💾 Archived View for gemini.spam.works › mirrors › textfiles › groups › DAMAGEINC › damage.011 captured on 2020-11-01 at 00:24:13.
-=-=-=-=-=-=-
??????? ?????? ????????? ?????? ??????? ??????? ???????????????? ??????? ??????? ??????? ????????? ??????? ???? ????? ??????????? ????????????? ??????? ??????????????????????????????????????????????????????? ?? ??? ????? ????????????? ?????? ?????????? ??????????????????? ????????? ????????????? "The name speaks for itself!" ?? Presents the Damage, INC. Newsletter August 1998 Issue #11 "No Phear." ??????????????????????????????????????????????????????????????????????????????? C O N T E N T S : ? INTRODUCTION - An Introduction to the Damage, INC. Newsletter. ? BIG BROTHER BASHING - Electromagnetic Mind Control Weapons Part 2. ? Search String: {BIG BROTHER} ? BLACKENED'S TIP OF THE MONTH - Social Engineering. ? Search String: {BLACKENED} ? BREAKER'S REVIEWS - Not available in this issue. ? Search String: {REVIEWS} ? CONSPIRACIES AND COVERUPS - Examining the Majestic-12. ? Search String: {COVERUPS} ? CORRUPTION AND GREED - Power industry reformation is required. ? Search String: {GREED} ? CROSSED WIRES - PSYCOSiS BBS Advertisement. ? Search String: {WIRES} ? DRUGS DISCUSSION - Sweet Leaf Dreams and Experiences. ? Search String: {DRUGS} ? H/P INFORMATION AND NEWS - Dialing out through VMBs. ? Search String: {H/P} ? INTERVIEWS AND INTERROGATIONS - Billy Gates: The saga continues. ? Search String: {INTERVIEWS} ? LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter. ? Search String: {LETTERS} ? OBJECTIVE OPINIONS - The ethics of hacking. ? Search String: {OPINIONS} ? REPORTS FROM THE FRONT - Micro$oft Propaganda Bulletin and other articles. ? Search String: {REPORTS} ? SOURCE AND SCRIPTS - Promisc.C source code. ? Search String: {SOURCE} ? THC PHREAK'S TOP TEN LIST - "Hilarious VMB Messages" ? Search String: {TOP TEN} ? THOUGHTS, POEMS AND CREATIVE WRITING - Chaotic/lyrical sound bytes/rants. ? Search String: {WRITING} ? CLOSING COMMENTS - BLACKENED's Captivating Closing Comments. ? Search String: {CLOSING} ??????????????????????????????????????????????????????????????????????????????? < DISCLAIMER > All articles contained in the Damage, INC. Newsletter are for informational purposes only. Damage, INC. is not responsible for how any of the information presented is used. It is not intended to be a manual with instructions to be followed. We won't be held responsible for any damages caused, illegal acts committed etc. by our readers. If/how you use the information given is entirely up to you. < COPYRIGHT NOTICE > All articles and source code contained within this file are (C) Copyright by Damage, INC. (unless stated otherwise). No part of this work can be modified, reproduced or changed in any way without the expressed written consent of Damage, INC. That means, electronically or otherwise, in part or in whole this file must not be altered. It cannot be included with any other releases. You cannot claim that you wrote it, or alter any articles and source code that has been written and Copyrighted by us. Also, do *not* distribute any Damage, INC. releases in "packages" with other text files or utilities. They must only be distributed alone in their present, original form. You are permitted to read and distribute the Damage, INC. Newsletter freely to quality h/p boards only. Copyright 1998 by Damage, INC. All Rights Reserved. _______________________________________________________________________________ INTRODUCTION: Through the darkness, between the states of madness and above the countless layers of misinformation. It's August and we're flying high again. So, drop a few hits, get out your favourite bong, rip open that garbage bag of weed, cut that brick of hash with a chainsaw, or just grab your dirty old crack pipe... because it's time to start stokin' and tokin' again. ;) Have no phear, there's plenty of dope for everyone. We've got an infinite supply of premium bud stashed away in a safe place here for you to try. This is the alternate dimension of the universe, where nobody knows your name and nobody cares since everyone is baked. A true Utopia? That's for you to decide. In this realm, the people are all strange and their thoughts are their own. Ideas and opinions aren't dismissed for being different. Yes, indeed it is an unearthly place to be. However, it's where we reside... thriving on the uniqueness of what surrounds us. There are no rules and we phear nothing. In this world, intelligent beings are free to think and do anything. Is it reality or illusion? Dreams and illusions aren't lasting. They are transparent realities that can be easily shattered. However, thoughts are real. Their energy is tangible and powerful. Embrace your "strange", "deviant", "weird", "wrong", "unacceptable", "unpopular", "abnormal", "psychotic" thoughts and join us in the Damage, INC. zone. ;) BIG BROTHER BASHING - {BIG BROTHER} Electromagnetic Mind Control Weapons Part 2: In the last issue, I wrote an article named EM Mind Control Weapons Part 1 and stated that I would write Part 2 on the 1990s. Well, here it is. This article will describe the EM Weapons of this decade and what Big Brother has been working on relating to them. ACOUSTIC PSYCHO-CORRECTION DEVICES - Supposedly, these devices can alter a willing or unwilling person's behaviour after very little exposure by transmitting specific commands to their subconscious using static or white noise bands. Their intellectual functions aren't affected either, so the person won't know that they've been brainwashed. Nor would anyone else think that they were, since their level of intellect is unaltered. Basically, it's a way of directly accessing a human being's mind. This technology was developed by Russian scientists. However, the United States is also conducting research and an exchange of information between the two countries exists. In fact, using psycho-correction in Waco, Texas (on David Koresh and the Branch Davidians) was even discussed. Some people believe that some EM Weapons were actually deployed and used against them, such as an unusual noise generator etc. I haven't watched the actual tapes, so I can't comment on that. But, I won't discount the possibility of that. EM WEAPONS - Electromagnetic fields can affect a person's behaviour, emotional state and thought process. This involves stimulating the brain via a carrier frequency. It's a technical process that involves using amplitude modulation to shape the wave.. which mimics an EEG frequency... imposing theta rhythms on the victims. The research and development dates back to the 1960s and 1970s. They can easily be used to adversely affect a victim's mind and nervous system. Dr. Robert Becker, a person that was nominated twice for the Nobel Prize, and a specialist in Electromagnetic effects wrote a report that describes the symptoms of limited exposure to microwaves. They include nausea, panic, retinal irritation etc. SLEEPING BEAUTY - A project that involves mind-altering EM weapons for use on the battlefield. MONARCH - A project that's supposedly directed towards the creation of severe multiple personality disorder in intended victims. There are many other programs and projects underway relating to non-lethal weapons (or "less than lethal" as the military refers to them as being). Many of these projects in the United States are funded under the U.S. counter-drug law enforcement policy, which has a yearly budget of $10+ billion. Basically, the resources are just diverted to fund mind control programs which can be used to develop weapons for crowd control during riots, or as non-lethal anti-personnel weapons. Since they're non-lethal, there isn't any opposition to their development and creation. Many of these projects are "black" projects and highly classified. You can't obtain any information about them through the FOIA (Freedom of Information Act). In conclusion, as I continue to research this topic, gain more knowledge and information I'll attempt to keep everyone updated. The most likely scenario is that articles on EM Weapons will be included in the Reports from the Front section. I'll admit, this article was rushed. However, I intend to do everything possible to ensure that readers of the Damage, INC. Newsletter are provided with some current information in a future issue. Hopefully this short article has opened your eyes about mind control weapons. It's something that everyone should be concerned with and informed about in my opinion. These weapons threaten our right and ability to think freely. They can be an evil, unstoppable weapon in the hands of governments, terrorists and dictatorships. Written by BLACKENED ? Damage, INC. (C)opyright 1998. BLACKENED'S TIP OF THE MONTH - {BLACKENED} Social Engineering: In this article, I will share some tried and tested social engineering techniques, tips, ideas and ways to apply them. I'll also explain what social engineering is all about, why you should practice before attempting to social engineer someone and what the best tactics to use are. Even though TJ wrote an article titled 'Social Engineering' for the Damage, INC. Newsletter Issue #2, I felt that it was necessary to write this article and share some of the finer points of the art. The main reasons are that his article wasn't nearly thorough enough, lacked useful information and techniques etc. Overall, it wasn't complete and basically just contained his own untested theories and ideas. TJ wasn't an experienced social engineer, nor was he a knowledgable hacker/phreak. I regret publishing that particular article (as well as the 'Motivational Neophyte Blurb' that TJ wrote). In fact, I apologize for making the mistake of including articles such as those, that weren't informational or what I'd deem to be quality. I can assure you that oversights such as that won't ever happen again though. Therefore, the topic of social engineering has to be revisited and explained properly. Hopefully by writing this article, the previous 'Social Engineering' article can be overlooked, ignored and perhaps even forgotten. I sincerely hope that it doesn't need to be mentioned again. Most of you have probably read about social engineering or heard the term used by others already. However, you may not know what it means. Or, you may even think that it's not worth learning the skill and becoming an experienced social engineer. To be blunt, you're wrong if you believe it's not an important aspect of h/p, because it most definitely is. Just as a night of trashing can provide useful, valuable information/hardware, a few minutes of social engineering can save you a tremendous amount of time hacking. ;) Social Engineering - My definition of social engineering isn't a very complex one. In my opinion, it simply means using your mind and being able to think of quick responses during any situation to persuade, influence, trick, scam, fool, dupe, verbally hack/exploit in order to gain information, access to systems etc. Basically, it's fast thinking and conning an intended mark out of what you seek. The goal is to get them to believe you, do what you want them to do and release information that they otherwise wouldn't/shouldn't give out to anyone. It's about obtaining information that you wouldn't otherwise be able to access easily or would be too time consuming to pursue. Social engineering is a useful means of doing that for hackers/phreaks. It's also something that requires creativity, improvising, experience, knowledge and most importantly, intelligence. You must be an intelligent person in order to be a successful social engineer. However, if you want to read someone else's definition, then read the Social Engineering FAQ that exists. I just don't feel that text files such as that adequately describe what it means, so I decided to define the term 'social engineering' in my own words for readers. In essence, it basically means "bullshitting" if you want the blunt, true, unrefined, rarely stated explanation/meaning of it. ;) Techniques to try: ~~~~~~~~~~~~~~~~~ ? Sometimes social engineering a slow mark can be quick and easy. In fact, I've seen it done (to acquire a password for a UNIX system) in 2 minutes or less. Therefore, don't assume that you have to carry on a long conversation with the mark before asking for any important information. Try to catch them off guard by calling and identifying yourself as "Jim Robertson". Tell them that you're an employee that's been on vacation in California for the past two weeks. Explain that you've somehow forgotten your password. Or, if you need a 'security' password to login on their UNIX system, tell them that the password has been changed/forgotten... and that you can't access your account to do your work. Let them know that you want to be able to call remotely and finish working on an "important project" during the weekend. ? Dial up your mark (financial service companies are an especially good mark for this technique). Express an interest in their company. Tell them that you'd like to become a client of theirs and have inherited some money that you wish to invest. Ask them questions about their company. Write down their answers. Make them believe that you're very interested in the service that they provide. They love talking to prospective clients. The mark will start to trust you and treat you as though you're already a client/customer of theirs. Then, say that you really want to try out the service first etc. and explain that a greedy corporation ripped you off in the past. Play the part of an innocent victim. If they want your business, and you're believable, they'll allow you to do that... by providing you with any information/login/password. Perhaps you'll be given a guest account to try out their investment service or whatever they offer. Plus, you'll at least have some basic information about their company to use against them at a later date if needed. ? Select your mark and say "This is Robert Harpo of the New York remote office/station... We're having problems logging into the server. We've had problems with our network today. Some of our systems have been infected by a virus. We've lost data... There are missing/corrupted/files etc. and one of them contained passwords. Our clients are relying on us and we may lose profits due to the virus attack." etc. Sound like you're worried and that it's a major problem. Tell them the server crashed if you want, that a trojan nuked it, that there are configuration/compatibility problems with the network, or with retrieving certain data files. ;) Then ask for the password needed to login on their server. If you know what cities they have offices in, the address etc. then this technique should work perfectly. Pretend that you're doing your job and make sure it sounds like you're in a large office building with other people working away at terminals. As in, the sound of a keyboard clicking overheard in the background can be very effective at fooling the mark. ? Call up your mark (at a large corporation with many employees) and identify yourself as "Richard Johnson. Human Resources Assistant." or whatever job title you want. Then instruct the mark to setup an account for the newly hired "Thomas Gibson"... with a password of "gibson". Assure them that the new employee will be instructed to change their password for security reasons etc. Say that you've been busy reading the resumes of applicants and conducting interviews, information sessions etc. all day. Make sure you call just after lunch hour, and say that you haven't even had a chance to eat lunch yet. ;) ? Phone the mark and tell them that there's a problem with *their* server. Explain that it's not accepting the password that you type. Tell them that it's urgent that you access the system and retrieve a report that you wrote. Sound desperate, but business-like. Pretend to be an employee and try to con the password out of them by saying that you work in the "marketing department" and that "you need the information ASAP for a meeting that's scheduled today." etc. This technique isn't for accounts, but rather for obtaining the password to access the system. If you know anything about the corporation, such as what they produce, how they advertise etc. use that in your "marketing report" scam... ? First, go trashing and try to obtain an employee list for the company that is your target. If it contains hired on dates, choose a new employee's name that was hired within the last few days/week. Then, call up your mark and tell them that you're a new employee and haven't been given an account yet. Give them the 'borrowed' name and a password etc. If they tell you that you've already been given a login and password to use, explain that you weren't personally notified. Tell them that Human Resources said you'd be assigned an account, but never got back to you. Say that you've been in training and that it's been a hectic, stressful week etc. Apologize profusely for the time and hassle (inconvenience) that this misunderstanding has caused them. However, remain calm and speak in a polite voice. They'll probably reply with "That's okay." Thank them for their help. Soon you should have an account (login and password) to use on their system. ? There are also social engineering techniques in which the telco is involved, and you identify yourself as being a linesman, technician... or an operator. Or, if you're very confident, have the ability and your mark is stupid, sometimes the "I'm a security consultant/specialist/worker" scam works. ;) Demonstrate to the mark that you know what you're doing, and they'll be more than willing to help you get information etc. Sometimes you can even persuade them into believing that you're helping them. I'm sure that you get the idea by now though. Note: Using your own ideas, techniques, scams etc. is always best. Only telephone social engineering techniques were discussed. There are also ways to social engineer by mail, internet Email and in person. Most of the examples given were for gaining access to UNIX systems. They're just tips, and not an instruction manual on how to social engineer *anyone* you want. You must develop some of your own unique techniques and apply them to the appropriate situations. Some of mine are patented, and I chose not to reveal them to everyone. Also, you may want to divert your calls (by using a diverter or dialing through a VMB that you know diverts) as a precaution as well. ;) Things to remember: ~~~~~~~~~~~~~~~~~~ ? You must remain calm and be confident while social engineering someone over the phone, or in person. No Phear. ;) ? You have to be comfortable using the social engineering technique/scam that you've chosen to use. So, practice it many times on friends while talking on the phone. Learn how to play mind games on them. Eventually, conning people that are total strangers won't seem so difficult anymore. ? Some social engineers like to have everything carefully planned out, written down on paper, know as much as possible about their mark and don't like to improvise at all. In other words, they follow a script that they created beforehand. They're almost like telemarketers. If you're that uncomfortable or ineffective at social engineering, then you might as well quit now. If not, then play off what your mark says to you. Improvise and use the spontaneous responses to your advantage. It'll sound more realistic that way, like a normal conversation. Basically, you have to be able to make shit up as you go along and feed your mark believable bullshit. Speak to them naturally, in a normal tone of voice... instead of reading from a script. Try to be real, not a fake that they'll be able to detect. Gain their trust and then use it against them to get the information that you seek. ? Be courteous and polite with whoever answers the phone. In most situations, you should act business-like and mature. Avoid using any slang, swear words, poor grammar etc. at all times. For example, do not say "Hello. Like, ummm I really need a password to access your UNIX system d00d. Do ya think ya can help me? Uhhh... Please? Duh..." Basically, don't talk like a warez d00d and act stupid. ? Knowing your mark can be very important in certain cases. You can obtain information by trashing, and then reading documents. Or, you can get someone else to social engineer them for basic company information first, several days before you call. That way, you will have some names, phone numbers, basic company information, contacts, companies that they supply, work with or are affiliated with etc. already when you call to social engineer them for 'security' information such as a password to login. ? Scanning can definitely benefit you in your social engineering endeavours. If your target is a large UNIX system, and you scan around (+50 and -50 numbers above/below the number usually works)... then you should be able to find the root system. Once you find a line with a person that answers voice, you will already have some basic information about their company that you can use against them. ? Consider your mark to be your opponent/adversary. Don't have mercy or pity on them. Don't show any weakness. Never assume that they're not intelligent or that you can easily social engineer them. Be aggressive and act as though you're just doing your job if they start asking a lot of prying questions. Say whatever is required to make them believe you. In fact, pressure them. Force them into believing you. Sometimes you'll have to become angry with them if they doubt your authenticity. At that point, sometimes a verbal assault is the key to getting them to apologize and give you whatever you originally asked for. When asking for information, don't hesitate. Be assertive. Don't let them cut you off while you're speaking. Make sure you clearly state what your intentions are and what you want. However, they'll obviously ask certain questions that you'll have to provide them with answers to... such as what your name is, what company you work for, what job position you hold etc. So, have something prepared or at least an idea of how to answer any questions that you know you'll be asked. ? Whatever personal/company information you use cannot sound fake, or it won't work. Therefore, take the time to choose an appropriate name, an authentic company name etc. Never try to use shit like "Hello. This is Joe Hax0r of Killroy & Killroy Co. I'm doing research on..." or "Hello. My name is Harry Black. I'm a University student. The reason I called is that I'm doing a project and would like some information about your company for a term paper on Macro Economics that I am writing. Can you provide me with anything? Thanks in advance." or "Hi, I'm having difficulty logging into the system. I'm... ummm... Rick the Admin guy." etc. That shit won't fool anyone. ? The "I'm a new employee with the company and I forgot the password." type of social engineering attack isn't the greatest and it lacks imagination. It's also quickly becoming obsolete. That is, unless you've gone trashing or obtained an employee list through some other means. Then it may work, if you sound/act the part... by apologizing profusely, chatting with the mark and letting them know that you won't forget it again. Basically, reassure them that it's all your fault and say "I can't believe I forgot the password. I went to login and my mind was blank." Try to get them to pity you. Boost their ego in the process, and the mark will feel good about helping a lowly 'clueless' new employee out. Avoid using it often though. Never rely on that story to work every attempt either. ? Don't be greedy. If you start asking them for too much information, too quickly, you won't be given anything at all. Plus, it can alert the mark about what you're attempting to do. Once they're "on to your scam" they aren't going to give you any assistance at all. That is, at least not on that particular day. ;) If you become too greedy, and want information right away, you may find that you are successful at social engineering people less and less. ? Try not to act nervous or suspicious. I realize that some people may not be able to control their emotions, but it's critical that you do. Otherwise, you'll fail at social engineering, time and time again. So, you must learn to be at ease while scamming your mark. Obviously, you want to be as convincing as possible and not draw any suspicion. There's no way to teach how that's accomplished. Nor is there any great advice that can be given regarding how to avoid nervousness. I can't tell you how that's done. Also, don't be hyper and start talking fast. If they can't understand you, and have to ask you to repeat yourself... they'll become suspicious. ? Good liars don't necessarily make great social engineers. In other words, habitual liars aren't always so adept at being able to social engineer for certain types of information. Sometimes, knowledge is required in order to be successful and it was attained through a means other than lying. Basically, the point is that lies can only take you so far, even in relation to social engineering for information. ? If you have a high pitched voice, one that crackles or is in the process of changing... you won't pass for an adult. So, you're only option is to buy a voice changer. It'll alter your voice so that it sounds deeper to your mark. That way, they won't say "Who are you? How old are you? Is this a prank? Listen kid, I don't have time for this shit. Go play Sega/Nintendo." ;) ? Background noise (such as music that wouldn't be playing in an office), street noise (if you're using a pay phone), dogs barking, kids crying, people talking loudly or yelling etc. can destroy your efforts at social engineering someone. Try to eliminate those types of noises if at all possible, as they can adversely affect what you're trying to do. You won't be believed by your mark if your friend is laughing in the background either. In conclusion, social engineering is a valuable tool/skill to possess. It's a powerful skill that has to be developed. Some people are born "natural social engineers". It's a talent that they've always had... but they still work on honing their skills, practice their craft and have made it into a legitimate art. Watching and listening to someone successfully social engineer their way to gaining access to a system is such a thing of beauty. Just as, the rush that you get after social engineering someone yourself is amazing. You can allow your creativity to emerge, use your imagination, react to the situation, respond quickly to questions and trick your mark into believing or doing whatever you want. By now, it should be obvious to you that I enjoy social engineering. ;) It's a learning process that takes time and is challenging though. However, it has great benefits and the experience gained can be extremely rewarding. Written by BLACKENED ? Damage, INC. (C)opyright 1998. CONSPIRACIES AND COVERUPS - {COVERUPS} Examining the Majestic-12. Do you believe that a UFO crashed near Roswell, New Mexico? Do you believe it is possible that aliens are living in hidden bases deep beneath the Earth? Have you heard of the Majestic-12, and the leadership role they have played in covering up the existence of aliens, and the aliens' relationship with the United States? If you haven't, I'll give you a basic introduction to what could very well be the greatest conspiracy and coverup perpetrated in human history. All I ask of you, the reader, is that you have an open mind. This conspiracy is so great that very little information/evidence has been uncovered. As always, the best place to start is the beginning. When did the U.S. Government, through their agents, initiate first contact with aliens? The answer to that question is revealed in a leaked document with MAJIC security clearance. On June 24, 1947 a civilian pilot saw nine flying disc-shaped aircraft, while he was flying over the Cascade Mountains in Washington state. The flying saucers were flying extremely fast in standard formation. Unlike previous UFO sightings, this one was widely reported by the mass media. After this, there were hundreds of people coming forward to report their sightings of UFOs like the flying discs. What worried the U.S. Government is that many of the sources came from military officers and civilian leaders. Various branches of the U.S. military reacted by initiating their own investigations. Witnesses were "interviewed". The U.S. military also tried to engage the flying discs, but they failed miserably. Unfortunately for us, the coddled, weak-minded public would border on hysteria at various times. The U.S. Government knew very little about these flying discs. There simply wasn't an opportunity for anyone to gain any new information. I am referring to the now famous (perhaps infamous) Roswell incident. One night a rancher local to Roswell reported that he saw a flying disc crash, at a location that was approximately seventy-five miles northwest of the Roswell Army Air Base. On July 7, 1947, The U.S. Government initiated a secret operation to recover the wreckage of the "flying saucer" for scientific study. However, there is another bit of information that many people that have studied the Roswell incident may not know. The reason that many Roswell residents could not confirm seeing aliens is that they ejected from their craft. Four small human-like beings were found approximately two miles away from the crash site. There are conflicting reports as to whether there was a surviving alien or not, but that could be the subject of another article. The most important point of this incident is that alien corpses and artifacts were recovered by the U.S. military. Roswell citizens were then interviewed (and in some cases silenced by various threats) and the weather research balloon coverup was construed. In order to deal with this critical situation, some of then-President Truman's closest advisors recommended the creation of a "Top Secret Research and Development/Intelligence operation responsible directly and only to the President of the United States." The name of the Operation is OPERATION MAJESTIC-12. The Majestic-12 was established by Truman's executive order on September 24, 1947. The Majestic-12 are literally twelve people. The Majestic-12 are a team of military leaders, political leaders, and scientists that are at the top of their respective fields. Each member is designated a codename. Their leader is MJ-1, which falls upon the Director of the CIA. The reason why I will not use "MJ-12" as an abbreviation is because MJ-12 is a person, not an abbreviation for the Majestic-12. At different times, they may be called upon to use their talents to evaluate alien information, technology, biology, and other factors involving alien beings. When the Majestic-12 are called into action, only members with the proper skills for the project are given any information. The information the Majestic-12 is given is controlled by MAJI. MAJI stands for the MAJESTIC AGENCY for JOINT INTELLIGENCE. This group is in total control of dealing with all alien concerns. That includes contact with aliens, national security and intelligence, and of course providing disinformation to prevent "outsiders" (us) from discovering the alien presence within the United States. All MAJI documents are classified "MAJIC", which means MAJI Controlled. MAJI, like the Majestic-12, report directly to the President, and is thought to be based in Washington DC. All alien information is processed under the large umbrella of what is known as "PROJECT GRUDGE". Under Grudge, there are various child projects that deal with specific courses of action to control the alien presence. Below I will give you information on various projects that are at the heart of this coverup. AQUARIUS: This project has been active since the United States' first contact with UFOs, as well as contact with IACs (Identified Alien Crafts). This project was born in 1953, and is under the control of MAJI and the CIA. The purpose of Project Aquarius was to collect all scientific, technological, medical and intelligence information from UFO/IAC sightings and contacts with aliens. Information obtained from Project Aquarius is what has given the United States its world superiority in space flight and military aircraft. AQUARIUS/ PLATO: Project Plato's mission was to establish diplomatic relations with aliens. Under this project, diplomatic relations with alien races were established and a pact was formed. The U.S. took alien technology in exchange for agreeing to keep out of the aliens' affairs on Earth. The U.S. also agreed to keep the existence of the aliens' presence a secret. Project Pounce is an offshoot of Project Plato. Project Pounce's mission is the secret crash recovery of all aliens, and their craft. AQUARIUS/ SIGMA: This project's goal was to establish communication with the aliens. The goal was achieved in 1959, when primitive forms of communication were established. Subsequent encounters with aliens under Project Sigma have continuously improved communication with the aliens. Project Sigma is viewed by MAGI to have been successful. GRUDGE/ REDLIGHT: Project Redlight's purpose was to test fly recovered alien craft. This project continues in Nevada (at Area 51/Dreamland). Project Snowbird is a child project of Project Redlight. Project Snowbird's objective was to create flying discs using conventional technology as an excuse for the high number of flying disc sightings that were being reported. There are many more projects that deal with weapons development, and defense strategies against the aliens, etc. However, they aren't as important as the projects listed above. The United States have been harbouring and supporting aliens for almost 50 years. Recently, in the last year the U.S. Government, along with the U.S. Air Force has tried to coverup the Roswell incident yet again. They now claim that there weren't any alien bodies recovered, but that dummies that resemble human beings, that were used in an experiment were all that the Roswell witnesses observed. Basically, they're still denying the truth. They have cut deals with the aliens with their own self interests in mind. Meanwhile, reports of alien abductions haven't decreased at all. In fact MAJIC knows *and allows* the aliens to abduct humans, as long as they provide MAJIC with the names of the victims. MAJI has sold us out to races of aliens that plan to use us for their own ends. In my opinion, the greater sin that the U.S. has committed is the fact that they are covering up every bit of information. If there are alien "visitors" on our planet, we have a right to know. Not all of us are weak-minded zombies. I'd personally rather face my fate, than to be stabbed in the back and kept in the dark. I hope that you have found this article to be interesting and informative. I felt it was important for me to write this article. Of all the conspiracies within Washington, none have been covered up like the existence of aliens within the United States. A lot of disinformation is out there in various mediums. I believe that we will eventually be exposed to "hard facts" of the existence of aliens on our planet. At this point, it's difficult to know what to believe and what not to believe. Unfortunately, the naive will be caught totally off guard if the alien races' intentions are malevolent. Written by Blackie Lawless ? Damage, INC. (C)opyright 1998. CORRUPTION AND GREED - {GREED} Power industry reformation is required. Despite all of the advancements that've been made in the fields of science and technology, there have been very few in the generation of the electricity and fuels needed to power everything. Why is that? Why has power generation technology taken so long to advance? Why do we still heavily rely on limited resources for power? One would think that with finite natural resources, more ingenious ways would be developed to provide clean electric power. Actually, there are inventions that tap into free, natural energy sources. For example, U.S. Patents have been awarded for motors that contain permanent magnets. According to my research, the magnets within the motor tap into the energy within the Earth's magnetic field. This provides the motor with a nearly unlimited fuel source, so that conventional fuels (oil, gasoline, etc.) aren't required. Can you imagine the potential if we could all have an electric generator based on a magnetic field powered motor? If you are an intelligent, enlightened person, I'm sure you understand the implications of that. We would no longer have to pay a government or corporate power utility for electricity, but *we* could be in control of our own independent power source! After the initial investment, a generator powered by the Earth's magnetic field would pay for itself extremely quickly. Free energy inventions have been repressed for decades now. An Austrian civil engineer named Viktor Schauberger invented, and with limited funds began to develop what's called an "Implosion Turbine." Water is pumped by an Impeller pump through a Logarithmic-Spiral shaped coil of tubing until it reaches a critical velocity that causes the water to implode. The water moves so fast that it no longer touches the inside walls of the tubing. The force of the implosion drives the pump, which causes the pump's motor to become an electric generator. Dan A. Davidson, an author that wrote about the Implosion Engine in 1977 says, "The device seems to be tapping energy from that of the Earth's rotation, via the "Coriolis effect", like a tornado." In essence, it uses the Earth's own gravity, in conjuction with its rotation to create a viable means of sustained power. Basically, tremendous spinning forces can be used to artificially create gravity. The most sickening fact is that Viktor Schauberger invented the Implosion Engine during the 1930s. However, he didn't have the funds or support to complete his work. Are you skeptical about the existence of inventions that can tap into the natural energy of the Earth? Hopefully, you will be more tolerant of an invention with tremendous potential. A Bulgarian-born American Physicist named Joseph Maglich invented and partially developed an atomic fusion reactor that he named "Migma." An amazing fact is that Migma uses nonradioactive deuterium as fuel. Nonradioactive deuterium is readily available in sea water. Obviously, there's more sea water on this planet than we could ever use. If Migma were fully developed, Maglich stated it would produce no radioactive waste, and is designed not not to require a turbine to generate electricity. (According to what I have read, Migma generates electricity itself, without any external turbines, etc.) He also said that Migma could be built to fit in a single house, or large enough to power an entire city. One source stated that Maglich's partially developed Migma works, generating "three watts of power for every watt put in." You may be wondering why these devices haven't been developed and mass produced for our benefit. What would benefit the average person does not benefit the corrupt fat cats in the power and fuel industries. Governments also have a hand in blocking any new, superior power generation technologies from being developed. All factions involved in the current way that power is generated and distributed are making a tremendous amount of wealth, and wield a lot of influence. Free energy motors and other inventions would destroy them. The potential that these, and many other power/electricity generating devices have is enormous. Coal burning stations, nuclear reactors, oil refineries... they would all become instantly obsolete. We could be in control of our own power sources. Plus, the environment would also benefit. As I mentioned in the examples above, none of them claim to produce any harmful gases, radioactive waste, etc. So, the levels of air, water and ground pollution would be far less than they currently are. Governments and huge, multinational energy/fuel companies have been extremely aggressive in eliminating such threats to their cash cow monopoly. Inventors have been denied patents from their government. Then a "threatened" company would patent that inventor's creation so that it can never be developed and mass produced for our use. Other inventors have been bribed, threatened, or their work is "mysteriously" destroyed. The reason for the collusion and between governments and energy/fuel companies is greed. Tremendous profits are generated by efficiently run private operations. Governments also reap tremendous amount of tax money from these industries. In many areas, electricity is a government controlled industry. They control it and supply their citizens with electricty. Therefore, they'll do anything in order to prevent people from becoming self-sufficient. Indeed, they want citizens to rely on them for their basic needs. In Ontario, as an example, let's say that the refinery sells some gasoline to a gas station. The price that day is 21.35 cents/litre. The Ontario government slaps on a 14.70 cent/litre "Fuel Tax." Then the Canadian government adds on a 10 cent/litre "Excise Tax." Finally, the Federal Goods and Services Tax (GST) of 7% is added. The GST is applied to the Provincial Fuel Tax and the Federal Excise Tax as well as the base price to the gas station. That increases the price to the consumer tremendously. It starts off at 21.35 cents/litre and goes to 49.3 cent/litre (and that's without adding the gas station's profit of a few cents). If a car with a water, air, or magnetic field powered engine was manufactured, that tax money would remain in our pockets (until new taxes were created to replace the old taxes mentioned above...). However, it might be more difficult for them to tax those natural elements. :-) Although tax dollars are important to them, control over the zombies is paramount. Big Brother wants every house to have electricity and be connected to his power grid. That way, Big Brother is in total control of the power switch. If we all had independent power sources, Big Brother wouldn't be able to shut off your electric power before busting down your door, or monitor how much power you use as easily as they can right now. It is a horrible state of affairs when the pursuit of greed and power by a corrupt few can do so much damage. What is even worse is that their efforts to prevent all of us from obtaining free electric power have been successful. There aren't very many people that know about all of the inventions that have been hidden or eliminated. That is why I have written this article. I want to make sure that everyone is informed that there are people out there that are suppressing new and old, superior technologies for their own short-sighted, greedy purposes. They also live with great fear in their hearts, as the death of their industry looms before them. --- While doing research for this article, I found some references that I was unfortunately unable to obtain. If you have access to the following sources (and wish to learn more about the inventions I wrote about), check them out: "Science & Mechanics" magazine, Spring 1980, ("Amazing Magnet-Powered Motor", by Jorma Hyypia, pages 45-48, 114-117, and front cover). Implosion Turbine: "A Breakthrough to New Free-Energy Sources", Dan A. Davidson, 1977. Migma: "New Times" (U.S. version), 6-26-78, pages 32-40.] Written by Shatazar ? Damage, INC. (C)opyright 1998. CROSSED WIRES - {WIRES} If you'd like to advertise your h/p board or net here, contact us at damage_inc@mailcity.com and attach an ascii advertisement to the message. Advertisements must not exceed 4 pages in length and 80 columns in width. Special Access for long distance users .sS$$$?$$Ss. If you are into h/p give it a call. `$$$$. `$$$. `$$$$. `$$ Running Mystic BBS Software $$$$$. `$$ up and running 24/7 $%$!$$' .$' (519) 742-6899 $$$$$sS?' $$$' $$$ $$$$Ss.`$s,.. ..,s