💾 Archived View for spam.works › mirrors › textfiles › phreak › ctelec4.txt captured on 2023-11-14 at 11:19:04.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

Cybertek Electric: Issue #4                                           7/30/96

                ?ss es flestra ferdha f?r; en sk?lpr es sverdha
       /  |\      /|     /|\     |\      |\      /|  |-\       \       /
      /   | \    / |    / | \    | \     | \    / |  |  \       \     /
     /    |  \  /  |   /  |  \   |  \    |  \  /  |  |   >    /  \   /
    /     |   \/   |  /   |   \  |  /    |   \/   |  |  /    /   /  /
    \     |        |      |      | <     |        |  |  \   /   /   \
     \    |        |      |      |  \    |        |  |   >  \  /     \
      \   |        |      |      |   \   |        |  |  /    \        \
       \  |        |      |      |    \  |        |  |-/      \        \
 I know a fifteenth, which Thiodhroerir the dwarf sang before Delling's door.
  He sang might to the Aesir, power to the elves, and understanding to Odin.

                         Cybertek Electric: Issue Four
                                 July 30, 1996
                          edited by Thomas Icom/IIRG
                   <ticom@l0pht.com> <thomas.icom@iirg.com>

              Complements of OCL/Magnitude's Project Blackthorn,
           and The International Information Retrieval Guild (IIRG)


Table of Contents
=================

  by Mujahadin

  by Chuck Hammill

  by Black IC

                                  ---/////---

                            Hacking the Human Body
                                 by Mujahadin

Many of us in the computer 'underground' are used to seeing various postings
about bugs and backdoors in various pieces of software and hardware that make
up this vast culture that we are a part of.  But how many of us know, that for
example, the human body contains many weaknesses, bugs if you will, that can
be exploited just as easily as Wu_ftp?

The reasons for this knowledge not being widely available are obvious. The
people who hold these secrets are like the master hackers who only give out
these powerful secrets to those they implicitly trust, or to those who have
shown their worth by diligent study and application of requisite materials. It
is not my purpose here to disseminate such information recklessly.  Rather it
is to impart the reader with a respect for the capabilities of the human body
and the weaknesses contained therein, and of some of the basic ways these can
be used to protect yourself against a physical attack in the most effective
way possible....you don't want your aggressor to get back up.  It NEVER pays
to be a nice guy during the escalation of a physical confrontation.  Only in
the movies do the nice guys walk away, and not have to turn around.

First some background concerning body mechanics.  The human body, whether
through evolution or divine creation, moves with circular motion on many axes
simultaneously. Next time you walk to the bathroom or to the refrigerator to
refill your beer stein, try walking rigid, like a robot would, using just
linear motion. You will see immediately that this is an UNnatural method of
movement and how uncomfortable it is and to help me prove the theory behind
this article, just how much motion is wasted by this linear activity.  It
takes a CONCERTED effort to maintain balance in this robotic movement. So now
we see the economy of motion and ease of action that the natural way our
bodies want to move gives us. Using this economy of motion and ease of action
now takes us to my next point, physically manipulating the human body in an
unnatural fashion.

While many parts of the human body are very flexible, we can say that nothing
has full 360 degree rotation, and it is in this area I will address most of
this article to.  Joint manipulation is the easiest way to start the
discussion.  The best way to describe a joint manipulation is by example.
Open your right hand exposing the palm upward. Then place the index finger
of your left hand (with the rest of the fingers tucked in) into the right
palm.  Now close your right hand around your index finger.  Rotate your
right hand around feeling the limits of movement and committing them to
memory. Open the right hand back up and put the index finger AND the middle
finger of the left hand both in the palm, closing it.  Rotate the right hand
once again sensing the difference this makes in this technique. Two fingers
are ALWAYS better than one, however, make sure that the two fingers you plan
on seizing are located next to each other on the hand.. or else you may lose
your grasp due to the difficult to grab shape this makes. One can also grab
separate fingers on an attackers same hand using both of your hands.  This
is a great technique and is called separating the bone. Try this on a friend
(or enemy), but if on a friendly victim be sure to be careful, and have the
action performed on you so you know what this feels like.

Moving to the wrist.  There are plenty of things to do with the wrists but
for the sake of clarity I wont be discussing these much because placement of
the hands is very important and since I don't have the tools at my disposal
to include photographs, then I wouldn't want anyone to feel secure with just
a text example.  But I will say this: get a friend and try out the rotational
limits of the wrist using one hand and then two.  That's as easy as I can make
it without photos and for the sake of wasted bandwidth. The elbow is a very
self-explanatory structure, limitwise.

The forearm has some rotation from the elbow due to the radial and ulna, but
this is secondary to the lack of real movement that the elbow has.  This makes
it an extremely vulnerable architecture when it does become accessible for a
technique.  This is the problem though, because the elbow tends to stay
behind the weapon that precedes it.  Namely the fist or whatever the fist is
holding. If one was truly skilled at circular motion then it would be no
problem to simply circle around an attack to make the elbow more accessible,
or avert an attack and depend on the attackers over exertion of his own
sphere of influence....his own over extension of his circular motion, which
by the way helps us make another point.

Depending on the attacker to not be in tune with his own natural motion, to be
clumsy and aloof, ignorant of how he moves, can also be a great key in
overcoming an opponent.  Sort of like a buffer overwrite.... get the attacker
to overcommit...when he/she does, then take the advantage.  If you happen to
get this far then personally I wouldn't go for the elbow at this juncture, but
for the purpose of discussion if you get in a bind and you have hold of an
arm, then pull downward violently to shake the opponent, causing a mild shock
to the back of the head where it meets the neck (this actually happens). Do
your best to take advantage in this moment of weakness by turning the arm over
placing another hand on the outside of the elbow pressuring downwards.
Experimentation with this pressure is absolutely necessary for you to feel how
this works.  Also don't place the hand too high or too low... this can cause
the attacker to fold his elbow, opening you up to a vicious counterattack with
one of the body's most powerful weapons.  Interesting that one of the bodies
weakest structures at its opposition, can become one of the strongest weapons
the body has.  As for the shoulder, just move your own shoulder around to its
extremes and you will easily see how its weaknesses can be exploited.

Continuing our discussion of the elbow from above, once the elbow is locked,
hopefully you would have enough forethought to make sure your attacker is
slightly away from you and bent over.  Take this opportunity to jam his
shoulder with plenty of force in the direction of his jaw. This is a neat
little bonus of the straight elbow lock. Also preemptive striking to the
shoulder lessens any force of an incoming blow.  This is what Bruce Lee called
a 'stop hit'.  But this takes flawless timing and is out of context for this
article.

Visiting the neck area we see several options.  The throat provides us with
much soft collapsible mass which can be accessed quite easily, as long as
speed and accuracy are on your side. A quick and powerful jab to the larynx,
either above or below, gains us some time to explore more possibilities in our
defensive posture. We can now become the offensive party if we are successful
here.  Note that also on the sides of the neck exist sternomatocollastoid
muscle structures (for exact placement of these check your Gray's Anatomy
Coloring Book) which give us ample space to access several 'pressure points'
which if manipulated (read SQUEEZED) properly will cause the brain to prompt
the body to lift up on the toes, thereby weakening any effort of your attacker
to strike with any force. I have only met one person completely immune to the
initial pain sequence produced by this technique, and it made for lots of
interesting experimentation, and unfortunately for our immune friend, lots of
bruises as well.  Also within this muscle structure are the carotid arteries.
A well placed strike to the outsides of the neck will seize the muscles up,
causing the blood supply to the brain to be shut off. Contrary to popular
belief, this is how a strike to the temples work as well. To revive from such
a strike requires massage and gentle rotation of the neck structure to return
the muscles to their previous state.

The eyes are an obvious weakness as is the nose, be it from straight on,
upwards, sideways, or even downwards.  The ears are interesting because of
the occasional airtight capabilities.  Have you ever been slapped on the
ear? The air pressure involved with that is tremendous for such a little
canal. Its no small wonder then that partial and often full deafness arises
out of such little force. There are also several pressure points located
beneath the ear which have differing effects, depending on how utilized. There
also exists on the back of the skull at the base where the vertebrae end which
when struck causes yet another shutdown of the brain due to the contraction of
muscles. Don't forget this key clue: where the head goes.... the body follows.

Moving in a downward direction we have the ribs, where nerve fibers weave
in and out between the ribcage members.  This takes practice but finding
these aren't too difficult.  There is a term where nerves are exposed to
the underside of the flesh when running between muscle bundles.  Its called
a cavity, and cavity striking is an acquired skill. Bodybuilders are known
for their extra musculature.  Obviously.  But with this muscularity comes a
nice big weakness which can be exploited by someone with little or no muscle
mass at all.....justice ;).  It seems as though with this extra muscle comes
extra cavity space...i.e., more exposed nerve fiber.  Need I say more on
this?

The floating ribs are susceptible to becoming dislodged from their location,
given the right angle of approach.  The abdominal area is naturally tense and
as well should be, unless trained in advanced deep abdominal conditioning
which has been a protected secret for centuries.  I have seen examples of this
training and it is quite impressive.  No tricks involved.  I can spot a fake
from a thousand miles away.  Real 'Iron Body' practitioners can be struck with
a variety of implements using full force with no damage done.  All this is
done with complete relaxation of the abdominal muscle wall.  But there is a
flaw in even the tensing of the abdominal area.  The muscles that make up this
area are primarily weaved in a direction that naturally opposes force from the
front.  If we introduce a spirryllic action slightly downwards to this mass
then we have exploited the weakness in the weave.

The groin structure is really self explanatory, save for the few fanatical
practitioners of several martial arts who practice for hours a technique
where the testicles are drawn up inside the scrotum.  But these guys are a
dead giveaway, wherein they must stand in a particular posture for this to
happen, exposing other areas to vulnerability.

On the sides and slightly to the back of the thigh belong the sciatic nerves.
Repeated strikes to this area will definitely cause weakness in the legs, and
eventually an inability to stand straight without wavering. The knees, when a
person is standing straight up, are extremely vulnerable to being sheared
downward or to the side... this is very violent and should only be used in a
VERY life threatening situation. When slightly flexed then the knees are
vulnerable from the sides and back. Actually, the knees are ALWAYS weak from
the sides. There exist many pressure points on the thigh, shin and arch of the
foot that I will not address, as these require pinpoint accuracy to administer
to and this is beyond the scope of this treatment, however I will say that I
heard a story of a Special Forces Sergeant who, after being injured in Vietnam
had to walk with a cane, became so adept with the cane that in a particular
barfight all he had to do to subdue his attacker was stomp the cane down on
the arch of the foot, thereby disrupting the intricate pattern of bone and
ligament causing separation of said bone and ligament many times over.
Needless to say, with ZEN-like simplicity, the altercation was over before it
started. With this in mind, when in a bear hug type situation, never fail to
stomp down on the arch of the foot, unless you are suspended in the air.  Then
it is a simple matter of using your head to make your point, while kicking at
the knees or shins.

There are many more areas to address here and I have selectively left much out
because of the damaging nature of the techniques.  I didn't pay too much
attention to the circular nature of the body in the offensive posture because
this is very advanced thought. To sum up this circular theory, think of
spinning a yo-yo around in a circle while the string is fully unwraped from
the axle....  what makes it spin faster?? what opposing forces are involved
here?? and where is the actual fulcrumatic action??  These are clues that if
experimented with to even a slight degree, will give the reader a great
understanding as to how a greater amount of force can be generated by using
the natural endowments of the body.

Greets to the guys in VLAD, GHeap, DrHavoc, prophet, Special Forces then,
now, and forever, and to Thomas Icom.
Mujahadin - the real Desert Storm.

                                     -///-

          FROM CROSSBOWS TO CRYPTOGRAPHY:  TECHNO-THWARTING THE STATE
                               by Chuck Hammill
                              weaponsrus@aol.com

           Given at the Future of Freedom Conference, November 1987
                Public Domain:  Duplicate and Distribute Freely

               You   know,   technology--and   particularly   computer
          technology--has often gotten a bad rap in  Libertarian  cir-
          cles.  We tend to think of Orwell's 1984, or Terry Gilliam's
          Brazil,  or  the  proximity  detectors keeping East Berlin's
          slave/citizens on their own side of the border, or  the  so-
          phisticated  bugging  devices  Nixon used to harass those on
          his "enemies list."  Or, we recognize that for the price  of
          a  ticket  on  the Concorde we can fly at twice the speed of
          sound, but only if we first walk thru a magnetometer run  by
          a  government  policeman, and permit him to paw thru our be-
          longings if it beeps.

               But I think that mind-set is a mistake.   Before  there
          were cattle prods, governments tortured their prisoners with
          clubs  and  rubber  hoses.    Before  there  were lasers for
          eavesdropping, governments used binoculars and  lip-readers.
          Though  government certainly uses technology to oppress, the
          evil lies not in the tools but in the wielder of the tools.

               In fact, technology represents one of the most  promis-
          ing  avenues  available  for  re-capturing our freedoms from
          those who have stolen them.  By its very nature,  it  favors
          the  bright  (who can put it to use) over the dull (who can-
          not).  It favors the adaptable (who are  quick  to  see  the
          merit  of  the  new(  over  the sluggish (who cling to time-
          tested ways).  And what two better words are  there  to  de-
          scribe government bureaucracy than "dull" and "sluggish"?

               One  of  the  clearest,  classic triumphs of technology
          over tyranny I see is  the  invention  of  the  man-portable
          crossbow.   With it, an untrained peasant could now reliably
          and lethally engage a target out to  fifty  meters--even  if
          that  target  were  a mounted, chain-mailed knight.  (Unlike
          the longbow, which, admittedly was more powerful, and  could
          get  off  more shots per unit time, the crossbow required no
          formal training to utilize.   Whereas the  longbow  required
          elaborate  visual,  tactile  and kinesthetic coordination to
          achieve any degree of accuracy, the wielder  of  a  crossbow
          could simply put the weapon to his shoulder, sight along the
          arrow  itself, and be reasonably assured of hitting his tar-
          get.)

               Moreover, since just about  the  only  mounted  knights
          likely  to  visit  your  average peasant would be government
          soldiers and tax collectors, the utility of the  device  was
          plain:    With it, the common rabble could defend themselves
          not only against one another, but against their governmental
          masters.   It was the  medieval  equivalent  of  the  armor-
          piercing  bullet,  and, consequently, kings and priests (the
          medieval equivalent of a  Bureau  of  Alcohol,  Tobacco  and
          Crossbows)  threatened  death  and  excommunication, respec-
          tively, for its unlawful possession.

               Looking at later developments, we  see  how  technology
          like  the  firearm--particularly the repeating rifle and the
          handgun, later followed by the Gatling gun and more advanced
          machine guns--radically altered the balance of interpersonal
          and inter-group power.  Not without reason was the Colt  .45
          called "the equalizer."  A frail dance-hall hostess with one
          in  her  possession  was  now  fully able to protect herself
          against the brawniest roughneck in any saloon.    Advertise-
          ments  for  the period also reflect the merchandising of the
          repeating cartridge  rifle  by  declaring  that  "a  man  on
          horseback,  armed with one of these rifles, simply cannot be
          captured."  And, as long as his captors  were  relying  upon
          flintlocks  or  single-shot rifles, the quote is doubtless a
          true one.

               Updating now to  the  present,  the  public-key  cipher
          (with  a  personal  computer to run it) represents an equiv-
          alent quantum leap--in a defensive weapon.    Not  only  can
          such  a technique be used to protect sensitive data in one's
          own possession, but it can also permit two strangers to  ex-
          change   information   over   an   insecure   communications
          channel--a  wiretapped   phone   line,   for   example,   or
          skywriting, for that matter)--without ever having previously
          met  to  exchange cipher keys.   With a thousand-dollar com-
          puter, you can create a cipher that  a  multi-megabuck  CRAY
          X-MP  can't  crack in a year.  Within a few years, it should
          be economically feasible to similarly encrypt voice communi-
          cations; soon after that, full-color digitized video images.
          Technology will not only have made wiretapping obsolete,  it
          will  have  totally demolished government's control over in-
          formation transfer.

               I'd like to take just a moment to sketch the  mathemat-
          ics  which makes this principle possible.  This algorithm is
          called the RSA algorithm, after Rivest, Shamir, and  Adleman
          who  jointly created it.  Its security derives from the fact
          that, if a very large number is  the  product  of  two  very
          large  primes,  then it is extremely difficult to obtain the
          two prime factors from analysis  of  their  product.    "Ex-
          tremely"  in  the  sense that if primes  p  and  q  have 100
          digits apiece, then their 200-digit product cannot  in  gen-
          eral be factored in less than 100 years by the most powerful
          computer now in existence.

               The  "public" part of the key consists of (1) the prod-
          uct  pq  of the two large primes p and q, and (2)  one  fac-
          tor,  call it  x  , of the product  xy  where  xy = {(p-1) *
          (q-1) + 1}.  The "private" part of the key consists  of  the
          other factor  y.

               Each  block of the text to be encrypted is first turned
          into an integer--either by using ASCII,  or  even  a  simple
          A=01,  B=02,  C=03, ... , Z=26 representation.  This integer
          is then raised to the power  x (modulo pq) and the resulting
          integer is then sent as the encrypted message.  The receiver
          decrypts by taking this integer to the  (secret)  power    y
          (modulo  pq).  It can be shown that this process will always
          yield the original number started with.

               What makes this a groundbreaking development,  and  why
          it  is  called  "public-key"  cryptography,"  is  that I can
          openly publish the product  pq and the number   x   ,  while
          keeping  secret  the number  y  --so that anyone can send me
          an encrypted message, namely
                               x
                             a    (mod pq)  ,
          but only I can recover the original message  a  , by  taking
          what  they  send, raising it to the power  y  and taking the
          result (mod pq).  The risky step (meeting to exchange cipher
          keys) has been eliminated.  So people who may not even trust
          each other enough to want to meet, may  still  reliably  ex-
          change  encrypted  messages--each  party having selected and
          disseminated his own  pq  and his  x  ,   while  maintaining
          the secrecy of his own  y  .

               Another benefit of this scheme is the notion of a "dig-
          ital signature," to enable one to authenticate the source of
          a given message.  Normally, if I want to send you a message,
          I raise my plaintext  a  to your x and take the result  (mod
          your pq)  and send that.

              However,  if in my message, I take the plaintext  a and
          raise it to my (secret) power  y  , take the result  (mod my
          pq), then raise that result to your x   (mod  your  pq)  and
          send this, then even after you have normally "decrypted" the
          message,  it  will still look like garbage.  However, if you
          then raise it to my public power x   , and take  the  result
          (mod  my public pq  ), so you will not only recover the ori-
          ginal plaintext message, but you will know that no one but I
          could have sent it to you (since no one else knows my secret
          y  ).

               And these are the very concerns by the way that are to-
          day tormenting the Soviet Union about the whole question  of
          personal  computers.    On the one hand, they recognize that
          American schoolchildren are right now growing up  with  com-
          puters  as commonplace as sliderules used to be--more so, in
          fact, because there are things computers can do  which  will
          interest  (and instruct) 3- and 4-year-olds.  And it is pre-
          cisely these students who one generation hence will be going
          head-to-head against their Soviet  counterparts.    For  the
          Soviets  to  hold  back might be a suicidal as continuing to
          teach swordsmanship  while  your  adversaries  are  learning
          ballistics.    On  the  other hand, whatever else a personal
          computer may be, it is also an exquisitely efficient copying
          machine--a floppy disk will hold upwards of 50,000 words  of
          text,  and  can  be  copied in a couple of minutes.  If this
          weren't threatening enough, the computer that  performs  the
          copy  can also encrypt the data in a fashion that is all but
          unbreakable.  Remember that in Soviet society  publicly  ac-
          cessible  Xerox  machines are unknown.   (The relatively few
          copying machines in existence  are  controlled  more  inten-
          sively than machine guns are in the United States.)

               Now  the  "conservative" position is that we should not
          sell these computers to the Soviets, because they could  use
          them  in weapons systems.  The "liberal" position is that we
          should sell them, in  the  interests  of  mutual  trade  and
          cooperation--and  anyway,  if  we don't make the sale, there
          will certainly be some other nation willing to.

               For my part, I'm ready to suggest that the  Libertarian
          position should be to give them to the Soviets for free, and
          if  necessary, make them take them . . . and if that doesn't
          work load up an SR-71  Blackbird  and  air  drop  them  over
          Moscow in the middle of the night.  Paid for by private sub-
          scription, of course, not taxation . . . I confess that this
          is not a position that has gained much support among members
          of  the conventional left-right political spectrum, but, af-
          ter all, in the words of one of Illuminatus's characters, we
          are political non-Euclideans:   The shortest distance  to  a
          particular  goal may not look anything like what most people
          would consider a "straight line."    Taking  a  long  enough
          world-view,  it is arguable that breaking the Soviet govern-
          ment monopoly on information transfer could better  lead  to
          the enfeeblement and, indeed, to the ultimate dissolution of
          the Soviet empire than would the production of another dozen
          missiles aimed at Moscow.

               But  there's  the rub:  A "long enough" world view does
          suggest that the evil, the oppressive, the coercive and  the
          simply  stupid  will "get what they deserve," but what's not
          immediately clear is how the rest of  us  can  escape  being
          killed, enslaved, or pauperized in the process.

              When  the  liberals and other collectivists began to at-
          tack freedom, they possessed a reasonably  stable,  healthy,
          functioning economy, and almost unlimited time to proceed to
          hamstring   and   dismantle  it.    A  policy  of  political
          gradualism was at least  conceivable.    But  now,  we  have
          patchwork  crazy-quilt  economy held together by baling wire
          and spit.  The state not only taxes us to  "feed  the  poor"
          while also inducing farmers to slaughter milk cows and drive
          up food prices--it then simultaneously turns around and sub-
          sidizes research into agricultural chemicals designed to in-
          crease  yields of milk from the cows left alive.  Or witness
          the fact that a decline in the price of oil is considered as
          potentially frightening as a comparable increase a few years
          ago.  When the price went up,  we  were  told,  the  economy
          risked  collapse for for want of energy.  The price increase
          was called the "moral equivalent of war" and the Feds  swung
          into  action.    For the first time in American history, the
          speed at which you drive your car to work in the morning be-
          came an issue of Federal concern.   Now, when the  price  of
          oil  drops, again we risk problems, this time because Ameri-
          can oil companies and Third World  basket-case  nations  who
          sell  oil  may  not  be  able to ever pay their debts to our
          grossly over-extended banks.  The suggested panacea is  that
          government  should now re-raise the oil prices that OPEC has
          lowered, via a new oil tax.  Since the government is seeking
          to raise oil prices to about the same extent  as  OPEC  did,
          what  can we call this except the "moral equivalent of civil
          war--the government against its own people?"

               And, classically, in international trade, can you imag-
          ine any entity in the world except  a  government  going  to
          court  claiming  that  a  vendor  was  selling  it goods too
          cheaply and demanding not only that that naughty  vendor  be
          compelled by the court to raise its prices, but also that it
          be punished for the act of lowering them in the first place?

               So  while the statists could afford to take a couple of
          hundred years to trash our  economy  and  our  liberties--we
          certainly  cannot  count  on  having an equivalent period of
          stability in which to reclaim them.   I contend  that  there
          exists  almost  a  "black  hole"  effect in the evolution of
          nation-states just as in the evolution of stars.  Once free-
          dom contracts beyond a certain  minimum  extent,  the  state
          warps  the fabric of the political continuum about itself to
          the degree that subsequent re-emergence of  freedom  becomes
          all but impossible.  A good illustration of this can be seen
          in the area of so-called "welfare" payments.  When those who
          sup  at the public trough outnumber (and thus outvote) those
          whose taxes must replenish the trough,  then  what  possible
          choice has a democracy but to perpetuate and expand the tak-
          ing  from  the few for the unearned benefit of the many?  Go
          down to the nearest "welfare" office, find just  two  people
          on  the dole . . . and recognize that between them they form
          a voting bloc that can forever outvote you on  the  question
          of who owns your life--and the fruits of your life's labor.

               So essentially those who love liberty need an "edge" of
          some  sort  if  we're ultimately going to prevail.  We obvi-
          ously  can't  use  the  altruists'  "other-directedness"  of
          "work,  slave, suffer, sacrifice, so that next generation of
          a billion random strangers can  live  in  a  better  world."
          Recognize  that, however immoral such an appeal might be, it
          is nonetheless an extremely powerful one in today's culture.
          If you can convince  people  to  work  energetically  for  a
          "cause," caring only enough for their personal welfare so as
          to  remain  alive  enough  and  healthy  enough  to continue
          working--then you have a truly massive reservoir  of  energy
          to draw from.  Equally clearly, this is just the sort of ap-
          peal which tautologically cannot be utilized for egoistic or
          libertarian goals.  If I were to stand up before you tonight
          and say something like, "Listen, follow me as I enunciate my
          noble "cause," contribute your money to support the "cause,"
          give  up  your  free  time  to  work for the "cause," strive
          selflessly to bring it about, and then (after you  and  your
          children are dead) maybe your children's children will actu-
          ally  live under egoism"--you'd all think I'd gone mad.  And
          of course you'd be right.  Because the point I'm  trying  to
          make is that libertarianism and/or egoism will be spread if,
          when, and as, individual libertarians and/or egoists find it
          profitable and/or enjoyable to do so.    And  probably  only
          then.

               While I certainly do not disparage the concept of poli-
          tical  action, I don't believe that it is the only, nor even
          necessarily the most cost-effective path  toward  increasing
          freedom  in  our time.  Consider that, for a fraction of the
          investment in time, money and effort I might expend in  try-
          ing  to  convince  the  state to abolish wiretapping and all
          forms of censorship--I can teach every libertarian who's in-
          terested  how  to   use   cryptography   to   abolish   them
          unilaterally.

               There  is  a  maxim--a proverb--generally attributed to
          the Eskimoes, which very likely most Libertarians  have  al-
          ready  heard.    And while you likely would not quarrel with
          the saying, you might well feel that you've heard  it  often
          enough already, and that it has nothing further to teach us,
          and moreover, that maybe you're even tired of hearing it.  I
          shall therefore repeat it now:

               If you give a man a fish, the saying runs, you feed him
          for a day.  But if you teach a man how to fish, you feed him
          for a lifetime.

               Your exposure to the quote was probably in some sort of
          a  "workfare"  vs.  "welfare"  context;  namely, that if you
          genuinely wish to help someone in need, you should teach him
          how to earn his sustenance, not simply how to  beg  for  it.
          And of course this is true, if only because the next time he
          is hungry, there might not be anybody around willing or even
          able to give him a fish, whereas with the information on how
          to fish, he is completely self sufficient.

               But  I  submit  that this exhausts only the first order
          content of the quote, and if there were nothing  further  to
          glean  from  it,  I would have wasted your time by citing it
          again.  After all, it seems to have almost a crypto-altruist
          slant, as though to imply that we should structure  our  ac-
          tivities  so  as  to  maximize  the  benefits to such hungry
          beggars as we may encounter.

               But consider:

               Suppose this Eskimo doesn't know how to  fish,  but  he
          does  know  how  to hunt walruses.   You, on the other hand,
          have often gone hungry while traveling thru  walrus  country
          because  you  had  no idea how to catch the damn things, and
          they ate most of the fish you could catch.  And now  suppose
          the  two  of  you  decide to exchange information, bartering
          fishing knowledge for hunting knowledge.   Well,  the  first
          thing  to  observe  is  that  a  transaction  of  this  type
          categorically and unambiguously refutes the Marxist  premise
          that  every  trade  must  have a "winner" and a "loser;" the
          idea that if one person gains, it must necessarily be at the
          "expense" of another person who loses.  Clearly, under  this
          scenario, such is not the case.  Each party has gained some-
          thing  he  did  not have before, and neither has been dimin-
          ished in any way.  When it comes to exchange of  information
          (rather  than material objects) life is no longer a zero-sum
          game.  This is an extremely powerful notion.   The  "law  of
          diminishing   returns,"   the  "first  and  second  laws  of
          thermodynamics"--all those "laws" which constrain our possi-
          bilities in other contexts--no longer bind us!   Now  that's
          anarchy!

               Or  consider  another possibility:  Suppose this hungry
          Eskimo never learned  to  fish  because  the  ruler  of  his
          nation-state    had  decreed fishing illegal.   Because fish
          contain dangerous tiny bones, and sometimes sharp spines, he
          tells us, the state has decreed that their  consumption--and
          even  their  possession--are  too  hazardous to the people's
          health to be permitted . . . even by knowledgeable,  willing
          adults.   Perhaps it is because citizens' bodies are thought
          to be government property, and therefore it is the  function
          of the state to punish those who improperly care for govern-
          ment  property.    Or perhaps it is because the state gener-
          ously extends to competent adults the "benefits" it provides
          to children and to the mentally ill:  namely,  a  full-time,
          all-pervasive supervisory conservatorship--so that they need
          not  trouble  themselves  with making choices about behavior
          thought physically risky or morally "naughty."  But, in  any
          case,  you  stare stupefied, while your Eskimo informant re-
          lates how this law is taken so seriously that  a  friend  of
          his was recently imprisoned for years for the crime of "pos-
          session of nine ounces of trout with intent to distribute."

               Now  you  may  conclude  that  a society so grotesquely
          oppressive as to enforce a law of this  type  is  simply  an
          affront to the dignity of all human beings.  You may go far-
          ther  and  decide to commit some portion of your discretion-
          ary, recreational time specifically to the task of thwarting
          this tyrant's goal.  (Your rationale may be "altruistic"  in
          the   sense   of  wanting  to  liberate  the  oppressed,  or
          "egoistic" in the sense of  proving  you  can  outsmart  the
          oppressor--or  very likely some combination of these or per-
          haps even other motives.)

               But, since you have zero desire to become a  martyr  to
          your "cause," you're not about to mount a military campaign,
          or  even try to run a boatload of fish through the blockade.
          However, it is here that technology--and in  particular  in-
          formation technology--can multiply your efficacy literally a
          hundredfold.    I say "literally," because for a fraction of
          the effort (and virtually none of  the  risk)  attendant  to
          smuggling in a hundred fish, you can quite readily produce a
          hundred  Xerox copies of fishing instructions.  (If the tar-
          geted government, like present-day America, at least permits
          open  discussion  of  topics  whose  implementation  is  re-
          stricted,  then that should suffice.  But, if the government
          attempts to suppress the flow of information as  well,  then
          you will have to take a little more effort and perhaps write
          your  fishing manual on a floppy disk encrypted according to
          your mythical Eskimo's public-key parameters.  But as far as
          increasing real-world access to fish you have  made  genuine
          nonzero  headway--which  may  continue to snowball as others
          re-disseminate the information you have provided.   And  you
          have not had to waste any of your time trying to convert id-
          eological  adversaries, or even trying to win over the unde-
          cided.  Recall Harry Browne's dictum  from  "Freedom  in  an
          Unfree World" that the success of any endeavor is in general
          inversely proportional to the number of people whose persua-
          sion is necessary to its fulfilment.

               If  you  look  at  history, you cannot deny that it has
          been dramatically shaped by men with names like  Washington,
          Lincoln,  .  .  .  Nixon  .  . . Marcos . . . Duvalier . . .
          Khadaffi . . .  and their ilk.  But it has also been  shaped
          by  people with names like Edison, Curie, Marconi, Tesla and
          Wozniak.  And this latter shaping has been at least as  per-
          vasive, and not nearly so bloody.

               And  that's  where  I'm  trying  to  take The LiberTech
          Project.  Rather than beseeching the state to please not en-
          slave, plunder or constrain us, I propose a libertarian net-
          work spreading  the  technologies  by  which  we  may  seize
          freedom for ourselves.

               But here we must be a bit careful.  While it is not (at
          present)  illegal  to  encrypt  information  when government
          wants to spy on you, there is no guarantee of what  the  fu-
          ture  may hold.  There have been bills introduced, for exam-
          ple, which would have made it a crime  to  wear  body  armor
          when government wants to shoot you.  That is, if you were to
          commit certain crimes while wearing a Kevlar vest, then that
          fact  would  constitute a separate federal crime of its own.
          This law to my knowledge has not passed . . . yet . . .  but
          it does indicate how government thinks.

               Other  technological  applications,  however, do indeed
          pose legal risks.  We recognize, for  example,  that  anyone
          who  helped a pre-Civil War slave escape on the "underground
          railroad" was making a clearly illegal use of technology--as
          the sovereign government of the United States of America  at
          that time found the buying and selling of human beings quite
          as  acceptable  as  the buying and selling of cattle.  Simi-
          larly, during Prohibition, anyone who used  his  bathtub  to
          ferment  yeast and sugar into the illegal psychoactive drug,
          alcohol--the controlled substance, wine--was using  technol-
          ogy  in a way that could get him shot dead by federal agents
          for his "crime"--unfortunately not to be  restored  to  life
          when  Congress  reversed itself and re-permitted use of this
          drug.

               So . . . to quote a former President,  un-indicted  co-
          conspirator  and pardoned felon . . . "Let me make one thing
          perfectly clear:"  The LiberTech Project does not  advocate,
          participate  in, or conspire in the violation of any law--no
          matter how oppressive,  unconstitutional  or  simply  stupid
          such  law may be.  It does engage in description (for educa-
          tional and informational  purposes  only)  of  technological
          processes,  and some of these processes (like flying a plane
          or manufacturing a firearm) may well require appropriate li-
          censing to perform legally.    Fortunately,  no  license  is
          needed  for  the  distribution or receipt of information it-
          self.

               So, the next time you look at the political  scene  and
          despair,  thinking,  "Well,  if 51% of the nation and 51% of
          this State, and 51% of this city have  to  turn  Libertarian
          before  I'll  be  free,  then  somebody might as well cut my
          goddamn throat now, and put me out of my  misery"--recognize
          that  such  is not the case.  There exist ways to make your-
          self free.

               If you wish to explore such techniques via the Project,
          you are welcome to give me your name and address--or a  fake
          name  and  mail  drop, for that matter--and you'll go on the
          mailing list for my erratically-published newsletter.    Any
          friends  or acquaintances whom you think would be interested
          are welcome as well.  I'm not even asking for stamped  self-
          addressed envelopes, since my printer can handle mailing la-
          bels and actual postage costs are down in the noise compared
          with  the  other  efforts  in getting an issue out.   If you
          should have an idea to share, or even a  useful  product  to
          plug,  I'll be glad to have you write it up for publication.
          Even if you want to be the proverbial "free rider" and  just
          benefit  from  what others contribute--you're still welcome:
          Everything will be public domain; feel free to  copy  it  or
          give it away (or sell it, for that matter, 'cause if you can
          get  money  for  it while I'm taking full-page ads trying to
          give it away, you're certainly entitled to  your  capitalist
          profit . . .)  Anyway, every application of these principles
          should make the world just a little freer, and I'm certainly
          willing to underwrite that, at least for the forseeable  fu-
          ture.

               I  will leave you with one final thought:  If you don't
          learn how to beat your plowshares into  swords  before  they
          outlaw  swords,  then you sure as HELL ought to learn before
          they outlaw plowshares too.

                                                       --Chuck Hammill

                                                 THE LIBERTECH PROJECT

                                     -///-

                    ???????????????????????????????????????
                    ? Vesoft and the Hewlett Packard 3000 ?
                    ?            by Black IC              ?
                    ???????????????????????????????????????

        There have been numerous articles written about the Hewlett Packard
3000 and how to break the system.  This write up does not deal solely with
the HP3000 but with the addon for tighter security by the VESOFT corporation.

        As time goes on and people begin to see the need for better security
and a more productive system, it's becoming harder to exploit any weakness
that could be on said system.  That's where VESOFT comes in.

VESOFT
1135 S. Beverly Dr.
Los Angeles, CA
90035-1119

(310) 282-0420
(310) 785-9566 (Fax)

        They have been supporting Hewlett Packards since 1980 with excellent
addons for the HP3000. In the following paragraphs I discuss the various
utilites that VESOFT employs and what you might expect on a VESOFT secured
system.

                             ?????????????
                             ? MPEX 3000 ?
                             ?????????????

        The MPEX addon emulates and implements virtually all of the MPE/iX
user interface features (variables, command files, implied :RUN, :CALC,
:COPY, :PRINT, etc) on MPE/V.  Not only does this add a lot of power to the
MPE/V system, but it also lets you use the same job streams on MPE/V and on
the MPE/iX (If the owner of the Hewlett Packard has both setups!)

        So initially you wont see a difference with the target system.  Also
if the system has VESOFT installed and not on the other systems their,
that's not an issue right now cause if you are experienced with the 3000
series and the likes you will be able to navigate with out a problem.

                            ?????????????????
                            ? VE AUDIT 3000 ?
                            ?????????????????

        The Audit program from VESOFT is a resecurement utility very similar
to the SATAN program for UNIX.  The purpose of VE AUDIT is to check the
system for loopholes and to assist the Manager/System Administrator in
resecuring the system.  VE AUDIT takes the laborous job of checking accounts
(LISTACCT), users (LISTUSER), and groups (LISTGROUP) to see who has what
access, capabilities, no passwords, etc.  The program goes through everything
and then reports to manager what loopholes (if any) are found and what is the
suggested step to resecure that system.  This program can also be used to
alter the system accounting structure as well as look at it with a new set
of commands.

        The program is run when you set the attributes (password, capability,
access mask).  List them in one or two line object format. Create an MPEX
command file that will rebuild the accounting structure when the program is
executed.  Purge them after prompting.

        As you can see this program will assist the manager/system
administrator in an easy to use manner and allows the system security to be
tightened in a way that was not as easy on the standard HP3000.

                            ?????????????????
                            ? SECURITY 3000 ?
                            ?????????????????

        The VESOFT security program works in several ways to secure the
Hewlett Packard system.  Most HP3000 systems will allow users to log on to
the system using a non-unique name and generic session name with a session
password (i.e. JOE.PAYROLL as opposed to JOE,CLERK.PAYROLL).  The VESOFT
program will no matter what format the system uses to establish identity
allow the use of a session name and a password for that individual, thus
increasing the security 10-fold. It will also eliminate the annoying habit of
users omitting the session name since the MPE operating system considers it
optional.

        Changing of passwords become manditory through the security program.
Saving the account manger time by having a set time period for the users
to change their passwords (i.e. every 30 days or as set).

        Some HP3000 systems when accessed give the user access to the MPE
prompt ":" which most users don't need access to all the commands. VESOFT now
sets up a menu of options which allows the user to use the given choices
and nothing else.

        If the system has dial-ups the security program allows passwords on
a terminal by terminal basis thus adding in a second password to protect the
system. Thus anyone calling up not only has to get past the dial-up sequence
but they also have to log in to the system as if they were at the console.

        If the system is run on networks then the program will synchronize the
network and allow file transfers with out actually logging into the
receiving system. Users will also have to login to a system at a different
terminal just as if they were at that console.

        Embedded passwords are probably one of the biggest threats to HP3000
systems along with shared passwords and passwords that have not been changed
in a long time. It then is easier for someone to access the system seeing as
it will be easier to figure out. Once a password has become embed the ability
to change it in a job stream is very hard and time consuming. The security
program comes with what is called the "STREAMX" module which will do all the
handy work for the account manager.

        Logoff now has a built in timer so those users that are idle or leave
the system unattended for a given amount of time will automatically be logged
off and the integrity of the system brought back to normal.

        This covers the basics of the VESOFT programs.  As you can see any
entry into an HP3000 using VESOFT will not react as usual and the
accessibility has been changed to that of seriously protected.  I'll save the
coverage of surveillance social engineering and dumpster diving for others.
What I will say is you need to have a firm grasp of the target system and its
users.

                               ??????????????
                               ?  DEFAULTS  ?
                               ??????????????

        The following is a list of some of the defaults in the Hewlett Packard
MPEX System used on the 3000 and the likes. Keep in mind that a resecured
system is going to have the defaults removed and replaced with a tighter
setup.  Remote login maintenance has been a pride and joy of Hewlett packard
owners.  It is also one of the most exploited in terms of malicious entry.
With the VESOFT programs properly installed the usual one password entry
for remote will now be two.  The default accounts are almost always open if
they still exist.  Aside from "dumpster diving" you should consider social
engineering names and as much info as possible about the system you are
attempting to get in on, just incase you are asked for a password.  Sometimes
you will come across a system that uses the "terminal password" at login.
This is an old option and thus being an option does not have any defaults.


operator.cognos                 mgr.hpword              field.hpword
manager.hpoffice                mgr.hpoffice            wp.hpoffice
spoolman.hpoffice               mailman.hpoffice        advmail.hpoffice
mail.hpoffice                   field.support           operator.support
operator.sys                    rsbcmon.sys             pcuser.sys
operator.system                 operator.disc           mgr.xlserver
manager.itf3000                 sys.telesup             manager.security
mgr.conv                        mgr.rje                 mgr.hpp187
mgr.hpp189                      mgr.hpp196              field.hpp187
mgr.intx3                       mgr.carolian            manager.tch
mgr.word                        mgr.telesup             field.service
operator.disc                   mgr.ccc                 field.hpunsup
field.hp                        mgr.hpp189              mgr.hpp196
mail.mail                       mail.netbase            mgr.rego
mgr.rje                         mgr.robelle             mgr.cnas
mgr.hpdesk                      mgr.robelle             mgr.vesoft


        I hope this write up will provoke more interest in the Hewlett Packard
systems namely the HP3000.  If you have any comments or wish to discuss these
systems more indepth please feel free to contact me at the following e-mail
address:

black.ic@iirg.com

Hope to hear from some of you.

Black IC/IIRG

                                  ---/////---

Unless otherwise noted Cybertek Electric is Copyright (C)1996 by
OCL/Magnitude, P.O. Box 64, Brewster, NY 10509. All Rights Reserved.
Noncommercial reproduction is encouraged provided this electronic publication
is redistributed in its entirety with credits intact. Cybertek Electric is
published for educational purposes only; under The First Amendment of The
United States Constitution. No illegal use is implied or suggested. If you
have a problem with this, too fucking bad. SUBMISSIONS WANTED. If you can read
and understand this e-zine then you should know what we're interested in.
Please send any feedback, questions, and/or submissions to either of the email
addresses in the signature below.


   |\  /|  /\    /   |\  |                    Thomas Icom/IIRG
   | >< | <  >  /    | \ |\                The Blackthorn Project
   |/  \|  \/  <     |   | >       <ticom@l0pht.com> <thomas.icom@iirg.com>
   |    |  /\   \  \ |   |/       International Information Retrieval Guild
   |    | /  \   \  \|   |                "May Odin guide your way!"
           Madhr er manna gaman, ok moldar auki, ok skipa skreytir.

<End of Text>