💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › PHANTASY › phant14.txt captured on 2022-06-12 at 13:56:13.

View Raw

More Information

-=-=-=-=-=-=-


      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
      =                                                               =
      -              WELCOME TO THE FOURTEENTH ISSUE OF               -
      =                                                               =
      -                        -=>PHANTASY<=-                         -
      =                                                               =
      -               A PUBLICATION AND NEWSLETTER OF                 -
      =                                                               =
      -                             THE                               -
      =                        INTERNATIONAL                          =
      -                         INFORMATION                           -
      =                          RETRIEVAL                            =
      -                            GUILD                              -
      =                                                               =
      -        Hacking,Phreaking,Anarchy,Survivalism,Commentary       -
      =                                                               =
      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

         Volume Number Four,Issue Number Fourteen Dated 02/06/93
               Editor is Mercenary : mercenar@works.UUCP

             Article Submissions: The Mercenary/IIRG
                                  862 Farmington Avenue
                                  Suite 306
                                  Bristol,Ct 06010

             Phantasy Headquarters BBS: The Rune Stone
                                        14.4K HST
                                        Invitation Only
                                        All H/P/A, 2500+ Files
                                        (203)-PRI-VATE

           IIRG World Headquarters BBS: Dark Shadows 
                                        19.2/9600 Baud HST
                                        1.2 Gigs Online
                                        (Down at this Time)


        Table of Discontents:

          
          [1] Phantasy Distro Sites Needed
              By: IIRG
              
          [2] Rune Stone BBS Information
              By: Mercenary
              
          [3] "Operation Gray Chip Completed"
              By: Knight Hack
                           
          [4] FOR THE PEOPLE
              Supplied By: Bulletin Boards Across the Country
              Edited by: Mercenary

                1. Blitzkrieg BBS Goes Down!
                2. AT&T Smart Card Voice Prints Increase Security of NCR ATMs
                3. DEA Security - Not That Secure!

          [5] The Rumor Mill (Unconfirmed Rumors From the Underground)
              Edited By: Mercenary

                1. Possible Loser Alert?
                2. IBM Working on Super Drive?
                3. Grim Reaper of TDT a Narc? (So says Pepsi Man)

          [6] PHANTASY TIDBITS: News and Views of Interest
                    
                1. Cellular Highway Robber
                2. Phantasy Makes Honorable Mention
                3. Wired Magazine Premieres
                4. TIME Magazine Article
                5. FREE Virtual Sex Poster
                6. NCSA FREE Book Offer
                7. Information Requests
                  
          [7] Listing of IIRG Distribution Sites

          [8] Listing of PHANTASY Distribution Sites

          [9] IIRG Special Announcements

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

    OFFICIAL DISLAIMER...

    All information in PHANTASY is from USER contributed material
    The Publishers and Editors of PHANTASY and THE IIRG disclaim
    any liability from any damages of any type that the reader or
    user of such information contained within this newsletter may encounter
    from the use of said information. All files are brought to you for
    entertainment purposes only! We also assume all information infringes
    no copyrights and hereby disclaim any liability.

    PHANTASY is (C) 1990 by The IIRG
    IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 
 Section [1]: Phantasy Distro Sites Needed
              By: IIRG


                   //////    //////     ///////     ////////
                    //        //       //    //    //
                   //        //       ///////     //   ////
                  //        //       //    //    //     //
               ////// *  //////  *  //     // * /////////
             
                           ATTENTION ALL SYSOPS
                           --------------------

      The International Information Retrieval Guild is looking to expand
     its distribution network in 1993. We would prefer BBS's that mainly
     cater to the Hack/Phreak/Anarchy Underground.
      Two Forms of distribution are currently available to those sysops
     who choose to participate and meet certain criteria.
      
                       1. Phantasy Magazine Distribution
                       2. Complete IIRG File Distribution

      1. Phantasy Distribution

         Phantasy is the IIRG's Online Newsletter/Magazine for the
         H/P/A community. Phantasy Distribution for your bbs means
         that all new Issues of Phantasy will be uploaded by a courier
         to your BBS within 12-24 Hours of its release date.
         Your only responsibility is to provide a File area.

       2. IIRG File Distribution

          The IIRG Archives contain a vast wealth of information
         gathered over the years from the underground. IIRG file
         distribution will provide you with a courier and file list.
          Your responsibility will be to edit the file list to your
         tastes or Needs and provide it to your courier.
          Over a short period of time the courier will provide the 
         files you've selected.

       
           As always this is a free service from the IIRG at no
          cost to you, the sysop.

           LIMITATIONS: The IIRG has no overseas couriers at this 
           time, Overseas Sysops will be provided with a No Ratio,
           No Limit Account at an IIRG Distro Site and will be
           responsible for there own distribution until a 
           courier can be provided.


          The IIRG May be Contacted Through Mercenary at:

                           mercenar@works.UUCP

          or by Snail Mail at:


                            Mercenary/IIRG
                            862 Farmington Ave.
                            Suite 306
                            Bristol,CT. 06010
                          

                              -=THE IIRG=-

-------------------------------------------------------------------------------

 Section [2]: Rune Stone BBS Information
              By: Mercenary

 
 Well Folks, I've got good news and I've got bad news.....

 First the bad news, The Rune Stones public line will not be installed most 
 likely until May of 1993. This is due to the fact that I'm moving again.
 For those IIRG Members with access to the private line, please note that
 that the number will be changing. Please pick up the newest member package.
 My move is prompted by the current economy, hence where the money is, so am I.
 So whem Im settled in at my new location, so will the Rune Stone.
 
 Now the good news...

 The Rune Stone BBS number will be made generally available to all readers of
 Phantasy and when you log-on and become a Validated user,you will have
 access to over 3000 H/P/A Text Files.
 
 Please note that due to my changing locations, the next several Issues of
 Phantasy may be slow in appearing as I'll be busy and wont have much time
 to devote to the magazine till after the move.

                               Thanks for the Help and Support

                                       Mercenary/IIRG

-------------------------------------------------------------------------------

 Section [3]: "Operation Gray Chip Completed"
               By: Knight Hack


                       OPERATION GRAY CHIP COMPLETED

  The FBI,US Customs Service,and Internal Revenue Service along with
 detectives from Santa Clara,San Jose,and Fremont California have just
 completed a four month sting operation code-named "Operation Gray Chip".
  Undercover agents and detectives reportedly bought and sold allegedly
 stolen semiconductors and computer parts on the "Gray" Market.
  The sting operation targeted brokers and dealers in California,Taiwan,
 Argentina, and Singapore. Most of these dealers have reportedly been 
 selling parts to legitimate computer companies in the United States and
 Far East for years. Some 30 "Gray" Market brokers have been arrested
 as a result of the sting operation.
  The sting operation is said to have been designed to send a message to
 those who purchase semiconductors,disk drives, and other parts from less
 than legitimate sources According to Sgt. Paul Kirby of the Santa Clara
 Police Department.
  Those individuals arrested have been charged with criminal conspiracy,
 and multiple counts of attempted receipt of stolen property. Names of 
 those arrested and the companies involved are expected to be released 
 soon.
  Parts for the sting were provided by Intel,Quantam Corp,and Conner 
 Peripherals,along with other well known companies. The sting involved 
 sales by undercover agents to brokers who thought they were getting a 
 deal because the merchandise was HOT.
  More than 2 Million in Cash and 1.55 Million in parts were confiscated
 over the 4 month duration of the operation.
 
-------------------------------------------------------------------------------

 Section [4]: FOR THE PEOPLE
              Supplied By: Bulletin Boards Across the Country
              Edited by: Mercenary

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

            %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
            %                                                    %
            %                The end of Blitzkrieg               %
            %                                                    %
            %          Transcribed by Phantasm [01/09/93]        %
            %                                                    %
            %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

The following text is transcribed from a message which was left on Predat0rs 
answering machine at 502-499-8933.

Hello, this is John or Predat0r the former SysOp for Blitzkrieg BBS. I'd like 
to say as of the 12th of January, 5.00pm, 502-499-8933 will no longer be an
active line which means the system's gone.

When I get a new line and a new number I'll put it on Pentavia, Ripco, other 
real popular boards like that. I'd like to say thanks for everybody who
supported the system while it was up.

From February of 1990 to January 1993 it had 27,834 callers. The last official 
user to call was Sinister Solution.

I'd like to say when the new system goes back up it'll be bigger, better and 
even more underground than it was now.

I officially retire as Predat0r and I officially retire Blitzkrieg. So when the
 new system goes up, I'll have a new handle and a new name for the board.

If you need to get in touch with me, use the post office box, there still good 
and if you want my new voice number you'll figure out how to get it.

Stay free and I'll see you all again real soon...


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


                 FOR RELEASE TUESDAY, DECEMBER 8, 1992

        AT&T SMART CARD VOICE PRINTS INCREASE SECURITY OF NCR ATMs

     SAN ANTONIO, Texas -- NCR Corporation and AT&T Smart Cards
have demonstrated a prototype of a new generation of automated
teller machines (ATMs) they are developing that will use AT&T's
contactless smart card technology to offer customers additional
services, like a security system that works by verifying the
cardholder's voice print.
     The prototype and several potential applications of the new
terminals are being shown at the Retail Delivery Systems Con-
ference here this week.
     The two AT&T units also announced that AT&T's smart card
readers can be connected to NCR's point of sale terminals, and
that they will begin working with banks to develop new smart
card-based applications that will run on ATM and point of sale
machines.
     NCR, a unit of AT&T, is the world's largest supplier of
ATMs.  AT&T Smart Cards is a leading supplier of contactless
smart cards and applications.
     AT&T contactless smart cards look like other bank cards--
they're the same size and just as thin--but they have
microprocessors and memory chips laminated within their plastic
shells.
     Developed at AT&T Bell Laboratories in the United States,
their electronic memory can hold the equivalent of several pages
of typewritten information, personalized to the card's user.
     That data is accessed by a reader/writer device, which, in
addition to being installed in an ATM, can be connected to a cel-
lular or wired telephone, personal computer, automobile (for
electronic toll collection), or other device.  Because the reader
has no moving parts, it is more reliable than contact-card
readers.
     "Our smart card can be viewed as a secure, portable, per-
sonal database that will provide banking customers with enhanced
security and a broad spectrum of new services," said Diane
Wetherington, president of AT&T Smart Cards.
     {familiar ATM into a new kind of financial transaction
station," said Jim Adamson, vice president of NCR Self-Service
and Financial Systems Division in Dundee, Scotland.
     "One obvious benef{ion beyond PINs (per-
sonal identification numbers), which a thief might be able to
find out.  For example, one of the demonstrations at the Retail
Delivery Systems Conference will be a voice-based security system
that works by comparing the cardholder's voice print with one
stored on the card.  Unless the two match, access to the account
is denied.
     "But that's just the beginning," Adamson adds.  "Since much
of a customer's account information is stored on the card, he or
she doesn't necessarily need to go to an ATM if all they need to
do is check that information.  You can use a personal computer
with a smart-card interface, for example, or a similarly equipped
public telephone.
     "Of course, security features on the card will prevent users
from changing the information on the card when they are not
linked to their bank's computer network."
     When customers do go to an ATM, they are given customized
menu options based on their account profile stored on their smart
cards.  This might even include offering them a connection to a
financial institution not normally on the ATM network, such as
a brokerage house where they have a money market account.
     In addition to convenience and security, another benefit of
using AT&T contactless smart cards with NCR's terminals, is that
a single card can be used for multiple applications--a solution
to consumer complaints about the proliferation of cards they need
to carry around.
     Using AT&T's communications network and NCR's installed base
as a backbone, AT&T can develop and deploy applications for a
variety of customers.  For example, a single card could serve as
an ATM card, an insurance information card, and a debit card for
making purchases in a store, placing phone calls, paying highway,
bridge and tunnel tolls, paying mass transit fares, and even
buying from vending machines.
     Funds for each of these uses can be transferred at any ATM
from the customer's bank account to the debit portion of the
card.  With a smart card reader/writer connected to an NCR point
of sale terminal, the consumer has access to a full range of pay-
ment options.
     AT&T smart cards also make it possible for ATMs to expand
beyond mere banking functions.  For example, "electronic tickets"
for airline travel, sporting events, plays, or concerts could be
purchased at an ATM and loaded onto the smart card.  The card
would then be accessed at the airport, stadium, theater or con-
cert hall.
     "The AT&T contactless smart card reader is a perfect example
of the potential for joint technology development between NCR and
AT&T," said Adamson.
     AT&T plans to make the smart card interface available to
other terminal developers, as well.
     NCR, an AT&T company, develops, manufactures, markets,
supports and services enterprise-wide information systems for
worldwide markets.
     AT&T Smart Cards, based in Bridgewater, New Jersey, is an
AT&T strategic business unit that develops and markets smart card
products and applications.
     The business does all of its development and manufacturing
in the United States (its factory is located in Little Rock, Ar-
kansas).  AT&T also has a cooperative agreement with Nippondenso
Co. to market smart card applications in Japan.
                            #   #   #
NCR is a registered trademark of NCR Corporation

ADDITIONAL BACKGROUND ABOUT AT&T'S SMART CARDS

     AT&T's smart card consists of an 8-bit microcomputer, and
features its own operating system, 3 kilobytes of electrically
erasable read-only memory (EEPROM), an asynchronous serial data
link, and a security system to prevent files from unauthorized
use.
     AT&T's smart card differs from other smart cards in several
important ways:
   o It uses a contactless interface to provide power to the card
     and to perform data transfer.  Other smart cards have ex-
     posed metallic contacts, which produce reliability problems
     with wear, contamination, and damage due to electrostatic
     discharge.  AT&T pioneered a design that allows the smart
     card to transmit data to a card reader without metal-to-
     metal contact.  The card transfers data by changing the
     charge on capacitive plates in the card and the reader.
   o The microprocessor uses a flexible, UNIX(TM)-like operating
     system designed specifically for AT&T's smart card.  Host
     computers or terminals can interact with the card using
     predefined, high-level software commands.
   o Security is also enhanced by the inclusion of a security al-
     gorithm.  Encryption, decryption and message authentication
     can be performed to facilitate secure transmissions over in-
     secure links to and from the host system or terminal.
   o The card's file management architecture allows a number of
     applications to reside on one card.  For example, in
     banking, one card can be used to hold information on a
     customer's checking, savings, loan, and line-of-credit ac-
     counts, while also storing biometrics, such as the
     customer's signature, voice and fingerprints for security.
     In addition, that same card can be used for travel or other
     applications.
   o The card has built-in security features.  Information stored
     on the card can be isolated in such a way that access to
     data in a particular file on the card can be limited to
     users authorized to access that portion of the card.  This
     allows different applications to reside on the same card
     without giving all handlers access to the entire database.
     AT&T smart cards are already being used in several ways:

ELECTRONIC TOLL COLLECTION
     Without stopping, drivers approaching a toll plaza insert a
smart card into a transmitter mounted on their dashboards.  In-
formation stored on the card is transmitted to the toll station
via radio link, and the cost of each toll is either debited from
a pre-paid amount on the card or recorded for billing later.

PENSION RECORD-KEEPING
     Italy's post office is now using a pension-administration
system supplied by Olivetti that uses AT&T's smart card as a
record-keeping device for pensioners.

COMPUTER SECURITY
     Other customers are using the AT&T smart card to limit ac-
cess to computer systems containing proprietary information.
Authorized users dial into the systems from their portable com-
puters, and the systems have been programmed to interface with
a smart card.  Without the card, the systems cannot be accessed.

BUILDING SECURITY
     AT&T has several applications in the U.S. and Japan in which
the smart card is used for employee identification and building
access control.
     But these are just the beginning.  The government could use
smart cards to replace printed food stamps, driver's licenses and
voter registrations.  And a medical smart card could provide a
physician with a patient's complete and up- to-date medical
record.  The same smart card can also store insurance information
in a separate file.  Having this information on a card would also
expedite admittance to a hospital.
     "The 1990s is a decade of customization," says Wetherington.
"Businesses will need to redesign the way information is gathered
and processed, in part because customers' definitions of ac-
ceptable service times and intervals are changing.
     In some cases, this will require reengineering where and how
products and services are delivered.  "Smart cards will
revolutionize personal and business information access and
processing by providing instant point-of-need transactions," she
said.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

                      DEA SECURITY - NOT THAT SECURE!

  The Government Accounting Office (GAO) has just released a new report
 titled "Computer Security: DEA is Not Adequatly Protecting Sensitive
 Drug Enforcement Data".
  It seems DEA Agents reguraly made standard Security Violations in the 
 areas of,

    1. Sharing Computer Passwords
    2. Left Passwords Taped to Terminals
    3. Used easily identifiable Passwords (Such as "DEA")
    4. Threw out Classified Materials in the Trash

  So for all you Console Cowboys hacking the DEA, times a Wastin
  these boys know nothing of proper security procedures!

-------------------------------------------------------------------------------

 Section [5]: The Rumor Mill (Unconfirmed Rumors From the Underground)
              Edited By: Mercenary and Anubis

-------------------------------------------------------------------------------

  The IIRG recieved the following message at Mercenary's mailbox from an
 unidentified user at llwnet.linknet.COM (Cheshire HS) and we found it most
 interesting, We'll explain why afterwards...
-------------------------------------------------------------------------------

 LOSER ALERT! LOSER ALERT!
 FROM AN ANONYMOUS PIRATE SYSOP
 ------------------------------
 HANDLE:    Homicidal
 REAL INFO: Jason L.(IIRG Deleted)
            (IIRG Deleted)
            Wallingford, CT 06492
            (203)(IIRG Deleted)
 AGE:       16
 ------------------------------
 This kid is every pirate's nightmare. In his infinite
 stupidity, he lost his access on the one major Connecticut
 pirate board he had access on. Then he wanted revenge. He
 called up the SPA (Software Publishers' Association) piracy
 reporting hotline and the Apogee piracy hotline. He turned in
 several big-time pirate boards. He gave BBS names, BBS
 numbers, Sysops' handles, Sysops' real names, Sysops' voice
 numbers, Sysops' addresses, Sysops' ages, his accounts on
 small-time pirate boards, EVERYTHING! This kid fucked
 EVERYBODY over! Several decent pirate Sysops deleted their
 entire hard drives for fear that the FEDS would come knocking
 at their doors. He shattered the fragile trust that exists
 between the members of Connecticut's pirate community. In a
 taped phone conversation (which was eventually made into a
 Sound blaster VOC and then distributed) he admitted to
 turning in pirate boards and also uploading viruses to
 several BBS's. He also said that his "master plan" consisted
 of bringing down all pirate boards and trashing the local
 modem scene with "outside help from ex-modemers" who
 supposedly hold grudges against current-day users. He turned
 in kids who were hacking Internet also. If this kid ever
 calls your BBS, just fucking delete his punk ass!

-------------------------------------------------------------------------------

  We didn't know if the information was true as Mercenary is based in CT. and
 He'd heard nothing of any Major BBS Busts or actions in the area.
  But all of a Sudden this appeared in the Paper as well as in CUD 5.03.

-------------------------------------------------------------------------------

 
  From the 1-7-93 Issue of The Cheshire Herald (Front Page)
    Typed by Lord Valgamon (YUNSANJ@YALEVM.YCC.YALE.EDU)

          THREE CHS STUDENTS CHARGED IN BURGLARIES
           Former CHS Student Also Charged in Case
               by Amy Carpenter, Herald Staff

     Three Cheshire High School students and a former student charged
with the theft of $23,000 worth of computer and electronic equipment
from the high school have turned themselves in to Cheshire police.

     Jared D Bishop, 17, of 500 South Meriden Road, William J Vallo,
17, of 1081 South Meriden Road, and John Beltrami, 17, of 12 Woodland
Drive, have each been charged with 6 counts of third-degree burglary,
6 counts of third-degree conspiracy to
commit burglary and first-degree larceny by common scheme,
police said.

     Brendan Monahan, 17, of Littleton, New Hampshire, was
charged with third-degree burglary, third-degree conspiracy
to commit burglary and third-degree larceny, police said.

-Lesser Charges

     Monahan, a former CHS student, received the lesser charges
because he is believed to have participated in only 1 of 6 burglaries
at the high school, said Detective Thomas Stretton.

     Bishop and Vallo turned themselves in last week, and Beltrami and
Monahan turned themselves in early this week, Stretton said.

     All four were released to the custody of their parents
and are scheduled to appear in Meriden Superior Court on
January 14, police said.

-------------------------------------------------------------------------------

 It seems funny to us that these two incidents would originate from the same
 place, so there may be some validity to the Rumor we recieved.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

                      IBM WORKING ON SUPER DRIVE? 

  IBM Corporation is rumored to be working on a read/write head for hard-disk 
 drives that will propel disk bit densities up into the range of 8 billion bits
 per square inch. Current leading edge Winchesters area densities are in the
 neighborhood of 250 million bits per square inch.
  Even this may fall short of the rumored that students at the University of
 San Diego are working on a head capable of 10 Billion bits per square inch.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

=============================================================================

                        THE GRIM REAPER IS A NARC
                Oh No!, Mr. Narc has kicked me out of TDT!

=============================================================================
        
  Today at about 6:00 Central time I was talking with my girlfriend. 
 I clicked on my call waiting button and it was The Grim Reaper 
 (Mike A.(IIRG DELETE). He told me to call him back because his didn't want 
 to pay for the phone call. I told him I would call him back in 5 minutes and
 he said fine. I was called back 10 minutes later by Grim and he told me I was
 kicked out.I asked why and he said it was because I hadn't called him
 back. He said I didn't respect him and wasn't loyal to him. He went on and
 on about how I've never done anything for TDT, but now that
 he has kicked me out,I guess I might as well tell everyone the real story
 about The Grim Reaper.
        The truth is Grim is a narc.  He is the one who got Mind Bomb nailed.
 He went off on Sought After and has been trying to get him busted for
 a while.  His next targets are Renegade Chemist and Butcher.  He always
 told me that all other cracking groups would eventually die out.  And the
 way this would happen would be through his great ability to narc.  Why do 
 you all think I followed him from FLT to OFG to TDT?  Remember Infinite Range 
 Rock?  He wasn't loyal to Grim, he was nailed.  I've stuck with that fucking 
 Narc for 3 groups.  He has told me a lot of shit, and now I'm going to tell 
 it all to you.  
        I have nothing against TDT, I have nothing against Sought After, or
 anyone in the pirate scene.  I do have something against Grim.  He was the  
 person who took the fun out of all the groups I was in.  He wanted people
 to fear him.  And when I wouldn't kiss his ass he kicked me out.
        Grim didn't even go to court when he got busted with TNSHB.  I don't
 know all the details about the deals he cut, but I know he is a narc.
 He is putting out shit about me not doing anything for the group which is
 complete bullshit.  People like the Grim Reaper should not be in the pirate  
 scene.  He kills accounts, he busts people, and ruins BBSing to further
 himself. 
        Luckily, I have a life!  People like the Grim Reaper who quit
 college, have no job, and no friends to BBS are sorry.  I'm going to lay
 low for a while, and just hang out on a few boards.  I'm done with groups.
 TDT is and will be my last one.  I have a girlfriend, I have school, and  
 now I don't have to deal with Grim's bullshit.  My warning to guys in TDT
 and the pirate scene.  Grim is a NARC, you don't screw with people like
 that.  I've learned my lesson.  All I can say is get out of TDT.  Get out
 from under the thumb of Grim.  He will fuck you over.  
 
 Grim Repear [TDT/NARC] ?? Go ahead bust me.  I can care less. Hell, you can
   even post my address and come to my house.  The last time we talked I had
   it .VOC'ed.  I kept tabs on you Mike.  I'm not going to release it unless
   you try something.  Like I said before, I'm not here to take TDT down or
   do any bullshit like that.  I'm here to tell the truth.  Don't fuck with
   me Mike.  The only way to learn from a narc, liar, and thief like you is
   the hard way.  I've learned, and now it's over.  Go to hell, die, and
   get a life fat ass.

 Sought After [TDT] ??  I have nothing against you.  You are cool Zach.
   Everything I thought about you was wrong.  I was brainwashed by the big
   Narc.  Get out while you can.  You know he busted Mind Bomb, you were
   on the fucking phone, don't deny it.

 

 To All ??  I never tried to break apart TDT after I found out I was kicked 
            out.  I'm not interested in going after Grim or narcing on him,
            unless he pulls his bullshit on me.    
                           
                     
                          Pepsi Man 

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [6]: PHANTASY TIDBITS: News and Views of Interest

-------------------------------------------------------------------------------

                      CELLULAR HIGHWAY ROBBER 

  The LA Times reports that an enetrprising telephone phreak reached out and
 touced someone 11,7333 times in August from a freeway emergency callbox in
 Orange County,California.
  The System that monitors the emergency callboxes attributed 25,875 minutes of 
 calls to the unknown phreak to points all over the globe.
  The Phreak apparently succeeded in making the calls by matching the callboxes
 electronic serial number.

-------------------------------------------------------------------------------

                    PHANTASY MAKES HONORABLE MENTION

  Phantasy Magazine has been mentioned in Mondo 2000's new Book, "A Users 
 Guide to the New Edge" on Page 286.
  Phantasy is Mentioned along with ATI,PHRACK,And The Syndicate Report
 under the Catagory of Zines On-Line.

-------------------------------------------------------------------------------
 
                         WIRED MAGAZINE PREMIERES

  Be on the lookout for a new Mondo 2000 look-alike Magazine, "WIRED" on sale
 at newstands now. The first issue appears well written and contains several
 articles of interest including "Cellular Phreaks and Code Dudes" and "War is
 Virtual Hell" by Bruce Sterling.

-------------------------------------------------------------------------------

                          TIME MAGAZINE ARTICLE

  For other collectors of information, be sure to grab the Feb. 8 edition of
 time magazine and check out the cover story article on Cyberpunks.

-------------------------------------------------------------------------------

                         FREE VIRTUAL SEX POSTER

  Get a FREE poster of the Virtual Sex Scene in the "LAWNMOWER MAN" by
 calling 1-800-858-1810 and ask for Department C76.
  This is a free promotional offer from CYPRESS SEMICONDUCTOR and they will
 send along a copy of there Data Book with the poster.
  They may ask if you have time to answer a few questions as they did when we
 called, they're just looking for Company Background Info.

-------------------------------------------------------------------------------

                        NCSA FREE BOOK OFFER

  The National Computer Security Association will send you a FREE copy of 
 their "Information Security Wishbook" and may be obtained by calling
 (717)258-1816.
  We've obtained a copy of the book and its roughly a 24 page catalog of
 Books,Newsletters,and Research Reports with some "DISINFORMATION" charts
 thrown in to scare the novice system operator.

 For Example; 


             Number of Hacker Attacks on US Workplace Computers


                             350,000 in 1989
                             395,000 in 1990
                             675,000 in 1991

   Come on Guys. Give us a break Name the Companies that reported 675,000
   attacks individualy and I'll eat your Jock Strap.

-------------------------------------------------------------------------------

                         INFORMATION REQUESTS

  At the IIRG, we often recieve strange,bizarre, and sometimes normal
 requests. Although Mercenary does'nt have the time to answer everyone
 individually. He hopes to answer some of your Questions here as we recieve
 them.

 1. Where can I get Info on Cellular Phreaking.

 Mercenary Reply: There are numerous files on Cellular Phreaking and Hardware
                  hacking available on any larger Hack/Phreak BBS.
                  If you don't want to spend the time looking for them I would
                  suggest sending $49.95 plus $4.00 S/H to:

                                     DYNASPEK
                                     P.O. Box 564
                                     Westmont,IL 60559

                   or COD orders may call (708)-971-1585
                  For your cash, They will send you a copy of,
                  "The Cellular Telephone Hackers Guidebook" and this should
                  guide you through the basics.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [7]: IIRG Distribution Sites
              (or Gateways to Oblivion)

                
 
                   //////    //////     ///////     ////////
                    //        //       //    //    //
                   //        //       ///////     //   ////
                  //        //       //    //    //     //
               ////// *  //////  *  //     // * /////////
             
     


    IIRG World HQ:           Dark Shadows 
                             19.2/9600 Baud HST
                             24 Hours a Day
                             1.2 Gigs Online
                             Sysop: Anubis
                             2 Nodes
                             (203)-PRI-VATE
                             (TEMP DOWN AT THIS TIME)


   IIRG Distribution Site 1: Wired World BBS
                             INC Europe
                             TPC Courier (WHQ)
                             THP
                             IIRG Distribution Site
                             Sysop: Digital Justice
                             +39-89-254138

   IIRG Distribution Site 2: Cyberdyne Network Germany
                             United Forces
                             Sysop: E605
                             +49-5341-59004
                             +49-5341-54052
                             

   IIRG Distribution Site 3: The Sanitarium
                             Sysops: Morbid Angel [INC/ACID]
                                     Spectral Illusion [ACID/RAZOR]
                             IIRG Distribution Site
                             ACID Member Board
                             INC Courier Board
                             RAZOR 1911 Courier Board
                             VISA World Headquarters
                             (817)PRI-VATE

   IIRG Distribution Site 4: The WareHouse
                             (203)-231-8589 14.4
                             (203)-231-8588 9600
                             OVER A GIG ONLINE
                             Sysop: Ionizer

   IIRG Distribution Site 5: The Rune Stone BBS
                             14.4k HST
                             Phantasys Home Board
                             Complete IIRG Archives
                             Invitation Only
                             (203)-PRI-VATE

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [8]: Phantasy Distribution Sites

 Phantasy's Distribution Site's are continually growing,we apologize if you
 called a board and didn't find the Mag. Network Distribution Sites will
 have the Issues first, we suggest calling one of them if a problem does
 arise.


  1. Lightning Systems
     (414) 363-4282
     Sixty Million Bytes OnLine
     USRobotics Dual Standard HST/V.32bis
     2400 thru 14.4k v.32bis/HST

  2. Sycamore Elite
     19,200-1200 Baud HST, 24 Hours a day
     (815) 895-5573

  3. The Works BBS
     (617-861-8976)
     Large Text Files BBS, 3500+ text files online.
     2400-300 Baud, 24 Hours a day

  4. Pipers Pit BBS            
     19,200-9600 HST ONLY!!
     24 Hours a Day
     THG Distro Site 1300 Megs
     (203)PRI-VATE [2 Nodes]     
     (Please Note, Numbers have Changed at Pipers Pit)

  5. The Dickinson Nightlight
     (713)-337-1452
     Der WeltanSchauung Distro Site (World View Magazine)
     Phantasy Distro Site

  6. RIPCO II BBS   
     (312)-528-5020

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [9]: IIRG SPECIAL ANNOUNCEMENT

  The IIRG has just released The IIRG's Acronym List [V7.00] and should be
 available on a H/P BBS near you.
  Also for IIRG members the New IIRG Member Encryption System has been 
 released and can be Picked up on The Rune Stone BBS.
  The IIRG shall be releasing around June, the IIRG's Hackers Survival
 Guide for the 90's, note withstanding any problems with Mercenary's move.
   
  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-  
                   PHANTASY(C) IIRG 1991,1992,1993
                        May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-