Copy Link
Add to Bookmark
Report

Phantasy Issue 02 Vol 01

eZine's profile picture
Published in 
Phantasy
 · 5 years ago

  

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
= =
- WELCOME TO THE SECOND ISSUE OF -
= =
- -=>PHANTASY<=- -
= =
- A MONTHLY PUBLICATIOM AND NEWSLETTER OF -
= =
- THE -
= INTERNATIONAL =
- INFORMATION -
= RETREIVAL =
- GUILD -
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Volume Number One,Issue Number Two Dated 11/12/90

Table of Discontents:

[1] The IIRG meets the FBI (Part 2)
[2] Hacker Information and Where to obtain it
[3] High-Explosives for Fun and Profit
[4] The I.I.R.G. attends the 8th Annual Ct. CES Show
[4] PHANTASY NEWS
[5] Listing of PHANTASY Distribution Sites


OFFICIAL DISLAIMER...

All information in PHANTASY is from USER contributed material
The Publishers and Editors of PHANTASY and THE IIRG disclaim
any liability from any damages of any type that reader or
user of information contained within this newsletter may encounter
from the use of said information.

PHANTASY is (C) 1990 by The IIRG
IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982


Editors Note- PHANTASY is a Free-world Publication
Distribute Freely

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section One: The International Information Reteival Guild
Meets the FBI (Part Two)

To Clarify a few things,Let us just state we're reporting on how this
informal gathering took place. We in NO-Way trusted this agent or
took anything he said seriously. Several of us are former military service
members and know the Governments Policy of DISINFORMATION.
We're just reporting on what took place at this meeting and nothing
more. We believe that this Agents comments should be taken for there
entertainment value only and nothing more.

Now on with Part II...

FBI AGENT-I guess a senator Ribicoff back in 1979,he had the foresight to
institute the proposed legislation in that area.
It took them from 1979 to 1984 to finally get the bill passed,and
out of our office there's only been two prosecutions since 1984.
and you look at some of the reasons why and one of the biggest
ones would be they don't want to report it. A bank doesn't want
to report they have someone in there computer fooling around with
all there accounts. They don't want to let people know that
basically there money is unsafe and that at any moment there
accounts can be all fouled up,Which usually there fouled up
nine out of Ten times anyway.

Anonymous-It takes a while for people to realize things are being
manipulated, I'm a computer operator and if somebody was logging
onto our system illegally it would be hard to find out until
after a while.

FBI AGENT-Thats why I alluded to the beginning,with a lot of cases it takes
so long to figure out whats going on and then it takes even longer
to identify the problem.
I know in Federal Court its called the Counterfeit Access Device
and Computer Fraud Act, thats based on illegal or unauthorized
access to a computer that in itself is a crime because getting
into one of the computers that has the protected items such as
Natinal Defense,(anything along those lines) so the mere
accessing of those is a Federal Crime.
The other ones go beyond that, You have to obtain information
and you have to make a fianancial gain.
Then the penalties are accordingly, the one regarding the Defense
Systems and things like that carries up to a Ten year imprisonment
and up to a Fifty Thousand Dollar Fine.
The ones where you make a fianancial gain, your penalty is as much
up to twice the gain you made plus up to Twenty years in Jail.
So everything depends on whats been obtained.

The third aspect of the crime that I guess is a watered down
version of what Senator Ribicoff had proposed has to do with
getting in a computer and destroying or changing different files.
That carries with it up to a Ten year imprisonment and up to
twice as much as the damage you caused or fianancial gain as
your fine.
Then all three of those have the Conspiracy Statute thats
attached to them where more than three people have to actually
take part in the Conspiracy. That crime,I mean that Statute
seems to be pretty significant.
Like I said, Who do you have thats going to sit down all day and
actually try to develop a case. Thats what you don't have in Law
Enforcement right now, You don't have anyone that specifically
looks for computer crimes, they have to be reported.
Its not like the drug cases where you can walk right down the
street and and find someone somewhere in the city of (DELETED)
selling drugs. You can find that anywhere in any city.
Its the same way as a Crime Patrol Police Officer can go
around and find someone breaking into cars, nobody is going to
be able to sit there and right now and justify there existence
what would be computer crimes.
What it takes I guess is one hand washing the other,the people
whose computers are being accessed have got to want to come
forward,and have to want to provide the help after they do.
Now do I have any questions?

Knighthack- What about prosecuting Computer Piracy Violations,have there
been any.

FBI AGENT- As towards illegaly copying software,No. They seem to be more
concerned with theft of computer services.
Now as far as the state level I know we've had none in our
offices.

Anonymous- What do you mean By theft of Computer Services?

Mercenary- He means hacking into Compuserve or another pay for access
service or using Government computers with a valid users
Id and password.

Old Timer-Like the young guy in California who was tying up the
DOD's Sattelite system and bouncing his signal to Europe

FBI AGENT-Well let me ask you.. How safe do you feel our computer systems
are?

Knighthack- If its got a modem attached to it and its online its unsafe.

Mercenary- But of course, None of us here would do that now, Right Guys?

Whole room- Laughter

FBI AGENT-Tell me more about that California case, How did he get into
the Department of Defense's System?

Old Timer-Apparently he hacked into the system and was an experienced
sattelite person and figured out how to get into there
operating system, he's serving time now It wasn't too
publicized.

FBI AGENT- Well like I said we don't find out too much up here ourselves
we have to watch CNN.


At this Point the meeting broke into small individual talking groups
and we departed before everyone else. We do have some documents that
were distributed and will be presenting those later in Upcoming issues.
This was a meeting of a local Users group in which we were invited
to attend by there president and would thank him here.
Any Anonymous comments were made by a Local User and we didn't catch
his name.

Section Two: Hacker Information and Where to Obtain It.


One of the most frequently asked questions the IIRG receives from the
multitude of new day Hackers and Phreaks is where do I obtain information
on phreaking and hacking.
Now I don't want to get into a psychological debate on what a new day
hacker is,but lets for safetys sake say its a kid who just got a modem
and happened to grab a copy of Phantasy off of a bulletin board or had
obtained another hack/phreak electronic newsletter.
Ok,they've taken that first plunge and its wetted there appetites for
more information. Now they run down to there local pc-mart and look
through its racks of books and magazines and the few articles they did manage
to find portray a hacker as a budding Charlie Manson behind a keyboard.
Well the IIRG has had enough of these portrayals by the media and
we've decided to assign Section 2 of every upcoming Phantasy as a brief
article on where to obtain information for novices or the curious.
The very first step of a curious novice would be to obtain a private mail
box,preferably NOT a Post Office Box. There are plenty of private mail
services springing up and finding one close to your home should be no
problem. These addresses are usually called Suites or just use a number.
The price range on these boxes is usually 6 to 9 dollars a month
and can be easily afforded even by a teenager. I said preferably NOT a
post office box for two simple reasons, One,I distrust any government agency
and find they cooperate very easily when they want to. And Two, if you do
receive more "covert" mail its just a good idea not to be involed with
any branch of the government.
Ok,now that you've run out and gotten a mailbox you say "Well now what
the Hell do I do with it?", Well thats a good question and an easily
answered one,you fill it up son!
Now the very first thing we suggest is laying aside some serious cash
or hitting up the slush fund for your expenses. Because expenditures for
hacking information aren't cheap and especially figuring this after what
you've probably spent on your equipment.
We're not saying that all these books or equipment are needed
for your library,there just nice to have around.

We advise sending for these Books:

1. Defending Secrets,Sharing Data: New locks and Keys for Electronic
Information GPO Stock Number:052-003-01083-6
Last Known Price:$8.50
Available From:

Superintendent of Documents
Government Printing Office
Washington,DC 20402-9325

2. Get the Privacy Catalog from Eden Press
They've got too many titles to list,
but some of the best we like are:

Privacy:How to get it,How to Enjoy it. #400 $18.95
Are you now or have you ever been in the FBI Files? #403 $12.95
Electronic Record Systems and Individual Privacy #614 $14.95
Telephone Security #652 $9.95
Telephone Debugging #653 $15.95
A Study of Telephone Records #630 $19.95

Call 1-800-338-8484 for there catalog.

3. A liitle old, its from 1985 but still a nice book to read
THE COMPUTER UNDERGROUND by M. Harry
Order #L40036 Price-$14.95
This book is available from several sources and
the order number given here is from ANVIL Publishing.
There Catalog is HUGE!!,get a copy call 1-915-755-2665

4. CRB Research sells the Computer Underground as well as many
other worthwhile titles,but definitly grab.

The Hackers Handbook Cat# HACK $12.95

Order there catalog for $1.00

CRB Research Books
P.O. Box 56
Commack,NY. 11725

Well That should cover the basics,like I said some of the catalogs you'll
go crazy over,theres always something for everyone in them.
But now onto more books and magazines,

Go down to your local book store and look these titles up,or have them
order them for you..

1. Old but good reading- Out of the Inner Circle by Bill Landreth
1985 by Microsoft Press $9.95

2. Hackers by Steve Levy- A good guide for the Ethics of a hacker..
Dell Publishing Company 1984 $4.50

3. The Cuckoos Egg by Clifford Stoll
Originally out in hardback at $19.95,but at the time of the
editing of this article its now in the stores on paperback
(Story of the Hannover Hacker and his ultimate downfall)

4. Definitly and an absolute must,Subscribe to:

2600:The Hackers Quarterly
Call (516)-751-2600,or FAX line (516)-751-2608

There are many more worthwhile books and magazines that could be listed
on and on, But we feel these selections will present to you a good
broad range of topics and interests. Some other worthy footnotes would be
to look up Consumertronics,they offer a large but expensive listing of
hacker/phreaker related material,(ED NOTE-Call (505)-434-0234) and to
find a bbs that has a large selection of Hacker Text files such as
PHANTASY,PHRACK,CUD,ATI etc. The IIRG's BBS along with many others offer
these files and finding them is no real difficulty.
This should drain your checkbook effectively for a while,or at least till
next months article on what is useful and noteworth on your newly obtained
hacker library.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Section 3: High Explosives for Fun and Profit!
By:(Name withheld by Request)

EDITORS NOTE:The Procedures discussed in this article are
extremely dangerous. Therefore,the Author and
publisher (The IIRG) disclaim any liability
from any damages or injuries of any type that the
reader or user of information contained within
this article may encounter from the use of said
information. This article is intended for
entertainment purposes only!

Since Hacking is truly a state of mind and a Hacker can branch his
talents into many fields,I present this article to you on the God given
rights of this country and my constitutional right of Freedom of speech.
Ever since a lazy summer day in the Maine backwoods,spent blowing off
fireworks with my father and uncle,I've had a true love for explosives
of almost any type. A six year stint in the Marines only further
encouraged this love of noise.
What I present here to you are some well known formulas with
a sprinkle of my own modifications.
This first formula will allow you to concoct roughly the equivalent
of dynamite,not a military grade explosive but a great fishing bait!

First obtain some Potassium Chlorate, a rather cheap and easy to
acquire chemical usually obtainable at any chmeical distributor.
If they ask you what you need it for,do what I do and claim your
picking it up for your company and have no idea,the boss just sent
you to get it. I have this routine down pat and even stick around
with the owner of the warehouse and have coffee. If they really
are curious claim its for Hydroponics experiments.

Now take the KC1O3 (Potassium Chlorate) and grind it into a fine powder
almost the rough equivalent of flour or talcum powder. This is a must!

Carefully measure 5 level teaspoons of Vaseline and place in a plastic
bowl with 5 level teaspoons of beeswax. Then pour 1/3 of a cup of white
gas (Coleman liquid fuel) and dissolve the wax and vaseline mixture.

Now take 90 premeasured level teaspoons of powdered KC1O3 and hand knead
it into the bowl and form into blocks as the mixture hardens or place in
cardboard rolls (towel or toilet paper) and seal with wax.

Your explosive is now done but requires a blasting cap to set it off
and since these are almost impossible to obtain legally,here a do it
yourself cap.

Get some .25 ID (inner diameter) aluminum tubing at the old
hardware store

get some hexamine tablets down at the old military surplus shop
and grind into a fine powder like the above KC1O3

Take 2 1/2 tablespoons of crushed hexamine and mix with 4 1/2 tablespoons
of Citric acid (available at most grocery stores) in a glass jar
mix well with stirring rod and add 1 tablespoon of 20-30% peroxide
and place jar in a cool spot for 12 hours
Run mixture through a coffee filter,pour rubbing alcohol over mix in filter
(four or five spoons worth),to clean mix.
Let powder dry on towel and prepare tube,

Crimp one end of tube ( 3 1/2 inces long total)
fill tube with powder and place very thin wire into mix in tube
or a model rocket igniter,seal with glue and allow to dry.

Ok,take your homemade cap,place into your main charge and run
about 50 feet of wire from fuse to a 12 volt battery
When its all clear hook up your juice (Voltage) and kiss that
charge goodbye.
Some of my favorites are blasting for fish,make sure charge is totally
watertight in this case or blasting out old stumps.
JUST BE CAREFUL,The CAPS are EXTREMELY SHOCK SENSITIVE and are
powerful enough to blow your hand off.

Have Phun,and be careful. I had a blast for sure!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section 3: The I.I.R.G. Attends the 8th Annual Connecticut
Computer and Electronics Show
By:Mercenary


On November 7th the I.I.R.G. Attended the 8th Ct. CES show,
The show seemed to be smaller than last year but the IIRG picked through
the venders booths with the zeal of drowning men looking for a life preserver.
Vagabond spent a large portion of his time dealing with a SNET
represenative discussing the workings of the CONN-NET system but was
able to get some valuable information from some other venders as well
which we'll present in this article.
Knighthack seemed to have a good laugh when the Prodigy demonstraters
couldn't seem to get on the system. (P.S.-He had to show em how)
Myself,well I sat through the Intro to Lans Seminar and the Wiring
your Network Seminar but couldn't take any more after that.
Heres what we were able to dig up at the show though,

1. Intergrated Services Digital Network Applications in the
Army Environment

It seems that the U.S. army is trying to develop specific end user
applications which solely depend upon the ISDN technologies of the Army.
The ARMY has identitfied the ISDN as part of the communications
archetectures of the future. Extensive field trials of ISDN have been
conducted to demonstrate the potential benefits of such technology.
But the limited number of user applications has prevented the
full realization of such services.


2. It seems the NAVY is concentrating on Computer Security Problems in
a BIG way. We saw 8 specific Computer Security projects laid out for
developers.

2A-High Assurance Trusted Systems-Seems there investigating
new approches for achieving high assurance for trusted systems
that accomadate innovative designs.
2B-Characteristics of Processing Elements with Respect to
Multilevel Security.
2C-Security Features for Work-Stations-seems they want better
techniques.
2D-Technology to Establish and Support the Role of Man in
Computer Security Systems.
2E-Expert System for Multilevel Security.
2F-The Inference Problem in Multilevel Secure database Management
systems.
2G-Placement of Network Security Services for Secure Data Exchange
2H-Composibility Constraints Of Multilevel Secure Systems


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

IIRG Disclaimer-All the above information was PUBLIC DOMAIN information
placed in open View for the PUBLIC at the 8th Annual CES Show.
and in no way compromises any agency or vendor as these are
open contracts for proposed Equipment placed on the open
FREE market for Bidding.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section 4: Hacker News and Interesting Footnotes
(More Info obtained at show)
By:Vagabond


MIT'S ATHENA TECHNOLOGY

MAYNARD, Mass."Athena," the innovative
computing environment developed at the Massachusetts Institute of
Technology (MIT), will be up and running at two new campuses this
winter.

North Carolina State University (NCSU) and Iowa State University
(ISU) signed contracts totaling $7 million with Digital
Equipment Corporation to install the Athena systems software and
link together hundreds of Digital workstations.

On each campus, the result will be a large-scale, high-
performance network designed to support students, faculty, and
researchers using UNIX based systems.

"Athena offers a new model for managing large numbers of workstations
in a network," said Barry Braunstein, Digital manager of Research
and Science/Engineering Solutions in the Education Market.
"Computing resources are centrally managed and highly accessible
to users completely location independent. Users can walk up to
any workstation on the network and log on, and access the same
files, software, and electronic mail."

Athena software services developed at MIT are freely redistributable.
Digital is offering support in planning, installation, and staff
training to universities who want to adopt the system.

At Iowa State, the Athena environment will include users from
engineering, the sciences, and a variety of other disciplines. "The
initial focus of the project is to stimulate high-quality research
by putting powerful tools into the hands of our faculty and graduate
students," said George Strawn, Director of Iowa State's Computation
Center.

Strawn said that researchers will benefit from speed and
power of workstations, and from the 'visualization' of research
data, which is made possible by computer graphics, things not
previously available in their existing computing environment.

The network will also make it easier to connect to off-campus
resources such as the National Science Foundation's supercomputers.

At North Carolina State University, the network's primary
function is to support engineering education.

"In the `real world,' computers are an integral part of engineering,"
said William Willis, Director of Engineering Computing Operations.
"Yet there's no consistent exposure to computers in the
undergraduate curriculum. Our goal is to ensure that a new
generation of students is comfortable using these modern tools."

This fall, only freshmen engineering students will use the
Athena environment. Over time, all engineering students will use
the workstations for design projects, simulation and modeling,
sharing data, writing papers, and solving homework problems.

Braunstein explained that Project Athena resolved many
technical problems that had made it expensive and technically
difficult to manage UNIX workstations in a network. Two key areas
were system security and the cost of network management.

"Athena's `Kerberos' network authentication system ensures a
very high level of security," said Braunstein. "And the automated
`Moira' Service Management System makes it possible to deploy a
large number of workstations in a cost-effective way, using a
client-server model, under central management.

"Cost-conscious institutions can support a large-scale
environment with a relatively small staff. For example, MIT runs an
installation of 1,000-plus workstations with a staff of six people
in hardware operations and systems administration"

Both NCSU and ISU had similar reasons for choosing to work with
Digital. Strawn explained, "Iowa State has a long relationship with
Digital, dating back to the 1960s. For this project, Digital
workstations offered excellent price/performance, and Digital's
proposal was the most innovative in terms of the Athena software."

Dr. Willis said, "In implementing the Athena technology, NCSU
was really looking for a partner. We reviewed three excellent
proposals. But Digital had much more experience with Athena and
has much stronger educational programs."

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DECstation is a trademark of Digital Equipment Corporation.

UNIX is a registered trademark of American Telephone & Telegraph Co.

Project Athena, Kerberos Authentication Service and Moira Service
Management System are registered trademarks of Massachusetts
Institute of Technology.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

A STEALTH MODEM

No,we've not been staring at the CRT too long,it seems that the
Air Force is trying to develop a Tactical Modem for Stealth Communications.
The Trend towards intelligent jamming mandates demands that future tactical
communications systems possess Electronic Counter-countermausures (ECCM)
responsive formats. A modem processing modular architechture is needed
that supports up to 50 MHz input sampling rate while providing the needed
adaptive processing. It must be an adaptive modem that can receive signals
corrupted by real world interference.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Section 5: Phantasy Distribution Sites

Phantasy's Distributions Site's have changed,we apologize if you called a
board and didn't find the Mag. But were organized a little better now and
these will be the permanent sites as long as these systems are up and
operating.

1. IIRG Headquarters- The Rune Stone BBS - 1200/2400 Baud 24 Hours
Call for the Earliest possible releases of Phantasy and other
IIRG files. Our system will be going private so call Now while
you still can, at (203) 485-0088.

2. Lightning Systems- 24 hours - at (414) 363-4282

3. Sycamore Elite- 24 Hours - at (815) 895-5573

4. TAP BBS at (502) 499-8933

To get PHANTASY by mail on a 1.2 meg or 360K floppy mail the following
to this address:

Mail 12 Disks and $5.00 in stamps to

The I.I.R.G.
862 Farmington Ave
Suite-306
Bristol,Ct. 06010

Specify Format of Disk Please!
We will include any of the IIRG's releases for that month on disk
(Space Permitting)

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
END THIS ISSUE OF PHANTASY
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
(C)IIRG 1990
May Odin Guide Yor Way! 

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT