💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › PHANTASY › phant-1.2 captured on 2022-06-12 at 13:55:10.

View Raw

More Information

-=-=-=-=-=-=-

   -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
   =                                                               =
   -               WELCOME TO THE SECOND ISSUE OF                  -
   =                                                               =
   -                       -=>PHANTASY<=-                          -
   =                                                               =
   -           A MONTHLY PUBLICATIOM AND NEWSLETTER OF             -
   =                                                               =
   -                             THE                               -
   =                        INTERNATIONAL                          =
   -                         INFORMATION                           -
   =                          RETREIVAL                            =
   -                            GUILD                              -
   -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

        Volume Number One,Issue Number Two    Dated 11/12/90
    
      Table of Discontents:

         [1] The IIRG meets the FBI (Part 2)
         [2] Hacker Information and Where to obtain it
         [3] High-Explosives for Fun and Profit
         [4] The I.I.R.G. attends the 8th Annual Ct. CES Show 
         [4] PHANTASY NEWS
         [5] Listing of PHANTASY Distribution Sites


    OFFICIAL DISLAIMER...

    All information in PHANTASY is from USER contributed material
    The Publishers and Editors of PHANTASY and THE IIRG disclaim
    any liability from any damages of any type that reader or
    user of information contained within this newsletter may encounter
    from the use of said information.

    PHANTASY is (C) 1990 by The IIRG
    IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982

    
    Editors Note- PHANTASY is a Free-world Publication
                          Distribute Freely

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section One:    The International Information Reteival Guild 
                        Meets the FBI (Part Two)

   To Clarify a few things,Let us just state we're reporting on how this
 informal gathering took place. We in NO-Way trusted this agent or
 took anything he said seriously. Several of us are former military service
 members and know the Governments Policy of DISINFORMATION.
   We're just reporting on what took place at this meeting and nothing
 more. We believe that this Agents comments should be taken for there
 entertainment value only and nothing more.

 Now on with Part II...

 FBI AGENT-I guess a senator Ribicoff back in 1979,he had the foresight to
           institute the proposed legislation in that area.
           It took them from 1979 to 1984 to finally get the bill passed,and
           out of our office there's only been two prosecutions since 1984.
           and you look at some of the reasons why and one of the biggest
           ones would be they don't want to report it. A bank doesn't want
           to report they have someone in there computer fooling around with
           all there accounts. They don't want to let people know that
           basically there money is unsafe and that at any moment there
           accounts can be all fouled up,Which usually there fouled up
           nine out of Ten times anyway.

 Anonymous-It takes a while for people to realize things are being
           manipulated, I'm a computer operator and if somebody was logging
           onto our system illegally it would be hard to find out until
           after a while.

 FBI AGENT-Thats why I alluded to the beginning,with a lot of cases it takes
           so long to figure out whats going on and then it takes even longer
           to identify the problem.
           I know in Federal Court its called the Counterfeit Access Device
           and Computer Fraud Act, thats based on illegal or unauthorized
           access to a computer that in itself is a crime because getting
           into one of the computers that has the protected items such as
           Natinal Defense,(anything along those lines) so the mere 
           accessing of those is a Federal Crime.
           The other ones go beyond that, You have to obtain information
           and you have to make a fianancial gain.
           Then the penalties are accordingly, the one regarding the Defense
           Systems and things like that carries up to a Ten year imprisonment
           and up to a Fifty Thousand Dollar Fine.
           The ones where you make a fianancial gain, your penalty is as much
           up to twice the gain you made plus up to Twenty years in Jail.
           So everything depends on whats been obtained.

           The third aspect of the crime that I guess is a watered down
           version of what Senator Ribicoff had proposed has to do with
           getting in a computer and destroying or changing different files.
           That carries with it up to a Ten year imprisonment and up to
           twice as much as the damage you caused or fianancial gain as 
           your fine.
           Then all three of those have the Conspiracy Statute thats
           attached to them where more than three people have to actually
           take part in the Conspiracy. That crime,I mean that Statute
           seems to be pretty significant.
           Like I said, Who do you have thats going to sit down all day and
           actually try to develop a case. Thats what you don't have in Law
           Enforcement right now, You don't have anyone that specifically
           looks for computer crimes, they have to be reported.
           Its not like the drug cases where you can walk right down the
           street and and find someone somewhere in the city of (DELETED)
           selling drugs. You can find that anywhere in any city.
           Its the same way as a Crime Patrol Police Officer can go
           around and find someone breaking into cars, nobody is going to
           be able to sit there and right now and justify there existence
           what would be computer crimes.
           What it takes I guess is one hand washing the other,the people
           whose computers are being accessed have got to want to come
           forward,and have to want to provide the help after they do.
           Now do I have any questions?

Knighthack- What about prosecuting Computer Piracy Violations,have there
            been any.

FBI AGENT- As towards illegaly copying software,No. They seem to be more
           concerned with theft of computer services.
           Now as far as the state level I know we've had none in our
           offices.

Anonymous- What do you mean By theft of Computer Services?

Mercenary- He means hacking into Compuserve or another pay for access
           service or using Government computers with a valid users 
           Id and password.

Old Timer-Like the young guy in California who was tying up the
          DOD's Sattelite system and bouncing his signal to Europe

FBI AGENT-Well let me ask you.. How safe do you feel our computer systems 
          are?

Knighthack- If its got a modem attached to it and its online its unsafe.

Mercenary- But of course, None of us here would do that now, Right Guys?

Whole room- Laughter

FBI AGENT-Tell me more about that California case, How did he get into
          the Department of Defense's System?

Old Timer-Apparently he hacked into the system and was an experienced
          sattelite person and figured out how to get into there
          operating system, he's serving time now It wasn't too
          publicized.

FBI AGENT- Well like I said we don't find out too much up here ourselves
           we have to watch CNN.

           
  At this Point the meeting broke into small individual talking groups
  and we departed before everyone else. We do have some documents that 
  were distributed and will be presenting those later in Upcoming issues.
  This was a meeting of a local Users group in which we were invited
  to attend by there president and would thank him here.
  Any Anonymous comments were made by a Local User and we didn't catch
  his name.

Section Two:    Hacker Information and Where to Obtain It.


    One of the most frequently asked questions the IIRG receives from the
 multitude of new day Hackers and Phreaks is where do I obtain information
 on phreaking and hacking.
    Now I don't want to get into a psychological debate on what a new day
 hacker is,but lets for safetys sake say its a kid who just got a modem
 and happened to grab a copy of Phantasy off of a bulletin board or had
 obtained another hack/phreak electronic newsletter.
    Ok,they've taken that first plunge and its wetted there appetites for
 more information. Now they run down to there local pc-mart and look
 through its racks of books and magazines and the few articles they did manage
 to find portray a hacker as a budding Charlie Manson behind a keyboard.
    Well the IIRG has had enough of these portrayals by the media and
 we've decided to assign Section 2 of every upcoming Phantasy as a brief
 article on where to obtain information for novices or the curious.
    The very first step of a curious novice would be to obtain a private mail
 box,preferably NOT a Post Office Box. There are plenty of private mail 
 services springing up and finding one close to your home should be no
 problem. These addresses are usually called Suites or just use a number.
    The price range on these boxes is usually 6 to 9 dollars a month
 and can be easily afforded even by a teenager. I said preferably NOT a
 post office box for two simple reasons, One,I distrust any government agency
 and find they cooperate very easily when they want to. And Two, if you do
 receive more "covert" mail its just a good idea not to be involed with
 any branch of the government.
    Ok,now that you've run out and gotten a mailbox you say "Well now what
 the Hell do I do with it?", Well thats a good question and an easily
 answered one,you fill it up son!
    Now the very first thing we suggest is laying aside some serious cash
 or hitting up the slush fund for your expenses. Because expenditures for
 hacking information aren't cheap and especially figuring this after what
 you've probably spent on your equipment.
    We're not saying that all these books or equipment are needed
 for your library,there just nice to have around.

  We advise sending for these Books:

     1. Defending Secrets,Sharing Data: New locks and Keys for Electronic
        Information    GPO Stock Number:052-003-01083-6
          Last Known Price:$8.50
          Available From:

                Superintendent of Documents
                Government Printing Office
                Washington,DC 20402-9325

     2. Get the Privacy Catalog from Eden Press
        They've got too many titles to list,
        but some of the best we like are:

        Privacy:How to get it,How to Enjoy it. #400  $18.95
        Are you now or have you ever been in the FBI Files? #403  $12.95
        Electronic Record Systems and Individual Privacy #614 $14.95
        Telephone Security #652  $9.95
        Telephone Debugging #653 $15.95
        A Study of Telephone Records #630  $19.95

        Call 1-800-338-8484 for there catalog.

     3. A liitle old, its from 1985 but still a nice book to read
                THE COMPUTER UNDERGROUND by M. Harry
                   Order #L40036   Price-$14.95
          This book is available from several sources and
          the order number given here is from ANVIL Publishing.
          There Catalog is HUGE!!,get a copy call 1-915-755-2665

     4. CRB Research sells the Computer Underground as well as many
        other worthwhile titles,but definitly grab.

           The Hackers Handbook   Cat# HACK     $12.95
         
          Order there catalog for $1.00
 
                        CRB Research Books
                        P.O. Box 56
                        Commack,NY. 11725

 Well That should cover the basics,like I said some of the catalogs you'll
 go crazy over,theres always something for everyone in them.
 But now onto more books and magazines,

  Go down to your local book store and look these titles up,or have them
  order them for you..

     1. Old but good reading- Out of the Inner Circle by Bill Landreth
                               1985 by Microsoft Press $9.95

     2. Hackers by Steve Levy- A good guide for the Ethics of a hacker..
        Dell Publishing Company 1984 $4.50

     3. The Cuckoos Egg by Clifford Stoll
        Originally out in hardback at $19.95,but at the time of the
        editing of this article its now in the stores on paperback
        (Story of the Hannover Hacker and his ultimate downfall)

     4. Definitly and an absolute must,Subscribe to:

           2600:The Hackers Quarterly
           Call (516)-751-2600,or FAX line (516)-751-2608

   There are many more worthwhile books and magazines that could be listed
 on and on, But we feel these selections will present to you a good
 broad range of topics and interests. Some other worthy footnotes would be
 to look up Consumertronics,they offer a large but expensive listing of
 hacker/phreaker related material,(ED NOTE-Call (505)-434-0234) and to
 find a bbs that has a large selection of Hacker Text files such as
 PHANTASY,PHRACK,CUD,ATI etc. The IIRG's BBS along with many others offer
 these files and finding them is no real difficulty.
  This should drain your checkbook effectively for a while,or at least till
 next months article on what is useful and noteworth on your newly obtained
 hacker library.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 Section 3: High Explosives for Fun and Profit!
            By:(Name withheld by Request)

 EDITORS NOTE:The Procedures discussed in this article are
              extremely dangerous. Therefore,the Author and
              publisher (The IIRG) disclaim any liability
              from any damages or injuries of any type that the
              reader or user of information contained within
              this article may encounter from the use of said
              information. This article is intended for
              entertainment purposes only!

   Since Hacking is truly a state of mind and a Hacker can branch his
 talents into many fields,I present this article to you on the God given
 rights of this country and my constitutional right of Freedom of speech.
   Ever since a lazy summer day in the Maine backwoods,spent blowing off
 fireworks with my father and uncle,I've had a true love for explosives
 of almost any type. A six year stint in the Marines only further
 encouraged this love of noise.
    What I present here to you are some well known formulas with
 a sprinkle of my own modifications.
    This first formula will allow you to concoct roughly the equivalent
 of dynamite,not a military grade explosive but a great fishing bait!

  First obtain some Potassium Chlorate, a rather cheap and easy to
  acquire chemical usually obtainable at any chmeical distributor.
  If they ask you what you need it for,do what I do and claim your
  picking it up for your company and have no idea,the boss just sent
  you to get it. I have this routine down pat and even stick around
  with the owner of the warehouse and have coffee. If they really
  are curious claim its for Hydroponics experiments.

  Now take the KC1O3 (Potassium Chlorate) and grind it into a fine powder
 almost the rough equivalent of flour or talcum powder. This is a must!

  Carefully measure 5 level teaspoons of Vaseline and place in a plastic
 bowl with 5 level teaspoons of beeswax. Then pour 1/3 of a cup of white
 gas (Coleman liquid fuel) and dissolve the wax and vaseline mixture.

  Now take 90 premeasured level teaspoons of powdered KC1O3 and hand knead
 it into the bowl and form into blocks as the mixture hardens or place in
 cardboard rolls (towel or toilet paper) and seal with wax.

  Your explosive is now done but requires a blasting cap to set it off
 and since these are almost impossible to obtain legally,here a do it 
 yourself cap.

  Get some .25 ID (inner diameter) aluminum tubing at the old
  hardware store

  get some hexamine tablets down at the old military surplus shop
  and grind into a fine powder like the above KC1O3

  Take 2 1/2 tablespoons of crushed hexamine and mix with 4 1/2 tablespoons
  of Citric acid (available at most grocery stores) in a glass jar
  mix well with stirring rod and add 1 tablespoon of 20-30% peroxide
  and place jar in a cool spot for 12 hours
  Run mixture through a coffee filter,pour rubbing alcohol over mix in filter
  (four or five spoons worth),to clean mix.
  Let powder dry on towel and prepare tube,

   Crimp one end of tube ( 3 1/2 inces long total)
   fill tube with powder and place very thin wire into mix in tube
   or a model rocket igniter,seal with glue and allow to dry.

  Ok,take your homemade cap,place into your main charge and run
  about 50 feet of wire from fuse to a 12 volt battery
  When its all clear hook up your juice (Voltage) and kiss that
  charge goodbye.
  Some of my favorites are blasting for fish,make sure charge is totally
  watertight in this case or blasting out old stumps.
  JUST BE CAREFUL,The CAPS are EXTREMELY SHOCK SENSITIVE and are
  powerful enough to blow your hand off.

  Have Phun,and be careful. I had a blast for sure!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section 3: The I.I.R.G. Attends the 8th Annual Connecticut
                   Computer and Electronics Show
                            By:Mercenary


  On November 7th the I.I.R.G. Attended the 8th Ct. CES show,
 The show seemed to be smaller than last year but the IIRG picked through
 the venders booths with the zeal of drowning men looking for a life preserver.
  Vagabond spent a large portion of his time dealing with a SNET 
 represenative discussing the workings of the CONN-NET system but was
 able to get some valuable information from some other venders as well
 which we'll present in this article. 
  Knighthack seemed to have a good laugh when the Prodigy demonstraters
 couldn't seem to get on the system. (P.S.-He had to show em how)
  Myself,well I sat through the Intro to Lans Seminar and the Wiring
 your Network Seminar but couldn't take any more after that.
  Heres what we were able to dig up at the show though,

 1. Intergrated Services Digital Network Applications in the
                         Army Environment

    It seems that the U.S. army is trying to develop specific end user
 applications which solely depend upon the ISDN technologies of the Army.
    The ARMY has identitfied the ISDN as part of the communications
 archetectures of the future. Extensive field trials of ISDN have been
 conducted to demonstrate the potential benefits of such technology.
    But the limited number of user applications has prevented the
 full realization of such services.


 2. It seems the NAVY is concentrating on Computer Security Problems in
   a BIG way. We saw 8 specific Computer Security projects laid out for
   developers.

      2A-High Assurance Trusted Systems-Seems there investigating
         new approches for achieving high assurance for trusted systems
         that accomadate innovative designs.
      2B-Characteristics of Processing Elements with Respect to
         Multilevel Security.
      2C-Security Features for Work-Stations-seems they want better
         techniques.
      2D-Technology to Establish and Support the Role of Man in
         Computer Security Systems.
      2E-Expert System for Multilevel Security.
      2F-The Inference Problem in Multilevel Secure database Management
         systems.
      2G-Placement of Network Security Services for Secure Data Exchange
      2H-Composibility Constraints Of Multilevel Secure Systems


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 IIRG Disclaimer-All the above information was PUBLIC DOMAIN information
     placed in open View for the PUBLIC at the 8th Annual CES Show.
     and in no way compromises any agency or vendor as these are
     open contracts for proposed Equipment placed on the open
     FREE market for Bidding.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section 4: Hacker News and Interesting Footnotes
              (More Info obtained at show)
                       By:Vagabond


MIT'S ATHENA TECHNOLOGY

MAYNARD, Mass."Athena," the innovative
computing environment developed at the Massachusetts Institute of
Technology (MIT), will be up and running at two new campuses this
winter.

North Carolina State University (NCSU) and Iowa State University
(ISU) signed contracts totaling $7 million with Digital
Equipment Corporation to install the Athena systems software and
link together hundreds of Digital workstations.

On each campus, the result will be a large-scale, high-
performance network designed to support students, faculty, and
researchers using UNIX based systems.

"Athena offers a new model for managing large numbers of workstations
in a network," said Barry Braunstein, Digital manager of Research
and Science/Engineering Solutions in the Education Market.
"Computing resources are centrally managed and highly accessible
to users completely location independent. Users can walk up to
any workstation on the network and log on, and access the same
files, software, and electronic mail."

Athena software services developed at MIT are freely redistributable.
Digital is offering support in planning, installation, and staff
training to universities who want to adopt the system.

At Iowa State, the Athena environment will include users from
engineering, the sciences, and a variety of other disciplines.  "The
initial focus of the project is to stimulate high-quality research
by putting powerful tools into the hands of our faculty and graduate
students," said George Strawn, Director of Iowa State's Computation
Center.
                                                                   
Strawn said that researchers will benefit from speed and
power of workstations, and from the 'visualization' of research
data, which is made possible by computer graphics, things not
previously available in their existing computing environment.

The network will also make it easier to connect to off-campus
resources such as the National Science Foundation's supercomputers.

At North Carolina State University, the network's primary
function is to support engineering education.

"In the `real world,' computers are an integral part of engineering,"
said William Willis, Director of Engineering Computing Operations.
"Yet there's no consistent exposure to computers in the
undergraduate curriculum. Our goal is to ensure that a new
generation of students is comfortable using these modern tools."

This fall, only freshmen engineering students will use the
Athena environment.  Over time, all engineering students will use
the workstations for design projects, simulation and modeling,
sharing data, writing papers, and solving homework problems.

Braunstein explained that Project Athena resolved many
technical problems that had made it expensive and technically
difficult to manage UNIX workstations in a network.  Two key areas
were system security and the cost of network management.

"Athena's `Kerberos' network authentication system ensures a
very high level of security," said Braunstein. "And the automated
`Moira' Service Management System makes it possible to deploy a
large number of workstations in a cost-effective way, using a
client-server model, under central management.

"Cost-conscious institutions can support a large-scale
environment with a relatively small staff. For example, MIT runs an
installation of 1,000-plus workstations with a staff of six people
in hardware operations and systems administration"

Both NCSU and ISU had similar reasons for choosing to work with
Digital.  Strawn explained, "Iowa State has a long relationship with
Digital, dating back to the 1960s. For this project, Digital
workstations offered excellent price/performance, and Digital's
proposal was the most innovative in terms of the Athena software."

Dr. Willis said, "In implementing the Athena technology, NCSU
was really looking for a partner. We reviewed three excellent
proposals. But Digital had much more experience with Athena and
has much stronger educational programs."
                
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DECstation is a trademark of Digital Equipment Corporation.

UNIX is a registered trademark of American Telephone & Telegraph Co.

Project Athena, Kerberos Authentication Service and Moira Service
Management System are registered trademarks of Massachusetts
Institute of Technology.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 A STEALTH MODEM

  No,we've not been staring at the CRT too long,it seems that the
 Air Force is trying to develop a Tactical Modem for Stealth Communications.
  The Trend towards intelligent jamming mandates demands that future tactical
 communications systems possess Electronic Counter-countermausures (ECCM)
 responsive formats. A modem processing modular architechture is needed
 that supports up to 50 MHz input sampling rate while providing the needed
 adaptive processing. It must be an adaptive modem that can receive signals
 corrupted by real world interference. 

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 Section 5: Phantasy Distribution Sites

 Phantasy's Distributions Site's have changed,we apologize if you called a
 board and didn't find the Mag. But were organized a little better now and
 these will be the permanent sites as long as these systems are up and
 operating.

  1. IIRG Headquarters- The Rune Stone BBS - 1200/2400 Baud 24 Hours
     Call for the Earliest possible releases of Phantasy and other
     IIRG files. Our system will be going private so call Now while
     you still can, at (203) 485-0088.

  2. Lightning Systems- 24 hours - at (414) 363-4282

  3. Sycamore Elite- 24 Hours - at (815) 895-5573

  4. TAP BBS at (502) 499-8933

 To get PHANTASY by mail on a 1.2 meg or 360K floppy mail the following
 to this address:

               Mail 12 Disks and $5.00 in stamps to

               The I.I.R.G.
               862 Farmington Ave
               Suite-306
               Bristol,Ct. 06010

               Specify Format of Disk Please!
    We will include any of the IIRG's releases for that month on disk
                    (Space Permitting) 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                        END THIS ISSUE OF PHANTASY
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
(C)IIRG 1990
May Odin Guide Yor Way!