| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Five, File 6 of 28 | |
| // // /\ // ==== | |
| // // //\\ // ==== | |
| ==== // // \\/ ==== | |
| /\ // // \\ // /=== ==== | |
| //\\ // // // // \=\ ==== | |
| // \\/ \\ // // ===/ ==== | |
| PART III | |
| ------------------------------------------------------------------------------ | |
| ** SUBMISSIONS WANTED ON THE FOLLOWING TOPICS FOR FUTURE ISSUES ** | |
| Cable Television Descrambling | |
| PBX Data Terminal Files | |
| Van Eck Eavesdroping | |
| Security & Anti-Security Measures (Computers, Networks, Physical Sites) | |
| Satellite Transmissions (Audio, Video, DATA, Telecommunications) | |
| Amateur Radio & Television | |
| Radio Modification Instructions | |
| Electronics Project Schematics | |
| X.25 Networking / X.29 Pad Control | |
| Digital Cellular (GSM/TDMA/CDMA) | |
| Wireless Data Networking (LAN, WAN) | |
| ** REMEMBER: Send your university dialups to phrack@well.com ASAP! ** | |
| ------------------------------------------------------------------------------ | |
| A Declaration of the Complaints and Grievances of the United States | |
| Electronic Community -- | |
| "They that can give up essential liberty for a little temporary | |
| safety deserve neither liberty nor safety!" These are Benjamin Franklin's | |
| words for one of the most important values defining American Government in | |
| it's infancy. This idea, that people should be given as much freedom as | |
| possible, and also responsibility for what problems abuse of that freedom | |
| might bring, is one of the most important differences between our so called | |
| "Democracy," and a totalitarian despotism. In fact, this value is so | |
| essential that if it is lost there will be no freedom in the United States | |
| of America, and no so called "Democracy!" Despite this fact, every day more | |
| and more of our freedoms, as citizens and residents of the United States of | |
| America, are being eroded away in the name of safety for us and for our | |
| government. This erosion of rights and freedoms has touched all areas of | |
| our lives, from health care and economics, to criminal justice and national | |
| defense. However, the most profound and dangerous erosion has been in the | |
| area of technology. We believe this is as good a place as any to begin a | |
| fight to save our country from continuing to travel down the road to | |
| despotism. Do not forget that this is only a beginning. | |
| We, the people of the Electronic Community in the United States of | |
| America, have been openly repressed and attacked by all branches and | |
| divisions of the United States Government, in direct violation of our | |
| natural rights and rights granted to us via social contract! The Electronic | |
| Community is one of the world's greatest examples of the power of freedom | |
| and democracy. Most of Cyberspace was not created by businesses looking for | |
| profit, or by governments looking for more efficient control, but mainly by | |
| ordinary citizens looking for a medium through which they could communicate | |
| with others, and express their thoughts and ideas. The computerized | |
| telecommunications used by the electronic community is a medium unlike any | |
| that has ever existed. It is a decentralized, mostly uncensored, and public | |
| forum for open discussion on a world wide basis. It provides ordinary | |
| citizens with the ability to express their ideas to anyone willing to | |
| listen, with no economic or social barriers and no prejudgments. It gives | |
| everyone in the world access to all the knowledge and information the | |
| world has to offer. It has continually shattered deeply ingrained social | |
| prejudices concerning characteristics such as age, race, wealth, and sex. | |
| In fact, it is common to find 14 year olds arguing philosophy with 41 year | |
| olds on America's computer networks! | |
| However, instead of embracing this great tool of freedom, the | |
| United States Government has reacted to it with fear and ignorance. They | |
| have completely ignored the positive effects the existence of this resource | |
| is already having on society. In fact, they have done little, if anything, | |
| to even gain an understanding of the electronic community and it's | |
| citizens. They have thought only of the damage that could be wrought if | |
| access to this kind of knowledge and information fell into the "wrong | |
| hands." They have labeled everyone in the electronic community a potential | |
| criminal, and have cracked down on any kind of activity which has not met | |
| their standards. In doing so they have crushed the free flow of ideas, | |
| trampled on the constitution, and blatantly encroached upon the civil rights | |
| of the people living and working on American's computer networks. They have | |
| chosen safety above freedom, and in doing so they have threatened the | |
| existence of one of the most important social developments of the twentieth | |
| century... | |
| They have ensued upon a Campaign of Terror, using fear to control and | |
| oppress the Electronic Community. | |
| They have openly and blatantly violated local, state, and federal law, and | |
| internationally accepted standards for human rights. | |
| They have used misinformation to set certain areas of the electronic | |
| community off against one another, or to label certain areas as | |
| criminal, while they have attacked the entire community without | |
| regard to action or position. | |
| They have lied to the press, to themselves, and to the American people in | |
| order to keep their actions unquestioned. | |
| They have imposed taxes and tariffs and have priced public utilities with | |
| the specific intent of effecting a chill upon the free flow of | |
| thoughts and ideas. | |
| They have used technology to amass enormous amounts of information on | |
| innocent citizens in order to control and oppress them. | |
| They have judged the interests of private industry to be more important than | |
| the interests of the general population. | |
| They have attacked innocent citizens in order to increase the profits of | |
| certain industries. | |
| They have declared themselves immune from the legal and moral standards | |
| they expect from the rest of society. | |
| They have, on a regular basis, committed the very acts they have called | |
| criminal. | |
| They have tried to criminalize personal privacy while belligerently | |
| defending the privacy of businesses and of government. | |
| They have attempted to control the minds of the American people by | |
| criminalizing certain knowledge and information. | |
| They have prevented the preparation of thoughts and ideas for public | |
| dissemination. | |
| They have threatened innocent citizens with loss of their right to life, | |
| liberty, property, and the pursuit of happiness in order to control | |
| their thoughts, opinions, and actions. | |
| They have repeatedly made laws and taken legal action in areas and/or | |
| concerning subjects of which they have little or no understanding. | |
| They have seized, damaged, and destroyed the property of innocent citizens. | |
| They have wrongly imprisoned citizens based on questionable information for | |
| actions which are negligible and, at worst, legally gray. | |
| They have directly attacked innocent citizens in order to keep them from | |
| publicly assembling. | |
| They have spied on and attempted to interfere with the private | |
| communications of innocent citizens. | |
| They have made unreasonable and excessive searches and seizures. | |
| They have punished innocent citizens without trial. | |
| They have attempted to effect a chill on the free flow of thoughts and | |
| ideas. | |
| They have affected to render the government independent of and superior to | |
| the people. | |
| We cannot, we WILL not, allow this tyranny to continue! The United | |
| States Government has ignored the voice of the Electronic Community long | |
| enough! When we told the government that what they were doing was wrong, | |
| they refused to listen! When we formed political action groups to bring our | |
| cases to court and before Congress, we were told that we were using | |
| loopholes in the law to get away with crime!!! We have, in a peaceful and | |
| respectful manner, given our government more than reasonable petition for | |
| redress of our grievances, but if anything the situation has gotten worse! | |
| Government administrations use computer crime as a weapon in internal | |
| battles over jurisdiction. Government officials, who have only the | |
| slightest understanding of computer science, use computer crime as a tool | |
| for career success. Elected Representatives, who have absolutely no | |
| understanding of computers, use "information superhighways", computer | |
| crime, and cryptography to gain constituent money and voter support! The | |
| Electronic Community, the only group who fully understands the issues | |
| involved here, and the only group who is effected by the decisions being | |
| made, has been completely ignored! We have sat around and discussed these | |
| wrongs long enough! NOW IS THE TIME TO STAND UP AND DEMAND A REDRESS OF OUR | |
| GRIEVANCES BY ANY AND ALL MEANS AVAILABLE! We must scream the truth so | |
| loudly that we drown out everything else! We must save our small community | |
| from destruction so that when the rest of society is ready, the world will | |
| still have a forum for free speech and open communication. We must demand | |
| freedom for America's Electronic Community!!! | |
| Tom Cross AKA The White Ninja | |
| TWN615@Phantom.Com | |
| NOTE: Redistribution and further publishing of this document is highly | |
| encouraged as long as proper credit is given. | |
| ------------------------- | |
| ------------------------- "Government is not a reason, not an eloquence; | |
| ------------------------- it is a force. Like fire, it is a dangerous | |
| --------------- * * * * * servant and a fearful master." | |
| --------------- * * * * * | |
| --------------- * * * * * -- George Washington | |
| --------------- * * * * * | |
| ------------------------------------------------------------------------------ | |
| THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly | |
| ======================================================================== | |
| ISSN 1074-3111 Technology, Conspiracy, Editorials, Politics, Networking | |
| ======================================================================== | |
| Editor-in-Chief: Scott Davis | |
| NetSurfer: John Logan | |
| It's A Conspiracy!: Gordon Fagan | |
| E-Mail - editors@fennec.com | |
| ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC | |
| U.S. Mail: | |
| The Journal Of American Underground Computing | |
| 10111 N. Lamar #25 | |
| Austin, Texas 78753 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | |
| To Subscribe to "TJOAUC", send mail to: sub@fennec.com | |
| All questions/comments about this publication to: comments@fennec.com | |
| Send all articles/info that you want published to: submit@fennec.com | |
| Commercial Registration for Profitable Media: form1@fennec.com | |
| "The underground press serves as the only effective counter to a growing | |
| power, and more sophisticated techniques used by establishment mass media | |
| to falsify, misrepresent, misquote, rule out of consideration as a priori | |
| ridiculous, or simply ignore and blot out of existence: data, books, | |
| discoveries that they consider prejudicial to establishment interest..." | |
| (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) | |
| ------------------------------------------------------------------------------ | |
| New TimeWasters T-shirts ! | |
| Do you know the feeling ? You're behind your terminal for hours, | |
| browsing the directories of your school's UNIX system. Instead of | |
| holes, bugs and bad file permissions you find tripwire, TCPwrapper and | |
| s/key. You run a file with a s-bit and immediately you get a mail from | |
| the system admin asking what you are doing. In other words, no chance | |
| to ever become a good hacker there. | |
| Now you have the chance to at least pretend to be an eleet | |
| hacker. The Dutch hacking fanatics The TimeWasters have released | |
| the third version of their cool 'hacker' T-shirt. Because | |
| the previous versions were too limited (20 and 25 shirts) we | |
| printed no less than 200 shirts this time. | |
| Of course you want to know, what does it look like ? | |
| On the front, a TimeWasters logo in color. Below that a picture | |
| of two hacking dudes, hanging behind their equipment, also | |
| featuring a stack of phracks, pizza boxes, beer, kodez, and | |
| various computer-related stuff with a 'No WsWietse' sticker. | |
| On the back, the original TimeWasters logo with the broken | |
| clock. Below it, four original and dead funny real quotes | |
| featuring the art of Time Wasting. | |
| Wearing this shirt can only provoke one reaction; WOW ! | |
| Imagine going up to the helpdesk wearing this shirt and | |
| keeping a straight face while asking a security question ! | |
| And for just $2 more you'll get a pair of sunglasses with | |
| the text 'TimeWasters' on them ! | |
| To order: | |
| Send $20 or $22 to | |
| TimeWasters | |
| Postbus 402 | |
| 5611 AK Eindhoven | |
| The Netherlands, Europe | |
| This includes shipping. Please allow some time for delivery. If you | |
| are in Holland, don't send US$, email the address below for the | |
| price in guilders and our 'postbank' number. | |
| For more information: email to: | |
| - timewasters-request@win.tue.nl with subject: T-SHIRT for a txtfile | |
| with more info. | |
| - rob@hacktic.nl or gigawalt@win.tue.nl for questions. | |
| Written by Rob J. Nauta, rob@hacktic.nl dd. 8 mar 1994 | |
| ------------------------------------------------------------------------------ | |
| Caller ID Technical Details | |
| by Hyperborean Menace | |
| The way Caller ID works internally is through SS7 (Signalling System 7) | |
| messages between telephone switches equipped to handle SS7. These messages | |
| pass all the call information (block/no block, calling number, etc.). | |
| The calling number is sent as part of the SS7 call setup data on all SS7 | |
| routed calls (i.e. all calls carried between switches that are SS7 | |
| connected). | |
| The calling number is sent between switches always, regardless of | |
| whether or not *67 (Caller ID Block) is dialed. It just sends along a | |
| privacy indicator if you dial *67, and then the final switch in the path | |
| will send a "P" instead of the calling number to the Caller ID box. | |
| (But it will still store the actual number - *69 will work whether or | |
| not the caller dialed *67). What the final switch along the path does | |
| with the calling number depends on how the switch is configured. If you | |
| are not paying for Caller ID service, the switch is configured so that | |
| it will not transmit the Caller ID data. | |
| This is entirely separate from Automatic Number Identification, which is sent | |
| along SS7 where SS7 is available, but can also be sent using other methods, | |
| so that ALL switches (for many years now) have been able to send ANI (which | |
| is what Long Distance companies used to know who to bill). Enhanced 911 is | |
| NOT based on Caller ID, but on ANI, thus, it will work for anyone, not just | |
| people connected to SS7 capable switches. And, of course, *67 will have no | |
| effect on Enhanced 911 either. | |
| Also interesting is the effect call forwarding has on the various services. | |
| Say I have my home telephone forwarded to Lunatic Labs, and it has | |
| Caller ID. If you call me, the call will forward to Lunatic Labs, and | |
| its Caller ID box will show YOUR number, not mine (since your line is | |
| the actual one making the call). | |
| However, ANI is based on the Billing Number (who is paying for the call (or | |
| would pay if it weren't free), not on who is actually making the call. | |
| Thus, if I forward my telephone to an 800 Number that gets ANI (such as the | |
| cable pay-per-view order number), and you call me, they will get MY number | |
| (since I would be the one paying for that portion of the call, except that | |
| 800 Numbers are free), and you will end up ordering pay-per-view for | |
| me... | |
| CNID (Caller ID) Technical Specifications | |
| PARAMETERS | |
| The data signalling interface has the following characteristics: | |
| Link Type: 2-wire, simplex | |
| Transmission Scheme: Analog, phase-coherent FSK | |
| Logical 1 (mark) 1200 +/- 12 Hz | |
| Logical 0 (space) 2200 +/- 22 Hz | |
| Transmission Rate: 1200 bps | |
| Transmission Level: 13.5 +/- dBm into 900 ohm load | |
| (I have copied this data as presented. I believe the | |
| transmission level is meant to be -13.5 dBm.) | |
| [It is indeed -13.5 dBm] | |
| PROTOCOL | |
| The protocol uses 8-bit data words (bytes), each bounded by a | |
| start bit and a stop bit. The CND message uses the Single Data | |
| Message format shown below. | |
| [ I belive this is the same as standard asynchronous serial - I think the | |
| start bit is a "space", and the stop bit is a "mark" ] | |
| Channel Carrier Message Message Data Checksum | |
| Seizure Signal Type Length Word(s) Word | |
| Signal Word Word | |
| CHANNEL SEIZURE SIGNAL | |
| The channel seizure is 30 continuous bytes of 55h (01010101) | |
| providing a detectable alternating function to the CPE (i.e. the | |
| modem data pump). | |
| [CPE = Customer Premises Equipment --i.e. your Caller ID Box] | |
| CARRIER SIGNAL | |
| The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to | |
| condition the receiver for data. | |
| MESSAGE TYPE WORD | |
| The message type word indicates the service and capability | |
| associated with the data message. The message type word for CND | |
| is 04h (00000100). | |
| MESSAGE LENGTH WORD | |
| The message length word specifies the total number of data words | |
| to follow. | |
| DATA WORDS | |
| The data words are encoded in ASCII and represent the following | |
| information: | |
| o The first two words represent the month | |
| o The next two words represent the day of the month | |
| o The next two words represent the hour in local military time | |
| o The next two words represent the minute after the hour | |
| o The calling party's directory number is represented by the | |
| remaining words in the data word field | |
| If the calling party's directory number is not available to the | |
| terminating central office, the data word field contains an ASCII | |
| "O". If the calling party invokes the privacy capability, the | |
| data word field contains an ASCII "P". | |
| [ Note that 'O' will generally result in the Caller-ID box displaying | |
| "Out Of Area" indicating that somewhere along the path the call took from | |
| its source to its destination, there was a connection that did not pass | |
| the Caller ID data. Generally, anything out of Southwestern Bell's area | |
| will certainly generate a 'O', and some areas in SWB territory might also | |
| not have the SS7 connections required for Caller ID] | |
| CHECKSUM WORD | |
| The Checksum Word contains the twos complement of the modulo 256 | |
| sum of the other words in the data message (i.e., message type, | |
| message length, and data words). The receiving equipment may | |
| calculate the modulo 256 sum of the received words and add this | |
| sum to the received checksum word. A result of zero generally | |
| indicates that the message was correctly received. Message | |
| retransmission is not supported. | |
| EXAMPLE CND SINGLE DATA MESSAGE | |
| An example of a received CND message, beginning with the message | |
| type word, follows: | |
| 04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51 | |
| 04h= Calling number delivery information code (message type word) | |
| 12h= 18 decimal; Number of data words (date, time, and directory | |
| number words) | |
| ASCII 30,39= 09; September | |
| ASCII 33,30= 30; 30th day | |
| ASCII 31,32= 12; 12:00 PM | |
| ASCII 32,34= 24; 24 minutes (i.e., 12:24 PM) | |
| ASCII 36,30,39,35,35,35,31,32,31,32= (609) 555-1212; calling | |
| party's directory number | |
| 51h= Checksum Word | |
| [ There is also a Caller Name service that will transmit the number and the | |
| name of the caller. The basic specs are the same as just numbers, but more | |
| data is transmitted. I don't have the details of the data stream for that.] | |
| DATA ACCESS ARRANGEMENT (DAA) REQUIREMENTS | |
| To receive CND information, the modem monitors the phone line | |
| between the first and second ring bursts without causing the DAA | |
| to go off hook in the conventional sense, which would inhibit the | |
| transmission of CND by the local central office. A simple | |
| modification to an existing DAA circuit easily accomplishes the | |
| task. | |
| [i.e. The Caller-ID Device should present a high impedance to the line] | |
| MODEM REQUIREMENTS | |
| Although the data signalling interface parameters match those of | |
| a Bell 202 modem, the receiving CPE need not be a Bell 202 | |
| modem. A V.23 1200 bps modem receiver may be used to demodulate | |
| the Bell 202 signal. The ring indicate bit (RI) may be used on a | |
| modem to indicate when to monitor the phone line for CND | |
| information. After the RI bit sets, indicating the first ring | |
| burst, the host waits for the RI bit to reset. The host then | |
| configures the modem to monitor the phone line for CND | |
| information. | |
| According to Bellcore specifications, CND signalling starts as | |
| early as 300 mS after the first ring burst and ends at least 475 | |
| mS before the second ring burst. | |
| ------------------------------------------------------------------------------ | |
| Country Percentage of Piracy | |
| -------------------------------------------------------- | |
| Australia / New Zealand 45% | |
| Benelux 66 | |
| France 73 | |
| Germany 62 | |
| Italy 86 | |
| Japan 92 | |
| Korea 82 | |
| Singapore 41 | |
| Spain 86 | |
| Sweden 60 | |
| Taiwan ( 1990 ) 93 | |
| Thailand 99 | |
| United Kingdom 54 | |
| United States 35 | |
| Source: Business Software Alliance, based on 1992 h/w & s/w | |
| shipping figures | |
| ------------------------------------------------------------------------------ | |
| The Frog Farm Mailing List FAQ v1.1 | |
| January 20th, 1994 | |
| 1. What is this I am reading? | |
| 2. What is the Frog Farm? | |
| 3. Okay, so what's the Frog Farm mailing list? | |
| 4. Are there any rules enforced on the mailing list? | |
| 5. I can see all the addresses of the subscribers! | |
| 6. You must be Nazis. After all, aren't people who hate Jews, | |
| blacks, etc., the only people who talk about this sort of thing? | |
| 1. What is this I am reading? | |
| This is the FAQ for the Frog Farm mailing list. It is NOT the FAQ | |
| for the Frog Farm. The FAQ for the Frog Farm is much larger (just | |
| over 100 Kbytes in size). | |
| 2. What is the Frog Farm? | |
| Read the FAQ. You can FTP it from etext.archive.umich.edu in the | |
| /pub/Legal/FrogFarm directory (also accessible via Gopher). If | |
| you do not have FTP access, you may request the FAQ via e-mail | |
| from schirado@lab.cc.wmich.edu. | |
| 3. Okay, so what's the Frog Farm mailing list? | |
| frog-farm@blizzard.lcs.mit.edu is an unmoderated e-mail forum | |
| devoted to the discussion of claiming, exercising and defending | |
| Rights in America, past, present and future. Topics include, but | |
| are not limited to, conflicts which can arise between a free | |
| people and their public servants when said servants exceed the | |
| scope of their powers, and possible methods of dealing with such | |
| conflicts. | |
| To subscribe to the list, send a message containing the single | |
| line: | |
| ADD <your-preferred-email-addr> | |
| to frog-farm-request@blizzard.lcs.mit.edu. | |
| To remove your subscription from the forum, send a message | |
| containing the single line: | |
| REMOVE <same-email-addr-as-above> | |
| to frog-farm-request@blizzard.lcs.mit.edu. | |
| Note that these commands must be in the BODY of the message; the | |
| contents of the Subject line are ignored. | |
| While you are subscribed, send mail to | |
| frog-farm@blizzard.lcs.mit.edu | |
| to echo your message to all other list subscribers. | |
| 4. Are there any rules enforced on the mailing list? | |
| Only two: | |
| 1) Do not reveal the e-mail addresses of any subscribers to any | |
| individuals who are not subscribers. You may freely | |
| redistribute any article posted to the Frog Farm, subject to | |
| whatever conditions the poster may have placed on it. For | |
| example, some people attach a notice to their message stating | |
| that they are NOT allowing the redistribution of their message | |
| under ANY circumstances, some people stipulate that it may be | |
| redistributed only if it is unaltered in any way, etc. | |
| 2) No flaming is permitted. The list maintainers are the sole | |
| judges of what constitutes flaming. | |
| 5. I can see all the addresses of the subscribers! | |
| Under normal circumstances, you can't see the names. If you can, | |
| you had to work at it; if so, you obviously know what you're | |
| doing, and you should have known better. Try not to let your | |
| curiosity overwhelm your respect for the privacy of others. | |
| The security on this list is not as tight as it could be, | |
| and it is a trivial process for a knowledgeable hacker or hackers | |
| to circumvent it. If you know how to do this, please don't do it. | |
| 6. You must be Nazis. After all, aren't people who hate Jews, | |
| blacks, etc., the only people who talk about this sort of thing? | |
| Not at all. The official position of the Frog Farm is that every | |
| human being, of any sex or race, has "certain inalienable Rights" | |
| which may not be violated for any cause or reason. Anyone may | |
| claim and exercise Rights in America, providing they possess the | |
| necessary courage and mental competence. | |
| The Frog Farm provides a List of Interesting Organizations to its | |
| subscribers, which may include organizations or persons who | |
| believe in a god or gods, or promote the idea that certain races | |
| are inferior or perhaps part of a conspiratorial plot to enslave | |
| everyone else. The list maintainers make every effort to note | |
| such idiotic beliefs, where they exist, and encourage people not | |
| to throw out the baby with the bathwater, but to seek the truth | |
| wherever it may be found. | |
| Every individual is unique, and none may be judged by anything | |
| other than their words and actions. | |
| ------------------------------------------------------------------------------ | |
| The LOD Communications Underground H/P BBS Message Base Project: | |
| Information/Order File: Brief Version | |
| 2/17/94 | |
| This is a short version of the longer, 35K (12 page) Order/Info file. If | |
| you want the full file, sample message file, detailed tables of contents file, | |
| etc. you can request it from lodcom@mindvox.phantom.com or choose menu item | |
| #5 on the Mindvox Gopher Server by using any gopher and opening a connection | |
| with the hostname: mindvox. | |
| The Project: | |
| ------------ | |
| Throughout history, physical objects have been preserved for posterity for | |
| the benefit of the next generation of humans. Cyberspace, however, isn't very | |
| physical; data contained on floppy diskettes has a finite lifetime as does the | |
| technology to retrieve that data. The earliest underground hacker bulletin | |
| board systems operated at a time when TRS-80s, Commodore 64s, and Apple ][s | |
| were state-of-the-art. Today, it is difficult to find anyone who has one of | |
| these machines in operating condition, not to mention the brain cells left to | |
| recall how to operate them. :-( | |
| LOD Communications has created a historical library of the "dark" portion | |
| of Cyberspace. The project's goal is to acquire as much information as | |
| possible from underground Hack/Phreak (H/P) bulletin boards that were in | |
| operation during a decade long period, dating from the beginnings (in 1980/81 | |
| with 8BBS and MOM: Modem Over Manhattan) to the legendary OSUNY, Plover-NET, | |
| Legion of Doom!, Metal Shop, etc. up through the Phoenix Project circa | |
| 1989/90. Currently, messages from over 75 different BBSes have been retrieved, | |
| although very few message bases are 100% complete. However, not having a | |
| complete "set" does not diminish their value. | |
| DONATIONS: A portion of every order will be donated to the following causes: | |
| 1) A donation will be made to help pay for Craig Neidorf's | |
| (Knight Lightning - Metal Shop Private Co-Sysop) Legal Defense | |
| bills (resulting from his successful campaign to protect First | |
| Amendment rights for electronic publishing, i.e. the | |
| PHRACK/E911 case). | |
| 2) The SotMESC Scholarship Fund. The SotMESC Scholarship is | |
| awarded to students writing exceptional papers of 20 to 30 | |
| pages on a topic based on computer culture (ie, hacking | |
| culture, virus writing culture, Internet culture, etc.) For | |
| more details write: SotMESC PO BOX 573 Long Beach, MS 39560 | |
| or email: rejones@seabass.st.usm.edu | |
| NOTE: THE FIRST DONATIONS TO EACH OF THE ABOVE TWO CAUSES HAVE ALREADY | |
| BEEN MADE. | |
| What Each "Message Base File" Contains: | |
| --------------------------------------- | |
| - A two page general message explaining H/P BBS terminology and format. | |
| - The BBS Pro-Phile: A historical background and description of the BBS | |
| either written by the original system operator(s) or those who actually | |
| called the BBS when it was in operation (it took months to track the | |
| appropriate people down and get them to write these specifically for | |
| this project; lesser known BBSes may not contain a Pro-Phile); | |
| - Messages posted to the BBS (i.e. the Message Base); | |
| - Downloaded Userlists if available; and | |
| - Hacking tutorials a.k.a. "G-Philes" that were on-line if available. | |
| It is anticipated that most people who are interested in the message bases | |
| have never heard of a lot of the BBS names shown in the listing. If you have | |
| seen one set of messages, you have NOT seen them ALL. Each system had a | |
| unique personality, set of users, and each has something different to offer. | |
| Formats the Message Base Files are Available in: | |
| ------------------------------------------------ | |
| Due to the large size of the Message Base Files, they will be compressed | |
| using the format of your choice. Please note that Lodcom does NOT include the | |
| compression/uncompression program (PKZIP, PAK, MAC Stuffit, etc.). ASCII | |
| (uncompressed) files will be provided for $5.00 extra to cover additional | |
| diskette (files that are uncompressed require more than double the number of | |
| diskettes) and shipping costs. The files are available for: | |
| - IBM (5.25 or 3.5 inch) | |
| - APPLE MACINTOSH (3.5 inch) | |
| - ATARI ST (MS-DOS Compatible 3.5 inch) | |
| - AMIGA (3.5 inch) | |
| - PAPER versions can be ordered but cost triple (due to increased costs | |
| to ship, time to print, and messages being in 40 column format which | |
| wastes lots of paper...save those trees!). Paper versions take twice | |
| the time to deliver but are laser printed. | |
| Orders are expected to arrive at the requesters' physical mail box in 3-5 | |
| weeks upon receipt of the order. | |
| The Collection: | |
| --------------- | |
| This is where we currently stand as far as what has been completed and the | |
| estimated completion dates for the rest of the project: | |
| Volume 1: 5700+ Messages, 20 H/P BBSes, COMPLETED. | |
| Volume 2: 2100+ Messages, 25 H/P BBSes, COMPLETED. | |
| Volume 3: 20-30 H/P BBSes, End of March 1994. | |
| Volume 4: ????? H/P BBSes, Sometime after 3/94. | |
| All in all there is expected to be 12000+ Messages. | |
| NOTE: Additional material has recently been received for Boards already | |
| released in the first 2 volumes. Those who have already ordered will receive | |
| the updated versions with the additional messages that have been recovered. | |
| *** Blurbs and Excerpts: *** | |
| ---------------------------- | |
| Blurbs from some of those who have received the first two Volumes: | |
| "I am stunned at the quality of this undertaking. It brought back that | |
| feeling of involvement and interest." --P.P. | |
| "I think of the release of the H/P Message Bases as an opening salvo in | |
| the battle for the truth about fraud in the Telecom Industry." --J.J. | |
| "Still sifting through Volume one. For now I've taken the approach of | |
| putting all the files into one subdirectory and searching it for topics | |
| of interest. Prime and Primos computers was my first topic of interest | |
| and Volume I yielded quite a bit of odd and useful information." --K.B. | |
| "...the professionalism of the Message Bases is of a superior quality. | |
| Somehow they bring back that age of innocence. Boy do I miss those | |
| times." --A.C. | |
| Excerpt from 2600 Magazine (The Hacker Quarterly) Autumn 1993 Issue, | |
| review by Emmanuel Goldstein entitled NEVER ERASE THE PAST. | |
| "...is this the sort of thing that people really care about? Undoubtedly, | |
| many will shrug it off as useless, boring teenagers that have absolutely no | |
| relevance to anything in the real world. The fact remains, however, that this | |
| is history. This is *our* history, or at least, a small part of it. The boards | |
| included in this project - Sherwood Forest I & II, Metal Shop Private, OSUNY, | |
| Phoenix Project, and a host of others - are among the more interesting hacker | |
| boards, with some classic dialogue and a gang of hacker stars-to-be. Nearly | |
| all of these boards were raided at one time or another, which makes it all | |
| even more fascinating." | |
| "Had the LODCOM project not come along when it did, a great many of these | |
| message bases probably would have been lost forever. Providing this service | |
| to both the hacker community and those interested in it is a noble cause that | |
| is well worth the price. If it succeeds, some valuable hacker data will be | |
| preserved for future generations." | |
| The Lodcom project was also reviewed in Computer underground Digest Issue | |
| #5.39 and will be reviewed by GRAY AREAS MAGAZINE in their summer issue. You | |
| should be able to find the issue on most newsstands in about 3 months. You can | |
| contact Gray Areas by phone: 215-353-8238 (A machine screens their calls), by | |
| email: grayarea@well.sf.ca.us, and by regular mail: Gray Areas, Inc. , PO BOX | |
| 808, Broomall, PA 19008-0808. Subscriptions are $18.00 a year U.S. and we | |
| highly recommend the magazine if you are interested in the gray areas of life. | |
| *** {End of Blurbs and Excerpts} *** | |
| Volume 1 & 2 Table of Contents: | |
| ------------------------------- | |
| A detailed Table of Contents file can be found on the Mindvox Gopher | |
| Server or requested via email. | |
| Project Contributor List: | |
| ------------------------- | |
| The following is a list (order is random) of those who helped with this | |
| effort that began in Jan. of 1993. Whether they donated material, uploaded | |
| messages, typed messages from printouts, critiqued our various materials, | |
| wrote BBS Pro-Philes, donated services or equipment, or merely 'looked in | |
| their attic for some old disks', their help is appreciated: | |
| Lord Digital and Dead Lord (Phantom Access Technologies/The MINDVOX System), | |
| 2600 Magazine/Emmanuel Goldstein, The Marauder, Knight Lightning, T.B., | |
| Computer underground Digest (CuD)/Jim Thomas/Gordon Meyer, Phrack Magazine, | |
| Strat, Jester Sluggo, Erik Bloodaxe, Taran King, Professor Falken, TUC, | |
| Lex Luthor, Mark Tabas, Phantom Phreaker, Quasi Moto, The Mechanic, Al Capone, | |
| Compu-Phreak, Dr. Nibblemaster, King Blotto, Randy Hoops, Sir Francis Drake, | |
| Digital Logic, The Ronz, Doctor Who, The Jinx, Boca Bandit, Crimson Death, | |
| Doc Holiday, The Butler, Ninja Master, Silver Spy, Power Spike, Karl Marx, | |
| Blue Archer, Dean Simmons, Control-C, Bad Subscript, Swamp Ratte, Randy Smith, | |
| Terminal Man, SK Erickson, Slave Driver, R.E.Jones/CSP/SotMESC, Gray Areas | |
| Magazine, and anonymous others. | |
| The Order Form: | |
| --------------- | |
| - - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - - | |
| LOD Communications H/P BBS Message Base ORDER FORM | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| PERSONAL RATE: Volumes 1, 2, 3, and possibly a fourth if created: $39.00 | |
| This price is TOTAL & includes any updates to individual BBS Message Bases. | |
| COMMERCIAL RATE: Corporations, Universities, Libraries, and Government | |
| Agencies: $99.00 As above, price is total and includes updates. | |
| H/P BBS Message Bases (All Volumes): $________ | |
| "G-Phile" Collection (Optional): $____________ ($10.00 Personal) | |
| ($25.00 Commercial) | |
| Disk Format/Type of Computer: _____________________________________ | |
| (Please be sure to specify diskette size [5.25" or 3.5"] and high/low density) | |
| File Archive Method (.ZIP [preferred], .ARJ, .LHZ, .Z, .TAR) ____________ | |
| (ASCII [Non-Compressed] add $5.00 to order) | |
| Texas Residents add 8% Sales Tax. | |
| If outside North America please add $6.00 for Shipping & Handling. | |
| Total Amount (In U.S. Dollars): $ ___________ | |
| Payment Method: Check or Money Order please, made out to LOD Communications. | |
| Absolutely NO Credit Cards, even if it's yours :-) | |
| By purchasing these works, the Purchaser agrees to abide by all applicable U.S. | |
| Copyright Laws to not distribute or reproduce, electronically or otherwise, in | |
| part or in whole, any part of the Work(s) without express written permission | |
| from LOD Communications. | |
| Send To: | |
| Name: _____________________________________ | |
| Organization: _____________________________________ (If applicable) | |
| Street: _____________________________________ | |
| City/State/Zip: _____________________________________ | |
| Country: _____________________________________ | |
| E-mail address: _____________________________________ (If applicable) | |
| PRIVACY NOTICE: The information provided to LOD Communications is used for | |
| sending orders and periodic updates to the H/P BBS Message Base Price List. | |
| It will NOT be given or sold to any other party. Period. | |
| - - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - - | |
| Remit To: LOD Communications | |
| 603 W. 13th | |
| Suite 1A-278 | |
| Austin, Texas USA 78701 | |
| Lodcom can also be contacted via E-mail: lodcom@mindvox.phantom.com | |
| Voice Mail: 512-448-5098 | |
| _____________________________________________________________________________ | |
| End Brief Version of Order/Info File (2/20/94) | |
| Email: lodcom@mindvox.phantom.com | |
| Voice Mail: 512-448-5098 | |
| Snail Mail: LOD Communications | |
| 603 W. 13th Suite 1A-278 | |
| Austin, Texas USA 78701 | |
| ------------------------------------------------------------------------------ | |
| BooX for Hackers | |
| ================ | |
| by Seven Up | |
| Usually I am not reading too many books. But there are two rather new | |
| ones everyone should read and have. | |
| UNIX Power Tools | |
| ================ | |
| The first one is made for people who like to play with UNIX. | |
| It is called 'UNIX Power Tools', published by Bantam and O'Reilly. It | |
| contains over 1000 pages and weighs about 3 pounds, but contains a CD | |
| ROM. It contains pretty useful information and examples on how to use | |
| standard UNIX utilities and how to solve certain tasks. Some of the topics | |
| it covers are: | |
| Encryption of passwords, shell programming, config files for logging in | |
| and out, setting shell prompts, vi tips & tricks, redirecting and piping, | |
| sed & awk and much more. Like most O'Reilly books, it is written with | |
| a lot of humor and easy to read. To me, this book is a reference for almost | |
| any question. You might even feel that you don't need most of your old | |
| UNIX books anymore, because this book almost covers it all. It is also a lot | |
| of fun just to browse through the book randomly and read articles on | |
| different subjects. There really is no need and no use to read it from A to Z. | |
| A lot of their tricks is collected from Usenet Newsgroups. All of their use- | |
| ful programs, scripts and general PD programs you will find on FTP sites | |
| are on the CD. However, if you want a different medium they charge you $40. | |
| And now we come to the only problem of the book: the price! I think compared | |
| to the contents, charging $59.95 is justified; but it might scare off many | |
| people anyway. Finally I would recommend this book to everyone who uses | |
| UNIX a lot and likes to experiment and play with it (and has 60 bucks left). | |
| Hacker Crackdown | |
| ================ | |
| Now reading Bruce's book won't cost you 60 bucks. In fact, it will even | |
| be totally FREE! I won't say too much about the book, because there have | |
| already been great reviews in Phrack and 2600 in Spring/Summer 1993. It | |
| is probably the most interesting and entertaining book about Hackers and | |
| Fedz from 1993. But now Bruce decided to release the book as online | |
| freeware - you may just grab the 270k file from a site, read it and give | |
| it to anyone you want. | |
| But let's listen to Bruce now and what he has to say... | |
| January 1, 1994 -- Austin, Texas | |
| Hi, I'm Bruce Sterling, the author of this | |
| electronic book. | |
| Out in the traditional world of print, *The | |
| Hacker Crackdown* is ISBN 0-553-08058-X, and is | |
| formally catalogued by the Library of Congress as "1. | |
| Computer crimes -- United States. 2. Telephone -- | |
| United States -- Corrupt practices. 3. Programming | |
| (Electronic computers) -- United States -- Corrupt | |
| practices." 'Corrupt practices,' I always get a kick out | |
| of that description. Librarians are very ingenious | |
| people. | |
| The paperback is ISBN 0-553-56370-X. If you go | |
| and buy a print version of *The Hacker Crackdown,* | |
| an action I encourage heartily, you may notice that | |
| in the front of the book, beneath the copyright | |
| notice -- "Copyright (C) 1992 by Bruce Sterling" -- it | |
| has this little block of printed legal boilerplate from | |
| the publisher. It says, and I quote: | |
| "No part of this book may be reproduced or | |
| transmitted in any form or by any means, electronic | |
| or mechanical, including photocopying, recording, | |
| or by any information storage and retrieval system, | |
| without permission in writing from the publisher. | |
| For information address: Bantam Books." | |
| This is a pretty good disclaimer, as such | |
| disclaimers go. I collect intellectual-property | |
| disclaimers, and I've seen dozens of them, and this | |
| one is at least pretty straightforward. In this narrow | |
| and particular case, however, it isn't quite accurate. | |
| Bantam Books puts that disclaimer on every book | |
| they publish, but Bantam Books does not, in fact, | |
| own the electronic rights to this book. I do, because | |
| of certain extensive contract maneuvering my | |
| agent and I went through before this book was | |
| written. I want to give those electronic publishing | |
| rights away through certain not-for-profit channels, | |
| and I've convinced Bantam that this is a good idea. | |
| Since Bantam has seen fit to peaceably agree to | |
| this scheme of mine, Bantam Books is not going to | |
| fuss about this. Provided you don't try to sell the | |
| book, they are not going to bother you for what you | |
| do with the electronic copy of this book. If you want | |
| to check this out personally, you can ask them; | |
| they're at 1540 Broadway NY NY 10036. However, if | |
| you were so foolish as to print this book and start | |
| retailing it for money in violation of my copyright | |
| and the commercial interests of Bantam Books, | |
| then Bantam, a part of the gigantic Bertelsmann | |
| multinational publishing combine, would roust | |
| some of their heavy-duty attorneys out of | |
| hibernation and crush you like a bug. This is only to | |
| be expected. I didn't write this book so that you | |
| could make money out of it. If anybody is gonna | |
| make money out of this book, it's gonna be me and | |
| my publisher. | |
| My publisher deserves to make money out of | |
| this book. Not only did the folks at Bantam Books | |
| commission me to write the book, and pay me a | |
| hefty sum to do so, but they bravely printed, in text, | |
| an electronic document the reproduction of which | |
| was once alleged to be a federal felony. Bantam | |
| Books and their numerous attorneys were very | |
| brave and forthright about this book. Furthermore, | |
| my former editor at Bantam Books, Betsy Mitchell, | |
| genuinely cared about this project, and worked hard | |
| on it, and had a lot of wise things to say about the | |
| manuscript. Betsy deserves genuine credit for this | |
| book, credit that editors too rarely get. | |
| The critics were very kind to *The Hacker | |
| Crackdown,* and commercially the book has done | |
| well. On the other hand, I didn't write this book in | |
| order to squeeze every last nickel and dime out of | |
| the mitts of impoverished sixteen-year-old | |
| cyberpunk high-school-students. Teenagers don't | |
| have any money -- (no, not even enough for the six- | |
| dollar *Hacker Crackdown* paperback, with its | |
| attractive bright-red cover and useful index). That's | |
| a major reason why teenagers sometimes succumb | |
| to the temptation to do things they shouldn't, such | |
| as swiping my books out of libraries. Kids: this one | |
| is all yours, all right? Go give the print version back. | |
| *8-) | |
| Well-meaning, public-spirited civil libertarians | |
| don't have much money, either. And it seems | |
| almost criminal to snatch cash out of the hands of | |
| America's direly underpaid electronic law | |
| enforcement community. | |
| If you're a computer cop, a hacker, or an | |
| electronic civil liberties activist, you are the target | |
| audience for this book. I wrote this book because I | |
| wanted to help you, and help other people | |
| understand you and your unique, uhm, problems. I | |
| wrote this book to aid your activities, and to | |
| contribute to the public discussion of important | |
| political issues. In giving the text away in this | |
| fashion, I am directly contributing to the book's | |
| ultimate aim: to help civilize cyberspace. | |
| Information *wants* to be free. And the | |
| information inside this book longs for freedom with | |
| a peculiar intensity. I genuinely believe that the | |
| natural habitat of this book is inside an electronic | |
| network. That may not be the easiest direct method | |
| to generate revenue for the book's author, but that | |
| doesn't matter; this is where this book belongs by its | |
| nature. I've written other books -- plenty of other | |
| books -- and I'll write more and I am writing more, | |
| but this one is special. I am making *The Hacker | |
| Crackdown* available electronically as widely as I | |
| can conveniently manage, and if you like the book, | |
| and think it is useful, then I urge you to do the same | |
| with it. | |
| You can copy this electronic book. Copy the | |
| heck out of it, be my guest, and give those copies to | |
| anybody who wants them. The nascent world of | |
| cyberspace is full of sysadmins, teachers, trainers, | |
| cybrarians, netgurus, and various species of | |
| cybernetic activist. If you're one of those people, I | |
| know about you, and I know the hassle you go | |
| through to try to help people learn about the | |
| electronic frontier. I hope that possessing this book | |
| in electronic form will lessen your troubles. Granted, | |
| this treatment of our electronic social spectrum is | |
| not the ultimate in academic rigor. And politically, it | |
| has something to offend and trouble almost | |
| everyone. But hey, I'm told it's readable, and at | |
| least the price is right. | |
| You can upload the book onto bulletin board | |
| systems, or Internet nodes, or electronic discussion | |
| groups. Go right ahead and do that, I am giving you | |
| express permission right now. Enjoy yourself. | |
| You can put the book on disks and give the disks | |
| away, as long as you don't take any money for it. | |
| But this book is not public domain. You can't | |
| copyright it in your own name. I own the copyright. | |
| Attempts to pirate this book and make money from | |
| selling it may involve you in a serious litigative snarl. | |
| Believe me, for the pittance you might wring out of | |
| such an action, it's really not worth it. This book | |
| don't "belong" to you. In an odd but very genuine | |
| way, I feel it doesn't "belong" to me, either. It's a | |
| book about the people of cyberspace, and | |
| distributing it in this way is the best way I know to | |
| actually make this information available, freely and | |
| easily, to all the people of cyberspace -- including | |
| people far outside the borders of the United States, | |
| who otherwise may never have a chance to see any | |
| edition of the book, and who may perhaps learn | |
| something useful from this strange story of distant, | |
| obscure, but portentous events in so-called | |
| "American cyberspace." | |
| This electronic book is now literary freeware. It | |
| now belongs to the emergent realm of alternative | |
| information economics. You have no right to make | |
| this electronic book part of the conventional flow of | |
| commerce. Let it be part of the flow of knowledge: | |
| there's a difference. I've divided the book into four | |
| sections, so that it is less ungainly for upload and | |
| download; if there's a section of particular relevance | |
| to you and your colleagues, feel free to reproduce | |
| that one and skip the rest. | |
| Just make more when you need them, and give | |
| them to whoever might want them. | |
| Now have fun. | |
| Bruce Sterling -- bruces@well.sf.ca.us | |
| ------------------------------------------------------------------------------ | |
| _ _ | |
| ((___)) | |
| [ x x ] cDc communications | |
| \ / Global Domination Update #14 | |
| (' ') December 30th, 1993 | |
| (U) | |
| Est. 1986 | |
| New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1993: | |
| _________________________________/Text Files\_________________________________ | |
| 241: "Cell-Hell" by Video Vindicator. In-depth article on modifying the | |
| Mitsubishi 800 cellular phone by Mr. Fraud himself. Rad. | |
| 242: "The Darkroom" by Mark Vaxlov. Very dark story about a high school rape | |
| in the photography lab at school. Disturbing. | |
| 243: "Fortune Smiles" by Obscure Images. Story set in the future with | |
| organized crime and identity-swapping. | |
| 244: "Radiocarbon Dating Service" by Markian Gooley. Who would go out with | |
| Gooley? YOUR MOM! | |
| 245: "The U.S. Mercenary Army" by Phil Agee. Forwarded by The Deth Vegetable, | |
| this file contains a speech by former CIA agent Agee on the Gulf War. | |
| Interesting stuff. | |
| 246: "The Monolith" by Daniel S. Reinker. This is one of the most disgusting | |
| files we've put out since the infamous "Bunny Lust." I don't wanna describe | |
| this, just read it. | |
| 247: "Post-Election '92 Cult Coverage" by Omega. Afterthoughts on Tequila | |
| Willy's bid for the U.S. Presidency. | |
| 248: "The Lunatic Crown" by Matthew Legare. Wear the crown. Buy a Slurpee. | |
| Seek the adept. Do not pass 'Go.' | |
| 249: "Yet Another Suicide" by The Mad Hatter. Guy gets depressed over a girl | |
| and kills himself. | |
| 250: "State of Seige" by Curtis Yarvin. The soldiers hunt the dogs hunt the | |
| soldiers. Like, war, ya know. Hell! | |
| __________________________________/cDc Gnuz\__________________________________ | |
| "cDc: We're Into Barbie!" | |
| cDc mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing list! | |
| Send mail to cDc@cypher.com and include some wonderlessly elite message along | |
| he lines of "ADD ME 2 DA MAILIN LIZT!!@&!" | |
| NEW Official cDc Global Domination Factory Direct Outlets: | |
| The Land of Rape and Honey 502/491-6562 | |
| Desperadoes +61-7-3683567 | |
| Underworld 203/649-6103 | |
| Airstrip-One 512/371-7971 | |
| Ministry of Death 516/878-1774 | |
| Future Shock +61-7-3660740 | |
| Murder, Inc 404/416-6638 | |
| The Prodigal Sun 312/238-3585 | |
| Red Dawn-2 Enterprises 410/263-2258 | |
| Cyber Neurotic Reality Test 613/723-4743 | |
| Terminal Sabotage 314/878-7909 | |
| The Wall 707/874-1316,2970 | |
| We're always taking t-file submissions, so if you've got a file and want to | |
| really get it out there, there's no better way than with cDc. Upload text to | |
| The Polka AE, to sratte@phantom.com, or send disks or hardcopy to the cDc post | |
| office box in Lubbock, TX. | |
| cDc has been named SASSY magazine's "Sassiest Underground Computer Group." | |
| Hell yeah! | |
| Thanks to Drunkfux for setting up another fun HoHoCon this year, in Austin. It | |
| was cool as usual to hang out with everyone who showed up. | |
| Music credits for stuff listened to while editing this batch of files: Zapp, | |
| Carpenters, Deicide, and Swingset Disaster. | |
| Only text editor worth a damn: ProTERM, on the Apple II. | |
| So here's the new cDc release. It's been a while since the last one. It's out | |
| because I fucking felt like it, and have to prove to myself that I can do this | |
| crap without losing my mind and having to go stand in a cotton field and look | |
| at some dirt at 3 in the morning. cDc=cDc+1, yeah yeah. Do you know what this | |
| is about? Any idea? This is SICK and shouldn't be harped on or celebrated. | |
| This whole cyberdweeb/telecom/'puter underground scene makes me wanna puke, | |
| it's all sick and dysfunctional. Eat my shit, G33/<W0r|_<|. Virus yourself to | |
| death. Go blind staring at the screen waiting for more wares/inph0 to come | |
| trickling down the wire. The more of that shit comes in, the more life goes | |
| out. Ooh, and you hate it so much, don't you. You hate it. | |
| Hacking's mostly a big waste of time. Fuck you. | |
| Stupid Telephone Tricks will never be on David Letterman. Fuck you. | |
| Cryptography? Who'd wanna read YOUR boring email? Fuck you. | |
| Interactive television is a couch potato trap. Fuck you. | |
| "Surf the net," sucker. "Ride the edge," you maladjusted sack of shit. | |
| S. Ratte' | |
| cDc/Editor and P|-|Ear13zz |_3@DeRrr | |
| "We're into t-files for the groupies and money." | |
| Fuck you, fuck you... and most of all, fuck YOU. | |
| Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453. | |
| Internet: sratte@phantom.com. | |
| _____________________________________________________________________________ | |
| cDc Global Domination Update #14-by Swamp Ratte'-"Hyperbole is our business" | |
| ALL NEW cDc RELEASES FTP'ABLE FROM FTP.EFF.ORG -pub/Publications/CuD/CDC | |
| ------------------------------------------------------------------------------ | |
| Introduction to BlackNet | |
| Your name has come to our attention. We have reason to believe you may | |
| be interested in the products and services our new organization, | |
| BlackNet, has to offer. | |
| BlackNet is in the business of buying, selling, trading, and otherwise | |
| dealing with *information* in all its many forms. | |
| We buy and sell information using public key cryptosystems with | |
| essentially perfect security for our customers. Unless you tell us who | |
| you are (please don't!) or inadvertently reveal information which | |
| provides clues, we have no way of identifying you, nor you us. | |
| Our location in physical space is unimportant. Our location in | |
| cyberspace is all that matters. Our primary address is the PGP key | |
| location: "BlackNet<nowhere@cyberspace.nil>" and we can be contacted | |
| (preferably through a chain of anonymous remailers) by encrypting a | |
| message to our public key (contained below) and depositing this | |
| message in one of the several locations in cyberspace we monitor. | |
| Currently, we monitor the following locations: alt.extropians, | |
| alt.fan.david-sternlight, and the "Cypherpunks" mailing list. | |
| BlackNet is nominally nondideological, but considers nation-states, | |
| export laws, patent laws, national security considerations and the | |
| like to be relics of the pre-cyberspace era. Export and patent laws | |
| are often used to explicity project national power and imperialist, | |
| colonialist state fascism. BlackNet believes it is solely the | |
| responsibility of a secret holder to keep that secret--not the | |
| responsibility of the State, or of us, or of anyone else who may come | |
| into possession of that secret. If a secret's worth having, it's worth | |
| protecting. | |
| BlackNet is currently building its information inventory. We are | |
| interested in information in the following areas, though any other | |
| juicy stuff is always welcome. "If you think it's valuable, offer it | |
| to us first." | |
| - - trade secrets, processes, production methods (esp. in | |
| semiconductors) - nanotechnology and related techniques (esp. the | |
| Merkle sleeve bearing) - chemical manufacturing and rational drug | |
| design (esp. fullerines and protein folding) - new product plans, from | |
| children's toys to cruise missiles (anything on "3DO"?) - business | |
| intelligence, mergers, buyouts, rumors | |
| BlackNet can make anonymous deposits to the bank account of your | |
| choice, where local banking laws permit, can mail cash directly (you | |
| assume the risk of theft or seizure), or can credit you in | |
| "CryptoCredits," the internal currency of BlackNet (which you then | |
| might use to buy _other_ information and have it encrypted to your | |
| special public key and posted in public place). | |
| If you are interested, do NOT attempt to contact us directly (you'll | |
| be wasting your time), and do NOT post anything that contains your | |
| name, your e-mail address, etc. Rather, compose your message, encrypt | |
| it with the public key of BlackNet (included below), and use an | |
| anonymous remailer chain of one or more links to post this encrypted, | |
| anonymized message in one of the locations listed (more will be added | |
| later). Be sure to describe what you are selling, what value you think | |
| it has, your payment terms, and, of course, a special public key (NOT | |
| the one you use in your ordinary business, of course!) that we can use | |
| to get back in touch with you. Then watch the same public spaces for a | |
| reply. | |
| (With these remailers, local PGP encryption within the remailers, the | |
| use of special public keys, and the public postings of the encrypted | |
| messages, a secure, two-way, untraceable, and fully anonymous channel | |
| has been opened between the customer and BlackNet. This is the key to | |
| BlackNet.) | |
| A more complete tutorial on using BlackNet will soon appear, in | |
| plaintext form, in certain locations in cyberspace. | |
| Join us in this revolutionary--and profitable--venture. | |
| BlackNet<nowhere@cyberspace.nil> | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 | |
| mQCPAixusCEAAAEEAJ4/hpAPevOuFDXWJ0joh/y6zAwklEPige7N9WQMYSaWrmbi | |
| XJ0/MQXCABNXOj9sR3GOlSF8JLOPInKWbo4iHunNnUczU7pQUKnmuVpkY014M5Cl | |
| DPnzkKPk2mlSDOqRanJZCkyBe2jjHXQMhasUngReGxNDMjW1IBzuUFqioZRpABEB | |
| AAG0IEJsYWNrTmV0PG5vd2hlcmVAY3liZXJzcGFjZS5uaWw+ | |
| =Vmmy | |
| -----END PGP PUBLIC KEY BLOCK----- | |