💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › PHANTASY › phant-3.11 captured on 2022-06-12 at 13:55:19.

View Raw

More Information

-=-=-=-=-=-=-

      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
      =                                                               =
      -               WELCOME TO THE ELEVENTH ISSUE OF                -
      =                                                               =
      -                        -=>PHANTASY<=-                         -
      =                                                               =
      -               A PUBLICATION AND NEWSLETTER OF                 -
      =                                                               =
      -                             THE                               -
      =                        INTERNATIONAL                          =
      -                         INFORMATION                           -
      =                          RETRIEVAL                            =
      -                            GUILD                              -
      =                                                               =
      -        Hacking,Phreaking,Anarchy,Survivalism,Commentary       -
      =                                                               =
      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

         Volume Number Three,Issue Number Eleven Dated 11/06/92
               Editor is Mercenary : mercenar@works.UUCP

             Article Submissions: The Mercenary/IIRG
                                  862 Farmington Avenue
                                  Suite 306
                                  Bristol,Ct 06010

           IIRG World Headquarters BBS: Dark Shadows
                                        19.2/9600 Baud HST
                                        24 Hours a Day
                                        1.2 Gigs Online
                                        2 Nodes
                                        (203)-628-9660

        Table of Discontents:


          [1] More Pump-Con Bust Info
              By: Anonymous

          [2] Caller ID Availability
              By: Mercenary

          [3] Crystal Source
              By: Saint Anarchy

          [4] FOR THE PEOPLE
              Supplied By: Bulletin Boards Across the Country
              Edited by: Mercenary

                1. DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES
                2. FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE
                3. PUMP-CON BUST RUMORS FLY
                4. RESPONSE TO PUMP-CON RUMORS

          [5] The Rumor Mill (Unconfirmed rumors from the Underground)
              Edited By: Mercenary

                1. Ronald Pinz (Victim Or Rat Fink)
                2. Berlin Busts Reported
                3. WINDYCON

          [6] PHANTASY TIDBITS: News and Views of Interest

                1. Police Officials Cited For Searching Private Records
                2. Call for Papers - The Third International Virus Conference
                3. Landmark Software Decision
                4. Sixth International Computer Security & Virus Conference

          [7] Listing of IIRG Distribution Sites

          [8] Listing of PHANTASY Distribution Sites

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

    OFFICIAL DISLAIMER...

    All information in PHANTASY is from USER contributed material
    The Publishers and Editors of PHANTASY and THE IIRG disclaim
    any liability from any damages of any type that the reader or
    user of such information contained within this newsletter may encounter
    from the use of said information. All files are brought to you for
    entertainment purposes only! We also assume all information infringes
    no copyrights and hereby disclaim any liability.

    PHANTASY is (C) 1990 by The IIRG
    IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [1]:
                **********  PUMPCON  BUSTED!!!  ***********
                                10/31/92
                    written by someone who was there
                     who wishes to remain anonymous

 NOTICE:  The word "Hacker" is used frequently throughout this file - it is
          to be interperated as "a computer literate person", and NOT as
          "someone who engages in illegal activities using a computer".

Friday, October 30, Pumpcon began, at the Courtyard of the Marriott, in
Greenburgh, NY.  All in all, about 30 hackers showed up, and had a great time.
At least until the evening of Oct. 31st, when 8-10 members of the Greenburgh
police force showed up and raided the Con.  At the time of the raid, there were
between 20 and 25 hackers in the hotel.  3 of the 4 rooms rented by Con
attendees were raided.  All the occupants of these rooms were taken to a
conference room, and then another hotel room (255) where they were held
approximately 6-8 hours for questioning.

The police all came in unmarked police cars, and parked on all 4 sides of the
hotel.  No one noticed they were there, until they were standing in the hall
where all 4 rooms were located.  The officers stood in the hall outside the
doors, but did not enter the rooms right away.  They waited about five
minutes, for some unknown reason, which was just enough time for them to be
noticed by the hackers in at least one of the rooms.  Unfortunately, there was
no way the hackers in one room could warn the other rooms - the fone lines were
busy, and the cops in the hall kinda left the "walk down and tell 'em in
person" option out.

  The police produced copies of a search warrant to search rooms 246, 233, and
237.  Room 246 was the one where everyone was hanging out; it was pretty much
THE room.  It was where the computers were located, and where most of the Con
attendees were 99% of the time.  The other two rooms were rented by attendees
of the con, and were simply used for sleeping quarters.

Before too long, the police entered the rooms, and began rounding up people.
My recollection of this time period is a bit faint, and I don't remember all
the minute details.  All I know is that we all ended up in a conference room,
and then room 255.

A few hackers who had been out driving around during the time of the bust
returned a few hours later, and when they were seen by police, they were
immediately taken to 255 and questioned.  (They were walking down the
hall, when a cop appeared, and told them to step into a room)  The cops asked
them if they were hackers, and when they didn't answer, one police officer
reached into the coat pocket of one of the people, and produced an auto
dialer.  This in itself was enough to send the three to room 255, where the
rest of the hackers were being held for questioning.  My question to you -
isn't that just a bit illegal?  Bodily search without probable cause OR a
warrant?  Ooops - I'm forgetting - we're HACKERS!  We're ALL BAD!  We're
ALWAYS breaking the law.  We don't have RIGHTS!

Room 255 was packed.  No one was allowed to smoke, and everyone was nervous
as hell.  One by one people were called to be interviewed, with some
interviews lasting 5 minutes, others lasting 30 or 45 minutes.  Some people
were sleeping, others were conversing, and still others were shaking, and
looked like they were about to puke at any second.  Even though the situation
was quite serious, a few joked around, saying things like "So guys, I guess
PumpCon '93 won't be held here, eh?".

No one knew who was going to be arrested, or when they would be released.
The 2 cops in the room with them were actually pretty cool, and answered any
questions they could to the best of their knowledge.  They weren't the guys
in charge of the investigation; they were simply there to make sure we didn't
leave.  Of course, as friendly as they seemed, they were still cops...

All the people who were detained were held until between 5:45 and 6:30am.
Four hackers were arrested, 1 because 2 of the rooms were registered in his
name, a second because he signed for the rooms, and the others for previous
crimes, apparently.  No one knows as of yet. As of this message, no news
on what will become of those arrested is known.  They have not yet been
arraigned.  The other hackers were all searched, questioned, and then released
pending further investigation.  Those under the age of 18 had their parents
notified.

To my knowledge, there were no federal investigators there at the time of the
bust.  However, people kept mentioning the FBI and the Secret Service, and it
is very possible that they will be called in to investigate.  Actually, it's
more than just possible, it's almost guaranteed.  The police said that
although most of those detained were released, there will most likely be more
arrests in the near future, as more is learned about the alleged illegal
doings.

3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along with
anything which looked like it could have been involved in phone fraud.  For
some odd reason, although Auto Dialers were listed on the search warrant, not
all of them were confiscated.  I acutally don't know if ANY were, I do know
that not ALL were. ;)

In one of the rooms, there were about 2 dozen computer magazines which were
apparently confiscated, although the warrant did not specify that magazines
could be taken.  But, when you're busting HACKERS, I suppose you can take what
you want.  After all, hackers are evil geniuses, and don't have the same rights
as NORMAL criminals do.

As of yet, the actual charges against the hackers are not known.   The raid
apparently stemmed because the hackers were ALLEGEDLY using stolen calling card
numbers and/or access codes to obtain free phone calls.  One of these card
numbers or codes was rummored to have tripped a flag at AT&T, which alerted
security personel that something was possibly wrong.

This assumption about the calling card fraud is made because the police
confiscated any calling card found during their searches, and some of the
questions they asked the detained centered entirely around calling card
theft and use.  A few other questions asked me were "Do you know what
computer systems were accessed?", "Do you refer to each other with handles?",
"Who was primarily responsible for this meeting?", and "Where did you hear
about this meeting?"

My interview lasted only about 10 minutes, and it started at about 5:50am.
Everyone was dead tired, and the cops wanted to get everything over with
as fast as possible so they could get some sleep.  After the interviews were
over, everyone left, to wait and see what the next few days will bring.

I am releasing this file now, to prevent any rumors from starting, and to try
to make the outside world aware of what happened during PumpCon.  I have
left out any specific incidences and references to specific people as a
precaution, since the investigation is only beginning.  We were hoping to write
a file of all the attendees of PumpCon, to share with the world the names of
those who were there.  However, as you can obviously see, that would be highly
stupid.  For anyone who WAS there who is reading this, rest assured that the
running list of names which was kept made a very tasteless dinner for the one
who had it in his pocket.

Oh, BTW, one of the cops who was apparently in charge made a comment to me...
he said "You can post a message on the boards telling your friends to stay
out of Greenburgh".  Well boys, you heard him - PumpCon '93 will be held in
Greenburgh, at the Courtyard Marriott....


                            *--------------*

The following is a word for word copy of the search warrant issued to each
person who was detained and questioned.  No spelling errors were corrected,
but I probably made a few when I typed this in.  Oh well.


TOWN of GREENBURGH POLICE DEPARTMENT
WESTCHESTER COUNTY, NEW YORK
ORDER OF SEARCH AND SEIZURE
-----

 ( signed here by Det. Hugh F. Gallagher #103)
----------------------------------------------

JUSTICE COURT, TOWN OF GREENBURGH
WESTCHESTER COUNTY, NEW YORK                                    ORDER
                                                                -----
IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard
THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF:  (Specify)

Computers               Disketts                        Computer Printers
Computer Terminals      Auto Dialers                    Disketts
Calling Card            Computer Systems & Wire
Computer Printouts      Disk Drives
Modems                  Hand Written Notes About Credit Co.
                          "    "      "      "   Computer Service.
______________________________________________________________________X

IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK

TO:  ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT

PROOF by affidavit having been made before me this day by Det.H.Gallagher #103
____________(Affiant) of the Town of Greenburgh Police Department that certain
property, which is (stolen/unlawfully possessed, used to commit an
offense...) and which constitutes evidence and tends to demonstrate that an
offense has been committed and that a particular person participated in the
commission of an offense will be found at the location captioned above.

YOU ARE THEREFORE COMMANDED,



TO MAKE A SEARCH of the above described (location/person)** for the following
property:  (describe fully)

  Room # 233, 237, & 246 of the West. Marriott Courtyard
  and all its occupants as listed on this attached affidavit.
             >><< Suspects name was written here >><<

AND if any such property is found, you are hereby directed to seize the same
and without unnecessary delay, return it to the court, together with this
warrant and a written inventory of such property subscribed and sworn by you.

THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1 day of
NOV. 1992 is valid and must be executed no more than ten (10) days after the
date of issuance.

                                        << illegible justice's name here >>
                                        _____________________________________
                                        Justice Name              Signature

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [2]: Caller Id Availability
              By: Mercenary

 Whose Got caller Id,

  Im sick and tired of reading messages about who does and who doesn't, so its
 time to set the record straight.

  Now here we go, these are the states that have up and running Caller Id
  Service,

  ALABAMA   INDIANA       MAINE          NORTH DAKOTA   VERMONT
  DELEWARE  IOWA          MICHIGAN       NEBRASKA       WEST VIRGINIA
  FLORIDA   KENTUCKY      MINNESOTA      OKLAHOMA
  GEORGIA   LOUISIANA     NEVADA         SOUTH CAROLINA
  IDAHO     MASSACHUSETTS NEW JERSEY     TENNESSEE
  ILLINOIS  MARYLAND      NORTH CAROLINA VIRGINIA


  Service is currently pending in these states,

  CALIFORNIA    NEW YORK  WASHINGTON WYOMING
  CONNECTICUT   OREGON    WISCONSIN

  NO Service is available in,

  ARIZONA      TEXAS  NEW MEXICO   COLORADO       MISSOURI
  ARKANSAS     OHIO   PENNSYLVANIA NEW HAMPSHIRE  KANSAS
  MINNESOTA    UTAH   SOUTH DAKOTA MONTANA        ALASKA
  HAWAII
  RHODE ISLAND


 Now for the truth on Caller Id Operation,

 1. A Caller Id phone or box will show the information for every call WHERE
   THE INFORMATION IS AVAILABLE, If the the call comes from another area,
   where Caller ID has not yet been approved, or from an area that is not
   connected to your area's service, the display will read "OUT OF AREA".


 2. If a caller pays for the block-out service and prevents information from
   being transmitted, "PRIVATE" will appear on the display.


 I hope this sets the record straight....

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [3]: Crystal Source
              By: Saint Anarchy

  For those of you trying to modify a Rat Shack (Radio Shack) auto-dialer
 Part Number: 43-141, from the Sanctuary Phile or Similar text file
 floating around.
  A good source for the 6.5536 MHz Crystal is  the Digi-Key Corporation
 call them at 1-800-344-4539 (1-800-DIGI-KEY).
  The crystal can be found in catalog #926 on page 116, Digi-Key Part Number
 X018, Pricing is as follows...

                        1 - 1.51
                       10 - 12.60
                      100 - 100.80

 Hope this helps those of you I've seen on the boards looking for a source
 of this crystal,

                   Saint Anarchy/IIRG


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [4]: FOR THE PEOPLE
              Supplied By: Bulletin Boards Across the Country
              Edited by: Mercenary

-------------------------------------------------------------------------------

 Part 1:
             DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES


               DIGITAL EQUIPMENT CORPORATION ANNOUNCES
           ITS INTENTION TO CLOSE MANUFACTURING FACILITIES
        IN SPRINGFIELD, MASSACHUSETTS AND BURLINGTON, VERMONT



 MAYNARD, Mass. -- October 29, 1992 -- Digital Equipment Corporation
 informed its employees today that it intends to close its
 manufacturing facilities in Springfield, Massachusetts and
 Burlington, Vermont. There will continue to be Sales and Services
 facilities in both cities.
     The process for the plant closings, which will affect
 approximately 320 employees in Springfield and 350 in Burlington,
 will be a gradual reduction of the workforce over the course of six
 months. It is expected that the process will be complete by April of
 1993.
     The details for closing the plants were outlined today to
 employees in group meetings. Digital will offer the affected
 employees a number of benefits including a financial support package
 based on years of service to the corporation; continuation of
 medical, dental and life insurance for a specified period; and
 professional outplacement assistance.
     Edward B. McDonough, vice president, Manufacturing and
 Logistics for Digital, said, "The computer industry has been going
 through a period in which technology has advanced by orders of
 magnitude, increasing the efficiency with which products can be
 manufactured.

     "The movement of computing power to semiconductors; the shift
 in demand to high-volume, low-margin commodity products; and the
 decreased demand caused by a soft worldwide economy has left
 Digital, and other companies in our industry, with excess worldwide
 manufacturing capacity. For over three years, the corporation has
 been restructuring its manufacturing function to adjust to the new
 capacity needs by eliminating redundancies and divesting in areas
 where we cannot clearly differentiate ourselves in the market."
     McDonough continued, "Manufacturing will remain a core
 competency for Digital. Our goal is to position manufacturing
 capacity to best serve our customers worldwide and to optimize the
 utilization of our assets. It is on the basis of this strategic
 intent -- and not an issue of quality of work -- that the decision
 was made to close the Springfield and Burlington plants. Both plants
 and their employees have held an important place in Digital's
 history."
      The disposition of the two sites, which are owned by Digital,
 has not yet been determined. The corporation is currently working
 with state and local governments, as well as outside organizations,
 to find external alternatives for the plants.

------------------------------------------------------------------------------

 Part 2:
                FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE

                               By Steve Higgins

  A broad flank of computer industry and public policy groups is
 rallying in a renewed attempt to thwart an FBI proposal to limit the
 security of electronic communications.
  The U.S. Congress adjourned last month without considering a bill embodying
 the FBI's so called "Digital Telephony Proposal," which seeks to force
 vendors and end users of communications equipment to ensure the FBI's
 ability to tap their communications networks.
  "But they will probably do it next year," said David Banisar, a policy
 analyst for Computer Professionals for Social Responsibility (CPSR)
 in Washington.
  That likelihood has generated a round of vehement opposition from an
 unlikely consortium:  industry vendors including IBM and Sun Microsystems
 Inc., professional groups such as the Electronic Frontier Foundation and the
 CPSR, and watchdog organizations including the American Civil Liberties
 Union.
  If the proposal becomes law, "it will require that every system from
 AppleTalk LANs up have multiple, redundant systems to let the FBI tap
 them," Banisar said.
  In its proposal, the FBI suggests levying daily fines on vendors and
 users of equipment that do not comply.
  "We have to have the technical capability, or we are out of the business
 of wiretapping," said Keir Boyd, deputy assistant director of the FBI's
 technical services division in Washington.  "We are not willing to back
 off on the compulsory part."
  Those opposed say the FBI's plan would cost U.S. industry money by
 requiring that vendors and users retool existing products. The opponents
 also say that the plan would hinder U.S. competitiveness by preventing
 American companies from developing advanced communications equipment
 and that it would pave the way for groups other than the FBI to tap
 private communications.
  "We are moving [to] a society where E-mail communications and video
 conferencing are the norm," said. Whitfield Diffy, a cryptography engineer
 at Sun in Mountain View, Calif.
  Diffy said that if the FBI proposal is passed, privacy will be virtually
 non-existent and "democratic government and free life could be swept
 away."
  All that, members of the opposition say, is not worth the value of the
 estimated 600 to 800 wiretaps that the FBI conducts each year.'
  Next year, the rhetoric is likely to rise as Sen. Patrick Leahy (D-VT)
 and Rep. Jack Brooks (D-Texas) formally consider the proposal for inclusion
 in a congressional bill .
  But, for its part, the CPSR isn't waiting until the next Congress to take
 action. The group recently filed a request under the Freedom of Information
 Act for the FBI's reasoning behind the proposal.
  Meanwhile, CPSR and other members of the consortium are still talking to
 the FBI to head off what they consider an extreme proposal.
  "We always offer to be helpful, to see if there are any less Draconian
 solutions," said John Podesta, a consultant at the Electronic Frontier
 Foundation, a lobbying group of industry professionals in Washington, who
 said meetings with the FBI are "always cooperative."
  But, Podesta added," [the FBI] still always seems to say,'We won't back
 off of this legislation.' There will be a fight next year."

-------------------------------------------------------------------------------

 Part 3:
                    PUMP-CON BUST RUMORS FLY

  Actually, here is what I heard about Pumpcon:

  They had multiple terminals set up hacking cards and systems.  The manager
 came to the door and told Randy that there was a noise complaint.
  Just as Randy was starting to talk to the manager, the Feds, AT&T security
 and various other organizations busted into the room.
  They Rounded up 35 people, some of which are still in jail because they
 couldn't make bail.  The case is a now federal one, having been turned over
 to the FBI.
  I've also heard that AT&T and the FBI want to turn this case into an example.
 It is already high profile in the NY/CT area from what I understand, and
 those out on bail have already received messages from reporters.
  It would seem to me that the noise complaint was just bullshit to get them
 to open up the door.
  Now the question that comes to mind is how did the FBI, AT&T security and
 everyone else coordinate so quickly and bust this hotel room?
  Well, speculation is (as always) that someone dropped a very big dime on
 Pumpcon.
  There is also speculation on who did it.  Right now the leader in
 the polls is No Name Brand.
  NNB has friends in Metromedia and AT&T security.
 Keep in mind that he was busted not too long ago and returned to hacking in
 record time.
  His excuse for not showing up?
 According to him, his ride (Orion) screwed him over and left him.
  Another possibility kicked around was that Phiber did it to receive a break
 on his upcomming sentencing but most people aren't going for this one.
 Most are going the NNB route.
  Randy's phone is tapped.
  Night Ranger reportedly got away (he and Spicoli supposedly carded their
 room and $110 worth of pizza).
 All this info is second generation from Randy S. Hacker.  Believe what you
 want, make your own conclusions.
  Thirty five people...they didn't have enough cells for them all and
 supposedly questioned them for 10 hours.  In my opinion, someone dropped a
 dime on them.  It is also my opinion that NNB was that person.
  He is just the type of self-serving, vindictive, egotistical little fuck
 to pull a stunt like that.

-------------------------------------------------------------------------------

 Part 4:
                      RESPONSE TO PUMP-CON RUMORS

                     THESE RUMORS ARE NOT TRUE!!!!

  Yes, there were computers there.  NO! they WERE NOT set up to hack cards and
 systems!
  People were playing games on them, and a few people were calling out at
 various times.  The FBI was **NOT** there.  AT&T security WAS there though.
  The case has NOT been turned over to the feds - it's still a local thing,
 and will hopefully stay that way.  Only 4 people were arrested, 3 of whom are
 out on bail, 1 had an outstanding warrant and was being shipped back to his
 home state.  He had no bail set.  I talked to Randy myself, just got off the
 phone with him.
  He set me straight on a LOT of things.  There are a LOT of places where the
 cops possibly screwed up, which may help the defense.  No one knows as of yet.
  The charges are apparently are "Illegal use of a computer"  and "Computer
 trespass".  There may be more charges added at a later time, and there may be
 charges dropped.  It's too early to tell.  AT&T said there was an 800 system
 in GA which was hacked "by SOMEONE in that room" and that apparently set off
 flags all over.  *I* personally know of NO such thing, OR system,and neither
 did a few others I talked to.  I DO know for sure that whatever was done, it
 wasn't Randy's fault; I didn't once see him behind a terminal.  I believe to
 that it was a setup - PumpCon was HIGHLY announced, and there were a few who
 could have benefitted from "ratting" on it.
  I don't know who those people are, nor will I point any fingers.
 But I guarantee you the person, if any, who set up PumpCon will wish someday
 that he hadn't.  Anyway, I wanted to post this to clear up the rumors that
 are starting.  I know I can't control them all, but some of this shitis
 getting WAY out of hand.

                                      246
                                   +  233
                                   +  237
                                 ----------
                                      103

                 (PumpCon addition....  3 rooms = 1 badge #)

             The Bash... The Bullshit...The Bust... PumpCon '92.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [5] The Rumor Mill (Unconfirmed rumors from the Underground)
             Edited By: Mercenary

 Part (1) : RONALD PINZ (VICTIM or RAT FINK)

 In Phantasy Magazines Issue #9 Rumor Mill section, an anonymous user
 found this file pertaining to Robert Pinz and has drawn these
 unvalidated (as of yet) conclusions,

-------------------------------------------------------------------------------

 The Following information, (EDITED) has been circulating up in the New England
 area of operations. The file has been validated as legal as the individual
 named is known to have turned in The Purgatory BBS for having semi-legal
 posted material.

 Real name     : Ron Pinz (Ronald Pinz)
 Handles Used  : IXOM
 Past Handles  : Dr. Disk,Bazooka Bill
 Sex           : Male
 Age           : 21
 Birthdate     : 06/28/71
 Phone Numbers : 203-(EDITED)
               : 203-(EDITED)
 Address       : (Edited)
 City/State    : Wallingford, Ct.
 Zip code      : 06492

 Biography:

 After being thrown out of the military service for computer hacking while
 on duty, Its believed that Ronald is now trying to court favors from AT&T
 for a $50,000 job in New Jersey by turning in phreakers and hackers.
 It is already officially confirmed that Ron has turned in one BBS and
 is now setting sites on other BBS's. Its too bad he doesn't know about
 AT&T's policy of not hiring hackers as they figure that an ex-hacker
 employee cannot be trusted,we urge you to delete him from your system
 if you have any files that are not public domain.

-------------------------------------------------------------------------------
 I (EDITED), find it most interesting that this phile was circulating right
 before the Pump-Con Arrests, because in CUD 4.55 we find,
-------------------------------------------------------------------------------

Date: Tue, 03 Nov 92 03:00:44 EST
From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen)
Subject: File 4--Computer Access Arrests In NY (NEWSBYTES reprint ((CR))

 GREENBURGH, NEW YORK, U.S.A., 1992 NOV 3 (NB) -- The Greenburgh, New
 York Police Department has announced the arrest of three individuals,
 Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18
 for the alleged crimes of Unauthorized Use Of A computer and Attempted
 Computer Trespass, both misdemeanors. Also arrested was Jason A.
 Britain, 22  in satisfaction of a State of Arizona Fugitive From
 Justice warrant.

 The arrests took place in the midst of an "OctoberCon" or "PumpCon"
 party billed as a "hacker get-together" at the Marriott Courtyard
 Hotel in Greenburgh. . The arrests were made at approximately 4:00 AM
 on Sunday morning, November 1st. The three defendants arrested for
 computer crimes were granted $1,000 bail and will be arraigned on
 Friday, November 6th.

 Newsbytes sources said that the get together, which had attracted up
 to sixty people, had dwindled to approximately twenty-five when, at
 10:00 Saturday night, the police, in response to noise complaints
 arrived and allegedly found computers in use accessing systems over
 telephone lines.  The police held the twenty-five for questioning and
 called in Westchester County Assistant District Attorney Kenneth
 Citarella, a prosecutor versed in computer crime, for assistance.
 During the questioning period, the information on Britain as a
 fugitive from Arizona was obtained and at 4:00 the three alleged
 criminal trespassers and Britain were charged.

 Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes
 that the investigation is continuing and that no further information
 is available at this time.

(Barbara E. McMullen & John F. McMullen/19921103)

-------------------------------------------------------------------------------

  Now we find that Ronald Pinz has been arrested at Pump-Con, what better way
 than to court favors from AT&T than to attend a hackers conference, let
 people incriminate themselves and than have the police barge in an arrest
 you and the others. Ive heard AT&T security was there, Now doesnt that make
 you folks out there wonder? Lets see what happens to Mr. Pinz in court.

-------------------------------------------------------------------------------

 Part (2) : BERLIN BUSTS REPORTED


  Bad news from Berlin, on Wed. Oct 25th,twelve mailboxes,25 machines,and
 some thousand floppies were seized. People are charged for distributing
 pirated software. The local DA refuses to give further information.
  But the real thing is, some sysops couldnt resist to keep track of TOO
 MUCH INFORMATION, not only names,telephone numbers,and addresses, but even
 precise logs of who downloaded which software.
  Authorties are believed to be planning on prosecuting users who downloaded
 copyrighted materials.

-------------------------------------------------------------------------------

 Part (3) : WINDYCON

 To: All
 Subject: come hither

          This weekend only, at the Woodfielf Hyatt in Schaemburg..

                               WINDYCON!!!!

       See all manners of various freaks..a must see...

        We, the prestigous, will be there, feel free to attend..

                                          Cecil Adams
                                          Board Pariah

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [6]: PHANTASY TIDBITS: News and Views of Interest

-------------------------------------------------------------------------------

 Part 1: Police Officials Cited for Searching Private Computer Records

  Los Angeles (AP, 30 Oct 1992) More than 45 police officials have been
 cited since 1989 for using department computers to check the backgrounds
 of baby sitters,house sitters, and others for personal reasons.
  "Its a very serious problem", Police Commissioner Ann Reiss Lane Said
  The citations came to light after a civilian Police Commission investigator
 was suspended 10 days for using department computers without permission to
 get confidential data on White Supremacist Tom Metzger and actor Arnold
 Schwarzenegger.
  The union representing Robert Bauman appealed the suspension and submitted
 records showing that more than 45 department employees had been disciplined
 in the last three years for illegal computer use.
  Most recieved suspensions of two or three days or verbal reprimands.
 As an example, Lane said Thursday, an officer might use the computer to check
 the background of an individual about to marry one of the officers relatives.
  Bauman's 1--day suspension without pay was upheld last week by the Civil
 Service Commission. Bauman, a 23-year civilian employee, said he already
 has served the suspension and was back at work. Bauman a permit processor
 routinely uses police computers to check the criminal records,police files,
 and tax records of people apply for police permits for massage parlors, gun
 stores and pawn shops.
  He said he gathered information on Metzger because he is a part-time
 historian who does research on right-and left-wing political groups.
  Bauman said he tapped into Schwarzeneggers files because a co-worker
 was curious about the actor.


 IIRG NOTE: Another case of the Police getting there wrists slapped.
            Had this been a hacker he would have been screwed

-------------------------------------------------------------------------------

 Part 2: Subject: Call for Papers - The Third International Virus
                               Bulletin Conference

                      Amsterdam, 9th-10th September 1993

 Call for Papers

  The International Virus Bulletin Conference is the largest and most
 prestigious annual event to address the computer virus threat in
 Europe. The 1992 conference, held in Edinburgh, attracted over 200
 delegates and 23 speakers, from more than 20 countries.

  Abstracts of between 200 and 500 words outlining prospective papers
 for presentation at next year's Virus Bulletin conference are duly
 invited from all parties engaged in any capacity in combating the
 computer virus threat.

  Papers will be selected for their originality and appeal to a diverse
 audience comprising corporate computer security staff, PC support
 specialists, hardware and software developers, government, military,
 public sector and corporate IT managers, researchers and others engaged
 in devising technical and procedural countermeasures.

 Papers covering the following topics are particularly welcome:

     *       Case studies of genuine virus outbreaks.

     *       Post-attack recovery: tools, techniques and lessons learned.

     *       Evaluation methods and protocols for testing anti-virus software.

     *       Running a virus help desk.

     *       Protecting file servers.

     *       Dealing with viruses in compressed software.

     *       What should be in a virus hunter's toolkit?

  The conference will be held in two streams: stream one will address the
 management of the virus threat, while stream two will concentrate on

  The conference will be held in two streams: stream one will address the
 Abstracts should be completed by December 1st 1993 and should be sent to the
 Editor, Virus Bulletin, 21 The Quadrant, Abingdon Science Park, Abingdon,
 Oxon OX14 3YS, UK. Fax +44 (0)235 559935.

-------------------------------------------------------------------------------

 Part 3: Landmark Software Decision

  Published in the San Francisco Examiner is the following legal decision on
                             disassembly of software

    "In the first binding ruling on the application of copyright law
     to a common process called reverse engineering, a federal appeals
     court said video game maker Accolade Inc. of San Jose could copy a
     video game system's code copyrighted by Redwood City-based Sega
     Enterprises Ltd. in order to design games for the Sega console.
     Reverse engineering is the parctice of taking apart a product to
     see how it works, and using the knowledge to design one's own
     product.  During the process, Accolade made a copy of Sega's
     encoded computer program, designed to exclude unlicensed game
     makers, in order to translate the information and extract the key
     to the code.  The Ninth Circuit Court of Appeal in San Francisco
     said the copying did not violate Sega's federally protected
     copyright on it's software package.  The court said Sega's
     exclusive rights over it's own programs did not entitle it to
     Enterprises Ltd. in order to design games for the Sega console.
     Reverse engineering is the parctice of taking apart a product to
     see how it works, and using the knowledge to design one's own
     product.  During the process, Accolade made a copy of Sega's
     encoded computer program, designed to exclude unlicensed game
     makers, in order to translate the information and extract the key
     to the code.  The Ninth Circuit Court of Appeal in San Francisco
     said the copying did not violate Sega's federally protected
     copyright on it's software package.  The court said Sega's
     exclusive rights over it's own programs did not entitle it to
     prohibit another company from learning how the Sega system worked
     and designing games that would fit it, as long as those games
     did not copy Sega games."

-------------------------------------------------------------------------------

 Part 4: SIXTH INTERNATIONAL COMPUTER SECURITY & VIRUS CONFERENCE
                               and Exposition

          sponsored by DPMA Fin.Ind.Chapter in cooperation with
ACM-SIGSAC, BCS, CMA, COS, EDPAAph, ISSAny, NUInypc, IEEE Computer Society

        C A L L                 F O R               P A P E R S

Approximately 500 attendees will hear 90 speakers and 53 vendors over 3 days
Wednesday thru Friday - March 10-12, 1993 - New York Ramada Madison Square

YOUR AUDIENCE:

            Past attendees have represented industry, military
            government, forensic and academic settings -
            creators and users of related software and hardware.

            They travel from U.S. and many international locations
            and have titles such as MIS Director, Security Analyst,
            Operations Manager, Investigator, Programming Leader

TOPICS OF INTEREST INCLUDE (but are not limited to):

            - prevention, detection, and recovery from viruses,
                crackers, and other unauthorized usage
            - oritinal research in these and related topics
            - survey of products and techniques available
            - particulars of LSN, UNIX, cryptography, military use
            - Computer crime, law, data liability, related contexts
            = US/international sharing of research & techniques
            - case studies of mainframe, pc &/or network security, e.g.,
                - 1992 hurricane, flood, fire disaster recovery
                - recent court decisions
                - security implementation and user awareness in industry

PAPER SUBMISSION:

            Send a draft final paper for receipt by Wednesday, 11/11/92.
            Address to Judy Brand, Conference Chair, box 6313 FDR Station,
            New York, NY 10150, USA.  Please include a small photo and
            introductory bio not exceeding 50 words.  Successful submittors
            or co-authors are expected to present in person.  Presenters
            receive the Conference Proceedings and complimentary admission.

PAPER FORMAT:

            Send one original and three copies.  When making the copies,
            please cover over the author name(s) and other identifying data.
            Each paper goes to three revieweers.

            Type double spaced, with page# below bottom line (may be
            handwritten):  TITLE (caps); Name; Position, Affiliation;
            Telephone, City/State/Zip, Electronic Address (optional).

NOTIFICATION:

            Written and (where practicable) telephoned confirmation will
            be initiated by Monday, 1/13/93, to facilitate low cost travel.
            Those needing earlier notification should attach a note.

            You may be asked to perform specific revisions to be accepted.
            Nobody can guarantee you a place without an acceptable paper.

 AT THE CONFERENCE:

            There are five tracks.  Time your presentation to last
            40 minutes and have clear relation to your paper.  A committee
            member will preside over your assigned room and adhere to schedule.

            Don't hesitate to submit a presentation you've given elsewhere
            to a more specialized audience.  Most attendees will find it
            please cover over the author name(s) and other identifying data.
            Each paper goes to three revieweers.

            Type double spaced, with page# below bottom line (may be
            handwritten):  TITLE (caps); Name; Position, Affiliation;
            Telephone, City/State/Zip, Electronic Address (optional).

NOTIFICATION:

            Written and (where practicable) telephoned confirmation will
            be initiated by Monday, 1/13/93, to facilitate low cost travel.
            Those needing earlier notification should attach a note.

            You may be asked to perform specific revisions to be accepted.
            Nobody can guarantee you a place without an acceptable paper.


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [7]: IIRG Distribution Sites
              (or Gateways to Oblivion)



                   //////    //////     ///////     ////////
                    //        //       //    //    //
                   //        //       ///////     //   ////
                  //        //       //    //    //     //
               ////// *  //////  *  //     // * /////////




    IIRG World HQ:           Dark Shadows
                             19.2/9600 Baud HST
                             24 Hours a Day
                             1.2 Gigs Online
                             Sysop: Anubis
                             2 Nodes
                             (203)-628-9660


   IIRG Distribution Site 1: Wired World BBS
                             INC Europe
                             TPC Courier (WHQ)
                             THP
                             IIRG Distribution Site
                             Sysop: Digital Justice
                             +39-89-254138

   IIRG Distribution Site 2: Cyberdyne Network Germany
                             United Forces
                             Sysop: E605
                             +49-5341-59004
                             +49-5341-54052


   IIRG Distribution Site 3: The Sanitarium
                             Sysops: Morbid Angel [INC/ACID]
                                     Spectral Illusion [ACID/RAZOR]
                             IIRG Distribution Site
                             ACID Member Board
                             INC Courier Board
                             RAZOR 1911 Courier Board
                             VISA World Headquarters
                             (817)PRI-VATE

   IIRG Distribution Site 4: The WareHouse
                             (203)-231-8589 14.4
                             (203)-231-8588 9600
                             OVER A GIG ONLINE
                             Sysop: Ionizer


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [8]: Phantasy Distribution Sites

 Phantasy's Distribution Site's are continually growing,we apologize if you
 called a board and didn't find the Mag. Network Distribution Sites will
 have the Issues first, we suggest calling one of them if a problem does
 arise.


  1. Lightning Systems
     (414) 363-4282
     Sixty Million Bytes OnLine
     USRobotics Dual Standard HST/V.32bis
     2400 thru 14.4k v.32bis/HST

  2. Sycamore Elite
     19,200-1200 Baud HST, 24 Hours a day
     (815) 895-5573

  3. The Works BBS at (617-861-8976)
     Largest Text Files BBS in the world, 3500+ text files online.
     2400-300 Baud, 24 Hours a day

  4. Pipers Pit BBS
     19,200-9600 HST ONLY!!
     24 Hours a Day
     THG Distro Site 1300 Megs
     (203)PRI-VATE [2 Nodes]

  5. Blitzkrieg BBS                  TAP Magazine
     (502)-499-8933                  P.O. BOX 20264
     Home of TAP MAgazine            Louisville,KY. 40250-0264

  6. The Dickinson Nightlight
     (713)-337-1452
     Der WeltanSchauung Distro Site (World View Magazine)
     Phantasy Distro Site


  PHANTASY is also available on:

             1. RIPCO BBS   (312)528-5020
             2. KRACKER BOX (303)438-1481

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                       PHANTASY(C) IIRG 1991,1992
                        May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-