💾 Archived View for gemini.spam.works › mirrors › textfiles › groups › DAMAGEINC › damage.019 captured on 2020-11-01 at 00:23:53.

View Raw

More Information

-=-=-=-=-=-=-

     ____ _____________ ___________ _____
 ____\  |_\_  |  _ _  |_\_  |  _  |  _  |__________       _   _   ___
 |   _  |  _  |  | |  |  _  |  |  |  |  |-| _ |   | ______\   |     /___
 |   |  |  |  |  | |  |  |  |____ |  ___| | | | |-| \         |zZ!     /___
 l______|_____|__|-|__|_____|__/__|___\___|_|_|___|_  ___________ ___________
                      |  _  |  _  |  |-|  | ___/_  |  |  _ \_ __/_|_ _  |    \_
 D a m a g e , I N C .|  |  |  |  |  | |  |___  |  |  |  |  | \_  _/ |  |  |__/
                      |  |  |  ___|  | |  |  |  |  |--|  ___|  |  |  ___|  |
 N e w s l e t t e r  |__|__|___\ |_______|_____|_____|___\ |__|__|___\ |__|

                               Volume 2, Issue #19
                              (Released:  01/01/01)

                                 "Propagandize."

                            http://surf.to/damage_inc
                             damage_inc@disinfo.net

===============================================================================
                                C O N T E N T S :

> INTRODUCTION - An Introduction to the Damage, INC. Newsletter.

> ADVISORIES - Rolling the dice:  Hacker tracking and you.
   % Search String: {ADVISORIES}

> BIG BROTHER BASHING - FBI's Carnivore devours online privacy.
   % Search String: {BIG BROTHER}

> CONSPIRACIES AND COVERUPS - N/A in this issue.  Shout "conspiracy!"
   % Search String: {COVERUPS}

> CORRUPTION AND GREED - Politics As Usual.
   % Search String: {GREED}

> CROSSED WIRES - cDc Global Domination Update PR for your viewing pleasure.
   % Search String: {WIRES}

> DAMAGE, INC. REVIEWS - Snapshot of things we currently follow/read.
   % Search String: {REVIEWS}

> DRUGSTORE COWBOYS - Got drug propaganda?  Trip on this.
   % Search String: {DRUGS}

> H/P INF0 - Bringin' back the old sk00l and hittin' hard with it.
   % Search String: {H/P}

> INTERVIEWS & INTERROGATIONS - An interview with Grandmaster Ratte' (cDc)
   % Search String: {INTERVIEWS}

> NEWS FROM THE TRENCHES - Damage, INC. updates, news dispatches and more.
   % Search String: {NEWS}

> OBJECTIVE OPINIONS - Hacker Culture, The Propaganda Machine Rolls On, etc.
   % Search String: {OPINIONS}

> REPORTS FROM THE FRONT - Propaganda reports delivered directly to your screen.
   % Search String: {REPORTS}

> THOUGHTS, POEMS AND CREATIVE WRITING - Crazy, entropic rants & writings.
   % Search String: {WRITING}

> CLOSING COMMENTS - Final propagandistic material for this issue.
   % Search String: {CLOSING}

===============================================================================


< DISCLAIMER >

All articles contained in the Damage, INC. Newsletter are for informational
purposes only.  Damage, INC. is not responsible for how any of the information
presented is used.  It is not intended to be a manual with instructions to be
followed.  We won't be held responsible for any damages caused, illegal and
fraudulent acts committed, etc. by our readers.  If/how you use the information
included herein is entirely up to you.


< COPYRIGHT NOTICE >

All articles and source code contained within this file are (C) Copyright by
Damage, INC. (unless stated otherwise).  No part of this work can be modified,
reproduced or changed in any way without the expressed written consent of
Damage, INC.  That means, electronically or otherwise, in part or in whole
this file must not be altered.  It cannot be distributed and sold for profit.
You cannot claim that you wrote it, or alter any articles and source code that
has been written and Copyrighted by us.  Also, you must *not* distribute any
Damage, INC. releases in "packages" with other text files or utilities.  They
must only be distributed alone in their present, original form.  You are hereby
permitted to read and distribute the Damage, INC. Newsletter freely to quality
h/p boards and sites only.

                         Copyright 2001 by Damage, INC.
                              All Rights Reserved.
===============================================================================


INTRODUCTION:

This is the dawn of a whole new era.  Imagine a universe converging on another
universe and witnessing that as we travel around the sun at over 66,000 mph
on our tiny blue planet.  Picture technology merging flawlessly with hacking,
hacker culture, and expressed in words.  Technology is information.  Think of
that.  Think about the possibilities and conveniences that technology affords
you for a minute.  Think about what living without any advanced technology at
your disposal would be like.  Would you be able to adapt?  Would you survive?
Would you be more, or less happy than you are right at this very moment?  Flash
freeze that image in your mind.  Then fast forward to the future.  Think of what
technology *might* be like a decade or more from now...  With such very rapid
advancements, you may not even be able to do that.  You may not be able to
predict or theorize about it.  It might be beyond what you can currently
imagine.  Still, use your imagination.  What types of problems will arise due
to new technology being used, misused and abused?  What potential hazards
could there be because of it?  How could technology be used against you?  And
how could it be used for your benefit, to your own advantage?  These are some
of the questions you should ask yourself.  These are some of the things that
you should think about and consider from time to time.

As for hackers and technology, how will the culture evolve?  What will the
h/p scene be like decades from now?  How will hacking change?  How will security
change and evolve?  How will privacy issues change?  How will the government use
technology in the future?  How will private companies use it?  What will they do
with the information they've gathered?  And how will all of it affect you?

Obviously these are only rhetorical questions.  They are huge, and well beyond
the scope of this zine.  Nevertheless, they should still be asked and thought
about.  Ignoring them only serves to bury your head in the sand and pretend
that technology isn't changing the world.  The fact still remains that it is,
and it will continue to do so.  It's better to be aware and somewhat prepared,
than to simply walk in blind and ignorant.

The same goes for security.  Complacency and a false sense of security are the
main ingredients in a recipe for disaster.  If you think your security is
infallible, without even testing it, monitoring it, updating it and shoring it
up with patches against new exploits that are known, you'll be done in
eventually.  It's only a matter of time.

When the planets collide... think of the sound they'll emit.  Think of the
tremendous energy they'll disperse.  Think of what will be destroyed and what
will be created in the process.  The same goes for technology.  The same rules
apply as when planets collide.  In this new Millennium, technology is being
created, advanced and moving at the speed of light.  It's like no other time
in history.  But it isn't all good.  Monumental problems and issues of privacy
are arising by the millisecond.  People need to be consciously aware of how
technology is affecting them in their daily lives.  They need to know what's
happening behind their screen, behind the scenes.  As in, who's keeping track
of their activities, who has their information, how many databases are they
in, and how easily can their personal profiles be assembled, bought, sold,
obtained through deceptive and illegal means, etc.  These issues are complex
and must be examined on an ongoing basis.  Technology can be a great benefit.
But it can also be a huge threat and a powerful weapon in the control of large
corporations, government and other agencies.  Big Brother isn't just a mythical
entity.  It's here.  It lives.  It breathes.  It exists.  Don't choose to ignore
it.  Don't just turn a blind eye.  Don't be influenced and brainwashed.

Propagandize don't criticize.  Choose dictators from history to diefy and
lionize.  Fire up the propaganda machine, recruit and mobilize.  Once the spin
starts rolling, and you have them where you want them, labotamize.  Take their
minds and brutalize.  Influence and brainwash until they respect and see you as
wise.  Change their ethics and beliefs and cut them all down to size.  Make the
masses into zombies slaves under the banner of America, and Americanize.
Exploit them to death and capitalize.  Then use all of that to your advantage
so you can commercialize further and profitize!  Go on now, propagandize.

Enough ranting.  Let the mind games and propaganda begin.  Come with it now...


ADVISORIES -                                                   {ADVISORIES}
Rolling the dice:  Hacker tracking and you.

You feelin' lucky punk?  Okay, so you aren't all little know nothing script
kiddies armed with port scanners, exploits, filled with malcontent, rage and
a desire to go out and get your kicks breaking into systems without forethought.
However, I'm positive that at least *some* of you are.  And this article was
written with you in mind.  The intention of it was to prevent you from doing
something stupid, without first considering the consequences.  You can consider
this to be a warning of sorts, or a "STOP... THINK FIRST BEFORE PROCEEDING"
primer.  At any rate, it isn't a technical advisory.  You won't find k00l new
scripts and exploits in here to use.  What you will find however, is an article
explaining ways to avoid being traced.  Along with that, there's some commentary
on what's going on in the scene, with hackers (or "former" hackers) being hired
to track other hackers that've accessed sensitive systems and data.  Take it
for what it is.  The majority of it is just common sense.  But I felt that
Damage, INC. might as well put it out there, for clueless kids that are fucking
around with shit they don't know about, and getting caught.  Yes, that's still
happening on a great scale.  So, if you fit into that category and don't want
to get busted needlessly for something, when it could've been avoided, read on.

The importance of logs:

Regardless of the system you're exploring, no matter what OS it's running, or
how you got in, or the level of access you've managed to acquire on it, the
log files are still extremely important.  It's actually sickening to read about
a kid being busted, or see an interview of them, and they say "I wasn't careful
at all.  I didn't think to edit/remove the log files.  I used no stealth.  I
didn't have to get traced and caught.  I could've avoided it." or something
along those lines.  If they had the knowledge and ability to avoid it, why the
fuck did they leave the logs untouched?  Did they simply forget, and leave them
there, unmodified, in their haste?  That's more than a serious error.  That is
inexcusable.

The moral is kids, IP scanners and port scanner, and r00t kits... and all of
your thousands of exploits you've collected... mean literally shit if you get
in and forget to do anything with the log files.  Ya dig?

Location:

It's the same in hacking as with real estate.  Location, location, location.
Say that a few times.  Scream it aloud.  Hypothetically, why break into say...
a NASA server, or a .mil system from home using your desktop system and
dialup/cable/DSL connection?  Why?  Why launch anything from your box that's
sitting in your own home?  Once again, why?  And for that matter, why use your
own account, with your IP address (not through any proxy servers, totally
unspoofed)?  Why?

All too often the media gets a nice juicy story about how a "kid hacker" was
caught breaking into a high profile system, downloading data from it, or
launching a DDoS attack... or spreading a virus... or whatever... and they
did it from home, using their own dialup Internet account and their phone line.
Are they just begging to be traced?  You don't have to hire a fucking expert
to track you down if you're gonna be that inept, incompetent and stupid.

Instead of pulling shit like a punk, why not grab a laptop, go to a payphone
with a jack, or hookup to a junction box or something... have other accounts
with you to use, and still take all the necessary precautions (so that it's
difficult to trace the connection back to your area code, let alone you and
your address/phone line)  You've heard of field phreaking, right?  Well, when
it comes to high profile systems, *don't* fuck with them from home.  Get your
little field hacking kit together... and go.

Stealth:

In simple terms, the objective of stealth, is to make yourself as anonymous
and transparent as possible.  You've heard of stealth firewalls right?
Essentially, it makes ports invisible... so it's like they don't exist or
your system isn't online or powered on.

Stealth encompasses so many things.  It extends from your name, location;
meaning an address, phone number, and any other identifiable things, to your
connection... along with all that goes with it.  Simply put, your system itself
can betray you, and give away valuable packets of information which can be
used against you.  Covering these traces of info, or eliminating them entirely
wherever possible, helps your goal of preventing being tracked.  This is what
stealth is all about.  There are many ways of accomplishing this goal, but,
it is beyond the scope of this short article.  Maybe I'll explain a few ways
in a future article.

Stealth also includes things such as not making your actions known by means
of telling others about them.  And, anything that can be considered or construed
as evidence against you, should be well hidden elsewhere at another location
or destroyed if not needed.  Trophies can get you jail time.  So, safely secure
your incriminating data.

Closing:

Yes, it's a rush.  You can get a thrill out of being somewhere you're "not
supposed to be".  Unauthorized areas of anything (not just systems) can be fun
to explore.  And, it's understandable that a lot of kids get their kicks from
doing it.  However, think of the consequences.  Don't let it come as a surprise
that they exist.  Playing dumb won't work.  Excuses won't work.  You can't
social engineer the feds out of serving an arrest warrant.  You can't social
engineer judges in court.  Trust me, it doesn't work that way kids.

In conclusion, it's up to you what you do, what precautions and chances you
take.  If you want to roll the dice, and end up having to go through a bust
situation with criminal charges laid on ya by the feds, by all means, ignore
all of this.  And ignore anything else that you've ever read about how to
avoid being traced.  Don't even consider trying to make yourself as stealthy
and anonymous as possible.  If you want to play Russian roulette with a loaded
pistol (not revolver), start pulling the trigger kid.  If you want to have a
Mexican standoff with the feds... be my guest.  It won't make you any cooler.
Won't give you a big rep.  You'll get your 15 mins of fame out of it, sure.
After that though, you're still in jail and relatively unknown and forgotten.
And you have a record for life.  If you have no real skills, you're fucked when
you get released.  Is it worth it?  If you fuck up, that's what it's like.
Think about it.  Prepare.  Be aware.  Be stealthy, logical, methodical.  Plan
things well ahead of time.  If you're setting things up, double check it.  Test
it on systems of far less importance.  Consult someone you trust and seek
advice.  Think about what might go wrong ahead of time, instead of after the
fact.  You don't want to be sitting in a cell, serving time, saying "Damn, I
wish I would've done this... or hadn't forgotten to do that..."

As if it isn't obvious already, this is serious now.  You may think exploring
someone's system, reading and downloading data files isn't illegal.  You may
decide to be lax in your measures due to that thinking.  Well, that logic isn't
just flawed, it's totally fucked.  In case you haven't realized it yet, if
you play around on any sensitive systems, they will try to pursue you no matter
what.  You can break into U.S. systems from England, and they'll try and track
you and hunt you down.  Yes, that's a fact.  You don't have to use or sell any
of the information you take either.  Hell, you don't have to take a single
1 byte file.  Once inside, it doesn't matter what you do.  If you leave a trace,
that's grounds for them to go after you.  Think first, then act if you think
the benefits outweigh the risk.

Written by THC Phreak / Damage, INC. (C)opyright 2000.


BIG BROTHER BASHING -                                         {BIG BROTHER}
FBI's Carnivore devours online privacy.

In its heavy-handed efforts to wage war against crime, the FBI has unleashed
another privacy killing weapon upon "thought criminals" that "threaten" the
United States of America.  Despite an extensive arsenal of electronic
surveillance systems and techniques, the FBI deemed it necessary to create
the software program known as "Carnivore."  The official purpose of Carnivore is
so the FBI can conduct electronic surveillance of email and Internet
communications at an Internet service provider (ISP) facilities in order to
fulfill "legal court orders."  In other words, Carnivore is the FBI's primary
Internet wiretap.

The FBI stated that Carnivore is needed in order to "provide jurors an
opportunity to determine factual issues based upon a defendant's own words."
Who are examples of suspects that the FBI would use Carnivore to eavesdrop on?
FBI Assistant Director Donald M. Kerr answered that question at a House
Judiciary subcommittee on the Constitution:  "Criminals use computers to send
child pornography to each other using anonymous, encrypted communications."
"Hackers break into financial service companies' systems and steal customers'
home addresses and credit-card numbers, criminals use the Internet's inexpensive
and easy communications to commit large-scale fraud on victims all over the
world, and terrorist bombers plan their strikes using the Internet."  It makes
me sick to see that the FBI Assistant Director places hackers akin to the
perverts, fraudsters and terrorists that he mentions.  However, it isn't
surprising to get that kind of fucked up rhetoric from the Thought Police.  The
FBI violates the privacy of innocent citizens far more brutally than hackers
could ever desire to. 

The FBI has been very cautious not to reveal many details about how Carnivore
works.  Briefs regarding Carnivore that have been sent to the Department of
Justice and the White House staff have been classified.  The FBI is concerned
that publicly revealing certain weaknesses or other technical information may
allow hackers to defeat Carnivore.  What they did reveal on their web site
is a very basic description of how they claim Carnivore works, which I have
imported below:

"The FBI connects a commercially available one-way tapping device at the
 ISP's access point.  This tap produces an exact copy of all data at the access
 point. The tap also provides electrical isolation to prevent Carnivore from
 having any kind of impact on the ISP's network.  The copied network traffic
 then flows into the collection system where it is compared against a predefined
 filter.  This filter only passes traffic authorized for capture by the court
 order.  Traffic that passes through the filter continues on to be archived to
 permanent storage media.  No other data is ever stored to permanent media, nor
 is any information recorded about traffic that does not match the filters.  All
 information collected is maintained and, in the case of full content
 interceptions, is sealed under the order of the court.  This information, as
 well as information obtained pursuant to pen register and trap & trace
 authorities may subsequently be made available by the court to the defendant."

"[Carnivore] provides the FBI with a unique ability to distinguish between
 communications which may be lawfully intercepted and those which may not.
 For example, if a court order provides for the lawful interception of one type
 of communication (e.g., e-mail), but excludes all other communications (e.g.,
 online shopping) the Carnivore tool can be configured to intercept only those
 e-mails being transmitted either to or from the named subject.  Carnivore
 serves to limit the messages viewable by human eyes to those which are strictly
 included within the court order."

If the FBI told the truth above, they would have us believe that Carnivore is a
sophisticated filtering program that agents would use to view Internet traffic
that only pertains to the court order in their possession.  If this isn't
disinformation, I still have a definite problem with the fact that all ISP
traffic is at the fingertips of the Thought Police.  In the past, there have
been confirmed reports of wiretap abuses by the FBI.  However, instead of
performing wiretaps in violation of the 4th Amendment on a small number of phone
lines per search warrant, the FBI agents would have access to all of the traffic
on an ISP.  In my opinion, it would be the equivalent of allowing the FBI to
have instant and convenient access to every single conversation on several huge
trunks.  Then a filter in the earpiece and the agent would be told, "OK, you
have the ability to listen to any conversation on a trunk full of phone lines,
but you have to use this earpiece filter to only listen in on the little line
that pertains to your court order."  However, it is also possible that the FBI
is overstating the abilities of Carnivore.  It is uncertain if the FBI has the
ability to write something that could capture and scan so much data without
bogging down an ISP.

Regardless of Carnivore's true nature, it all comes down to trusting the FBI,
and the agent using Carnivore.  It is the corrupt FBI agent that would violate
the privacy rights of an innocent person.  There have been enough reported
privacy abuses, that the FBI should not be blindly trusted with such tools.
After researching the FBI's long track record of civil privacy rights abuses, I
firmly believe that they should not have tools such Carnivore available to them.
Big Brother and the Thought Police cannot be trusted.

ISP owners also have concerns with being forced to allow the installation of
equipment and software onto their systems without knowing the full nature of how
it works, or what it is doing to their system (performance and security
concerns).  Some want the FBI to publish information on the software used so
that ISPs can be sure that it does what the agency says.

Also, several civil rights groups, including the ACLU (American Civil Liberties
Union), have expressed grave concerns about Carnivore.  Most of their concerns
relate to the fact that the FBI is unwilling to give any substantial detail as
to exactly how Carnivore operates.  In fact, the ACLU has requested that the
FBI surrender Carnivore's source code so that it can be analyzed.  FBI has
flatly refused to honour the requests of any of the civil liberties groups.

The FBI may be able to ignore organizations like the ACLU, but they were
surprised by the concerns of some U.S. Congressmen.  "The potential for abuse
here is tremendous," said Rep. Spencer Bachus (R-Ala.).  "What you're [The
FBI's] saying is 'Trust us.'"  The toughest questioning came from Reps. Jerrold
Nadler (D-N.Y.) and Robert L. Barr Jr. (R-Ga.).  Nadler peppered the officials
with a series of questions that underscored the point that Carnivore, under the
laws that govern pen-register surveillance, could be used without the difficult
showing of "probable cause" required in a telephone wiretap.  After the hearing,
House Majority Leader Richard K. Armey issued a statement saying members of both
parties showed "strong concerns that the administration is infringing on
Americans' basic constitutional protection against unwarranted search and
seizure.  "We should be sensitive to any potential for abuse," said Florida
Representative Charles Canady, the panel's chairman. "Even a system designed
with the best of intentions to legally carry out essential law enforcement
functions may be a cause for concern if its use is not properly monitored."

The stunned FBI replied that their agents have too much integrity, and would
risk their careers if they used Carnivore outside the scope of their search
warrant.  In fact, most of the information regarding Carnivore on the FBI's web
site is dedicated to defending the "integrity" of their tarnished law
enforcement organization.  I'll let you read their weak reasons why Carnivore
doesn't threaten innocent Internet users' right to privacy:

"The use of the Carnivore system by the FBI is subject to intense oversight
 from internal FBI controls, the U. S. Department of Justice (both at a
 Headquarters level and at a U.S. Attorney's Office level), and by the Court.
 There are significant penalties for misuse of the tool, including exclusion of
 evidence, as well as criminal and civil penalties.  The system is not
 susceptible to abuse because it requires expertise to install and operate, and
 such operations are conducted, as required in the court orders, with close
 cooperation with the ISPs.  The FBI is sharing information regarding Carnivore
 with industry at this time to assist them in their efforts to develop open
 standards for complying with wiretap requirements.  The FBI did at the request
 of the Communications Assistance for Law Enforcement Act (CALEA) Implementation
 Section, at an industry standards meeting (the Joint Experts Meeting) which was
 set up in response to an FCC suggestion to develop standards for Internet
 interception."

The FBI's infamous arrogance is very apparent.  Their agents, which have gotten
off free, or with mild slaps on the wrist for prior wiretap abuses, will be kept
in line by the idle threat of losing evidence, or jail time.  Meanwhile, they
also say that Carnivore is too complicated for anyone outside of the FBI to
comprehend and operate.  All that tells me is the only thing protecting innocent
users' privacy is internal investigations (meanwhile the FBI has not mentioned
if Carnivore logs or does and audit of the agent's actions) and their assumption
that people outside the FBI are too ignorant and stupid to use their system for
their own purposes.  Again, the message of "trust us, we won't abuse your
privacy even though we need the ability to do it" is the only safeguard the
FBI deems necessary.

Despite all of the criticism and concerns from prominent groups and politicians,
as well as individual citizens, Carnivore still continues to function the same
way since its inception.  The only changes proposed are cosmetic changes to
Carnivore's interface.  The FBI is making sure that "accidental" abuses of
privacy due to user input errors are eliminated by adding a few more caution
screens.  While this may make Congress feel more at ease, all it does is adds
a few mouse clicks for the privacy abusing agent.  The fact that no external
auditing of the FBI's actions was not mentioned in any of the press releases
and panel transcripts that I had access to troubles me.  This is absolutely
wrong.  No one is watching the Thought Police, but the Thought Police
themselves.  Again, I must say that the FBI, or any other government
bureaucracy, cannot be trusted.   They are incapable of policing themselves.
Why?  They'll be too busy watching what individuals are doing on the Internet to
worry about policing privacy abuses by FBI agents using tools such as Carnivore.

Written by Shatazar / Damage, INC. (C)opyright 2000.


RIP personal privacy of UK Internet users?

"Government is too secretive. Too many decisions are taken behind closed doors
without proper consultation with the public. Government then rushes new laws
through Parliament and bad legislation is passed. People want to be better
informed about what government is up to, and be consulted more." --- Jack Straw
Home Secretary to Her Majesties Government.

First impressions to many of the h/p scene is that it is childish and damaging
and there it ends for many who choose to remain ignorant. The second impression
for those who are more open minded is that for some it is a means of attaining
knowledge that has been purposely hidden from sight of the public.  Even
government officials admit they are too secretive in their decision making.

So what if the government wanted to play at h/p, what if they wanted to know
what was happening on the Internet within the UK or your home nation?  And more
importantly what the hell am I talking about?  The Regulation Of Investigatory
Powers (RIP) Bill and it's publicly reported purpose to combat the increasing
problem of crimes committed online, mainly child pornography, fraud, terrorism
and drug trafficking.

The government already has powers to eavesdrop telephonic communications via
listening stations such as Government Communications Headquarters
(http://www.gchq.org.uk) and the NSA's Menwith Hill (http://www.menwithhill.com)
Time to learn a new acronym GTAC or Government Technical Assistance Centre.
Remember Jack Straw that I quoted earlier?  He's the guy who issues the warrants
to security agencies to intercept telephone and postal communications and will
be doing the same for GTAC and online traffic. The RIP Bill that will allow this
to happen was secretively being rushed into legislation behind closed doors to
meet a 1st October 2000 deadline. It was passed in July and will be implemented
on 5th October.

As new legislation the RIP Bill will be costly both to personal privacy and
economics.  It was economic cost that saved personal privacy from surveillance
legislation for the Internet before when the Electronic Commerce bill contained
similar proposals (was altered and passed as law June 2000).  Who was it that
saved us at the last minute?  Big business is who.  As we all know multinational
corporate entities don't like all their activities to be monitored too closely.
Don't relay on them to bail us out again, do something.  The cost of the
proposed RIP Bill runs into millions of private and public money. The GTEC
extension to MI5 (http://www.mi5.gov.uk) set up by the National Criminal
Intelligence Service (NCIS) will cost ?25 million in tax payers money (unless
MI5 decides to run a CIA style fundraiser, and we ain't talking yard sales or
girl guide cookies).  ISP's are expected to cough up between ?44,700 to ?113,300
in cost for the first year and ?19,000 thereafter, which will get passed on to
their subscribers.  This cost to ISP's is for the interception capabilities to
be integrated into their system that they will be required by the RIP Bill to
install.  With 400+ ISP's in the UK that totals between ?17.88 million and
?45.32 million.

Charles Clarke MP, who is responsible for pushing the RIP Bill through the House
of Commons, has been noted to say that he "...wants to make the UK the best
place in the world to do electronic business". Strange thing to say considering
the bill he is responsible for is making UK ISP's and e-commerce business'
consider migrating their operations to neighboring countries like France and
the Irish Republic who are a little more friendlier.  Among these are Poptel,
UUnet, Claranet and GreenNet.

The RIP Bill requires a warrant to read online traffic, but communications data
will not require a warrant.  Communications data include things like your e-mail
address book and website logs.  So any public authorities from Department of
Social Security and Health Service to local authorities and so on can have
access to see who you e-mail and what material you browse.

Part 3 of the RIP Bill gets a little more interesting and concerns the
disclosure of decryption keys.  This requires the police to obtain a warrant
from a judge. The police can request a warrant on the grounds of "for the
purpose of preventing or detecting serious crime".  I'll just run that by you
again in slow motion "for the purpose of...detecting serious crime", not if
there is a serious crime, no need for crime at all just detecting serious crime
is enough.  The bill doesn't stop there and neither am I.  As we read further
into the RIP Bill failure to comply to the warrant is a maximum of two years
imprisonment.  Don't bother telling anyone you've been served with a warrant
because that will earn you an extra three years.  Failure to produce decryption
keys also means you are presumed guilty until you prove yourself to not be in
possession of the means to obtain the decryption keys.  An interesting twist to
the law to be guilty until proved innocent.  Did I mention that the government
could hold onto the decryption keys as long as it likes once it has obtained
them? Well it can under this new bill.  A personal thought what of online
traffic that somebody in New York retrieves from a server in Paris? Will that be
monitored and logged if it passes through the UK?  If it doesn't fall into the
bounds of the RIP bill and GCHQ ignores it I am confident that Menwith Hill may
keep an eye on it.

A bill similar to the RIP bill has already been passed as law in the
Netherlands.  Here is why it exists according to Jason Thomas of PC Plus
magazine.  "[Proposals] in the RIP Bill first appeared in the Electronic
Communications Bill.  They resulted from last year's European Parliament
resolution calling for interception at ISP level. This in turn came from a
resolution from the Lawful Interception of Communications council
(Enfopol)...looking even further back the Enfopol documents were inspired by a
series of secret meetings between various international law enforcement
agencies.  They were called the International Law Enforcement Telecommunications
Seminars (ILETS) and met without parliamentary knowledge or government
supervision.  The United States Federal Bureau of Investigations was the
initiating body, and the measures ELTIS [I think that should read ILETS] agreed
became the basis of Enfopol documents, which ultimately have dictated UK
government policy.  So it seems a group of unaccountable individuals from
various security services have dictated European and UK policy."

What effect does this have on those it is intended to imprison?  If you're a
terrorist or the accountant for a drug cartel conveniently loosing the
decryption key offers a shorter prison sentence than your real crimes.  The bill
is not going to work effectively against the serious criminals it is supposed to
protect the unknowing public from, a public that is suspicious of the
governments intentions.  The bill is flawed and can be worked around. The bill
does not have power over direct modem to modem connections but this would
probably be under the jurisdiction of GCHQ.  For a $10,000 set-up fee and $1,500
a month you can have your web services run from a platform a few miles off the
Felixstowe coast (http://www.sealandgov.com and http://www.havenco.com).  The
Inland Revenue and Customs and Excise insist that these platforms still come
under UK law.  It is uncertain if the bill applies to information stored in
other countries but as Casper Bowden (Director of Foundation for Information
Policy Research) said, "By analogy, you are no longer talking about whether
someone has the key to a safe, the question is whether they even have a safe."
By using a free archiving service like xdrive (http://www.xdrive.com) or
Netstore (http://www.netstore.com) from public Internet access points in
combination with steganography.  For those who are unsure steganography is the
concealment of information within images and sound files by using unused bits
and inaudible frequencies.  The RIP bill will insist you reveal the
steganographicly hidden data but they got to know it exists first.  This offers
some protection; the hidden data has to be known to exist, so keep an eye on the
information your browser leaves behind, as a warrant is not need to seize it.
Some now believe that by forcing criminals to find workarounds it is encouraging
them to use the Internet as a world wide safety deposit box.

Things to do if you disagree with the RIP bill, one mail your MP, chances are
your MP is not fully aware of what the RIP Bill means. And don't be insulting or
patronizing this will not help.  Not many people have faith in their MP so go to
step two.  It is believed that GCHQ and Menwith Hill already go out of their way
to intercept PGP signed and/or encrypted e-mails, so send as many as you can,
I'm sure they would love the over time.  I am sure there is more that can be
done, be creative in your protest not destructive.

The Internet is not a birthright and no matter how many people take it and it's
freedoms for granted it is a privilege and one worth protecting.  In the main
the Internet is self-regulating and self-repairing and will remain so if users
are trusted to take responsibility for their own data and connections.  The
Internet is a vast entity, Damage Inc. only takes responsibility of this part,
cross it's and others borders of your own free will.

All information is believed to be correct at the time of writing but for up to
date information visit http://www.stand.org.uk

Written by Alfie Ilkins.


The HRDC Big Brother Database Secrets Revealed.

Look for an article on Human Resources Development Canada... and the ongoing
saga that is our relationship, with infrequent correspondence by mail and
bureaucracy from hell... in the next issue (hopefully).  However, I can't
guarantee anything as the Canadian government's response time is so utterly
slow, it's deplorable.  But, at this juncture, it's *their* turn to wait for
my reply to the latest offering in govspeak that they've sent by mail.  So,
in a sense, they're anxiously awaiting my response to their last letter... and
I can imagine a bureaucrat sitting there impatiently, eager to receive word
from this dissident in arms.  Rest assured, the article will contain some

have produced and fabricated something of equal humour.  If you want to meet
some truly amusing people, hang around government buildings, be social and
strike up conversations with low level zombies employed as gophers and paper
pushers... They'll feed you more material than you can ever imagine.

To hold you until the article arrives, I'll give you one direct quote...
"Human Resources Development Canada Longitudinal *WHAAAAAAT*???" - the response
given to me when I made a formal request to see a copy of my file, while
standing face to face with a government worker at the local HRDC office.  That's
right, she didn't have a clue what I was requesting, even though the faction of
government she is employed by was responsible for creating and maintaining that
specific database and files on every Canadian citizen.  Either she feigned
ignorance extremely well, or she simply was that ignorant.


CORRUPTION AND GREED -                                              {GREED}
Politics As Usual.

Bush and Dick.  Bore and Lieberman.  What about Bob (Dole)?  Where's Ralph?
Hey, there's a Pat (Buchanan) too!  And for the love of phreaks, will someone
please call Ross Perot and ask for his endorsement?  That pint sized, midget
mouthpiece that always pretends he can't get a word in edgewise is alright in
my book.  "Larry, can I talk?  Can I say somethin' now?" - Perot on CNN's Larry
King show.  Hell, at least Perot has the statistics to prove *anything*. :)

Whatever happened to Donald Trump?  Or, how about Steve Forbes?  I say they
should bring those bastards back into the running.  Bring em back into the
mix.  And anyone else with money to burn that wants a piece of the action!

Plus, America *needs* preacher Gore.  You know, the flamboyant, over the top,
in your face Gore.  The one that rants on stage like an old sk00l style Baptist
preacher straight outta the early 1920s.  The one with hair flying wildly in
the wind, shirt buttons undone and tie loosened so it can flip flop around.
The one with charisma and energy.  The one that stands defiantly on stage and
angrily screams "I'll fight for you!" at onlookers that've been carefully
selected out of his most ardent supporters.  That Gore.  You know who I mean
now?  Preacher Gore!  Ah yes, the many faces of Gore... But that's my personal
favorite of all his personae, by far.

Seriously folks, how many of you voted?  How many of you thought it would make
any difference?  How many voted for Ralph Nader?  How many thought the election
results would be so close, and the Presidential race relying on recounted votes
in Florida?  Did you hear the word "chad" (dimpled, pregnant, dented, hanging,
and fucked) used enough by the media?  Did you enjoy the media's television
coverage on election night?  Wasn't that something to behold.  Predictions
abounded.  Egg was on face, everywhere!  Egg and cheese omelets for all.  Crow
pie by the truckload.  It was a virtual feast for the media and masses.  More
than just watching the usual election coverage, it was time to chow down at
2am EST.  Wasn't it great?

"We're calling Florida for Gore.  No, it's too close to call... Wait, Bush is
now the unofficial President elect.  Uhhhh... hold on folks.  We have egg on
our face again.  Mix up a few more omelets for our nice shiny suits.  We're
gonna need it by nights end."

Watching the news anchors getting flustered and frustrated was just hilarious.


New Suit:  $2,000

Imported Coffee:  $500

Haircut:  $150

Fucking up Presidential Election 2000:  Priceless

Oh hell yeah.  All apologies MasterCard.  But, that's our attempt at parody.
As if all the comedy shows haven't already used your advertising campaign in
parodies to death already anyway.  So get over it.

Politics as usual simply means a lack of real choices in political figures
(or figureheads), and the same old partisan, political bullshit.  This isn't
about fairness.  It isn't about "having every vote counted" as Gore repeated
for so long ad nausea until everyone was sick of hearing it.  Granted, it was
very close in Florida.  Still, let's face it, he just wanted to be the next
President.  It was all about winning.  And he was willing to use his spin
machine to try to get into the White House, no matter what it took.  So, fuck
it.

Not that Bush and Dick are any better.  Kids, with George W. Bush you have
reason to live by the words, "PHEAR THE BEAVER!"... because our leader is a
babbling idiot that can't string two words together to save his life.  And he
knows nothing about foreign policy, as well as many other things.  Having a
daddy that was President is more than a foot in the door, sort of speak.  Having
a brother who's Governor of Florida doesn't hurt either.  Affluence and
influence.

All I want to know is, who the hell voted for Ralph Nader?  Stand up and be
counted!  C'mon, some of you must have...

The whole process is fucked.  The entire thing is nothing more than a fucking
joke.  Most people are completely indifferent.  They don't give a shit who is
their president, as long as they can make a few bills on the stock market and
buy the new SUV they've been eyeing.  America is fucked.  Americans are only
concerned with themselves and their own personal wealth.

A country divided?  Obviously.  What an astute observation that is, on the part
of the good ol' reliable mass media.  Political commentary at its best, 24 hours
a day if you want it.  I mean, out of 100 million people that voted, it was
about as close to a 50/50 split as you're ever gonna see.  And so, it all came
down to people holding up ballots to the light to look for punched out chads,
and make decisions on how people voted.  Well, it could've gone down to a coin
toss.  No word of a lie.  That was a distinct possibility!  That's our "system"
at work...

Now what?  It's over.  Live with it.  Take it.  Be indifferent.  Not that I
expect this article to actually change anything.  The vast majority of Americans
are indifferent and complacent.  Mobilizing the people that aren't is damn near
impossible.  And there's a huge shortage of true leaders on top of it all.
Well, at least ones with charisma.  No offense Ralph, but you don't cut it.
Putting your politics aside for the moment, you lack the qualities that a true
leader needs in order to inspire people and create a real, long lasting,
effective movement.  Someone that with their mere words, can make the rich fat
cats do more than stand up and take notice, but rather, have unexpected bowel
movements, is what is needed.  And that someone isn't Ralph Nader.  As fun
loving and lovable as he is, and as much as he appeals to a certain group of
college kids, he isn't the man for the job.  In politics, your ideas and your
heart being in the right place aren't nearly enough.  You've gotta have much
more than that.  You've gotta have style and flash and a way to wake people up
and get them all jacked up about the issues.  So, with that being said, I wish
Nader and the Green Party all the luck in the world.

As I mentioned earlier, the system is corrupt.  It's filled with greed and
deception.  Politicians are bought and sold.  Special interest groups pay for
the elections, for the most part, through political donations.  Yes, reform is
needed.  But, *real* reform, not more bureaucracy meant to fool the masses into
thinking everything has been changed and fixed.  As it stands now, it's about
"stuff my pockets and i'll fill yours."  Yes, that's immoral and unethical.
But that's reality.  Obviously you aren't reading this to be shielded from the
truth and influenced by spin.  So, we'll give it to you straight.  Things aren't
going to change until the control is taken out of the hands of the special
interest groups and huge corporations and put into the hands of the people.
Yes, I'm stating the obvious.  This won't be accomplished through the Republican
and Democrat parties.  Voting for the "lesser of the two evils" won't help
matters at all.  Being indifferent to it won't change it.  Opposing it, but
being complacent won't either.

What's needed is a voice of change.  This country needs a powerful voice to
speak on behalf of the people.  Change is desperately needed, but it'll never
happen if we just leave it in the hands of our current "leaders", and assume
they'll get the job don't.  They won't.  They lack the necessary power to do
it.  They lack the desire to get it done, at all costs.  They aren't motivated
to take action, since they're all extremely wealthy.  I can say with almost
absolute certainty that of those of you that voted, the people you voted for
are all much richer than you and I combined.  So, without a real interest in
this, why would they work their asses off to change it?  For the most part,
their only interests are getting richer, acquiring power and obtaining a level
of fame that many of us can't even imagine.  That's their stake in it.  So,
why the hell do people expect *them* to *change* things?  It's illogical to do
so.  Only a fool would make make a conclusion like that based on those
circumstances.  They aren't going to shoot themselves in the foot for your sake,
for your benefit.  They'll do what benefits them alone.  And they'll continue
doing just that, until we collectively choose to stop them...

Written by Blackie Lawless / Damage, INC. (C)opyright 2000.


CROSSED WIRES -                                                     {WIRES}
Global Domination Update PR for cDc.

For your viewing pleasure, here's a little something from cDc.

  _   _
 ((___)) cDc communications
 [ x x ] Global Domination Update #28
  \   / "A Special Message of Hope"
  (' ')  December 24th, 2000
   (U)                                                  FOR IMMEDIATE RELEASE

                      A TIME OF GREAT REFLECTION IS UPON US

     A lot of major events have happened since the last Update... the release
of Back Orifice and BO2K, a completely redone web page, and the formation of
cDc's Hacktivismo subdivision.   But since our birth in 1984, the bread-and-
butter of cDc is our routine creative output.  That's what these updates are
about, and act as sort of a "State of the Union' address to fill you fine,
upstanding, sexy folks in on the progress of The Struggle.

     The United Arab Emirates have recently banned access to our web page from
the grasp of their citizens.  Why?  Because the international press has gotten
wind of and started to write about Hacktivismo's upcoming "Project X" - which
promises to bypass Internet censorship.  Watch for more in the upcoming
months.

     It's a traditional manger scene where Mary and Joseph beam with wonder
at the radiant baby Jesus, the wise men and shepherds doing likewise.  The
animals are milling about in the background when a cow munching on straw
picks up the baby Jesus by the head and starts chewing.  "OH MY GOD!!!  It's
eating the Messiah!!!"  Jesus' little baby legs kick wildly and the frantic
parents, wise men, shepherds and maybe an angel or two rush around smacking
the cow on the head while tugging on the baby's legs in a desperate attempt
to free him.  "Bad cow!  BAD COW!  Don't eat the Messiah!  Stop eating the
Messiah, cow!  BAD COW!!!"

     And that, boys and girls, is why we make hamburgers from cows to this
very day.
                                         "Manger Scene" by Scott Christensen.
 _________________________________/ - x X x - \______________________________

      _   _                 information is junk mail:                _   _
     ((___))                THE TEDIUM IS THE MESSAGE               ((___))
     [ x x ]                _                                       [ x x ]
      \   /  _   |_|_   _ _|_  _|_ |_  _    _| _  _. _|   _ _        \   /
      (' ') (_|_|| |_  (_) |    |_ | |(/_  (_|(/_(_|(_|  (_(_)\_/\_/ (' ')
       (U)                                                            (U)
deal with it       presents unto you our personal gift of love   deal with it
S U C K E R                       NEW RELEASES                    S U C K E R

 __________________________________/new audio\_______________________________

               "We make hardcore jams, so fuck respect..." -Eazy E

248:"What You Thinkin' 'Bout" by Lo-Pro.  This slowed-down, banging gangsta
     track features the advanced lyrical stylings of Luck and Sage from
     one of the hardest crews in Texas, the LBK Mafia.  All-original music
     by xxxclusive and Grandmaster Ratte' of cDc.  Featuring no damn
     samples, period.

249:"DemonSeed's Night Before X-Mas" by Myles Long.  A startling tale of
     personal redemption, as Long dictates.  Script kiddie pays with his
     sins with his life, as DemonSeed Elite strikes with his mighty astral
     monster truck.

250:"cDc's NSF Holiday Training" by Delchi.  There's no "off season" for the
     cDc Ninja Strike Force!  You fool!!  Suffer!!  Aagh!!

 _________________________________/ - x X x - \______________________________
                                      _   _
                                     ((___))
    CULT OF THE DEAD COW             [ x x ]
                                      \   /
       wishes you and                 (' ')
    your charming family             "((U)&
              a                     ( )""""&
  VERY MERRY HOLIDAY SEASON!        &&&&&( .)
                                   &&&( )""""&
                                  """"&&&&&( )&
                                  &&&"""""""&&(
                              ( )&&&&&&&&&&"""""
                               &&&&&( )"""""&&&( )&
                            ( )&&""""""&&( )&&&&&&&&&
                           """"""( )&&&&&&( )&&&&( )&
                    /\___/\ &( )&&&&&&&&( )&&&&&&&"""&&
                    | @ x | )&&&&&( )&&&&""""""___\|/_&&  cDc Likes You Best,
                   __\_^_/__  ___\|/___ &&&&& |   |||   |  All Year 'Round!
                  (__/ooM\__)|___|||___|      |___|||___|
                  (__\___/__)
 _______________________________/new text files\_____________________________

376:"cDc's Guide to Sexually Transmitted Diseases" by Myles Long.  This former
     Eastern-European porn star pulls it all out and lays it on the table for
     you regarding STD's.

377:"My Life as Santa's Rubber-Clad Love Slave" by Scott Christensen.  It's
     It's tough being an elf... you can't reach very high, and you're easy to
     tie up and throw in a closet.

 _________________________________/ - x X x - \______________________________

From: chankins@network-one.com
To: feedback@cultdeadcow.com
Subject: Stupid

I am a 44 year old x-marine and I like the martial arts. I stumbled up on
this sick sight and would like to invite your bad-ass's over for a lesson any
time some of the sick cows are in my area.  I would like to practice my neck
breaking tech. on a stupid cow.  I live in Fulton, Ms. and work for the city
utility dept. I am not hard to find. Ask for the Recon. Ranger Eddy.

 _________________________________/new visuals\______________________________

1:"Build The Future" by Myles Long.  A long, hard road is ahead!

2:"Anime Chicks Dig cDc" by Satoshi "Toy" Igarashi.  Anime girl sitting
   around.  Yep.

3:"Good Ol' Boy" by unknown.  George W. Bush, the shape-shifting reptile-
   beast, looking goofy.

 _________________________________/ - x X x - \______________________________

Thanks to the following recent items of influence:

  MUSIC: OutKast, At The Drive-In, Juvenile, AC/DC
   FOOD: sweet-potato casserole
  PRINT: F.E.D.S. magazine, _The Secret Doctrine of the Kabballah_

  WAREZ: Defender, via MacMAME
JEWELRY: iced-down pinkie ring
HOT SEX: yer momma, ha ha...

                     A brief interview with Count Zero/cDc:

CZ: "What you want to talk about?  They ain't my kids and I don't know that
     chick.  Whatever they told you, I don't know that chick."

Thanks, Zero!

Fools better recognize: CULT OF THE DEAD COW is a gift to the women of this
world and trademark of cDc communications.  Established in 1984, cDc is the
longest-running crew in the telecom underground worldwide, and inventor of
the "e-zine."  Every issue is produced on an Apple ][ for genuine tru-skool
flavor.  You thirst for our body of work, you know you do.  Find it at the
cDc Global Domination Factory Direct Outlets:

World Wide Web: www.cultdeadcow.com
        Usenet: alt.fan.cult-dead-cow
           BBS: 806/794-4362 Entry:KILL

For further information, write:

         Email: feedback@cultdeadcow.com
        Postal: cDc, 1369 Madison Ave. #423, New York, NY 10128, USA

xoxoxo,

Grandmaster Ratte'
cDc Warrior-Priest-King
"We're into telecom for the groupies and money.  Bling bling."

           __//////\   -cDc- CULT OF THE DEAD COW -cDc-   /\\\\\\__
 Est. 1984   \\\\\\/   NINJA STRIKE FORCE * HACKTIVISMO   \//////   Est. 1984
                                     ####

We will have more to say.

---


DAMAGE, INC. REVIEWS -                                            {REVIEWS}
Snapshot of things we currently follow/read.

Instead of reviewing web sites or whatever, we decided to just write about the
things we follow and read these days... as the title suggests.  If you have
no interest in knowing what types of sites we frequent, and what types of texts
and zines we read, as offended as we are, you can always just skip ahead to the
next section and read our drug propaganda.  Like we're gonna know you did that
anyway...  Wait, that was a little misleading.  It made it seem like we're not
watching you.  For the record, we know what you read and what you don't.  We're
like Santa all jacked up on steroids with Psi powers comin' outta his ass.  :)


Cult of the Dead Cow - Either you get it, or you don't.  Point blank.  cDc gets
it.  Some people don't get them.  Many do.  All that matters is, they put out
what they want and don't conform to other people.  And that's just damn cool.
I don't just mean in this electronic realm either.  Living that way is the only
way to really live.  Creating what you want, putting forth the ideas you want,
and doing what you want... out of the desire to please yourself instead of
others around you.  Read the interview with G. Ratte' in this issue for better
insight on the group.


SecurityFocus.com - Excellent security information on the site and in the
newsletter.  Subscribing to the mailing list is highly recommended.


Hacker News Network - HNN, maintained by Weld Pond of the L0pht (now @Stake),
has a wide range of newsworthy articles and is updated regularly.  The site
also has a web site defacements list (from attrition.org), for the kids that
want to see all phreaky graphics, messages and shout outs on the latest sites
to be hax0red.  Hehe.


Hack Canada - An excellent assortment of articles relating to Canadian
hacking/phreaking.  New texts are released on a regular basis.  Very informative
and a great resource for the Canadian scene.


Nettwerked - The Clone, who is also part of the Hack Canada crew in Alberta,
has put together a really cool site of his own, along with a zine, K-1ine.  I
realize he has been interviewed and this has been mentioned before in earlier
issues.  And Nettwerked is an affiliate of Damage, INC.  However, it bears
mentioning that with each new issue he releases, the improvements are
drastically noticeable and readily apparent.  If you're Canadian, his site is
a must visit for the solid telco information alone.  In my opinion, Nettwerked
has put out some of the best quality t-files in the Canadian scene...


Adbusters - Culture jamming, Spoof ads, Magazine, Uncommercials, Campaigns like
"Buy Nothing Day", etc.  Are you tired of commercialism infiltrating *every*
area of "society" and aspect of your lives?  Go here and read, then act.
www.adbusters.org


rTMark - An actual corporation that's about trying to improve culture.  As they
say "it seeks cultural profit, not financial."  What a novel concept! Another
quote from their FAQ "rTMark supports the sabotage (informative alteration) of
corporate products, from dolls and children's learning tools to electronic
action games, by channeling funds from investors to workers for specific
projects grouped into "mutual funds."  Go there, read and get involved with
their various projects.  A very cool site that's *about something*.
www.rtmark.com

We also read a lot of the texts and zines on www.textfiles.com and
http://scene.textfiles.com as well.  Plus, we still read some of the zines
we reviewed here in previous issues, etc.


DRUGSTORE COWBOYS -                                                 {DRUGS}
Got drug propaganda?  Trip on this.

We brought back the Drugs section, but decided to give it a hip new name.  Yeah,
that's right.  We changed it *just* so you'd think it was cooler.  The new name
refers to the movie "Drugstore Cowboy", which has a cameo appearance by
Burroughs... who plays an old junkie.  ;)  A cool movie, and a fitting title
for this section... as it reflects what it's about quite nicely.

The anti-drug campaign (or spin/propaganda machine) has been going steadily
for well over half a century now.  You would think that people would be more
informed and enlightened in their views on drugs and drug use by now.  But
governments, law enforcement, the legal system, medical associations and doctors
don't seem to be getting it.  Not in most countries at least.  Not yet.

Some of the most hilarious drug propaganda is circa 1950-1960.  In that era, it
wasn't uncommon for people, especially parents of teenagers, to believe that
their kids would go insane and become sex crazed maniacs from indulging in
smoking marijuana.  Some even thought their children would become enraged,
pyschopathetic killers.  As laughable as that sounds, it's true.  They thought
that was a real possibility.  And the government was behind spreading those
types of outright lies, through their own campaigns.  Rumours became truths.
Were the 50s perfect?  If you wanted to live in a make-believe... dream world,
far separated from reality, then maybe.  Regardless of all the lies that were
spread, people still used drugs throughout the 50s.  The propaganda meant to
fool and scare people failed then, and it's still failing miserably now.

In the 1980s and 90s, the government really stepped it up a few notches.  They
began to run commercials that were chock full of "shock value" -- at least,
as much as they could possibly put into them.  I'm sure you've all seen the
public service announcements on television.  Well, those of you that watch TV
must have.

What about currently?  Well, the anti-drug propaganda is still out there,
proliferating as it always has.  That hasn't changed.  That won't change, until
people realize that it's about *personal choice*.  Drugs can definitely affect
some people's lives adversely.  In other words, it fucks them up and they'd
be much better off without using them.  For others, it's a source of inspiration
and creativity.  As strange as that might seem to some people, it's true.

Regardless of what you use, or don't use, just consider this.  Get the straight
facts before you start fucking around with things.  If you think you can shoot
heroin once, to experiment with it, just to try it, think again.  It's possible,
but it's also more likely that you won't stop at using it once for the
experience.  Unless it does nothing for you, which is pretty rare.  And whatever
you choose to do, research it first.  And if you decide to use pills, get them
tested first if you can.  You never know what shit is going to be mixed in, or
what it really is at all unless you do that.  You don't want to be doing things
that aren't pure.  But with h, you don't want to shoot some that's *too* pure
either.  Anyway, just think about these things, or stick with smoking dope.
By the way, I'm not preaching.  Do whatever the hell you want to do.  But being
careless doesn't make you cool kids.  Dying young doesn't make you cool either.
Remember these things, and make your drug experiences as safe as you can.

Written by BLACKENED / Damage, INC. (C)opyright 2000.


H/P INF0 -                                                            {H/P}
Bringin' back the old sk00l and hittin' hard with it.

Yeah, that's right.  We are bringin' it back.  It ain't all about the Gnu
exploitz.  Sometimes you've gotta go back to the old sk00l... and thus, we're
giving you a healthy dose of it.  Coloured boxes?  You know it doesn't get
anymore old sk00l than that!


Bell Centrex Explained.

While on a trashing expedition, I found some papers that contained information
about the Bell Centrex telephone service.  In this article, I will give you a
brief explanation as to what the Bell Centrex service is, who will have it, and
a list of features that can be taken advantage of if you have access to Centrex.

Bell Centrex is a service that Bell Canada attempts to sell to small businesses
that are too small to purchase a PBX system, but have outgrown the limitations
of basic POTS business services.  For example, a small business may want an
easy way to have phones in their building to have their own assigned extensions.
Bell will try to sell Centrex because they can set it up to do this for a
potential customer.  All Centrex customers will be locked into a three-year
contract, so if you find a business that has just signed up, you'll have three
year to take advantage of the basic features that they will have (if you're
interested in them).

At the site of the Centrex subscriber, there is no hardware or software that
enables them to obtain Centrex services.  The actual Centrex system is housed
and maintained in the confines of Bell Canada.  When someone subscribes to
Centrex, they are given a piece of paper stating the date that they will switch
over from the POTS to Centrex.  That transfer also happens at Bell.  Unless the
subscriber has problems, a technician will not have to visit the subscriber in
order to connect them to the Centrex service.

Bell has made Centrex so that people that have very little or no knowledge of
the telephone system think that it is a PBX.  The first trick they used is to
require callers to press "9" in order to dial out.  Rudimentary extension
service is another ploy to make people believe that they are using a PBX when it
is just the POTS with some extra features thrown in by Bell.  The truth is that
Centrex is a PBX sham, and has none of the flexibility or expendability that any
real PBX system has.

For small business owners that have little knowledge of the telephone system and
don't know or care about what a PBX is, they will be attracted to Centrex
because of all of the "SmartTouch" services that Bell has given Centrex as
standard features.  In fact, don't be surprised if you find that Bell has sold
Centrex to small businesses that have not outgrown the capabilities of the POTS.
If the business subscribes to more than three features like Call Waiting,
Caller ID, Call Forwarding, etc. it is cheaper for them to subscribe to Centrex
then to stay on the POTS and subscribe to individual features.  This can be
valuable to a field phreak that can find a Centrex subscriber because they will
all have the same set of features, and could have them for a substantial period
of time.  I have typed up, word for word, the poorly written Bell Centrex list
of features that I found for your reference.  You will quickly notice that Bell
has given Centrex features different LASS codes in order to activate/deactivate
them:

Subject:  Dialing Plan & Centrex Configuration & Features

1.  To dial local or operator assisted calling card calls press "9" as the
leading digit.

Please remember to reprogram any auto dial or circuit alarm numbers as
per the above dialing plan (ie. Interac, visa/master card machines, built
in speed dial's on your fax).

2.  Call Forward Calls Externally
1.  Lift the hand set
2.  Depress *70
3.  Listen for special dial tone
4.  Dial the number you are forwarding to (remember to dial "9" first)
5.  Listen for the confirmation tone
6.  Hang up

To Cancel Call Forward:

1.  Lift the hand set
2.  Depress *71
3.  Listen for confirmation tone
4.  Hang up

3.  Transfer Calls Externally:
1.  Press the Link key (this places the caller on hold)
2.  Listen for the special tone
3.  Dial 9 + 7 digit telephone number of the person you are transferring to
4.  Announce the call
5.  Press the Link key (this brings the call off hold
6.  Hang up

4.  3-Way Conference Call
1.  Follow the above procedure to the point of announcing the call
2.  Press the Link key
3.  You now have a 3 party conference call using only one line.

If there is no answer, or it is busy, press (LINK) twice and you are back
with your original party.

5.  Call Park:
1.  Press LINK
2.  Dial *72
3.  Listen for confirmation tone.
4.  Replace the handset

6.  Speed Call Short (0-9):
To Store
1.  Lift handset
2.  Press *77
3.  Dial one digit code and telephone number (ie. 0+9+888-1111)
4.  Replace handset

To Use
1.  Lift handset
2.  Press * followed by one digit code (ie *0)

7.  Ring Again:
To Use
1.  You have called someone and have received a busy signal.  Press LINK +

2.  Replace the handset.
3.  When the called station becomes free you will hear the Ring Again
notification (one long and two short rings.  Lift the handset.  The call
will automatically ring.

To Cancel Ring Again
1.  Lift the handset.  Listen for the dial tone.
2.  Dial *76.  Listen for the confirmation tone.
3.  Replace the handset.  Your request will be cancelled.

8.  To Call Forward on a No-Answer Condition:
1.  Lift handset and pick telephone line
2.  Dial *90 (listen for confirmation tone)
3.  Enter the telephone number you wish the call directed to either an
external number (9+7 digit telephone) or internally to a 4-digit number
within the office.

To Cancel Forward on a No-Answer Condition:
1.  Lift handset and press a line
2.  Dial *91 (listen for confirmation tone)
3.  Hang-up receiver

9.  To Call Forward on a Busy Condition:
1.  Lift handset and pick telephone line
2.  Dial *88 (listen for confirmation tone)
3.  enter the telephone number you wish the call directed to either
(9+telephone number for an external number) or a 4-digit extension or
another number within your office (last 4 digits of the telephone #)

To Cancel Forward on a Busy Condition:

1.  Lift handset and press a line
2.  Dial *89 (listen for confirmation tone)
3.  Hang-up receiver

10.  Call Waiting:
When to use Feature
1.  To answer a second call
2.  To end current caller

To Use
1.  When you HEAR a TONE through the receiver press LINK once.  The first
caller is put on HOLD automatically.
2.  Replace handset.  Your telephone will ring.
3.  Lift the handset, you are now connected to the third party.
4.  To return to first caller, press LINK once.
---

Written by Shatazar / Damage, INC. (C)opyright 2000.


Modem Brown Box.

By Phractal.

Using your modem as a bridge for two separate lines to create '3-way calling'

This is a common scenario that many dialup users of the internet have on
their computers. Many people have two phone lines at home, for the
convenience of being connected to the internet via telephone and also being
able to use the other line for voice calls.

In this diagram, we start out with two separate phone lines, each having
their own unique telephone number of course. One line supplies Phone A with
access to a dialtone. Line two plugs directly into the modem. Almost all
telephone modems have two phone jacks. One is meant for the incoming phone
line (ie the line coming from the wall), and the other is meant to attach to
phone (Phone B), which can be used when the modem is not in use, and will
operate on the same line as line 2, naturally. This is where 'I' and 'O'
labeled on the modem come into place. The 'I' stands for input, and the 'O'
stands for output. On many modems, the input jack is labeled 'Line', and the
output jack is labeled 'Phone'. When the modem is not in use, think of it as
a router for Line 2 to Phone B.



   Line 1       Line 2
Phone Line   Modem Line
     |~|         |~|
      |           |
      |           |
      |           |                                /----------\
      |           |                                |          |
      |           |       /-------------\          | Computer | /----------\
      |           |       |             |          |          | | @@@@@@@@ |
    _______       \-------|<I           |          |          | | @@@@@@@@ |
   #########              |    Modem    |----------|          | | @@@@@@@@ |
  ###|___|###     /-------|<O           |          |          | \__________/
    * 123 *       |       |             |          |          |---\      /
   *  456  *      |       \-------------/          |          |  _/______\_
  *   789   *     |                                |          |
  ***********     |                                \----------/
    Phone A       |
                  |
               _______
              #########
             ###|___|###
               * 123 *
              *  456  *
             *   789   *
             ***********
               Phone B

With some tinkering, all the materials described and illustrated above can
be
used to create a bridge of two separate phone lines. This means that you can
call two separate phone numbers and communicate with the people on the
receiving line at the same time, and they can hear you, and they can hear
each other, and not just you. In laymen's terms, it's three way calling. It
isn't really three way calling, because actual three calling is a service
offered by the telephone company to a single phone line, but this plan has
the exact same effect as actual three way calling. It is cheaper to have one
phone line with the three way calling plan, than to have two phone lines,
but if you have/need/prefer two phone lines, you can use this method to make
three way calling using two phone lines. This is totally legal as well. You
can do this same procedure with a phone that accepts 2 lines.

To achieve this method of three way calling, setup your modem, phones and
phone lines in the following manner:



   Line 1       Line 2
Phone Line   Modem Line
     |~|         |~|
      |           |      /Note: Line 1 is connected to wall, and
      |           |     /       unplugged at other end
      |           |    /                           /----------\
      |           |   /                            |          |
      |           |  /     /-------------\         | Computer | /----------\
      |           | |      |             |         |          | | @@@@@@@@ |
      \-----------|-----   |<I           |         |          | | @@@@@@@@ |
                  |        |    Modem    |---------|          | | @@@@@@@@ |
                  \--------|<O           |         |          | \__________/
                           |             |         |          |---\      /
                           \-------------/         |          |  _/______\_
                                                   |          |
                                                   \----------/

    Phone A          Phone B
    _______          _______
   #########        #########
  ###|___|###      ###|___|###
    * 123 *          * 123 *
   *  456  *        *  456  *
  *   789   *      *   789   *
  ***********      ***********
       |                |
       |                |
       |                |
       |                |
       |                |
      |~|              |~|
    Line 1           Line 2

Phone A and B are both unplugged from their previous destinations. They need
to be plugged into other telephone jack terminals for Line 1 and Line 2. Be
in mind, these are still the same Lines that were mentioned before. At the
original terminal, Line 1 directly from the wall is now unplugged (but get
ready to plug into Input/Line modem jack on modem), and directly from the
wall, line two is plugged into the the Phone or Output jack.

Instructions for three way calling operation:

1) Pick up Phone B connected to Line 2 and hear a dialtone. Dial a phone
number of someone you want to speak to.

2) While talking on Phone B once they've picked up and you've confirmed a
connection, plug line 1 into the Input/Line jack of the modem.

3) You should hear a dialtone, but you are still also connected to your
friend who you previously called. You can still hear each other if you speak
loud enough over the dialtone. This dialtone is the dialtone of Line 1.

4) Pick up Phone A, which is connected to Line 1 and dial a number of
someone
you wish to speak to. You should hear the tones of the numbers being dialed
on Line 2/Phone B, as well as Phone A of course. The dialtone will stop
as it always does once you enter a DTMF tone.

5) If all goes well, and the third party picks up, both of the people can
talk to you, hear you, and hear each other, hence three way calling.


With step  4, you can dial the third party directly from your second line,
or
in this case, Phone B. I told you to dial from Phone A because it better
illustrates how this works.

Also, reset to original setup to get online :)

~~~Why this works.~~~

The Output jack for the modem also accepts input over a phone line, because
otherwise, how would you talk to someone on a phone routed through a modem,
without them hearing you. Your voice is the input.

The Modem thinks that the lines you connected in diagram 2 are one phone
line. And since the Line 2 is connected to the output modem jack and then to
the wall, instead of an individual phone, the modem is now in essence,
'connected' with the rest of the phones all hooked up to line 2.

The thing that triggers the whole thing is when you connect line 1 to the
modem. Now, I'm not totally sure why this part happens, but I think it's the
modem trying to figure all of this out. So here's my hypothesis: The modem
recognizes that there is activity on Line 2, so it opens up the Input jack
for information automatically, and therefore, you get an auto-dialtone when
you insert Line 1 into the 'Line/Input' Modem jack. The modem is basically
taking the phone off the hook on the Input jack. And it's all ready for you
once you insert Line 1.

Slackware ownz!

--Phractal

Okay, maybe that was a little too "old sk00l".  Anyway, look for a cool article
on firewalls - Got Firewalls? - to be here in the next issue.


INTERVIEWS AND INTERROGATIONS -                                {INTERVIEWS}

In the last issue, we had a collection of interesting interviews.  Personally,
I especially enjoyed reading what <predator> had to say, since he has strong
opinions, beliefs and a very unique take on things -- including "society", its
rules and laws.  And now we're giving you even more to contemplate with our
latest interview.

Grandmaster Ratte' (cDc) is in the spotlight.  Obviously, Cult of the Dead Cow
is a very well known, revered, respected, influential group in the scene.  Since
1984, they've been doing nothing short of kickin' fuckin' ass.  With the longest
running e-zine, a diverse group of members and a wide assortment of releases,
along with media saturation, cDc stands apart from all the rest.  More than just
being high profile, their members have made a huge impact and countless valuable
contributions.  Bow to the Cow.

I'm eternally grateful that he has agreed to be interviewed for the Damage, INC.
Newsletter.  His insight into the scene is immeasurable and comments invaluable.
But enough with the pre-interview hype, adulation and near awe struck admiration
of cDc.  In this interview, we explore everything from the group dynamic of cDc
to other topics such as Hacktivism, etc.  Just read the damn interview and enjoy
it without dropping your jaw so much that your keyboard becomes covered in thick
saliva.  This interview was conducted towards the end of December, 2000, and it
commences right here...


Alias: Grandmaster Ratte'
Group(s):cDc communications
Country: US of A

Description: SWM, 30, 2 legs, non-smoker, active, fit, enjoys knitting and cats.
Seeks baby seal for (c)lubbin'.

Music: minor key stuff with a catchy melody, all styles

Movies: sitting way down close to the screen to get my money's worth of
spectacle

Books: non-fiction

Email: gratte@cultdeadcow.com
IRC: gratte
Usenet: alt.fan.cult-dead-cow
URL(s): www.cultdeadcow.com

<B> - Since no introductions are necessary, I'll just jump right into the
real interview questions.  How has cDc managed to stay together, evolve and
be so productive throughout the years?  Many other groups have disappeared,
dissolved and basically weren't able to adapt and keep evolving.  I realize
that cDc is fundamentally different, but, it's still an amazing feat to last
so very long.  And the fact the group is still growing and expanding its domain
is also impressive.  So, the question is, what's the driving force behind the
group?  What's responsible for it continuing to grow and thrive?  And how are
you able to maintain such dedication and diligence?

-----

Well, cDc resulted from a name change to an earlier group called Pan-Galactic
Entropy that I had started in '83, '84 in Lubbock, Texas (806).  We were the
local BBS scene kids, mostly in junior high, and the majority of us were running
our own boards... on Apple II's,  Texas Instruments 99/4a's and Atari 800's.
Lubbock is a weird little college town in the middle of cotton field country.
There's sort of a clique of the offspring of the Texas Tech University
professors and the students who tend to find each other and huddle together in
the midst of tumbleweeds and pickup trucks with gun racks.  So that was us.
A lot of other computer underground things came from that unlikely place.  In
the '80s there were two major h/p BBS's there before ours, and GwD and F.U.C.K.
(now Attrition.org) started there; all revolving around the university.

Enough background, now I'll answer the question...

In 1986, I came up with the cDc name and Franken Gibe joined.  Gibe's a really
sharp visionary type, and we would talk endlessly about the hacker/BBS scene and
what we didn't like about it, and what we wanted to do with our own group
differently.  So the two of us really put together the whole 'concept' that's
been driving everything since.  Fortunately, the concept is  very broad and
inclusive and says basically, "The technology is not the point - it's just
a means to something else."  That right there put us 180 degrees apart from
every hacker group before and it still trips up most people I think in the
'scene' - they fall in love with the gadgetry itself and don't see that's just
a dead end.

Until it's too late and they're burned out from a small idea that can't grow.
So our mission is to use these crazy communications tools to figure out
something else.

When we started, it was about using the free long-distance phone calls, and now
it's on the 'net.  No difference.

In practical terms, you stay together through... stubbornness?  cDc is my main
creative outlet, I _have_ to do this.  For a group to survive, I think it has to
have passion about what it's doing, 'cause there's not much else to sustain it -
no salaries or concrete payoffs.  The most rewarding thing about it is the sense
of accomplishment when you've done some work you know is good, and the feedback
you hopefully get from people who dig your stuff.

The trick is to keep it fresh and interesting for the people involved, which
means change and growth if you're determined to stick with your plan.  It's
inevitable.  As Woody Allen said, "Ninety percent of success is just showing
up."  So show up, put in work, keep doing it, and there ya go.

People come and go from cDc.  There have been 50 or so members over the years,
and we tend to have an active lineup of around 20 people at any given time.
Currently, some of the people have been in since the mid '80s and some around a
year, and they're all still bringing different things to the table.
The concept of cDc includes a change of roster... the concept has to be bigger
than any of the people.  Individuals are flighty, they change and their lives go
this way and that and a group has to accommodate that reality or it can't work.
As long as there are people willing to do the necessary grunt work, things'll
hum along fine.

-----

<B> - Hacktivism is one of the topics that I simply couldn't ignore during
the course of this interview.  So let's get into it.  In your opinion, what's
the importance of Hacktivism as it stands right now?  And, do you think it'll
be even more important in the future?  Will it be more of a potent tool to
get political messages across?  What are you views on it as a means of
protesting and enacting change?

I'd say right now, Hacktivism is a bubbling idea.  It's still in the pot, and a
lot of people are standing around the stove rubbing their hands, waiting to dig
in.  We've got a "subsidiary" now called Hacktivismo that OXblood Ruffin is
stirring up... they're all hot-shit coders and are working on practical human
rights apps that will make Hacktivism a more concrete force.

Hacktivism is about finding a political, real world end to these tech means...
which is exactly the same as the cDc concept.  So it's another way to spread our
idea about what the point to all this is.  Yes, I think it will be very
important in the near future.  I think a lot of people are and many, many more
will be picking up the flag and running with it.  It's something to care about
and fight for and I'm proud to be involved.

-----

<B> - Since cDc is producing and releasing audio now, and you mentioned to me
that you've been really into it for 10 years or so now... I thought it'd be
prudent to ask what the plans are.  How big is cDc gonna get into audio and
what types of projects are in the works?

Yeah, I've been playing bass and guitar and yelling in zillions of noisy bands
since I was 16.  Then I got into hip-hop and dance production in '90 with an
Amiga and a little keyboard and a 4-track.  Franken Gibe and I started a punk
club with partners who had a skateboard park in a warehouse and we put on lots
of shows for a few years.  Some raves, too.  Then xxxclusive and I put together
a lil' ol' recording studio in a few different places and we did tons of demo
production, mostly southern gangsta hip-hop and punk rock.

We're gonna be very into audio, at least as much as we've been into text files.
The first MP3 we put out was in mid '97, and now we've got the bandwidth to
really do things right.  The plan is to target the music scene specifically with
our audio and do lots of stuff with the guys running Shoutcast sites.  So we'll
plug along with our telecom, no-budget way of doing things and then a few years
later the old conventional scene maybe will notice what we've been up to.  That
seems to be the way it goes.

-----

<B> - cDc is infamous for its media relations.  By that, I simply mean, the
group is very well known in media circles, and utilizes the mass media as an
outlet.  In fact, in my view, you're masters at it.  My question is, how was
this relationship with the media formed and achieved?  Who is responsible for
forging these media relations?  And how important is the media aspect to cDc?

In school in the late '80s I wrote a paper about "electronic publishing" and
how important I thought it would be and the professor said it was a ridiculous
idea.  Ha.  In college, I got a degree in telecommunications - which means radio
and TV stuff.  I also had classes in journalism, public relations, marketing,
advertising, and media law.  So I was in all these classes learning about
dealing with the media, and I thought, "Well, we've got a magazine, sort of, so
why not act like it?"  I was just using standard media relations tactics in a
new environment.  I'd scour every magazine I could find for email addresses
(this was way before dot com mania and e-i-e-i-o-everything) of "movers and
shakers" and send them press releases about our stuff.

Relating to the media is very important for cDc for two reason.  One, because
mass media is how you spread a message  - advertising costs money, but public
relations work is free.  Two, because in the context of what we do, issuing
press releases and fielding interviews and such is freakin' hilarious.  And so,
the more the better.  We catch flack from a few humorless gimps in the hacker
world who don't get it, but the press aren't the enemy.  They're just cats doing
their job and most of 'em are cool folks.  They want a hook, they want "riveting
drama", 'scool.  You hang out with a reporter at a restaurant, they pay for your
food, you tell 'em a story.  If it's not you, they'll just go find some other
car wreck to look at.

Different people in the group field different kinds of questions, so between us
we can cover things pretty well.

-----

<B> - On a similar note, cDc has always been excellent at promoting itself
within the scene, and even outside of it.  The group is well known for its
unmistakable style and flash.  And so, relating to this, how do you put
together the shows you put on at the various hacker cons the group attends?

We use a lot of antihero imagery to wrap up an essentially positive message -
most people figure it out but a few knuckle-draggers don't get it.  That's ok,
they don't have to.  We do these things because it's fun to scheme and plot and
use these techniques in this context; we're playing around.  We're not making
money and we're not trying to trick anybody.  The attitude is that we definitely
want everybody in on the fun, ya know.  The only market we're interested in is
hearts and minds, and the point will be more clear as our agenda emerges over
time.

We plan for the shows we do in email mostly.  Then as the time draws near, a lot
of work goes into getting lights and sound working right (sometimes) and
whatever printed materials we're giving out to press, throwing to the crowd,
etc.  We have to put the recorded audio together on a CD, and maybe there'll be
some video.  Which is a nightmare with video projectors and such. Of course
you've gotta have some sort of show concept, and you have to script out who's
saying what and when.  Then you've got costumes to put together, and props and
figuring out how to get all your junk to the location.  When you see the stage,
you have to figure out staging: how you come in, where you stand, who does what
where.  How the lights are going to work.  The audio cues.  At H2K we had a
theater group doing a play and so I had to meet with them several times for
script-writing and rehearsals.  They did a great job.

We also did three musical numbers, and so the people involved with that had to
know how the songs went and what they were supposed to be doing.  It's a whole
big fat ton of work to put on those shows and they cost quite a bit of money to
do.  We don't get paid for them either, so we hope to make some of the money
back with t-shirt sales.

-----

<B> - Judging by their writing, quotes in articles and interviews, each member
of cDc seems to have a very distinct style, unique personalities and interests.
It's a group of real individuals, which is very cool.  And you keep it fresh,
by adding members, expanding, constantly getting into new things, etc.
The group as a whole seems to have its own culture, at least that's how many
outside observers view it.  More than just a generic hacker culture.  Can you
rant a a little on cDc culture, and give us an idea of what some of the basic
ethics and ideals of the group are?  Is there anything that isn't permitted
within the "boundaries" of cDc and all that the name encompasses?

Yeah, everyone in cDc is definitely their own person and we want them to project
their characters as much as possible.  We have an internal culture of
communicating on a personal level with each other, in most cases for many years.
Before everyone had Internet email, cDc communicated through a private message
board on the Demon Roach BBS.  Then that switched over by the early '90s to an
Internet mailing list we're all on.  We talk about intimate details of our
lives, know embarrassing things about each other, etc.  There are cliques within
the group, but for the most part we're all fairly close friends.  I guess you
could say the culture sort of comes from knowing that this isn't a regular
hacker group, it's not supposed to be, and that we're pushing for something
else.  Finding something else is the culture of the group.  That's what keeps it
fresh and interesting for us.  Being in cDc is like being in a band, or a gang,
or both.  But it's a new definition without the traditional boundaries.  It's
much better.  It's an ideal, a lifestyle.  The ideal is to be this renaissance
person, mad ninja skills in all aspects of life, enlightened, uber-el33t, etc.
So maybe you're really a bit lamer than all that superstar stuff, but ya know,
at least you can inspire your own damn ass.  And that's pretty cool.

-----

<B> - How has cDc changed since you first started writing and releasing issues?
I still vividly remember reading cDc's t-files from the 80s... with the early
ones including song lyrics for albums, lists, telecom terms and that sort of
thing.  The evolution of the group was so clear and apparent as each year
passed.  Was it as natural an evolution as it seemed?

We started doing text-files in '84 and over the next year or so we had amassed
quite a few.  With the name change to cDc, we started numbering the text files
to make them collectible, so you could tell if you didn't have them all.  Before
that, nobody was numbering anything.

Quite a few t-files didn't make the cut at that point, though you might still
see them floating around.  So by then we had a little 'zine with enough articles
to warrant our own subdirectory on a BBS.  The next issue was distribution, so
we made a point of making damn sure all our files got onto the biggest h/p and
text BBS's at the time.  We would recruit sysops into our efforts; for a long
time we had an organized "Factory Direct Outlet" distribution plan to
guarantee certain BBS's would carry our releases as soon as they came out.  So
we basically churned away like this, growing  gradually,  until 1993 when
Drunkfux set up our first Internet site, cypher.com.  Mindvox was also huge and
we were all over it, a telnet-able BBS in New York that everybody who was
anybody was on.  This was when the "cyperpunk" thing was happening, the last of
the big hacker-scene busts was going on, and we started doing press releases
through Internet email.  We had a _massive_ email list then, which I'd send out
manually one at a time and it took days to send out a PR.  The goal was if you
had a computer and a modem, we wanted to be in your face about cDc.  This
was when the hacker cons became more widespread... SummerCon had been going on
yearly in St. Louis with the Phrack scene, but now Defcon started and Drunkfux
had his HoHoCons ( in my opinion, the best - freakin' NUTS - cons now are
watered-down pussy shit compared to those).  So by the early '90s, the Internet
happened and we grew beyond the BBS scene and that's been the situation.  We've
been wanting deliriously to do wider media than t-files for almost ten years now
but didn't have the bandwidth to handle the kinda traffic these releases move.
I'm very excited about that stuff.  The cDc web site has been totally redone six
times now I think, and the latest is kinda cool.  It has a "content management
system" - w00.

-----

<B> - What do you think the legacy of cDc will be?  What will the group be
doing 5 or 10 years from now?  Yes, I'm basically asking you to predict the
future.  ;)

Astral travel.  Building an army of psionic warriors to battle the alien
reptilian overlords in the 4th dimension for the fate of mankind.

-----

<B> - Excluding BackOrifice and BO2K, what has cDc written or done that made
a huge impact on the scene?  (including texts, ideas, ideals, terms coined,
philosophies, etc.)  And which cDc issue stands out in your mind, and why?

I think our biggest impact has been the idea of electronic publishing, through
the e-zine, webzine, whatever.  BO is a cool app and made a lot of noise but in
the big picture, coming up with "new media" is a way bigger deal.

We're sort of in a weird position, because on one hand we're the flagbearers of
certain "old skool hacker" traditions - on the other hand, we were all
about breaking from some of that when we started.  Now the cultural enemies are
the dot com ninnies and the scared reactionaries who come following them not
realizing what they're getting into.  You can't just hide the Playboys in the
dresser and keep the scary books out of the library any more - gee, maybe you
should stop treating your kids like retards who have to be sheltered from
anything challenging, and they'll turn out better.  I'm digressing, sorry.  I
guess the influence to the hacker scene in general is the attitude that we're
here to have fun and build something cool.  In particular, there are tons of
details... I'll see quotes from us in the mission statements of groups,
unattributed.  File templates cut and pasted from ours.  Too many to think of.
Tons of times I'll be reading somebody else's etext or whatever and think
"Oh, that came from my...so and so".  References and whatnot all over the place.
It's cool, it's fine.  Everything's always built on what came before.  We were
looking at the Apple Mafia and LOD/H and figuring out what we didn't wanna do
in the early days, and now we're thinking about the Rolling Stones (in '73) and
KISS.

But the most important cDc innovation: MIXED-CASE ACRONYMS!!

The cDc file that stands out the most to me is #200: "Super mega blah blah
blah."  That damn thing took like a year to put together, and I remember
finishing it up at some crazy hour of the morning just before I drove off for 7
hours to a HoHoCon.  I hadn't put out a file all year, we had been stuck at #199
forever and everyone in the group was pretty pissed off.  So I basically
couldn't show my face without that file.  I brought it on a floppy and all was
well, and I still think it's the best file I've done by far.  I've been really
happy with the concept, an elaborate Dickens parody through the eyes of a BBS
sysop.  Another file that stands out to me is the "Six Million Dollar Man -
alien conspiracy" (#253) thing.  At some hacker con, Omega and White Knight
had a handful of copies printed out and announced he had this "special
exclusive paper" and these journalist guys were LEAPING for it, yelling "Press!"
It was too funny, and something really clicked for us, seeing that.  Also, I
remember that Mormon-expose file by Krass Katt being kind of an "oh wow" moment,
along with the first time I'd seen all that UFO-Roswell-MJ12 conspiracy stuff...
Gibe and I used to sit around, freaked out, talking about all that business when
we first found it on the old UFONet boards in the late 80s.

-----

<B> - You mentioned HOPE was more interesting this year than Defcon... How
was Jello Biafra's speech?  What's your take on cons in general?

As far as cDc stuff goes, our show at HOPE last year was probably the best live
show we've ever done.  Then two weeks later at Defcon, very little went like it
was supposed to, and it was pretty disappointing.  I remember coming back to the
"Suite of the Elite" after the show just feeling down and mumbling to myself,
"It didn't work, it didn't work."  We had a lot of communications problems
within the group leading up to it and we weren't really on the same page.  And
then tons of technical glitches and general confusion led to a half-assed show.
But we learned a lot about what not to do and to not just assume things will
work out, and next year should be insane.

Jello Biafra's speech was really cool, I think it's definitely what's needed -
an outside voice  pointing towards some sort of agenda, via hacktivism and such.
I think the problem with these cons has been sort of a blase' attitude - I see a
lot of kids throwing themselves in these "Internet security consulting
companies" trying to act like some dim-witted view of what "professional" means
and not seem like they're 16 years old.  Thinking they're going to pull a L0pht
and somebody's going to throw 'em some money.  Get real, kid.  Too much
unimaginative dull thinking going on, people not seeing the big picture or
thinking about the potential here.  Enough complaining though, cons are still
great and everyone should go if possible.  It's really fun to meet people from
the pages and IRC and hang out for a weekend.

-----

<B> - Do you want to give any shout outs to anyone?

Yes, everybody who's helped us out in some way over the years.   Carried our
stuff on their system, put a sticker someplace, bought a t-shirt, sent some good
feedback, told someone about cDc, lugged stuff around at a con, wrote a story
about us.  We appreciate it very much.  We're so grateful to everyone.

-----

<B> - Thanks for doing this interview.  We really appreciate it.

Thank you, it was fun.  Happy New Year, y'all...

G. Ratte'/cDc

-----

Afterward:

To say the very least, interviewing Grandmaster Ratte' has been a real highlight
for me, and has made this issue special.  I remember reading cDc issues in
the late 80s, when I first got into BBSing and the whole text scene.  In all
honesty, I grew up reading cDc.  Their files are the biggest reason that I
got into this at all.  And, I can still vividly remember scanning while reading
the latest cDc issues.  ;)  So, massive thanks to G. Ratte' and the rest of cDc
for putting out such high quality material throughout the years.  It's amazing
how they've been able to play such a prominent role in the scene for so many
years, and still not take themselves too seriously... and keep their sense of
humour, etc.  Thanks again for giving our readers a chance to get to know you
and cDc better.  And keep sending the cDc PR our way.

To our readers, make sure you hit www.cultdeadcow.com and check it for all their
cool new stuff.  Damn straight you better!


NEWS FROM THE TRENCHES -                                             {NEWS}

WXYZ Channel 7 Action News at 11 from Detroit City baby!  We're down in the
trenches and we're diggin' up the dirt for your reading pleasure.  Once again
it's time for the News.  So hold onto your hats folks, because this edition
has more flash, razzle and dazzle than a Vegas show and a newsstand tabloid put
together.  Yeah, that's right.  We've got the straight dope on all the
happenings.  And, we're reporting live from the source, inside the heavily
guarded Damage, INC. compound.  So get up, wake up and come with it now!

We realize it has been a long time since we've released a new issue.  But
since the end of June, a hell of a lot has been going on.  However, we're off
to a good start in 2001.  And that's all that really matters right now.

Our texts are now readable online at www.textfiles.com/groups/DAMAGEINC/
Yes, the URL is case sensitive.  Yes, our directory is right below cDc on
the groups page.  We know.  ;)

A new edition of the Phreaky Field Phreaking List for Winter 2001 is on its
way to CRTs and printers everywhere.  So, look for it to be available sometime
in January.  Hit the site for all the details.

We also have a few little projects in the works.  More details will be released
at a future date.  I just wanted to create some anticipation and leave you
wondering...  Here's some hints.  Think merchandise.  Think phreaky.  Think.


OBJECTIVE OPINIONS -                                             {OPINIONS}
The Propaganda Machine Rolls On.

Spinning its wheels, spinning its spin, the propaganda machine always manages
to roll on.  It's wheeling and dealing, churning and turning, bubbling and
sputtering, but it still always manages to spout out misinformation and
disinformation when it's called upon.  It's a public relations machine and a
corrupt politician's dream.  It's big, bad, nasty and mean.  And it's churning
out lies throughout the world, in every scene.

Propaganda is defined as being "an association, organized scheme, for
propagation of a doctrine or practice; doctrines, information, etc. thus
propagated; efforts, schemes, principles, of propagation."

Simply put, that means the spreading of information, ideas, beliefs, dogma,
principles, and systems by way of an organized scheme or effort.

The focus of this article isn't just propaganda, but rather the actual workings
of it.  As in, the machinery that drives it, creates it, and spreads it.
Picture the image of a steamroller, except it is able to travel at the speed
of information, faster than the speed of light.  Now think of that information
being tainted and corrupted.  The highways the propaganda machine paves over
previously contained truth, but now they're built on falsehoods and lies.  In
essence, that's how it works.  The question is, who's driving it?  And what are
the reasons for wanting to spread lies?  Why use propaganda at all?  What is the
purpose of it?  In this article, I'll attempt to answer those questions.  In the
process of doing that, I'll state my own opinions on the propaganda machine.
Just keep in mind, no one's opinion is completely objective.  There's natural
bias and subjectivity built into them all, including mine.  However, most people
won't admit that before stating them, since consciously or subconsciously they
want you to agree with them and believe everything they've written.  Unlike
those people, I'm willing to honestly make an admission such as that up front so
that you know ahead of time.  That way, you can think and form your own opinions
while reading this article, without being influenced in any way to agree with
me.  That being said, here's the truth -- as I see it -- behind propaganda.

Propaganda has infiltrated every facet of our so-called "society", from
government and military reports, to campaign advertisements during elections.
But that's not all.  That's just the beginning.  It takes on so many forms that
it can sometimes be difficult to recognize as being propaganda at all.  It has
spread so far, that it's literally everywhere and in everything now.  In fact,
it has become ubiquitous.  Just like Big Brother.  Sure, we've written about
propaganda before.  And you know it's one of Big Bro's favourite tools to use
against us, to influence us.  But do you know how it works?  Do you know how it
gets inside of your brain?  It's brainwashing.  It's out and out mind control,
just as much as any other technique that relies on technology.  Hell, your
television and radio are both technologies that can be used to spread
propaganda.  They're part of the machine.  They're tools.  Computers are also
tools.  Nothing is completely good, or completely pure.  Almost any type of
technology can be used against us by Big Brother.  Nothing is entirely
beneficial and harmless.  Nothing.

Obviously, the answer to the first question of who's driving the propaganda
machine is Big Brother.  They're in the driver's seat.  They're at the helm.
They're pulling the levers, hitting the switches and pushing the buttons.  And
they're pulling the strings too.  But not all of us are naive puppets, and so
easily controlled by the propaganda machine.  We aren't all zombies, yet.

The reasons for wanting to spread lies, disinformation and misinformation are
simple.  It keeps us from knowing the truth.  It influences the public to think
they know what Big Bro wants them to know.  It throws them off track.  It keeps
them blind and in the dark.  It keeps them down.  It keeps them ignorant.  It's
a barricade that keeps them out of the loop.  They can't get at the inside
information.  They can't get the real stuff, the truth.  They can only feast on
the lies.  They can only rely on what they've read, heard, or been told.  And
many of them believe it, without question.

The actual propaganda machine is media.  And I don't just mean mass media
publications, broadcasts and the the various media organizations and outlets in
the world.  That is, even though the mass media has always been one of Big
Brother's closest allies... they aren't the entire propaganda machine.  The mass
media is just the biggest part of the engine.  It consists of much more than
the mainstream media sources and outlets.  We're talking about a huge, worldwide
machine that can encompass even the smallest zines, pamphlets and leaflets.
Hell, propaganda can be something as small as a flyer that has been stuck
underneath the windshield wiper on your car.  And it can be as big as a
government controlled, national television news station.  It isn't that easy
to bring it to a halt either, unless you revolt and overthrow the government
behind it.  Yes, that happens, but look at the damage that has already been
done by the time it's taken off the air.  Ask a Russian about Stalin, and even
now, the older ones will still speak of him with reverence and respect.  That's
propaganda at work, long after his death.  Long after the demise of the machine,
the imagery it brainwashed people with can still live on.

Propaganda is often spread by word of mouth from person to person as well, in
the same way that rumours are.  This method isn't as slow as you may believe.
If people are already prone to believe something, they'll spread it like
wildfire throughout their area.  And in turn, the people they tell will be
likely to do the same.  It continues from there until entire cities believe
something that's entirely false.

Things have changed drastically in the last century though, with the advent
and widespread use of technology such as television, radio, etc.  And of course,
now there's the Internet, and people have high speed digital connections to the
rest of the world.  And so, that just means propaganda can be spread even
quicker than in previous generations.  A wired world aids the spread of
propaganda more than anything else.  Technology only enables propagandists to
spread their lies anywhere and everywhere in what equates to a millisecond.
Propaganda at the speed of light.  Broadband bandwidth for propagandists
everywhere baby.  That's where it's at.  Now anyone can spread their message,
and reach anywhere on the globe with it, faster than previously imagined.

Propaganda is, and always has been, a powerful force.  It's a tool of choice for
governments across the globe.  It is, without a doubt, one of the oldest forms
of misleading people.  And it has been a proven means of swaying public opinion
and creating popularity in order to obtain power and control.  Certain political
parties (past and present) perfected the use of propaganda to the degree that
they could attain whatever power they wanted, and do whatever they wanted, with
very little opposition.  In fact, the holocaust during WWII was due in no small
part to propaganda.  Yes, propaganda can lead to massacre.  Once mastered, it
can influence people to do anything.  A well oiled propaganda machine can kill
and slaughter anyone in its path, very easily.  The corpses it leaves in its
wake aren't even speed bumps.  They don't slow it down at all.  It just rolls
on and on.  Usually counter-propaganda and physical force are all that can stop
it once it gets going.  Propaganda warfare.  That can be just as dangerous in
an unstable world.  So, the next time you read something, consider the machine
that might be at work behind it.  Rolling... rolling.  Churning and burning.

Written by BLACKENED / Damage, INC. (C)opyright 2000.


Hacker Culture.

To paraphrase what Erik Bloodaxe once wrote in Phrack during his editorship,
technical articles aren't as memorable as hacker culture.  And long after they
were written, they aren't usually very useful either.  Most often they're
virtually obsolete as you would be hard pressed to find an active, working
system around that they describe a decade or more after they were written.  But
the articles on people, the stories and the hacker lore survive years, and even
decades after they're written.  In this article, I'm going to attempt to explain
why, as well as give my own opinions on hacker culture, past, present and
future.

Hacker culture grows and evolves like everything else.  In hacking, it's the
people that make it interesting, and the people that are remembered.  Of course,
many of those people are involved in groups, have web sites, and contribute to
zines, etc.  And so that's an important part of hacker culture as well.

Stories and memories are what keep things alive.  A well known hacker may decide
to quit the scene, but they'll forever be remembered by alias and/or by name
by the many people that remain active in it.  They'll also be survived by the
things they wrote during their time in the h/p scene.  The same goes for hacker
groups and zines.  They may be retired, but they'll still exist electronically.
They'll still be remembered by people, if they were memorable to begin with.
Hell, there are several 1980s groups that people still talk about today, and
zines from that era that are still read.  They don't just disappear and fall
into the abyss.  They don't fade away that quickly and easily.  Hacker culture
survives from generation to generation.  And that's actually a good thing.  We
shouldn't allow the past to just be forgotten.  It's important to document and
preserve the past.  Credit should be duly given to anyone that does that.

Why does hacker culture, and the past survive?  The simple answer is, it's
difficult to kill a legend.  For example, a group that receives a lot of
publicity, notoriety, and is involved in many well known events, scandals,
rumours, has members part of famous hacks, crackdowns, busts, and whatever
else is bound to be the topic of many conversations.  Hype about them is
inevitably created.  Stories are told and retold.  They're passed from person
to person, and their name survives.  The members might move on to different
things, but their association with a long lasting group isn't severed.  The
same goes with certain popular zines.  The editors become linked to that zine.
The mere mention of their alias automatically makes you think of the zine that
they created, or were the editor of.  They go hand in hand.  The same applies
to people that were involved with well known hacker groups.  If someone says
that alias, you think of the group they were in.  It's word association.  In
some cases, you can't think of one without thinking about the other.

Here are a few things worth mentioning and commenting on:

LOD Communications started a project of documenting the history of many
underground hack/phreak boards in 1993.  Although LOD wasn't able to gather
together as many complete message bases from all the boards they had hoped,
they did manage to put out quite a bit of very interesting, nostalgic material
from several well known boards from the 80s, such as Phoenix Project, Black Ice,
etc.  And so, they did preserve some of that history, which is cool.

Jason Scott of www.textfiles.com fame has done an excellent job of preserving
files that might otherwise have been forever lost.  He maintains a huge archive
of t-files, including those released by individuals, groups and has an extensive
collection of zines.  Massive site... and massive props should go out to him
for the tremendous work he's put into it.

scene.textfiles.com also does a great service by providing information regarding
the release of new zines and new issues of zines, etc.  Gotta get your ascii
fix.  ;)

cDc (Cult of the Dead Cow) has been a fixture in the hacking scene since 1984.
Along the way, they've done a great deal to preserve the "old sk00l" scene,
and are still releasing ascii text cDc issues after all these years... which
is damn cool.  To say the least, they have managed to bring the best of both
old and new together, into a fine blended mix.  ;)  In all seriousness, when
you think of t-files and electronic zines... how can you *not* think of and
mention cDc?  They're so synonymous with each other, so interlinked that it
would be blasphemy to write an article on Hacker Culture, and fail to mention
Cult of the Dead Cow in it.  But, in the interest of brevity, if you want
more insight on cDc... and its culture, read the interview in this issue with
G. Ratte'.

I decided to write this article because hacker culture really interests me.
In fact, I'm more interested in the culture than ever before... perhaps more
than all of the technical aspects of hacking, and latest techniques, etc.
To be honest, I'm not exactly sure of all of the reasons for finding it so
interesting.  I just find it to be a fascinating culture.  In terms of cultures,
it's a relatively new one.  It has only been around for decades, and not
centuries.  It's still changing and evolving at a rapid pace.  It's still fresh
and exciting.  And it has some of the most unique, strange, amazing characters
and personalities of any culture.  Very few, if any, cultures have the diversity
in individuals, or true individuals for that matter, as this one.  It is,
without a doubt, a culture of thinkers, inventors, innovators and engineers.
It's filled with brilliant people.  If nothing else, hackers are a truly unique
group.  They forge ahead, pressing technology forward, pushing the limits,
advancing their knowledge, even when faced with overly harsh legal consequences.
They've managed to accomplish a huge amount in the few short decades that the
world has had computers as a tool.  Yes, that's right, computers are just a
tool.  They don't inspire me to write, even though I use one to write and
distribute material with.  So, there you have it; hacker culture without it
being written about by a paid journalist who's uninterested in it and doesn't
really give a fuck what it is, and how it is presented or preserved.

Written by BLACKENED / Damage, INC. (C)opyright 2000.


Democracy:  Believe what I say.

Is that really democracy?  What happened to the whole freedom of speech and
expression part of our Constitution?  Well, the fact is, that doesn't seem
to mean shit these days.  Political correctness has all but abolished people's
ability to accept that freedom means NOT ALWAYS FUCKING HEARING, READING AND
SEEING WHAT YOU WANT!  Democracy is basically non-existent now though.  What
about the good old US of A you say?  What about the land of the free?  Love it
or leave it right?  There, I said it.  That's what this is all about in a
sentence.

If you criticize a country, especially the one you live in, and others falsely
believe that it's free... and you disagree (as you should be your right to do
in a *free* country), they get all upset.  Some of them become so enraged,
they'll start yelling and tell you to "get the fuck outta the country if you
don't like it." and use the old cliche of "USA:  Love it or leave it."  Yeah,
whatever.  There's so much freedom that if you don't love it, or if you're
critical of parts of it, you're told to leave?  Is that freedom?  It's the old
dictatorship rule of, disagree with us and what we think and you're not welcome.
Well, not welcome could mean, executed in many cases.  But, the same logic
applies.  Is that the type of "democracy" you want to live in?  A country in
which if you disagree with something, or are critical of a policy, or a
government, the popular opinion is that you're "anti-America" and thus, you
should leave?  Do you want to be forced to leave?  Honestly, I don't think
that's that far off.  If many people had their way, that's how it'd be.

Is a "democracy" a place where everyone agrees?  Is it a place where everyone
loves everything about it?  Is it a place where if you disagree with a law or
a public policy, you're in the wrong?  Is it a place where you're not supposed
to voice your opinions and views on things?  Is that freedom?

If you want to be free, speak out.  Make yourselves heard before it's too
fucking late.  Make damn sure that freedom of speech means what it says.
Freedom doesn't mean thinking what you're told, and doing whatever you're told.
It means you have a right to your beliefs!  Don't let anyone take that power
away and change the definition of freedom.  And please, don't live under the
false assumption that your rights and freedoms are protected.  They aren't.
Sad but true.

America deserves better than that type of ignorant attitude, which is about
following popular opinion.  This country was *built on* differing opinions and
viewpoints.  It was founded on freedom for the individual.  But each and every
day, democracy is slipping away.

Written by Blackie Lawless / Damage, INC. (C)opyright 2000.


censorthisshit

Say that a few times really fast.  Sounds like censorship doesn't it?

Marijuana is a gateway drug.  Everything you know is a lie.  The truth is out
there.  Tomorrow is another day.  Develop a taste for mainstreamness, pop
culture, cliches, consumerism, commercialism, advertisements and propaganda.

Stare blankly at your television screens.  Those idiot boxes won't turn you into
zombies.  They're just a tool.  The medium is the message?  @!#$ that.  The
medium is electronic.  But this is the message.  The message is the message,
not the medium I'm using to send it out!  However I choose to say something
doesn't become the message.  The message *is* the message and *remains* the
message.  The medium is inconsequential.  The words are still mine.  And the
message has the same meaning regardless of the medium used to broadcast it.

You can pretend propaganda doesn't exist.  You can pretend hypocrisy doesn't
exist.  You can pretend censorship doesn't exist.   You can ignore it all.  You
can pretend it doesn't bother you.  You can be indifferent.  You can be against
it in your mind, and be complacent.  But the reality is, it does @!#$ing exist.
It's all around you.  It has infiltrated every facet of your lives.  It's
everywhere, around every corner of "society".

Some people claim to be above it.  Some proclaim themselves to be
anti-censorship, and yet they censor what others write in the forums on their
web sites.  Hypocrisy and censorship aren't just in a marriage of convenience,
they're soul mates.

Some people boldly claim they're against propaganda and aren't influenced by
it.  They pretend it doesn't affect them.  They're living a lie, thinking they
don't believe propaganda, and can always distinguish it from the truth.  The
fact is, you can't.  Not always.  No one can.  Our minds aren't wired that way.
Every piece of information you take in can be analyzed and stored, but we don't
have filters to remove all the propaganda we're continually being fed.  It's
only natural that some of it is absorbed, believed as truth, and stored for
future reference.  And so, it exists in your mind.  Once there, it can be spread
further.  Think of it as being a time bomb.  Tick.  Tick.

Of these things, censorship is probably the easiest to fight.  Well, at least
in western nations.  In countries such as China, it is obviously much more
difficult to combat, as the stakes are a lot higher, and the people actively
involved in campaigns that oppose censorship are pursued vigorously and
imprisoned.  We don't have that threat hanging over our heads here, yet.
Therefore, we should do even more to fight against it.  Think of it as a
struggle for freedom.  Not just for freedom of speech, but for the freedom of
all ideas, thoughts, beliefs, and expression.

Why must we battle against the proliferation of censorship?  Personally, I don't
want to live in a "society" that actively promotes restrictions and limitations.
I don't want to be controlled, and have my words controlled.  Many substances
are already controlled by governments already...

Ahhhhhh... @!#$ history and culture and truth and freedom.  It's all @!#$ing
@!#$ed up and @!#$ anyway right?

Do you know what would be really cool?  We should try to eliminate words
entirely.  You know, like in Orwell's novel, 1984.  Without the words, people
couldn't speak out.  Hell, people wouldn't even be able to think dissident
thoughts anymore.  Thoughts would be censored.  Everyone would be kept in check.
We'd all be the same, thinking and talking the same.  Sameness would be the
order of the day.  Sameness would rule.  Big Brother would be victorious.  And
the zombies could all live in @!#$ing ignorant bliss.

That isn't the type of world I want to live in, where words are chosen for you,
changed for you, and your speech is at someone else's discretion.  What you say
should be how you want it said.  What you want to expression should be the way
you want to express it.  Yes, that's idealistic.  But so @!#$ing what!  Once
censorship takes hold and becomes the accepted way, you'll soon see more than
"swear" words and "slang" disappearing from the vernacular.  You will many
limitations put on languages, and our means of expression ourselves verbally
will be restricted by virtue of less choice in vocabulary.  And I say, @!#$
that!  My thoughts and words are my own and will remain that way.

It's so @!#$ing ignorant to tell someone else how to express themselves.  And
saying that swearing and using obscenities is a sign of ignorance, is even
worse.  The old holier than thou, judgmental attitude.  The "I'm better than
you" or "I'm above you" @!#$.  @!#$ that.  @!#$ it.  @!#$ it all.

Written by BLACKENED . Damage, INC. (C)opyright 2000.


You Can Hack Their Computers, But Can You Hack Their Minds?

By: Yogini Bare (hermes23w@disinfo.net)

Sure, hackers are a breed above because as long as they're hackers, they haven't
been caught, and as long as they haven't been caught they've got something up on
the system. Hacking is an evolutionary response to a system that doesn't work, a
force preying off of the system and evolving with it like any living organisms.
It's a relationship that depends on opposition, but the hacking/phreaking
communities wouldn't have a rallying point if not for the corrupt and decadent
meglo-monopolies that crowd out competition that isn't smarter, faster, and more
willing to operate outside the box. Nor would the mainstream have a decent
incentive for growth if it weren't for those people testing the limits of
established technological boundaries. The mutual struggle for the upper hand
sharpens the skills of hackers and mainstream techies alike. The question I pose
to the counterculture is though: Do we try so hard to oppose something that we
end up becoming it?

It's a normal scenario; the story of the undercover cop who gets to liking the
perks of the underworld or, on the opposite extreme, the ex-SLA bomber who
turned into a well-to-do socialite (until the Feds caught up with her).
Immersion is a common way to influence people because humans tend to adapt to
their surroundings, especially under the pressure of threatening situations. It
can be a situation where a person becomes assimilated into their surroundings to
"fit in" or reduce hostility, or it could be the immersion of a hacker
who studies their prey until they identify with it more than themselves. Either
way, pressure like that triggers the natural response of adaptation. That means,
the people now running ahead of the sociological pack are most vulnerable to the
influence of immersion for the very reason that they are most suited to
adaptation. Arrest can ruin a hacker for life, can take the spark of perpetual
evolution out of them because they learn quickly what the system can do with its
brute bully power. If those who are running ahead of everything choose to look
back, they have a good chance of being absorbed back into the very complacency
they were trying to get away from.

I propose we move forward.

It very well might be that Bill Gates is the most successful hacker to date
because by the time the government caught on to what he was doing, Micro$oft was
too big to stop. Windows software has pervaded a lot of the computers in the
world just like any virus out there. The difference between it and what we would
traditionally think of as a virus is that Microsoft is predominantly a virus of
the mind, whereas what hackers cook up is only a virus for the electronics.
People want what ol' Billy has, but the resistance people put up to a virus
makes the difference between a jail cell and the Microsoft mansion.

By packaging ideas in a way that makes people want it, you serve yourself as
well as everybody else. To the masses, if it looks like a duck and sounds like a
duck, then it's a little quacker and they'll accept it. However, inside the duck
you can put anything you want because its only a facade to get your ideas in.
Put a candy coating on LSD and mark a little "M" on the front and
people might actually go for it. Its effective because it opens up the holes in
peoples' heads so you can cram a little crap into them- without the chance of
getting your balls handed to you by the Feds because the system had recognized
you as a threat. Come on, isn't the whole revolt against the system because that
system has overspecialized and doesn't work? Why just stick to tech when a
combination of it and other skills would work better? We can be smart enough
that no one evens knows its hacking.

Imagine what could happen if instead of fighting something, you changed what
made you want to fight it all together. If you hacked into mass beliefs and made
them evolve, made them want to change, where would you be then?

Better ask ol' Billy...


REPORTS FROM THE FRONT -                                          {REPORTS}
Propaganda reports delivered directly to your screen.

-------------------------------------------------------------------------------

CAMBRIDGE, MASS.
Internet Pioneer Sees Web becoming even better

Ten years after he created the World Wide Web, Tim Berners-Lee is nurturing it
into a gigantic brain, where databases get smarter and work together to solve
problems.

Berners-Lee terms it "the Semantic Web."  To him, it's the second half of the
information revolution.

The Web is, of course, far from a finished product.

"It's still got lots and lots of room for evolution, expansion and enhancement,"
said Vinton Cerf, an Internet pioneer.  "It's still very much in its infancy."

The Semantic Web is all about making more kinds of data easier for computers to
process -- and to locate.  For instance, many databases have a column called
zip, which could refer to a U.S. postal code or a file stored in dot-zip format.

By adding meaning to those columns, computers can do a better job of searching
for information.

"Imagine then, if you extend it to all the tables publicly available in the
world, you can see it is very powerful," Berners-Lee said.

Such an approach could help computers understand that an automobile in
Massachusetts includes a car in Boston.  Today, searching for autos in
Massachusetts might not produce the Boston car.

"The problems with search engines now is they don't understand any of the data
or information," he said.

But a smarter search engine is only a beginning.  "It will automate all kinds of
things, and really the reason that you can't imagine it now is it will create
things you don't have now."

The Web consortium that Berners-Lee heads is currently building the blocks for
the Semantic Web.

At the base is the emerging extensible markup language, or XML, a way of tagging
information with hidden codes to enrich data on the Web and allow software to
automatically process instructions where human intervention was previously
required.

XML is only the first of several building blocks that make the Semantic Web
work, however.  Other components include vocabulary, logic and validation.

Associated Press

-------------------------------------------------------------------------------

Friday December 22 9:35 AM ET
Egghead.com: Hackers Tap Into Systems

MENLO PARK, Calif. (Reuters) - Internet retailer Egghead.com Inc. (NasdaqNM:EGGS
- news) on Friday said that a hacker had accessed its computer systems, possibly
its customer database, and it is now taking steps to protect its customers'
credit card accounts and the security of the site.

The Menlo Park, Calif., company, which sells computer hardware, software and
other home and office products via the Internet (http://www.egghead.com), said
in a statement that it has retained an unnamed computer security firm to conduct
an investigation and inspect its security procedures.

Egghead did not say how it learned of the security breach. Nor did it say
whether any fraudulent purchases had been made or if any customer accounts had
been tampered with. Company representatives could not immediately be reached for
comment.

``As a precautionary measure,'' Egghead said in the statement, ``we have taken
immediate steps to protect our customers by contacting the credit card companies
we work with.

``They are in the process of alerting card issuers and banks so that they can
take the necessary steps to ensure the security of cardholders who may be
affected,'' it said, adding that it is also working with law enforcement
authorities, who are conducting a criminal investigation.

Copyright (C) 2000 Yahoo! Inc., and Reuters Limited. All rights reserved.

-------------------------------------------------------------------------------

December 20, 2000 8:16am
Kriz virus makes return appearance
By Robert Lemos ZDNet News

Kriz, a year-old computer virus, may be coming back for Christmas this year,
thanks to its ability to piggyback on other viruses and spread with them.

The Kriz virus, also known as the W32.Kriz, is based on the CIH virus, which
damaged computers worldwide when it was triggered on April 26, 1998. Anti-virus
software maker Symantec on Tuesday warned users to scan their computers before
Christmas and released a free tool to scan for the virus and remove it.

"Worms by their nature propagate pretty quickly," said Marian Merritt, group
product manager for Symantec. "And when they get on a computer with Kris, they
start spreading that."

Symantec and other anti-virus software already scan for the virus in their
stand-alone programs.

The Kriz virus spreads to a computer when the user opens up an infected file,
changing the basic program that runs the operating system, known as the kernel.
The virus also infects other programs on the computer's hard drive and any
mapped drives, leaving open the possibility that the virus could travel across
company networks.

Unhappy holiday

"Remember," said Symantec's Merritt. "It may have spread itself to all your
executables, but you are only a carrier of the virus. The real payload hits on
December 25."

When the virus triggers, it overwrites all files on the computer and then
attempts to erase the software foundation of the PC, known as the basic
input-output system, or BIOS. While the BIOS attack only occasionally works, the
other attacks can be extremely destructive.

Symantec-rival Trend Micro Inc. believes the virus would not spread very far,
but warns that its ability to combine with other viruses could change that.

Both Trend and Symantec reported that the virus has infected two other worms:
Happy99.worm -- also known as W32.Ska -- and W32.hllw.bymer.worm.

Slow, but steady

"Kriz is a destructive virus, but a really slow infector," said Joe Hartmann,
anti-virus researcher for Trend. "Yet, it's now infected a mass-mailer, so now
you have a destructive virus that's also a mass mailer." In the past 24 hours,
Kriz ranked No. 8 on Trend's Worldwide Virus Tracking Center in terms of how
many files the virus had infected. The tracking center is a real-time database
of the types of viruses found by the Trend's online House Call scanner.

In North America, the virus ranked No. 6 for file infected. Despite that, the
virus has not spread very widely yet, and is known to have infected about 50
computers in the last 24 hours. Because the tracking center only tracks viruses
that have infected users of Trend's online service, the actual number could be
much greater.

Historians take heed, however.

The Kriz virus is essentially a copy of the CIH virus, which was created in 1997
by Cheng Ing-Hau of Taiwan. CIH fizzled in its first year, and a variant that
struck every month died out quickly. However, the annual variant did
significantly more damage when it was triggered in April 1998.

Copyright (C) 2000 ZD Inc. ZDNet is a registered service mark of ZD Inc.

-------------------------------------------------------------------------------

InfoWorld names top 10 IT stories for 2000

From...
[InfoWorld]

by Elizabeth Heichler

(IDG) -- It was a year of failed dot-coms, mega mergers, love bugs and privacy
concerns. And it was a year that will not soon be forgotten by members of the
public -- or the IT community.

Here, in no particular order, are the top 10 IT news events of 2000.

Dot-com deathwatch

It turned out that old-economy values like sustainable business models --
offering products and services for which a reasonable number of people are
willing to pay money -- still hold true in the new economy. One after another,
companies that had burned through venture capital and IPO (initial public
offering) funds found that they couldn't go back to the well for more, and
without the cash they couldn't stay in business long enough to get money the
old-fashioned way, by earning it.

Music on the Net meets copyright law

Music available in digital form on the Internet emerged as a serious threat, not
just a theoretical worry, for the big record labels this year. Thanks in large
part to Napster's wildly popular service, free music-sharing on the Net exploded
from campus cult into courtrooms where industry lawyers tried to stuff the genie
back into the bottle. The lawsuit against Napster filed by the Recording
Industry Association of America (RIAA) in December 1999, made headlines before
even coming to trial as the plaintiffs sought an injunction to shut down the
popular peer-to-peer song-swapping service. While that case won't come to trial
until next year, MP3.com lost its court battle with the RIAA in May.

Regardless of the outcome of the Napster lawsuit, the music industry is now
painfully aware that the Internet has changed its business model forever.

Love Bug virus

May 4 was a bad day for systems administrators. Years of being told by the IS
department to be careful about opening e-mail attachments didn't prevent many
people from clicking on apparent "love letters," in many cases from senders
known to them. The virus-worm hybrid, which deleted victims' image files and hid
audio files, started its damage early in the day in Asia (turns out it
originated in the Philippines) and worked by using a Visual Basic script that
sent itself to all recipients in a victim's Microsoft Outlook address book, thus
spreading rapidly through businesses from East to West before IS staff were
aware of the threat. Security experts estimated that the Love Bug infected more
than half of U.S. large businesses and "tens of millions" of computers
worldwide. Prosecutors in the Philippines ultimately dropped charges against
Onel de Guzman, who was suspected of creating and disseminating the virus in
May, because the Department of Justice lacked a law under which it could charge
him.

FBI's Carnivore eats away at online privacy

A U.S. Federal Bureau of Investigation (FBI) technology, nicknamed "Carnivore,"
that the law-enforcement agency is using to uncover evidence in e-mail, raised
hackles among civil libertarians and privacy advocates when its existence came
to light this year. Carnivore, critics charge, doesn't meet guidelines governing
the use of wiretaps. Of particular concern are allegations that the software,
which the FBI has demanded be installed by some ISPs (Internet service
providers), is capable of capturing all unfiltered e-mail traffic, rather than
only e-mail going to people for whom the FBI has a wiretapping warrant. Last
month, an outside review of the technology showing that it does not overstep its
bounds was criticized as inadequate by privacy advocates.

UMTS auction gold rush in Europe

Like any good scheme, the first guys to hit on it got rich quick. But the folks
who came later to this money-making opportunity didn't have quite the same luck.
Who would have thought that offering licenses to telecommunication companies to
operate 3G (third-generation) mobile networks based on the UMTS (Universal
Mobile Telecommunications System) standard could be this lucrative for national
governments? First the U.K. extracted about $32 billion from four companies in
exchange for the privilege. Then the Germans cleaned up, getting $44.8 billion
in license fees. But things got messy in the Netherlands, where the state took
just $2.4 billion, and ugly in Italy. Analysts started to wonder how much of
this greed was good, and whether telecom companies would recoup these huge
investments. The Swedish government won praise for its bank-on-the-future rather
than take-the-money-and-run approach -- a modest administrative fee of about
$10,000 per applicant, but an annual tax on UMTS revenue of 0.15 percent.

Time for telecoms to shuffle the deck

For some, all that money spent in European UMTS auctions didn't help -- it
didn't make investors or bond-rating agencies happy. British Telecommunications
PLC's second-quarter profits reported last month were less than half the
previous year, thanks in part to the costs of acquiring licenses. The same day,
it announced a reorganization, following the example of both AT&T and Worldcom,
which both recently announced large scale organizational changes after seeing
their stock prices hammered. Worldcom President and Chief Executive Officer
Bernard Ebbers has had a rough year -- in June he had to drop his planned
acquisition of Sprint as both the European Union and the U.S. Department of
Justice apparently decided that some mega-mergers are just mega-anticompetitive.

AOL-Time Warner marries new media to old

Much earlier in the year, back in January, mega mergers were still in vogue and
new Internet money could still buy an institution like Time Warner. Based on the
$350 billion deal struck in January, America Online Inc. shareholders would own
55 percent of the new company, AOL Time Warner. Time Warner is the parent
company of CNN.com. The European Union has subsequently approved the deal, and
the U.S. Federal Trade Commission has now voted to unanimously approve it. The
merger still faces scrutiny by the U.S. Federal Communications Commission, which
experts suggest is a much lower hurdle for the companies to overcome. Executives
of the two companies had undoubtedly hoped the merger would be finalized earlier
since much has changed in the new -- and old -- media landscapes since they got
engaged in January.

L&H goes from poster child for European IT to poster child for bad behavior

For most of this year, Lernout & Hauspie Speech Products NV was the high-flying
voice technology company that Europeans could point to with pride as an example
of a home-grown yet industry-leading innovator in global IT. In March, L&H
solidified its leadership by agreeing to pay $592 million to buy out its U.S.
rival, Dragon Systems Inc. Then the bad news started to trickle out. In August,
a Wall Street Journal article raised allegations of accounting irregularities at
the company's Korean subsidiary. By September, the U.S. Securities and Exchange
Commission had begun an investigation of accounting practices. In November,
co-founders Jo Lernout and Pol Hauspie stepped down from their positions as
co-chairmen and managing directors. By the end of the month the company's new
chairman and chief executive officer had filed for bankruptcy, saying that they
had uncovered evidence of financial misreporting and other questionable
financial transactions, and that the filing was their only hope for protection
from creditors and legal claimants and for cleaning up the mess they inherited.
As of this writing, the company's assets have been frozen by a Belgian court.

Microsoft loses big in antitrust case

While no one expects the Microsoft antitrust case to be resolved anytime soon,
the U.S. Department of Justice beat the software giant in round one, the trial
in U.S. District Court. In April, Judge Thomas Penfield Jackson dropped the
first shoe: a conclusions of law finding that Microsoft maintained its monopoly
power by anticompetitive means and attempted to monopolize the Web browser
market in violation of the Sherman Antitrust Law.

In June, he kicked off the other loafer, ruling that Microsoft should be broken
into two companies and heavily regulated to stop its anticompetitive behavior.
Microsoft is appealing the decision, and the briefs are already flying in round
two. Will Microsoft even be relevant by the time the last court rules
definitively? Some industry observers see its influence waning.

Denial of service attacks hit the big time

In February, hackers drew attention to a form of Web site attack that's not
particularly elegant but effectively crippled some of the Web's biggest names,
including eBay, Amazon, CNN.com and Yahoo!, among others. These attacks worked
not by breaking into a target Web site but by overloading the router connecting
it to the rest of the Internet with so much fake traffic that it overloaded and
bonafide users were unable to connect to it. However, lots of systems did get
hacked to make this happen: thousands of unwitting users' systems had Trojans or
zombie software placed in them, which then launched the DoS attacks from those
machines. Computers most vulnerable to being used in DoS attacks are those that
are on and connected to the Internet all the time via high bandwidth access. A
Canadian teenager arrested in April for the DoS attack on CNN.com was considered
to be just a copy-cat, and the real masterminds of the February attacks may
never be caught. But the DoS threat is still real: anyone can get hit -- and it
can bring your online business grinding to a halt.

(C) 2000 Cable News Network. All Rights Reserved.

-------------------------------------------------------------------------------

Report: Serious concerns remain over FBI's 'Carnivore' system
By Daniel Sieberg
CNN.com Technology Editor

(CNN) -- A prominent group of computer experts have released a critical
assessment of a recent independent review of the FBI's Internet surveillance
system, sparking further debate over its privacy and technological limitations.

The new report addresses a review of the "Carnivore" system by the Illinois
Institute of Technology's Research Institute (IITRI), which released a draft
report on November 17.

Although the authors of the latest report acknowledge the "good-faith effort" on
behalf of the IITRI, it says the scope of their review was not broad enough to
address all the pertinent matters.

"Those who are concerned that the system produces correct evidence, represents
no threat to the networks on which it is installed, or complies with the scope
of court orders should not take much comfort from the analysis described in the
report or its conclusions," the experts wrote.

Participants in the new report are listed as Steven Bellovin and Matt Blaze from
the AT&T Laboratories, David Farber from the University of Pennsylvania, Peter
Neumann from SRI International and Eugene Spafford from Purdue University.

The Justice Department initially contacted members of the ad hoc group in
September.

Specific technical concerns noted by the scientists include a lack of analysis
between the Carnivore code and its host environment and operating system,
inadequate discussion of the remote access provided by the use of the "PC
Anywhere" program, and no evidence of a systematic search for bugs or serious
errors. "PC Anywhere" is an application that allows computer professionals or
employees to connect to a network from a remote location.

The scientists went on to urge the Justice Department to publish the inner
workings of Carnivore for a public review, a request that has also been
suggested by several privacy advocate groups.

Using "sniffing" technology, the Carnivore system is installed at an Internet
service provider (ISP) to keep court-ordered tabs on a suspect's e-mail and
instant messages. It has already been used more than 25 times during criminal
investigations.

The FBI spokesman associated with Carnivore said the whole purpose of making the
IITRI draft report available for public scrutiny was to solicit opinion from
outside groups. He could not comment on how the scientists' information might be
applied.

When correctly used, the IITRI said Carnivore "provides investigators with no
more information than is permitted by a given court order."

A final report on Carnivore by the IITRI should be presented to U.S. Attorney
General Janet Reno later this month.

(C) 2000 Cable News Network. All Rights Reserved.

-------------------------------------------------------------------------------

FBI's 'Carnivore' spurs new e-mail cloaking programs
By Richard Stenger
CNN.com Writer

(CNN) -- As the debate rages over the FBI's e-mail surveillance system known as
"Carnivore," people are looking for new ways to protect the privacy of their
online messages. A few computer companies are offering solutions, but will they
work and will people use them?

The FBI's decision to outfit Internet Service Providers with hidden "black
boxes" to monitor the e-mail of criminal suspects has raised serious concerns
among ISPs and electronic privacy advocates.

In response, NetworkICE last week released a free, open source code alternative
to the secret FBI program called Altivore, which the computer security company
said would allow ISPs a less restrictive alternative than federal oversight.

Electronic freedom advocates have suggested that non-Carnivore clones would
satisfy the FBI, as long ISPs could provide the desired information about
criminal suspects.

Some Internet security computers have begun marketing what they call innovative
software that can circumvent programs like Carnivore.

AbsoluteFuture Inc. promises businesses the ability to send e-mail "without
leaving a data trace anywhere. E-mails ... self-destruct and vanish without a
trace from their hard drives and the hard drives of their recipients," said Anne
Taylor, a spokeswoman for the company.

Tony McNamara, chief technology officer of the company, said its product
SafeMessage counteracts Carnivore by eliminating readable headers from e-mail
messages. The FBI program cannot detect the e-mail without them, he said.

Other e-mail security products have stepped up marketing in the wake of the
Carnivore debate as well.

"I know that one company has taken out a lot of advertisements," said Robert
Graham, chief technology officer NetworkICE and the creator of Altivore.

Graham said he made Altivore not to sell but to make two points: that ISPs
should regulate themselves and that the Carnivore program is technologically
unremarkable.

Similarly, he said any new product that promises to circumvent Carnivore likely
doesn't represent a major advance.

"E-mail cloaking has been around for awhile. There will always be ways that
people can evade e-mail detection systems," he said.

Private e-mailers have had access for years to cloaking applications like Pretty
Good Privacy, or PGP, an open source code used to encrypt e-mails, or others
that use anonymous relays to hide the tracks of e-mail correspondences.

But such features are generally difficult or inconvenient to use, which has
discouraged their widespread use, according to Graham.

"I won't be impressed by these programs until people use them," he said.

McNamara said SafeMessage does require the use of a password. And both the
sender and receiver must have the software. But, he said the product is easier
to use than typical e-mail applications.

McNamara said it was not meant to encourage illegal activity. His company would
comply fully with authorities during any investigation.

Using court orders, the FBI controls Carnivore from a remote location to monitor
and retrieve e-mail messages of criminal suspects. It has been used in about 25
investigations in the last year, including criminal cases and "national
security" cases involving counter-intelligence or counter-terrorism.

The FBI and the Justice Department maintain that strict oversight by the courts
would prevent abuses of the system. The pledge has failed to assure electronic
privacy activists that only legitimate uses would take place.

(C) 2000 Cable News Network. All Rights Reserved.

-------------------------------------------------------------------------------

Mafiaboy arrested again
Canadian teen charged in attacks on high-profile Web sites
By Will Knight, ZDNet UK

Dec. 7 - The teenager alleged to have jammed some of the largest sites on the
Internet earlier this year has been arrested in Canada for violating his bail.

THE 16-YEAR-OLD alleged hacker, who cannot be named under Canadian law but uses
the online moniker ?Mafiaboy?, was originally arrested 19 April, accused of
launching distributed denial of service (DDoS) attacks on CNN, eBay, Yahoo! and
others in February.

Mafiaboy has again been arrested by Montreal police for violating bail by
playing truant from high school, according to the Associated Press.

A DDoS (distributed denial of service) attack takes an old hacking trick to a
new level. By taking over an army of remote machines connected to the Internet,
an assailant is able to bombard a site with a tidal wave of fake requests that
is impossible to stop.

The FBI arrested Mafiaboy after investigating chat room logs and computers at
the University of California.

(C) 2000 ZD Inc. All Rights Reserved. ZDNet and

-------------------------------------------------------------------------------

Microsoft Web server hacked
Company says attacker broke in, but server was nearly empty
                                            By Bob Sullivan
                                                      MSNBC
Nov. 6 - Microsoft on Monday confirmed reports that a computer attacker was able
to hack into one of its Web servers. But according to spokesperson Adam Sohn,
the break-in was limited to a single server that was in the process of being
retired, and it did not pose a risk to Microsoft's main servers.


THE BREAK-IN WAS first reported by the IDG News Service. According to the
report, a Dutch hacker named "Dimitri" took advantage of a bug that was patched
by Microsoft on Oct. 17 - the so-called Unicode vulnerability.

(MSNBC is a Microsoft - NBC joint venture.)

The Web server that was hacked, events.microsoft.com, had essentially no content
on it and is used merely to redirect visitors to another Web server, Sohn said.
Microsoft had not yet applied its patch to the server.

"Obviously we like to stay on top of these things," Sohn said. "But it's a
challenge when you have a large, complex network....This one slipped through the
cracks."

[Slipped through the cracks... Classic.  That's priceless.]

According to IDG, the attacker was able to temporarily upload a small text file
onto events.microsoft.com, and claimed to have downloaded files containing
administrative user names and passwords to the server.

Sohn said the company believed those passwords would only have allowed access to
the individual Web server that was attacked, and could not be used to attack
other parts of Microsoft's network.

Friday's break-in occured one week after a much more serious breach of
Microsoft's network was announced. In late October, Microsoft revealed an
attacker had managed to plant a Trojan horse on company systems. The company
called it an act of "corporate espionage," and publicly speculated that source
code for its more popular programs may have been stolen.

Sohn said the two break-ins were completely unrelated.

"Comparing them would be like comparing apples and oranges," he said.

-------------------------------------------------------------------------------

SafeNet 2000
By Gene Johnson

The Associated Press
R E D M O N D,

Wash., Dec. 8 - For the next generation of the Internet to thrive, people must
be able to trust it, Microsoft Chairman Bill Gates told computer experts at a
conference on improving Internet privacy and security.

Gates delivered the keynote address Thursday at SafeNet 2000, a two-day summit
of 225 privacy and security experts at Microsoft's suburban campus. He touted
the next version of his company's Windows operating system, which will have the
ability to inform customers when Web-based companies have different ideas about
privacy than they do.

[Gates addressing security... What next, Larry Flynt preaching?]

"As you go to these different Web sites, you ought to be able to know what the
policy of that Web site is," Gates said.

[And what about the sites you own and operate Billy?]

"It is more important than ever that our industry gives customers the assurance
that their information will remain secure, respected and private."

[*dies laughing* at the hypocrisy in Bill Gates saying that.]

Focus on Security and Privacy Microsoft called the summit to determine what
people have learned so far about the young fields of Internet security and
privacy, and to figure out what the information technology industry needs to do
next.

Gates said that for now, self-regulation is key. While government should have a
role in responding when companies misuse customer data, Gates said, it's too
soon for government to code privacy standards into law because the field could
change greatly over the next year.

In the meantime, companies must make software that helps customers use the Net
without compromising private information, such as credit card numbers, Gates
said. Web sites should also state clearly how they use data gathered from
customers and should have programs that automatically fix weaknesses that could
be exploited by hackers, he said.

[Always with the hackers Gates.  Always talkin' about hackers.  Snip...]

Copyright 2000 The Associated Press. All rights reserved.

-------------------------------------------------------------------------------

Notorious or Desperate?
Economic Woes Encourage Fabled
"Khackeri"

By Jim Heintz

The Associated Press

M O S C O W, Nov. 20 - While the international space station brings new renown
to Russia, the nation is gaining a darker sort of notice from other explorers -
hackers who launch into cyberspace.

Russia's reputation as home to some of the world?s most gifted and devious
hackers was underscored last month when Microsoft Corp. disclosed that passwords
used to access its coveted source code had been sent from the company network to
an e-mail address in St. Petersburg.

It is by no means clear whether a Russian was behind the break-in ? that e-mail
account could have been managed remotely. But that doesn't stop Russian hackers
- "khakeri," or "vzlomshchiki (house-breakers)" - from puffing out their chests
at such exploits.

Bragging Rights?

In a recent poll on a hacker-oriented Web site, 82 percent said Russia had the
world's best hackers; only 5 percent said Americans were better.

But the bravado is laced with frustration.

Hackers are motivated as much by a lack of opportunity in economically
struggling Russia as by criminal leanings, people inside and outside the hacker
community say.

Sergei Pokrovsky, editor of the magazine Khaker, said that hackers in his circle
have skills that could bring them rich salaries in the West, but they expect to
earn only about $300 a month working for Russian companies.

Russian higher education traditionally has been strong in mathematics, a skill
at the core of hacking, but the Russian market offers few employment
opportunities to such knowledgeable people, said Mikko Hypponen, manager of
anti-virus research at the Finnish company F-Secure.

"They have too much time on their hands," said Hypponen, whose company highly
values the Russian computer experts it employs.

Russians have been behind several high-profile - and sometimes highly lucrative
- hacking cases. There was the cyberthief known as "Maxus" who stole credit-card
numbers from Internet retailer CD Universe earlier this year and demanded a
$100,000 ransom. When denied the money, he posted 25,000 of the numbers on a Web
site. Maxus was never caught.

Mathematician Vladimir Levin was caught and in 1998 was sentenced to three years
in prison in Florida for a stunning invasion of the Citibank system in which he
pilfered $12 million by transferring digital dollars out of the bank's accounts.

Russians are also believed to be behind the 1998 theft of Global Positioning
System software, used for missile-targeting, from U.S. military computers.

Victims as Well as Perps

Russian companies occasionally fall victim to hackers, too. Last year, hackers
got into the computers of Gazprom, the Russian natural gas monopoly that also
supplies much of Europe and took brief control of the central supply
switchboard; officials wouldn't say whether there were service disruptions.

Incidents of avarice and meddling in critical computer systems have raised
concern that some hackers who hail from Russia are affiliated with its extensive
organized-crime groups.

Pokrovsky, for one, rejects such speculation.

"Nonsense, complete nonsense," he said. "For example, I personally know Maxus
and he isn't in any crime group. He's a very good specialist who understands
systems very well."

The psychology of hackers can be as elusive as their identities, however. Of
course some say their actions are just an offshoot of exuberance, that they are
chiefly benign interlopers.

Take the hacker known online as NcRoot. He says his first name is Alexander and
that he's a 17-year-old student interested in Web site design.

"Sure, there may be people who do this for the sake of money and who have small
salaries," he wrote in response to e-mailed questions, saying he believed most
Russian hackers do it for the challenge of exposing security flaws.

"Fix in your mind, we just want to help you," a hacker group wrote to the
Webmaster of an online music site they hacked into this year. NcRoot was among
the hackers.

Trying to Assess Economic Damage While it's impossible to estimate the economic
damage Russian hackers may inflict through theft and mischief, indicators
suggest the sums are enormous. Many of the Internet's so-called "warez" sites,
in which pirated computer software is made available, are set up by Russians.

A study by the Business Software Alliance, an international industry trade
group, said that in 1999, pirates cost software makers $165 million in
legitimate revenues. The study said 89 percent of business software distributed
in Russia that year was pirated.

Law enforcement efforts have been weak. The Interior Ministry division
specializing in computer crimes said this year that 200 arrests were made in the
first three months of the year, up from just 80 in all of 1998. But that rise
could reflect increased police effectiveness rather than a growth in crimes. "It
means we are getting better and better," said Anatoly Platonov, spokesman for
the Interior Ministry's "Division R," which handles computer crimes. Platonov
did not provide many specifics, however, such as how many people work for the
computer-crimes division.

[snip...]

Hypponen said Russian hackers need to be concerned about negative stereotypes.

Although his company has recruited workers from the Russian talent pool, "some
customers are uneasy about having development done by Russians," he said.

Copyright 2000 The Associated Press. All rights reserved.

-------------------------------------------------------------------------------

Suspected Hacker Arrested Minn. Man Allegedly Hacked Into Nuke Lab Computers
The Associated Press
S A N   F R A N C I S C O,

Sept. 12 - A man suspected of hacking into a computer at a nuclear weapons
laboratory last year was arrested Monday. Benjamin Breuninger, 21, was taken
into custody by federal agents at his Minnesota home on a charge of unauthorized
access of a protected computer and recklessly causing damage.

He was released Monday on $25,000 bail after appearing in federal court in
Minneapolis. No plea was entered. Prosecutors are working to bring him to
California.

 He was indicted Friday by a federal grand jury in Oakland for breaking into a
computer at the Lawrence Livermore laboratory run by the University of
California.

"Fortunately, he didn't access secret or classified government documents, but he
did gain access to the lab's administrative network and disrupted the use of
it," said FBI spokesman Andrew Black.

The two November hacking incidents caused an estimated $50,000 in damage and
took about a week to fix, Black said.

A public defender representing Breuninger said his client has no criminal
history.

"But since this happened almost a year ago, it appears to me that this wasn't a
dire national emergency that needed an immediate response," Scott Tilsen said.
"If it was a significant crime, I don't think he would have walked right out of
court."

Copyright 2000 The Associated Press. All rights reserved.

-------------------------------------------------------------------------------

'Mafiaboy' granted bail
WebPosted Tue Dec 19
17:27:21 2000

MONTREAL - The Montreal teenager accused of being 'Mafiaboy' has been granted
bail again. He is waiting to go on trial for allegedly hacking into major
international Web sites.

The teen had been in jail for two weeks because he broke bail conditions by
misbehaving at school.

He regained his freedom when a court heard that he has left school and plans to
hold down a full-time job.

The teen has pleaded not guilty to 66 computer-hacking and mischief charges. His
trial will begin on March 5.

Copyright (C) 2000 CBC. All Rights Reserved

-------------------------------------------------------------------------------

By Sascha Segan
[ABCNEWS.com]

Oct. 27 - Someone broke into Microsoft's network and accessed the basic codes
for the company's latest software, Microsoft president Steve Ballmer said today.

"They did in fact access the source codes," Ballmer said from Stockholm, Sweden.
"You bet this is an issue of great importance. I can also assure you that we
know that there has been no compromise of the integrity of the source codes,
that it has not been tampered with in any way."

But malicious hackers don't need to tamper with the source codes to use them to
create destructive software, experts said. (The source code is the basic
blueprint of a piece of software, allowing programmers to disassemble it and use
its parts elsewhere.)

Owners of current Microsoft products have nothing to worry about, according to
the company, but the break-in may make future products more vulnerable to
attacks.

"The hacker appears to have obtained some source code for the development of
future products," Microsoft spokesman Rick Miller said.

[And what's wrong with that?]

Industrial Espionage?

The circumstances of the break-in are, right now, mysterious. Microsoft is
working with the FBI to track down the culprits and said none of their currently
on-the-market software has been corrupted.

The incursion was discovered on Wednesday, Miller said, but the attackers may
have had access to Microsoft systems for a considerable period of time -
something under three months.

"We consistently monitor our networks looking for any irregularities on the
network, and this was discovered as something that struck us as odd," he said.

Oliver Roll, senior director of Microsoft in the United Kingdom, said he didn't
know who had broken in, or why.

Microsoft wouldn't comment on which future products were affected. Competitors
could theoretically use the code to steal features from the new products, and
malicious hackers could use it to design viruses or other programs that exploit
unpublicized security flaws.

"Industrial espionage takes many forms. It could be someone with a big ego; it
could also be someone that wants to copy our software; it could also be someone
that wants to use our software in their own software," Roll said. The Wall
Street Journal reported in today?s editions that Microsoft passwords had been
sent to St. Petersburg, Russia. Microsoft declined to comment on that report.

Attackers, Not Competitors

Computer experts said the code wouldn't be of much use to competitors. It's just
too high-profile. Anyone trying to blackmail Microsoft, to sell illegal copies
or to use parts of the code in their own products would probably get run to
ground by Microsoft and the FBI, said Graham Cluley of British antivirus company
Sophos.

"You could try and write a competing product, but even that is very risky,"
he said.

But the code could be of use to computer attackers. A top security consultant
with the firm @Stake, known by the hacker name Weld Pond, said it wasn't
uncommon for hackers to steal and circulate source code.

"Source code circulates in the underground all the time. I have heard of source
code for [Sun's] Solaris and some of those other [operating systems]
circulating," he said.

The danger is that malicious hackers could write new viruses or other programs
based on unpublicized flaws in the code. They could even build components that
look exactly like Microsoft programs - like the Windows calculator or Notepad,
say - but secretly do damage or open up back doors in computers.

That's one point raised by advocates of 'open source' software like the Linux
operating system, where everyone can have access to the source code. With a
world's worth of programmers looking at the code, few weaknesses go unnoticed
and unfixed, Linux partisans say.

Well-Known Attack

Right now, nobody's quite clear on how the hackers got into
the network.

Knowledgeable sources in the computer security industry said the QAZ Trojan was
involved. A well-known threat that anti-virus companies have been tracking since
August, QAZ appears as an attachment to an e-mail. When a user opens the
attachment, QAZ replaces the Windows Notepad with a copy of itself and opens a
'back door' into the computer that hackers can access.

The problem is, all popular recent antiviral software protects against QAZ,
Cluley said. Microsoft says that they update their antiviral software every day.
QAZ also can't get through a properly configured firewall, which would block the
back door.

Microsoft refused to comment on whether employees could turn off antiviral
software, but said it's against company policy to do so. Miller said he didn't
know whether the company's firewall blocks port 7597, the back door QAZ uses.

Ironically, QAZ was written with Microsoft's own Visual C++ development program,
antiviral company F-Secure said.

How'd They Do It?

Weld Pond said a modified form of QAZ may have been used, or the program may
have been lurking in Microsoft's system since before August. Other experts have
speculated that a Microsoft employee may have turned off antivirus software on
an office PC.

Perhaps QAZ was on an unsecured laptop computer outside Microsoft's physical
network, and that's how the hackers got the passwords, Cluley speculated.
Microsoft officials, for their part, aren't saying.

"If it was just one laptop of one guy on the road, maybe his anti-virus wasn't
up to date, naughty him," Cluley said.

Microsoft does allow access to its internal network from 'off-campus' laptops,
Miller said, but he added that the company considered that access to be secure.

Common Target

Microsoft is a common target for malicious hackers and virus writers. Their
products are used by more than 90 percent of U.S. PC users, so anyone seeking
notoriety goes after their software. And they're widely hated by the hacker
community for what hackers say are secretive, unfriendly and monopolistic
business practices.

Microsoft officials said they're stepping up security efforts.

[Step it up a notch!]

"We are implementing an aggressive plan to protect our internal corporate
network from unauthorized attempts to gain access," the company said in a
statement.

[See what I mean.  They've got a plan already... Wait, did they actually say
anything up above?]

The Associated Press contributed to this story.
Copyright (C)2000 ABC News Internet Ventures.

-------------------------------------------------------------------------------


THOUGHTS, POEMS AND CREATIVE WRITING -                            {WRITING}
Crazy, entropic rants & writings.

"With poetry I paint the pictures that hit.  More like the murals that fit.
Don't turn away, get in front of it." - Freedom, by Rage Against the Machine.


Animal Cage.

(A brief pseudo-scientific analysis of how the social cycle of
Revolution-Prosperity-War-Dominance-Decay-Fascism-Totalitarianism is repeating
itself in America)

The US Constitution grants almost unlimited rights to private property owners,
thereby creating a society free from the oppressive tyranny of a coercive
government.  At the time of the document's drafting, this was a revolutionary
notion, one that forever altered the social landscape.  The framers in effect
paved the way for postmodern global expansion, as it freed economies from the
authority of the state and allowed for the advent of worldwide markets and free
trade.  However, the power shift from the government to individuals (who are the
market) has perhaps tilted too far to the individual's side, because our present
system grants nearly unlimited power to trans-national corporations.  These
monetary megaliths have the capacity to buy, sell, and trade governments if they
so choose, not to mention little ol' human beings like you and I.  This is a
radical statement, sure, but never the less it's the situation we're in.  Can
bloated corporate empires manipulate us? Of course, they do so all the time.
Only holed-up paranoids and hermits are free from the tentacles of corporate
propaganda.   And indeed, this ubiquitous manipulation constitutes a subtle form
of enslavement, because it attempts to shackle our minds by limiting our desires
to the goods the manipulators produce.  Our subtle enslavement can't compare to
what the citizens of brutal dictatorships are subjected to, we've surely been
blessed with the lesser of two evils.  However, because I believe the system can
be changed, we should see our imprisoners as enemies to be defeated.  Don't
doubt for a minute that our enemies would resort to the same sort of brutality
that tyrants have employed throughout history, they're essentially the same
minds.  The corporations derive their power from us, so they want to keep us
happy.  And herein lies the problem: most people are too hypnotized  in their
cushioned comfort to realize that the course of their lives are being chosen for
them.

        It's a scary thought, the balance of power has damn near toppled into the laps
of the populous but has been sapped up by a few individuals (and amusingly, the
freedom meme still persists, as most people believe they are independent minded
and well-informed.  Don't forget, the Christian Church used the same paradoxical
lures of freedom to attract the unsuspecting into their misery trap).  So, a
sophisticated system- designed to promote freedom and common welfare- has been
reversed, heaping unlimited power onto a fascist oligarchic regime of
multinationals.  I wonder what Jefferson would say about this? And I wonder how
loud Orwell would laugh.

        Now I realize this is a brash claim, and I certainly haven't researched it
enough to call it a legitimate one.  But, generally speaking, I believe this
trend is obvious.  In fact, it's a natural extension of our system.  If there is
a way to stop or even reverse it, and I believe there is, then we must begin to
organize and educate ourselves so we'll be able to implement such changes.  The
Internet is a perfect facilitator for organization, education, and open
discussion.  This is where it all starts if we don't want it all to end in a
blaze or a moan.  There are loads of resources buzzing around on the Info
Superhighway about brain change, mindfulness, and other methods of
self-awareness.  These techniques are armor against the intrusive propaganda
known as advertising, mass media, and fashion trends (memetic engineering, in
other words).  And all these institutions are under direct control of the
corporate empires.  Facing the prospect of a new "Dark Age", our only
hope for salvation will be the very 'technology' that got us into this mess we
call civilization in the first place: writing.

Eventually, we have to think of how we will replace the current social paradigm.
Certainly, a mutation from autocratic top-down rule to a more systemic,
whole-istic model is in order.  (For more info on social models, check out www.spiraldynamics.com)
How this new model will be structured and, more importantly, how it can be
implemented are our two main concerns, and hopefully advancements in computer
modeling will aid in our quest for effective social change.  It's a common
misunderstanding that we're all doomed to repeat history, but this is only the
case when we mindlessly follow the social system that has been set up for us.
Our ancestors did it, those before them did it, and so on.  This locks our
societies into patterns of behavior, which I've represented with the Orwellian
model.  Like any addiction or behavior pattern it can only be overcome by
applying mindfulness, which means hard work.  But I hardly consider a social
revolution 'work'. Ha.

     How the Orwellian Cycle Has Manifested In American History (1750- Present)

1. Revolution/Implementation of New System- American Revolutionary period,
roughly 1750-1800.
2. Prosperity- American Industrial Expansion, roughly 1800-1950.
3. War- World Wars I and II (I know there were others?)
4. Dominance- post WWII: western hemisphere; post Cold War: global economic and
cultural domination.
5. Decay- post Cold War consumerist decadence.
6. Fascism- egoism, ignorance, reactionary mindsets, conspicuous consumption,
social darwinism.
7. Totalitarianism- total loss of independence, dictatorial corporate mind
control.

Currently we're somewhere between Decay and Fascism, though totalitarianism
doesn't seem too far off in the distance.  Of course what follows
totalitarianism is Discontent, usually in underground intellectual circles.  I
don't think we should wait till this shit gets out of hand to establish this
subculture.

Written by Horus (paranoid0android@disinfo.net)


The End of Truth.

This is the end.  My only friend, the end.
This is the end.  One last message to send.

We choose your thoughts.  We tell you which ideas to believe.
We are your teacher.  Trust what we say and we will not deceive.

We'll teach you good.  We'll teach you well.
You learn quickly.  We've saved you from truth hell.

We aren't your enemy.  We aren't you foe.
We're your only friend.  We'll tell you what you know.

Our intentions are honest.  Our system is just.
Conformity is necessary.  Full compliance is a must.

You will listen to us.  You will always obey.
We are mother and father.  So just do as we fucking say.

We'll give you morals.  We'll give you your beliefs.
We're generous that way.  You can live unburdened of grief.

This is our system.  This is our way.
Our way is best.  It must be implemented without delay.

Do not defy us.  Do not ever speak out against us.
Head our warnings.  Or you'll disappear, burned into dust.

We'll tell you what to like.  We'll teach you who to hate.
We'll instruct you on right and wrong.  We'll guide your fate.

This is all done in your best interests, for your own sake.
Those that oppose us will all be destroyed, and left in our wake.

The dissidents will tell you lies.  They'll do anything to fool you.
But we'll be here to guide your path.  And we'll always be true.

Listen to us!  Hear our message!  Watch our films!  Trust!
It's all for you.  There are no lies.  There's no blood lust.

Everything is done for you.  We'll think for you too.
Just follow our way.  There's nothing else you must do.

The outsiders are out to destroy us.  But we are strong.
We'll protect you.  We'll shelter you in a place that you belong.

Just crawl into this cage.  That's it.  You're doing just fine.
Leave your principles and beliefs at the door.  It's all on the sign.

We've outlined all of the rules.  They're all easy to abide by.
But if you choose to ignore them, just remember that you will surely die.

Relinquish individuality.  Give up your thoughts and ideas.
We'll think for you!  Just do as the Minister of Propaganda does.

It's all very simple.  It's a much easier way of life.
We handle all of the hard work.  You can live easy, without any strife.

You're free to enjoy a clear mind.  You're free of arguments.
There's no difference of opinions.  There's only common sense.

You'll understand.  You'll learn our doctrines.
You will fit in.  You will only pay for your mistakes and your sins.

Free thoughts and ideas are a hindrance.  They're a nuisance.
If we choose, we can make you whatever we want.  We can force you to dance.

Pulling your strings you'll be our own little puppet.
That's right.  Give in.  Repeat after me when I say fuck it.

Indifference and complacency.  We've found your weakness.
Come into the fold.  Let our gentle, guiding hand be your last caress.

Our words are powerful.  They're more powerful than the sword.
Individuals are weak.  Obeying us is its own reward.

Do not choose to rebel.  Do not try to fight this by thinking.
Conformity is right.  It's as natural as breathing, eating and drinking.

You'll soon become accustomed.  You'll soon believe the message.
Soon you'll be without fear.  And you'll no longer have any rage.

We've done away with many things.  We've decided to eliminate them.
They simply weren't necessary.  And so, they've been condemned.

You won't even be shadows of your former selves.  Not even ghosts.
Everything is owned by us now.  Be thankful we're such gracious hosts.

Everything is being rewritten.  With disinformation lurking around every corner.
Greetings my loyalist friends.  Welcome to the New World Order.

Notes:  This poem was inspired by several songs, including 'The End', by
The Doors and a few by Rage Against the Machine.  It was obviously also inspired
by the propagandists and the propaganda corporations (the media) around the
world.  Your powers to influence zombies are truly great.

Written by BLACKENED / Damage, INC. (C)opyright 2000.


Find the Zero.

1.
Make a fist, stare through it, motion as if to get its attention, as the soft
clatter of a rattlesnake makes its way up the spine of the unbeliever. Never
underestimate the intuition of mercy, but leave unharried the crocodile tears of
pity, as the no man's land burns with the fervor of an aging mystic aching to
experience the blessed virgin in a blasphemous way.... never look when this
happens it will embarrass your soft parchment sensibilities. A crack in the
skull of reality lets in rain through metaphysical trepanation as the soft hum
of the generator sighs against a trembling thigh in the disinfected fluorescent
scent of an evening outside of time

2.
Walk through the fist, slowly and with an even gait... you never know when your
heart will swallow you up. Tides of dust make the journey seem as long as the
time in the pining hours that you bottle, and turn into a potent but foul
smelling tincture that tastes of a bitter newsprint. It makes assaults on the
fist from the outside, moving in and putting up its feet, never leaving, but,
attracting the granules which feel like railroad ties lodged under the eyelid
in the clear mucus of the potential vision which you are uncertain you may or
may not be allowed to have.

3.
Swallow the fist in order to julienne the mundane, access binah consciousness
toll free, limitless numbers falling like a hail of frogs coming home late from
the ball, slime on the gowns, working towards a unity of prescription thought
embolisms. Now you are learning the secrets of consuming the living heart while
it beats tympani in the chest of others, while they stand there going to
purgatory, flaking into the dust which swirls in humble dervishes chanting into
ecstatic trances around their feet as their mouths hang open.

4.
Wave the fist, as it hums in transparent glee, a farce, a small joke among
compatriots.  You have a strong sense of what you are searching for, the
listless whistling of the pre-siesta revelry, a holy man sings narrative words
like a mutated violin, sonorous, and in thick/thin tones. See/feel the vibration
of mundi, erstwhile nomad emotions roam on a thin bitter foam chord, humming
like a burnt out socket shorting in the rain of years, you feel the transparent
glee in a fascinated patience, for the coming showdown on the glass trauma plain
makes you want to sing.

Written by Art Savage.


An Unexpected Bloom

        "These are for you, " she said, handing me a single stalk of white
stars wrapped in the wings of angels . You could tell that they had been cut
maybe only an hour ago; still so firm, and the pollen had not yet formed on some
of the flowers yet. There were four of them in all - the oldest two at the
bottom having dropped their gilded dust shortly before, and the two prepubecents
near the top. At the head of the stalk was a green unopened bud, sealed tight
perpetually by nature and the premature cut. The scent was strong; not
overpowering, but thick & musky, dancing on the palette like the Bolshoi.
        I collapsed into her shoulder, overcome emotionally. Grief and gratitude
blended like cream in coffee, filtering together eventually into an indivisible
whole. Sweet saline made acrid with the dissolution of mascara and makeup poured
uncontrollably until I found myself being led away.
        Days have passed and the elder blooms have had their day. Even the two
youngest have matured and the silver-grey gangrenous wilt that haunts aging
florae shows it's dread touch on them. But the bud has opened today; spreading
it's arms in it's curvaceous yawn to the misted - over sun. It still holds the
blush of green; so new as to not even have fully shed the shelter of chloroform.
But it stares out unblinking, an unforeseen wonder in a concrete world.

Written by Aquila (aquila@disinfo.net)


En Pointe

	The myriad besmirched angels 
dancing lightly on your arm
en pointe, ever so weightlessly
trampling you from the wrist upwards
no bones broken;
no internal shrapnel
tearing through to show your wounds
only a fractured windscreen-mind
distorting the dissemination of data & dreams

Written by Aquila (aquila@disinfo.net)


Hold My Hand

Shedding skin like scales as the dread metamorphosis begins
will you take my hand 
stay with me as the sirens wail their warning cries?
I am deaf to them, the wax cynical fills the hollows of my ears
the burning spheres in the sky blisters my flesh in its peek-a-boo games from
behind ashen clouds.
No protective cocoon forms to shelter me, no den of safety to flee to;
A public display of disaffection as my own innards ooze out from the cracks in
my calluses in disgust
Running in rivulets from the apathy, which is too tired to chase them.
But will you take my hand, as I'm not entirely certain I should be allowed to
use it, or even if I can.
Yes, take my hand, and hold it until this has passed,
for even this must pass.

Written by Aquila (aquila@disinfo.net)


    Hypothermia

"We did not have sex; we made love," he said to me, holding 
me close again
	and the permanent sheet of ice  - inches thick
	encasing my ribs for so long
	cracks open
red, raw & bleeding from where the shards cut my skin
numb, I close my eyes and stay
unwilling to show my pain, 
unable to fully know yours

Written by Aquila (aquila@disinfo.net)


If Only...

If only I knew.  If only I'd done that.  If only things were different.  If only
I could've done more.  If only I'd said that.  If only I'd been better. If only
I'd been kinder.  If only I'd been gentler.  If only I were calmer. If only I
weren't as mean.  If only I were different.  If only he loved me. If only I
loved him.  If only I cared more.  If only I weren't indifferent. If only I
weren't lazy.  If only I weren't complacent.  If only I'd stopped them.  If only
I'd spoken out.  If only I'd fought back.  If only I didn't allow it to happen.
If only I were stronger.  If only I had more confidence.  If only I had more
money.  If only I were greedier.  If only I weren't so jaded. If only I weren't
so bitter.  If only I had fewer regrets.  If only I hadn't made so many
mistakes.  If only I didn't worry so much.  If only I had charm.  If only I had
charisma.  If only I had a cool car.  If only I had less rage.  If only I'd
learned more.  If only I listened more.  If only I weren't in a hurry.  If only
I weren't so fucked up.  If only I were more coherent.  If only I weren't hated.
If only everyone loved me.  If only I weren't so chaotic. If only I knew more.
If only my family was different.  If only I were better. If only I were
something.  If only things had meaning.  If only I were smarter. If only I were
thinner.  If only I were taller.  If only my eyes were blue.  If only I were
beautiful.  If only I were more than I am.  If only I had a life...

How many more "if only" statements can you think of?  How many consume you?
Do you obsess over it?  How many do you live by?  Do you live your lives
questioning every move you make and everything that you do and everything that
you are?  Do you want to live in conformity?  Do you want to constantly question
whether you measure up to expectations of others, or not?  Do you want to worry
and fear everything?  Do you want to live in the past and regret everything?
Do you want to dream and wish everything were different?  Can you not accept
certain things as they are, get over it, move on, and live with it?  Do you see
yourself as being not good enough?  Stay away from me then...

Written by Helena3 / Damage, INC. (C)opyright 2000.


HERD and TIME

Psychedelic red, seeps from guzzling
ravenous mouths.
Leeches give suck with eyes of contempt.
Tired warriors on 'Nam trip.
Black sun on the rise.
Life-wish mistress lost
HERD drains,
HERD fails the immaculate warrior
Mistaken birth cry
The warriors are lost
Fatigued, air cover, death
HERD bites 
The Lions cry forever
The cauldron awaits, deep black vat
My baby's dead or life spent.
I need the serpent 
or the butterfly
For no-one can stop the leeches
Help
HERD 

Written by El Nino (elnino@disinfo.net)


Im gonna chop my dick off
Holding back
Patsy wedding ring upgrades
And free kiddy colling emotional handbags
Holding back
Holding back my contempt for my passive mass appeal parents
Up a plastic elevator with pine needles from the southern mountain
But im on a new revolutionary diet dig
Out of the sun came a cold child armed with eyes and spline
While the elevator waits next door of my genetic depositions for destruction
And destruction it shall be
And the sun is constantly put on rewind
Forever in the death posture
Like the serpent Kali
I recover from you with aching spleen
Creeping always behind me
Like that hash smoking french guy
Aching for paris and a free uni
My wand vomits hate and special whispers from the sunken ones
Those old bastards owe my hands a fart
Paris paris in woolen black bone batches
I need something to sup during these cold datapocalyptic nights
Like eggs of grapes waiting to be hatched
Im a super super cyborg now
Saluting every idolistic calf
Spin a pentgraph in the face of a roman and his wine sleeps thought he crimes
Cant relate
Everything relates in this hyper real cyber space
Cmon trip
DOM!! Balisst!!

i OMPEDA!!
Let the grammatical libido flow and fuck the data
Real slow like, groc
And the grok giver said "the math is in your head"
chill the spins me and you spinner boy and girl and cyborg cyborg
latter and the former
not the middle
like right angled massages given for a buck and change over there at the junk
yard unit
al right
chillin now word up to the karma cops who keep my sleen clean
ladies too busy organizin
im just flying
organ-izing an d realizing that dreams are are warfare
IAO my sweet jesus;look at magdalene speak!!!
Dreams are mine
Ill psychicly rewind all past confessions
Leaving little time for second guessing
Aye! YEA and verify!
That I am the one with the matrix sunglasses
Do it then
Sold by rayban of course
High class glasses
Cab spit climbing steed, ye maketh me to lie down in ocean
Cha-ching alla ca zammie and a merry christ kiss this

I io
O informa
O informate my cranium ye ol bastard son
Spinner kill the addiction with all impunity
And lysol?
Im so in love its not funny
Can cybernetic transcendence occur these daze
?
lets find out in this ancient new type of intersection kids
triple drop me a line sometime
interstitial foam baroques the runnels
but only if you are a chick of course
while the tunnels soak locked up spirits bleeding them for commodity
lo,l chick but so into someone already
cool and not but fuck it then hugh
I need a new type of syringe to bleed into and splatter on the wall of my mind
My blooooood
Beautiful blue blood
IM SUCH A CATHARSE-hole sometimes
He is so wonderful too
Why that girl of the gun
Just is..everything about him
Bring this web talk in your direction
So sweet
Ok
So real
Sure
Uh huh
Yes im sure
Im listening

Written by El Nino (elnino@disinfo.net)


Propagandize.

I'll give ya the low down...
We're takin' it to the streets.
Puttin' the power back in the hands of the p33ps.

You know what I'm talkin' about?
You know what I'm sayin'?
Now it's time to get serious.  Time you all quit playin'.

I'll give ya the straight facts.
So we can bring it all back.
Better act now so we can get on fucking track.

Get your act together.
And quit hittin' that pipe so hard.
Yer mind is all you've got left.  Last card.

I'm tellin' ya not to just sit back.
Don't just react.
Get up.  Ya gotta go on the attack.

Power to the people.  Ya hear me?
Fuck man, don't phear me.
You gotta listen to this.  Open yer eyes and see.

This ain't no showdown.  I'm givin' you the low down.
Dude don't let em mess you up.
Fuck your mind and make you all soft like a pup.

You gettin' any of this shit?
You ain't down?
Fuck partner... you better step out and split town.

This ain't all that hard to get.
So don't sit there bein' a fuckin punk.
This shit's as easy as seizin' a trunk.

Big Bro will fuck yer mind with propaganda.
He'll hit ya hard with it below the belt in the junk.
So you better prepare or yer ass will be missin' a phat chunk.

You gonna just stand there like a chump?
He's bringin' this shit right in yer face...
Beaming fuckin' Sat messages down all over the place.

It's a disgrace.  You gonna take that shit?
You gonna believe the propaganda from space?
Don't just front.  Yer already losin' this race.

It's fuckin' you up.  Man, if only you knew.
Get off yer fuckin' ass and start doin' somethin' bout it.
Or you already brainwashed by this shit?

It's all goin' down now.  Ya dig?
All this shit is gettin' worse man.  Final chance.
No more playin'.  Run like a punk or dance.

This is the last fuckin' shot.
Brotha it's now or never.  You gotta fight or die.
I ain't gonna lie.

Do whatever the fuck ya want.
I can't tell ya what to do.  You gotta choose.
I'll say this though... You back up and you lose.

If yer runnin' for back already, you just wait.
Roll over and die.  You'll soon be 0wned.
Don't think I havta tell ya.  You'll soon be shown.

Bought and sold.  Influenced like all hell.
It's do or die time.  It's all on the line now.
What?  I gotta fuckin' show you what do do and how?

Written by THC Phreak / Damage, INC. (C)opyright 2000.


Big Brother Matters.

So close, no matter how far
Couldn't tear much more lives apart
Forever changing who you are
And we're all that matters.

Never exploited your mind this way
Life is ours, you live it our way
Bow down on your knees when I say
And the establishment matters.

Followers I seek and I find in you
Every day for us wealth renewed
Close your minds for a different view
And Big Brother matters.

Never cared for what they do
Never cared for what they know
But we know.

So ours, no matter how far
Couldn't steal much more from your heart
Forever creating who you are
And the NWO matters.

Never cared for what you do             | Never cared for what zombies do
Never cared for what you know           | Never cared for what zombies know
But we know.                            | But we know

Never exploited so many minds this way  | Never destroyed so many minds this way
Your life is ours, you live it our way  | You're ours, you live life our way
All these words we don't just say.      | Your only duty is to obey

Zombies I seek and I find in you        | Naive minds I seek and I find in you
Every day we control something new      | Every day for us abusing you
Close your minds for a different view   | Fuck your minds for a different view
And the WTO matters.                    | And Big Brother matters.

Never cared for what zombies say        | Never cared for what slaves say
Never cared for games they play         | Never cared how much they pay
Never cared for what they do
Never cared for what they know
And we know.

So owned, no matter how far             | So fucked, no matter how far
Couldn't take much more from your heart | Couldn't rip much more from your heart
Forever raping who you are              | Forever changing who you are
No nothing else matters.                | No you don't matter.

Notes:  This is a song modelled after Metallica's "Nothing Else Matters".
Obviously, I've modified the lyrics significantly.  But that's the style it
has been written in.  Music inspires.  I've included alternate (alternative?)
lyrics for some of the stanzas and marked them beside.  It was written in a
very short amount of time, but I still think it's cool and carries meaning.

Written by Blackie Lawless / Damage, INC. (C)opyright 2000.


CLOSING COMMENTS -                                                {CLOSING}

"Propaganda is the tool of choice for all oppressive regimes, governments,
corporations, organizations, agencies, groups and cults... including the ones
that exist in the red coloured nation of Canada." - BLACKENED

In reality, propaganda surrounds us.  We're completely immersed in it and
enveloped by it, everyday.  To say that distinguishing between "good" propaganda
and "bad" propaganda can always be done wouldn't just be unrealistic.  In many
cases, it's extremely difficult, if not impossible, since the nature and
intention of propaganda is to get a message across without it being overtly
noticeable.  At least, that's how it is supposed to work.  And so the best type
of propaganda is the stuff you read, and you don't even realize that there's a
hidden motive behind it.  It doesn't even take a master propagandist to pull
that off either.  All it really requires is an almost innate ability to know how
other people will react to something. Sure, it's a skill.  But it's one that can
be developed over time through practice.  Public relations, spin, marketing and
advertising firms, it's all being done by them on a daily basis.

The Damage, INC. Newsletter has been described as being controversial,
anarchistic and radical, among other things.  People either love it, or they
hate it.  And that's great.  Indifference isn't what we're after.  And,
they have their own reasons for feeling the way they do.  We want people to
form their own opinions, instead of merely taking the easy route by agreeing
with and accepting everyone else's.  Whether you agree or not isn't the point.
The real point of it all is to make people stop and think.  It's about forcing
people to view things from another perspective, open their minds, consider
other ideas, theories, beliefs, ideologies, viewpoints.  It is also about
spreading raw information and allowing our readers to disseminate it themselves.
We have faith that our readership is intelligent enough to do that.  Rather
than assuming you are all hopeless, pathetic, mindless zombies, we take the
view that if you're reading this zine, you must be an open minded person with
the desire to read something original.  In other words, people that aren't
seeking the ordinary, mundane shit and propaganda that's constantly being
proliferated by the mass media.  Those are the readers that we seek.

In my humble opinion, this zine has been forever changed for the better.  It
still provides truth.  It still offers interesting, useful information related
to technology.  It still contains the core of what it was built on.  And most
of all, it's still put together by a group of people that are dedicated to
educating and informing others.  Sure, we've changed.  But evolution is a good
thing.  It means we aren't stuck in a rut, admiring what we've done in the
past and stagnating.  It means we're moving forward instead of looking backward.
It doesn't mean we're going to become careless and neglect to watch our backs
though.  Looking over our shoulders is innate.  It's as natural an instinct to
us as breathing.

This issue did contain many more creative articles than I expected.  And the
change in content wasn't as drastic as I had predicted.  However, in the next
issue, there will be many more tech oriented articles included...

Now, more than ever, I believe that we're keeping people honest.  Not just our
readers, but the companies that we report on as well.  By keeping you honest,
and knowledgeable, they're kept honest in the process by default.  So, it does
make a difference.  In fact, what we're doing can make a tremendous difference.
Our approach isn't the same as other groups, and the results may not be as
visible and obvious, but they are effective nonetheless.  Every revolution
starts with one man, and a single idea.  From there it's a matter of how far
people are willing to take it.  And we'll take things as far as we can.

Thinking about, and fighting against greed, corruption, oppression, etc. can
sometimes be depressing.  It's a daily struggle.  It's a time consuming effort.
But any worthwhile cause requires dedication.  We'll approach things with the
same energy and vigor as we do with everything else.  We won't be denied.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Holiday Endorsements:

"Nothing goes with a can of yams and some eggnog like Damage, Inc. 'zine!"
- G. Ratte'/cDc

"Damage Incorporated - a badass Canadian zine so hardcore that it's banned in
r0y, New Mexico!  Imagine that.  But that's not all folks.  These dudes are so
old sk00l, they make Big Larry look young.  Plus, I heard they really pissed off
Carolyn Meinel." - RedBoxChiliPepper (PLA)

"Damage Inc., not only does it have a nasty site.
It has probably the most Raw, Informational, NO bull-shit E-Zine.
Plus if you take the amage from Damage Inc it spells DInc!"
- Phist (SHAO Canada)

"Damage Incorporated and Nettwerked are the best damn phreaking sites in
Canada. Kiss our asses, fuckers!" - The Clone (Nettwerked/Hack Canada)

"Entropy mixed with pure, unfettered madness in text format.  What more do
you fucking want?" - Charles Forbin

---

URL:  http://surf.to/damage_inc
Email:  damage_inc@disinfo.net

- EOF