Copy Link
Add to Bookmark
Report

Activist Times Inc. Issue 036

eZine's profile picture
Published in 
Activist Times Inc
 · 5 years ago

  


**** ******** ********
****** ******** ********
** ** ** **
******** ** **
** ** ** **
** ** ** ********
** ** ** ********
c i n
t m c
i e .
v s
i ,
s
t

Hi, We're Back!!
Issue 36
May 1, 1989
>> Special May Day Issue!! <<
/ /
/ /
Activist Times, Inc. ATI is a
journalistic, causistic, /
/cyberpolitical /
/organization, / 4 more info?
/trying to / send SASE
/help y'all, and us / stamps???
change the world / to:
radically, in less / ATI
than two minutes / P.O. Box 2501
increments. / Bloomfield, NJ
- - - - - - - - - 07003




Hello. Welcome to ATI36. Tonight's a
night for insomnia and indigestion for
me, so what better time to write ATI36?
No time like the present!

Ok, first things first. I promised the
Doc Telecom/Raider article for this
issue, which unfortunately I can't
deliver. It's going to be a mammoth
project, because I want it to be really
excellent. I feel that a lot of people
can benefit from reading their story.
So, it WILL be done, and soon. But not
this time around. Sorry, folkz!

In this issue, we have lots of info for
you all: Illegal tapping by telcos,
Earth Day, Madonna, Phone terrorism,
media antics, and more.. First off, we
have Mad Pirate (201):
* * * * * * * * * * * * * * * * * *

Well, Here I am in my first real
excursion into writing for a large
group of people. Here it goes.

I have a few really good Ideas on how
to get revenge on people...By thrashing
the insides of their motorized vehicle
engines... Here they are:

Car Engines

To really screw somebody's day up,
you first get your hands on some nice
steel filings. (The bigger the chunks
The faster it wreaks its damage) I
find that steel works better. You
then pour the filings (about a cup
or so) into a container large enough
so that you can add roughly a quart
of oil. Then mix this up,so that the
filings are equally suspended in the
oil, and pour the entire concoction
into the engine, as if you were
adding oil to it. The Person that
is driving the car will suddenly
develop severe problems with their
car!

There are other ways to ruin a car...

Pour Water into the gas
Pour a water and sugar mixture into
the gas.

I'm sure there are many more ways,but
due to limited space,I can't print
them all.


(II) Transmissions

Using aforementioned steel filings,
substitute transmission fluid for oil
and pour it down respective tube
leading into transmission.



(III) Dirt Bike Engines (2-stroke)

To Kill a person's Dirt bike, pour
sand, steel filings, or even a few
nuts and bolts into the crankcase,
via the oil port.

Another particularly vicious way to
do in a dirt bike is to make a solution
of sugar and water,and add this to the
gasoline. When the engine is running,
it will evaporate the water. The sugar
will then solidify,and burn because
the heat of the engine will cook it,
causing an ugly mess of carbon and goo
to form inside the cylander. Needless
to say,the person will not be very
happy about this as the engine will
no longer continue to run.

If you have time to spare,you can drain
the gas which contains oil which lubri-
cates the piston while the engine is
running, and replace it with oil free
gasoline. The next time the person
attempts to ride,his engine will seize.


Well,that's all I can think of for now.

And remember...Revenge is a dish that
is best served cold.

----------------
-The-Mad-Pirate-
----------------
(If you need to get in touch with me,
to offer advice,suggestios on what to
write next,or whatever, call Red Phone
BBS and leave me E-Mail. The Number is
201-748-4005. Happi Hacking!)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
---> Music Department <---

After I took over producing ATI, I
noticed that we have been lacking in
the musical commentary that used to be
ever present in older ATI issues. So...
I decided to say a few words about pop
music, more specifically, Madonna's new
song. And where Madonna is concerned,
the term "music" is of course used
very loosely (Pun intended!).

"When you call my name
It's like a little prayer
I'm down on my knees
I wanna take you there"

NICE lyrics! Yeah, that's what we
can expect from Madonna. But her new
song and video, "Like A Prayer" tells
us things about Madonna we didn't know.
We know that carries herself like
a prostitute. We know that she's the
epitome of bad taste. And we know that
she has no talent nor class whatsoever.
But what we didn't know that she would
show disrespect for the church as she
did in her video. Now, I'm not a
religious type, but I find the sight of
Madonna rolling around atop an alter to
be offensive. Not to mention the sight
of her smooching with a religious
statue that comes to life in the video.
Even worse is the sight of holes
opening up in her hands resembling the
way Jesus' hands were torn by his being
nailed to the cross. Is she trying to
liken herself to Christ? I should hope
not. At least not in THAT outfit!
We also didn't know that someone
as apolitical and as uninterested in
social issues would make a vain attempt
to use the issue of racism in her video
to promote her song. In the video, a
young Black man is accused of assault-
ing a white woman after 3 white men had
actually comitted the crime. Madonna
then skips into jail flipping her hair,
and has him released. And we wonder, as
Madonna sings out of key standing in
front of 5 burning crosses, why she's
attempting to cash in on this sort of
thing when her superficiality and
insincerity obviously shine through.
We don't know Madonna's motivation
for presenting such offensive trash.
But--what we do know is that Madonna
and her "music" are of little worth
or consequence. Indeed...


!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Some brief news items I decided to
include:

It seems that a previous issue of ATI
gave some incorrect information. We
stated that Joe Friday (918) was busted
for toll fraud. This was incorrect
because WE were lied to by a friend of
his! It seems that Joe decided to let
out a false rumor of him being busted
deliberately. I asked Joe why he did
this, and his response was "becase I
was getting too many phone calls, and
I figured a bust rumor would scare them
into not calling". Gee Joe, the rest
of the modern world CHANGES THEIR
NUMBER when encountered with that
situation!


We here at ATI completely and utterly
disapprove of the intentional spreading
of false rumors, especially false bust
rumors. Since there is more than ample
confusion and panic in the phreaking
community, we feel that false bust
rumors add to the paranoia greatly. I
myself have observed that about 1/3
of the busts I've heard about were
completely fabricated, usually by the
person who was supposedly "busted"!

Apparently Joe Friday has run into a
windfall of computer equipment and put
up a "phreak" BBS. We will obtain the
number, call it and give you a full
report in a future ATI! In the
meantime, Joe is invited to provide an
eager audience with his side of the
story. I'll give him the last word.

And here's an unrelated item: It has
been proposed that the NCIC's online
records become expanded. The NCIC
(National Crime Investigation Center)
is a governmental mainframe that
receives millions of inquiries each day
by over 70,000 agencies. It provides
info on people who have been convicted
of felonies. But it's been proposed
that the NCIC's records include info
on people who are only SUSPECTED of
committing felonies. If this is to come
about, some severe intrusions on
privacy of millions of Americans will
come about. And if you're a political
activist, phone ohreak, etc.. expect
YOUR info to be in the NCIC soon.

If it's not already there..

Also: A 28 year-old investment banker
in NYC was attacked by as many as 12
youths in Central Park while she was
jogging. She was beaten over the head
with a pipe and other objects and
raped by many assailants. Since then,
she has been in a coma, and after two
weeks is only starting to come out now.
There has been a lot of furor over the
attack. NYC mayor Ed Koch said, "We
will see how the justice system will
perform in this incident..", meaning
that some kind of "example" must be
set. Soon after he said that, eight
Black teens were arrested for the
attack, ranging in age from 14 to 17.
They have been held without bail and
arraigned, and it has been reported
that they said the attack was "fun"
and showed no remorse.

Reverend Al Sharpton said that the
teens should be "excused" from the
crime due to their age and the fact
that they grew up in a "bad" environ-
ment. And recently, tycoon Donald
Trump took out full-page ads in all
four major NYC newspapers saying,
"Bring back the death penalty...Bring
back the police!", in huge bold print.
The ad preaches absolute intolerance
for the teens, and has made many
people angry, including myself. What
right does he have to demand the death
penalty for criminals when he is one
himself? And what right does he have to
plaster his opinions everywhere just
because he's rich? What makes his
opinion more important that anyone's?

Indeed, as Koch said, we WILL see how
the justice system performs in this
case. Should be an interesting show..

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

And now, some more news items of
interest written by Nightcrawler (516):
=============================================================================
Nightcrawler's News from the Net
=============================================================================

Today's Independent newspaper contains an advert by BMW which provides yet
further evidence of the automative industry's flagrant disregard for the
possible risks associated with new computer-based technology. The main text o
the advert is reprinted below, in its entirety, followed by a brief note of
some of what I regard as the more obvious risks.

BEFORE A BMW WILL START IT WEIGHS UP WHO'S DRIVING

First BMW brought you ABS, for safer braking in the wet. Then came ASC, to
help counter wheelspin during acceleration. Today, they can unveil DWS:
probably the most significant advance in anti-theft technology to occur in
recent years.

DWS stands for Driver's Weight Sensor. A unique system that compares the
driver's weight with a pre-programmed value stored in the sensor's computer
memory. If the two values do not match, the car simply refuses to start.

Clearly, this represents a whole new level of anti-theft sophistication.
But one that has only be made possible thanks to recent advances in space
satellite PHAT technology. This remarkable new material - Poly Halide Anodal
Tritium - exhibits a highly predictable change in electrical conductivity
according to the pressure exerted upon it. By harnessing these properties,
BMW's engineers have devised a wafer-thin pressure pad that, when
incorporated into the driver's seat, can electronically assess the occupant's
weight to within 10 grams accuracy.

Such is the system's intelligence, it will take account of bodyweight
variations that occur according to the time of day, or even the time of year.
This it achieves by interlocking with the car's on-board 365-day digital
clock. Accurate allowance can then be made for weight increases that may be
expected immediately after meal times, and those that are caused by
multi-layer clothing during the winter months.

Despite its space age technology, the operation of DWS is simplicity itself.

On entering the car, the driver inserts the ignition key, at which point the
words ?Code Enter' flash up on the dashboard LED display. Up to five of these
codes can be stored for five different drivers. The driver now enters his
personal code on the key pad and his weight appears on the light-up display,
expressed in either pounds or kilos. (Lady drivers who would prefer this
visible display switched off should consult their BMW dealer, who will carry
out the small necessary adjustment free of charge.)

The sensor weight reading is then compared to the programmed weight in the
memory, and providing this falls to within +-5%, the car will start normally.
If, however, the figure exceeds these tolerances, then a discreet gong
sounds, and the entire ignition system shuts down.

Should persistent attempts be made to restart the car, an alarm system is
triggered, and the headlights flash alternately until the unauthorised person
vacates the seat and re-closes the door.

At the same time a pre-recorded message is transmitted on the standard
police radio frequency, notifying all walkie-talkie equipped police officers
within 350 metres of the car's registration number.

If you'd like to know whether the Driver's Weight Sensor anti-theft system
can be fitted to your car, contact your local BMW dealer, or post off the

Some likely risks:

Just when you have arrived back from a week-end backpacking, and are desperate
to get to MacDonald's before they close, the car is likely to refuse to
recognise you. (The opposite problem is perhaps not so bad - for example, it
would be good for you to be occasionally forced to walk or jog to
WeightWatcher's class.)

Suppose the car does consent to take you to MacDonald's, the weight display,
which I assume is dynamically updated, will be an additional and dangerous
distraction while you drive home eating your Big Mac. (A head-up display would
reduce this risk.)

A person's weight variations over the year are strongly correlated to cultural
racial, and religious factors. Almost certainly, therefore, this system will
provide another example of "computerized discrimination".

There is even a security-related risk. By periodically dieting, a spy could us
the occasional transmissions of the pre-recorded message as a covert signallin
channel to a near-by embassy, say.

============================================================================

GALACTIC HACKER PARTY

2nd, 3rd, 4th of August 1989
PARADISO, AMSTERDAM, HOLLAND

During the summer of 1989 the world as we know it will go into overload.
An interstellar particle stream of hackers, phone phreaks, radioactivists
and assorted technological subversives will be fusing their energies into a
media melt-down as the global village plugs into Amsterdam for three
electrifying days of information interchange and electronic capers.

Aided by the advanced communications technology to which they are accustomed,
the hacker forces will discuss strategies, play games, and generally have a
good time. Free access to permanently open on-line facilities will enable the
to keep in touch with home base -- wherever that is.

Those who rightly fear the threat of information tyranny and want to learn wha
they can do about it are urgently invited to interface in Amsterdam in August.
There will be much to learn from people who know. Celebrity guests with
something to say will be present in body or electronic spirit.

The Force must be nurtured. If you are refused transport because your laptop
looks like a bomb, cut off behind enemy lines, or unable to attend for any
other reason, then join us on the networks. Other hacker groups are requested
to organize similar gatherings to coincide with ours. We can provide low-cost
international communications links during the conference.

For further information, take up contact as soon as possible with:

HACK-TIC PARADISO
P.O. box 22953 Weteringschans 6-8
1100 DL Amsterdam 1017 SG Amsterdam
The Netherlands The Netherlands

tel: +31 20 6001480 tel: +31 20 264521 / +31 20 237348
fax: +31 20 763706 fax: +31 20 222721

============================================================================

PC WEEK (March 27, 1989) reports:

"The recent rash of remote local area network software
packages has thrust the PC industry into a national
controversy over electronic monitoring and workers'
rights to privacy.

At question is whether or not products such as . . .
Microcom Inc.'s Carbon Copy, which can be configured to
allow undetected monitoring of PCs, violate workers'
Fourth Amendment rights 'of people to be secure in
their persons, houses, papers and effects, against
unreasonable searches and seizures.'

In answer to complaints from Massachusetts unions that
workers' rights are being violated, the Massachusetts
Coalition of New Office Technology (CNOT) plans to set
up some guidelines to regulate employers who opt for
electronic monitoring. The group's first step is to
file a bill with the Massachusetts Dept. of Labor that
would force employers to notify job applicants of any
electronic monitoring . . . and to inform workers when
they are being monitored."

Carbon Copy is usually perceived as software which allows one PC to be
controlled from another remotely located one. But programs like Carbon Copy
can be configured to observe network activity without a user's permission,
detection, or override. Lisa Morel of Microcom reports that: "the ones who

While monitoring software can provide important network trouble- shooting and
tuning help, users may view its secret operation as "condoned tapping."
Monitoring differs from event logging. More than recording what the user does
monitoring software clones the user's activity on the observer's terminal.

Interest in using undetected monitoring programs may increase with growing
concern about network security and management. These programs are not limited
to PC platforms. Moreover, serious reservations reach beyond the nasty
business of how managers gather employee performance data.

o The observer may monitor user access to organizationally
sensitive information.

o Secret monitoring conflicts with the Information Resource
Management (IRM) principle of user data ownership.

o From a lay legal view:

- In a Federal government environment (including
contractors), secret monitoring of user access to
personnel information could lead to violation of the
Privacy Act of 1974 (Public Law 93-579).

- Undetected monitoring of a third-party's remote session
could violate the Electronic Communications Privacy Act
of 1986 (Public Law 99-508).

In efforts to preserve security and integrity, are system managers and their
parent organizations prepared to handle the ramifications of secret monitoring

===========================================================================

Subject: Computer blunders blamed for massive student loan losses

Bank of America and possibly other major international banks stand to lose
as much as $650 million on bad student loans, due to computer problems at
United Education and Software.

The 'Wall Street Journal' for Friday, March 10, provides the first hints of
details I've seen on the nature of the "computer blunders" which earlier
stories hinted at. The article, by Charles F. McCoy and Richard B.
Schmitt, is headlined UNITED EDUCATION'S COMPUTER BLUNDERS FORM VORTEX OF
BIG STUDENT LOAN FIASCO. Excerpts:

Computers at United Education and Software, Inc. ... ran wild for at
least eight months. They rejected payments from overdue borrowers
and addressed collection notices intended for New Yorkers to such
places as "Radio City, N.Y.," among other gaffes. United Education
and its colossal computer mistakes are at the heart of what is
emerging as one of the most tangled loan fiascos in years...

The U.S. Dept. of Education has refused to honor guarantees on certain
federally backed student loans serviced by United Education. That
raises the possibility that BankAmerica or other banks that backed
the loans with letters of credit will have to shoulder huge defaults.
Citicorp and several Japanese banks, dispute how much of the liability

United Education's beserk computer produced records that are so fouled
up that nobody knows how much the losses eventually will be.

United Education and Software, oringinally a trade-school operator,
began servicing student loans in 1983, and grew rapidly, developing
a portfolio of more than $1 billion in less than five years... The
computer problems apparently stemmed from United Education's switch
to a new system in October 1987. According to officials familiar with
the problems, United Education's programmers introduced major software
errors and failed to properly debug the new system.

Among the results, according to a Dept. of Education audit report:
United Education sent delinquency notices to students who were still
in school and thus weren't scheduled even to begin payments on the loans.
It placed students who were supposed to have been granted deferments
into default. It didn't inform many laggard borrowers that they were
delinquent, while informing some current borrowers that they were. The
computers also apparently logged telephone calls that were never made
and didn't log calls that were. United Education applied payments to
interest when they were supposed to be applied to interest and principal...

Aaron Cohen, president of United Education, called the depth of the
problems identified by the audit a "shock." He said the company was
aware of bugs in the new software that were causing accounting errors,
but had no idea its loan servicing operation had run amok. He thought
any problems were routine. "Software companies have problems all the
time," he said...

------------------------------

Subject: Prisoner access to confidential drivers' records

From a story by Leo Wolinsky in the 'Los Angeles Times' 5-March-89:

way, state prisoners soon will be put to work sorting through
confidential motor vehicle records as part of the governor's plan
to keep inmates working and save taxpayers money.

But the program, which is set to begin July 1, is prompting con-
cern among some lawmakers and other officials who worry that the
records -- which include names, addresses and some financial
information about California motorists -- might end up in the
hands of career criminals.

"The concept boggles the mind," said Assemblyman Richard Katz,
chairman of the Transportation Committee. "They may be car thieves...
They may have killed people or molested kids and now we're going to
It seems like an open invitation for trouble."

.... No one is sure what illicit uses, if any, inmates might make
of the information. But the Legislature's nonpartisan analyst
charged in a report that procedures employed by the state "may not
be adequate" to ensure the security of the documents. "From our
position, there is a fair amount that could be done even with this

officers said they believe the inmates were searching for addresses
of prison officials .....

PS. It is not clear from the newspaper article whether the records involved
would be paper or on-line, so, strictly speaking, this may not involve any
computer-based system RISK.

------------------------------
VIRUS HITS HOSPITAL COMPUTERS

A "virus" infected computers at three Michigan hospitals last
fall and disrupted patient diagnosis at two of the centers in
what appears to be the first such invasion of a medical computer,
it was reported last week.

The infiltration did not harm any patients but delayed diagnoses
by shutting down domputers, creating files of nonexistent patients
and garbling names on patient records, which could have caused more
serious problems.

"It definitely did affect care in delaying things, and it could have
affected care in terms of losing this information completely," said
Dr. Jack Juni, a staff physician at the William Beaumont Hospitals
in Troy and Royal Oak, Mich., two of the hospitals involved. "It
was pretty disturbing."

If patient information had been lost, the virus could have forced
doctors to repeat tests that involve exposing patients to radiation,
Juni said. The phony and garbled files could have caused a mix-up
in patient diagnosis, he said.

"This was information we were using to base diagnoses on," said Juni,
who reported the case in a letter in the New England Journal of
Medicine. "We were lucky and caught it in time."

=========================================================================

Date: Tue, 28 Mar 89 08:06:39 PST
Subject: Prank Virus Warning Message

An individual placed a time bomb message on a government service system in the
San Francisco Bay Area saying, "WARNING! A computer virus has infected the
system!" The individual is learning that such a prank is considered almost as
funny as saying that you have a bomb in your carry-on luggage as you board a
plane.

Bruce Baker, Information Security Program, SRI International

===========================================================================

Date: Mon, 27 Mar 89 13:27:32 BST
Subject: Subversive bulletin boards

This week's (26 March.) Sunday Times (UK) has an article relating to a Bulleti
Board being run by a 14-year-old boy in Wilmslow, Cheshire, England, which
contains information relating to such things as making plastic explosives.
Anti-terrorist detectives are said to be investigating for possible breaches o
the Obscene Publications Act. Apparently reporters were able to easily gain
access to this bulletin board and peruse articles on such subjects as credit
card fraud, making various types of explosive, street fighting techniques and
dodging police radar traps. One article was obviously aimed at children and
described how to make a bomb suitable for use on "the car of a teacher you do
not like at school," which would destroy the tyre of a car when it was started
The boys parents did not seem to think that their son was doing anything wrong
preferring him to be working with his computer rather than roaming the streets
A London computer consultant, Noel Bradford, is quoted as having seen the
bulletin board and found messages discussing "how to crack British Telecom, ho
to get money out of people and how to defraud credit card companies. Credit
card numbers are given, along with PIN numbers, names, addresses and other
details."

====================================================================

From: "David.J.Ferbrache" <davidf@cs.heriot-watt.ac.uk>
Subject: UK Computer Threat Research Association

For those of you interested an umbrella organisation has been established
in the UK to co-ordinate information on, and research into all aspects of
computer security. In the first instance one of the organisations primary
concerns will be combatting the threat posed by computer viruses by
acting as a clearing house for virus information and control software.

Below is a copy of an initial letter mailed to prospective members:

The Computer Threat Research Association

The computer threat research association, CoTra is a non-profit making
organisation that exists to research, analyse, publicise and find solutions fo
threats to the integrity and reliability of computer systems.

The issue that caused the formation of CoTra was the rise of the computer
virus. This problem has since become surrounded by fear, uncertainty and doubt
To the average user the computer virus and its implications are a worry of an
unknown scale. To a few unfortunates whose systems have become a critical issu
The key advantage of CoTra membership will be access to advice and information
Advice will be provided through publications, an electronic conference (a
closed conference for CoTra's members has been created on the Compulink CIX
system) as well as other channels such as general postings direct to members
when a new virus is discovered.

CoTra membership will be available on a student, full or corporate member
basis. All software that is held by CoTra that enhances system reliability,
such as virus detection and removal software, will be available to all members
It is intended to establish discounts with suppliers of reliability tools and
services. A library of virus sources and executables and other dangerous
research material will be made available to members who have a demonstrable
need.

A register of consultants who have specific skills in the systems reliability
field will be published by CoTra and reviews of reliability enhancing software
will be produced.

Your support of CoTra will ensure that you have the earliest and most accurate
information about potential threats to your computer systems.

CoTra, The computer threat research association,
c/o 144 Sheerstock, Haddenham, Bucks. HP17 8EX

Part of the organisation's aim is to establish reciprocal links with other
similar organisations worldwide to facilitate the sharing of experience and
rapid flow of information on new threats.

To this end if you are involved in, or have contacts with, a similar
organisation in your country, please write to CoTra (or by email to me, and I
will forward your correspondence) outlining your organisation and its aims.

Yours sincerely,
Dave Ferbrache, Dept of computer science, Heriot-Watt University, 79 Grassmark

==============================================================================

Guess what? We've run out of space!
So we will spill everything else we
have for you into ATI37. Go download

OK
it now.... OK?

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT