💾 Archived View for gemini.spam.works › mirrors › textfiles › messages › crazy captured on 2023-01-29 at 09:33:44.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

- - - - - - - Begin message from: NBaheti.es@Xerox.COM
Return-Path: <@SIMTEL20.ARPA:NBaheti.es@Xerox.COM>
Received: from SIMTEL20.ARPA by MARLBORO.DEC.COM with TCP; Sun 23 Mar 86 15:19:4
1-EST
Received: from Xerox.COM by SIMTEL20.ARPA with TCP; Sun 23 Mar 86 13:19:00-MST
Received: from Catawba.ms by ArpaGateway.ms ; 23 MAR 86 12:18:40 PST
From: NBaheti.es@Xerox.COM
Date: 23 Mar 86 15:18:37 EST
Subject: Crazy Users - READ THIS
To: RCPM-SYSOPS@Simtel20.ARPA,RCPMSYSOPS@Simtel20.ARPA
cc: NBaheti.es@Xerox.COM
Message-ID: <860323-121840-2300@Xerox>

The following file was uploaded to my system under the name of
BADUSER.TXT. The only thig is that the SysOps NAME isnot included
in the file anywhere. Please pass this around and beware...

--Arun Baheti
  NBaheti.es@Xerox.COM
--------------------------------------------------cut here
   Date: 27-NOV-85 and afterwards
e
     To: All Fido Sysops
Subject: Improper use of Fido and life threats


   Fellow Sysops:

     I had a user sign on and deposit a bomb. Fortunatly
it was de-fused by me prior to it going off. It is an IBM
BASICA program and will not run properly on the Rainbow
anyway.

     The user used the following alias:

              Name : Harry Blackstone
              City : New York, NY
          Password : Magic
   
     He logged on to 102/110 on 17-NOV-85 at 3:55pm. The
program he deposited is called FUTR2.BAS. It attempts to
kill all files on A, B, C, & D drives. It is poorly
written, as though by a 6th grader. It is easy to spot. It
is about 2600 bytes long. Be aware of this user's name and
password. Spread this message around. Keep a log of where
and when you've seen him and his actions.

     About one month later, on 19-DEC-85, he came back. He
saw a little note I had posted in my Free Message Area
about him and his program. He also noticed that I had
twitted him. He came back under the name of 'Blackstone
Harry'. He had info about a home I own and people that
is on file at the County Clerk's Office and free for all to
see. He said he was going to put a bullet into a relative's
head, and rape and sodimize another relative. Neither
relatives are alive today as they both passed away about 6
months ago. The house mentioned is not occupied by me but by
tennants. However the threat was REAL. The police have a
file on him. Other users have reported to me that they have
seen him. The FBI knows about and has a file on him. The
phone company knows about him. The FBI and the phone company
offered to set line traps for him. I accepted the offer.

     One week later, he left messages containing Visa and
American Express card numbers on them. These were turned
over to the authoritys. He claimed to have broken into a
VAX 8600 and was trying to 'crash' it. Good luck. The FBI
was involved because interstate crime may have been
comitted. They since suspect that he is operating out of
the Los Angeles Area or has contacts here. In exchange for
phone line trapping I have agreed to prosecute him to the
fullest extent of the law if captured. He wants to use the
name Harry Blackstone. He gets upset if he cannot use it.
Please report any contact with him to either this Fido or
preferrably the FBI. I am all for a good joke, and it is
true that no harm was done so far by his program or him.
But threats like he made (if it is a 'he') cannot be
tolerated. Passing Visa card numbers around puts our Fidos
in jepordy as well. We are to a certian degree responsible
for whats on our boards.

     A short time afterwards, he called my voice number and
posed as a beneficiary to a good cause. He wanted to come
collect a donation. The only donation he gets from me is Pb
in capsule form. It should be mentioned that he has called
at least one other local Fido here and made the same public
threat to me on that system.

     One thing this proves is that as Sysops we all have to
be careful with other's uploads. Check everything, as I do.
Sometimes a machine language program will get through so
check these extremely carefully. The program STRING.COM 
available everywhere will assist you in doing this.

     If you are on any board and see Public Messages from
him before I do, please inform me immediatly. Ignore the
messages. If he causes you trouble, do as I did and call the
police, FBI and telephone company. You will be surprised as
I was to see that these people are very helpfull. Computer
crime is easy to trace if you have a log as we do and keep
your evidence updated. I will let everyone know how this
turns out, and ignore it if he never calls again and makes
no more threats. As for now, I keep my S & W loaded and
ready for use. The police agree with this concept. I will
not hesitate to use it if he finds my newer address and
comes here. My house is overlooked by 6 others higher than
it, and all neighbors are in tune to this message.

     Good luck in catching this nerd on your system!
     P.S. Forgive the terrible spelling!

- - - - - - - End forwarded message
   --------