addresses of the subscribers!
|
|
|
|
Under normal circumstances, you can't see the names. If you can,
|
|
you had to work at it; if so, you obviously know what you're
|
|
doing, and you should have known better. Try not to let your
|
|
curiosity overwhelm your respect for the privacy of others.
|
|
|
|
The security on this list is not as tight as it could be,
|
|
and it is a trivial process for a knowledgeable hacker or hackers
|
|
to circumvent it. If you know how to do this, please don't do it.
|
|
|
|
|
|
|
|
6. You must be Nazis. After all, aren't people who hate Jews,
|
|
blacks, etc., the only people who talk about this sort of thing?
|
|
|
|
Not at all. The official position of the Frog Farm is that every
|
|
human being, of any sex or race, has "certain inalienable Rights"
|
|
which may not be violated for any cause or reason. Anyone may
|
|
claim and exercise Rights in America, providing they possess the
|
|
necessary courage and mental competence.
|
|
|
|
The Frog Farm provides a List of Interesting Organizations to its
|
|
subscribers, which may include organizations or persons who
|
|
believe in a god or gods, or promote the idea that certain races
|
|
are inferior or perhaps part of a conspiratorial plot to enslave
|
|
everyone else. The list maintainers make every effort to note
|
|
such idiotic beliefs, where they exist, and encourage people not
|
|
to throw out the baby with the bathwater, but to seek the truth
|
|
wherever it may be found.
|
|
|
|
Every individual is unique, and none may be judged by anything
|
|
other than their words and actions.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
The LOD Communications Underground H/P BBS Message Base Project:
|
|
|
|
Information/Order File: Brief Version
|
|
2/17/94
|
|
|
|
|
|
This is a short version of the longer, 35K (12 page) Order/Info file. If
|
|
you want the full file, sample message file, detailed tables of contents file,
|
|
etc. you can request it from lodcom@mindvox.phantom.com or choose menu item
|
|
#5 on the Mindvox Gopher Server by using any gopher and opening a connection
|
|
with the hostname: mindvox.
|
|
|
|
|
|
The Project:
|
|
------------
|
|
|
|
Throughout history, physical objects have been preserved for posterity for
|
|
the benefit of the next generation of humans. Cyberspace, however, isn't very
|
|
physical; data contained on floppy diskettes has a finite lifetime as does the
|
|
technology to retrieve that data. The earliest underground hacker bulletin
|
|
board systems operated at a time when TRS-80s, Commodore 64s, and Apple ][s
|
|
were state-of-the-art. Today, it is difficult to find anyone who has one of
|
|
these machines in operating condition, not to mention the brain cells left to
|
|
recall how to operate them. :-(
|
|
|
|
LOD Communications has created a historical library of the "dark" portion
|
|
of Cyberspace. The project's goal is to acquire as much information as
|
|
possible from underground Hack/Phreak (H/P) bulletin boards that were in
|
|
operation during a decade long period, dating from the beginnings (in 1980/81
|
|
with 8BBS and MOM: Modem Over Manhattan) to the legendary OSUNY, Plover-NET,
|
|
Legion of Doom!, Metal Shop, etc. up through the Phoenix Project circa
|
|
1989/90. Currently, messages from over 75 different BBSes have been retrieved,
|
|
although very few message bases are 100% complete. However, not having a
|
|
complete "set" does not diminish their value.
|
|
|
|
DONATIONS: A portion of every order will be donated to the following causes:
|
|
|
|
1) A donation will be made to help pay for Craig Neidorf's
|
|
(Knight Lightning - Metal Shop Private Co-Sysop) Legal Defense
|
|
bills (resulting from his successful campaign to protect First
|
|
Amendment rights for electronic publishing, i.e. the
|
|
PHRACK/E911 case).
|
|
|
|
2) The SotMESC Scholarship Fund. The SotMESC Scholarship is
|
|
awarded to students writing exceptional papers of 20 to 30
|
|
pages on a topic based on computer culture (ie, hacking
|
|
culture, virus writing culture, Internet culture, etc.) For
|
|
more details write: SotMESC PO BOX 573 Long Beach, MS 39560
|
|
or email: rejones@seabass.st.usm.edu
|
|
|
|
NOTE: THE FIRST DONATIONS TO EACH OF THE ABOVE TWO CAUSES HAVE ALREADY
|
|
BEEN MADE.
|
|
|
|
What Each "Message Base File" Contains:
|
|
---------------------------------------
|
|
|
|
- A two page general message explaining H/P BBS terminology and format.
|
|
|
|
- The BBS Pro-Phile: A historical background and description of the BBS
|
|
either written by the original system operator(s) or those who actually
|
|
called the BBS when it was in operation (it took months to track the
|
|
appropriate people down and get them to write these specifically for
|
|
this project; lesser known BBSes may not contain a Pro-Phile);
|
|
|
|
- Messages posted to the BBS (i.e. the Message Base);
|
|
|
|
- Downloaded Userlists if available; and
|
|
|
|
- Hacking tutorials a.k.a. "G-Philes" that were on-line if available.
|
|
|
|
It is anticipated that most people who are interested in the message bases
|
|
have never heard of a lot of the BBS names shown in the listing. If you have
|
|
seen one set of messages, you have NOT seen them ALL. Each system had a
|
|
unique personality, set of users, and each has something different to offer.
|
|
|
|
|
|
Formats the Message Base Files are Available in:
|
|
------------------------------------------------
|
|
|
|
Due to the large size of the Message Base Files, they will be compressed
|
|
using the format of your choice. Please note that Lodcom does NOT include the
|
|
compression/uncompression program (PKZIP, PAK, MAC Stuffit, etc.). ASCII
|
|
(uncompressed) files will be provided for $5.00 extra to cover additional
|
|
diskette (files that are uncompressed require more than double the number of
|
|
diskettes) and shipping costs. The files are available for:
|
|
|
|
- IBM (5.25 or 3.5 inch)
|
|
- APPLE MACINTOSH (3.5 inch)
|
|
- ATARI ST (MS-DOS Compatible 3.5 inch)
|
|
- AMIGA (3.5 inch)
|
|
- PAPER versions can be ordered but cost triple (due to increased costs
|
|
to ship, time to print, and messages being in 40 column format which
|
|
wastes lots of paper...save those trees!). Paper versions take twice
|
|
the time to deliver but are laser printed.
|
|
|
|
Orders are expected to arrive at the requesters' physical mail box in 3-5
|
|
weeks upon receipt of the order.
|
|
|
|
|
|
The Collection:
|
|
---------------
|
|
|
|
This is where we currently stand as far as what has been completed and the
|
|
estimated completion dates for the rest of the project:
|
|
|
|
Volume 1: 5700+ Messages, 20 H/P BBSes, COMPLETED.
|
|
Volume 2: 2100+ Messages, 25 H/P BBSes, COMPLETED.
|
|
Volume 3: 20-30 H/P BBSes, End of March 1994.
|
|
Volume 4: ????? H/P BBSes, Sometime after 3/94.
|
|
All in all there is expected to be 12000+ Messages.
|
|
|
|
NOTE: Additional material has recently been received for Boards already
|
|
released in the first 2 volumes. Those who have already ordered will receive
|
|
the updated versions with the additional messages that have been recovered.
|
|
|
|
|
|
*** Blurbs and Excerpts: ***
|
|
----------------------------
|
|
|
|
Blurbs from some of those who have received the first two Volumes:
|
|
|
|
"I am stunned at the quality of this undertaking. It brought back that
|
|
feeling of involvement and interest." --P.P.
|
|
|
|
"I think of the release of the H/P Message Bases as an opening salvo in
|
|
the battle for the truth about fraud in the Telecom Industry." --J.J.
|
|
|
|
"Still sifting through Volume one. For now I've taken the approach of
|
|
putting all the files into one subdirectory and searching it for topics
|
|
of interest. Prime and Primos computers was my first topic of interest
|
|
and Volume I yielded quite a bit of odd and useful information." --K.B.
|
|
|
|
"...the professionalism of the Message Bases is of a superior quality.
|
|
Somehow they bring back that age of innocence. Boy do I miss those
|
|
times." --A.C.
|
|
|
|
Excerpt from 2600 Magazine (The Hacker Quarterly) Autumn 1993 Issue,
|
|
review by Emmanuel Goldstein entitled NEVER ERASE THE PAST.
|
|
|
|
"...is this the sort of thing that people really care about? Undoubtedly,
|
|
many will shrug it off as useless, boring teenagers that have absolutely no
|
|
relevance to anything in the real world. The fact remains, however, that this
|
|
is history. This is *our* history, or at least, a small part of it. The boards
|
|
included in this project - Sherwood Forest I & II, Metal Shop Private, OSUNY,
|
|
Phoenix Project, and a host of others - are among the more interesting hacker
|
|
boards, with some classic dialogue and a gang of hacker stars-to-be. Nearly
|
|
all of these boards were raided at one time or another, which makes it all
|
|
even more fascinating."
|
|
|
|
"Had the LODCOM project not come along when it did, a great many of these
|
|
message bases probably would have been lost forever. Providing this service
|
|
to both the hacker community and those interested in it is a noble cause that
|
|
is well worth the price. If it succeeds, some valuable hacker data will be
|
|
preserved for future generations."
|
|
|
|
The Lodcom project was also reviewed in Computer underground Digest Issue
|
|
#5.39 and will be reviewed by GRAY AREAS MAGAZINE in their summer issue. You
|
|
should be able to find the issue on most newsstands in about 3 months. You can
|
|
contact Gray Areas by phone: 215-353-8238 (A machine screens their calls), by
|
|
email: grayarea@well.sf.ca.us, and by regular mail: Gray Areas, Inc. , PO BOX
|
|
808, Broomall, PA 19008-0808. Subscriptions are $18.00 a year U.S. and we
|
|
highly recommend the magazine if you are interested in the gray areas of life.
|
|
|
|
*** {End of Blurbs and Excerpts} ***
|
|
|
|
|
|
Volume 1 & 2 Table of Contents:
|
|
-------------------------------
|
|
|
|
A detailed Table of Contents file can be found on the Mindvox Gopher
|
|
Server or requested via email.
|
|
|
|
|
|
Project Contributor List:
|
|
-------------------------
|
|
|
|
The following is a list (order is random) of those who helped with this
|
|
effort that began in Jan. of 1993. Whether they donated material, uploaded
|
|
messages, typed messages from printouts, critiqued our various materials,
|
|
wrote BBS Pro-Philes, donated services or equipment, or merely 'looked in
|
|
their attic for some old disks', their help is appreciated:
|
|
|
|
Lord Digital and Dead Lord (Phantom Access Technologies/The MINDVOX System),
|
|
2600 Magazine/Emmanuel Goldstein, The Marauder, Knight Lightning, T.B.,
|
|
Computer underground Digest (CuD)/Jim Thomas/Gordon Meyer, Phrack Magazine,
|
|
Strat, Jester Sluggo, Erik Bloodaxe, Taran King, Professor Falken, TUC,
|
|
Lex Luthor, Mark Tabas, Phantom Phreaker, Quasi Moto, The Mechanic, Al Capone,
|
|
Compu-Phreak, Dr. Nibblemaster, King Blotto, Randy Hoops, Sir Francis Drake,
|
|
Digital Logic, The Ronz, Doctor Who, The Jinx, Boca Bandit, Crimson Death,
|
|
Doc Holiday, The Butler, Ninja Master, Silver Spy, Power Spike, Karl Marx,
|
|
Blue Archer, Dean Simmons, Control-C, Bad Subscript, Swamp Ratte, Randy Smith,
|
|
Terminal Man, SK Erickson, Slave Driver, R.E.Jones/CSP/SotMESC, Gray Areas
|
|
Magazine, and anonymous others.
|
|
|
|
|
|
The Order Form:
|
|
---------------
|
|
|
|
- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -
|
|
|
|
LOD Communications H/P BBS Message Base ORDER FORM
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
PERSONAL RATE: Volumes 1, 2, 3, and possibly a fourth if created: $39.00
|
|
This price is TOTAL & includes any updates to individual BBS Message Bases.
|
|
|
|
COMMERCIAL RATE: Corporations, Universities, Libraries, and Government
|
|
Agencies: $99.00 As above, price is total and includes updates.
|
|
|
|
H/P BBS Message Bases (All Volumes): $________
|
|
|
|
"G-Phile" Collection (Optional): $____________ ($10.00 Personal)
|
|
($25.00 Commercial)
|
|
|
|
Disk Format/Type of Computer: _____________________________________
|
|
(Please be sure to specify diskette size [5.25" or 3.5"] and high/low density)
|
|
|
|
File Archive Method (.ZIP [preferred], .ARJ, .LHZ, .Z, .TAR) ____________
|
|
(ASCII [Non-Compressed] add $5.00 to order)
|
|
|
|
Texas Residents add 8% Sales Tax.
|
|
If outside North America please add $6.00 for Shipping & Handling.
|
|
|
|
Total Amount (In U.S. Dollars): $ ___________
|
|
|
|
Payment Method: Check or Money Order please, made out to LOD Communications.
|
|
Absolutely NO Credit Cards, even if it's yours :-)
|
|
|
|
By purchasing these works, the Purchaser agrees to abide by all applicable U.S.
|
|
Copyright Laws to not distribute or reproduce, electronically or otherwise, in
|
|
part or in whole, any part of the Work(s) without express written permission
|
|
from LOD Communications.
|
|
|
|
Send To:
|
|
Name: _____________________________________
|
|
|
|
Organization: _____________________________________ (If applicable)
|
|
|
|
Street: _____________________________________
|
|
|
|
City/State/Zip: _____________________________________
|
|
|
|
Country: _____________________________________
|
|
|
|
E-mail address: _____________________________________ (If applicable)
|
|
|
|
|
|
PRIVACY NOTICE: The information provided to LOD Communications is used for
|
|
sending orders and periodic updates to the H/P BBS Message Base Price List.
|
|
It will NOT be given or sold to any other party. Period.
|
|
|
|
|
|
- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -
|
|
|
|
Remit To: LOD Communications
|
|
603 W. 13th
|
|
Suite 1A-278
|
|
Austin, Texas USA 78701
|
|
|
|
Lodcom can also be contacted via E-mail: lodcom@mindvox.phantom.com
|
|
Voice Mail: 512-448-5098
|
|
_____________________________________________________________________________
|
|
End Brief Version of Order/Info File (2/20/94)
|
|
|
|
|
|
Email: lodcom@mindvox.phantom.com
|
|
Voice Mail: 512-448-5098
|
|
Snail Mail: LOD Communications
|
|
603 W. 13th Suite 1A-278
|
|
Austin, Texas USA 78701
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
BooX for Hackers
|
|
================
|
|
|
|
by Seven Up
|
|
|
|
Usually I am not reading too many books. But there are two rather new
|
|
ones everyone should read and have.
|
|
|
|
UNIX Power Tools
|
|
================
|
|
|
|
The first one is made for people who like to play with UNIX.
|
|
It is called 'UNIX Power Tools', published by Bantam and O'Reilly. It
|
|
contains over 1000 pages and weighs about 3 pounds, but contains a CD
|
|
ROM. It contains pretty useful information and examples on how to use
|
|
standard UNIX utilities and how to solve certain tasks. Some of the topics
|
|
it covers are:
|
|
Encryption of passwords, shell programming, config files for logging in
|
|
and out, setting shell prompts, vi tips & tricks, redirecting and piping,
|
|
sed & awk and much more. Like most O'Reilly books, it is written with
|
|
a lot of humor and easy to read. To me, this book is a reference for almost
|
|
any question. You might even feel that you don't need most of your old
|
|
UNIX books anymore, because this book almost covers it all. It is also a lot
|
|
of fun just to browse through the book randomly and read articles on
|
|
different subjects. There really is no need and no use to read it from A to Z.
|
|
A lot of their tricks is collected from Usenet Newsgroups. All of their use-
|
|
ful programs, scripts and general PD programs you will find on FTP sites
|
|
are on the CD. However, if you want a different medium they charge you $40.
|
|
And now we come to the only problem of the book: the price! I think compared
|
|
to the contents, charging $59.95 is justified; but it might scare off many
|
|
people anyway. Finally I would recommend this book to everyone who uses
|
|
UNIX a lot and likes to experiment and play with it (and has 60 bucks left).
|
|
|
|
|
|
Hacker Crackdown
|
|
================
|
|
|
|
Now reading Bruce's book won't cost you 60 bucks. In fact, it will even
|
|
be totally FREE! I won't say too much about the book, because there have
|
|
already been great reviews in Phrack and 2600 in Spring/Summer 1993. It
|
|
is probably the most interesting and entertaining book about Hackers and
|
|
Fedz from 1993. But now Bruce decided to release the book as online
|
|
freeware - you may just grab the 270k file from a site, read it and give
|
|
it to anyone you want.
|
|
|
|
But let's listen to Bruce now and what he has to say...
|
|
|
|
|
|
January 1, 1994 -- Austin, Texas
|
|
|
|
Hi, I'm Bruce Sterling, the author of this
|
|
electronic book.
|
|
|
|
Out in the traditional world of print, *The
|
|
Hacker Crackdown* is ISBN 0-553-08058-X, and is
|
|
formally catalogued by the Library of Congress as "1.
|
|
Computer crimes -- United States. 2. Telephone --
|
|
United States -- Corrupt practices. 3. Programming
|
|
(Electronic computers) -- United States -- Corrupt
|
|
practices." 'Corrupt practices,' I always get a kick out
|
|
of that description. Librarians are very ingenious
|
|
people.
|
|
|
|
The paperback is ISBN 0-553-56370-X. If you go
|
|
and buy a print version of *The Hacker Crackdown,*
|
|
an action I encourage heartily, you may notice that
|
|
in the front of the book, beneath the copyright
|
|
notice -- "Copyright (C) 1992 by Bruce Sterling" -- it
|
|
has this little block of printed legal boilerplate from
|
|
the publisher. It says, and I quote:
|
|
|
|
"No part of this book may be reproduced or
|
|
transmitted in any form or by any means, electronic
|
|
or mechanical, including photocopying, recording,
|
|
or by any information storage and retrieval system,
|
|
without permission in writing from the publisher.
|
|
For information address: Bantam Books."
|
|
|
|
This is a pretty good disclaimer, as such
|
|
disclaimers go. I collect intellectual-property
|
|
disclaimers, and I've seen dozens of them, and this
|
|
one is at least pretty straightforward. In this narrow
|
|
and particular case, however, it isn't quite accurate.
|
|
Bantam Books puts that disclaimer on every book
|
|
they publish, but Bantam Books does not, in fact,
|
|
own the electronic rights to this book. I do, because
|
|
of certain extensive contract maneuvering my
|
|
agent and I went through before this book was
|
|
written. I want to give those electronic publishing
|
|
rights away through certain not-for-profit channels,
|
|
and I've convinced Bantam that this is a good idea.
|
|
|
|
Since Bantam has seen fit to peaceably agree to
|
|
this scheme of mine, Bantam Books is not going to
|
|
fuss about this. Provided you don't try to sell the
|
|
book, they are not going to bother you for what you
|
|
do with the electronic copy of this book. If you want
|
|
to check this out personally, you can ask them;
|
|
they're at 1540 Broadway NY NY 10036. However, if
|
|
you were so foolish as to print this book and start
|
|
retailing it for money in violation of my copyright
|
|
and the commercial interests of Bantam Books,
|
|
then Bantam, a part of the gigantic Bertelsmann
|
|
multinational publishing combine, would roust
|
|
some of their heavy-duty attorneys out of
|
|
hibernation and crush you like a bug. This is only to
|
|
be expected. I didn't write this book so that you
|
|
could make money out of it. If anybody is gonna
|
|
make money out of this book, it's gonna be me and
|
|
my publisher.
|
|
|
|
My publisher deserves to make money out of
|
|
this book. Not only did the folks at Bantam Books
|
|
commission me to write the book, and pay me a
|
|
hefty sum to do so, but they bravely printed, in text,
|
|
an electronic document the reproduction of which
|
|
was once alleged to be a federal felony. Bantam
|
|
Books and their numerous attorneys were very
|
|
brave and forthright about this book. Furthermore,
|
|
my former editor at Bantam Books, Betsy Mitchell,
|
|
genuinely cared about this project, and worked hard
|
|
on it, and had a lot of wise things to say about the
|
|
manuscript. Betsy deserves genuine credit for this
|
|
book, credit that editors too rarely get.
|
|
|
|
The critics were very kind to *The Hacker
|
|
Crackdown,* and commercially the book has done
|
|
well. On the other hand, I didn't write this book in
|
|
order to squeeze every last nickel and dime out of
|
|
the mitts of impoverished sixteen-year-old
|
|
cyberpunk high-school-students. Teenagers don't
|
|
have any money -- (no, not even enough for the six-
|
|
dollar *Hacker Crackdown* paperback, with its
|
|
attractive bright-red cover and useful index). That's
|
|
a major reason why teenagers sometimes succumb
|
|
to the temptation to do things they shouldn't, such
|
|
as swiping my books out of libraries. Kids: this one
|
|
is all yours, all right? Go give the print version back.
|
|
*8-)
|
|
|
|
Well-meaning, public-spirited civil libertarians
|
|
don't have much money, either. And it seems
|
|
almost criminal to snatch cash out of the hands of
|
|
America's direly underpaid electronic law
|
|
enforcement community.
|
|
|
|
If you're a computer cop, a hacker, or an
|
|
electronic civil liberties activist, you are the target
|
|
audience for this book. I wrote this book because I
|
|
wanted to help you, and help other people
|
|
understand you and your unique, uhm, problems. I
|
|
wrote this book to aid your activities, and to
|
|
contribute to the public discussion of important
|
|
political issues. In giving the text away in this
|
|
fashion, I am directly contributing to the book's
|
|
ultimate aim: to help civilize cyberspace.
|
|
|
|
Information *wants* to be free. And the
|
|
information inside this book longs for freedom with
|
|
a peculiar intensity. I genuinely believe that the
|
|
natural habitat of this book is inside an electronic
|
|
network. That may not be the easiest direct method
|
|
to generate revenue for the book's author, but that
|
|
doesn't matter; this is where this book belongs by its
|
|
nature. I've written other books -- plenty of other
|
|
books -- and I'll write more and I am writing more,
|
|
but this one is special. I am making *The Hacker
|
|
Crackdown* available electronically as widely as I
|
|
can conveniently manage, and if you like the book,
|
|
and think it is useful, then I urge you to do the same
|
|
with it.
|
|
|
|
You can copy this electronic book. Copy the
|
|
heck out of it, be my guest, and give those copies to
|
|
anybody who wants them. The nascent world of
|
|
cyberspace is full of sysadmins, teachers, trainers,
|
|
cybrarians, netgurus, and various species of
|
|
cybernetic activist. If you're one of those people, I
|
|
know about you, and I know the hassle you go
|
|
through to try to help people learn about the
|
|
electronic frontier. I hope that possessing this book
|
|
in electronic form will lessen your troubles. Granted,
|
|
this treatment of our electronic social spectrum is
|
|
not the ultimate in academic rigor. And politically, it
|
|
has something to offend and trouble almost
|
|
everyone. But hey, I'm told it's readable, and at
|
|
least the price is right.
|
|
|
|
You can upload the book onto bulletin board
|
|
systems, or Internet nodes, or electronic discussion
|
|
groups. Go right ahead and do that, I am giving you
|
|
express permission right now. Enjoy yourself.
|
|
|
|
You can put the book on disks and give the disks
|
|
away, as long as you don't take any money for it.
|
|
|
|
But this book is not public domain. You can't
|
|
copyright it in your own name. I own the copyright.
|
|
Attempts to pirate this book and make money from
|
|
selling it may involve you in a serious litigative snarl.
|
|
Believe me, for the pittance you might wring out of
|
|
such an action, it's really not worth it. This book
|
|
don't "belong" to you. In an odd but very genuine
|
|
way, I feel it doesn't "belong" to me, either. It's a
|
|
book about the people of cyberspace, and
|
|
distributing it in this way is the best way I know to
|
|
actually make this information available, freely and
|
|
easily, to all the people of cyberspace -- including
|
|
people far outside the borders of the United States,
|
|
who otherwise may never have a chance to see any
|
|
edition of the book, and who may perhaps learn
|
|
something useful from this strange story of distant,
|
|
obscure, but portentous events in so-called
|
|
"American cyberspace."
|
|
|
|
This electronic book is now literary freeware. It
|
|
now belongs to the emergent realm of alternative
|
|
information economics. You have no right to make
|
|
this electronic book part of the conventional flow of
|
|
commerce. Let it be part of the flow of knowledge:
|
|
there's a difference. I've divided the book into four
|
|
sections, so that it is less ungainly for upload and
|
|
download; if there's a section of particular relevance
|
|
to you and your colleagues, feel free to reproduce
|
|
that one and skip the rest.
|
|
|
|
Just make more when you need them, and give
|
|
them to whoever might want them.
|
|
|
|
Now have fun.
|
|
|
|
Bruce Sterling -- bruces@well.sf.ca.us
|
|
|
|
------------------------------------------------------------------------------
|
|
_ _
|
|
((___))
|
|
[ x x ] cDc communications
|
|
\ / Global Domination Update #14
|
|
(' ') December 30th, 1993
|
|
(U)
|
|
Est. 1986
|
|
|
|
New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1993:
|
|
|
|
_________________________________/Text Files\_________________________________
|
|
|
|
241: "Cell-Hell" by Video Vindicator. In-depth article on modifying the
|
|
Mitsubishi 800 cellular phone by Mr. Fraud himself. Rad.
|
|
|
|
242: "The Darkroom" by Mark Vaxlov. Very dark story about a high school rape
|
|
in the photography lab at school. Disturbing.
|
|
|
|
243: "Fortune Smiles" by Obscure Images. Story set in the future with
|
|
organized crime and identity-swapping.
|
|
|
|
244: "Radiocarbon Dating Service" by Markian Gooley. Who would go out with
|
|
Gooley? YOUR MOM!
|
|
|
|
245: "The U.S. Mercenary Army" by Phil Agee. Forwarded by The Deth Vegetable,
|
|
this file contains a speech by former CIA agent Agee on the Gulf War.
|
|
Interesting stuff.
|
|
|
|
246: "The Monolith" by Daniel S. Reinker. This is one of the most disgusting
|
|
files we've put out since the infamous "Bunny Lust." I don't wanna describe
|
|
this, just read it.
|
|
|
|
247: "Post-Election '92 Cult Coverage" by Omega. Afterthoughts on Tequila
|
|
Willy's bid for the U.S. Presidency.
|
|
|
|
248: "The Lunatic Crown" by Matthew Legare. Wear the crown. Buy a Slurpee.
|
|
Seek the adept. Do not pass 'Go.'
|
|
|
|
249: "Yet Another Suicide" by The Mad Hatter. Guy gets depressed over a girl
|
|
and kills himself.
|
|
|
|
250: "State of Seige" by Curtis Yarvin. The soldiers hunt the dogs hunt the
|
|
soldiers. Like, war, ya know. Hell!
|
|
|
|
__________________________________/cDc Gnuz\__________________________________
|
|
|
|
"cDc: We're Into Barbie!"
|
|
|
|
cDc mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing list!
|
|
Send mail to cDc@cypher.com and include some wonderlessly elite message along
|
|
he lines of "ADD ME 2 DA MAILIN LIZT!!@&!"
|
|
|
|
NEW Official cDc Global Domination Factory Direct Outlets:
|
|
The Land of Rape and Honey 502/491-6562
|
|
Desperadoes +61-7-3683567
|
|
Underworld 203/649-6103
|
|
Airstrip-One 512/371-7971
|
|
Ministry of Death 516/878-1774
|
|
Future Shock +61-7-3660740
|
|
Murder, Inc 404/416-6638
|
|
The Prodigal Sun 312/238-3585
|
|
Red Dawn-2 Enterprises 410/263-2258
|
|
Cyber Neurotic Reality Test 613/723-4743
|
|
Terminal Sabotage 314/878-7909
|
|
The Wall 707/874-1316,2970
|
|
|
|
We're always taking t-file submissions, so if you've got a file and want to
|
|
really get it out there, there's no better way than with cDc. Upload text to
|
|
The Polka AE, to sratte@phantom.com, or send disks or hardcopy to the cDc post
|
|
office box in Lubbock, TX.
|
|
|
|
cDc has been named SASSY magazine's "Sassiest Underground Computer Group."
|
|
Hell yeah!
|
|
|
|
Thanks to Drunkfux for setting up another fun HoHoCon this year, in Austin. It
|
|
was cool as usual to hang out with everyone who showed up.
|
|
|
|
Music credits for stuff listened to while editing this batch of files: Zapp,
|
|
Carpenters, Deicide, and Swingset Disaster.
|
|
|
|
Only text editor worth a damn: ProTERM, on the Apple II.
|
|
|
|
So here's the new cDc release. It's been a while since the last one. It's out
|
|
because I fucking felt like it, and have to prove to myself that I can do this
|
|
crap without losing my mind and having to go stand in a cotton field and look
|
|
at some dirt at 3 in the morning. cDc=cDc+1, yeah yeah. Do you know what this
|
|
is about? Any idea? This is SICK and shouldn't be harped on or celebrated.
|
|
This whole cyberdweeb/telecom/'puter underground scene makes me wanna puke,
|
|
it's all sick and dysfunctional. Eat my shit, G33/<W0r|_<|. Virus yourself to
|
|
death. Go blind staring at the screen waiting for more wares/inph0 to come
|
|
trickling down the wire. The more of that shit comes in, the more life goes
|
|
out. Ooh, and you hate it so much, don't you. You hate it.
|
|
|
|
Hacking's mostly a big waste of time. Fuck you.
|
|
Stupid Telephone Tricks will never be on David Letterman. Fuck you.
|
|
Cryptography? Who'd wanna read YOUR boring email? Fuck you.
|
|
Interactive television is a couch potato trap. Fuck you.
|
|
"Surf the net," sucker. "Ride the edge," you maladjusted sack of shit.
|
|
|
|
S. Ratte'
|
|
cDc/Editor and P|-|Ear13zz |_3@DeRrr
|
|
"We're into t-files for the groupies and money."
|
|
Fuck you, fuck you... and most of all, fuck YOU.
|
|
|
|
Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453.
|
|
Internet: sratte@phantom.com.
|
|
_____________________________________________________________________________
|
|
|
|
cDc Global Domination Update #14-by Swamp Ratte'-"Hyperbole is our business"
|
|
|
|
|
|
ALL NEW cDc RELEASES FTP'ABLE FROM FTP.EFF.ORG -pub/Publications/CuD/CDC
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Introduction to BlackNet
|
|
|
|
|
|
Your name has come to our attention. We have reason to believe you may
|
|
be interested in the products and services our new organization,
|
|
BlackNet, has to offer.
|
|
|
|
BlackNet is in the business of buying, selling, trading, and otherwise
|
|
dealing with *information* in all its many forms.
|
|
|
|
We buy and sell information using public key cryptosystems with
|
|
essentially perfect security for our customers. Unless you tell us who
|
|
you are (please don't!) or inadvertently reveal information which
|
|
provides clues, we have no way of identifying you, nor you us.
|
|
|
|
Our location in physical space is unimportant. Our location in
|
|
cyberspace is all that matters. Our primary address is the PGP key
|
|
location: "BlackNet<nowhere@cyberspace.nil>" and we can be contacted
|
|
(preferably through a chain of anonymous remailers) by encrypting a
|
|
message to our public key (contained below) and depositing this
|
|
message in one of the several locations in cyberspace we monitor.
|
|
Currently, we monitor the following locations: alt.extropians,
|
|
alt.fan.david-sternlight, and the "Cypherpunks" mailing list.
|
|
|
|
BlackNet is nominally nondideological, but considers nation-states,
|
|
export laws, patent laws, national security considerations and the
|
|
like to be relics of the pre-cyberspace era. Export and patent laws
|
|
are often used to explicity project national power and imperialist,
|
|
colonialist state fascism. BlackNet believes it is solely the
|
|
responsibility of a secret holder to keep that secret--not the
|
|
responsibility of the State, or of us, or of anyone else who may come
|
|
into possession of that secret. If a secret's worth having, it's worth
|
|
protecting.
|
|
|
|
BlackNet is currently building its information inventory. We are
|
|
interested in information in the following areas, though any other
|
|
juicy stuff is always welcome. "If you think it's valuable, offer it
|
|
to us first."
|
|
|
|
- - trade secrets, processes, production methods (esp. in
|
|
semiconductors) - nanotechnology and related techniques (esp. the
|
|
Merkle sleeve bearing) - chemical manufacturing and rational drug
|
|
design (esp. fullerines and protein folding) - new product plans, from
|
|
children's toys to cruise missiles (anything on "3DO"?) - business
|
|
intelligence, mergers, buyouts, rumors
|
|
|
|
BlackNet can make anonymous deposits to the bank account of your
|
|
choice, where local banking laws permit, can mail cash directly (you
|
|
assume the risk of theft or seizure), or can credit you in
|
|
"CryptoCredits," the internal currency of BlackNet (which you then
|
|
might use to buy _other_ information and have it encrypted to your
|
|
special public key and posted in public place).
|
|
|
|
If you are interested, do NOT attempt to contact us directly (you'll
|
|
be wasting your time), and do NOT post anything that contains your
|
|
name, your e-mail address, etc. Rather, compose your message, encrypt
|
|
it with the public key of BlackNet (included below), and use an
|
|
anonymous remailer chain of one or more links to post this encrypted,
|
|
anonymized message in one of the locations listed (more will be added
|
|
later). Be sure to describe what you are selling, what value you think
|
|
it has, your payment terms, and, of course, a special public key (NOT
|
|
the one you use in your ordinary business, of course!) that we can use
|
|
to get back in touch with you. Then watch the same public spaces for a
|
|
reply.
|
|
|
|
(With these remailers, local PGP encryption within the remailers, the
|
|
use of special public keys, and the public postings of the encrypted
|
|
messages, a secure, two-way, untraceable, and fully anonymous channel
|
|
has been opened between the customer and BlackNet. This is the key to
|
|
BlackNet.)
|
|
|
|
A more complete tutorial on using BlackNet will soon appear, in
|
|
plaintext form, in certain locations in cyberspace.
|
|
|
|
Join us in this revolutionary--and profitable--venture.
|
|
|
|
|
|
BlackNet<nowhere@cyberspace.nil>
|
|
|
|
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3
|
|
|
|
mQCPAixusCEAAAEEAJ4/hpAPevOuFDXWJ0joh/y6zAwklEPige7N9WQMYSaWrmbi
|
|
XJ0/MQXCABNXOj9sR3GOlSF8JLOPInKWbo4iHunNnUczU7pQUKnmuVpkY014M5Cl
|
|
DPnzkKPk2mlSDOqRanJZCkyBe2jjHXQMhasUngReGxNDMjW1IBzuUFqioZRpABEB
|
|
AAG0IEJsYWNrTmV0PG5vd2hlcmVAY3liZXJzcGFjZS5uaWw+
|
|
=Vmmy
|
|
-----END PGP PUBLIC KEY BLOCK-----
|