š¾ Archived View for clemat.is āŗ saccophore āŗ library āŗ ezines āŗ 2600 āŗ 2600_2-8_djvu.txt captured on 2021-12-03 at 14:04:38.
View Raw
More Information
-=-=-=-=-=-=-
AUGUST. 1985
.2600
VOLUME TWO, NUMBER EIGHT
.Vrti K pthUH-il hy -ā Wl fjilrqiriu, Irr , an flrrriMuuiy wianilUi4t Silrtiipfrin nria: II ?- j yr.ir. nAHAul. M I UNIT. -to pi I If. Sit jMi tu-LL tetf. Ownuii O I K u>-
Lilrimr Hlfwipiirn- < Jnpwalf f EMĀ». Mllrf :Wtki jW lb hi: irtK- firmvjflSflK Ilk. WrlK gk JSĀ®, Fk04 ?S2, Mklik lit-v.J NV I l'WK'75j Dul: SliTSIWK.
liBft-' 2QI7464471. ISSN I. Wrilr In His. TftJ. MiitjLc | !.Ji>j . NV 2 IPB-fltfM f..T ad vcit* i ā Ā£ nras uni vrlkt mi hm umi
SEIZED!
i,
6<J0 Bulletin Board is Implicated in Raid on Jersey Hackers
Oil July 1Ā£, 1985, law enforcement
officials seized the Private Scoter BBS, the
official computer bulletin board of 2GQQ
wages;! tie , for "complicity in computer
theft," under the newly passed, and yet
untested. New Jersey Statute 2C:2Q-25.
fV>Iice had uncovered in April a credit
carding ring operated around a Middlesex
County electronic bulletin board, and from
there _ investigated other North Jersey
bullet id hoards. Net understanding subject
ā matter of tli* Private Sector S&5, police
assumed that the sysop was involved in
illegal activities. Sis other computers
were also seized in this investigation,
including those of Store Manager who ran a
BBS of uis own, Eeewolf , Red Borchetta, the
Vampire, NV! Hack shack, sysop of the JfJ Hack
Shack BBS , and that of the sysop of the
^Treasure Chest BBS,
I mated lately after this action, members of
ā2600 contacted the media, who were
completely unaware of any of the raids.
They began to bombard the Middlesex County
Prosecutor h a Office with questions and a
press conference was announced for July 16,
The system operator of the Private Sector
BBS attempted to attend along. with reporters
from 2l>00. They were effectively thrown off
the premises . Threats were made to charge
thorn with trespassing and other crimes. An
officer who had at first received them
civilly was threatened with the lose of his
job if ho didn't got thorn removed promptly.
Then the car was chased out of the parking
lot. Perhaps prosecutor Alan Rockoff was
afraid that the presence of seme technically
literate reporters would ruin the effect of
his press release on the public. As it
happens > "be didn't nurd our help.
The next day the details of the press
conference were reported to the public by
the press. As Rockoff intended, paranoia
about hackers ran rampant . Head 11 ness got as
ridiculous as hackers ordering tank parts by
telephone from TRW ant! moving satellites
with their home computers in order to make
free phone calls. These and even more;
exotic stories were reported by otherwise
respectable media sources: The news con-
ference understandably made the front page
of moht of the major newspapers in the US,
Odd Was a. major nows item as far away as
Australia and in the United Kingdom due to
the Sensationalism of the claims. We will
ā try to explain why these claims ray have 1
|een made in thiĀ£i issue.
On July 28 the operator of The Private
Sector was formally charged with "computer
conspiracy" under the above low, and
U9
released in the custody of his parents. The
next day the Araoricsn Civil Liheiātiea Union
took over his defense. The ACtU oowpeiitod
that it would be Very hard for Rockoff to
prove ft conspiracy juat ^because the same
information, construed by the prosecutor to
be ill ega 1 , appears on two bul let i n boards , "
especially fts Backoff admitted that "he did
not believe any of the defendants knew each
other," The ACIU believes that the system
Operator's righto were violated* as he wan
assumed _ to bo involved in an i 1 legal
activity just because of other people under
investigation who happened to have posted
messages on his board.
In another Statement which seems to
confirm Rockoff 1 m belief in guilt by ftSSoc-
j Sti on i he announced the next day that "630
people were being investigated to determine
P W)y ward their computer eouipmant fraudu-
lently, We believe this ls enly the user
list of the fJJ Hack Shack, so the actual
list of those to be inveatj, gated nay turn
out to be almost 5 times that. The sheer
overwhelming difficulty of this task may
kill this Investigation, especially us they
find that many hackerc simply leave false
information. Computer hobbyists all across
the country have already been called by the
Bound Brook, Row Jersey office of the FBI.
They reported that the FBI agents used scare
tactics in order te force confessions or to
provoke them, into turning in others. We
would like to remind those who get called
that there is nothing inherently wrong or
illegal in calling nity BBS, nor in talking
about nay activity. The iāBI would not
comment on the case as it is an ''ongoing
investigation" and in Che hands of the local
prosecutor. They will soon find that many
on the Private Sector BBSās user list are
data processing manngcra, telecommunications
security people, und others who are
interested in the subject matter of the BBS.
hardly the underground community of computer
criminals depicted at the news conference.
The Private Sector BBS was u completely open
BBS, und police and security people were
even invited on in order to- participate.
The BBS was far from the "elite'' type of
underground tolecoa hoards that Rockoff
attempted to portray.
Within two days, Rockoff took hack almost
all of the stutcrants he made at the news
conference, as AT&T and the BOB discounted
the claius he made, (le was under st audibly
unable to find, real proof of Private
Sector s alleged illegal activity, and was
faced with having to return the computer
(continued on jiogs 2-J f }
COMMENTARY: THE THREAT TO US ALL
7 on this kind
Ā£>f A ivtorj, Wo ve done it 30 many timed in
onr p^ OB thĀ«t KETf: tempted to gloss over
rand stories; because t hey 1 ve lsocome so
oommon^Qce,. Put we realise that
f ^LiP K>: [ a 4.ā a 1 ch L Went ? āŗ because w* all need
to know what js happening out there It h -
realiy not a pretty sight.
"??Ā£ 7" thft ā^āPuter to someone ant)
clāe I it S ^ufd Va hiL C ' ty reactions . In ou,r
H^ uid bH " overwhelming on thus iasm ā
mucn like iui explorer confronting a new
adventure. But lo many ]Ā»oā¢ c!ā¢!tEā¢
^ taks * tā¢ TSā¢f
tbe CCdnputer* themselves, tuid
complete ignorance us to what they and choir
operators are capable of doing. ive saw
blĀ®cty Ā°T the latter last month.
C ? r 'ā if re fuse to underā
fltdnd computers and how they fit in What
MODI fit t0p 3ā¢ ver * iB *' bft b these same
r k 015 bein # t ā i oneei to pasm laws
IĀ£er? inv ā¢ ā¢ c Ā£rning Ā«*nef*. In
^k^ tY j inV āligation we have seen, ignorance
^ true, such ignorance can
the vā¢ L - 1 got a ,g 0ft Ā® ta..gh when we hoard
the wu! ' rac y authorities insisting that
the Nore iw n g ftatellites "through
bb< 4 . b 1 ā e havens But. losing The Private
cRller^L ?y Mother you
were n caller to tbvc bulletin board or not.
^whlf 53 Lfl ā¢! v S ry trc,ub Jtng sign r
What, was Jfho Private Sector? Picture a
bt T d ?f idoaa, thcori*Ā£ ^d\ K -
^Mvate' : L^?^ yoU 13 h ? vc a * 00<i *<ica. Tho
Soc tor was a place to aak questions,
tulk to experts, and learn ft hell of a lot
J ec * 1 0 o ^Ā®' r It was sever a place
d Ll i^ Jsl 111 1 <j rjuatian , such as Sprint
codes i, credit card numbers, or computer
elflWat!' The . system operator ^took
goW measures to ensure this, such as
going through each and every Message public
and private, on 0 daily basL U sure
nothing shady woa transpiring. tfe <wf
Ss 1 i cv 9* h ^ should have hud to ^o even this.
t n f onc * OI]e censor ah ip of any kind ā
ā wer * t ? hflt ā popple wonted to
do j 1 legal things , then they waul d face the
the people who sfmpiy
talked to them, But the sysop had his own
Slem*' He^ ^- ke Pt the board
oieao. ha wanted two things; a good
iith r anth^*^ ,lL ' leti ?*. hf A' rd an d no trouble
JJhtoiĀ£ā Uthor ^ L f 1 ?? J At lā¢t he monaged to
obtain one of those goals.
Again we te ignorance and u disregard
t awards t hr.: rights of al 1 of us , They dime
r + r boflrc! - whoAc only "crimeā was
being mentioned on another board that bad
been raided the month before. The Private
^COmpletAy innocent of any wrong-
without ball 11 L | bei ?Ā£ h * td at this ā¢*nl,
witnout bail. See the connection to free
rET^hee^' M ā¢y P* rt Pi<? have trouble seeing
.hia aecnuse of :.hat word computer. Yet -i
^Omputer bulletin board is probably the
of lre * speech that exists
Trn^H^ . Af , J ron ^ can call, anyone can spoBk.
identity 1 Ā® not required. Why should
thia be considered a throat in a deawjcracj'^
ing in e ld ther ? H l^islattoh pend*
"rfgulate'^hāll^ e ^ . He P^ā¢tatl ins to
regulate bulletin boards. What this would
mean is a ro-definition of liBSāa into u sort
oi public utility. The system operator
would havo to tokc full res pons ibilty for
everyth! tig that was posted, "This means if
he went uwny for ft week and didn't censor
messages. he could find hiaself facing
charges when he curnc hack!) The system
operator would also bo required to confirm
tho identitios of ull users and we wouldn't
ot all ho surprised if part of thia involves
the paying of scano sort of fee for a
license. These sound very much like the
'tied of tactics used by repressive rc T ses
to curb public assemblies and nc^wspape Is
this lti fact whut is happens ing'"-' a.im't
bulletin boards a fora of public assembly, a
kind of electronic publication?
+1 ^?f cir Ā® Wraputer hobbyists out
^e "biickers" for ruining
tho rutujro of bulletin boards., we'd liicp fvĀ«-
āS yif.tMf Ā»fole affair 3 an laport"
ant and inevitshlc test. True, same boards
today are being used for sleazy things ami
could say the
rThff 1 l fcLl ^II ^ out telephones or oven cars,
tie illegal information must
be passed wi hin the confines of some
SSiiiL^P The . fact ia - \o caCt
p"wāc fl arn ā¢e IĀ»1
Wc see this sort of test frequently. When
police pull you over and ask all kinds of
R^Ln 3 ^ probably wind up fairly annoyed,
drunk Hi ky s Ā«r it's a wav of catering
n b v t . ā well, now that- s different
V 1 *' fr 77 a ten'* all that im 1
pottant when the public welfare ia at stake,
rubbish. And what a perfect wav ta
start eroding cur rights as individuals.
fhS ^ * Iad JM, were shlu to convince
th<. American Civil liberties Union to take
cne case, which is most likely their
introduction to the issues that Surround the
^ *7 found good media
like York Tjjb&s that actually cares
ā i.scut what I s said in their atcries and
attempts to find out what all the sides are
We vo also soon sensational iam at Ms worst,
such as WABC-TV, which took our comments out
or Conffixt- and sso.d.Q tj^g scgib like? an
^iti -hacker establishment? Or The Afcw York
reporter who asked us after we
a at o the system oparutor was M aurpriscd lf to
hia computer tsikĀ« 3 p 4 he zhorkcdC'
2 3 ^f. though, we re amazed at the
response of hackers and non -hackers alike.
to the defense of The Private
vice rh flu- f ah rin,? equipment, ad-
vice, DuĀ» phones have been jammed ā¢ā wo' ve
^TTL| St '?? an K tbin l tete. Everyone who
J he ii ri vat S:- Seu tor knows it was
things it's being accused
o. having. The most important thing anyone
can do at this point is to unite sure
vvaryanc knows . The concept of a bulletin
board must be understood. The vnlue of The
mus 41 he known. The cninnoc-
hJ* bI i C ^i ; j C v e J and freedom of speech
S?S a *> that people undor-
j-tund the threat to thfM whenever a bulletin
S i! ut ^ <lwn - Jfofcn w Ā« ^0 this, wo 'il
q^., at i. 7 h Ā°J? scr *0 getting The Private
Sector back on lino and nuking a posit?ā¢
precedent T
Ā£-5fl
ABC
MNO
lJL
0 Pi: H
o
CHEW
0
2600 A Hacking Victim
.WW CVl >C-|>.T
When we received chit June SBS Skyline hill, we wlsc a bk
surprised. Over sis hundred dollm ot' it ciiiot; from uu Ih w
never [raids, But wh;iiA rvidlv i ikicrcitirig is the wav tha.L the
Skyline pem;ilĀ£ handled Lt. In early June, vt gee a call tcjlinjus
line; llidr sophisticated equipment deleted backers trying 1o
gucs;; a code by scanning numerically. They sikt ljut ecale
won Id sewn he d iseoverod, so they wt n goi ng lo give us a new
One, with i ven extra dibits added. They did this and that very
day our did code was inactivated The iilegii I Ā«i 13s hud occurred
before 1 hill day, and wv figure Skyline mijM have known Lhis.
Maybe they Thought that JdW, in our corporate clumsiness,
would pay a huge bill without invest ignr inn. Many big
cumpa hies wcmld. Gods. give litem credit tor frying.
W lien weeal ied up about it, liicy didn't want lo handle it over
the phone! "Send the bill through Ihe rraiiL,ā they said, āMark
the calls you rraide and deduct the rest." Why lire jtfiooe
companies so i'dnud Id do things over the phone?
As h]ri|c as Skyline decided to give the "ā perpetrators" some
extra time before the invcstigiilion skirts, we figure wc might as
well lend a hand tuo. OuioM code was ii>Q09L>. Wc loved that
code and arc very upset at Losing it. Our new si^ht digit one is
very difljeu It to remeirihcT suvt nowhere near as fun.
And one lasL note about these new eight digit numbers.
Phone phreaks have already figured out n way arourxl them, if
you dial the first six digits of an eight digit code, ihen the ien
dtgtL phone number a rat hu n S key, you āll set your tone hack:
Thu nncaris i licit- air cm ly a hundred possible codes since there
a re only two mo re dig Its to figure out and one of them definitely
WOrVs! If you triEĀ£ r sis digits that are not part of an eight digit
code, and then a ten digit phone number, you! I get n n ernor
nvissiixe immediately or ilia; take carder nunc Sly Line loves to
send out. Tint cone, incidentally, is for you hackers with Apples
ami C jnmjnOdOrvs that s::;i r, ,i ll nighl lung look my. Lei i the crdĀ£
shat will pet you through to a number that responds wrtb a
carrier Lone. In tbe morning, you see how rrainy earner detects
you jsOL aru .1 which codes gpi them for you- Skyline's iden is thid
if cvcj-y invalid code gives a luaeker a can icr tone, ihuic is m?
way for a computer to separate file good codes from the bad
ones. Come on! How about setting your computer to dial a
rrorj -carrier and Idling it to pnnt Oul only Ibose codec that
ijāiciW V get a oai rler tone? And there a re pi ohahly a hundred
more ways, Gig corporations cun he so much fun
New Phone System For Courthouse
ā ā ā Vn H - ā r.xi k IIiSsb 1 h r an
Thy Middhiwa County Courthouse and Administration
Building wi It liave a new phnne system inxiadlinl in iiiergase the
.security of Che complex, according to Middlesex County
Prosecutor Alan J . RookoiT. [Yes, (he sume Alan J . Rodtofif
thaL was convinced computer hackers were moving caLcliitcs
through the "blue heavens")
The phone system, due by ScpieiiTbCT, will be able to detect
and cut off unauthorised calls nude in on emergency situation.
āOnce u phone is activated it will show up on this massive
d nigrum that will ljo on a omnpiiler screen and wi 1 1 show where
thal phone is being used in the courthouse or the administration
building," Rockoff said.
3 Tie syslem would niorulor which phones were active and
would be' ahlC Lu euL QfinnuCLiOnx in ari trtsliiciE- Linekoff
promised lhal the system would not be designed to hi p phones-
[Of course, if his knowledge of lapping is anything Like his
knowledge of satellites....]
Seizure of Private Sector
equipment with nothing to show for hia
effort. Rockoff panicked, and on July 31 ,
the system operator had a maw charge against
him, 'wiring up hia computer as a blur; box. H
Apparently this was referring to hi a Nova-
tion ApipleCut modem which is capable of
generating any hertz tons over the phone
line, [ly this stretch of imagination an
Applecat could! produce n 3 E 3 CJQ hertK tofift as
well U# the MBā which is necessary for "blue
boxing, w However , each and avary other
owner of an Appiocnt or any other aodram that
can ganemta i ts own tones therefore has
also 11 wired up his conuputor os a blue box 1 '
by merely i natal linrt the modem. This charge
is so ridiculous thut Rockoff
never bothar to proas it,
wording of wiring
Rockoff an excuse to
the computer longer in
iUegot activity.
"We have rctiuostod. that the prosecutors
give us more specific infqirmation, " said
jirthur .Millar, tea lawyer for The Private
Sector. The charges are so
Can 1 1 really pres ent d c&sa
filler will appear in court
tai a this in format ion . He
demand, for the return of
i'lt:i min ut?d / 'o?t i peg r 2-49}
will
owever, the
up the computer gives
continue to hold onto cases
hiĀ® futile search for
'Ai
0t-
Vogue that we
St this point . N
on August 16 i to
is also issuing
the equipment
241
if the prosecutors don't cooperate,,
commence court proceedings against
"They havenāt been particularly
und.
will
thesi . H Tlioy haven ā t
cooperative," he nnid.
li&ckoff probably will soon raco insider
taking Private Sectorās case to court, oS ho
wil 1 have to udmi t he Just didn 3 1 know wluil
he was doing when he seized tha &HS . The
arrest warrant listed only "computer con-
spiracy" against Private Sector, which is
much more difficult to prosecute than the
multitude of charge:? uguinst some of tha
other defendants, which include credit card
fraud, toil fraud, the unauthorized entry
into computers, and mmerpua others ,
Both Rockoff and the ACM) mentioEicd tire
Supreme Court in their press releases, but
he wi 11 assuredly take one of his stronger
to tost the new Hew Jersey computer
CE'Lme law, JJy seizing the BBS just because
of ^ supposed activities discussed on it,
Rockofr raises constitutional questions,
Dnrrcll Paster, a lawyer who centers much of
his work on computer crime, says the New
Jersey case is just another exustple of
loeal law enforcement getting on the band-
wtyfon of crime that Saa COme into vogue to
prosecute, and they haw proceeded with very
(continued on ;.wi' J-J/LJ
moving satellites right up in the blue...
Ā£*3?^ People knowleilgoahle about
technology and commit*.*-* ...
; : people tc .
technology end computer* very disgusted.
Manyxinple and innocent bits Jf inf onto lion
activities. With the aid of The Shadow wy*
have put together e guide to theā¢
misinterpretations in the hopes fW
^frryone can *ro how this invest ijĀ± it ion hit*
gotten completely out of control, r ā
Alan Kockr.fi- said^VhS^
ing the positions; of satellites up in the
aifSi v ? HWe V B Ir !M ld Causing crianutii cat ions
l - 1 i tc> Change prosit torts 1 ' in order l.y
intike J roe phone ctil is "'boss ihly d ": srunt in tr
wft^"Ā£ ine E t ' Ql Cdmmun feat ions mid making
WitiBnto phono calls impossible, Ir ThiE
ofĀ° r Sir^ 3 n^i a ? by the ā6tfia to the extent
satolti u-C r ^ lctlon f .of hueker-s causing
satoilitos tnj crash into the Soviet Utiion
Ā»gi? 3
anv^rtttt-^T^ 17 ^ AT8lT C<smat <**fliod thut
any attends to re-ronto BateUites had been
Macke i i-l e8ii-fTr fl< ' f 'e 311 AT&T executive on the
Lehrer Report stated that Khr.
compu tors which control 1 *d the S J S3 ] t tS
^S ei, that eV ^o C Ā°^!f^ With ttl * ph ā¢* ] ā¢
m/1 5QtoI Lites ware constantly
Ea^ic^foS. " ov ā s " t - Ā«*i ^
hl JS S ia P^acy arise. Hot bavin/
th^t Ā° th s r hoard * we eĀ«l only assume
mnb^H K. r - i7 -'l hnve con tftined in forma tion or,
?P^ L "S lilegol international culls, giving
S?^S^ā¢A^ d6a that 1hcre was 1 Tutor
distance oom-
cutls ^riL Sutelltloa to transmit their
Th& Sect or BBS hud much in-
formation on satellites, fitting Jn with it*
Purpose us a teiecnnniun i cat ions information
As^T^ ?ā? rwmrrin* topic was TASI. (Tine
tr^i^i t i 1" l' or PĀ°^ fl t ion J method o f
satellite conversations. TASI
is only the packet switching of telephone
conversations ā where the Conversation ia
ffttollit^ inrf* riinEli:i 1 'tickets sent over
ifje v anĀ£ * ā¢y long distance circuits
s iā u ltĀ«neously along with nvmv
other conversation Si TAK-.I permit.Ā® several
tp he t; tint over one satellite
Remitting more conversations
without pending up more satelliteĀ®, rt
+- rjS ā' boUt ? wdojD t ransmiĀ®-
srion methods. A* iar os we hmu there i a
j*? i 1 ? 0, ar '^ fiiuilar information
Plainly one cannot moyf^
Counfi uaan # Evidently Widdlese K
county law enforcement, sow ported mr^sairet
o^t he rou tiiitf of calls Mrat^ua^flSS
ā Jiid jumped, due to paranoia, to the con-
liteaā¢ Wt1S f Ā° r tfl& w*** 0 ? ttir - =atol-
^jfj the wore sensationalist charges
āi ā ^ 1 f - k youths hiid JOfipcirtn^fcit lot'
ā secret telephone codes"' that could
toĀ°tha t Kā¢ iĀ° t! *e Pentagon, hue
ā t the subject mutter of the Private Sector
AUTOVON the Dorr,
b i;sgl
eating network architect urt; quite different
tram civilian phone systeaĀ®, Ā£otne AEIOyoK'
phone numbers were on the hoard ns cKomales
SL tJl Ā° f K lf ** lt of thc [i umber ing p?i,ri!
These numberĀ® are easy to obtain imd have
appeared on other bourds. These aUTOVON
phane number cHn be obtained f rom u dec Las
si ried DoJ] phone hook amai lab ] e from the
Cover nmont Printing Office for a small fee,
One of the more muddied of the ch was
rcporUai by media sourceĀ® vari Iv ^
hackerĀ® ordering tank parts using stolen
into TRW of by Pā Inlt T r frym THW-, breaking
j into tRn computerĀ® for t op secret inf onn-
atioji yn tank partĀ®, and other variation*-
It turns out that TRW does do some def^o
contracting, but it has nothing at a.ll to do
oerr^ t e^ pat ā t ' 11 , 1Ha tend making automobile
wMcle/ TRW ^ā¢-tanS mj litary
venicies, TBft doeĀ® have a credit rating
service access able by COWputer . but this ie
^mpietexy separate diviaion. Somehow
the authorities and the press hĀ«d mangled
dit fererĀ» , alleged crimes of credit curd
leaking into of o defense
t hft V ^ OJ "ri t e^ put A r s y 3t ft - m Which happened
ā o hayt, defense department information in
it. binee TRW is in Ā£cth credit rdtinga rt Jd
Sin ā n J ^- t + ing ( 14 w P uld ā¢ obvious
ā¢ iL fluvo %hv hackers break
e^edit^rd? 1 ^ 1 ^ ^ tftnk P arts b V
] And just why wi,iĀ® the Private tiefO.
dLscuĀ®Ā®ing ThVf in the first place 7 " tvw*
SS SuSfl^ coaputera wore discussed on
-Si Ā£, ?ā¢, SluC ^- aft TfW wa ^ diacussed
in 2yy0 (July 1GS4), Since people's private
credi t m format ion is stored under shoddy
cuas j'onā r * -if 4 Hfl-tyrally came up in the dis-
v Q j f eomptitcr security as a particu-
woren"t for j.iS &thCI:Ce ' ? UC v discussions
weren t for the purpose of breaking into
vario^* r hfl-^ teni ? + wcr0 conducted by
doth ^ not criminal.Ā®] and
data processing managers who were interested
Ar^Fb rity ād computer abuseĀ® r
th?*S? f possibLe source of confusion is
ā”pqĀ», f ^ n + h , atl of the megsugefi on the
c ?3f lscat ^ were written bv
peopU. id years old or younger. People this
and tell, stories as voung
people sometimes do. We're sure that yon
Q K1 y0uni:t ]PĀ«r3on tolling La
iriends how he blew- up aĀ® AT&T cnanutee ^,v
e f'Ntollite out nf orbilTmuch the
ā^Eht brag shout the speed of
oew.BDSPt, car. It wohld be
i l kid'a r ?RĀ„h' 1: ā lb f āJhfritiM to issue
, f lcl M father a ticket based on this i-uat
f- H irresponsible of them to SnpKI
ā j... f- c the list of conputer crimeā;
verifying that actual erimoa did
occur. Tho authorities art? still unsuro
- ā¢ aJJ these exotic charges are revealed
to be mere flights of fancy, a great Imft flf
about computers and telephony in
Wd Ā°fw? d t i rc ' par i ot ]ixw enf nroomeiV J|
alon/ t t Uw ^ fpreemen t official
f telocoamun icst ions hobbyists
should start to research the field by * look
2-32
...what was really gonng on?
iiig ift their public library, or oven hatter
a -oca 1 college library (under V 2 \ IHawey
Decimal Ij , Several magazines also provide
fiaod im format ion, aucb bh T^lccon ttjgcst
Communications Ag Ā£ -, .3 a well 03 2600 and
other telecom indn^try pub] j cations.
Credit Card Fraud Explained
. 1 . 1 th regards to the credit card part, of
this whole thin? acre is a brief guide to
llow crftdj P. card auhibcrs arĀ« used fraudu-
lently.,
first one obtains a complete credit card
rurtocr^ including expiration date, Zf a
driver a License number, gocial security
number, or other information ie also ob-
tained, then it is easier to uac the credit
card number to charge goods ā¢d services.
Credit, and other information is uana liy
iound in the form of carbons (actual carbon
paper that fits between the credit slip and
the receipt) that are often discarded' after
thoir use. Carbons contain all of the
information from a previous legitimate
purchase, if someone is required to inciude
their address or social security number with
f.hojir credit card number then this will also
appear on the carbon which is found in the
daily trash of many retail stores. One can
then call up ft company that tabes chan
requests over- the phone and order
Using the credit card. Informal ion that was
round With the trash,
But the real hurdle to committing credit
card fraud 1. a to have the package delivered
and for this one needs a nailing address.
This can be obtained a few ways. Goo io to
get a post office box under an assumed name,
and another is to have it delivered to a
place where if eon be picked up before the
gfiCkugc is noticed, fly using stolon or
false identification or- by being convincing
to a postal clerk, one can obtain a post
office box. One can also ask for general
post office delivery, whore the post office
writ put your package on the racks behind
tho counter waiting for you to pick up. by
Sending e vacant or temporarily empty home
one can also have the objects delivered
t here .
And this is hew it is done from start to.
ruugh. There may be more effective ways to
complete the various stages, but nil in all
it is that simple. This is mainly because
companies make it easy to Ā«yko a ā purchase
while only supplying a small amount ef per-
sonal ini ormat ion. Often if a company has
been guaranteed that it will, be covered for
the value of fraudulently
then the company will make
person to charge them.
The problem of credit card fraud has a few
simple cures: make it harder to order oh -
jecva by phono (companies) can issue a code
that must be verbally communicated in order
Eo complete the purchase- one that <ivcsnāt
appear on the carbon) or d i s oā¢t inue the use
ot carbons m credit cord receipts. There
ora many other safeguards that run be used
to decrease this type of fraud,
k This section was not intended to be a
1^15Ā° ā DW - to dammit a crime, but an
r edit icat ion of how thia crime is not
comnitted. Credit card fraud is not high
tech crime. No computer is involved or has
to be involved:
involved; and it.
no illegal phone Culls ate
la not necessary to break
into TRW or other credit bureaus to cobuh it
this crime.
Computers may be
message boards whore
down the information
trash. With regards
mail, or post
involved in
. Used as ifotcp
individuals flight wriitc
that they found in the
to Credit card fraud,
computers ore only used as u medium for com-
mun teat j on . Credit card carbons are so
1?* 4 Process of performing
the actual illegal charge has been made nr>
easy that it is not even necessary to dis-
cuss the topic with others to be able to
Conn.Lt the crime 4
Because of the use of [,'g
Office boxes, the post office is
investigating this type of cripĀ»c, The
Secret Service wain authorised last October
to investigate credit card fraud. The FBI
Variety of reasons to investigate.
5 1 ready laws everywhere against
credit card fraud, and there are already as-
sociated penalties. It is nothing now to
law enforcement. In addition, much 'of nil
credit card fnmd is ctsmniittftd by those who
steal, manufacture , or find whol
cords.
We hope that this thorou
will help to got rid of t
stories wo ve seen abounding.
ā e credit
explanation
e inaccurate
Again wc l d
1 -E - *0 ve seen armunding, Again we d
?^ art ^V that law enforcement people
,-houlfl loam a bit about computers and
te I e comm uni cat 1 Ona and above all try to con-
trol thoir gllthuin nam -
course t only qualified to
comment on the specific case of The Private
that Rockoff and hie
cohorts will have to search a long time for
tho special codes that provided illegal
access to the information at issue 11 ā on The
r-riyate_ Sector, fts th ey just aren 1 t there.
Lot cot noNS.1
03 - 29-03
charged ^ods,
it easier for u
System hkrwd Pootod!
RULES OF THIS BBS!
1J MS CDQSF 'ā PASSWORDS/ CC *' = arc to bb
fl-CHtted or ejiclidnqcO via. Eā it.il ] T
Violutjcn o-f this ru: Ā« wl ] 1 CObit you
ycur sccssc. R6Ā£b*hti |ir- h w see every-
thing you type.
2> POST INFORMATION relating to tblerw
ONLY?
These ruios jrs to protect bath you tho
user jnJ w tlw -.yatjpii.
I-f you have any i n tern ot \ ng pr IS Cl es
pi ee sc t.c."id tftem to 24.00 y \ * Cue : 1 to
H IOOO hAGhilUb.ā Hv iippr ug 1 *to dll pood
anO Informative
W11Y COMPUTERS GET SNATCHED
When a computer System is confiscated from
ft young person b&Cftuso thoy break inis
someone s mainframe, because UKy have a BBS
wl t h ] ots of codes or passwords pos ted on
1 t of. because they arc caught mek i ng
illegal E>hono calls, no one complains. It
is Often said that the young parson
obviously comm i ted a crime and deserves to
lose their computer, '/be kid's parents are
not going to complain, because they know
enougn to think twice about arguing with the
FB I , The Secrc t Scrv i ce, or whomever . Plus
the parents do not want to make headlines in
the local papers. So whet the author itien
ln effect are doing is convicting people and
punishing them by taking away their computer
ftp tern. This is r in part, due to the fact
that charges are often not pressed uguinat
young people who break into computers,
Witcd one -asks &ubh> bip compares public
relations department whether orā not people
brettk into their cwiputors they atv likely
to snyl Oh no, of course not, wo .have the
most secure sys toms This is becuuso i t
looks bad to admit to security broaches in
oneās system; one's livelihood, in the case
of GTEā fe 1 ema i 1 , the peop 1 e there saw some-
thing going wrong, told the FBI and then the
Cftse was out of their hands, A full four
HObths or more after the raids in October,
JaoJ the default password was still the
letter A . And it was not until weeks
after this was publicized that this was
corrected (see 2600 , April 1984), Ob-
viously Telemail did Hot want to admit that
they were reluctant to deal with the real
problem. TFW was upset last, k uamcr when the
press {see 2600, July 13B1) had to tell the
wer Id about breaches into the companyā s
credit gathering system.
These companies make money because their
systems arc reliable and secure and not
because they will prosecute people who break
in. Th*y know that it is not worth it to
try to prosecute kids, and it is better to
prosecute those who try to use a computer to
anberzle. In addition kids are often exempt
from prosecution or, because of youthful
offender laws, will have little of no penal-
ties placed against them.
It is for these reasons that it is more
advantageous for companies to have author-
ities confiscate equipment, and punish the
hacker that way rather than dragging them
through court. They keep the c^ulfssent by
calling it evidence in an ongoing investiga-
tion, and they often return it if the kid
tc 1 is them everything they know . f In
addi t ion ā the kid* s confession about the
poor security of whatever ayst^st he may have
broken into is rarely related to the proper
security personnel at the company that owns
f lic" system. ) This is also a fora of Ji-EoraBSā
neat or scare tactica. Arenāt young people
citizens and don't they have rights just
like the rest of us? They have the right to
due process and have to bo proven guilty
beyond a reasonable doubt.
Law enforcement types have said that they
occasionally have to make hacking headline:}
in Order to reduce the amount of Tata night
computer activity. They have admitted that
they need to gat a good bust in before the
stjwmior a tarts, because they knew that all
young people with computers may spend their
summer trying to start World Wur III from
their homo. And fhis is a no-no.
Some important Questions To Ask
Who* l h T ā ftsf'fr
sysop how about remote sysops? How much can
one do to regulate a BBS' 1 On the private
Sector mea sages were regularly scanned for
potential illegal material and then deleted
when found- Then the user who posted the
massage was denied any further access, What
more can one do than this? Especially if
t.he BBS is simply a hobby and not a full
time job. On the Private Sector it was
extremely unlikely to see A. credit cord
number or an Allnct code, Plus isn t it
really illegal to use these codes? This ia
because a crime has been comn ed only
after a code has been used, But .n again
in Rome states, namely California., it is
illegal to tell people code formats. This
makes all credit card otHMercials, sample
credit cards, and this publication illegal
there. Does this sound right?
It also raises a variety cd Questions on
the admissibility of o Loot rente evidence.
The Middlesex prosecutors consider reading
messages on a BBS the same as overhearing a
conversation. Is this the proper way to
look at BBS messages? And what about elec -
tropic mail? Is the sysop responsible for
the contents of electronic mail just because
he provides the service? Isnā t it just as
sacred as U& mail? Now, there are cur-
rently no laws that require court approval
in order to tap data lines, &o s how does
one consider evidence that ift received bv a
legal, vet unapproved tap? If authorities
can confiscate a suspect, computer systems
because it has un illegal message on it, why^^
donāt they confiscate CompuServe when at Ā»
used by criminals to exchange illegal infer
mat ion? Or is the government just upset
about the fact that people are comscun icut ing
in an unregu 1 uted manner? These questions
go on and on. What are the answers?
Some of the answers are only starting to
appear as legislators address the problems
that are connected with the computer ago.
But often they are only responses to head-
lines. For instance, we wore told that Sen-
ator Paul. Trible { lf r V frgin ia \ has recently
proposed legislation, (S--1B05) that would
regulate obscene material on a BBS. Called
the "āComputer Pornography and Child , Exploi
tat ion Prevention Act of 19B5 t r the legisla-
tion would prohibit the posting of names _ or
addresses of children and prevent discussion
that could bo construed as pertaining to
child exploitation, A couple of eX[J licit
sessugos might give sufficient cause t.o get
a warrant to seise your BBS. We have not
Seen the legislation itself yet, hut it was
related to us by Jerry Barman of the Amer-
ican Civil Liberties tin? onās Privacy Project
in Washington . He said that this showed
"ā Congress trying to regulate on industry
that no One understands and that has no con-
stituency. 1 ' This is all. too truc-
On the other side, Bcrnian told us about
legislation that is being draft ad by Patrick
beahv (D-Vermont) that, would extend laws
which limit wiretaps ih order to protect
data transmission, electronic moil, and
BBS's. This is something that would be
harder to get through Congress, as
reduces the power of law enforcement .
tfc will try to keep you informed when any*
t.b i ng new happens . So ask the uucsti otis
now, before they are answered for you.
2-54
HOW CANS YSOPS PRO TEC T THEMSEL VES?
ā"hā¢ a Ā£j bĀ§|
riot^h^r E nL^ 3Dr Ā® 1 'i b,or P abcmt Aether or
u^erWs ^ m W - U B * ww lip in
Ufler j. Oga , Ah Weāve now seen, it imikeft no
ditference whether or not youāre actually
in iUzsr activity. V Any b3lĀ£ in
Sfj th;-r hare K f ^ d . be n *Ā»* Eherc'rSot
t that eon be done to prevent
w Ā° *** ā "ā ā¢ iĀ«ā¢ wSĀ«dā;
t] }* mnntioe, however, there are a few
loosen the odds of a. raid or to thwart the
J 9 ss*ni b issiā* y i Ā° * et i ā t Ā° ā¢-
you con almost expect to get visited, even
What^p u nly b ? ing .^ono in private mail,
S ^ ? h J V . ln, E iortan t. at this, stage is the
r^lc the sya text is olavitw w -j f-v.
re^rda.to this inf-Uat ion. if hĀ£/5L iĀ£
tainT^h* 6 emit ti oi pant there will mo.; I c er-
theft y T+^ r ' io make an axomplo of
tntift. It Ā£ a mil, air to draft rdifiat ration
Who pub Hoi EC their oppositionā tiny
ā¢. kpp*ā ā}s if āfc
running a bulletin beard, you aro call lap
attention to yourself, so it stands to
Ā£5^ ^.should keep your act clean.
ly 1. ^fniT^ 16 boā¢ written before July
itfi.. houJj have advised B-ysopt; +o ehā
courage people not to post credit rurd
bā¢Ā«Te*ā etc, in order not to āget
With 1 ?i. n E p^H. th i s h* Ioil Ā£Ā°r the case,
inlL r a Pri L vli te Sector, authorities moved
i K-t, the board whs kept spunking
clean of the above, So now, the only way we
Oun guarantee that your board won^t ā¢
snutchec from you is if you unplug it ?tsd
ā¢ In - a B 030 ?,. Using a bulletin board
lor communication between two or more people
cun now be considered risky.
,w AE ?J?" illK ^ bat. you still want ydur board
there ore other precautionary measures,
tot onft . l-b Ln Ss the boards that ask the
COUer whether or not they work for law en-
forcement really arc working against then-
- elves. First off, do they honestly expect
all low enforcement types to dutifully soy
yes and never call buck when theyāre denied
access; ho they really think that these
people can get their foot in tho door even
if it raan elite board? Even if there is
nothing illegal on such a board, attention
, drawn to 1 1 by such s tatemen ts and it
H1 tl become impossible to persuade tho
authorities that there simply innāt- a higher
access level On the same token, sysops
t f?Lfā n ^ a i t 4 .^ 3cIail ā sr with words to the
ertect of the sysop takc^ no responsibility
.or wnut is said on this board" are kidding
themselves if they think this is going to
Save them iron harassment, Those words
jfiouJd apply, naturally, but at the moment
they donāt seen to.
Whether or not you want to censor the
patera U up to you. Some-
t Lmcs it helps to Wood out undesirobl ea and
sometimes it s an intrusion into someoneās
privacy We never Liked, the practice
a l though i t was done regular 1 y on The
Private Sector. Itās your board nn$ yob
have tho right to run it your way.
What really aceds to be addressed at this
point is the concept of protection. Tea,
you r have the right to protect yourself
against thugs that came into your home, no
matter who sent them. One way in by
scrambled data. There ora .Ā±ony scrambling
programs around and some of them are quite
f ood, oven the KSA would have a time crackā
dg the code. We feel that all. UScrlogs
should be scrambled, at the verv least, (in
some cases, a valid form of protection would
bo to keep no userlog at nil. > System oper-
ators should try to figure out a wav to
scramble everything so that nothing 1 is
available to unauthorized parties. When
raids become totally fruit leas, maybe then
they will stop. Of course, now there is the
problem of being forced, under penalty cf
law,, to; unsertsmbie everything. A vivid
imagination can probably find a way around
this as well.
The best method of protection is complete
destruction of data. Soae people hook up
their computers *0 that if the wrong door is
opened or a button isnāt preaood, a magnet
activates and wipes the disk clean. Bookies
like to do this with their Apples. fiimi lor
sys terns can be rjggcd so that if a computer
jp unplugged, the first thing it does upon
is u piiftfe [not- 41 dirtttQry pur&ft
which .cures with simply deleting file names,
u complete reformatting of the disk which
erases #.U data} , Ibis means, though, that
evory power failure- will have the same
1 1 feet. It will talfO some time to make a
good system of protection, but. this is pro-
bob ^y the most constructive project that BBS
Operators OUn engage In, It dceisnāt matter
if you have H nothing to hideā. The fact U
you have everything to protect from in-
truding eyes. Because when they sei^e
equipment they read everything without
concern that the sysop may be the caretaker
of people, p. personal messages end writings.
We a l-iko- to hear other methods of out-
a&sirtiti^ those gd>i>i-:is. It's &iot very haiācl.
for mstunoc t you could have a bulletin
board dinl-in at one location, which will
then call-forward to the real location or
still another dummy Location. Each of these
requires another phone line, but youāll get
Plenty of warning, especially if o dtamuy
computer is set up at one of the locations.
And this is only the beginning.
'We don t enjoy having to ' suggest these
Courses of action. We'd like very much to
he ub le to get on wi th what wc ā re supiKised
to be doing; discussing telecommunications
arid computers in our own way. Inateod we
have to pause again to defend our right to
Ā« ay t hose th t Ugo , Its a utodcssary course
uCt ion ant! , if wc hold our heads up, i t
wi 11 be o -succeas ful one.
HOW CANS YSOPS PRO TEC T THEMSEL VES?
B BS ā " j.āH SHhw ,r
"serio* s w i 1 1 3how U P i I " raided
4?Ā£Ā£ io Ā£ fi - wo've now seen. it makes rto
dl fforence whether or not you* rf- actual 1 v
a "f in ill egr act iv ity . * Any ffi let 1 n
t[=r herft v f ^L d l l5e neift ā , ' nd there 'k hot
t that l ;cm bf! rb>nf - tc > prevent
iriteS ** ā¢ Iawa to
...^ the meantime, however, there are u few
^KāSrĀ«a 0 r a Ta!d g*s
fidcntial b mat^iol? y * mB ** l Ā° * et into ^n~
tw vi tv2i y ' if yoti ]wVo fl bulletin board
trint frequently posts codas and passwords
if U it^ iĀ° a Ā£ .OKpeol, to get visited, even
? nly h Ā£ in Ā£ ^4onc %n private mail,
?ol^ nt this stage is the
role tne system operator is playing with
reguria to this information. If fie/sHo is
hi* participant there will most cer :
thim ly Tf'Sf 1 J 10 ,āĀ«*Ā« Ā«n example Of
tfu.m. It s similar to draft rejfi strati on
are^ThJ^o ā publ *Ā£ i S e t t eir oppositionā they
STL bT lCB t ^ rjt prosecuted, rot the
Pā¢fila about it. By
b<y fi 4 > you ore calling
attention to yourself, so it stand* to
Ā£1^* y Ā°^ a ^ ]a L ld ke*P your act. clean,
had this article been written before July
12ā we would have advised sysop* to en-
courage people not to pest credit card
j etc ' in Ā° rder not to get
hoHaled. But this is no longer the ease,
" th u i h - Sector, authorities moved
i? _ thfi ^ourd was kept spunking
clean of the above . EJ-0 now, the only way we
.P f 5 r 5 nteft thj ? fc your board won't bo
snatched from you is if you unplug it find
f?* 3 ' Using a bulletin board
1 or com man icat i on between two or moro peopl r
oan now be considered risky, *
that you a till want ybur board
UP, there arc bther precautionary measures.
I'or one things the boards that ask the
caller whether or not they work for law en-
forcement really are working against thexr-
sejves. First off, do they honestly expect
flU law enforcement types to dutifully aav
ye* and never call buck when they 1 re denied
flCocas? ho they really think that these
people can t ip got their foot in tho door even
^Ā£, iT- i s . 1 & board? Even if there is
nothing illegal on such a board, attention
is drawn to it by such a t atejnen ts and it
wlU become impossible to persuade tho
Monties that there simply isn't a hi gher
access level On the same token, sysops
^ 4 ^ 114 . . with to the
errect of the sysop takes no responsibility
xor whtit is said on this beard" are kidding
themselves if they think this is going to
save them from hurossment ā Those wards
Naturally, but at the .moment
i-tLov don't seem to.
Whether or not you want to censor the
ayatem is up to you, SomĀ«-
-J iL he ] Ā„* E Ā° we< ^ c| . c>ut - ul::iJEo3 ā c* and
w:s s ā¢ intrusion into someone 1 n
f:y i. - IK ā¢ e3 'ā liked tlie practice
although it was done regularly on The
Private Sector, It's your board anti you
havo tho right to run it your way.
What rea 11 y needs to be addressed at thi a
point is the concept of protection. Yes,
you, have the right to protect yourself
against thugs that come into your home, no
matter who sent them. One way is by
scrambled detĀ£u Thers nn: ā¢ā mny scr ccccsb 1 infi
programs around and some of them are quite
good' oven the NS A would have a time crack-
ing the code. We feel that all user logs
should be acradbled, at the very least, (Tn
seme esses,, a valid form of protection would
be to keep no userlog at all.) System oper-
ulois shonld try to figure oyt a way to
scramble everything so that nothing is
available to unauthorized partie-s. When
raids become totally fruitless, maybe then
they will step. Of course, now there is the
problem of being forced, under penalty of
law, to unscrumb le everything. A vivid
imagination can probably find a way around
this as well.
The best method of protection is complete
destruction of data, Some people hook up
their computers so that if the wrong door is
opened or a button isn' t prosisod, a magnet
activates and wipes tho disk clean. Book lea
like to do this with their Apples, Similar
systems ean be rjggcd ao that if a computer
is unplugged, the first- thing it does upon
revival is u purge [not a directory purge
which coĀ»es with simply deleting file names,
u complete reformatting of the disk which
erases sJJ dutaj. This means, though, that
every power failure will have tho same
if feet, it will take Some time to make a
good system of protection, but. this is pro-
bably the most constructive project that B&$
Operators eon engage in. It doesn't matter
if you have 'nothing to hide". The fact U
you have everything to protect from in-
truding eyes. Because when they seise
equipment they read everything without
concern that the sysop may be the caretaker
of people s. persona L messages and writings.
We d like to hear othe r met hods of ont-
smartipg those goons. It's not verv hard
mi- ItMiliinoB, yooi could have a bulletin
board dial-in at One location, which will
then call-forward to the real location, or
still another dummy location. Each of these
requires another phone line, bnt you'll get
plenty oi warning, especially if a dtmay
computer is set up at one of the locations,
ā and this i* only the beginning .
Ā„c don't enjoy having to auggesr. these
courses of action, Weād like very much to
be able to get on with what we're stipposed
to be doing: discussing tel cconmrun i cations
and computers in our own way. Instead kg
have to pausse again to defend oar right to
sey these things. It s a tlccoaoary course
fit fiction aricEj, 11 we hold our heo.de yp, it
will be o auceiFrissful one-
2-55
PRIVATE SECT OR SEIZED
(amiimwd fr&m 2-5!)
Utllo technical understanding. and in the
process they have abused many people's
constitutional rights. What we have devel-
oping as a mini vUuS hunt which i.s analo-
goua to some .of the arrests at day care
centers where they swoop in and arrest
everybody, ruin reputations, and then find
that there is only one or two guilty
parties. We feel that law enforcement, not
understanding the information on the ni3E n
decided to strike first and ask questions
Later .
2600 atage^ine and the sysops of the
lYivate Sector BUS stand fully behind the
system operator. As soon e.Ā« the equipment
I* returned, the BBS will be hack up. Wo
&sk alt our readers to do their utmost to
Support us in our efforts t and to educate hs
nany of the public os possible that a hacker
if. not a computer criminal. We are ail
convinced of our sysop's innocence, and
await Rookof f s dropping of the charges.
[ NOTE : Header* will notice that our
reporting of the events are quite different
than those presented in the media cund bv the
Middlesex County Prosecutor. Wc can only
remind you that we arc much closer to the
events at twnd than the media is and that
we are much _ more technologically literate
Middlesex County Prosecutor * Ā« '
Office. The Middlesex Prosecutor has
already taken back many of his ntatemonts.
alter his contentions were disprove^ by AT&T
und the DOI), One problem is that the media
and the police Lend to treat the seven cases
a* one case, thus the charges against and
activities of some of the hackers has been
extended to all of the charged. We at P$Q
can only speak about the case ef Private
Sector . \
nm qf ntw uriLvir \
MY COMPLIMENTS TO
THE PRIVATE SECTOR !
CFJWmVĀ£KNt WS A DUALITY BULLETIN ROAR D SYSTEM
WHEN THEY SEP ONE. 11 [ATS WHAT THE PRIVATE.
SECTOR WASā AND WTIJ, HE AGAIN, WiTII YOUR HĀ£LP
tell. tiib world what ti ie private sector was all
ABOUT AND IlOW XT WAS UNJUSTLY SNATCHED 1M ITS
ā¢ā¢E. WRITE OR CALI. YOUR ELECTED OFFICIALS AMD
OFFER TO EXPLAIN THIS KJNDOFTHlNOTOTIIEM. THEY
WILL LISTEN BECAUSE NO ONE FT. SI: IS OOJNU TO TF1.T.
theaii donate your time, resources, and/or ā
AR1T.1TISS AND STAY INā TOUCH W1TI E MW *T(jM) 751 -SfcOfl
YOUR IDEAS ARE WELCOME.
OQUtfl y <ir UiiXjLLH:*
H
MtallClI. IIMlIJiAN r
" TĀ«-| run Li rtg i*.Ā»-m I , ā ftcCMtb? * i . . V .^ ir, L._? I CM Cult. l^r m C ,- 1 r- yj, h L J C.
" *Ā« i" ,fc * ; ā¢ā r r ā 1 HKhĀ«UW La .hr H pv.fcrv.U IjHi*,, !l rr r r.^ I hĀ«r. hd MIU.
-L^liu-Uvf 'j;uEy-:_i.u7lTu iM h r .
" ā J l i U llfl = ā r - ^ ā r ā* , ā I n I* L*. tA: J lfl.ll LA- I'ulkj.Mrd Ā»-n na > Y I v 4H
^ ^ H35 2C J 2tĀ«-3- , ifĀ£:J h 2C:2-Ā«5
-C.'rAq. I L.'rh I y ji ā - V -^ 1 U t h r tfrl ft | 4pĀ£0hf hCLl]y , COBJHjfctfhā Oi'|oS|rWlFit r 'in-= l C.T.r. ,
r-Ai.iu.uir, pOCIvucVj h d r. j a i a j iinniii'! ā >j ) -p ] L r. ā , AkhirdAt LpOtAh, r-rL-zTd.r .
nj3CĀ«iir *!ā ā -:.. |,4 hm'd r 1+KT.r. I..1..I li.j liFHic ncardd AFri .... . i.-jj-u r ā Ir n r n
rajACLPh; ā *Ā£. n.r LfrerdtJan ot ihw fo^iiliT.
^ā LVu-: | I S ..-J IUH 1 V 1 I hr iruvr rf r-i^ir 1 , 1
3 *ā * ā > mui *1 n ^kv^F..i h.^. r.i , 1^.^.
Kr-i ā i-Vn .H ā !.ā ā ā ā ,Ā» ik. |>.i.mā¢ ā mĀ»i h ihĀ»-,i ā * ..
H Hi K. n. -.-lMr.il ... IāLl. _ -.In K-UUk. Ā» -- I ā .-I, .ā -.Ir.LsiM -rfKJ i-nlri,,. hnr.
r-rrr i i vmui ..l ,#l. . ,- ā ā ā ā ā - . .ā -i i . h . Am āā l ikj-pLjutr i li'iflL
1 r- ā 1 hjMlB **- 1 1 /ā -,.-i,. c āj^:,|.,
r āā¢ " ā :ilK-:il Jri IV nwtr kf^JJi U LLr^mip. H Iff R,:-J;4i
ZZl 'Zu hmrf ' taJ a f M ^ n 'ā knla ā F 1 āH h Si 1 d I j 1 V rrm ā ry rj ,h, F , T<I , r
J. TV VfcAll .. tāMPI Cl Ih n,...-x,. |J a FChlck ,.
\ii.< ..i.Lu. n-u .Tcriajf, Ā»r,rc i W v,j Ly i>3 1-= r L b-i J /,*. t,
rā l.y if-Ldl tml u.iivniv -Jth LLur j I .. ,,,,._ ..H.n.j | rt ,taā.
j-i-L-au.il. h T hi. u pnparLv. Vm r-D-rJt.-;L- laajiM La . x a L l- ā
IkJāJĀ« 1 Ā«, 1 H rlVlt ā Lila .
Attention ReeszHersi
Demand for back i&snas has^rown so myth that we're m
(lid process oirapfinJing our entire foveaEOfy. Asa resul!.
we'i-a going tp be raising the price on btiok issues 10 52
each. This is nccus&arv to cevur the time i>ncf expense
involvod in doing this. HcweveL our pTesent subscribers
(you) can Still get back issues at Iha pfo price i$1j if yp U r
order is pnstmarkod Seftamber 1 5 or earlier,
QAĀ£K 6tlĀ£E5 AI5EAVAl>W.t: FCR EVERY IdCTf l>f STtCE JWti L5KV. l'W,
Sand all r^gucsts to:
2fiOQ Back Issues Dept.
0ox7b^
Middle Island, NY
(B 1 &> 751 -2G0Q
AiiOUV -/ WEEKS FOR DELtVERY
UjJ.iZV 5fc-.E^n:K
JrS.C.