Copy Link
Add to Bookmark
Report

Phantasy Issue 25 Vol 08

eZine's profile picture
Published in 
Phantasy
 · 2 days ago

      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
= =
- WELCOME TO THE TWENTY-FIFTH ISSUE OF -
= =
- -=>PHANTASY<=- -
= =
- A PUBLICATION AND NEWSLETTER OF -
= =
- THE -
= INTERNATIONAL =
- INFORMATION -
= RETRIEVAL =
- GUILD -
= =
- Hacking, Phreaking, Anarchy, Survivalism, and Commentary -
= =
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Volume Number Eight - Issue Number Twenty-Five - Dated 05/21/2000
Editor-In-Chief is Mercenary : iirg@iirg.org
Staff Writers Are: Thomas Icom : ticom@iirg.org
Black IC : black_ic@iirg.org
Phurk : phurk@iirg.org

---------------------
Table of Discontents:
---------------------

# Selection Author
- ------------------------------------ ----------------
1. Legal Ease & IIRG Information The IIRG
2. Big Brother on the Boulevard Thomas Icom/IIRG
3. DXing with Citizen Band Radio Black IC/IIRG
4. Playstation 2 Modification and Muses Black IC/IIRG
(Part 1)
5. Hacking Computer Shows for Phun and Profit Mercenary/IIRG
(Part 1)
6. An Introduction to Palm Pilot Programming Phurk/IIRG
7. IIRG Signal Intelligence Black IC/IIRG
(SIGINT) Guidelines
8. The Rumor Mill Anonymous Sources
9. Letters to the IIRG N/A
10. IIRG and Phantasy Distribution The IIRG

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [1]: Legal Ease & IIRG Information


OFFICIAL DISCLAIMER...

All Contents of PHANTASY Magazine are (C) Copyright by THE IIRG, all
rights reserved. Nothing may be reproduced in whole or in part without
written permission of the IIRG.
Phantasy Magazine may also NOT be included on any CD-ROM collection
without express written permission of the IIRG.
All information published in PHANTASY is from USER contributed material.
The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability
from any damages of any type that the reader or user of such information
contained within this newsletter may encounter from the use of said
information. All files are brought to you for entertainment purposes only!
We also assume all information infringes no copyrights and hereby
disclaim any liability.
In the future PHANTASY Magazine will be made available quarterly to the
Internet community free of charge. Any corporate, government, legal,
or otherwise commercial usage or possession (electronic or otherwise) is
strictly prohibited without written IIRG approval, and is in violation of
applicable US Copyright laws.

The IIRG (IIRG Mailing Address)
862 Farmington Avenue
Suite 306
Bristol, Connecticut 06010

Here is the IIRG's Public Key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQCNAjE9nrYAAAEEAKuDXqGRyCw42PStHZMLjOVZ2QhTPklKXv5NK3u0hu/EcBYM
Cib6/jIDwgr3uwRo9DVptYVtGAYIY7/3OXw+B+Vxmb846weUBwcY14mBPrRtAjhI
EnSzHeS477sL1MklTQ+cxmDh8TyaAG8s5n+gKHc2qCQ+FTo6L1WIQPIFCJE5AAUR
tBRJSVJHIDxpaXJnQGlpcmcuY29tPg==
=onlg
-----END PGP PUBLIC KEY BLOCK-----

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [2]: Big Brother on the Boulevard
By: Thomas Icom/IIRG <ticom@iirg.org>

If you go through a toll booth and look up, you'll see them. Others are
better hidden, reaching out with radio/electronic tendrils as you ply the
blacktop byways. Either way, a search through public government records
discloses their existence and often their lairs. Live or do business in
any metropolitan area, and your forcibly encouraged to "voluntarily" do
business with these entities. They implement wireless, telecommunications,
artificial intelligence, surveillance, and many other technologies. Some
of the contracts are won by companies that are generally unknown to the
general public, such as Mark IV Industries and Amtech. Others belong to
military-related concerns; Rome Labs and Kaman. The whole octopus has a
name: Intelligent Transportation Systems, and was born from government
legislation; the Intermodal Surface Transportation Efficiency Act of 1991
(ISTEA). Like any hacking sushi connoisseur knows, however, an octopus by
any other name is still tasty.

In the words of ITS America, a federal advisory committee to the
U.S. Department of Transportation established to coordinate the
development and deployment of ITS in the United States, "ISTEA calls for
the creation of an economically efficient and environmentally sound
transportation system that will move people and goods in an energy
efficient manner, and will provide the foundation for a competitive
American transportation industry." While innocent sounding on the surface,
there are many dual-use aspects of ITS technology, especially when one
takes into account all the "critical infrastructure protection" measures
the government is talking about. On July 15, 1996 , President William
J. Clinton signed Executive Order 13010. The beginning paragraph states:

"Certain national infrastructures are so vital that their incapacity or
destruction would have a debilitating impact on the defense or economic
security of the United States. These critical infrastructures include
telecommunications, electrical power systems, gas and oil storage and
transportation, banking and finance, transportation, water supply systems,
emergency services (including medical, police, fire, and rescue), and
continuity of government. Threats to these critical infrastructures fall
into two categories: physical threats to tangible property ("physical
threats"), and threats of electronic, radio-frequency, or computer-based
attacks on the information or communications components that control
critical infrastructures ("cyber threats"). Because many of these critical
infrastructures are owned and operated by the private sector, it is
essential that the government and private sector work together to develop
a strategy for protecting them and assuring their continued operation."

To this end, The President's Commission on Critical Infrastructure
Protection was created. According to The PCCIP, transportation
infrastructure is defined as:

"The nation's physical distribution system critical to supporting the
national security and economic well-being of this nation, including the
national airspace system, airlines and aircraft, and airports; roads and
highways, trucking and personal vehicles; ports and waterways and the
vessels operating thereon; mass transit, both rail and bus; pipelines,
including natural gas, petroleum, and other hazardous materials; freight
and long haul passenger rail; and delivery services."

Taking into account the information provided by the PCCIP, we can begin to
understand the dual-use nature of ITS systems. This is nothing new. The
Interstate Highway System was created by President Eisenhower on June 29,
1956 in part for the quick movement of military personnel and equipment in
the event of a national emergency.

Although they don't realize it, ITS has been a common topic among
conspiracy theorists. Those circles are always awash with talk about how
newer vehicles are equipped with computer systems that can let the car be
remotely shut off by authorities. America is full of car enthusiasts, and
while cars with electronic fuel injection and computerized engine controls
are more vulnerable to EMP and HERF than old fashioned points and
carburetors, I have yet to see a mechanic or electrical engineer come to
be with an engine computer that has such a feature built in. Considering
how many vehicle electronic systems have integrated circuits available to
increase performance, such a thing would have been discovered and there'd
be not only be a modification or device out to disable it, but someone
with a "trolling for taillights" sense of humor would have designed and
distributed a device to screw with people. There are allegedly mini-EMP
generators out there which are being developed for law enforcement
agencies to assist them in vehicular pursuits by disrupting a vehicle's
engine electronics, and of course anti-theft systems which enable you to
call your car if it's stolen and shut it off, but nothing universal as the
conspiracy theorists claim. If anyone does come up with some proof,
however, please send it to me. Just don't send me the recorded ramblings
of some guy who bought an hour on WWCR.

The surveillance aspects of ITS, however, are real and talked about quite
openly by the very people who use them. Any observant individual can see
the equipment in use by traveling the Intestates of the United States in
any metropolitan area, such as the I-95 Corridor that runs up the East
Coast. I-95 is one of the premiere ITS highways. ITS implementation on the
Corridor is handled by I-95 Corridor Coalition
<http://www.i95coalition.org/>, a consortium consisting of Departments of
Transportation, Transportation Authorities, and Associated Organizations
from Virginia to Maine whose are of responsibility includes Interstate
Highway I-95. According to information on their website:

"The term surveillance has been used to denote the observation of
conditions in time and space. Thus, the function of a surveillance system
in an Intelligent Transportation System (ITS) environment is to provide
information of the observed conditions to enable the implementation of
traffic management, Travel Demand Management (TDM), and Traveler
Information Services (TIS). Although the objectives of transportation
management decisions have been to reduce traffic delay and accidents,
concerns for the environment have made improvement of environmental
quality an additional objective. This addition has expanded the function
of a surveillance system to include observation of environmental
conditions in time and space. This addition is consistent with the I-95
Corridor Coalition goals derived from its stated mission."

The surveillance objectives and functional requirements of the I-95 system
were listed as follows:

OBJECTIVES

Enhance traffic incident management

1. Provide data for automated traffic incident detection
2. Provide information for coordinated incident responses
3. Verify traffic incident reports
4. Detect disabled vehicles and assistance requests
5. Assess the severity of traffic incidents
6. Provide continuous tracking of HAZMAT carriers

Enhance real-time traffic control operations

1. Support real-time, traffic adaptive control
2. Enhance HOV control & operations (HOV - High Occupancy Vehicle)
3. Accommodate priority vehicles
4. Facilitate reversible-lane operations
5. Improve ramp metering
6. Support congestion pricing
7. Accommodate variable speed limit determination

Enhance traffic management during snow storms and other emergencies

1. Support adaptive control
2. Support snow removal scheduling & operations

Improve multi-modal and inter-modal transportation operations

1. Provide traveler security surveillance at transit stops and stations
2. Provide link travel times for transit time of arrival estimates
3. Track transit vehicle location and schedule adherence
4. Provide park-and-ride lot status
5. Provide transit vehicle tracks as probe data
6. Provide passenger loading estimates

Support Traveler Information Services

1. Provide traffic conditions information (e.g., congestion, incident)
2. Provide roadway conditions information (e.g., closure, snow/ice)
3. Provide inter-urban transit information
4. Provide urban transit information
5. Provide parking information

Enhance the transportation systems planning database

1. Provide incident data (location, type, severity)
2. Provide traffic count data
3. Provide delay data
4. Provide VMT data
5. Provide traffic composition data
6. Provide vehicle O-D data

Facilitate Travel Demand Management (TDM)strategy implementation

1. Identify traffic congestion locations and levels
2. Characterize traffic demand levels (e.g., V/C vs. time of day)
3. Monitor air quality

Support traffic law and regulation enforcement

1. Provide weight measurements
2. Provide vehicle height and width measurements
3. Determine vehicle occupancy (for HOV)
4. Provide speed measurements

FUNCTIONAL REQUIREMENTS

1. Monitor Traffic Conditions
1.1 Acquire Traffic Data
1.2 Assess Traffic Performance
1.3 Detect Traffic Incident and Congestion
1.4 Confirm Traffic Incident and Congestion
1.5 Acquire Incident Assessment Data

2. Acquire Individual Vehicle Information
2.1 Determine Vehicle Speed and Direction
2.2 Determine Vehicle Weight and Dimension
2.3 Determine Vehicle Occupancy
2.4 Determine Vehicle Identification
2.5 Determine Vehicle Location
2.6 Determine Vehicle Emissions
2.7 Determine Vehicle Safety
2.8 Receive Vehicle-to-Infrastructure Communications

3. Monitor Environmental Conditions
3.1 Monitor Road Weather Conditions
3.2 Monitor Pavement Temperature
3.3 Formulate Snow/Ice Prediction Data
3.4 Monitor Roadway Air Pollution
3.5 Identify High Pollution Areas
3.6 Formulate Air Quality Assessment Data

4. Monitor Road Hazards
4.1 Detect Debris on Road
4.2 Detect Pavement/Bridge Damage
4.3 Detect Animal Entering Roadway
4.4 Receive Road Hazard Reports
4.5 Identify Low Visibility Conditions
4.6 Detect Slippery Road Conditions
4.7 Detect Hazardous Cross Wind Conditions
4.8 Verify Road Hazard Detection
4.9 Generate Road Hazard Detection Report

5. Monitor Parking Facilities
5.1 Determine Parking Entries and Exits
5.2 Determine Parking Usage
5.3 Formulate Parking Charge Input

6. Monitor Transportation Law Violation
6.1 Determine Speed Violation
6.2 Determine Weight Violation
6.3 Determine Height and Width Violation
6.4 Determine HOV Occupancy Violation
6.5 Determine Designated Route Violation
6.6 Determine Vehicle Emissions Violation
6.7 Determine Unsafe Vehicle Status

7. Monitor Travel Security
7.1 Monitor Intermodal Transfer Points
7.2 Detect Transfer Point Security Events
7.3 Monitor Public Transit Vehicle
7.4 Detect Transit Vehicle Security Events
7.5 Monitor Parking Facility Security
7.6 Detect Parking Facility Security Events

8. Maintain Support Databases
8.1 Maintain Road Network Database
8.2 Maintain Route Database
8.3 Maintain Transfer Point Database
8.4 Maintain Parking Database
8.5 Maintain Surveillance Asset Database
8.6 Maintain Tracked Vehicle Database

To this end a wide variety of technologies were implemented in the final
system design For traffic surveillance there are Inductive Loop Detectors,
Magnetic Detectors and Magnetometers, Sensing Cables, Pressure Plates, and
Bending Plates, Infrared/Photoelectric Detectors, Acoustic Detectors,
Microwave Radar Detectors, Vehicle Probes [Automatic Vehicle
Identification (AVI)/Electronic Toll and Traffic Management (ETTM) and
Automated Vehicle Location (AVL)], Video Vehicle Detection Systems (VVDS),
Closed-Circuit Television (CCTV), and Aerial Surveillance. For vehicle
weight sensing there are Bending Plate Systems, Shallow Weigh Scales,
Deep-Pit Weigh Scales, Bridge Weighing Systems,
Capacitive Systems, Piezo-Electric Sensors, and Fiber-Optic
Sensors. Environmental conditions sensing is taken care of with Surface
Conditions Analyzers (SCAN) and Light Detection and Ranging
(LIDAR) systems.

"Because of the geographic characteristics of the Corridor, the conceptual
system design was developed for both urban roads and rural roads. In
either case, the conceptual system design emphasizes integration of
surveillance information from multiple sources and use of multiple
technology types (including both point detection and wide-area
surveillance).

The primary focus of the surveillance concept is to acquire data for
traffic incident management, TDM, intermodal transportation, traveler
advisory information, and transportation facility planning. To effectively
collect data for traffic incident detection and management, additional
point detection systems should be installed to fill in the existing
surveillance coverage gaps. Overhead or roadside-mounted radar detectors
are recommended for new installation though other emerging technologies,
such as ultrasonic and infrared, may also be used. The new sensor
installations should be integrated with existing inductive loop detectors
to provide automated incident detection capability at the local operations
center level.

Stand-alone incident detection systems, such as the emerging VVDS, should
be installed at locations with a high potential for traffic
accidents. Remote incident verification is performed primarily by
CCTVs. However, to enhance the ability to quickly verify incidents, the
use of a multisensor surveillance aircraft is incorporated. This aircraft
should be equipped with a long-range air-to-ground radar and infrared
sensors, and should have the capability to maintain an area-wide traffic
situational awareness while focusing on acquiring detailed data of an
incident. The aircraft should also have the capability to communicate with
multiple traffic operations centers and public safety vehicles on the
ground, as well as other aerial surveillance assets in the area.

Human surveillance continues to play a major role in incident
detection. The design concept includes an ability to receive cellular
telephone calls from motorists, and incident notifications from public
safety personnel (e.g., police and freeway service patrol vehicle
drivers), public transit system operators, and commercial fleet
operators. Incident notifications may also be generated by an automated or
semi-automated in-vehicle Mayday system interfacing with "Smart Call
Boxes" installed a long the Corridor's roadways.

A final source of surveillance information in this conceptual design is
vehicle probe data. These sources include vehicle tracking data acquired
by public fleet operators (e.g., transit, service patrol, and police
vehicles) and commercial fleet operators. Vehicle tracking data may also
be acquired through monitoring of cellular telephone signals,
interrogating of electronic toll tags, or reading of vehicle license
plates.

Tracking transit vehicles will provide probe data for surveillance and
supply information for intermodal coordination (transit-to-transit and
transit-to-automobile). This system design concept accounts for the
information exchange needed to enhance intermodal operations.

In addition to acquiring traffic surveillance data, the acquisition of
pavement conditions, weather, and environmental data is incorporated into
the design concept.

Because of the lack of and the high cost required to install an adequate
surveillance communication infrastructure in the rural areas, the focus of
this system design concept is to rely on human surveillance, aerial
surveillance, and in-vehicle Mayday notification capability for incident
detection. Also, satellite communications would be used to transport data
from sensors in remote areas to a nearby TMC for processing."

- "Conceptual System Design", Final Project Report, Project #3 (95-003)
Surveillance Requirements/Technology: Executive Summary
I-95 Corridor Coalition

There are a wide variety of systems and subsystems to learn about, and
many possibilities for the technological experimenter once this stuff hits
the surplus market. Some states such as Connecticut, have implemented
ITS-like systems long before the passage of the ISTEA. ITS is now eight
years old, and generations of technology have been supplanted since
them. On a more serious note, the potential of abuse of ITS by
institutional control addicts is too great to let it stay in the shadows
any longer. This is the first in a series of articles about Intelligent
Transportation Systems. In future articles there will be more detailed
information about the various systems and subsystems of ITS.

======================================================================
Thomas Icom, IIRG - <ticom@iirg.org>
International Information Retrieval Guild, "May Odin guide your way!"
<http://www.iirg.org/~ticom/> VMB: 877-570-5970 x570
======================================================================
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [3]: DXing with Citizen Band Radio
By: Black IC/IIRG <black_ic@iirg.org>

Communication is essential to everyone in someway shape or
form. Experimenting with different avenues of communication can add a
whole new dimension to ones life. The Citizens Band Radio Service (CB)is a
private, two-way, short-distance voice communications service for
personal or business activities. The CB Radio Service may also be used
for voice paging. This article will cover the long-distance voice
communication and your needs to get involved in this art. Keep in mind you
most likely will be breaking a few FCC regulations in doing so.
Enough said.

CB's became a common tool for drivers to have on hand for emergency
purposes and a means for those on the road for extended periods of time to
communicate with others to pass the time, gain information on road
conditions, law enforcement locations and other information pertinent to
their travels. FCC Regulations state Four (4) Watts of carrier
power is allowed for output on AM and Twelve (12) Watts of peak envelope
power is the maximum power output on SSB. CB Operators normally transmit
double Sideband AM on the first 23 channels. Channels above 23, Upper
Sideband or lower Sideband equipment may be used. The FCC regulates how far
you can communicate with your CB. 155.3 miles is the limit. You will be
well past that mileage point.

Presently the FCC has allocated the following frequencies for CB usage.

Channel Frequency Channel Frequency
1 26.965 21 27.215
2 26.975 22 27.225
3 26.985 23 27.255
4 27.005 24 27.235
5 27.015 25 27.245
6 27.025 26 27.265
7 27.035 27 27.275
8 27.055 28 27.285
9* 27.065 29 27.295
10 27.075 30 27.305
11 27.085 31 27.315
12 27.105 32 27.325
13 27.115 33 27.335
14 27.125 34 27.345
15 27.135 35 27.355
16 27.155 36 27.365
17 27.165 37 27.375
18 27.175 38 27.385
19 27.185 39 27.395
20 27.205 40 27.405

DXing

Think of radio waves as that of water. You throw a rock out into a pond and
the ripples that are created continue until subsidence. Very similar to radio
waves. You send out a signal, depending on the power behind that signal
(rf power) and frequency range its going to go far or a short distance. There
are other factors that we have no control of that will affect the signal.
The atmospheric conditions. Regular high frequency sky wave skip signals
blasted in from the ionosphere, cause short range channel chaos. During
periods of reduced ionosphere activity, the short-range capabilities of CB
can be realized. But when the skip is active, a CB radio transmitter with
only a few watts of output power can put strong signals into receivers
thousands of miles away. This is commonly referred to as DXing. I'll focus
on the things you can change to give you an edge in Dxing.

Because there are no licenses needed to operate in the CB range many
people, including your "average joe" purchase a CB and begin rampaging on
the channels. This can be amusing but for those who want to get out of
there area and talk to others in other states and in some cases countries
simple modifications to a CB or more importantly a HAM rig modifiable for
the CB range, a proper antennae build, and microphone can make all the
difference in the world. I'll use the Mirage RCI 2970 100 Watt 10 Meter
Mobile Unit to start with. I chose this model for several reasons.
Its cost effective. Easily modifiable for CB range. Easy to move from mobile
to base unit with an addition of a power supply.

A couple years ago the RCI was made by another contractor. They were not
made well nor did they come with any coherent warranty. Today they
do. The 2950 is the sister model and comes with a 25 Watt power
supply. Sure on any given day with horrendous atmospheric conditions
you'll get the same results from both. Make the added financial jump up
and get the "pregnant" one (100 Watt). The cost of the RCI 2970 is around
$420.00 dollars depending on where you go for. It'll pay off in the long
run with your enjoyment. The RCI 2970 requires 20 continuous amps to operate
properly. Since this is inherently a mobile unit make sure you have this
capability from your vehicle. Making the jump from mobile to base with this
model is quite easy, though you need to invest in a power unit that is
capable of 20 continuous amps. Making your own di-pole antennae 18 ft long
in the 10 meter range or just shy is more than enough for your needs in using
this beast. Granted this would not go well with your average vehicle.
Comtelco makes a couple low band unity gain antennas that cover the
26 - 31 MHz range. Both of which are in the $30.00 dollar range. Your best
bet is to talk to your seller about your needs and get everything dialed in
once you have it set up. Most places will take the return on an antennae
should it not meet your needs. Especially if you dropped some money at there
shop for the RCI 2970. You'll also want to pick up a power microphone for
the RCI. The stock one is sufficient temporarily. Upgrade on the
microphone. Trust me. Otherwise you'll run the risk of sounding like a
duck from time to time. <grin>.

Specifications on the RCI 2970 Prior to Modification

Frequency Range 28.0000-29.699 MHz
Input Voltage 13.8 VDC
Tuning Steps 100 Hz, 1 kHz, 10 kHz, 100 kHz, 1 MHz
RF Power Output 100W: USB/LSB
50W: CW
50W: AM/FM

Modifying the RCI 2970 Ham Mobile Rig

Coverage Expansion 26-32 MHz
Frequency Modification on new version
Mod for faster scan speed
How to wire the Microphone plug !
Heavy swinger mod (modulation)
Upgrading AM detector
Talk Back Modification
2950 Tune up/Mod

Coverage Expansion - 26 to 32 MHz !

The only difference between the old and new versions of the RCI2950 is
the new CPU board. They require slightly different modifications. The
new version only covers 26 MHz to 30Mhz

Old Version

The old version of this radio can be expanded from 26 MHz to 32 MHz.
Although the use of the 30 -32 MHz range may need realignment. First
find the PC board with the jumpers on (behind the front panel).Then
find 'J2',there is a jumper on pins P3 and P4.If this is jumper is
removed you will get coverage from 26 MHz to 29.7 MHz. If this jumper
is then place on P1 and P2 coverage will be from 26 MHz to 32
MHz(retuning may be needed to operate in 30-32 MHz range). The CPU now
needs to be reset by pressing the button located below 'J2'

New Version

As the CPU board has changed the modification is different. On the CPU
board there is only one jumper with two positions available. In one
position it covers 28 MHz to 30 MHz, In the other it covers 26 MHz to
30 MHz.

Frequency Modification on new Versions

Remove the bottom cover to gain access to the small PC board
immediately behind the front panel. There will be a set of jumpers
marked "J1" and "J2". Move the jumper from the top two pins to the
bottom two pins. Frequency coverage will now be expanded to
26mhz-29.7mhz.

Press the "MAN" button to switch between CB operation and normal
operation.

Press the "SHF" button while in CB mode to switch between CB channel
readout and frequency readout.

Press the "ENT" button while in CB mode for in stand channel 9.

*NOTE: The battery and the CPU reset have been eliminated in the newer
versions, the new system uses memory capacitors for memory backup

And...

IF YOU FILL BOTH PINS J1 AND J2 ON THE NEW VERSION OF THE RANGER 2950
YOU WILL GET 26.000-32.000 JUST LIKE THE OLD VERSION.THE SAME FOR THE
2970.

Mod for faster scan speed ...

First take the radio's top and bottom covers off then remove all the
dials off the front face plate then take out the screws that hold the
front face plate. Now you're looking at the LCD and button printed
circuit board, remove the LCD printed circuit board .Now you should
see the main processor board. Lay the radio so that the solder side of
the big main board is solder side down so that you can see the
components. Now look at the board that has the processor on it. If you
look at the back side of the board (processor board) where the battery
goes you should see a blue rectangular shaped resonator marked 2.00g
or 2.000 or 2000 kc that also would have a x1 or x2 etc number on the
board near it that is also listed in the service manual as a
resonator/crystal. If you change the value of this part (remove it and
replace it with a crystal ) with a value of 8mhz will make the
processor run faster in turn giving you faster up\down on your mic,
faster scan speed, faster memory scan, a shorter roger beep sounds
like or similar to 2510. My self when I experimented with my own radio
I ran into trouble when I used a crystal with a value of 14mhz

14mhz (works but locks up the radio from time to time)

12mhz (was pretty much the same but didn't lock it up as much)

10mhz (worked fine but I wanted to run with 8mhz just to make
sure)(the radio worked good in all mods all the time)

8mhz (would be what I would recommend not as fast as the others but is
a lot more stable for daily usage and is a lot faster than stock

CAUTION:::::::::::

BE SURE WHEN DOING THIS MOD YOU ARE CAREFUL NOT TO DAMAGE THE CIRCUIT
BOARD AS MOST OF IT IS SURFACE MOUNT THE TRACES DAMAGE VERY EASILY

THE RESONATER IS STANDERD SIZE OF A CRYSTALL REMOVE THE RESONATER AND
REPLACE IT WITH A CRYSTALL WITH WIRE LEADS NOT THE STANDARED PLUG IN
TYPE AS THEY WONT FIT

My method of desoldering the resonator was with a solder sucker with a
heated tip.

Where to get crystals? old pc/xt/at motherboards from computers

To assemble radio just do the reverse of the disassembly

How to wire the Microphone plug !

You should take care when you try and modify the wirings of
microphones because of the presence of +12 volts on one pin of the
plug. This particular feature may damage mikes. This is also a nice
information for those who would like to modify their pre-amplified
mikes so as to get a rid of the 9 volts battery ( A small mod with a
Zener diode should make the 12 volts voltage fall down do 9 volts.
It'll be perfect to feed the mike pre-amplification circuits).

Heavy swinger mod (modulation)

Locate Q51 which is a 2SB754. This part should be subbed out with a
2SB688 but doesn't have to be. The 2SB688 is a heavier duty and higher
wattage transistor. To do this mod, you will need a 1N914 diode and a
50 ohms resistor. Hook up as drawing shows. This will give you super
modulation at whatever power range you want.

Upgrading AM detection

Change D34 & D35 that are 1N60's by ECG553 or SK9975. This mod will
enhance the radio performance.

TALK BACK Modification

* 1. Cut D-78 . Wire a SPST switch in series with D-78 to make it
switch able.

2. Replace D-115 with a .0047uF disc cap.

Util Tricks

Older 2950's with batter backup will discharge the battery if the power
source is removed and the radio is left in the "ON" position. This
causes corruption in the memory circuits and in the microprocessor.
This can cause the failure to turn on....lights on... and nothing
else.

2950 Tune up/Mod

To increase heat dissipation and durability and a decrease of transmit
voltage drop change Q-51 to an ECG37 or equiv.

To prevent overheating and increase audio Quality & low PWR swing
change Q53 to a 2SA473

To improve low power swing on AM locate R178 and change to a 3k
ohm. The resistor you just removed save for the next step.(4.7k)

Locate R194 (10k ohm) replace with the 4.7k resistor from previous
step.

Locate R281 (4.7k ohm) replace with the 10k resistor from the previous
step.

For increased output on SSB and AM locate C270 and parallel with a
470pF-1kv ceramic disc capacitor.

Replace all plastic insulators with mica insulators on all
transistors. Use a liberal amount of heat sink compound.

For improved modulation remove Q32, which is the modulation limiter.

The modifications were reprinted from other sources. Most of which are
available on the net. Aside from any spelling correction on my part I hold
no credit for the process of this mod.

Once you get up and running don't be surprised when you start getting cross
talk from all over the country. On any given day you might get communication
from 1000 to 2000 miles away. Play around with your rig. Call for a
"radio check". See what you get back. This article is certainly not an end
all to Dxing with CB's. It's only a start with a hobby that can be enjoyable
and informative. All that aside. If anyone wants to talk shop you can
meet me on Channel 22.

----------------------------------------------------------------------------
Black IC/IIRG ////// ////// /////// ////////
System Administrator // // // // //
black_ic@iirg.org // // /////// // ////
PGP Key Upon Request // // // // // //
www.iirg.org/~black_ic/ ////// ////// // // /////////
49.8100 Mhz The International Information Retrieval Guild
---------------------------------------------------------------------------
Traditional Shouts and Greetings to:

The IIRG "It's been a long ride from Bangladesh to New Delhi"
Jim "Don't blow up the moon... KABOOM!"
Bull Dog "Kaphar Hunne Bhanda Marnu Ramro!"
Sheila Na Gig "Bad Sheil! Prison!"
mips4.com "I want the web page back"

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [4]: Playstation 2 Modification and Muses Part 1
By: Black IC/IIRG <black_ic@iirg.org>

The Playstation 2 has had a tumultuous release. Temporary export arms
restrictions due to the system being looked at a weapons guidance system,
bad firmware that resulted in saved games deleting vital data, games that
have had mixed reviews, and copyright issue due to the system being able to
read Region 1 and 2 DVD's. Its a wonder that its selling at all. For those
that remember the release of the first Playstation, things weren't much
better. It took some time to catch on and when it did. See ya! I think the
Playstation 2 will be quite successful. When Microsoft announced their new
entry to the console family, Sony announced they would include an 8 GB
(Gigabyte) Hard Drive and 56 K modem in their PS2 (Playstation 2).
Competition is good. Seems in July Sony will be releasing a USB-Based
Mouse and applicable CD-ROM in Japan. This will add to some graphical
applications on the system allowing users to create and store there graphics
on the PS2. Worse case scenario it might serve as a device to surf the
internet. Discussion of implementing Digital Camera software could be a
possibility.

The upcoming game Final Fantasy X takes advantage of the 5.1-channel surround
sound standard. Square Sound the division behind the various sound effects
that we will be hearing in this title as sound format during the Full-Motion
Video (FMV) sequences. You may have heard of this sound standard used in
various cinematic movies along with many DVD's, in conjunction with a Dolby or
DTS (Digital Theater System) based sound system. Such a feature will certainly
increase the sound quality during the FMV sequences, while dramatically making
the experience during these sequences seem much more realistic. When the user
actually enters into gameplay mode, the game will revert back to two-channel
stereo sound. The reasoning behind this relates to the actual hardware within
the PS2. Because this game involves real-time gameplay, the central processing
unit (CPU) of the PS2 isn't powerful enough to perform the sounds in real-time,
as the sounds will change quite frequently and rapidly as you enter and move
through a level. Square Sound hasn't given up yet, as they are now seeking new
ways and methods of attempting to incorporate this feature in some form or
fashion into the actual gameplay. Of course, you will not be able to
experience this brilliant quality without the proper equipment. In order for
an individual to experience 5.1-channel surround sound, he/she must have
either a Dolby Digital or DTS based receiver, along with a Digital Optical
Cable which would connect this component to the console. Along with this, two
front channel speakers, two rear channel speakers, a single channel speaker,
along with a subwoofer would be required. I can see it now. No life by Sony.


-=- "What can I tweak to make it better or different?" -=-

Their will be a lot of things that can be done. People that are involved in
piracy are looking at the DVD aspects. Well right now DVD Recorders and Media
are not cost effective for your average person. So I dont think we will see a
string of so-called "backups" for quite some time. I dont thing the issue
will be can people modify the system to bypass copyright code or region
encoding. The issue will be can the laser read a "backup" at all. Sony
developed their new one laser precision CD-ROM designed to be cost effective,
efficient, and able to finely read the peaks and valleys of a stamped CD makes.
So for those pirates out there... Pick up another PSX. The DVD players on the
market today for DVD/VCD playing that can read a "backup" have whats called
dual-filtering. Two lasers. Those are going to be history. Sony stopped
making them. Their Enterprise model used to have dual-filtering. No longer.
Pioneer still has an entry level DVD Player on the market, the DV-414, that
can read "backups". But its cheaper to make them with one. Thats all you
need to read a stamped DVD. Sony does state that the new system is backwards
compatible, it will play PSX games. But for those of you that are legit
owners of an import... Pick up another PSX. But as of late there has been
many updates on PSX Mod pages about soon to be released PS2 Mod Chips. Their
is also discussion circulating about a swap method on the PS2 that entails a
lot of time consuming tedious work. There is some discrepancy as to the
requirements of patching a backup prior to using this swap method or not.
What I do suggest and recommend is for those of you that have a legal import
(meaning a country code different than that of the current PS2 you have) is to
try the swap method and ignore the patch related issues. It is my
understanding that the patch is for "back up" copies only and assist in
defeating the copyright protection. Seeing the PS2 is backwards compatible
the issue is country code and not copyright protection unless your dealing in
"back ups". Seeing that there are several way of swapping the system I will
print two. Both are just as viable and denote no need to patch a game unless
your using a "back up".


-=- PS2 Swap Methods -=-

Just a heads up, the IIRG does not endorse or support either one of these
methods. They have been printed here for educational purposes and to show
that the PS2 is capable of being kit bashed. Personally I would wait until a
definitve MOD Chip comes out before you start playing with it. Unless of
course your like us and feel comfortable taking apart things for a greater
enjoyment. In which case we are not responsible for any damage that you might
cause turning your PS2 into a book end.

SWAP METHOD One

STEP 1: Open the casing of PS2, take out the DVD drive

STEP 2: Take out the disc shape CD spindle lock from the DVD drive, put the
DVD drive back to the PS2.

STEP 3: First insert an original PS2 game disc into the DVD drive to let the
system knows a disc is in the drive. Make sure you put the CD spindle
lock on top of the disc to notify the machine that the DVD drive
is closed.

STEP 4: Swap in your import PS game, the PS2 will be changing into Playstation
mode, the Playstation logo will show up on screen.

STEP 5: After the PS logo appears, the disc spinning speed will slow down,
immediately swap in an original Playstation game to let the
machine to read the protected track.

STEP 6: After the screen turns black, immediately swap back the import disc in
the drive, make sure you put back the CD spindle lock on top of
the disc (must do this quickly).

SWAP METHOD Two

1) Place your Playstation 2 upside down and remove the marked screws. Then
remove the cover carefully seeing there are two connectors involved.

2) Remove the black disc (there is just a bit of glue). Under the black disc
you'll see a white disc, later you have to extract the white disc from
the dock. Now just extract the Eject and Reset button from the dock.
Now remove the 4 screws (1-4). Then remove the CD Reader cover and
extract the white disc. The white magnetic disc is used for locking the
CD in place.

3) Now you should see the CD Reader. Connect all the cables (power, joypad,
video) to the PS2. Make sure the PS2 is turned off before you connect
the cables. Now turn on the main power switch (on the rear). Place the
original PS2 Utility Disc CD into the CD Reader and then place the
white disc on top to lock the CD. Now press the Reset button. The CD
Reader will start at 1x speed then after a second it will go to 4x
speed.

4) Remove the white disc and remove the original disc. Insert the PS2 Game CD
and place the white disc back on top.

You must do these operations before the Playstaton 2 logo appears on the
screen. Your import should be running if done correctly.

Otherwise TURN-OFF the PS2 by pressing for 3-4 seconds the Reset Button and
try again.

DO NOT try to repeat the operation just using the simple reset.

You must Turn-Off the PS2 by pressing for 3-4 seconds the Reset button.

If you are unable to swap using the speed method try using a timed method.

Follow steps 1 - 3 and when you press the Reset button to turn on the PS2.

Wait 10 seconds.

Then swap using the same process as listed. You will have about 5 seconds to
complete this.

WARNING - WARNING - WARNING - WARNING -WARNING - WARNING - WARNING
OPENING YOUR PLAYSTATION FOR MODIFICATION CAN BE DANGEROUS AND ADDICTIVE

-=- End Results -=-

So with all this potential locked up inside the PS2. How do you unleash it?
First and most important issue is getting the system to read your CD if thats
what your into. Let start with reading the backup CD. As was mentioned above
there is some discussion about so-called patches that when you patch the ISO
prior to "burning" it will defeat the copyright protection. Some say that
this is necessary for the country code too. Fact is unless you try it, you
really wont know. I have included a couple sites for info on these subjects
for your perusal. The one that had patches, those patches were not available
so I can't comment on the code. As for other potential hacks, the so-called
USB port will be the answer assuming you cant hardware hack the laser. It
will mean having the PS2 read the data from an external CD-ROM. They are
already talking about bringing it out in July with the mouse. This will give
you a better cost effective hack and flexibility on your choice of hack. As
for any of the country codes and copyright protection thats another story.
With the original PSX it was simply blocking the interupt that requested that
data at boot up. Then when games started coming with protection that looked
for that signal, it came down to modifying the chip to turn off and allow the
signal to pass after so many seconds. The new PS2 will have something of this
caliber in its arsenal. The fact that it will be backwards compatible is
going to be the weakness in its defense. As far as all the information listed
in this article. Its all readily available on the internet. Trust me when
something of significance appears regarding modification of the PS2 you will
ALL know about it.

With the sound capabilities this system has, processing power, storage and
peripherals the PS2 has a wealth of hardware hacking potentials and uses
outside the console gaming field. It's just a matter of time.


-=- Some Interesting Links -=-

http://www.the-magicbox.com/

http://bad.paradogs.com/index2.html

http://www.ps2web.com/

http://www.techtrix.co.uk/

http://www.ps2insider.com/

http://www.diversion-network.com/network/ps2nation


-=- Playstation 2 Specifications -=-

CPU 128 Bit "Emotion Engine"

System Clock Frequency 300 MHz

Cache Memory Instruction: 16KB, Data: 8KB + 16KB (ScrP)

Main Memory Direct Rambus (Direct RDRAM)

Memory Size 32MB

Memory Bus Bandwidth 3.2GB per Second

Co-processor FPU (Floating Point Unit) Floating Point Multiply Accumulator x 1,
Floating Point Divider x 1

Vector Units VU0 and VU1 Floating Point Multiply Accumulator x 9, Floating
Point Divider x 3

Floating Point Performance 6.2 GFLOPS

3D CG Geometric Transformation 66 Million Polygons per second

Compressed Image Decoder MPEG2

Graphics "Graphics Synthesizer"

Clock Frequency 150MHz

DRAM Bus bandwidth 48GB per Second

DRAM Bus width 2560bits

Pixel Configuration RGB:Alpha:Z Buffer (24:8:32)

Maximum Polygon Rate 75 Million Polygons per Second

Sound "SPU2+CPU"

Number of Voices ADPCM: 48ch on SPU2 plus definable, software programmable
voices

Sampling Frequency 44.1 KHz or 48 KHz (selectable)

IOP I/O Processor

CPU Core PlayStation (current) CPU

Clock Frequency 33.8MHz or 37.5MHz (Selectable)

Sub Bus 32 Bit

Interface Types IEEE1394, Universal Serial Bus (USB)

Communication via PC-Card (PCMCIA)

Disc Device CD-ROM and DVD-ROM


-=- Contact -=-

Black IC/IIRG
black_ic@iirg.org


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [5]: Hacking Computer Shows for Phun and Profit (Part 1)
By: Mercenary <iirg@iirg.org>

Why the hell would I want to hack a computer show? Well for me the answer is easy, SAVING MONEY! I have always operated under the assumption that if I can
get something for free, I'll do so as long as I am not targeting a mom and pop operation. Corporations have been raping the individual in this country for far too long, and it's time the underdog got a little back. Now please be aware, the methods I will be discussing here are illegal. Should you get caught you will be more than likely ejected from the computer show and in a worst case scenario you will be arrested. But hey, what's life without a little risk?
For myself, hacking computer shows started when I got tired of being raped by a senile local promoter. This individual believes that in a past life he invented photography and is so greedy that he is known to stand at the door with a hand clicker counting the amount of money per individual just in case his underpaid tellers might per chance pocket $5.00.
Entry to the computer show should be your first priority. In my experience I have done this in numerous ways. If it's just a local computer show, you should already know how the promoter operates. In earlier days, my local promoter just used to use "Hello My name is Badges" for vendors. This was extremely easy, we just went down to Staples and purchased a package of every color "hello" badge and then would go to the show and see which color was being used that day.
We would then just walk in with the other vendors and get dealer pricing for an hour before the show would open. We would be done shopping and be back home before the show even officially started.
This worked for several years until the local vendor started producing his own
Badges for vendors. These were also easily duplicated. In our case the vendor uses a stupid graphic of himself on a computer screen. By checking his website we were able to copy the graphic and produce our own vendor badges. We still use this method to this day.
Now having 8 or 9 people walk in as vendors is not a viable option. Thus, we needed another option for gaining "mass" entry for large numbers of people.
When attending one of our local shows, you were allowed to pre-pay and stand in line about 1 hour before the show. When pre-paying, your hand would be stamped and you'd then go to the back of the line. Except for smokers, these individuals would pay and instantly disappear outside to light up a butt.
We thus made our own "hand stamp", then whenever attending a show I would go over to a smoker, ask for a light and see which color ink they we're using.
I would then hand stamp the entire group and we would casually stroll inside to the line. If ever questioned, we would simply reply "I was having a smoke".
Now attending corporate shows like Comdex require much more sneakiness and deception. If there is a large show I see and would like to attend, I will e-mail or snail mail the promoters of the show as a "legitimate" computer users group. I have used many excuses to get free tickets or passes.

1. Several of our members would like to attend to review the show in our
newsletter.
2. If it's a multi-day show, I will ask for the passes for our "club" president
and vice-president to attend to see if the show is worth it to our members.
3. Several of our members would like to attend this year so we can scout out having a booth next year.

Use your imagination, there are numerous excuses.

One of the other more advanced techniques is to create your own fake press credentials. There are numerous templates available on the Internet for download. Just remember not to use a press organization you might actually run into at the show. Using the above methods I have been mailed as many as twenty free passes for our "members". We have even been asked to attend private cocktail parties and product demonstrations. You'll be amazed what a little social engineering will get you. If you need any personal suggestions or have a situation unlike any of the above, e-mail me at iirg@iirg.org and I'll see if I can come up with an answer for you.
In part two, I will give you suggestions on things you can do and what to watch for once your in the show.

Have Phun!

Mercenary/IIRG


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [6]: An introduction to Palm Pilot Programming
By: Phurk/IIRG <phurk@iirg.org>

I hope this serves all the people looking for information on creating the latest and greatest application on this powerful operating system.

I own a palm pilot of the first generation Palm III. I am currently running Palm OS version 3.3 with 2 Megs of Flash Ram.
The palm pilot uses a stylus as the main input tool for user interactivity. It comes with a cradle to hook to a standard serial port, but with an upgraded OS such as 3.3 you are now able to use the Irda port on your computer to update the palm pilot without that annoying cradle.
The palm pilot is a versatile format for all your portable information needs. There are numerous programs available making it a great productivity tool. It comes preinstalled with default applications on it such as the MemoPad, the Address book, A small expense utility and a bunch of other stuff that will make you a better person. But that's probably not the reason you bought the Palm Pilot. You saw it's potential as an effective hacking tool in your arsenal.

It's portable, covert design, slick operating system and a well-established development platform has tremendous potential. Unfortunately the potential has not yet been realized. There are a few programs available for the Palm OS that can make it a more enjoyable tool.

Brought to you by the L0pht, the TBL Wardialer. Standard war dialer except for the Palm. Pretty cool for a group of sell-outs.

Check it out at http://www.l0pht.com/~kingpin/pilot.html

Also another Gem for the palm pilot is PalmCrack. Although not as powerful as on a PC or Server Box, the potential for cracking *nix passwords is there. This was put out for more of "yes it can be done" philosophy.

Info at: http://www.noncon.org/noncon/product_info.html

Imagine lying on the beach with a wireless IR modem cracking your latest encrypted password list. So you might be lying there till you're crispy, but it can be done.

Also for you programmers on the go, we have LispMe a pilot program which lets you use the high level language to work out ideas and algorithms sitting in a train, plane or any place you feel like whipping out your pilot.
Being the perfect candidate for covert operations, no bulky laptops, easily hidden, and a strong development environment.
Do you need more of a reason to buy one if you haven't already?

In order to focus our efforts on creating more wonderful tools for the community at large we need to know some things.
Most Pilot programs are written in C. all of the built in programs were written with the Macintosh version of CodeWarrior.
If you are so inclined you can go to http://www.palmos.com/dev/started/
to get the source for your existing palm Os programs. Programming in C or Assembly is the most flexible and powerful method for programming the Pilot, so learn C.

There are a number of compilers out there, ranging from expensive commercial ones to free compilers. I recommend a dose of VI and GNU C compiler on nicely secured Linux Box.

You can get information from 3Com's PalmOS developers forum at www.palmos.com/dev/
Also technical information about the palm Os different libraries and API's is available at
http://developer.earthweb.com/directories/palm/knowledgebase/tm_index.html
For those of you who would like to get into palm pilot programming but do not have one, have no fear! , there are numerous Emulators, my favorite being the XCoPilot for Linux,
The emulator is freely available for Unix, Windows, and all of you Mac people.
After you download the emulator make sure to get some ROMS.

You can pick up more info at my homepage at www.iirg.org/~phurk/
There I will post my progress and projects that the IIRG is currently working on with the Palm OS.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [7]: IIRG Signal Intelligence (SIGINT) Guidelines
By: Black IC <black_ic@iirg.org>

- BEGIN PROJECT -


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

////// ////// /////// ////////
// // // // //
// // /////// // ////
// // // // // //
////// * ////// * // // * /////////

The International Information Retrieval Guild

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

The International Information Retrieval Guild

Signal Intelligence (SIGINT) Guidelines

Rev. 1-2000-2-A

Part A: Summary

The purpose of this project is to confirm publicly available frequency
lists and update frequency listing and usage on undisclosed frequencies.

Part B: Requirements

1. Scanner with or as close to the following ranges:

27 - 54.000 MHz
108 - 136.975 MHz
137 - 174.000 MHz
406 - 512.000 MHz
806 - 823.937 MHz
851 - 868.937 MHz
896 - 956.000 MHz

2. Good antennae with good reception.
3. Working knowledge of "your" scanner.
4. Commitment and patience in terms of monitoring.
5. Commitment and initiative in terms of documenting.
6. We need to know your general area of living. (i.e. North East,
Mid-West). Though some frequencies are national some are localized and
this will allow us to cater to your area. Also knowing your scanners
make and model will help in giving you frequency lists that you can
work with.

Part C: Procedures

You will receive a list of frequencies in order of priority that you will
monitor. These frequencies will have a duration period on how long you
will monitor and possibly what times. When you are done monitoring you
will move to the next frequency. Upon completion of your list please
submit your findings to black_ic@iirg.org

Please find enclose your documentation procedures and frequency list
catered to your capabilities. Due to FCC regulations we are not
interested in the content of the traffic other than the parties involved
and at what times they were involved. Though FCC frequency allocations
are public the parties they are reserved for change there usage and
sometimes use undisclosed frequencies that are not listed in the public
sector.

1. Tune in to initial frequency on list.
2. Adjust reception and squelch as needed.
3. Listen to said frequency for instructed time at instructed time.
4. Document any traffic using the follow notations:

A. Time (Military Time (GMT, EST, etc)
B. Parties Involved (FBI, Media, PD, Pager)
C. Code & Signals
D. Duration of Transmission

Part D: Personal SIGINT Frequencies:

<Will be e-mailed>

The IIRG'00
May Odin Guide Your Way...


- END PROJECT -

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [8]: The Rumor Mill

-----------------------------------------------------------------------------
-----------------------------------------------------------------------
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE

]]]]]]]]]]]]]]]]]] ]]] ]] ] ]] DEF CON 8 Initial Announcement
]]]]]]]^^^^]]]]]]]]]]]]] ]] ] ] DEF CON 8 Initial Announcement
]]]]]]^^^^^^]]]]] ] ] ] DEF CON 8 Initial Announcement
]]]]]^^^^^^^^]]]]] ]] ] DEF CON 8 Initial Announcement
]]]]^^^^^^^^^^]]] ] ]]]]]]]] ] DEF CON 8 Initial Announcement
]]]^^^^^^^^^^^^]]]]]]]]]] ] DEF CON 8 Initial Announcement
]]^^^^^^^^^^^^^^]]]]]] ]] ] DEF CON 8 Initial Announcement
]]]^^^^^^^^^^^^]]]]]]]] DEF CON 8 Initial Announcement
]]]]^^^^^^^^^^]]]]]]]] ] ]] DEF CON 8 Initial Announcement
]]]]]^^^^^^^^]]]]]]] ]]] ]] ] DEF CON 8 Initial Announcement
]]]]]]^^^^^^]]]]]]] ] ] ] DEF CON 8 Initial Announcement
]]]]]]]^^^^]]]]]]]]]]] ]] ] ] DEF CON 8 Initial Announcement
]]]]]]]]]]]]]]]]]]]]]]]]]]]]]] ] DEF CON 8 Initial Announcement

READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE

WTF is this? This is the initial announcement and invitation to DEF CON 00,
a convention for the "underground" elements of the computer culture. We try
to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
Virii coders, programmers, crackers, Cyberpunk Wannabes, Civil Liberties
Groups, CypherPunks, Futurists, etc..

WHO: You know who you are, you shady characters.
WHAT: A convention for you to meet, party, and listen to some speeches that
you would normally never hear.
WHEN: July 28th - 30th, 2000
WHERE: Las Vegas, Nevada @ Alexis Park Resort

What is DEF CON?

DEF CON is an annual computer underground party for hackers held in Las Vegas,
Nevada, every summer for the past six years. Over those years it has grown in
size, and attracted people from all over the planet. Well, no one from
North Korea has shown up (that we know of) but if they did I'm sure we would
convince them to tell us elite government secrets. That's what it is all
about. Meeting other spies, er, people and learning something new.

We are not trying to teach you to learn how to hack in a weekend, but what we
are trying to do is create an environment where you can hang out with people
from all different backgrounds. All of them interested in the same thing,
computer security. To do this we have taken over the complete hotel at the
Alexis Park Resort. Does all of this seem interesting? Then it can be yours
for the low, low price of only $50 at the door.

If you want a greater idea of what it is all about, and what other people
have had to say about the convention please visit the previous year's
archives sections and read what the media and attendees have had to say.

There has been an awful lot of press written about DEF CON over the years.
Some of it good, most of it too fixated on the attendees green hair.
If you want to see what people have written, check out the previous years
archives for the links.

Current Speakers
----------------

There is currently a call for speakers.
Please email DTangent if you want to exhibit, or sponsor DEF CON 8
------------------------------------------------------------------
Gregory B. White, Ph.D.
The USAFA Cadet Hacking Case:
What both sides should learn about computer forensics

Basically I'll discuss the case that went to trial in the spring of 
99. I was the Deputy Head of the Computer Science Department at the
USAF Academy at the time and was asked by the cadet accused of "hacking"
to help with his defense. I testified at the trial as an expert witness
for the Defense. I sat at the Defense table throughout the trial serving
as their "computer expert". Basically the trial was a comedy of errors
by the prosecution. law enforcement, and the cadet's attorneys alike.
The cadet was involved in IRC but the law enforcement types and prosecution
became convinced that he was the "hacker" (afterall, everybody KNOWS
that IRC is nothing more than a place for hackers to trade information
on how to break into computers -- the actual sentiment expressed by
the investigators). I had up to that point spent the majority of my
time in the Air Force trying to protect systems and to catch those who
broke into AF systems. This case really shook me as I saw the LE types
latch onto the smallest of indicators and blow them into a full blown
felony case (the cadet faced 15 years in Leavenworth had he been convicted
of all counts). What I will cover in the talk is:

1) Background of the case 2) The "evidence" the prosecution thought
they had 3) The many possible areas where clues might have been found
had either side known where to look (or asked anybody who knew anything
about it) 4) What lessons can be learned from this case. Those from
the government and industry need to know where to look if they want
to catch folks (and if they want to make sure they don't make fools
of themselves) and those who might find themselves accused someday need
to know how to help their attorneys find clues that could exonerate
them.

Gregory B. White, Ph.D. - Vice President, Professional Services. Gregory
White joined SecureLogix in March 1999 as the Chief Technology Officer.
Before joining SecureLogix, he was the Deputy Head of the Computer
Science Department and an Associate Professor of Computer Science at
the United States Air Force Academy in Colorado Springs, Colorado.
While at the Academy, Dr. White was instrumental in the development
of two courses on computer security and information warfare and in ensuring
that security was taught throughout the computer science curriculum.
During his two tours at the Academy, he authored a number of papers
on security and information warfare and is a co-author for two textbooks
on computer security.

Between his Air Force Academy assignments, Dr. White spent three years
at Texas A&M University working on his Ph.D. in computer science. His
dissertation topic was in the area of host- and network-based intrusion
detection. Prior to his Academy assignments, Dr. White was a student
at the Air Force's Advanced Communications-Computer Systems Staff Officer
Course in Biloxi, Mississippi. He was awarded both the AFCEA and Webb
awards for student leadership and academic excellence and was a Distinguished
Graduate of the course. Before attending the course in Biloxi, Dr.
White served as the Branch Chief of the Network Security Branch at the
Cryptologic Support Center in San Antonio, Texas. His first assignment
in the Air Force was as a systems analyst at the Strategic Air Command
Headquarters in Omaha, Nebraska. Dr. White obtained his Ph.D. in Computer
Science from Texas A&M University in 1995. He received his Masters
in Computer Engineering from the Air Force Institute of Technology in
1986 and his Bachelors in Computer Science from Brigham Young University
in 1980. He separated from the Air Force in 1999 and is currently serving
in the Air Force Reserves at the Defense Information Systems Agency.

Ron Moritz, Chief Technology Officer Finjan Software, Inc.
Proactive Defense Against Malicious Code

Anti-virus software is an important part of a well-devised security
policy, but reactive virus detection is not versatile enough for the
demands that will be made on businesses engaged in e-commerce. The year
1999 began with the birth of the Happy 99 virus - a harbinger of things
to come. Happy 99, plus Melissa, PrettyPark and the Explore.zip worm
are all examples of third generation of malicious replicating code,
designed to exploit the Internet for their rapid proliferation. A variant
of Explore.zip, called MiniZip, managed to hide itself from antiviral
utilities and spread at an amazing rate around the Internet at the end
of 1999. Such programs, which launch new malicious code attacks, create
"first strikes" against systems and networks. Allowing untrusted code
to execute on the corporate network may not be suitable for your organization.
But corporate security policies that block network executables adversely
affect the evolution of the Internet, extranet, and intranet. While
no security implementation is absolute, functionality is not achieved
by disconnecting users from the network and preventing access to programs.
Therefore, proactive defense against first-strike attacks is required
today.

Almost all web sites today contain mobile code. Many of the powerful
business (ecommerce) applications you need and use are written with
mobile code. Consequently, net-enabled malicious software is likely
to increase in prevalence and successful utilization. The factors accounting
for such a prediction are the ease by which users are duped into double-clicking on malicious e-mail attachments and, the ease by which the sources
on malicious e-mail attachments and, the ease by which the sources
of those e-mails are automatically spoofed to seem to come from a boss
or from an e-mail or instant message friend. Traditional pattern matching
approaches are incomplete, out-of-date, and ineffective and were never
designed in preventing a series of new generation attacks based on malicious
mobile code and Trojan executables.

Ron Moritz is the Chief Technology Officer at Finjan Software where
he serves as primary technology visionary. As a key member of the senior
management team interfacing between sales, marketing, product management,
and product development, Ron helps establish and maintain the company's
technological standards and preserve the company's leadership role as
a developer of advanced Internet security solutions. Ron was instrumental
in the organization of Finjan's Java Security Alliance and established
and chairs Finjan's Technical Advisory Board. He is currently chairing
the Common Content Inspection API industry standards initiative. Ron
is one of a select group of Certified Information Systems Security Professionals. He earned his M.S.E., M.B.A., and B.A. from Case Western Reserve University
. He earned his M.S.E., M.B.A., and B.A. from Case Western Reserve University
in Cleveland, Ohio.

WHERE THIS THING IS:
--------------------

It's in Las Vegas, the town that never sleeps. Really. There are no clocks
anywhere in an attempt to lull you into believing the day never ends. Talk
about virtual reality, this place fits the bill with no clunky hardware. If
you have a buzz you may never know the difference. It will be at the Sahara
Hotel. Intel as follows:

Hotel Location

The Convention will be held at the Alexis Park Hotel and Resort
We are taking over the complete hotel!

The Alexis Park Hotel and Resort is across the street from the Hard
Rock Hotel, and is a block off the main strip. Located at 375 E Harmon
Ave in Las Vegas, NV 89109. The Alexis Park is a non gambling hotel,
so people 18 years and older can get a room there. This is the first
time that has ever happened for us! If there are any problems with
this please email me!

HOTEL COSTS: Room rates are 85$ for a two bed suite, but you can get
up to four people in one.

RESERVATIONS: On-line or by phone: 800-453-8000

We have the whole hotel space, so unless you reference the DEF CON show
the Alexis Park will tell you they are sold out.

We have all the rooms at the Alexis Park, and a bunch next door at the
San Tropez. We are working on a block of rooms at the Hard Rock Hotel.
At last count about 20% of the rooms at the Alexis Park were already
booked. Sign up early if you want to stay at the main hotel!

We start Friday, but many people get in Thursday night and hang out
before the fun begins. We get our convention room rate from Wednesday
night through Monday night for those wanting to stay longer to check
out the attractions.


Cheap Airfare Information

We've got great discounts on airfare from Montrose Travel, who book
bulk air travel for cheap. If you need to still book tickets give these
guys a call first and compare.

Montrose Travel 1-800-301-9673
http://www.montrosetravel.com
or email Montrose Travel with questions.

They currently have deals for DEF CON attendees from the US and International
on the following airlines:


America West Southwest Delta
American Southwest Airlines United Airlines
and other smaller carriers and even International Airfare rates.

Expect rates lower than published. When calling make sure you refer
to DEF CON as the group name.


COST:

Cost is whatever you pay for a hotel room split however many ways, plus
$50.00 at the door. There are fast food places all over, and there is
alcohol all over the place, the trick is to get it during a happy hour
for maximum cheapness.
-----------------------------------------------------------------------------
Hope 2000 is Coming.

http://www.h2k.net

July 14th to July 16th, 2000.
New York City
-----------------------------------------------------------------------------

Postcards From The Edge BBS

Formerly a Renegade DOS Based Dial-Up BBS is now and has been available
via telnet at luna.iirg.org

PFTE carries an eclectic topic structure surrounding SIGINT, Telephony, RF
Hacking, UNIX, Kit Bashing, and others. No restrictions on
applying. Just login and be apart of an on going history surrounding this
board.

The present life of this board is running Citadel. You can access this
system via telnet or the web.

www.iirg.org/pfte.html

luna.iirg.org

Login: bbs
Password: <enter>

Any questions: black_ic@iirg.org

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [9]: Letters to the IIRG
(Fan Mail, Hate Mail, Letter Bombs)
<iirg@iirg.org>

I receive so many letters and requests that it would be impossible to
post all letters received. However, every now and than I get one that
makes me laugh or vomit uncontrollably. I offer these to you.....

------------------------------------------------------------------------------
1. Help!!!

From: MikeG24411@aol.com
Delivered-To: iirg@iirg.org
Date: Mon, 3 Apr 2000 18:19:13 EDT
Subject: Help!!!
To: iirg@iirg.org
X-Mailer: AOL 5.0 for Windows sub 70

I need an access to the NCIC to get a background check on someone....
A 2 year old little girl may be in jeapordy...
Can you help???

Considering the fact that your attempting to contact a hacker organization and not a branch of law-enforcement, I'm sorry but I'll have to doubt your sincerity. I think you've watched the movie "Hackers" one to many times.
Try contacting the "Plague", maybe he can help you out. Oh, that's right...
He's a fucking actor. So stop acting like a jackass yourself and if you're truly
Concerned about this so-called "2 year old little girl", contact the proper authorities.

-------------------------------------------------------------------------------
2. need that midi

Delivered-To: iirg@iirg.org
From: "deified" <deified@email.msn.com>
To: <iirg@iirg.org>
Subject: need that midi
Date: Fri, 21 Apr 2000 21:00:57 -0700
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300

i should have done this anominus but hey i need that midi

Fight the right to ban censorship,
Peace out D31F13D

You're absolutely right, you should have submitted this letter anonymously.
Try looking in your browsers cache, whenever you're on our page the midi gets sent to your system. Then you wouldn't have been subjected to this letter being
Published in Phantasy.

-------------------------------------------------------------------------------
3. how to hac

Delivered-To: iirg@iirg.org
Date: Tue, 09 May 2000 23:21:42 +0200
From: Gary Walton <gdw@yebo.co.za>
Subject: how to hac
To: iirg@iirg.org
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300

can you tell me where to find info on how to become a hacker.

Do a little research for starters. E-mailing hacking groups with message like this will only cause you to be flamed. Now considering the fact your writing from South Africa, We're willing to cut you some slack. Now I hope you mean true hacking and not just being a script kiddie. The world has enough of those.
Learn a programming languace, study electronics, build some circuits.

READ - RESEARCH - PRACTICE, this is the only way to reach any goal.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [10]: Phantasy Distribution Site

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Phantasy Distribution Sites

Phantasy's Distribution Site's are continually changing, we apologize if you
visit a site and it's not there. But always go to our main site and it will
be there.

1. The IIRG's Main Phantasy Distro Site

http://www.iirg.org/phantasy.html

2. L0pht's Phantasy Magazine Archive

http://www.l0pht.com/%7Eoblivion/IIRG.html

3. EFF "Phantasy" Archive

http://www.eff.org/pub/Publications/CuD/Phantasy/index.html

If you'd like to set-up a Phantasy Distro site and be listed here and
on the IIRG's link page, e-mail Mercenary at iirg@iirg.org

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PHANTASY(C) IIRG 1991 - 2000
May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
May You Be Feasting and Drinking in Valhalla For a Full Night
Before the Christian God Knows You're Dead
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT