Copy Link
Add to Bookmark
Report

Phantasy Issue 18 Vol 04

eZine's profile picture
Published in 
Phantasy
 · 5 years ago

  


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
= =
- WELCOME TO THE EIGHTEENTH ISSUE OF -
= =
- -=>PHANTASY<=- -
= =
- A PUBLICATION AND NEWSLETTER OF -
= =
- THE -
= INTERNATIONAL =
- INFORMATION -
= RETRIEVAL =
- GUILD -
= =
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
= =
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Volume Number Four,Issue Number Eighteen Dated 08/12/93
Editor is Mercenary : mercenar@works.UUCP

Article Submissions: The Mercenary/IIRG
862 Farmington Avenue
Suite 306
Bristol,Ct 06010

IIRG World Headquarters BBS: The Rune Stone
14.4K HST Courier
All H/P/A, 3000+ Files
(203)-832-8441
NUP: Conspiracy

Table of Discontents:

[1] "Ionizer" - IIRG Site Sysop Arrested
A Report By The IIRG

[2] What Really Happened at "Pump-Con"
(An Interview With Thomas Icom)
Interview By: Mercenary

[3] Bencrypt Encryption
By: Ben Sodenkamp

[4] Hacker OPSEC (Operational Security)
By: Thomas Icom/IIRG

[5] The Libertarian Responsibility of The Cyberpunk Movement
By: Thomas Icom/IIRG

[6] FOR THE PEOPLE
Supplied By: Those Wacky Secret Service Agents
Edited by: Mercenary

1. Secret Service Agents Get Free Vacation

[7] The Rumor Mill (Unconfirmed Rumors From the Underground)
Edited By: Mercenary

1. Han Solo Sells Out to the Empire?
2. Dr. Detergent of TDT Retires?
3. Fear and Loathing BBS Busted

[8] PHANTASY TIDBITS: News and Views of Interest

1. SNET Operators Forwarding ANI Data
2. FCC Releases Frequencies
3. Put Your Hands in the Air, and Give Me Those Chips
4. ATM Bandits Nabbed
5. FBI Calls for Gun Licensing

[9] Listing of IIRG Distribution Sites

[10] Listing of PHANTASY Distribution Sites

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

OFFICIAL DISLAIMER...

All information in PHANTASY is from USER contributed material
The Publishers and Editors of PHANTASY and THE IIRG disclaim
any liability from any damages of any type that the reader or
user of such information contained within this newsletter may encounter
from the use of said information. All files are brought to you for
entertainment purposes only! We also assume all information infringes
no copyrights and hereby disclaim any liability.

PHANTASY is (C) 1990 by The IIRG
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [1]: "Ionizer" - IIRG Site Sysop Arrested
A Report By The IIRG

(Portions of this article were taken from a Taped Conversation with Ionizer
from the Hartford,CT. County Jail to Mercenary at IIRG HQ.)

Ionizer the sysop of the Ware House was arrested on Monday August 2nd as he
entered a pretrial hearing at the Hartford Superior Court,Hartford Connecticut,
to face charges of his alleged connection for a break-in at Hall High School on
October 11th,1992.
Ionizer was arrested for "Inciting Injury to Persons or Property", a felony,
and "Risk of Injury to a Minor".
Apparently Ionizer was taken to the West Hartford,CT. police department and
was quickly photographed and fingerprinted and then was whisked away to the
West Hartford Superior Court and was arraigned,(without his lawyer being
present) and was ordered held on a $500,000 dollar bond.
West Hartford police are attempting to keep the case sealed, but the
charges against Ionizer are for having Anarchist files available for download
on his BBS, The Ware House.
In our discussion with Ionizer from jail, the police have apparently used
strong-arm "Big-Brother" tactics on a 14 year-old by the handle of,
"Misguided Youth" who had access to the Ware House.
Reportedly police approached him and threatened to drag him into court if he
didn't sign an affidavit that he downloaded the file "ANARC2.ZIP" from the Ware
House.
When Ionizer first heard wind of police hassling users of his system, he
supplied his entire system log (Ionizer kept his system log since day 1 of
the system being up) to an IIRG member for analysis.
We have analyzed the Meg Plus file and have found no record of Misguided Youth
ever downloading the file from Ionizer's BBS. In fact only 2 users have ever
downloaded ANARC2.ZIP that we could find.

1. HITMAN
18:56 05/23/93 LIBRARY FILE DOWNLOAD
User Hitman download ANARCHY\ANARC2.ZIP

2. HOLLYWOOD
14:35 05/24/93 LIBRARY FILE DOWNLOAD
User Hollywood download ANARCHY\ANARC2.ZIP
14:50 05/24/93 LIBRARY FILE DOWNLOAD
User Hollywood download ANARCHY\ANARC2.ZIP

Now apparently it seems that the West Hartford police department feels it can
either intimidate anyone it feels like, or fabricate evidence.
Several other Ware House users have been contacted by phone by police and
questioned, We know "Mastermind" was contacted and was asked "Are you good
friends with Ionizer?' and "Did he ever mention anything about the making of
pipe bombs to you?'.
According to Ionizer, the police are claiming an undercover police officer
with the West Hartford Narcotics division is claiming to also have downloaded
the file.
Hitman has also been contacted by police and asked to supply a copy of the file
in question, and this is events we were told happened,

Quote from Hitman -
Date : 08 Aug 93 10:19:14

I'll tell you the whole story, as I told it to Ionizer
last night (he called me from jail). When I was out one
day, the detective Mr. Anielwiski (or something like that)
called. I wasn't home, so, he talked to my dad. My dad
thought I was doing all of this shit too, so, he took it
way out of proportion. I got home, and he made me search
for a file 'ANARC.*' on my hard drive. Since it is
really his computer and his phone line, there is nothing
that I could have done, since he could have easily done
it himself. Anyways, he said to delete it, so I wiped it
via Norton's WIPE program, so it couldn't be recovered.
Anyways, I guess the detective called back, and my dad said
that I had the file. But, it was wiped. Anyways, my dad
thought we'd just undelete it, but, he didn't realize that
the file would just be a null file when we did so. The
rest of the story is what he told me, as I was at work the
rest of the day. The detective came over, and I guess my
dad copied the null file onto a floppy, but, I think the
floppy was bad anyways. At any rate, to my knowledge, there
is no information at all on the floppy, and, I've got no other
copy of it on my hard drive.

--Hitman

Now the file in question is ANARC2.ZIP, which is ANARCHY FOR FUN AND PROFIT
By: The Deth Vegetable Volume 1,Issue 2.
It seems that this file is being singled out by the police because of its
high bomb making instructions content and this message in the header of the
file,
----------------------------------------------------------------------------
/--------------------------------------\
! Note to Law-enforcement type people: !
! This file is intended to promote !
! general havoc and *ANARCHY*, and !
! since your going to be the first !
! assholes up against the wall.. there !
! isnt a damn thing you can do about !
! it, pigs! !
\--------------------------------------/
------------------------------------------------------------------------------
None of the information contained in ANARC2.ZIP could be considered
classified or secret as the information in the file is easily obtainable in
any book store in books like "The Anarchists Cookbook" or "Ragnar's Guide
to The Home and Recreational Use of High explosives".
We did a little investigating and found "The Anarchists Cookbook",
By William Powell on the shelf at "Barnes and Noble" bookstore in
West Hartford,CT. (Hey Police, better run over and shut them down!!).
We also found "The Anarchists Cookbook" at the Tunxis Community College
Library in Farmington,CT. (HX 844 P68) and at the University of Connecticut at
Storrs Library (SPEC APC BK f33), so it is available at public libraries for
underage children to read and enjoy.
Also after a little searching on the international network of computers known
as "Internet" look what we found available for download by "ANYONE" with a
computer and modem, (Including Under-age Children).

--------------------------------------------------
Host cs.ubc.ca (137.82.8.5)
Last updated 03:33 28 May 1993
Location: /mirror3/EFF/cud/misc
FILE rw-r--r-- 7936 Mar 8 1992 anarch.man

Host kragar.eff.org (192.88.144.4)
Last updated 00:05 17 Apr 1993
Location: /pub/cud/misc
FILE r--r--r-- 7936 Mar 8 1992 anarch.man

Host nic.funet.fi (128.214.6.100)
Last updated 06:11 22 Mar 1993
Location: /pub/doc/cud/misc
FILE r-xr-xr-x 7936 Mar 8 1992 anarch.man

Host cs.ubc.ca (137.82.8.5)
Last updated 03:33 28 May 1993
Location: /mirror3/EFF/academic/books/zzz
FILE rw-r--r-- 99 Apr 24 17:06 anarchists_handbook.d

Host kragar.eff.org (192.88.144.4)
Last updated 00:05 17 Apr 1993
Location: /pub/academic/books/zzz
FILE rw-rw-r-- 81 Oct 23 05:29 anarchists_handbook.d

Host cs.ubc.ca (137.82.8.5)
Last updated 03:33 28 May 1993
Location: /mirror3/EFF/academic/books
FILE rwxrwxrwx 25 Oct 11 1992 anarchists_handbook
-> zzz/anarchists_handbook.d

Host kragar.eff.org (192.88.144.4)
Last updated 00:05 17 Apr 1993
Location: /pub/academic/books
FILE rwxrwxrwx 25 Dec 2 04:31 anarchists_handbook
-> zzz/anarchists_handbook.d

Host wpi.wpi.edu (130.215.24.1)
Last updated 03:31 22 Jul 1993
Location: /
DIRECTORY rwxr-xr-x 512 Jul 7 09:20 anarchy

Host unix.hensa.ac.uk (129.12.21.7)
Last updated 01:46 26 Jun 1993
Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
FILE rw-r--r-- 8613 Jan 8 03:36 anarchism.today.Z
Location: /pub/uunet/doc/political/umich-poli/Essays/Chomsky
FILE rw-r--r-- 22156 Sep 17 1992 notes.on.anarchism.Z
FILE rw-r--r-- 55985 Feb 2 16:09 notes.on.anarchism.ps.Z
Location: /pub/uunet/doc/political/umich-poli/Spunk
FILE rw-r--r-- 861 Mar 1 20:37 README.practical.anarchy.Z
Location: /pub/uunet/usenet/control/alt
FILE rw-r--r-- 1535 Sep 11 1992 alt.society.anarchy.Z

Host nic.cic.net (192.131.22.2)
Last updated 01:14 22 Mar 1993
Location: /pub/nircomm/gopher/e-serials/alphabetic/p
DIRECTORY rwxr-xr-x 512 Mar 19 16:11 practical-anarchy
Location: /pub/nircomm/gopher/e-serials/alphabetic/p/practical-anarchy
FILE rwxr-xr-x 54325 Mar 18 23:02 practical-anarchy.v1n3
Location: /pub/nircomm/gopher/e-serials/general/politics
FILE rw------- 92 Mar 21 23:38 .practical-anarchy

Host unix.hensa.ac.uk (129.12.21.7)
Last updated 01:46 26 Jun 1993
Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
FILE rw-r--r-- 3550 Mar 18 21:17 anarchism.and.power.Z
FILE rw-r--r-- 23063 Mar 6 19:45 anarchy-faq-0.1.Z

Host charon.mit.edu (18.70.0.224)
Last updated 02:34 26 Jul 1993
Location: /pub/usenet-by-group
DIRECTORY rwxrwxr-x 512 Jul 12 02:46 alt.anarchism

Host cs.columbia.edu (128.59.16.20)
Last updated 10:24 26 Jul 1993
Location: /archives/mirror2/faq
DIRECTORY rwxrwxr-x 512 Jul 12 09:54 alt.anarchism

Host wiretap.spies.com (130.43.43.43)
Last updated 03:06 22 Jul 1993
Location: /Library/Article/Socio/.cap
FILE rw-r--r-- 28 Apr 5 19:08 anarchy.bib
Location: /Library/Article/Socio
FILE rw-r--r-- 23565 Dec 24 1992 anarchy.bib

Host unix.hensa.ac.uk (129.12.21.7)
Last updated 01:46 26 Jun 1993
Location: /pub/uunet/doc/political/umich-poli/Essays/Anarchy
FILE rw-r--r-- 3196 May 11 17:35 anarchist.revolution.Z
FILE rw-r--r-- 5621 May 11 17:37 macsimin.anarchist.federation.Z

Host wpi.wpi.edu (130.215.24.1)
Last updated 03:31 22 Jul 1993
Location: /anarchy
FILE rw-r--r-- 44492 Jul 7 09:19 anarchy.tar.Z
FILE rw-r--r-- 61332 Jul 7 09:20 anarchy.tar.Z.uu

Host wiretap.spies.com (130.43.43.43)
Last updated 03:06 22 Jul 1993
Location: /Library/Article/Socio/.cap
FILE rw-r--r-- 39 May 28 06:28 anarchy.faq
Location: /Library/Article/Socio
FILE rw-r--r-- 45315 May 28 06:28 anarchy.faq

Host charon.mit.edu (18.70.0.224)
Last updated 02:34 26 Jul 1993
Location: /pub/usenet-by-hierarchy/alt
DIRECTORY rwxrwxr-x 512 Jul 12 02:46 anarchism

Host nctuccca.edu.tw (140.111.3.21)
Last updated 01:04 13 Jul 1993
Location: /USENET/Periodic_Postings/alt
DIRECTORY rwxr-xr-x 512 Jul 12 1993 anarchism

Host orchid.csv.warwick.ac.uk (137.205.192.5)
Last updated 05:41 31 Jul 1993
Location: /pub/cud/misc
FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z

Host clover.csv.warwick.ac.uk (137.205.192.6)
Last updated 05:04 26 Jul 1993
Location: /pub/cud/misc
FILE r--r--r-- 3077 Mar 8 1992 anarch.man.z
-------------------------------------------------

Our point is simple, this material is publicly available almost everywhere
and the last time we checked (Despite Clinton), we still lived in a FREE
country with the constitutional right of free speech.
This is a plain and simple case of Police Harassment against Ionizer.
We are not claiming he is an angel or saint by any means, as he has had
numerous encounters with the West Hartford police including his arrest in 1988
for illegal use of credit cards,computer crime,larcency, and the illegal
possesion of fireworks.
But to arrest an individual for having a file on his computer that is public
domain (Not Copyrighted) and setting a half million dollar bail is complete
bullshit.
The EFF has been contacted and we hope the will come to the aid of Ionizer,
because this may determine what you may have online as a sysop.
Ionizers preliminary court date is scheduled for August 17th,1993, and we will
provide you with an update in Phantasy 19.

FREE IONIZER!!!
-=The IIRG 1993=-

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [2]: What Really Happened at "Pump-Con"
(An Interview With Thomas Icom)
Interview By: Mercenary

For those of you not familiar with Thomas Icom, I'd like to provide this
brief synopsis before I get to the interview.
Tom is the Editor/Publisher of Cybertek (The Cyberpunk Technical Journal)
and is a highly respected writer with credits to his name such as 3 books for
Consumertronics and articles appearing in such publications as 2600,
Full Disclosure, and US Militia, (and now Phantasy).
With the dis-information that is currently circulating in some circles, we
thought we'd give you the readers of Phantasy the "REAL" story.
So now onto the interview........

Merc: Tom, probably the first question on everyones mind, Is what were the
real behind the scene going-ons at Pump-Con.

Tom: Well, besides your usual drunk and disorderly antics, there were some
real foolish individuals running around.

Merc: For Instance??

Tom: We had people practicing their lock-picking skills on the hotels
vending machines,and breaking and entering into other guests rooms.
Some individual called and carded a pizza and donuts and the noise
level was probably being monitored in California.

Merc: Without going into explicit details, tell us about the activities
you witnessed of some amateurish individuals.

Tom: As for security, there was none. Individuals had calling cards
laying out in plain sight. There were notes and notebooks just waiting
to be confiscated. The hotel door was taped open and we had roughly
20 people crowded into one room with a constant traffic of people
flowing in and out. Combined with the noise, and all the activity of
the people coming in and out we probably attracted plenty of unwanted
attention.

Merc: Ok, theres no security and bedlam everywhere. Lets get to the real
dirt. Who was responsible for the monitored phone calls?

Tom: Well, I'm not sure who was actually responsible. There was a lot of
"Toll-fraud" activity coming out of the hotel. It got to the point
where the payphones were alledgedly red-flagged and then we have
"Ixom Codex".

Merc: Ahhh... a name quite familiar to the readers of Phantasy...
What was Mr. Ixom up to this time?

Tom: It apparently seems that Ixom was involved in some sort of scam
against Bobs Stores (Formerly Bobs Surplus). From what I could
determine he was working on this project for some time before
Pump-Con.

Merc: Ok theres no security, bedlam everywhere and a known informant in the
room. Whats next??

Tom: Ixom had raised some flags as a result of his little forays into Bobs
system. When he called from Pump-Con, somebody was waiting and
watching. After the raid, when the Boys in Blue checked the phone
records, it was all over.

Merc: Theres been alot of talk about who really "Raided" Pump-Con, can you
provide some insight into this?

Tom: Yes, the reason for the Pump-Con raid was due to all the noise and
possibly the other bedlam that went on. Since there was alot of
minors going in and out of the hotel room, there was also a potential
drug profile raised. The cops came in, saw all the minors with alcohol,
the computers, and calling cards laying in plain view.
As far as it being a federal case, thats Bullshit...
The indictments came down from the NY State Grand Jury and the
investigation was being handled by the Westchester County DA's office.
The phone company was called in to provide records as evidence,
and perhaps to give the arresting agency (Greenburgh Police),
a clue as to what they found. But thats about it.

Merc: Now, Ixom and some of his Supporters have been trying to sand-bag
you. Whats the scoop??

Tom: Ixom seemed to have cast his lot with certain elements of a well
known virus group. Or maybe they cast their lot with him.
The reason behind it is probably because I bitched at them for
acting stupid, which resulted in them being raided a week after
Pump-Con. However their raid had nothing to do with Pump-con.
Thats another story.

Merc: Now its well known by now that something occured which resulted
in Ixom's and Nightmares arrest and fingers are pointed at you.

Tom: Yes... I had to do something or everyone was hosed by one stupid
individuals actions. So I made sure that only those who deserved to
take responsibility for their actions did so.. And in this case it
was Ixom. Rumor has it that Ixom is possibly a party to a
larger operation against hackers, a reincarnation of the Govt's
Cointelpro program and after speaking with you numerous times on the
phone I am inclined to believe this is true. His actions at
Pump-Con indicate to me that he is either the single most stupid
individual I've had the bad luck of running into or he was actively
trying to get the Con busted or get certain people busted afterwards.
I've also heard from a very reliable source down in DC that Ixom
was not kicked out of the military for hacking, but assigned to
something called "Project: Marigold". Supposedly having to do with
anti-hacker Cointelpro activity, However at this time I have no
concrete proof of this. As for Nuclear Nightmare he was just an
innocent bystander who was in the wrong place at the wrong time.
Its my belief that he was busted because hw was in the room with Ixom
and the following quote attributed to him, which went along the
lines of "The only thing that was penetrated tonite was your
daughter in the back room, officer"
Damage control was done and all charges against him were dismissed.

Merc: What were Ixom's actions that made you think of this?

Tom: For Starters, he was hacking out of the hotel room, a strict
conference No-No since the Summer-Con filmings. Especially with
all the call accounting that hotels have. Why not just yell out the
window, Come and get me!!
The lamer also had the nerve to post my handle on the system that
he trashed to the tune of a couple thousand dollars that evening.

Merc: Well thanks for your time Tom and for clearing up these stupid
fly by nite rumors that have been flying around.

Tom: No problem, glad to oblige....


There you have it folks, In this corner a well known and respected writer
and in the other corner, a known informant with no morals or honor.
Sure, I may be biased.. but consider what each has done for the Hacking
community at large and I think you can see my point.
I recieved a call on my home phone after we published our original warning
about Ixom and he of course denied all allegations made by unknown individuals
against him. but when I offered to publish his side of the story, we never
recieved anything from him.
Thus, the IIRG will side with the more respected individual and not a
born loser.. Thats why Tom Icom has joined our ranks and we're glad to have
him.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [3]: Bencrypt Encryption
By: Ben Sodenkamp


BENCRYPT ENCRYPTION

Cryptography is the art and science of hiding things in plain sight.
It is also the art and science of stealing data in plain sight.

(Lary Loen)
***Why Encryption is Important***

In today's world of government raids such as OPERATION SUNDEVIL and the
raid on Steven Jackson Games any Cracker, Hacker, Phreaker, Pirate or other
techno-outlaw needs to protect himself against the reaching tentacles of
government "information control".
As anybody who has ever been busted knows, when they come to your door,
they take everything that they can find,(toasters,extension cords) that is
in any way electrical.
When they analyze your computer(s), they hold anything illegal,
(Pirated software, Hack(ed) programs,information, userlists) against you in
court or attempt to us the information to bust your friends.
If you have any form of illegal data,(or something -THEY- consider illegal),
on your computer, the only way to protect yourself is to encrypt the data.

***How Encryption Works***

There are many encryption programs out there. Most rely on a mathematical
algorithm or a password. The problem with this is that once the algorithm is
found, or the password guessed, the encryption can be cracked.
You don't want to watch sweating, as the FED computer specialist tries
different combinations on your encryption.
Seeing a need for an unbreakable public encryption system, I began to work on
BENCRYPT. BENCRYPT does not use a password or an algorithm. It encrypts
according to a key file. I wish the feds luck 'cause I haven't come up with a
way to break it yet.

Here's how it works:


During the encryption, each byte in the source file will be altered by a
corresponding byte in the key file. If the key file is smaller than the
source file, (they usually are) then any given byte in the key file will
alter more than one byte in the source file. Since having all of the bytes
in the right values and the right places must be essential for decryption,
I decided to add the locations of the bytes in the key file to the formula.
This may be a little confusing, so let me try to show it mathematically.
Lets say that the 285344'th byte in the key file happens to be assigned to
the 2342433'rd byte in the source file. The value of the byte in the source
file happens to be 233 and the value of the byte in the key file happens to
be 56.

First, the (Key Byte) and (Key Location) are multiplied:

285344 * 56 = 15979264.

Then the product is divided by 255:
(using integer division to get a remainder)

285344 / 255 = 62663
with a remainder of 199.

The remainder is added to the (Source Byte):

199 + 233 = 432

If the number is over 255, then 255 is subtracted from it:

432 - 255 = 177

177 is then put in the output file(encryption) in location 2342433.
Just as 233 was in the source file.

The same process is used in the decryption except you subtract 177 rather
than adding it. Using this system, you must have ALL of the right data in
ALL if the right places to decrypt.
The only way to crack it would be to guess the key file. If the key
file was 1 meg, then they would have to go through 255 to the millionth
power combinations.

*** How You Get It ***

The Demo of BENCRYPT (BENCRYPT.ZIP) can be download at any of the following
fine boards:

Buffalo Creek BBS (515)-225-8196 (Easy ACCESS)

Jump Start BBS (907)-373-5361 (Easy ACCESS)

Rune Stone BBS (203)-832-8441 (NUP:CONSPIRACY)

Rusty-N-Eddies BBS (216)-726-3589 14.4,
(216)-726-3619 9600,
(216)-726-3620 9600,
(216)-726-2620 2400.

I realize that it would probably be not too much trouble to just crack the
demo so that it works like the original, but since I am only asking $15, I
assume that most of you will have the courtesy to register it.

PS: Thanx to the IIRG and Mercenary for the ink(data).

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [4]: Hacker OPSEC (Operational Security)
By: Thomas Icom/IIRG

Recently, it seems that cracking down on hackers is in vogue again. All
it seems to take is one wrong move on your part, or if you don't hack, being
somewhat affiliated with someone who does. Next thing you know, some
representat
to take away your computer and other techno-toys. You don't even have to be
doing anything illegal! All they need to do is state that seizing your shit
might aid them in their investigation somehow.
One of the things that mortifies me is how some hackers out there are top
experts in defeating security, and yet are so inexperienced in instituting
security, particularly in regards to their own operational setup. They then
go get raided, and in addition to getting themselves screwed, their lack of
OPSEC (Operational Security) gets others screwed, like for example when the
Secret Service finds a list of other hackers' names and numbers on their hard
drive. There is simply no excuse for stupidity like that to occur.
With this in mind, it's time to start discussing some basics of hacker
OPSEC. Hacker OPSEC, will be defined as the procedures someone in the hobby
takes to keep himself out of trouble, and to keep his acquaintances from
getting hassled as a result of something that might happen to him. There's
nothing complicated about these techniques, and when you're done reading them
you'll probably say "That's all common sense", however it would appear that
common sense doesn't seem too common anymore.
The first and foremost rule of hacker OPSEC is to know what you can, and
more importantly cannot, mess with. No matter how good you may be, there are
just certain things that shouldn't be hacked. There are a lot of interesting
things to play with out there, if you look around a bit. Most of them are
pretty safe to check out, so for your own safety don't hassle anything that
will most likely get you screwed if they discover you.
The main entities you want to avoid playing with are the government, and
corporations doing R&D work for the government. Now you may say, "Well, xxxx
is ok. Their security sucks, and the people there are clueless." That may be
the case, but is it really worth the risk? If they are clueless, then chances
are very good that if they do discover you they'll overreact and do something
extreme like have the U.S. Special Operations Command drop a SEAL team on your
roof. ("I don't know how he did it. He just waltzed into our system! He
must be working for Arab terrorists! I just read _Terminal Compromise_ and
everything in the book is happening to us!"). "National Security" is a very
powerful driving force, and allows them to justify doing a whole lot of
things.
The other thing you want to avoid is anything dealing with money,
particularly banks and other financial institutions. Money is as much a
driving force as national security, and if "they" assume that you played or
are going to play games with their money, they'll exert their considerable
influence on the powers that be to have you tracked down and dealt with. On a
side note, systems that deal with monetary matters usually do nothing else.
Since there is usually nothing cool on them anyway, why bother?
The second rule of hacker OPSEC is to not do anything illegal over your
home phone, or any other phone which is traceable to you. The government,
phone companies, and big corporations have always had the capability to know
where you're calling from since the '60s. Now with Caller-ID, that capability
is extended to everyone. Doing shit over your home phone these days is asking
for trouble, and an easy way to get caught.
Payphones are still the number one way to cover your tracks. Random
payphone usage is safe for the most part. The only exceptions are in
instances where the payphones in a given area are being used for drug
trafficking and are being monitored because of that, or when some idiot has
been phreaking heavily from the same small area for the past few months, and
the phone company decided it's cheaper to do something about it than continue
to absorb the loss. My personal experience is that airports are the best
place to use payphones from. There are usually payphones which have modular
jacks so you don't need an acoustic coupler, and people from all walks of life
are there, so you won't look out of place. My personal experience has also
indicated that hotels are usually the worst place to do anything from. Hotel
employees are always suspicious, and thus are always asking questions of the
people in their hotel, particularly if they haven't checked in. Also, as the
participants of Pumpcon can attest, hotels are often quick to call the police
when something doesn't quite fit into their reality picture.
Another favorite phone phreak OPSEC trick is known by the terms "canning",
"pedestal hacking", "beige boxing", and "hardwiring". This basically entails
hooking into a random phone line somewhere, and using it to make outgoing
calls. The first three techniques are usually used to indicate a temporary
connection. One usually walks up to a test point on the phone company's
outside plant, and hooks in. These test points are commonly called "bridging
heads", "b-boxes", "(phone) cans", or "pedestals". The forth term is usually
used to indicate a more permanent set up; in essence a clandestine extension
of the target phone line.
One fun thing to try is to power a cordless phone base by means of a large
capacity rechargeable battery, and then hook it up to a phone can somewhere.
This keeps you from having to stand suspiciously at the can for hours a end.
(A common problem when canning) So even if they do trace the call back to the
phone line you're using and send in the Bellcore Rapid Deployment Force to
adjust your attitude, you'll still be a football field away when the shit hits
the fan. It should also be noted that by adding an external antenna to the
base station, (a 60 inch 1/4 wave ground plane would be cheap to make and
perform decently) you can increase the range on most phones up to 1/2 mile.
(and get the FCC pissed off at you if they found out you did this. So be a
nice law-abiding person and obey FCC Part 15 Regs. Then they might leave you
alone, maybe.)
There are also many other techniques that you can use. If you are
interested in learning more about the technical procedures of covering your
tracks in cyberspace, you should check out "2600: The Hacker Quarterly",
"TAP", and (excuse the self-promotion) "Cybertek: The Cyberpunk Technical
Journal". They all contain a wealth of technical hacking and phreaking info.
Now that you are not doing anything over any phone traceable to you, your
next step is to keep your activities to yourself. Yes, hacking is a often a
big ego boost, but talking about your latest accomplishment is likely to get
you into trouble. If "they" get wind of what you're doing, it makes it that
much easier for them to get you, no matter what precautions you might be
taking. In the same vein, avoid getting involved with large groups. If you
must do something which involves more than one person, then make sure you
intimately know the people you will be involved with, and keep the group as
small as possible. My criteria for trusting someone is that I've known them
for at least a few years, know their real name, and have physically hung out
with them extensively for a couple years. My gut reactions to the person also
have a big say in whether or not I trust him or her. Believe it or not, we
all have a sixth sense which can be developed over time, and is very helpful
in keeping us out of trouble.
Despite the fact that you've been careful, you still might be noticed by
someone somewhere, and as a result get hit with a search warrant or be the
victim of a Cointelpro-style black bag job. To combat this, don't keep
anything sensitive at your house. Store all your good stuff off site, so you
won't lose it. Any sensitive data you have to keep at your home should still
be backed-up at an off-site location, and encrypted.
There are a lot of good encryption systems out there. The current rave in
encryption software is PGP, "Pretty Good Privacy". It's available on any good
BBS system, and seems to be what everyone is going to be using. The nice
thing about PGP is since it's a "Public Key" system, it allows for secure
communications without having to exchange keys. If you don't give a shit
about exchanging data with strangers or have a secure way to exchange keys,
then there's Video Vindicator's "VinCrypt". It's also available on any decent
system.
Another good one is Consumertronics' "Absolute Computer Security". More
a set of applied encryption ideas and concepts; as opposed to a strictly
defined system, ACS is capable of being totally customized by it's user, and
while the original software is for MS-DOS machines; can be ported over to
other systems. It should be noted that the effective use of ACS requires some
applied intelligence on behalf of its user. If that's a problem with you,
then you'd be better off using something else.
One favorite of mine is the "one-time" cipher system. Basically the one-
time system uses a randomly generated non-repeating key which is then used to
encrypt your data. Most people think that one-time cipher systems are a pain
in the ass to use, but they are unbreakable as long as your key is kept
secure. I'll talk about it more in the next chapter.
No matter what encryption system you use, it won't be worth a damn if you
use poor judgement in the selection and protection of your encryption keys.
Make your key as long as possible, hard to guess, and not restricted to just
alphanumerics. Any encryption system will fail if it prompts you for a key
and you enter "SECRET". And since you're an intelligent person I won't insult
you by reminding you to keep your encryption key secure, and to use a
different key for each file you want to protect.
If it is possible for you to do so, I would also hide the data on the
floppy so that it appears invisible to the average user. Some of the ideas
that quickly come to mind are tacking the encrypted data on the end on a legit
executable file, or putting the data on a sector which is then marked "bad" so
it won't be overwritten.
A really good idea, if your serious about OPSEC, is to use arcane or
custom hardware and software. While you won't be compatible with the rest of
the world, you'll at least be secure. ("But then I won't be able to play
"Leisure Suit Larry" like I can on my PC!") Someone should design an MS-DOS
version of Beagle Bros. "Dos Boss" Apple II DOS Customizer, which would allow
changing of DOS command names. You could change "TYPE" to "DELETE", so anyone
attempting to read your files would instead wipe them. An even more fantastic
idea would be a custom secure operating system based on the one used in Robert
A. Heinlein's book, _The Number of the Beast_. He wrote about a "double
bookkeeping" system which looked ordinary, but unless it received certain
discrete keystrokes, would display a set of decoy data, while erasing the real
data hidden on the system. Doing a setup like that shouldn't be a problem to
an experienced programmer.
Now if you've followed all these guidelines, you can consider your
operation secure, and have little to worry about. Hacker OPSEC really boils
down to two things, Common Sense and Caution. On the other hand, you
feel that these precautions are little bit on the paranoid side. Just
remember two things. The first is that hacking and phreaking are currently
looked down upon by those in power. The second thing you should remember is
what happened during Operation Sundevil.

-Thomas Icom
International Information Retrieval Guild
"May Odin guide your way."

Sources Mentioned:

Consumertronics
2011 Crescent Dr.
Alamogordo, NM 88310
505-434-0234

Absolute Computer Security:
Manual & MS-DOS diskette -$29
Manual alone -$19

2600: The Hacker Quarterly
P.O. Box 752
Middle Island, NY 11953
516-751-2600
Subscriptions: $18/year

TAP
P.O. Box 20262
Louisville, KY 40250
Sample issue: $2
Write for more info.

Cybertek
P.O. Box 64
Brewster, NY 10509
Subscriptions: $15/6 Issues
Sample: $2.50

PGP: Pretty Good Privacy and VinCrypt
Available on most decent BBSes.
Try: Uncensored (914)-761-6877 or the Rune Stone (203)-832-8441
NUP:Conspiracy
Libertarian's in '96!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [5]: The Libertarian Responsibility of The Cyberpunk Movement
By Thomas Icom/Cybertek/IIRG

With the moves that various government powers have been taking to
institute a totalitarian form of government in this country, it has now
become the responsibility of the Cyberpunk movement to take such measures as
to prevent these actions from occurring and reverse what damage has already
occurred. When one takes into account the various factors involved in
reclaiming a democratic state from totalitarian rule, it will be found that
the Cyberpunk movement is the best equipped to handle the task. The movement
has the necessary political attitudes, equipment, and knowledge to prevent
further government progress into totalitarian rule and reverse the steps
that have already been taken by various government entities towards that
direction. The Cyberpunk movement also has a personal stake in the
prevention of totalitarian rule; which has an equal footing with altruism.
It is for these reasons that the movement should be at the forefront of "The
Second American Revolution", and contribute their knowledge and attitudes to
its success, and the restoration of a libertarian form of government to the
United States of America.
The Cyberpunk movement has always had the libertarian attitude of "The
government which governs best, governs least.", and "Technology belongs in
the hands of the people". These attitudes follow in the footsteps of the
country's founding fathers. The lack of such an attitude by those in power
has been a major factor in the totalitarian slides this country has been
experiencing. The Cyberpunk movement has also stayed away from the
forefront of politics; preferring to stay in the background, let others "run"
things, and act as "watchers"; keeping vigilant for lapses in judgement by
the ruling powers. This attitude is precisely what is needed for those who
will be at the forefront of The Second American Revolution, for once the
initial job is done, "disinterested" parties will be needed to ensure the
mistakes of the past are not repeated. The existence of well-equipped
Cyberpunk "Watchers" will act as a future deterrent to those wishing to
revert back to totalitarian ways.
The Cyberpunk movement has always given a high priority to acquiring
knowledge in many different technological and other fields. They have also
been adamant about implementing the mass-distribution of such information.
These two factors alone are qualifiers for any group conducting low
intensity conflict towards the institution of a libertarian form of
government. In addition, the Cyberpunk movement stresses practical
"hands-on" applications of the knowledge they collect and disseminate. This
is another factor that makes the movement well suited for the task at
hand.
Since the Cyberpunk movement has the proper attitudes and knowledge
available to it, they are well suited for the task of ensuring the United
States regains and maintains a libertarian form of government. Just as the
founding fathers had a responsibility to create the United States, the
freest country in the world; it is now the responsibility of the Cyberpunk
movement to restore the freedom that this once great country lost, and to
take on the responsibility towards the operational aspects of The Second
American Revolution and the re-establishment of a libertarian form of
government in this country. There is, however, an even more important and
pressing reason as to why the movement should act.
Throughout history, even in benign and democratic governments, there has
been prejudice towards individuals and groups who have the capability of
self-sufficiency. Such groups have been persecuted severely, with their
members often facing death. This has occurred even if such groups have had
no political leanings whatsoever. They were simply viewed as a threat to
the powers that be, and dealt with. By taking a look around, any astute
observer will be able to see this beginning to happen with the Cyberpunk
movement. In this instance, we have the greatest responsibility of all, the
responsibility to ourselves to ensure our survival.
One must remember that our responsibility to the revolution does not
imply we should organize any more than we already have. In fact, our
activities should be kept to small groups, and be as disorganized overall as
possible, as to better stay hidden and difficult to track down. Twenty small
groups operating on their own will be harder to track down than one large
group. If everyone just simply does there part, there will be no problem
winning this one. Our shadowy existence and characteristic of being
"everywhere and nowhere" will also act as a deterrent to keep the future
government leaders from acting as stupid as the ones we presently have in
existence.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [6]: FOR THE PEOPLE
Supplied By: Those Wacky Secret Service Agents
Edited by: Mercenary
-------------------------------------------------------------------------------

Secret Service Agents Get Free Vacation

Rumor has it that the Secret Service security detail of Secretary of Defense
Les Aspin were provided with a swank 6 day/5 night holiday in Venice,Italy

Courtesy of U.S. Taxpayers.

It seems that Aspin finished off an official business trip in Europe with a
jaunt to Italy. Although Mr. Aspin payed for his own expenses and his
girlfriends, the SS Agents were provided with $500.00 to $700.00 a nite rooms
in the 5-Star Hotel Danieli, courtesy of you and me.
Must be nice, probably a reward for harrassing innocent civilians.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [7]: The Rumor Mill (Unconfirmed Rumors From the Underground)
Edited By: Mercenary

-------------------------------------------------------------------------------

HAN SOLO SELLS OUT TO THE EMPIRE??

I am writing to update you on yet another 203 lamer (this area code seems to
be chock full of em) named Rob A. (aka Han Solo and sometimes Lurker).
He turned me in to Yale for supposedly hacking an account on their VMS system.
They will probably be calling me shortly. His reasons are that I purportedly
"screwed him over" with a little deal we had.
The deal was, I'd give him a UNIX account at SCSU in exchange for the use of
his account on a very nice elite BBS. Things went fine until he got it in his
head that I'd shared that unix account with someone else, which was not true.
He then took it upon himself, as a "security measure" to turn me in.

-------------------------------------------------------------------------------

DR. DETERGENT OF TDT RETIRES??

June 15, 1993
Dr. Detergent / TDT 1993


I herby officially retire from the scene. Got an excellent job which
takes me all over the world, so I don't have time for this stuff any more.
To all the sysops worldwide, please delete my accounts on your boards.
If there are any new applications under my name, you may rest assured
that it's not me.
It was great serving the Elite underground. Take care all ya boiz - my
friends, and maybe some enemies (don't remember having any thou!)
All ya groups, keep up the good work ya do for the pirate scene - as you
know without you, there would be nothing.
This is a very short msg, compared to most of the docs I write, but it's
all that's needed.

Till sometime in the future.
Take care.

Dr. Detergent : VEC/GB/INT/PHX/INC/DW/UNT/THG/TDT. 1988 - 1993.

-------------------------------------------------------------------------------

FEAR AND LOATHING BBS BUSTED

Hello,

Well, there is some TERRIBLE NEWS here.

The FEAR & LOATHING BBS in Las Vegas,Nevada was BUSTED today, Aug. 3, 1993.

At 8 am. - The FBI from Birmingham, Alabama came in and presented a Search
Warrant dated 7/29/93 and proceded to swipe every piece of Electronics
from The Doctor - SYSOP of the Fear & Loathing.

What they told the Doctor was this..... to paraphrase .

"Didn't you learn a lesson from Rusty 'n' Edies?
We have been subscribing to the Fear for about a year, and we have
capture screens of your Board.
We know you have NOVELL and Quarterdeck stuff on your Board."

(When Doc protested that he did NOT and had a strict NO-NOVELL Policy,
they said that he DID have NOVELL stuff on - about 3 months ago.
They also spoke informatively of the files and messages that had passed
thru the Fear)

Two NOVELL guys and one Quarterdeck guy were in on the Raid.
It was ALL FBI and no LOCAL Cops were involved.
All Doc's Computers and Electronic Gear were taken away, "to be studied in DC"

All Fear Users should know that the Doc kept NO PERSONAL, or USER INFO on his
system. In fact,despite that I feel SICK to my STOMACH and that next to Doc,
I have lost more in this bust than any other user, as I was Cosysop and
Top Uploader - having ULed almost half a GIG.
I must ask WHY the Feds would go after the Fear,a Big BBS but not the Biggest,
a fast BBS but not the FASTEST, a NICE sysop but one who didnt even USE the
wares he had. They asked him where all his DISKS were, but since he didnt USE
the wares, he truly didnt HAVE any!

They saw a MiniCam VCR Camera he had and asked him where the Tapes he
made of his BBS Screens were. When Doc protested that he did not MAKE Videos of
his screens and why should he? .. the Feds said .. EVERYBODY does !

Well, this is one of the saddest days in my life.
Of course its nothing compared to what the Doc is going thru.
Yet, the Doc remains cheerful. He needed the Fear & Loathing and BBSing like
a Hole in his Head.
The Pirate community knows that the Doctor did not even call out and had maybe
one or two accounts on ANY other Pirate BBSs, and those he almost never used.
The Doctor lost the Hardware for a BBS that was 7 Nodes and about 7 Gigs, all
the computers and USR 16.8k Modems and LAN Network etc,etc.
Gotta be worth probably at LEAST $15,000.
Anyway, the Fear Bust will have minimal impact on other BBSs as the
Doctor truly almost NEVER called out and really doesnt KNOW anything
about other Pirates and Groups and Boards.
As the Fear was a TDT and ECR Member BBS, Those Groups suffer in losing a good
BBS. We must wonder, after the Bust of the Lite House, another TDT BBS.
Whether TDT BBSs are being targeted.. however... I think NOT,as the Lite House
was a purely LOCAL Bust. NO FBI involved there,and was the result of some Kids
getting caught with stolen CC's. More on this later below.

THE FEAR NEVER WAS INVOLVED IN H/P/A/V Stuff
We NEVER had any Credit Carding info online.

BECAUSE we had no CC info, my first thought was that this was the first case
of a BBS being busted that was a PURE Pirate BBS.

BUT .. THE LESSON OF THE FEAR BUST IS THIS......

SUBSCRIBERS WILL DO YOU IN !!

Upon some one hours' thought after learning of the Fear Bust.
I realized from the info I listed above - that the FBI had said that they
had SUBSCRIBED (A PAID ACCESS ACCOUNT) that the pathway to DOOM for
the FEAR was just that .... ALLOWING SUBSCRIBERS to "PAY FOR WARES" .

YES... we DID have some NOVELL stuff online for a very short time ...
but so does almost every other Pirate BBS.. it is the large number of
Subscribers that I suspect opened the Window of Vulnerability.

My advice to my brother Pirate Boards is to ELIMINATE SUBSCRIBER ACCESS.
SUBCRIPTION ACCESS seems now to have been earmarked as NOT ALLOWABLE by
the FEDS. We all know that the Feds and AT&T have the capability to
bust any and every Pirate BBS in the USA ... but they DON'T .

The ONLY "crime" of the Fear outside of Regular Piracy was allowing
SUBSCRIBERS and PAID Access.
Again... we had NO Credit Cards info or XXX rated files etc etc...

Off the top of my head ... the Davy Jones Locker Case comes to mind ...
but THERE I believe the Sysop ( Jackson - ?? ) WON his defense as I
recall .. BUT the circumstances were quite different.
The APL case may be a closer comparison.

The terrible IRONY of this bust is that ... the Fear had been slowly
REDUCING the number of subscribers ... and if the Doc had wanted to screw
the Users.. he would have preferred to ELIMINATE ALL Subscription access
MONTHS AGO ... as SUBSCRIBERS ARE LAMERS and contribute NOTHING to
BBSing. Well.. any experienced Sysop knows THAT .

The Fear was TOO NICE.

And now.... one great Sysop, a Gentlemen, a Physician MD, and one of
the Best Human Beings I have ever known is now in Bad Trouble.
He is fortunate in that he has a great Life, can afford the $$ loss of
the Hardware and to make his own Legal Defence.
I am sure he will soon put all this behind him ... the BBS had been a
Pain in the Ass for him anyway ... and I think that He (and I) have
slowly been growing away from the scene .

So ... the Fear and Loathing ...over 10 years old.. is DOWN FOREVER.

The BBS has been having Hardware problems anyway and the Doctor just
doesn't need the Headaches. He had a great Run and I think made a
difference in the Pirate Scene.... The Fear and Loathing was a FRIENDLY
Place to be ... and as I consider the loss of my favorite place to call...
it occurs to me that maybe *I* have some blame in this .

When I became a Cosysop of the Fear .... it was not as Fast or as
Big as it ended up. In fact ... it was a bit of a Sleepy Southern BBS.
Perhaps it was due to my efforts to make the Fear - a Fast KickAss BBS ...
to join up with TDT and ECR .. to get a whole new bunch of Great Users..
and to advertize the BBS.. perhaps the increased exposure, the Groups, the
Fast Wares .. did the Doctor in. Maybe the Fear could have remained a
nice medium Board for another 10 years.

But before I throw up ... I am reminded that the Feds DID say that they
had been subscribing to the Fear for about a year .. maybe even more.

That would mean that they were on the Fear even before I became a
cosysop there...altho' I have been a Fear User for over 4 years.
But the point is then ... that.. if they were on for THAT long ... then
probably the Bust was just in the Cards.. and was bound to happen
sooner or later.

In fact.. the Fear was DOWN all last week due to hardware problems
even on July 29th when the Search Warrant was issued... and only came
back online ..about 2 days ago.... maybe THAT was the reason for the
Bust NOW...OR maybe it was that the shitty NOVELL DOS wares that are going
around the Boards ... had just been ULed to the Fear .

The Fear and Loathing was started a bit after Plato's Place- an old THG
BBS. The Doctor only wanted to become as Big or Bigger than Plato's,
he suceeded quite well in doing just that .


Some other Comments that come to mind follow below ; I have just learned
about this less than an hour ago and my thoughts are not quite coherent
and set in place just yet .. and imagine the Doctor...after the FBI
came to his Home and spent the last 4 hours of this morning going thru
his house ... jeesus....:

As usual they arrested all the HARDWARE .. but the Doctor has not been
indicted.... YET! They said that the case will take between 1 and 5
years to process and that he faces a JAIL term if convicted.
Personally , I think Jail is very unlikely for Property ... not Violent
Criminal acts.... and for a first time offender with a good job and who
is credit to his community.

But who the hell wants to face even the POSSIBILITY of Jail ? And to
have to live with that over your head for the next year or years ??

The Doctor is a victem of pure Novell GREED.
The Novell guys asked him if he knew how much Money the Software
Companies were losing because of him ??

This is a BAD JOKE... as the Fear had never much more than 500 Users...
of which... what... how many would be really active and of THOSE how many
people would be INTERESTED in DLing NOVELL products..... maybe 50 ??
and of THOSE how many people would have the DL Bytes available or
access to DL a Huge ware like Novell... you KNOW that these Big Pirate
Wares are NEVER DLed much ... thats why CD-ROMshit is not allowd on
many BBSs.. and anyone who knows anything knows that Novell is WAY too
complex a ware to try and use by simply DLing a Pirate version of it...
so Novell lost maybe 10-20 Possible Sales....or certainly .. far less.

BUT .... HOW MANY PIRATES .. IF THEY WERENT GETTING THE SHIT FOR ALMOST
FREE... WOULD ACTUALLY BUY ANY OF THE WARE THEY DLed!!

AND .. how many wares they DL are actually WORTH BUYING !!??
( THIS is why piracy EXISTS )

The Doctor was that rare Sysop who DID BUY SOFTWARE. HE DID BUY PCBOARD.
He DID BUY LANTASTIC .He DID BUY PRODOOR (which he didn't like or use).
He DID BUY the stuff he LIKED.

AND.. Irony of Ironies... because the Fear had outgrown Lantastic having
7 busy Nodes ... he was all ready to BUY NOVELL 3.11 NEXT WEEK !!!

SO .. intelligent NOVELL actually LOST ONE GURANTEED SALE of NOVELL
Products with the Fear Bust . They could have Milked the Doc for YEARS
with Paid Support and Addon Products... but this is not to be.

A FINAL NOTE OF WARNING :
=======================

The FBI said that they had subscribed to the Fear for about a Year.

THEY SAID THAT THEY HAD BEEN ESTABLISHING THIS ACCOUNT HANDLE FOR ABOUT
5 YEARS !! AND THAT THEY WERE GOING TO GO AFTER OTHER BBSs !!!!!

THEREFORE WE KNOW IT WAS SOMONE FAIRLY WELL KNOWN WHO WAS A SUBSCRIBER.
RIGHT NOW WE ARE COMBING THRU THE FEAR SUBSCRIBER LIST ... IT HAS TO BE
SOMEONE THEREFORE WHO IS ON MANY OTHER BBSs .. A WELL KNOWN USER .. BUT
PROBABLY NOT A BIG TIME PIRATE ... OR ELSE THEY PROBABLY WOULDNT HAVE
BEEN A SUBSCRIBER. SO... probably NOT A EUROPEAN.

WE MAY MAKE THE FEAR SUBSCRIBER LIST PUBLIC AND LET OTHER SYSOPS LOOK
THRU THE LIST AND COMPARE AND SEE WHO THE USER ACCOUNTS NAMES THEY HAVE
IN COMMON WITH THE FEAR LIST..AND THUS NARROW DOWN WHO THE "MOLE" MIGHT
BE THAT IS THE FBI/NOVELL TRAITOR PIRATE.

SOMONE HAD MENTIONED TO ME THAT THERE WAS A NOVELL REP PIRATE ON MANY TOP
BBSs BUT REFUSED TO GIVE ME THE NAME. THEY ALSO PREDICTED THAT SOME
BBSs WOULD GO DOWN " IN A MONTH" .
THAT WAS A MONTH AGO .... MAYBE NOW THEY WILL GIVE ME THAT NAME.

Personally , I have just made a back up of all my Computers and have
hidden away all my Disks, Tapes and Anything and EVERYTHING Pirate Related
and have Cleaned off of my computers any Pirate Wares or Copyrighted
Software or BBS numbers so I am cool ... I have never heard of the Feds
going after Cosysops .. but I am ready . I have hidden all this stuff
off of my property .
My accounts on other BBSs are cool because I always have unique
passwords on each and every BBS I call and so the psws I had on the
Fear are NOT used on any other accounts I have.

*************************************************************************
**BUT ALL FEAR & LOATHING USERS WHO HAVE ANY ACCOUNTS ON ANY OTHER BBSs**
**THAT USE THE SAME PASSWORDS AS WERE USED ON THE FEAR & LOATHING BBS .**
**MUST CHANGE THOSE PASSWORDS IMMEDIATELY ! **
*************************************************************************

THE FEDS DO HAVE THE FEAR's COMPUTERS AND HARD DRIVES.. THEY DO HAVE
THE USER LISTS !!!

As for me - I am obviously diminished as a Pirate Influence but
will still be a Trader... in fact .... my own phone bills will
probably be much much less without the long distance calls of an hour or
two a day to the Fear...and the Doctor will be saving much $$ and Time
spent running a BBS who's wares he didnt even USE.

I may even start a BBS of my own someday.. one reason I wanted to be a
Cosysop was to see what running a BBS was like.
If I do start a BBS.... RULE # 1 = NO SUBSCRIBERS !

The Doctor remains in an upbeat mood.. altho' perhaps in a state of shock.
He is a strong confident successful hard working man and will weather
this storm very well I am sure.

Most Top BBS have a MUCH greater majority of good Users who are on many
other BBSs. Or I should
Users...for sadly.. I must speak now in the Past Tense when I talk of
the Fear and Loathing.
But ... on the Fear ... the 170 or so subscribers were for the most
part... WITHOUT other good BBSs to call... thats why they subscribed to
the Fear. It is THESE Users who will be the most affected the loss of
their favorite Board .

The Doc will survive fine without the Fear ... but he will not be a
member of the Pirate Community any longer and from the info above
here.. you may have learned that ... while he ran a large Pirate BBS...
he was no

  
t widely known ..nor did he care or need the Pirate Wares that he
himself provided to others thru the Fear and Loathing BBS.

He didnt have the Time and he didnt have the Interest.
And he certainly doesnt NOW !

And as I mentioned to him.. compared to the REALLY Sick patients he
sees in the Operating Rooms... he may very well be better off to be rid of
something that was becoming a Pain in the Ass....running a large BBS is
cool at first... but after 10 years.. it does tend to become a CHORE...
especially as more and more "old-timers" are leaving the scene as
Piracy is not what it once was.

I remain a Pirate. But I think I will slow down . A lot of the FUN
has now gone out of the scene for me. I enjoyed trying to help the
Fear and Loathing to Grow... I enjoyed trying to help out the busy Doctor
in the running of his BBS . I enjoyed the interchange with all the
good Users I met on the Fear and I hope I can keep in touch with them
in the Future... as I certainly intend to keep in touch with the Doctor.
I will still trade and indeed .. will have more time now to do so ...
... after time mends my broken heart.

It is due to the fact that the Doctor had never bothered to call out
very much and get accounts on many BBSs that he asked me to inform the
Pirate Community at large of the Demise of the Fear ... and the Lessons
that can be learned .

Those of you that know me ... know that my worst vice is that I write
Email that is WAY TOO LONG.... and Ive done it again... but perhaps for
the last time.

I hope that people will remember the Fear and Loathing in Las Vegas BBS,
----- after all 10 years is a long time .

I know I will . It was one of my First Pirate BBSs !
The Doctor let me have access on my first call when upon filling out the
New Users application... he interrupted me to Chat and upon learning
that I was a Plato's Place guy and did have some new Wares and one or
two other BBSs.. accessed me on the spot.
I never forgot that act of Generosity and was loyal to Him and the Fear
ever since. I hope I gave more than I received.... but the lessons I
have learned and people and friends I have made through the Fear far
outweigh whatever I may have contributed to the Fear BBS.

Piracy is NOT just about WARES.... Its also about PEOPLE .

Novell may have won one round here against the Fear but they can NOT win
the Pirate War... there will always be New Sysops willing to fight against
Outrageously Priced Software, Over Hyped, Non-Working or
non-functioning features-as-advertised, expensive micro-Updates every
few months and so on and on ...beyond the scope of this message.

And I must say that the Vast Majority of you , my Pirate Brothers,
I have found to be excellent , very friendly and intelligent people.

But there ARE MOLES and TRAITORS among us Pirates... these scum of the
Earth... who will DL and enjoy many Wares on the unfortunate Boards
they are on .... and then Bust those Boards .... perhaps even after
being the ULers of their own NOVELL Wares themselves in a Sting operation
( we are checking this out too ) .. those scum are doomed by their own
natures to be worthless, friendless creatures ... for what sort of
human beings can they be... and no one likes a snitch... and anyone who
DOES these acts .. surely will be having a shitty life ... as who else
but a totally shitty low-paid small-minded person would do such things.

The Revenge of the Fear is that the Traitor Pirate will be found out in
the Legal Proceedings OR SOONER & that Novell is doomed anyway
... with UNIX COSE Networking beoming friendlier & even Microsoft getting
into the Networking Competition. Through its Pricing and Service and Bugs.
Novell's own Life expectancy may not be too high.

In fact ... Novells' Stock Prices today at 20&3/4 on the NASDAQ exchange
is down today .... they have my sincere wishes for a swift and complete
fall into Chapter 11 Bankruptcy.
He laughs Best who Laughs Last. Novell may have some Bad Luck in the
Future as doing Bad Deeds always comes back to haunt the perpetrator
sooner or later and they have made many Enemies..

So I close ... but on a positive note .... Piracy Lives and in fact
there are MORE and MORE Pirate Boards now as Piracy becomes more
"MainStream" into society with cheap fast Modems and Cyperpunks on MTV.

I am just old enough to have experienced the "60's",and I have always
regarded Piracy and Pirates as some of the few true remnants of the "60's"
Underground Movements .

I am happy if I have helped the Doctor - the most unselfish Sysop I
have ever known - and one of the FASTEST Sysops... I've seen him
Install a Door on all SEVEN Nodes in about 15 minutes ! There won't be
another SYSOP like HIM. It was his HOBBY and he was in it for the FUN.

Examples of what the Doctor had achieved - 7 Nodes,and 7 Gigs
there are very few BBSs PD or Pirate of THAT Size. PLUS the Fear was one of
only two BBSs in USA that KEPT ITS WARES for OVER 2 YEARS, ALL ONLINE!!
The First ACiD ANSI ACQUISITION was composed and ULed to the Fear.
The Doc was one of the 1rst BBSs in USA to go with the new PCBoard V15.0 Betas.
The Doctors' BBS was chosen to become a TDT Member BBS and was also
chosen to be the ECR Courrier HQ in USA ...AND many many Big Pirates and
Group Members on the scene now .... got their start on the Fear &
Loathing. In fact ... we used to joke that the Fear was a College for
Pirates !

He had Plans to Improve and Increase his BBS even further when he had time.
Just last night in fact ... The Doctor installed the ZYRION Protocol.

No matter HOW Big his BBS became.. the Doctor ALWAYS had time to answer
his Users' Mail . ANd just imagine how exciting it must have been for
him to answer questions like .. " How do I use the Zippy Scan" after 10
years of SYSOPing !
When I say he was generous... I mean GENEROUS. Armed Forces Veterans
were allowed high access for free ; those users cash-poor or Wares-poor
were almost ALWAYS allowed MEGS and MEGS of free credits... in his 10
years of SYSOPing ... maybe ONE person was booted off the Fear and even
THAT user could have re-applied for access had the system not
automatically booted him off for not ULing a single file. Id say that
in the last year alone .. the Doc GAVE AWAY over 300 Megs in Free Credits
..virtually anyone who asked him for help .. went away well satisfied.
EVEN LOCALS were allowed on and given High Access so they wouldnt be
begging for credits. Now how many other BBSs allow THAT !?
He tried to fulfill ANY Users requests and always had a polite word for
any user. He was NOT one of those new Sysops-with-an-attitude -2
Node-2 Megs-Im so kewl-type of guys.

There is so much I could say ... but I impose too long on anyone who has
read this far.... and I thank you for reading this far .

All I know is that a BBS that I have had great pleasure calling almost
every day for OVER FOUR YEARS is now gone .... and one of the few
pleasures in my over-worked life is now no more. When I went to my BBS
Directory ... it was the first BBS I called each night.. and the last
before I went to bed. I had just Chatted with the Doc last night on
how the BBS was improving and all the plans we had to make it even
better. You guys woulda really seen something .... there was more
growth potential at the Fear than at almost any other BBS I know.
All we lacked was TIME .

But as Fab said when he "semi-retired" ... how long can you do stuff to
impress 15 year old kids ?

This is one Hobby with a nasty after-taste. So ... SYSOPS take warning!.

For the Doctor and me ... its ....

ChildHood's End .
C'ya,

Empedocles
Cosysop - Fear & Loathing in Las Vegas BBS .

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [8]: PHANTASY TIDBITS: News and Views of Interest

-------------------------------------------------------------------------------

SNET Operators Now Fowarding ANI Data
by Thomas Icom/IIRG/Cybertek

A recent experiment conducted by the IIRG has confirmed that
Southern New England Telephone is now fowarding ANI data from
operator assisted calls. In the past, it was posssible to defeat
ANI by having the operator place a call for you. This piece of
information has been passed around and accepted as gospel on many
different H/P/A boards.
To detrmine if your RBOC is fowarding ANI data from operator
assisted calls, have the operator dial 1-800-235-1414 for you. This
is an ANI service run by Full Disclosure Magazine (P.O. Box 903,
Libertyville, IL 60048) and 1-900-STOPPER. If you receive correct
ANI data, then your RBOC is passing the data along.
One should also note that while 1-900-STOPPER will defeat Caller
ID and ANI, it is still a simle matter to suponea the phone company
for both incomming ANI and outgoing AMA data from 1-900-STOPPER.
These can then be cross-referenced to find out who called whom.
Your best bets for privacy are still payphones and buttsets.
Let's all be careful out there.

IIRG UPDATE: Full Dislosure is now only running an ad for their 900-STOPPER
service on the number given in this article.
You can however use, 1-800-852-9932 to test the techniques
in Icom's article. (Valid as of 8/10/93)

-------------------------------------------------------------------------------

FCC Releases Frequencies

The FCC has set aside narrowband 901-902,930-931, and 940-941 MHz for
wireless communications services or (PCSs) Personal Communications Services
such as paging,electronic mail and faxing. The FCC has not chosen a selection
process to pick providers of narrowband PCSs, but has said it will pick 11
nationwide licensees and 13 regional licensees and 10 local providers.

-------------------------------------------------------------------------------

Put Your Hands in The Air and Give Me Those Chips!

A string of armed robberies is haunting Silicon Valley, recently 10 young
men armed with handguns forced their way into Bestronics Inc in San Jose
and subdued the workers before carting off $15,000 in memory chips.
Apparently their MO is to handcuff,beat and torture employees until their
told where the parts are stored.
Hot items are memory and 386 and 486 CPUs. Youth gangs are cruising
industrial parks loking for easy targets. At least 3 companies have been hit
in the last month.

UPDATE!!:

The San Jose Police have arrested a 20-year-old male who they believe is
the individual responsible for the recent wave of robberies.
Police pulled the man over after noticing the car he was driving had 2 two
different license plates. One was from a stolen car used in one of the
robberies.
After obtaining a search warrant for the mans home, police found memory
chips,police scanners,two-way radios,firearms,and hand-cuffs.
Police are still searching for 9 more individuals.

-------------------------------------------------------------------------------

ATM Bandits Nabbed

On Wed. July 7th, a Federal Grand Jury indicted Alan Scott Pace,30, and
Gerald Harvey Greenfield,50, both of Tucson,Arizona for installing a fake
automated teller machine at the Buckland Hills Mall in Manchester,CT.
The two men allegedly put a Fujitsu Model 7020 ATM machine that had been
modified to record users accounts and PIN's. without paying out cash.
They then made duplicates of the cards and used them at banks throughout
the country at valid ATM machines.
The eight-count indictment charges them with bank fraud counterfeiting of
ATM cash cards,interstate transportation of stolen property,and conspiracy.
Pace was arrested on June 23rd by the Secret Service in New York and
Greenfield surrendered to the Secret Service five days later.
They now face 60 years in prison on the combined charges.

-------------------------------------------------------------------------------

FBI Calls For Gun Licensing
By NEAL KNOX


Incredibly the story of the FBI recommendations has only run in the
July 8, 1993 New York Times on an inside page and in USA Today on July 9,
1993. No other major newspapers or TV news outlets have even mentioned
this proposal as of today, July 10. It is necessary for each and every
one of our readers to contact their local legislators and present them with the
NRA press release and make your opinions known.


NEAL KNOX REPORT

WASHINGTON, D.C. (July 11) -- FBI Director William Sessions
has recommended to Attorney General Janet Reno that the Clinton
Administration call for a wide range of new firearms laws,
including licensing the possession of handguns after mandatory
training, with "appropriate reimbursement" for firearms of those
who can't pass the training or who voluntarily turn in their
guns.

This incredible document, which notes that the FBI does not
publicly comment on political matters to avoid "destroy(ing)
confidence" in the agency, says "(t)he proliferation of firearms"
and their use in violent crimes justifies "an extraordinary,
singular departure from this policy."

The last item of Sessions' 10-point recommendation -- which
the FBI refuses to release -- calls for the FBI Office of Press
and Congressional Affairs to "develop a media strategy to
publicize and develop support for the FBI's position."

In short, the FBI Director is recommending to Attorney
General Janet Reno that she authorize violation of Section 1913
of Title 18, U.S. Criminal Code -- which prohibits lobbying with
appropriated funds.

Naturally, the FBI recommends enactment of the "Brady Bill,"
though raising questions about the accuracy of state criminal
records checks and other "technical problems."

The FBI also recommends "a complete prohibition upon the
transfer, importation, transport or possession of assault
firearms" -- which are not defined, except as high capacity and
"fast firing."

Sessions calls for "a complete prohibition upon the
possession of armor piercing ammunition," which would be defined
"upon performance standards, not composition" -- presumably on
the basis of penetration of aluminum plates such as the FBI used
in its mid-1980's tests of AP ammo.

Much conventional high-velocity handgun ammo can penetrate
the Kevlar bullet-resistant vests worn by police. However,
because the FBI's recommendation is not limited to handgun
ammunition, it could be used to ban almost all center fire rifle
ammunition.

Finally, the FBI recommends "reallocation of existing
resources to increase the regulation and oversight of" Federal
licensees -- and, among other things, increase license fees,
require an existing place of business, and a background check
with fingerprinting of potential dealers. That just happens to
jibe with the FBI's long ambition to have BATF's firearms
enforcement powers.

The "FBI Working Group" which prepared the recommendations
"discussed at length whether the FBI should recommend a general
ban on the possession of handguns. After careful consideration,
the group concluded that a proposed ban would not receive
sufficient support."

Clearly, they really wanted an outright handgun ban, but
didn't think it would pass and, as they wrote, "would likely
place us outside the scope of the current debate over firearms,
and thus perhaps marginalize our overall impact."

I first thought that the FBI proposal was a trial balloon to
make the Administration's firearms recommendations in the omnibus
crime bill (due out later this month) appear modest by
comparison. But, amazingly, neither of the Washington newspapers
has said a word about the FBI's landmark proposals.

That indicates that the anti-gun "Washington Post" doesn't
want to talk about the Clinton Administration's "next step" until
the "first step Brady Bill" has been signed and sealed.
The "New York Times" and other newspapers which have
reported the FBI recommendations have focussed on their support
for the "Brady Bill," with little or nothing about the radical
handgun licensing and "assault weapons" (whatever that is) ban.

Those reports have speculated that Sessions -- whose job has
been hanging by a thread since being charged with ethics
violations at the end of the Bush Administration -- was merely
currying favor with Reno and the White House.

Nonsense. No bureaucrat, or "Working Group" of bureaucrats,
would make such a radical recommendation, or openly move to
politicize the FBI, without orders -- or at the very least, a
wink and a nod -- from someone much higher up.

I think we're getting a look at the Clinton firearms
platform -- and we'll see all of it before the next four years
are over.


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [9]: IIRG Distribution Sites
(or Gateways to Oblivion)

////// ////// /////// ////////
// // // // //
// // /////// // ////
// // // // // //
////// * ////// * // // * /////////


IIRG World HQ: The Rune Stone BBS
14.4k HST
Phantasys Home Board
Complete IIRG Archives 3000+ Files
(203)-832-8441
NUP: Conspiracy

IIRG Distribution Site 1: BluePhishen' BBS
Fidonet 1:2603/406
IIRG Distribution Site
Sysop: Global Death
(212)-924-9627

IIRG Distribution Site 2: Deadcity
Sysop: RoughNeck
Australia
Criminal Intent HQ
+61-3-417-2060


IIRG Distribution Site 3: The Sanitarium
Sysops: Morbid Angel [INC/ACID]
Spectral Illusion [ACID/RAZOR]
IIRG Distribution Site
ACID Member Board
INC Courier Board
RAZOR 1911 Courier Board
VISA World Headquarters
(817)PRI-VATE

IIRG Distribution Site 4: The WareHouse
(203)-TMP-DOWN
Curently Under Investigation
Sysop: Ionizer

IIRG Distribution Site 5: Hollow Tree Productions
Sysop: Phantasm
TWA Distro
IIRG Phantasy Distro
Extreme*Net
(313)-EXE-TREME

IIRG Distribution Site 6: The Web
(203)869-0938
Oblivion/2 Beta Site
9600-14.4k v.32bis
SysOps: Spyder Man &
egghead <ACiD>
ACiD Member Board
Ecstatic Sound Productions
IIRG Distribution
OOFNet / CyberCrime Network

IIRG Distribution Site 7: Lost Horizon BBS
ZyXEL 16.8k [v.32bis/v.42bis]
203.667.4953
Virulent Graffiti Distro Site
IIRG Distro Site
NO File Ratios

IIRG Distribution Site 8: The Hawks Nest
(201)-PRI-VATE
300-14.4K BPS
Modernz Distro Site
High tech Hoods Site

IIRG Distribution Site 9: Liquid Euphoria
Phalcon/Skism
Sysop: Hawkmoon
(914)-PRI-VATE

IIRG Distribution Site 10: The Black Lodge
LodgeNet Member Site
Sysop: The Brit
(5o8)-PRI-VATE

IIRG Distribution Site 11: Kaotic Attractor
Sysop: Mr Wyzard
(5o8)-PRI-VATE


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [10]: Phantasy Distribution Sites

Phantasy's Distribution Site's are continually growing,we apologize if you
called a board and didn't find the Mag. Network Distribution Sites will
have the Issues first, we suggest calling one of them if a problem does
arise.


1. Lightning Systems
(414) 363-4282
200 Million Bytes OnLine
USRobotics Dual Standard HST/V.32bis
2400 thru 14.4k v.32bis/HST

2. The Works BBS
Waffle Net v1.65
[617]/861-8976
3/12/24/96/14400b 7dy/24hr N,8,1
Lexington, MA
200 Megabytes of Storage
99.44% pure textfiles
Remote cDc Node (Very remote)

3. The Dickinson Nightlight
(713)-337-1452
Phantasy Distro Site

4. Abiogenesis,
3/12/24/96/14400 Practical Peripherals 14400FXSA
Fidonet 1:280/310.
Phone (816)734-4732

5. Uncensored Communications
Cybertek Magazine SIG
(914)-761-6877

Phantasy is also available on these systems,

Ripco II BBS The Hell Pit Pipers Pit BBS Cybernetic Violence
(312)-528-5020 (708)-459-7267 (203)-PRI-VATE (514)-PRI-VATE

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Next Issue:

More on the Ionizer Persecution

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PHANTASY(C) IIRG 1991,1992,1993
May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
May You Be Feasting and Drinking in Valhalla For a Full Night
Before the Christian God Knows You're Dead
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Francesco's profile picture
Francesco Arca (@Francesco)
14 Nov 2024
Congratulations :)

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT