Copy Link
Add to Bookmark
Report

Damage Inc. Newsletter Issue 11

eZine's profile picture
Published in 
Damage Inc
 · 5 years ago

  


ÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛ ÛÛÞÛÛÛÛÛÛÝÛÛÛÛÛÝ
ÍÍÍÞÛÛÛ ÛÛÛÍÞÛÛ ÛÛÛÍÞÛÛ ÛÛÝÞÛÝÞÛÛ ÛÛÛÍÞÛÛ ÍÍÍÍ ÛÛÜÜÜ ÍÍÍÍÍÞÛÝÛÛÝ ÞÛÝÞÛÛÝÍÍÍÍÍÍ
ÍÍÍÍÛÛÝ ÛÛÛÍÛÛÝÛÛÛÛÍÛÛÝÞÛÛÍÛÛÍÛÛÝÛÛÛÛÍÛÛÝÍßÛÛÝÞÛÝßßßÍÍÍÍÍÍÛÛÞÛÛ ÛÛ ÛÛÝ ÍÍÍÍÍ
ÞÛÛÛÛÛÛÛÛÞÛÛÛ ÛÛÛÞÛÛ ÛÛÝÞÛÝÞÛÛÛ ÛÛÛÞÛÛÛÛÛÛÛÝÛÛÛÛÛÛÛ ÛÛÝÞÛÝÛÛÝ ÞÛÝÞÛÛÛÛÛÝÛÛÝ
"The name speaks for itself!" ÞÝ

Presents the

Damage, INC. Newsletter

August 1998 Issue #11

"No Phear."

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
C O N T E N T S :


þ INTRODUCTION - An Introduction to the Damage, INC. Newsletter.

þ BIG BROTHER BASHING - Electromagnetic Mind Control Weapons Part 2.
¯ Search String: {BIG BROTHER}

þ BLACKENED'S TIP OF THE MONTH - Social Engineering.
¯ Search String: {BLACKENED}

þ BREAKER'S REVIEWS - Not available in this issue.
¯ Search String: {REVIEWS}

þ CONSPIRACIES AND COVERUPS - Examining the Majestic-12.
¯ Search String: {COVERUPS}

þ CORRUPTION AND GREED - Power industry reformation is required.
¯ Search String: {GREED}

þ CROSSED WIRES - PSYCOSiS BBS Advertisement.
¯ Search String: {WIRES}

þ DRUGS DISCUSSION - Sweet Leaf Dreams and Experiences.
¯ Search String: {DRUGS}

þ H/P INFORMATION AND NEWS - Dialing out through VMBs.
¯ Search String: {H/P}

þ INTERVIEWS AND INTERROGATIONS - Billy Gates: The saga continues.
¯ Search String: {INTERVIEWS}

þ LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter.
¯ Search String: {LETTERS}

þ OBJECTIVE OPINIONS - The ethics of hacking.
¯ Search String: {OPINIONS}

þ REPORTS FROM THE FRONT - Micro$oft Propaganda Bulletin and other articles.
¯ Search String: {REPORTS}

þ SOURCE AND SCRIPTS - Promisc.C source code.
¯ Search String: {SOURCE}

þ THC PHREAK'S TOP TEN LIST - "Hilarious VMB Messages"
¯ Search String: {TOP TEN}

þ THOUGHTS, POEMS AND CREATIVE WRITING - Chaotic/lyrical sound bytes/rants.
¯ Search String: {WRITING}

þ CLOSING COMMENTS - BLACKENED's Captivating Closing Comments.
¯ Search String: {CLOSING}

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ


< DISCLAIMER >

All articles contained in the Damage, INC. Newsletter are for informational
purposes only. Damage, INC. is not responsible for how any of the information
presented is used. It is not intended to be a manual with instructions to be
followed. We won't be held responsible for any damages caused, illegal acts
committed etc. by our readers. If/how you use the information given is entirely
up to you.


< COPYRIGHT NOTICE >

All articles and source code contained within this file are (C) Copyright by
Damage, INC. (unless stated otherwise). No part of this work can be modified,
reproduced or changed in any way without the expressed written consent of
Damage, INC. That means, electronically or otherwise, in part or in whole
this file must not be altered. It cannot be included with any other releases.
You cannot claim that you wrote it, or alter any articles and source code that
has been written and Copyrighted by us. Also, do *not* distribute any
Damage, INC. releases in "packages" with other text files or utilities. They
must only be distributed alone in their present, original form. You are
permitted to read and distribute the Damage, INC. Newsletter freely to quality
h/p boards only.

Copyright 1998 by Damage, INC.
All Rights Reserved.
_______________________________________________________________________________


INTRODUCTION: Through the darkness, between the states of madness and above
the countless layers of misinformation. It's August and we're
flying high again. So, drop a few hits, get out your favourite
bong, rip open that garbage bag of weed, cut that brick of hash
with a chainsaw, or just grab your dirty old crack pipe...
because it's time to start stokin' and tokin' again. ;)

Have no phear, there's plenty of dope for everyone. We've got
an infinite supply of premium bud stashed away in a safe place
here for you to try. This is the alternate dimension of the
universe, where nobody knows your name and nobody cares since
everyone is baked. A true Utopia? That's for you to decide.
In this realm, the people are all strange and their thoughts
are their own. Ideas and opinions aren't dismissed for being
different. Yes, indeed it is an unearthly place to be.
However, it's where we reside... thriving on the uniqueness
of what surrounds us. There are no rules and we phear nothing.
In this world, intelligent beings are free to think and do
anything. Is it reality or illusion? Dreams and illusions
aren't lasting. They are transparent realities that can be
easily shattered. However, thoughts are real. Their energy
is tangible and powerful. Embrace your "strange", "deviant",
"weird", "wrong", "unacceptable", "unpopular", "abnormal",
"psychotic" thoughts and join us in the Damage, INC. zone. ;)


BIG BROTHER BASHING - {BIG BROTHER}
Electromagnetic Mind Control Weapons Part 2:

In the last issue, I wrote an article named EM Mind Control Weapons Part 1
and stated that I would write Part 2 on the 1990s. Well, here it is. This
article will describe the EM Weapons of this decade and what Big Brother has
been working on relating to them.


ACOUSTIC PSYCHO-CORRECTION DEVICES - Supposedly, these devices can alter
a willing or unwilling person's behaviour after very little exposure by
transmitting specific commands to their subconscious using static or
white noise bands. Their intellectual functions aren't affected either,
so the person won't know that they've been brainwashed. Nor would anyone
else think that they were, since their level of intellect is unaltered.
Basically, it's a way of directly accessing a human being's mind. This
technology was developed by Russian scientists. However, the United States
is also conducting research and an exchange of information between the
two countries exists. In fact, using psycho-correction in Waco, Texas
(on David Koresh and the Branch Davidians) was even discussed. Some people
believe that some EM Weapons were actually deployed and used against them,
such as an unusual noise generator etc. I haven't watched the actual tapes,
so I can't comment on that. But, I won't discount the possibility of that.

EM WEAPONS - Electromagnetic fields can affect a person's behaviour, emotional
state and thought process. This involves stimulating the brain via a carrier
frequency. It's a technical process that involves using amplitude modulation
to shape the wave.. which mimics an EEG frequency... imposing theta rhythms on
the victims. The research and development dates back to the 1960s and 1970s.
They can easily be used to adversely affect a victim's mind and nervous system.
Dr. Robert Becker, a person that was nominated twice for the Nobel Prize, and
a specialist in Electromagnetic effects wrote a report that describes the
symptoms of limited exposure to microwaves. They include nausea, panic,
retinal irritation etc.


SLEEPING BEAUTY - A project that involves mind-altering EM weapons for use
on the battlefield.

MONARCH - A project that's supposedly directed towards the creation of severe
multiple personality disorder in intended victims.

There are many other programs and projects underway relating to non-lethal
weapons (or "less than lethal" as the military refers to them as being).
Many of these projects in the United States are funded under the U.S.
counter-drug law enforcement policy, which has a yearly budget of $10+ billion.
Basically, the resources are just diverted to fund mind control programs which
can be used to develop weapons for crowd control during riots, or as non-lethal
anti-personnel weapons. Since they're non-lethal, there isn't any opposition
to their development and creation. Many of these projects are "black" projects
and highly classified. You can't obtain any information about them through
the FOIA (Freedom of Information Act).

In conclusion, as I continue to research this topic, gain more knowledge and
information I'll attempt to keep everyone updated. The most likely scenario
is that articles on EM Weapons will be included in the Reports from the Front
section. I'll admit, this article was rushed. However, I intend to do
everything possible to ensure that readers of the Damage, INC. Newsletter are
provided with some current information in a future issue. Hopefully this
short article has opened your eyes about mind control weapons. It's something
that everyone should be concerned with and informed about in my opinion. These
weapons threaten our right and ability to think freely. They can be an evil,
unstoppable weapon in the hands of governments, terrorists and dictatorships.

Written by BLACKENED ú Damage, INC. (C)opyright 1998.


BLACKENED'S TIP OF THE MONTH - {BLACKENED}
Social Engineering:

In this article, I will share some tried and tested social engineering
techniques, tips, ideas and ways to apply them. I'll also explain what
social engineering is all about, why you should practice before attempting
to social engineer someone and what the best tactics to use are. Even though
TJ wrote an article titled 'Social Engineering' for the Damage, INC. Newsletter
Issue #2, I felt that it was necessary to write this article and share some of
the finer points of the art. The main reasons are that his article wasn't
nearly thorough enough, lacked useful information and techniques etc. Overall,
it wasn't complete and basically just contained his own untested theories and
ideas. TJ wasn't an experienced social engineer, nor was he a knowledgable
hacker/phreak. I regret publishing that particular article (as well as the
'Motivational Neophyte Blurb' that TJ wrote). In fact, I apologize for making
the mistake of including articles such as those, that weren't informational
or what I'd deem to be quality. I can assure you that oversights such as
that won't ever happen again though. Therefore, the topic of social engineering
has to be revisited and explained properly. Hopefully by writing this article,
the previous 'Social Engineering' article can be overlooked, ignored and perhaps
even forgotten. I sincerely hope that it doesn't need to be mentioned again.

Most of you have probably read about social engineering or heard the term
used by others already. However, you may not know what it means. Or, you
may even think that it's not worth learning the skill and becoming an
experienced social engineer. To be blunt, you're wrong if you believe it's
not an important aspect of h/p, because it most definitely is. Just as a night
of trashing can provide useful, valuable information/hardware, a few minutes of
social engineering can save you a tremendous amount of time hacking. ;)


Social Engineering - My definition of social engineering isn't a very complex
one. In my opinion, it simply means using your mind and being able to think
of quick responses during any situation to persuade, influence, trick, scam,
fool, dupe, verbally hack/exploit in order to gain information, access to
systems etc. Basically, it's fast thinking and conning an intended mark out
of what you seek. The goal is to get them to believe you, do what you want them
to do and release information that they otherwise wouldn't/shouldn't give out
to anyone. It's about obtaining information that you wouldn't otherwise be able
to access easily or would be too time consuming to pursue. Social engineering
is a useful means of doing that for hackers/phreaks. It's also something that
requires creativity, improvising, experience, knowledge and most importantly,
intelligence. You must be an intelligent person in order to be a successful
social engineer. However, if you want to read someone else's definition, then
read the Social Engineering FAQ that exists. I just don't feel that text files
such as that adequately describe what it means, so I decided to define the term
'social engineering' in my own words for readers. In essence, it basically
means "bullshitting" if you want the blunt, true, unrefined, rarely stated
explanation/meaning of it. ;)


Techniques to try:
~~~~~~~~~~~~~~~~~

þ Sometimes social engineering a slow mark can be quick and easy. In fact, I've
seen it done (to acquire a password for a UNIX system) in 2 minutes or less.
Therefore, don't assume that you have to carry on a long conversation with
the mark before asking for any important information. Try to catch them
off guard by calling and identifying yourself as "Jim Robertson". Tell
them that you're an employee that's been on vacation in California for the
past two weeks. Explain that you've somehow forgotten your password. Or,
if you need a 'security' password to login on their UNIX system, tell them
that the password has been changed/forgotten... and that you can't access
your account to do your work. Let them know that you want to be able to call
remotely and finish working on an "important project" during the weekend.

þ Dial up your mark (financial service companies are an especially good mark
for this technique). Express an interest in their company. Tell them that
you'd like to become a client of theirs and have inherited some money that
you wish to invest. Ask them questions about their company. Write down
their answers. Make them believe that you're very interested in the service
that they provide. They love talking to prospective clients. The mark will
start to trust you and treat you as though you're already a client/customer
of theirs. Then, say that you really want to try out the service first etc.
and explain that a greedy corporation ripped you off in the past. Play the
part of an innocent victim. If they want your business, and you're
believable, they'll allow you to do that... by providing you with any
information/login/password. Perhaps you'll be given a guest account to try
out their investment service or whatever they offer. Plus, you'll at least
have some basic information about their company to use against them at a later
date if needed.

þ Select your mark and say "This is Robert Harpo of the New York remote
office/station... We're having problems logging into the server. We've
had problems with our network today. Some of our systems have been infected
by a virus. We've lost data... There are missing/corrupted/files etc. and
one of them contained passwords. Our clients are relying on us and we
may lose profits due to the virus attack."
etc. Sound like you're worried
and that it's a major problem. Tell them the server crashed if you want,
that a trojan nuked it, that there are configuration/compatibility problems
with the network, or with retrieving certain data files. ;) Then ask for
the password needed to login on their server. If you know what cities they
have offices in, the address etc. then this technique should work perfectly.
Pretend that you're doing your job and make sure it sounds like you're in a
large office building with other people working away at terminals. As in,
the sound of a keyboard clicking overheard in the background can be very
effective at fooling the mark.

þ Call up your mark (at a large corporation with many employees) and identify
yourself as "Richard Johnson. Human Resources Assistant." or whatever
job title you want. Then instruct the mark to setup an account for the
newly hired "Thomas Gibson"... with a password of "gibson". Assure them
that the new employee will be instructed to change their password for
security reasons etc. Say that you've been busy reading the resumes of
applicants and conducting interviews, information sessions etc. all day.
Make sure you call just after lunch hour, and say that you haven't even
had a chance to eat lunch yet. ;)

þ Phone the mark and tell them that there's a problem with *their* server.
Explain that it's not accepting the password that you type. Tell them
that it's urgent that you access the system and retrieve a report that
you wrote. Sound desperate, but business-like. Pretend to be an employee
and try to con the password out of them by saying that you work in
the "marketing department" and that "you need the information ASAP for
a meeting that's scheduled today."
etc. This technique isn't for accounts,
but rather for obtaining the password to access the system. If you know
anything about the corporation, such as what they produce, how they
advertise etc. use that in your "marketing report" scam...

þ First, go trashing and try to obtain an employee list for the company that is
your target. If it contains hired on dates, choose a new employee's name
that was hired within the last few days/week. Then, call up your mark
and tell them that you're a new employee and haven't been given an account
yet. Give them the 'borrowed' name and a password etc. If they tell you that
you've already been given a login and password to use, explain that you
weren't personally notified. Tell them that Human Resources said you'd be
assigned an account, but never got back to you. Say that you've been in
training and that it's been a hectic, stressful week etc. Apologize profusely
for the time and hassle (inconvenience) that this misunderstanding has caused
them. However, remain calm and speak in a polite voice. They'll probably
reply with "That's okay." Thank them for their help. Soon you should have
an account (login and password) to use on their system.

þ There are also social engineering techniques in which the telco is involved,
and you identify yourself as being a linesman, technician... or an operator.
Or, if you're very confident, have the ability and your mark is stupid,
sometimes the "I'm a security consultant/specialist/worker" scam works. ;)
Demonstrate to the mark that you know what you're doing, and they'll be more
than willing to help you get information etc. Sometimes you can even persuade
them into believing that you're helping them. I'm sure that you get the idea
by now though.


Note: Using your own ideas, techniques, scams etc. is always best. Only
telephone social engineering techniques were discussed. There are
also ways to social engineer by mail, internet Email and in person.
Most of the examples given were for gaining access to UNIX systems.
They're just tips, and not an instruction manual on how to social
engineer *anyone* you want. You must develop some of your own unique
techniques and apply them to the appropriate situations. Some of mine
are patented, and I chose not to reveal them to everyone. Also, you
may want to divert your calls (by using a diverter or dialing through
a VMB that you know diverts) as a precaution as well. ;)


Things to remember:
~~~~~~~~~~~~~~~~~~

þ You must remain calm and be confident while social engineering someone over
the phone, or in person. No Phear. ;)

þ You have to be comfortable using the social engineering technique/scam that
you've chosen to use. So, practice it many times on friends while talking
on the phone. Learn how to play mind games on them. Eventually, conning
people that are total strangers won't seem so difficult anymore.

þ Some social engineers like to have everything carefully planned out, written
down on paper, know as much as possible about their mark and don't like to
improvise at all. In other words, they follow a script that they created
beforehand. They're almost like telemarketers. If you're that uncomfortable
or ineffective at social engineering, then you might as well quit now.
If not, then play off what your mark says to you. Improvise and use the
spontaneous responses to your advantage. It'll sound more realistic that
way, like a normal conversation. Basically, you have to be able to make shit
up as you go along and feed your mark believable bullshit. Speak to them
naturally, in a normal tone of voice... instead of reading from a script.
Try to be real, not a fake that they'll be able to detect. Gain their trust
and then use it against them to get the information that you seek.

þ Be courteous and polite with whoever answers the phone. In most situations,
you should act business-like and mature. Avoid using any slang, swear words,
poor grammar etc. at all times. For example, do not say "Hello. Like, ummm
I really need a password to access your UNIX system d00d. Do ya think ya
can help me? Uhhh... Please? Duh..."
Basically, don't talk like a warez
d00d and act stupid.

þ Knowing your mark can be very important in certain cases. You can obtain
information by trashing, and then reading documents. Or, you can get
someone else to social engineer them for basic company information first,
several days before you call. That way, you will have some names, phone
numbers, basic company information, contacts, companies that they supply,
work with or are affiliated with etc. already when you call to social engineer
them for 'security' information such as a password to login.

þ Scanning can definitely benefit you in your social engineering endeavours.
If your target is a large UNIX system, and you scan around (+50 and -50
numbers above/below the number usually works)... then you should be able to
find the root system. Once you find a line with a person that answers voice,
you will already have some basic information about their company that you can
use against them.

þ Consider your mark to be your opponent/adversary. Don't have mercy or
pity on them. Don't show any weakness. Never assume that they're not
intelligent or that you can easily social engineer them. Be aggressive and
act as though you're just doing your job if they start asking a lot of
prying questions. Say whatever is required to make them believe you. In
fact, pressure them. Force them into believing you. Sometimes you'll have
to become angry with them if they doubt your authenticity. At that point,
sometimes a verbal assault is the key to getting them to apologize and give
you whatever you originally asked for. When asking for information, don't
hesitate. Be assertive. Don't let them cut you off while you're speaking.
Make sure you clearly state what your intentions are and what you want.
However, they'll obviously ask certain questions that you'll have to provide
them with answers to... such as what your name is, what company you work
for, what job position you hold etc. So, have something prepared or at
least an idea of how to answer any questions that you know you'll be asked.

þ Whatever personal/company information you use cannot sound fake, or it won't
work. Therefore, take the time to choose an appropriate name, an authentic
company name etc. Never try to use shit like "Hello. This is Joe Hax0r of
Killroy & Killroy Co. I'm doing research on..."
or "Hello. My name is
Harry Black. I'm a University student. The reason I called is that I'm doing
a project and would like some information about your company for a term paper
on Macro Economics that I am writing. Can you provide me with anything?
Thanks in advance."
or "Hi, I'm having difficulty logging into the system.
I'm... ummm... Rick the Admin guy."
etc. That shit won't fool anyone.

þ The "I'm a new employee with the company and I forgot the password." type
of social engineering attack isn't the greatest and it lacks imagination.
It's also quickly becoming obsolete. That is, unless you've gone trashing
or obtained an employee list through some other means. Then it may work,
if you sound/act the part... by apologizing profusely, chatting with the
mark and letting them know that you won't forget it again. Basically,
reassure them that it's all your fault and say "I can't believe I forgot the
password. I went to login and my mind was blank."
Try to get them to pity
you. Boost their ego in the process, and the mark will feel good about
helping a lowly 'clueless' new employee out. Avoid using it often though.
Never rely on that story to work every attempt either.

þ Don't be greedy. If you start asking them for too much information, too
quickly, you won't be given anything at all. Plus, it can alert the mark
about what you're attempting to do. Once they're "on to your scam" they
aren't going to give you any assistance at all. That is, at least not on
that particular day. ;) If you become too greedy, and want information
right away, you may find that you are successful at social engineering
people less and less.

þ Try not to act nervous or suspicious. I realize that some people may not
be able to control their emotions, but it's critical that you do. Otherwise,
you'll fail at social engineering, time and time again. So, you must
learn to be at ease while scamming your mark. Obviously, you want to be
as convincing as possible and not draw any suspicion. There's no way to
teach how that's accomplished. Nor is there any great advice that can be
given regarding how to avoid nervousness. I can't tell you how that's done.
Also, don't be hyper and start talking fast. If they can't understand you,
and have to ask you to repeat yourself... they'll become suspicious.

þ Good liars don't necessarily make great social engineers. In other words,
habitual liars aren't always so adept at being able to social engineer
for certain types of information. Sometimes, knowledge is required in
order to be successful and it was attained through a means other than
lying. Basically, the point is that lies can only take you so far, even
in relation to social engineering for information.

þ If you have a high pitched voice, one that crackles or is in the process of
changing... you won't pass for an adult. So, you're only option is to buy a
voice changer. It'll alter your voice so that it sounds deeper to your mark.
That way, they won't say "Who are you? How old are you? Is this a prank?
Listen kid, I don't have time for this shit. Go play Sega/Nintendo."
;)

þ Background noise (such as music that wouldn't be playing in an office),
street noise (if you're using a pay phone), dogs barking, kids crying,
people talking loudly or yelling etc. can destroy your efforts at social
engineering someone. Try to eliminate those types of noises if at all
possible, as they can adversely affect what you're trying to do.
You won't be believed by your mark if your friend is laughing in the
background either.


In conclusion, social engineering is a valuable tool/skill to possess. It's
a powerful skill that has to be developed. Some people are born "natural
social engineers"
. It's a talent that they've always had... but they still
work on honing their skills, practice their craft and have made it into
a legitimate art. Watching and listening to someone successfully social
engineer their way to gaining access to a system is such a thing of beauty.
Just as, the rush that you get after social engineering someone yourself
is amazing. You can allow your creativity to emerge, use your imagination,
react to the situation, respond quickly to questions and trick your mark
into believing or doing whatever you want. By now, it should be obvious to
you that I enjoy social engineering. ;) It's a learning process that takes
time and is challenging though. However, it has great benefits and the
experience gained can be extremely rewarding.

Written by BLACKENED ú Damage, INC. (C)opyright 1998.


CONSPIRACIES AND COVERUPS - {COVERUPS}
Examining the Majestic-12.

Do you believe that a UFO crashed near Roswell, New Mexico? Do you believe
it is possible that aliens are living in hidden bases deep beneath the Earth?
Have you heard of the Majestic-12, and the leadership role they have played in
covering up the existence of aliens, and the aliens' relationship with the
United States? If you haven't, I'll give you a basic introduction to what could
very well be the greatest conspiracy and coverup perpetrated in human history.
All I ask of you, the reader, is that you have an open mind. This conspiracy is
so great that very little information/evidence has been uncovered.

As always, the best place to start is the beginning. When did the U.S.
Government, through their agents, initiate first contact with aliens? The
answer to that question is revealed in a leaked document with MAJIC security
clearance. On June 24, 1947 a civilian pilot saw nine flying disc-shaped
aircraft, while he was flying over the Cascade Mountains in Washington state.
The flying saucers were flying extremely fast in standard formation. Unlike
previous UFO sightings, this one was widely reported by the mass media. After
this, there were hundreds of people coming forward to report their sightings of
UFOs like the flying discs. What worried the U.S. Government is that many of
the sources came from military officers and civilian leaders. Various branches
of the U.S. military reacted by initiating their own investigations. Witnesses
were "interviewed". The U.S. military also tried to engage the flying discs,
but they failed miserably. Unfortunately for us, the coddled, weak-minded
public would border on hysteria at various times.

The U.S. Government knew very little about these flying discs. There simply
wasn't an opportunity for anyone to gain any new information. I am referring to
the now famous (perhaps infamous) Roswell incident. One night a rancher local
to Roswell reported that he saw a flying disc crash, at a location that was
approximately seventy-five miles northwest of the Roswell Army Air Base.

On July 7, 1947, The U.S. Government initiated a secret operation to recover the
wreckage of the "flying saucer" for scientific study. However, there is another
bit of information that many people that have studied the Roswell incident may
not know. The reason that many Roswell residents could not confirm seeing
aliens is that they ejected from their craft. Four small human-like beings were
found approximately two miles away from the crash site. There are conflicting
reports as to whether there was a surviving alien or not, but that could be the
subject of another article. The most important point of this incident is that
alien corpses and artifacts were recovered by the U.S. military. Roswell
citizens were then interviewed (and in some cases silenced by various threats)
and the weather research balloon coverup was construed.

In order to deal with this critical situation, some of then-President Truman's
closest advisors recommended the creation of a "Top Secret Research and
Development/Intelligence operation responsible directly and only to the
President of the United States."
The name of the Operation is OPERATION
MAJESTIC-12. The Majestic-12 was established by Truman's executive order on
September 24, 1947. The Majestic-12 are literally twelve people. The
Majestic-12 are a team of military leaders, political leaders, and scientists
that are at the top of their respective fields. Each member is designated a
codename. Their leader is MJ-1, which falls upon the Director of the CIA. The
reason why I will not use "MJ-12" as an abbreviation is because MJ-12 is a
person, not an abbreviation for the Majestic-12. At different times, they may
be called upon to use their talents to evaluate alien information, technology,
biology, and other factors involving alien beings. When the Majestic-12 are
called into action, only members with the proper skills for the project are
given any information. The information the Majestic-12 is given is controlled
by MAJI.

MAJI stands for the MAJESTIC AGENCY for JOINT INTELLIGENCE. This group is in
total control of dealing with all alien concerns. That includes contact with
aliens, national security and intelligence, and of course providing
disinformation to prevent "outsiders" (us) from discovering the alien presence
within the United States. All MAJI documents are classified "MAJIC", which
means MAJI Controlled. MAJI, like the Majestic-12, report directly to the
President, and is thought to be based in Washington DC.

All alien information is processed under the large umbrella of what is known as
"PROJECT GRUDGE". Under Grudge, there are various child projects that deal with
specific courses of action to control the alien presence. Below I will give
you information on various projects that are at the heart of this coverup.

AQUARIUS: This project has been active since the United States' first contact
with UFOs, as well as contact with IACs (Identified Alien Crafts).
This project was born in 1953, and is under the control of MAJI and
the CIA. The purpose of Project Aquarius was to collect all
scientific, technological, medical and intelligence information from
UFO/IAC sightings and contacts with aliens. Information obtained
from Project Aquarius is what has given the United States its world
superiority in space flight and military aircraft.

AQUARIUS/
PLATO: Project Plato's mission was to establish diplomatic relations with
aliens. Under this project, diplomatic relations with alien races
were established and a pact was formed. The U.S. took alien
technology in exchange for agreeing to keep out of the aliens'
affairs on Earth. The U.S. also agreed to keep the existence of the
aliens' presence a secret. Project Pounce is an offshoot of Project
Plato. Project Pounce's mission is the secret crash recovery of all
aliens, and their craft.

AQUARIUS/
SIGMA: This project's goal was to establish communication with the aliens.
The goal was achieved in 1959, when primitive forms of communication
were established. Subsequent encounters with aliens under Project
Sigma have continuously improved communication with the aliens.
Project Sigma is viewed by MAGI to have been successful.

GRUDGE/
REDLIGHT: Project Redlight's purpose was to test fly recovered alien craft.
This project continues in Nevada (at Area 51/Dreamland). Project
Snowbird is a child project of Project Redlight. Project Snowbird's
objective was to create flying discs using conventional technology as
an excuse for the high number of flying disc sightings that were
being reported.

There are many more projects that deal with weapons development, and defense
strategies against the aliens, etc. However, they aren't as important as the
projects listed above. The United States have been harbouring and supporting
aliens for almost 50 years. Recently, in the last year the U.S. Government,
along with the U.S. Air Force has tried to coverup the Roswell incident yet
again. They now claim that there weren't any alien bodies recovered, but that
dummies that resemble human beings, that were used in an experiment were all
that the Roswell witnesses observed. Basically, they're still denying the
truth. They have cut deals with the aliens with their own self interests in
mind. Meanwhile, reports of alien abductions haven't decreased at all. In
fact MAJIC knows *and allows* the aliens to abduct humans, as long as they
provide MAJIC with the names of the victims. MAJI has sold us out to races of
aliens that plan to use us for their own ends. In my opinion, the greater sin
that the U.S. has committed is the fact that they are covering up every bit of
information. If there are alien "visitors" on our planet, we have a right to
know. Not all of us are weak-minded zombies. I'd personally rather face my
fate, than to be stabbed in the back and kept in the dark.

I hope that you have found this article to be interesting and informative.
I felt it was important for me to write this article. Of all the conspiracies
within Washington, none have been covered up like the existence of aliens within
the United States. A lot of disinformation is out there in various mediums. I
believe that we will eventually be exposed to "hard facts" of the existence of
aliens on our planet. At this point, it's difficult to know what to believe
and what not to believe. Unfortunately, the naive will be caught totally off
guard if the alien races' intentions are malevolent.

Written by Blackie Lawless ú Damage, INC. (C)opyright 1998.


CORRUPTION AND GREED - {GREED}
Power industry reformation is required.

Despite all of the advancements that've been made in the fields of science and
technology, there have been very few in the generation of the electricity and
fuels needed to power everything. Why is that? Why has power generation
technology taken so long to advance? Why do we still heavily rely on limited
resources for power? One would think that with finite natural resources, more
ingenious ways would be developed to provide clean electric power.

Actually, there are inventions that tap into free, natural energy sources. For
example, U.S. Patents have been awarded for motors that contain permanent
magnets. According to my research, the magnets within the motor tap into the
energy within the Earth's magnetic field. This provides the motor with a nearly
unlimited fuel source, so that conventional fuels (oil, gasoline, etc.) aren't
required. Can you imagine the potential if we could all have an electric
generator based on a magnetic field powered motor? If you are an intelligent,
enlightened person, I'm sure you understand the implications of that. We would
no longer have to pay a government or corporate power utility for electricity,
but *we* could be in control of our own independent power source! After the
initial investment, a generator powered by the Earth's magnetic field would pay
for itself extremely quickly.

Free energy inventions have been repressed for decades now. An Austrian civil
engineer named Viktor Schauberger invented, and with limited funds began to
develop what's called an "Implosion Turbine." Water is pumped by an Impeller
pump through a Logarithmic-Spiral shaped coil of tubing until it reaches a
critical velocity that causes the water to implode. The water moves so fast
that it no longer touches the inside walls of the tubing. The force of the
implosion drives the pump, which causes the pump's motor to become an electric
generator. Dan A. Davidson, an author that wrote about the Implosion Engine in
1977 says, "The device seems to be tapping energy from that of the Earth's
rotation, via the "
Coriolis effect", like a tornado." In essence, it uses
the Earth's own gravity, in conjuction with its rotation to create a viable
means of sustained power. Basically, tremendous spinning forces can be used to
artificially create gravity. The most sickening fact is that Viktor Schauberger
invented the Implosion Engine during the 1930s. However, he didn't have the
funds or support to complete his work.

Are you skeptical about the existence of inventions that can tap into the
natural energy of the Earth? Hopefully, you will be more tolerant of an
invention with tremendous potential. A Bulgarian-born American Physicist named
Joseph Maglich invented and partially developed an atomic fusion reactor that he
named "Migma." An amazing fact is that Migma uses nonradioactive deuterium as
fuel. Nonradioactive deuterium is readily available in sea water. Obviously,
there's more sea water on this planet than we could ever use. If Migma were
fully developed, Maglich stated it would produce no radioactive waste, and is
designed not not to require a turbine to generate electricity. (According to
what I have read, Migma generates electricity itself, without any external
turbines, etc.) He also said that Migma could be built to fit in a single
house, or large enough to power an entire city. One source stated that
Maglich's partially developed Migma works, generating "three watts of power
for every watt put in."


You may be wondering why these devices haven't been developed and mass produced
for our benefit. What would benefit the average person does not benefit the
corrupt fat cats in the power and fuel industries. Governments also have a hand
in blocking any new, superior power generation technologies from being
developed. All factions involved in the current way that power is generated
and distributed are making a tremendous amount of wealth, and wield a lot of
influence. Free energy motors and other inventions would destroy them. The
potential that these, and many other power/electricity generating devices have
is enormous. Coal burning stations, nuclear reactors, oil refineries... they
would all become instantly obsolete. We could be in control of our own power
sources. Plus, the environment would also benefit. As I mentioned in the
examples above, none of them claim to produce any harmful gases, radioactive
waste, etc. So, the levels of air, water and ground pollution would be far less
than they currently are.

Governments and huge, multinational energy/fuel companies have been extremely
aggressive in eliminating such threats to their cash cow monopoly. Inventors
have been denied patents from their government. Then a "threatened" company
would patent that inventor's creation so that it can never be developed and mass
produced for our use. Other inventors have been bribed, threatened, or their
work is "mysteriously" destroyed. The reason for the collusion and between
governments and energy/fuel companies is greed. Tremendous profits are
generated by efficiently run private operations. Governments also reap
tremendous amount of tax money from these industries. In many areas,
electricity is a government controlled industry. They control it and supply
their citizens with electricty. Therefore, they'll do anything in order to
prevent people from becoming self-sufficient. Indeed, they want citizens to
rely on them for their basic needs. In Ontario, as an example, let's say that
the refinery sells some gasoline to a gas station. The price that day is 21.35
cents/litre. The Ontario government slaps on a 14.70 cent/litre "Fuel Tax."
Then the Canadian government adds on a 10 cent/litre "Excise Tax." Finally,
the Federal Goods and Services Tax (GST) of 7% is added. The GST is applied to
the Provincial Fuel Tax and the Federal Excise Tax as well as the base price to
the gas station. That increases the price to the consumer tremendously. It
starts off at 21.35 cents/litre and goes to 49.3 cent/litre (and that's without
adding the gas station's profit of a few cents). If a car with a water,
air, or magnetic field powered engine was manufactured, that tax money would
remain in our pockets (until new taxes were created to replace the old taxes
mentioned above...). However, it might be more difficult for them to tax
those natural elements. :-)

Although tax dollars are important to them, control over the zombies is
paramount. Big Brother wants every house to have electricity and be connected
to his power grid. That way, Big Brother is in total control of the power
switch. If we all had independent power sources, Big Brother wouldn't be able
to shut off your electric power before busting down your door, or monitor how
much power you use as easily as they can right now.

It is a horrible state of affairs when the pursuit of greed and power by a
corrupt few can do so much damage. What is even worse is that their efforts
to prevent all of us from obtaining free electric power have been successful.
There aren't very many people that know about all of the inventions that have
been hidden or eliminated. That is why I have written this article. I want to
make sure that everyone is informed that there are people out there that are
suppressing new and old, superior technologies for their own short-sighted,
greedy purposes. They also live with great fear in their hearts, as the death
of their industry looms before them.

---
While doing research for this article, I found some references that I was
unfortunately unable to obtain. If you have access to the following sources
(and wish to learn more about the inventions I wrote about), check them out:

"Science & Mechanics" magazine, Spring 1980, ("Amazing Magnet-Powered Motor", by
Jorma Hyypia, pages 45-48, 114-117, and front cover).

Implosion Turbine: "A Breakthrough to New Free-Energy Sources",
Dan A. Davidson, 1977.

Migma: "New Times" (U.S. version), 6-26-78, pages 32-40.]

Written by Shatazar ú Damage, INC. (C)opyright 1998.


CROSSED WIRES - {WIRES}

If you'd like to advertise your h/p board or net here, contact us at
damage_inc@mailcity.com and attach an ascii advertisement to the message.
Advertisements must not exceed 4 pages in length and 80 columns in width.


Special Access for long distance users
.sS$$$$$ý$$$Ss. If you are into h/p give it a call.
`$$$$$$$. `$$$$$.
`$$$$$$$. `$$$$ Running Mystic BBS Software
$$$$$$$$$. `$$$ up and running 24/7
$$%$!$$$$' .$$' (519) 742-6899
$$$$$$$$$sSý'
$$$$$$'
$$$$$$ $$$$$$$Ss.`$s,.. ..,s$'.sSý$Ss. .sS$ý$Ss. $$$$$$Ss. $$$$$ $$$$$$Ss.
$$$$$$ $$$$ù~"ý$$ $$$$$ $$$$$ $$$ $$$$ $$$$.`$$$ $$$$~"ý$$ $$$$$ $$$$~"ý$$
$$$$$$ `$$$s,. `$ $$$$$.$$$$$ $$$ $ý'~ $$$$$ $$$ `$$$s,.`$ `ýSý' `$$$s,.`$
$$$$$$ , `$$$Ss.ï `ýS$$$$$$$$ $$$ .,s$ $$$$$ $$$ ,`$$$$Ss. $s.s$ ,`$$$$Ss.
$$$$$$ $, `$$$$$ $s,...$$$$$ $$$ $$$$ $$$$$ $$$ $, `$$$$$ $$$$$ $, `$$$$$
$$$$$$ $$s,..$$$$ $$$$$$$$$$$ $$$ $$$$ $$$$'.$$$ $$s,.$$$$ $$$$$ $$s,.$$$$
$$$$$$.`ýS$$$$Sý' $ý"
~ùùù~"ý' `ýSs$Sý' `ýS$s$Sý' `ýS$$$Sý' `ý$ý' `ýS$$$Sý'
$$$$$$$
$ý"
ý$$$
`$$
`$
'
PSYCOSiS BBS is now online. :) If you'd like to get access, leave me
Email at fatalvis@iname.com or just call the board and page.


DRUGS DISCUSSION - {DRUGS}
Sweet Leaf Dreams and Experiences:

It's sometimes called the elusive weed by law enforcement. Most often though,
they call it pot or dope. Ah yes, that wonderful plant... cannabis. That
beautiful green plant, with its sweet leaf. Those perfect buds. With that
intoxicating fragrance. That amazing flavour. It's simply too sweet. In fact,
it should be grown everywhere with a mandatory minimum for THC content. Yes,
I'm speaking about marijuana. Yes, indeed it's the best plant of all! :)

Let me tell you about some of my drug experiences, especially the ones that
involve the sweet leaf. Afterall, sharing drug experiences is part of what
the Drugs Discussion section is about.

Sure, I've tried other drugs. I've experimented with acid, heroin etc. I
have smoked hash, oil and done shrooms countless times. However, there's
just nothing better than smoking a big, fat joint in my opinion. That's where
it's at. Why? Well, it's calming and soothing for one thing. I find that
I can collect my thoughts, think clearly and get back my creativity. I don't
toke to get away from my problems. Nor does it provide me with answers and
solutions. I don't think of it as an escape or a way to avoid reality. And I
definitely don't smoke weed in order to be cool. It's a pure, basic, primal,
honest experience. I really enjoy it, and don't see any harm in smoking up now
and then. Well, actually my 'habit' of smoking pot is almost a daily ritual
now. That's okay though. Why? I haven't experienced any harmful side effects
at all. It hasn't suddenly made me into a lazy 'stoner' that's permanently
baked or burned out. I've been able to accomplish more in the last few months
than when I wasn't smoking marijuana on a regular basis. It has been beneficial
to me, instead of the myth that it will make you into a dope if you smoke
too much or too often.

Now that I've explained a few things and given some reasons as to why I
smoke marijuana, I'll describe some of the drug experiences that I've had
with the sweet leaf. :)

One of my fondest memories is of smoking weed with some friends at an old,
abandoned school. We were downtown that night and picked up some weed from
a local dealer behind an arcade. We all decided to go to the school to roll
some joints and smoke it. The building was old, it was about midnight and
I was much younger. The whole experience was new to me, as it was only the
second time that I'd smoked a joint. Sure, I'd smoke hash before and took
a few drags off of joints that were passed around. But I had never really
gotten much more than a buzz... and didn't smoke enough. This time was
different though. Everyone in the group smoked until we were baked... and we
sat there, drinking, smoking up, talking for hours. Nobody was around so we
were able to sit out on the old fire escape balcony without worrying about a
cop busting us. The memory of that night is still vivid in my mind, and
it's something that I don't think I'll ever forget. We shared stories and I
was at peace... one with the other members of the group. I think the dope
was at least partially responsible for us being able to open up and talk so
openly about things with each other. Basically, it was comfortable and I
felt free. It was just a feeling that I had that particular night that lasted
the duration of our gathering. It was more than getting 'high'. There was good
karma. That may sound lame, but it's the truth. It's the feeling that smoking
weed gave me. I fucking loved it. That is probably what attracted me to
marijuana, made me continue to smoke it and fed my desire for it.

Perhaps I'll share some other drug experiences in a future article. Hopefully
you enjoyed reading this article. I also hope that everyone understands the
message I was trying to convey about the feeling marijuana gave me. That's not
an easy thing to explain or express in mere words.

Written by THC Phreak ú Damage, INC. (C)opyright 1998.


H/P INFORMATION AND NEWS - {H/P}
Dialing out through VMBs:

Would you like to divert your calls? Or, perhaps you want to call ld for free.
Maybe you should look at dialing out through Voice Mail Box Systems. Many
support it, and most are set default to allow dialing out. That means the
Admin of the VMB would have to manually change the system to disallow the dial
out feature. If you are looking for VMBs, then I suggest checking out the
800-MAIL.DAT scan list that's included with this issue. There are many Meridian
Mail systems to choose from in that scan. Obviously, you can also scan
1-800 exchanges on your own to find VMBs. Also, I suggest that you read
Blackie Lawless' article on VMBs that was included in the h/p section of the
Damage, INC. Newsletter Issue #6. Now that you have a few Voice Mail Systems to
check out, I'll explain a little about dialing out and using certain features.
Some very good VMB systems for this are Meridian Mail, Audix, ASPEN, etc.

With Meridian Mail Systems the default password is the same as the box number,
so obtaining a working Meridian VMB isn't too much of a challenge. Once you
have successfully accessed a box on the system, you'll most likely hear a
"MAILBOX EMPTY" message. If there are messages in the box it will say
"YOU HAVE x MESSAGES" or "YOU HAVE x NEW MESSAGES" and start playing them.
Usually it'll tell you that they're "FROM AN EXTERNAL NUMBER" etc. as well.
It'll say "END OF MESSAGE" after each message that you listen to. Try pressing
options such as "7*" which will tell you a list of message commands, "8*" will
give you to a list of personal options, and "0*" is used to access the outdial
feature. :)

Meridian Mail Box Features:
~~~~~~~~~~~~~~~~~~~~~~~~~~

7* message commands:

Message option 0 - Not useful.
Reply 1 - Reply to a previous message.
Play Envelope 2 - Play message envelope.
Forward 3 - Forward your mail to another box.
Reply All 4 - Reply with multi-mail.
Compose 5 - Send multi-mail.
Delete 6 - Delete mail.
Send 9 - Send mail to another user's box (requires valid BN).
To Exit press # - Exit.
To hear the list again or stop listening to messages press "*".

8* personal options:

Mailbox options 0 - Change operator code.
Login 1 - Login another box.
Greeting 2 - Change the greeting messages.
Logoff 3 - Logoff the system. "Goodbye". :)
Password Change 4 - Change VMB password.
Distribution List 5 - Enter Distribution List number followed by # sign.
Goto 6 - Go to the start of listening to messages.
Personal Verification 9 - Record a name for personal verify.
To Exit press # - Exit personal options.

After entering "0*" (zero-star) while in a box, you should hear a message
similar to the one below with most Meridian Mail systems:

"You have reached an automated service which will connect you to the phone
number that you enter. Please enter the number or the name of the person you
wish to reach, followed by # sign. To enter a name press 11, spell the last
name and then spell the first name. When the name is recognized, it will be
announced..."
etc.

Some Meridians will only let certain BNs dial out though. If the BN that you
are in won't allow you to dial out, then try a few others to make sure that
you're not just in a BN that doesn't support it. Usually, the Admin's BN will
be either: 111, 222, 333...999. Once you've found a box that allows you to
use the outdial feature, call a local number with a "#" sign at the end.
(Example: 742-6899#). At that point, it'll either connect you, or it'll
beep and you'll hear the message "That number cannot be reached from this
service..."
If it reports that, then try dialing another number in a different
local exchange. Dialing a 1-800 ANI to check to see if the VMB diverts is
always a good idea. If you cannot seem to get the VMB to dial out, the SysAdmin
may have disabled that option. Or, you may need to try dialing the number using
a different method, as shown below:

(X = number NPA = Area Code)
xxx-xxxx#
npa-xxx-xxxx#
1-npa-xxx-xxx#
9 + 1-npa-xxx-xxxx#
9 + xxx-xxxx#
0 + 1-xxx-xxxx#
* + 1-xxx-xxxx#

If it says "That number cannot be reached from this service" and you've tried
everything that I mentioned above, then most likely that Box Number doesn't
have dial out access. If you're able to dial out from it, that's cool. You'll
have to play around with the VMB to learn what areas it can reach. As in,
experiment and try calling ld numbers in various area codes etc. To get an
operator to social engineer, try hitting 0# as the number to dial out and it
should connect you to a live (or zombie?) operator.

I am sure that if you can't get it to dial out, or need some more information
about the system that the operator would be more than willing to give you some
information. Just use some of the techniques that BLACKENED mentioned in his
Tip of the Month article. Some good questions to ask after you've identified
yourself are, "Hey, I am trying to leave the SysAdmin a VMB Message, but I can't
seem to remember his Box Number. Can you help me out? Thanks."
Once you have
his box number, you could work on hacking into his box, and dialing out through
there. Some other questions you could ask would be "Does this system support
call forwarding?"
"Do you have a Subscriber List?" etc.

Some extensions may just give off a dialtone, or be totally silent. So,
you'll have to listen and not just try one box to see if it can dial out.
If you get an extension that gives a dialtone, then you've most likely found
the dial out box number.

Here's a little tip as well. Another way of obtaining free calls with some
larger systems, (since most smaller systems don't have this option enabled) is
by setting up the call forwarding number. First, you'll have to set the call
forwarding number to the number that you would like to connect to, such as
a h/p board that's ld. After you've changed the number, call the VMB and
it will connect you to the specified number (in this case the ld h/p board).

There are many ways you can dial out through VMBs. As you can see there isn't
only "one way." It's up to you to develop your own techniques. You can only
do that by experimenting with certain systems, asking questions and social
engineering.

After you have found a few systems that allow dialing out, I suggest calling a
1-800 ANI to see what number gets reported back to you. If it reports your
number then discontinue using that VMB for dialing out. You'll have to find
another system to use. If it reports the VMB number that you're using, then
you can use that system for diverting and possibly calling long distance. See
what area codes/exchanges can be reached using that VMB. If it only supports
local calls, don't scratch that number off your list as it can still be *very*
useful for diverting your calls to ISPs, PBXs, Extenders, Voice Operators with
ANI etc. In a future article, dialing out through other types of VMB systems,
(including Direct Dial VMBs) will be explained.

Written by Fatal Vision ú Damage, INC. (C)opyright 1998.


--- 1-800 SCAN ---

We've also included a 1-800-XXX-6245 scan with this issue. The scan was done
by Shatazar and Fatal Vision. The filename is 800-MAIL.DAT. Direct any
comments and/or questions to them.


ú - NEWS FROM THE TRENCHES - ú

THC Phreak (514) is now a Damage, INC. Member. He's written several quality
articles for the Damage, INC. Newsletter in the past... and already has his
own section etc. So, we're looking forward to his future contributions to
the group. ;)

Fatal Vision's BBS, PSYCOSiS is now online. Obviously, it's a Damage, INC.
Member Board and all Damage, INC. releases are available there at no ratio.

The Journalist has resigned from Damage, INC. He was a Damage, INC. Member
from August 1997 - August 1998. TJ is the first and only person to ever quit
Damage, INC. While his ego increased, his contributions to the group dwindled
and then finally ceased in May 1998. I'm sure many readers noticed his absence
from writing articles for months though. After that point, he was no longer
actively involved with anything related to Damage, INC. However, I just want to
be the first to say "Good luck, best wishes and I hope that you're successful at
whatever you're involved in TJ... during your college years and afterwards. May
your positivity, philosophies and objective outlook on things bring you all that
you deserve."
Actually, TJ won't be missed... and has already been replaced by
THC Phreak. So, the Damage, INC. Newsletter won't be adversely affected by this
minor situation at all. Read the included TJCHRON.TXT file (The Journalist
Chronicles) if you want more information about TJ, and why he eventually decided
after months of contemplation, to quit the group. Ah well. Good riddance. ;)
I believe that statement expresses the sentiments of the entire group.

Written by BLACKENED ú Damage, INC. (C)opyright 1998.


INTERVIEWS AND INTERROGATIONS - {INTERVIEWS}
Interrogation of Billy Gates: The saga continues.


<B> = BLACKENED
<BL> = Blackie Lawless
<M$L> = #1 Micro$oft Lackey
<G> = Billy "bad ass" Gates


<B> - (Dialing 1-800-MS-SUCKS then #LAME for Billy Gates' extension.)

(The call is re-routed and forwarded to Gates' cell phone)

<M$L> - Hello? Hello? (the voice of a pathetic lackey is heard, spoken in a
desperate tone...) Is anyone there?

<B> - Tell Gates that it's Damage, INC. and get him on the phone right now.

<G> - Who is this? What the hell do you want?

<B> - You sound a little irritated Billy Boy. What's the matter? ;)

<G> - I know who it is now. You bastard! You're going to pay for what you
did to Microsoft... You... you... malicious criminals are all going to pay
for this. I don't care what it costs.

<M$L> - Mr. Gates... Sir, our resources are running low. The food rations
have almost been exhausted and we no longer have any power or heat.

<G> - No heat? What happened to our coal reserves? Start burning the corpses
of employees for heat. Call the Seattle market and threaten to quit selling
Microsoft software to them. Then call the nuclear power plant and tell them
that they better re-connect our hydro or else we'll shut them down. Geez, do
I have to do EVERYTHING around here?

<M$L> - Yes sir. No sir. I mean, no... you don't have to do everything around
here sir. You know that I'm your number one lackey... err.. employee.. sir.

<G> - It's good to know that I still have a few 'Yes Men' left at my side, to
do my bidding for me.

<BL> - It's too bad your wife isn't at your side anymore though. Haha.

<G> - Is that Blackie Lawless I hear? Your sarcastic remarks are not
appreciated mister. I take offense to your snide little comments. My wife
is as loyal as Mr. Lackster (#1 M$ Lackey) is... Who by the way, is my
towel

  
boy, shoe shine gimp and boot licker extraordinairre. Here's a small
demonstration of my power. Listen and learn. Lackster, trace this call
with ANI and send the law enforcement authorities there immediately.

<M$L> - Yes sir! I'll get right on it.

<BL> - Really? I never would've fucking guessed by the way he follows your
every command, and kisses your ass at every opportunity. Man, haven't you
heard yet? He's all you've got left Billy. By the way, you won't be able to
trace us with ANI Billy Boy.

<M$L> - Sir, ANI Failure. I called up AT&T, and asked them to help us. It's
the same thing though. I'm sorry sir. I apologize for my incompetence... and
take full responsibility for not being able to trace them.

<G> - Shit. Ummm... think of something. I really want to catch those bad guys.
We have to make those menacing hackers pay for what they've done.

<M$L> - Yes sir! You can count on me sir.

<B> - Haha. Billy has been in that bunker too long man. He doesn't realize
what's happened, nor does he know where his wife is.

<G> - What have you mischievous deviants done with my wife?

<BL> - Nothing. We've just seen her working downtown in Seattle. Monika
Lewinski might not be going down anymore, but your wife definitely is...

<B> - Hehe... That's for sure man. ;)

<G> - What's that supposed to mean? My wife doesn't go down. You guys are
just making up stuff... and trying to... (interrupted)

<B> - It means that your wife is a working woman now. She's walking the
streets... wearing knee pads and picking up dimes. She goes down faster
than Monika Lewinski on Whitehouse Billy. Just because she never gave
*you* head, means nothing Billy Boy. Your wife is now a full-fledged, cheap,
slutty, downtown whore now. She's quick to go down and slow to quit sucking.

<BL> - Damn straight. You've got that right man. Now that she lost geek boy,
she's not half bad. I mean, she made a huge mistake slutting around Gates,
but I've gotta admit she's a nice piece of ass. Hehe.

<G> - Why you fucking... filthy.. sons of bitches. Fuck you. My wife is
NOT a prostitute!

<BL> - Bitch? Yeah, you could call her that. I prefer to refer to your wife
as a cheap whore though. Prostitute? Nah... At least not a very good one.
Most of the time she blows for free and swallows... That's how she manages to
get a free lunch without begging.

<B> - Hahaha. That's hilarious... and true man. ;)

<G> - Grrrrrrr... You're making me VERY upset and angry. (Gates is seething
at this point and almost ready to snap.) Bill is getting frustrated. If I
could trace this call, I'd... I'd.... (interrupted)

<M$L> - Sir, our stocks are starting to rise again. I took the liberty of
loading your personal stock portfolio with all of the most popular Internet
Stocks on the market. Then I used some of the new profits to buy back the
majority of the Microsoft stock that you sold. It looks like things are going
to be alright.

<G> - That's great news! (a huge sigh of relief is literally heard over
the phone.) What about employees? They haven't all been killed yet have
they?

<M$L> - No sir. You still employee many immigrant workers... and Visual Basic
programmers. Microsoft is still the proud owner.. err.. employer of over
two thousand Mexican workers, that package our products. Cheap wages, cheap
labour... It's all good, sir.

<BL> - Yeah, cheap is definitely the word.

<B> - And that cheapness is due to Billy's greed. His own greed is what drives
him to exploit workers.. and the zombies that purchase M$ products.

<G> - Excellent... Excellent. Hey, the zombies buy Microsoft products because
THEY want to. It's not because I've brainwashed them all.. and can influence
them to do anything that I want. Now, it looks as though I have Damage, INC.
right where I want you. Your diabolical plan has failed and Microsoft is
strong once again.

<B> - You still haven't learned yet Billy. I told you before, you ain't seen
nothin' yet. This is just the beginning...

<BL> - Run and hide behind your lackies again Gates. Pay them protection money.
Hire more security guards. Do whatever the fuck you want... Regardless of what
you attempt to do, Damage, INC. is stalking you.

<M$L> - I would give my life for Mr. Gates. I exist to serve and protect him.
In fact, if the truth be told... he IS my life. Microsoft is also my life.
It's what I've chosen to dedicate myself towards.

<G> - I know that I can count on you to help me fulfill my dream.. My vision...
of every house, every vehicle, and every street corner having and relying on
Microsoft products. You Mr. Lackster are my loyal servant. To show my deepest
appreciation, I'm going to give you a raise. Effective in 1999, your salary
will be increased by a sum of $0.20 an hour! If you continue serving me well,
there might even be a year end bonus in it for you... Just don't count on it.
Times are tough you know. My net worth is down to $55 billion... give or take
a billion dollars due to the market crash August 31, 1998.

<M$L> - Why thank you sir... Thank you. That's most generous of you. I promise
that I'll work overtime for the next 5 years... and try to repay you in some
way for such a kind gesture. Indeed, I'm a lucky lackey. The luckiest in the
world... to work for such a selfless, humble boss.

<B> - I'm going to be sick. I feel like puking. You both disgust me. Gates,
your endless greed and cheapness is sickening. As for your dream, the reality
is that your wife is working in every house, every vehicle's backseat and on
every street corner in Seattle. Haha...

<BL> - Yeah, and *she* is doing a fine job of serving this town. It won't be
long before she has her own boss. A few local pimps have been eyeing her.
Hehe. ;)

<G> - Blackie Lawless, you're disgusting. You have a filthy, gutter of a mind.
The cheapshots that you hurl never cease to amaze me. If only you'd use your
thoughts, ideas and energy for good... and make something of yourself. You
are brilliantly evil, and could make a tremendous profit if you would only
utilitize your specialized skills and talent for humiliation. You could employ
a workforce of slaves, like I do. It's called profiting off the ideas and
backs of others. That's what Capitalism is all about. Just ask my political
friends and associates. You should seriously consider a career as a Microsoft
employee. We offer limited benefits to our most loyal slaves... errr.. workers.
You just have to pass our rigorous testing and training programs, and then
take the mandatory brainwashing program.

<M$L> - You've always treated me with respect sir. I can understand why you've
been so successful. Right down to your very DNA, you are the perfect boss.
You know how to command and use your authority so effectively. I just love
working for you sir.

<BL> - Listen fucker. We don't respect you, your vision or the way that you
ripoff everyone else's ideas and products. I'd never work for Microsoft,
no matter how much money was involved. I'll never be one of your zombies.

<B> - In a way, it's hilarious that Gates would actually say something like
that though man. He honestly believes that he can buy anyone. He thinks
that we'd sell out to Microsoft for money. Haha. It seems as though the
richest geek in the world is also the most naive. Obviously, I wouldn't
work for him for any amount of money... including a billion times what he has.
He can continue to buy zombies, but he'll never be able to influence the
intelligent and enlightened.

<G> - What are you guys... Communists? Does money mean nothing to you?
Let's make a deal. I'll pay you a million dollars to quit harassing me,
interfering with Microsoft, and publishing slanderous material that contains
references to me and my beloved company. Is it a deal? That's a million
dollars each... for every Damage, INC. Member.

<B> - Hahaha... Do you really think that we'll accept that pathetic offer?
We can't be bought Gates. Damage, INC. doesn't make deals with anyone. That
includes fat cat lamers like you. We will continue to say and do whatever
we want.

<BL> - He's delusional man. Billy is grasping at straws. Haha... calling
us communists? It looks like the petty dictator is calling the kettle black.
As for money, your money means absolutely nothing to us Gates. It's greed
stained Micro$oft money... and it's as worthless to us as Monopoly money.

<G> - I will never understand people like you. Money is everything. Can't
you see that? How can you not? I've built an empire based on greed. I
rely on corrupt, underhanded ways of stealing and blackmailing other companies
in the computer industry. If that doesn't work, then I buy them. If you
guys aren't doing this to profit... by blackmailing me or using extortion
tactics, what the hell is your reason? What's your goal? What's the purpose?
What is YOUR vision?

<BL> - Are you paranoid? Good! Hahaha.

<B> - He actually believes that we're going to reveal our objective to him...
Haha. Gates, your zombie slaves are more intelligent and clever than you are.
Figure it out for yourself Billy Boy. Or, better yet, pay someone to do it for
you. Afterall, your precious money can buy anything right? <G> You cannot
buy the information that you seek. Just as, you can't buy knowledge, wisdom
or intellect. Basically, you're forever limited to your little thoughts and
restricted way of thinking. Your mind will never be able to analyze anything.
You are not a logical person. Your own greed takes priority. To summarize,
you are a stupid, greedy, rich zombie that's lacking all that makes someone
into a human being. Morals, ethics and other human qualities can't be bought
for any sum of money. So, in other words, you are FUBAR. ;)


LETTERS TO THE EDITOR - {LETTERS}


Date: 7:45 pm Sat Aug 1, 1998 Number : 3 of 3
From: Ufoguy Base : Private Mail
To : Blackened Refer #: None
Subj: editorial Replies: None
Stat: Normal Origin : Local

This is just a small response to an article in the last issue of the
NewsLetter...

------

I would like to comment on one particular article in Issue #10. The
"Cops and Harassment" feature written by Fatal Vision is filled with a
number of instances that are not only stupid, but because of his actions
he could have voluntarily given up his right to freedom.

There are countless documents from people in the scene about what to do
when confronted by the police, whether conducting anything illegal or not.
Let me run down a short list that would've made Fatal Vision's experiences
more bearable.

Rule #1: Don't admit shit. If a cop asks "Do you know wat time it is?"
wait for your lawyer. If they ask you "Why are you out so late?" wait for
your lawyer. If they even ask you for your name, wait for your lawyer. Doing
anything else is allowing them access to personal information and if you
open yourself to even the most irrelevant questions you could be giving them
much needed "evidence"

Rule #2: If they want to speak to you in your house tell them they'll
require a search warrant to even be on the premises. This will piss them off
but by letting them see your living environment you're giving them an opening
to your life. What you don't say will be known from what hangs on your walls,
or resides on the bookshelf. Anything that a doughnut-eater could consider
"probable cause" will hook you in a holding cell. Also, refer to Rule #1.

Rule #3: Don't volunteer evidence. Make them prove their case. By handing
them anything that could be construed as evidence you're on a short trip to
Cell Block D. If they frisk you without arresting you it's an illegal seach
and seizure. Even though the worst penalty for the puerco will be suspension
with pay, you can still have any evidence thrown out of court. This ties in
with Rule #2. Acting like you're doing something wrong is probable cause,
and is reason enough for the cops to obtain a search warrant.

If the cops start threatening you just laugh. Always request a lawyer,
always find out the officer's name and the name of their supervisor and always
let them know that you know your individual rights are being infringed upon.
If you don't stand up for your rights they will believe you to be ignorant of
the law and your rights and they will do everything outside of their power to
force you to give up everything you know, or don't know.

Lawyers may be the scourge of society, but in many cases they can keep you
from seeing the inside of a cage, and can get you a lot of money by suing
those who believe it's their job to infringe upon your rights.

------
UfoGuy


I'm not the editor, but since your feedback concerns my article on cops,
I thought that I would reply instead of BLACKENED. Thanks for the feedback.

It's nice to see that you read my article man. ;) You seem to have some
experience with that type of thing. If that's the case, why don't you write an
article on how to deal with cops and send it in to be published? At any rate,
I'll admit that when those events happened I wasn't fully educated about how
to deal with police officers. I was just simply trying to prove a point that
some cops just try to take the easy route out of everything. They are *not* what
most people think they are. I know from talking with quite a few people that
they think cops are not racist, follow the system, do not abuse anyone while
arresting someone etc. They have been brainwashed man. That's *exactly* what
they want you to think. I was simply sharing some experiences that I've had
with cops. Why should people in blue uniforms have more power than we do?
They shouldn't and they don't IMO. By writing that article I learned a few
things, and thought about what I'd do differently if I was ever in situations
such as those. As you hopefully noticed the events that I wrote about ranged
in time from recent to many years ago. Cops haven't changed though man. They
are still on a "power trip" and think they can do whatever they fucking want.
It's up to everyone to make sure that they do their jobs properly. The first
step is admitting there are faults in the police force. The second step is
educating the public to know exactly what their rights are, and informing them
whenever situations arise. The third step is teaching them what to do if they
encounter an average, power tripping cop.

Written by Fatal Vision ú Damage, INC. (C)opyright 1998.


OBJECTIVE OPINIONS - {OPINIONS}
The ethics of hacking:

Some people strongly believe that everyone should follow a 'hackers ethic'
and there have been countless text files created with information regarding
'the ethics of hacking'. Just do a search using a web browser for "ethics",
"h/p ethics", "hacking ethics" etc. I'm sure that you'll find quite a few
useful text files on sites to choose from and read.

Personally, I don't believe in following any set of "rules" whether it's hacking
ethics, laws or anything else. I'll follow my own set of rules, my own ethics,
and live the way I want to live... not how someone else wants me to. I've read
several text files now on the "ethics of hacking" and had to laugh, since they
are all based on opinion. There are so many different ideas about what is
right and what is wrong. I'm sure you'll know what I mean once you do some
reading and find out a few things about this issue. Some people think that
damaging systems isn't right, and nothing should be altered/manipulated except
the log files. Yet, some say "Nuke the system when you are done hacking so
that you don't leave a trace."
They are so contradictory. One text file tells
you not to do any damage, while another encourages you to do damage.

I've also read text files describing hackers as criminals that do manipulate
files, change options, nuke systems etc. In my opinion, a hacker/phreak should
do what they feel and not what is written in a text file that explains how they
should act, what they should do and what to do on systems.

With this article, I am by no means saying that following a code of ethics is
wrong. In fact, I would almost call it a necessity to follow your own code
of ethics that you develop. I think that *everyone* should sit down and
determine what their own ethics are, establish them clearly and live by them.
Make sure they're *your* ethics and not someone else's ideas. I know that
people involved with the government have created numerous text files, web pages
etc. in an attempt to make hackers believe that nuking systems and altering data
is wrong and will get you into shit. One of the main reasons they do that is
to try to make some people "follow" what they write and not damage any systems.
They don't want to lose any information or money, and they believe that they
can influence people into following a "government code of ethics". <SH>

In my opinion, nuking systems isn't all that's involved with ethics. You
have to think about who you are going to associate with, whether they're
newbies, experienced h/pers, warez d00dz, etc. That's just an example of
another factor in ethics. I am sure that you could think of many other issues
that could be included with your own "ethics".

This is a little story about a group of hackers and their ethics of not damaging
or destroying the data/information that they obtain access to. It's funny how
some people think certain security systems are 100% secure. I watched a
television show on security, and it showed how the police force thought that
their cop cars' computer systems are *unhackable*. A group of hackers from the
L0pht proved to these fat pigs that they were wrong, and that their security was
lame and weak. The group found a few systems by trashing. They later found
that there were no encryption methods for outgoing/incoming data and there
weren't many passwords. The program showed them trashing late at night, finding
equipment, fixing it up and changing the equipment they found to have more
features. They then used the equipment to find information on people, enter
licence plate numbers and change data. They are still experimenting with it.
However, the L0pht isn't malicious and they didn't change any personal data or
alter any crucial files etc. So, you could say that their ethics in this case
were honourable. They did it only for information.

I'd like to suggest that you form your own ethics, follow your own set of rules,
use your own guidelines and abide by what you strongly believe in. Don't read
an article about ethics and immediately follow what that person says to do,
just because they wrote a text file on hacking ethics. Use your judgement while your
hacking and don't rely on others to make those types of choices for you. Think
for yourself and do what you want to do. Don't rely on text files that an
anonymous person wrote as a guide to your personal hacking ethics.

Written by Fatal Vision ú Damage, INC. (C)opyright 1998.


REPORTS FROM THE FRONT - {REPORTS}

We've decided to include several interesting articles in this issue. The
first is a Micro$oft Propaganda Bulletin relating to cDc's Back Orifice.
Unfortunately, Micro$oft has shown how ignorant and inept they are yet again.
They claim that security is taken seriously etc. Micro$oft also uses the
word "truth", which is a fucking joke when you consider the source. They even
failed to spell Back Orifice properly. Perhaps they should've looked at the
docs that are included with Back Orifice more carefully. The next article isn't
just for our American readers. It's applicable to anyone that thinks about
freedom, takes it seriously, and believes that it should be discussed and not
ignored. Even if you take freedom for granted, I suggest that you read the
article. The last article (titled "The New Bill of Rights") is relevant to
Americans and those that understand the basic rights of U.S. citizens.
Basically, it is a parody with changes and additions to the original that make
it hilarious. ;)


From: Microsoft Product Security Response Team [secure@MICROSOFT.COM] Sent:
Wednesday, August 05, 1998 11:22 AM To:
MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM Subject: Microsoft Security Bulletin
(MS98-010)



Microsoft Security Bulletin (MS98-010)

----------------------------------------------------------------------- -

Information on the BackOrifice Program

Last Revision: August 04, 1998

Summary
=======
On July 21, a self-described hacker group known as the Cult of the Dead Cow
released a tool called BackOrifice, and suggested that Windows users were at
risk from unauthorized attacks. Microsoft takes security seriously, and has
issued this bulletin to advise customers that Windows 95(r) and Windows 98(r)
users following safe computing practices are not at risk and Windows NT(r)
users are not threatened in any way by this tool.

The Claims About BackOrifice
============================
According to its creators, BackOrifice is "a self-contained, self-installing
utility which allows the user to control and monitor computers running the
Windows operating system over a network"
. The authors claim that the program
can be used to remotely control a Windows computer, read everything that the
user types at the keyboard, capture images that are displayed on the monitor,
upload and download files remotely, and redirect information to a remote
internet site.

The Truth About BackOrifice
===========================
BackOrifice does not expose or exploit any security issue with the Windows
platform or the BackOffice(r) suite of products.

BackOrifice does not compromise the security of a Windows network. Instead, it
relies on the user to install it and, once installed, has only the rights and
privileges that that the user has on the computer.

For a BackOrifice attack to succeed, a chain of very specific events must
happen:
- The user must deliberately install, or be tricked into
installing the program
- The attacker must know the user's IP address
- The attacker must be able to directly address the user's
computer; e.g., there must not be a firewall between the
attacker and the user.

What Does This Mean for Customers Running Windows 95 and Windows 98?
====================================================================
BackOrifice is unlikely to pose a threat to the vast majority of Windows 95
or Windows 98 users, especially those who follow safe internet computing
practices. Windows 95 and Windows 98 offer a set of security features that
will in general allow users to safely use their computers at home or on the
Internet. Like any other program, BackOrifice must be installed before it can
run. Clearly, users should prevent this installation by following good
practices like not downloading unsigned executables, and by insulating
themselves from direct connection to the Internet with Proxy Servers and/or
firewalls wherever possible.

What Does This Mean For Customers Running Windows NT?
=====================================================
There is no threat to Windows NT Workstation or Windows NT Server customers; the
program does not run on the Windows NT platform. BackOrifice's authors don't
claim that their product poses any threat to Windows NT.

What Customers Should do
========================
Customers do not need to take any special precautions against this program.
However customer should ensure that they follow all of the normal precautions
regarding safe computing:
- Customers should not install or run software from
unknown sources -- this applies to both software available
on the Internet and sent via e-mail. Reputable software
vendors digitally sign their software to verify its authenticity
and safety.
- Corporate administrators can block software that is not digitally
signed by a reputable or authorized software company at their proxy
server and/or firewall.
- Customers should keep their software up to date to ensure that
hackers cannot take advantage of known issues.
- Companies should use actively use auditing and monitor their
network usage to deter and prevent insider attacks.


More Information
================
Please see the following references for more information related to this
issue.

- Microsoft Security Bulletin 98-010, Information on the
BackOrifice Program (the Web posted version of this
bulletin),
http://www.microsoft.com/security/bulletins/ms98-010.htm

Revisions
=========

August 04, 1998: Bulletin Created

For additional security-related information about Microsoft products, please
visit http://www.microsoft.com/security


----------------------------------------------------------------------- -- THE
INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN
IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF
LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION
MAY NOT APPLY.

(c) 1998 Microsoft and/or its suppliers. All rights reserved. For Terms of Use
see http://support.microsoft.com/support/misc/cpyright.asp.
-------------------------------------------------------------------------------

From the Radio Free Michigan archives

ftp://141.209.3.26/pub/patriot

If you have any other files you'd like to contribute, e-mail them to
bj496@Cleveland.Freenet.Edu.
------------------------------------------------

------------------------------------------------
* WHAT TODAY'S AMERICANS DON'T UNDERSTAND *
------------------------------------------------
By Charley Reese, Syndicated Columnist

There are three things every American ought to read: the
DECLARATION OF INDEPENDENCE, the CONSTITUTION, and the
FEDERALIST PAPERS. None of them is difficult reading. They
are not obscure dissertations written by pedants to impress
pedants. All three were written for the average person and
widely published.

The Declaration contains the philosophical premises of the
American Revolution. A lot of Americans today clearly don't
believe in them. A lot more have no idea what they are.

The Constitution is the compact drawn up and ratified by the
people who created a government consistent with the
philosophical premises of the Declaration. Incidentally,
the government created by that Constitution is not
recognizable in Washington, except in the barest outline.

The Federalist Papers are a series of articles written and
published in newspapers during the debate over ratification.
They are arguments in favor of the Constitution and its
original intent. There are many paperback editions
available.

All of this is 100 percent relevant to today, for whether
you agree or disagree with the premises and principles of
the American Revolution will determine how you view current
political issues.

In a nutshell, the basic premises of the American Revolution
are these: people are born free and equal, their rights a
gift of God, the only legitimate purpose for government is
to protect those rights, when government instead abuses
those rights, then people have the right and the duty to
overthrow it with force and violence, and to form a new
government that will protect their rights. Too many
Americans today, consumed with material pursuits, their
brains spongy with trivia and amusement, their spirits timid
and corrupted with whining and pleading, view such
sentiments as absolutely radical, if not subversive and, God
forbid, even leftist.

Their standard question to public officials and candidates
is, "What are you going to do for me economically?" You
would thing listening to American political debate, that the
American Revolutionists were all Marxists and that nothing
in the world matters but economics. I'm sure most people if
they ever find themselves standing before God will hand him
first their financial statement.

Freedom in this modern, Orwellian America, is something that
is "defended" overseas but otherwise never mentioned in
polite conversation at home.

A true son or daughter of the American Revolution will be
more concerned about freedom than about making it easier for
the police to catch criminals; more concerned about property
rights which are the basis of political freedom, than about
schemes to control traffic and housing developments; more
concerned about freedom than in accomplishing social goals
at the expense of freedom; more concerned about freedom than
about some fool being corrupted by what he reads or sees.

Basically what it means to be free is to be let alone.
People have a right to be let alone. They have an
obligation to leave others alone. They do not have a right
to subsidies, to be liked or approved, or granted favors.
Just let alone. Nor do they have an obligation to like,
approve or grant favors to others. Just to leave them
alone.

This clearly is not understood by the sons and daughters of
the welfare state. Gays, for example have a right to be let
alone, but they demand that others approve of them. They
have no right to approval. Others demand so called equal
opportunity , but they want a lower standard of test scores
or physical demands. Everyone has a right to be treated
equally. No one has the right to demand special treatment.

Clearly, freedom demands a better class of human beings -
human beings who value freedom more than wealth or personal
security and who don't need the approval of others to
bolster their weak egos.

-------------------------------------------------------------------------------

NEW
THE^BILL OF RIGHTS

Nearly everything has changed in the United States since the Bill of
Rights was written and adopted. We still see the original words when
we read those first 10 Amendments to the Constitution, yet the meaning
is vastly different now.

And no wonder. We've gone from a country of a few million to a few
hundred million. The nation's desire to band together was replaced by
revulsion of togetherness. We exchanged a birthright of justice for a
magic bullet, and replaced the Pioneer Spirit with the Pioneer Stereo.

We're not the people who founded this country and our Bill of Rights
should reflect this.

As we approach the 21st Century, it's time to bring the wording up to
date showing what we are and who we are.

AMENDMENT I

Congress shall make no law establishing religion, but shall act as if
it did; and shall make no laws abridging the freedom of speech, unless
such speech can be construed as "commercial speech" or "irresponsible
speech"
or "offensive speech;" or shall abridge the right of the
people to peaceably assemble where and when permitted; or shall
abridge the right to petition the government for a redress of
grievances, under proper procedures.

It shall be unlawful to cry "Fire!" in a theatre occupied by three or
more persons, unless such persons shall belong to a class declared
Protected by one or more divisions of Federal, State or Local
government, in which case the number of persons shall be one or more.


AMENDMENT II

A well-regulated military force shall be maintained under control of
the President, and no political entity within the United States shall
maintain a military force beyond Presidential control. The right of
the people to keep and bear arms shall be determined by the Congress
and the States and the Cities and the Counties and the Towns (and
someone named Fred.)


AMENDMENT III

No soldier shall, in time of peace, be quartered in any house without
the consent of the owner, unless such house is believed to have been
used, or believed may be used, for some purpose contrary to law or
public policy.


AMENDMENT IV

The right of the people to be secure in their persons, houses, papers,
and effects against unreasonable searches and seizures may not be
suspended except to protect public welfare. Any place or conveyance
shall be subject to search by law enforcement forces of any political
entity, and any such places or conveyances, or any property within
them, may be confiscated without judicial proceeding if believed to be
used in a manner contrary to law.


AMENDMENT V

Any person may be held to answer for a crime of any kind upon any
suspicion whatever; and may be put in jeopardy of life or liberty by
the state courts, by the federal judiciary, and while incarcerated;
and may be compelled to be a witness against himself by the forced
submission of his body or any portion thereof, and by testimony in
proceedings excluding actual trial. Private property forfeited under
judicial process shall become the exclusive property of the judicial
authority and shall be immune from seizure by injured parties.


AMENDMENT VI

In all criminal prosecutions, the accused shall enjoy the right to
avoid prosecution by exhausting the legal process and its
practitioners. Failure to succeed shall result in speedy
plea-bargaining resulting in lesser charges. Convicted persons shall
be entitled to appeal until sentence is completed. It shall be
unlawful to bar or deter an incompetent person from service on a jury.


AMENDMENT VII

In civil suits, where a contesting party is a person whose private
life may interest the public, the right of trial in the Press shall
not be abridged.


AMENDMENT VIII

Sufficient bail may be required to ensure that dangerous persons
remain in custody pending trial. There shall be no right of the public
to be afforded protection from dangerous persons, and such protection
shall be dependent upon incarceration facilities available.


AMENDMENT IX

The enumeration in The Constitution of certain rights shall be
construed to deny or discourage others which may from time to time be
extended by the branches of Federal, State or Local government, unless
such rights shall themselves become enacted by Amendment.


AMENDMENT X

The powers not delegated to the United States by the Constitution
shall be deemed to be powers residing in persons holding appointment
therein through the Civil Service, and may be delegated to the States
and local Governments as determined by the public interest. The
public interest shall be determined by the Civil Service.

-----------------------------------------------------------------------
The Pen is mightier than the Sword.
The Court is mightier than the Pen.
The Sword is mightier than the Court.
- Rey Barry -
-----------------------------------------------------------------------


SOURCE AND SCRIPTS - {SOURCE}


This will scan your devices to detect sniffers on your system.
Linux support is ready but SunOS has some problems (mainly in
net/if.h when i tried compiling i got a lot of parse errors in
if.h and socket.h <shrug> maybe the system i was on was damaged.)

Comments welcome :-).

-------------------------------------------------------------------------------
begin promisc.c --
// $Id: promisc.c,v null 1997/03/09 10:35:58 trevorl Exp $
// promisc.c: test devices for sniffers and device moniters.
//
// Copyright (C) 1997 Trevor F. Linton (blind@xmission.com)
//
// Created for Linux based loosely upon linux ioctl controls.
// ioctl() is used to detect different flags set on devices used
// on your system.
//
// gcc -o sys_test promisc.c
//

#include <stdio.h>
#include <sys/socket.h>
#include <sys/ioctl.h>
#include <errno.h>
#if defined (__linux__)
#include <linux/if.h>
#else
#include <net/if.h>
#endif
#define size(p) (sizeof(p))

int dev_flags=0,
device_flags=0,
set_look_all=0;

int
main(int argc, char **argv) {
struct ifreq ifreq, *ifr;
struct ifconf ifc;
char buf[BUFSIZ], *cp, *cplim;

if(argc <= 1)
set_look_all++;

if((dev_flags = socket(PF_INET, SOCK_DGRAM, 0)) < 0) {
fprintf(stderr, "An error occured establiashing while establishing a socket\n");
perror("socket");
exit(1);
}

ifc.ifc_len = sizeof(buf);
ifc.ifc_buf = buf;

if(ioctl(dev_flags, SIOCGIFCONF, (char *)&ifc) < 0) {
perror("SIOCGIFCONF");
exit(1);
}
ifr = ifc.ifc_req;
cplim=buf+ifc.ifc_len;
for(cp = buf; cp < cplim;
cp += sizeof (ifr->ifr_name) + size(ifr->ifr_addr))
{
ifr = (struct ifreq *)cp;

if(argv[1])
if(strcmp(ifr->ifr_name, argv[1]) && !set_look_all)
continue;

ifreq = *ifr;
if(ioctl(dev_flags, SIOCGIFFLAGS, (char *)&ifreq) < 0)
{
fprintf(stderr, "SIOCGIFFLAGS: %s (get interface flags): %s\n", ifr->ifr_name,strerror(errno));
continue;
}

device_flags=0; device_flags = ifreq.ifr_flags;
fprintf(stdout, "%s: ", ifreq.ifr_name);

if((device_flags & IFF_PROMISC) != 0)
fprintf(stdout, "Promiscuous: Sniffer detected.\n");
else
fprintf(stdout, "Not-Promiscous: No Sniffers detected.\n");

if(!set_look_all)
exit(0); // We're finished..
else
continue; // Go onto next device..

}
if(!set_look_all)
fprintf(stdout, "%s: Unknown device.\n", argv[1]);
// Device not found..
}
end promisc.c --
-------------------------------------------------------------------------------


THC PHREAK'S TOP TEN LIST - {TOP TEN}
"Hilarious VMB Messages"

1. "Hi, this is Sara Stupid. You can call me at 555-1000 after 6.
I've had money problems lately. There have been a lot of things
going on and my financial situation hasn't improved yet. I know
that I still owe you $500 from the loan. I promise to pay you
back soon. I'm sorry it has taken so long. Should I deposit the
money directly into the account at Fat Cat Trust, account # 223344?
Or do you want to make other arrangements instead? Call me and let
me know or drop by my house at 200 Mulberry Street to discuss the
situation in person. Thanks."


[Quit crying. I'm not buying your sob story. So, quit making
lame excuses. You're pathetic. Send me the money. RIGHT NOW!]

2. "This is Bill Hacker. I'm still interested in purchasing the
products that you're selling that we discussed previously over
the phone. You can bill it to my Visa card. The number is
2532520381."


[Good idea d00d. Leave your CC# in VMB messages.]

3. "Hello Jake. I'm going to be away this weekend. So, if you want
to drop off the package, my address is 315 Loser Avenue. I will
be sure to leave the side door open for you. Talk to you soon."


[Okay. Thanks for leaving the door open for me. That eliminates
a breaking and entering (B&E) charge. :)]

4. "You have reached the Burger King Voice Mail System. Please
dial the number of the person you're calling. If you have
a mail box on this system, please press #. '5555' Mike Johnson,
Franchise Manager...BEEP."
'Hey Mikey. Former customer.
Shit King sucks!' :)

[That's his real name, Mikey. I didn't feel like changing it.]

5. "Hey all you K0d3 Kidz... This week we have even more kewl k0d3z
for ya to use. Try 1-800-XXX-XXXX passcode XXXXXX. etc."


[Obviously, a K-K3wli0 K0d3z KiDz VMB hotline.]

6. "Hey baby. Are you feeling horny tonight? Meet me at the
park on Richmond Street after 11. I'll be there, wet and
waiting. MMmmmm... Oh yeah..."


[She sounded hot. That's a message she left in her box...err
in someone's mail box, not a greeting.]

7. "Harry. Hi, this is Joe. My call got forwarded to voice mail.
I need some good shit man. I'm starting to go insane! Why aren't
you answering your cell phone? I'll try your pager again."


[Drugs anyone? That one isn't an exact quote, but rather just
typed from memory, but you get the point. A desperate guy
that's trying to reach his dealer.]

8. "Hey Stuart. I couldn't get in touch with you, so I thought that
I'd leave voice mail. The PIN # that you wanted is 55555. The
credit card # is 2512334980. It expires on 04/06/99. Call me
as soon as you hear this message."


9. "Hi Tom. This is Jeff O'Neil of Greedy Financial Services speaking.
I just wanted to notify you about your Mutual fund. The Mutual
fund that you held with us expired and the funds were transferred.
They've been deposited into your account. The total sum of your
investment upon maturation was $10,000. If you have any questions,
call 555-2255 and ask for Jeff."


[Thanks for the financial info. Forward some cash to my account.]

10. "This is NOT the Hewlett Packard (HP) line. So, quit calling
this number and leaving messages."
- 1-800 Direct Dial VMB.

[It's not the h/p line? Damn.]

Note: Names, addresses, numbers etc. have been changed to protect the
naive and stupid. :) I was going to include the actual 1-800 VMB #, BN
and passcode for each, but decided not to allow everyone reading this to
call and 'invade their privacy'. Some of them are just greeting messages.
The [...] underneath them denotes my comments. The 'text' is the actual
message that I left.

Written by THC Phreak ú Damage, INC. (C)opyright 1998.


THOUGHTS, POEMS AND CREATIVE WRITING - {WRITING}
Chaotic/lyrical sound bytes/rants:

Give me fuel. Give me fire. Give me Damage, INC. desire.

Chaotic dreams are made of these. Who has a mind to disagree?

Wherever I may roam is where I'll call home.

It's a bitter sweet... symphony of destruction.

Label me and I'll lamer you.

We will... We will root you. We will... We will root you.

We're all stars in the dope show. We own your d0p3...and the show.

I woke up this morning and got myself a beer.

We are the champions, my phreak... and we'll keep going against
the grain... until the end.

Every cop is a criminal and all the answers are free.

Keep on phreakin' in the free world.

Purple haze is in my brain.

The killer in me is the killer in you.

Sick and tired, I stand alone.

I killed you... I'm not gonna crack. I'm just gonna smoke crack.

The only thing you have to phear is phear itself.

It's the end of the world as you know it. Watch the world die.

This is the end... my only phriend... the end.

Note: I decided to write something different, that I feel is creative in
its own right. Most of the above are lyrics that have been taken from
various songs. They were selected because each lyric fit into the theme of
the rant. Most were altered in some way to either change the meaning or to
add humour. Some of the others were combined with another lyric, rearranged,
the words were written differently or they were left in their original state.
I'm not going to explain what it all means, nor should I. Just as the name
Damage, INC. speaks for itself, the rant should stand alone and require no
explanation and worthless analytical comments. Take it for what it is.

Written by Blackie Lawless ú Damage, INC. (C)opyright 1998.


CLOSING COMMENTS - {CLOSING}

Alright, perhaps my closing comments aren't captivating. Maybe they're not
motivational either. They may not even be creative. However, I always
try to express my thoughts in a clear manner and send a message at the end
of each issue. In other words, I'd rather write something that carries a
meaning rather than just close every issue with the same "This ends another
issue of the Damage, INC. Newsletter. I'm very proud of this particular issue
and think that it's one of our best so far."
etc. In my opinion, that's not
only boring and repetitive but it also demonstrates a lack of thought put
into it. I've read certain zines that always seem to have the exact same
closing, and I personally find it annoying... So, regardless of how my words
are received, I always write a few short paragraphs that I think are unique
to each respective issue. In that way, hopefully you won't skip this section
or die of boredom while reading through it. ;)

As I'm sure you've noticed, this issue was quite different from the previous
ones. Certain sections (such as the previous two) contained articles that you
may not be accustomed to seeing in the Damage, INC. Newsletter. No matter what
your reaction to them is, it's good. Even though not all changes are good, we
still intend to continue changing and evolving. Some readers might even be
opposed to the inclusion of a 1-800 scan. A couple mentioned that they don't
think that it's a good idea to publish scans, codes etc. That's alright. I
applaud them for saying what they think. Even though we appreciate and
encourage feedback, consider suggestions and think about the comments that are
made, that *doesn't* mean that we'll conform and change the way that the
newsletter is...to how a single reader thinks that it should be. Before any
important changes are made, they are discussed at length amongst all that are
involved in publishing the Damage, INC. Newsletter. So, if someone makes an
intelligent suggestion that we feel is worthwhile, then it will be implemented.
Basically, if we like your idea, then we'll use it. Otherwise, it obviously is
ignored, but not forgotten. There's always a chance that we'll use the idea in
the future. Therefore, voice your opinions directly to us. Send us comments
and suggestions. They don't go unnoticed. However, they won't all be used, nor
should they be. In summary, Damage, INC. isn't going to change the entire
format of the newsletter, the way that articles are written or what types of
things are included based on a small comment by a reader. That shouldn't be
expected. That's not how it works. If you disagree with this or any other
"policy", send Email to damage_inc@mailcity.com.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

We're always looking for Writers, Members and Distribution Sites. If you'd like
to apply to Damage, INC. and join a respected h/p group, then download a copy of
the Damage, INC. Application Generator and contact us. If you want any of our
releases, they are currently available (at no ratio) on the following boards:

ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
³ ...AND JUSTICE FOR ALL - (519) NUKE-YOU ³
³ Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only. ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ PSYCOSiS - (519) 742-6899 ³
³ Damage, INC. Member Board, h/p/a/c/v/t. ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ SatanicDreams - (604) 930-2061 ³
³ Damage, INC. Dist. Site, Psycho/2 Net WHQ, CCi Net, h/p/a/c/v/t. ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ Infinite Darkness - (954) 797-0666 ³
³ Damage, INC. Dist. Site, CCi Net WHQ, h/p etc. ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ T's BBS - (306) 384-1600 ³
³ Damage, INC. Dist. Site, CCi Saskatchewan Host. ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ OBLiViO - +381-11-318-6392 ³
³ Damage, INC. Dist. Site, CCi Yugoslavia Host, h/p etc. ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ ViCkY BBS - +421-7-596-8331 ³
³ Damage, INC. Dist. Site, CCi Slovakia Host, h/p etc. ³
ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;

Damage, INC. web site:

http://members.tripod.com/~damage_inc

Comments, Suggestions, Questions, Feedback, Letters to the Editor and article
submissions should be sent to damage_inc@mailcity.com. Credit is always given
to the author for any articles or source code that is submitted and published.

You can contact BLACKENED directly at blackened@coldmail.com. Shatazar can be
contacted at shatazar@alloymail.com. You can also contact us in Email on a
Damage, INC. board near you or via Echomail/Netmail in several quality nets
including: CCi_Net, Psycho/2_Net etc.

- EOF

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT