home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Black Crawling Systems Archive Release 1.0
/
Black Crawling Systems Archive Release 1.0 (L0pht Heavy Industries, Inc.)(1997).ISO
/
iirg
/
phan03.14
< prev
next >
Wrap
Text File
|
1994-12-27
|
40KB
|
872 lines
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
= =
- WELCOME TO THE FOURTEENTH ISSUE OF -
= =
- -=>PHANTASY<=- -
= =
- A PUBLICATION AND NEWSLETTER OF -
= =
- THE -
= INTERNATIONAL =
- INFORMATION -
= RETRIEVAL =
- GUILD -
= =
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
= =
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Volume Number Four,Issue Number Fourteen Dated 02/06/93
Editor is Mercenary : mercenar@works.UUCP
Article Submissions: The Mercenary/IIRG
862 Farmington Avenue
Suite 306
Bristol,Ct 06010
Phantasy Headquarters BBS: The Rune Stone
14.4K HST
Invitation Only
All H/P/A, 2500+ Files
(203)-PRI-VATE
IIRG World Headquarters BBS: Dark Shadows
19.2/9600 Baud HST
1.2 Gigs Online
(Down at this Time)
Table of Discontents:
[1] Phantasy Distro Sites Needed
By: IIRG
[2] Rune Stone BBS Information
By: Mercenary
[3] "Operation Gray Chip Completed"
By: Knight Hack
[4] FOR THE PEOPLE
Supplied By: Bulletin Boards Across the Country
Edited by: Mercenary
1. Blitzkrieg BBS Goes Down!
2. AT&T Smart Card Voice Prints Increase Security of NCR ATMs
3. DEA Security - Not That Secure!
[5] The Rumor Mill (Unconfirmed Rumors From the Underground)
Edited By: Mercenary
1. Possible Loser Alert?
2. IBM Working on Super Drive?
3. Grim Reaper of TDT a Narc? (So says Pepsi Man)
[6] PHANTASY TIDBITS: News and Views of Interest
1. Cellular Highway Robber
2. Phantasy Makes Honorable Mention
3. Wired Magazine Premieres
4. TIME Magazine Article
5. FREE Virtual Sex Poster
6. NCSA FREE Book Offer
7. Information Requests
[7] Listing of IIRG Distribution Sites
[8] Listing of PHANTASY Distribution Sites
[9] IIRG Special Announcements
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
OFFICIAL DISLAIMER...
All information in PHANTASY is from USER contributed material
The Publishers and Editors of PHANTASY and THE IIRG disclaim
any liability from any damages of any type that the reader or
user of such information contained within this newsletter may encounter
from the use of said information. All files are brought to you for
entertainment purposes only! We also assume all information infringes
no copyrights and hereby disclaim any liability.
PHANTASY is (C) 1990 by The IIRG
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [1]: Phantasy Distro Sites Needed
By: IIRG
////// ////// /////// ////////
// // // // //
// // /////// // ////
// // // // // //
////// * ////// * // // * /////////
ATTENTION ALL SYSOPS
--------------------
The International Information Retrieval Guild is looking to expand
its distribution network in 1993. We would prefer BBS's that mainly
cater to the Hack/Phreak/Anarchy Underground.
Two Forms of distribution are currently available to those sysops
who choose to participate and meet certain criteria.
1. Phantasy Magazine Distribution
2. Complete IIRG File Distribution
1. Phantasy Distribution
Phantasy is the IIRG's Online Newsletter/Magazine for the
H/P/A community. Phantasy Distribution for your bbs means
that all new Issues of Phantasy will be uploaded by a courier
to your BBS within 12-24 Hours of its release date.
Your only responsibility is to provide a File area.
2. IIRG File Distribution
The IIRG Archives contain a vast wealth of information
gathered over the years from the underground. IIRG file
distribution will provide you with a courier and file list.
Your responsibility will be to edit the file list to your
tastes or Needs and provide it to your courier.
Over a short period of time the courier will provide the
files you've selected.
As always this is a free service from the IIRG at no
cost to you, the sysop.
LIMITATIONS: The IIRG has no overseas couriers at this
time, Overseas Sysops will be provided with a No Ratio,
No Limit Account at an IIRG Distro Site and will be
responsible for there own distribution until a
courier can be provided.
The IIRG May be Contacted Through Mercenary at:
mercenar@works.UUCP
or by Snail Mail at:
Mercenary/IIRG
862 Farmington Ave.
Suite 306
Bristol,CT. 06010
-=THE IIRG=-
-------------------------------------------------------------------------------
Section [2]: Rune Stone BBS Information
By: Mercenary
Well Folks, I've got good news and I've got bad news.....
First the bad news, The Rune Stones public line will not be installed most
likely until May of 1993. This is due to the fact that I'm moving again.
For those IIRG Members with access to the private line, please note that
that the number will be changing. Please pick up the newest member package.
My move is prompted by the current economy, hence where the money is, so am I.
So whem Im settled in at my new location, so will the Rune Stone.
Now the good news...
The Rune Stone BBS number will be made generally available to all readers of
Phantasy and when you log-on and become a Validated user,you will have
access to over 3000 H/P/A Text Files.
Please note that due to my changing locations, the next several Issues of
Phantasy may be slow in appearing as I'll be busy and wont have much time
to devote to the magazine till after the move.
Thanks for the Help and Support
Mercenary/IIRG
-------------------------------------------------------------------------------
Section [3]: "Operation Gray Chip Completed"
By: Knight Hack
OPERATION GRAY CHIP COMPLETED
The FBI,US Customs Service,and Internal Revenue Service along with
detectives from Santa Clara,San Jose,and Fremont California have just
completed a four month sting operation code-named "Operation Gray Chip".
Undercover agents and detectives reportedly bought and sold allegedly
stolen semiconductors and computer parts on the "Gray" Market.
The sting operation targeted brokers and dealers in California,Taiwan,
Argentina, and Singapore. Most of these dealers have reportedly been
selling parts to legitimate computer companies in the United States and
Far East for years. Some 30 "Gray" Market brokers have been arrested
as a result of the sting operation.
The sting operation is said to have been designed to send a message to
those who purchase semiconductors,disk drives, and other parts from less
than legitimate sources According to Sgt. Paul Kirby of the Santa Clara
Police Department.
Those individuals arrested have been charged with criminal conspiracy,
and multiple counts of attempted receipt of stolen property. Names of
those arrested and the companies involved are expected to be released
soon.
Parts for the sting were provided by Intel,Quantam Corp,and Conner
Peripherals,along with other well known companies. The sting involved
sales by undercover agents to brokers who thought they were getting a
deal because the merchandise was HOT.
More than 2 Million in Cash and 1.55 Million in parts were confiscated
over the 4 month duration of the operation.
-------------------------------------------------------------------------------
Section [4]: FOR THE PEOPLE
Supplied By: Bulletin Boards Across the Country
Edited by: Mercenary
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% The end of Blitzkrieg %
% %
% Transcribed by Phantasm [01/09/93] %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
The following text is transcribed from a message which was left on Predat0rs
answering machine at 502-499-8933.
Hello, this is John or Predat0r the former SysOp for Blitzkrieg BBS. I'd like
to say as of the 12th of January, 5.00pm, 502-499-8933 will no longer be an
active line which means the system's gone.
When I get a new line and a new number I'll put it on Pentavia, Ripco, other
real popular boards like that. I'd like to say thanks for everybody who
supported the system while it was up.
>From February of 1990 to January 1993 it had 27,834 callers. The last official
user to call was Sinister Solution.
I'd like to say when the new system goes back up it'll be bigger, better and
even more underground than it was now.
I officially retire as Predat0r and I officially retire Blitzkrieg. So when the
new system goes up, I'll have a new handle and a new name for the board.
If you need to get in touch with me, use the post office box, there still good
and if you want my new voice number you'll figure out how to get it.
Stay free and I'll see you all again real soon...
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
FOR RELEASE TUESDAY, DECEMBER 8, 1992
AT&T SMART CARD VOICE PRINTS INCREASE SECURITY OF NCR ATMs
SAN ANTONIO, Texas -- NCR Corporation and AT&T Smart Cards
have demonstrated a prototype of a new generation of automated
teller machines (ATMs) they are developing that will use AT&T's
contactless smart card technology to offer customers additional
services, like a security system that works by verifying the
cardholder's voice print.
The prototype and several potential applications of the new
terminals are being shown at the Retail Delivery Systems Con-
ference here this week.
The two AT&T units also announced that AT&T's smart card
readers can be connected to NCR's point of sale terminals, and
that they will begin working with banks to develop new smart
card-based applications that will run on ATM and point of sale
machines.
NCR, a unit of AT&T, is the world's largest supplier of
ATMs. AT&T Smart Cards is a leading supplier of contactless
smart cards and applications.
AT&T contactless smart cards look like other bank cards--
they're the same size and just as thin--but they have
microprocessors and memory chips laminated within their plastic
shells.
Developed at AT&T Bell Laboratories in the United States,
their electronic memory can hold the equivalent of several pages
of typewritten information, personalized to the card's user.
That data is accessed by a reader/writer device, which, in
addition to being installed in an ATM, can be connected to a cel-
lular or wired telephone, personal computer, automobile (for
electronic toll collection), or other device. Because the reader
has no moving parts, it is more reliable than contact-card
readers.
"Our smart card can be viewed as a secure, portable, per-
sonal database that will provide banking customers with enhanced
security and a broad spectrum of new services," said Diane
Wetherington, president of AT&T Smart Cards.
{familiar ATM into a new kind of financial transaction
station," said Jim Adamson, vice president of NCR Self-Service
and Financial Systems Division in Dundee, Scotland.
"One obvious benef{ion beyond PINs (per-
sonal identification numbers), which a thief might be able to
find out. For example, one of the demonstrations at the Retail
Delivery Systems Conference will be a voice-based security system
that works by comparing the cardholder's voice print with one
stored on the card. Unless the two match, access to the account
is denied.
"But that's just the beginning," Adamson adds. "Since much
of a customer's account information is stored on the card, he or
she doesn't necessarily need to go to an ATM if all they need to
do is check that information. You can use a personal computer
with a smart-card interface, for example, or a similarly equipped
public telephone.
"Of course, security features on the card will prevent users
from changing the information on the card when they are not
linked to their bank's computer network."
When customers do go to an ATM, they are given customized
menu options based on their account profile stored on their smart
cards. This might even include offering them a connection to a
financial institution not normally on the ATM network, such as
a brokerage house where they have a money market account.
In addition to convenience and security, another benefit of
using AT&T contactless smart cards with NCR's terminals, is that
a single card can be used for multiple applications--a solution
to consumer complaints about the proliferation of cards they need
to carry around.
Using AT&T's communications network and NCR's installed base
as a backbone, AT&T can develop and deploy applications for a
variety of customers. For example, a single card could serve as
an ATM card, an insurance information card, and a debit card for
making purchases in a store, placing phone calls, paying highway,
bridge and tunnel tolls, paying mass transit fares, and even
buying from vending machines.
Funds for each of these uses can be transferred at any ATM
from the customer's bank account to the debit portion of the
card. With a smart card reader/writer connected to an NCR point
of sale terminal, the consumer has access to a full range of pay-
ment options.
AT&T smart cards also make it possible for ATMs to expand
beyond mere banking functions. For example, "electronic tickets"
for airline travel, sporting events, plays, or concerts could be
purchased at an ATM and loaded onto the smart card. The card
would then be accessed at the airport, stadium, theater or con-
cert hall.
"The AT&T contactless smart card reader is a perfect example
of the potential for joint technology development between NCR and
AT&T," said Adamson.
AT&T plans to make the smart card interface available to
other terminal developers, as well.
NCR, an AT&T company, develops, manufactures, markets,
supports and services enterprise-wide information systems for
worldwide markets.
AT&T Smart Cards, based in Bridgewater, New Jersey, is an
AT&T strategic business unit that develops and markets smart card
products and applications.
The business does all of its development and manufacturing
in the United States (its factory is located in Little Rock, Ar-
kansas). AT&T also has a cooperative agreement with Nippondenso
Co. to market smart card applications in Japan.
# # #
NCR is a registered trademark of NCR Corporation
ADDITIONAL BACKGROUND ABOUT AT&T'S SMART CARDS
AT&T's smart card consists of an 8-bit microcomputer, and
features its own operating system, 3 kilobytes of electrically
erasable read-only memory (EEPROM), an asynchronous serial data
link, and a security system to prevent files from unauthorized
use.
AT&T's smart card differs from other smart cards in several
important ways:
o It uses a contactless interface to provide power to the card
and to perform data transfer. Other smart cards have ex-
posed metallic contacts, which produce reliability problems
with wear, contamination, and damage due to electrostatic
discharge. AT&T pioneered a design that allows the smart
card to transmit data to a card reader without metal-to-
metal contact. The card transfers data by changing the
charge on capacitive plates in the card and the reader.
o The microprocessor uses a flexible, UNIX(TM)-like operating
system designed specifically for AT&T's smart card. Host
computers or terminals can interact with the card using
predefined, high-level software commands.
o Security is also enhanced by the inclusion of a security al-
gorithm. Encryption, decryption and message authentication
can be performed to facilitate secure transmissions over in-
secure links to and from the host system or terminal.
o The card's file management architecture allows a number of
applications to reside on one card. For example, in
banking, one card can be used to hold information on a
customer's checking, savings, loan, and line-of-credit ac-
counts, while also storing biometrics, such as the
customer's signature, voice and fingerprints for security.
In addition, that same card can be used for travel or other
applications.
o The card has built-in security features. Information stored
on the card can be isolated in such a way that access to
data in a particular file on the card can be limited to
users authorized to access that portion of the card. This
allows different applications to reside on the same card
without giving all handlers access to the entire database.
AT&T smart cards are already being used in several ways:
ELECTRONIC TOLL COLLECTION
Without stopping, drivers approaching a toll plaza insert a
smart card into a transmitter mounted on their dashboards. In-
formation stored on the card is transmitted to the toll station
via radio link, and the cost of each toll is either debited from
a pre-paid amount on the card or recorded for billing later.
PENSION RECORD-KEEPING
Italy's post office is now using a pension-administration
system supplied by Olivetti that uses AT&T's smart card as a
record-keeping device for pensioners.
COMPUTER SECURITY
Other customers are using the AT&T smart card to limit ac-
cess to computer systems containing proprietary information.
Authorized users dial into the systems from their portable com-
puters, and the systems have been programmed to interface with
a smart card. Without the card, the systems cannot be accessed.
BUILDING SECURITY
AT&T has several applications in the U.S. and Japan in which
the smart card is used for employee identification and building
access control.
But these are just the beginning. The government could use
smart cards to replace printed food stamps, driver's licenses and
voter registrations. And a medical smart card could provide a
physician with a patient's complete and up- to-date medical
record. The same smart card can also store insurance information
in a separate file. Having this information on a card would also
expedite admittance to a hospital.
"The 1990s is a decade of customization," says Wetherington.
"Businesses will need to redesign the way information is gathered
and processed, in part because customers' definitions of ac-
ceptable service times and intervals are changing.
In some cases, this will require reengineering where and how
products and services are delivered. "Smart cards will
revolutionize personal and business information access and
processing by providing instant point-of-need transactions," she
said.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
DEA SECURITY - NOT THAT SECURE!
The Government Accounting Office (GAO) has just released a new report
titled "Computer Security: DEA is Not Adequatly Protecting Sensitive
Drug Enforcement Data".
It seems DEA Agents reguraly made standard Security Violations in the
areas of,
1. Sharing Computer Passwords
2. Left Passwords Taped to Terminals
3. Used easily identifiable Passwords (Such as "DEA")
4. Threw out Classified Materials in the Trash
So for all you Console Cowboys hacking the DEA, times a Wastin
these boys know nothing of proper security procedures!
-------------------------------------------------------------------------------
Section [5]: The Rumor Mill (Unconfirmed Rumors From the Underground)
Edited By: Mercenary and Anubis
-------------------------------------------------------------------------------
The IIRG recieved the following message at Mercenary's mailbox from an
unidentified user at llwnet.linknet.COM (Cheshire HS) and we found it most
interesting, We'll explain why afterwards...
-------------------------------------------------------------------------------
LOSER ALERT! LOSER ALERT!
FROM AN ANONYMOUS PIRATE SYSOP
------------------------------
HANDLE: Homicidal
REAL INFO: Jason L.(IIRG Deleted)
(IIRG Deleted)
Wallingford, CT 06492
(203)(IIRG Deleted)
AGE: 16
------------------------------
This kid is every pirate's nightmare. In his infinite
stupidity, he lost his access on the one major Connecticut
pirate board he had access on. Then he wanted revenge. He
called up the SPA (Software Publishers' Association) piracy
reporting hotline and the Apogee piracy hotline. He turned in
several big-time pirate boards. He gave BBS names, BBS
numbers, Sysops' handles, Sysops' real names, Sysops' voice
numbers, Sysops' addresses, Sysops' ages, his accounts on
small-time pirate boards, EVERYTHING! This kid fucked
EVERYBODY over! Several decent pirate Sysops deleted their
entire hard drives for fear that the FEDS would come knocking
at their doors. He shattered the fragile trust that exists
between the members of Connecticut's pirate community. In a
taped phone conversation (which was eventually made into a
Sound blaster VOC and then distributed) he admitted to
turning in pirate boards and also uploading viruses to
several BBS's. He also said that his "master plan" consisted
of bringing down all pirate boards and trashing the local
modem scene with "outside help from ex-modemers" who
supposedly hold grudges against current-day users. He turned
in kids who were hacking Internet also. If this kid ever
calls your BBS, just fucking delete his punk ass!
-------------------------------------------------------------------------------
We didn't know if the information was true as Mercenary is based in CT. and
He'd heard nothing of any Major BBS Busts or actions in the area.
But all of a Sudden this appeared in the Paper as well as in CUD 5.03.
-------------------------------------------------------------------------------
From the 1-7-93 Issue of The Cheshire Herald (Front Page)
Typed by Lord Valgamon (YUNSANJ@YALEVM.YCC.YALE.EDU)
THREE CHS STUDENTS CHARGED IN BURGLARIES
Former CHS Student Also Charged in Case
by Amy Carpenter, Herald Staff
Three Cheshire High School students and a former student charged
with the theft of $23,000 worth of computer and electronic equipment
from the high school have turned themselves in to Cheshire police.
Jared D Bishop, 17, of 500 South Meriden Road, William J Vallo,
17, of 1081 South Meriden Road, and John Beltrami, 17, of 12 Woodland
Drive, have each been charged with 6 counts of third-degree burglary,
6 counts of third-degree conspiracy to
commit burglary and first-degree larceny by common scheme,
police said.
Brendan Monahan, 17, of Littleton, New Hampshire, was
charged with third-degree burglary, third-degree conspiracy
to commit burglary and third-degree larceny, police said.
-Lesser Charges
Monahan, a former CHS student, received the lesser charges
because he is believed to have participated in only 1 of 6 burglaries
at the high school, said Detective Thomas Stretton.
Bishop and Vallo turned themselves in last week, and Beltrami and
Monahan turned themselves in early this week, Stretton said.
All four were released to the custody of their parents
and are scheduled to appear in Meriden Superior Court on
January 14, police said.
-------------------------------------------------------------------------------
It seems funny to us that these two incidents would originate from the same
place, so there may be some validity to the Rumor we recieved.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
IBM WORKING ON SUPER DRIVE?
IBM Corporation is rumored to be working on a read/write head for hard-disk
drives that will propel disk bit densities up into the range of 8 billion bits
per square inch. Current leading edge Winchesters area densities are in the
neighborhood of 250 million bits per square inch.
Even this may fall short of the rumored that students at the University of
San Diego are working on a head capable of 10 Billion bits per square inch.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
=============================================================================
THE GRIM REAPER IS A NARC
Oh No!, Mr. Narc has kicked me out of TDT!
=============================================================================
Today at about 6:00 Central time I was talking with my girlfriend.
I clicked on my call waiting button and it was The Grim Reaper
(Mike A.(IIRG DELETE). He told me to call him back because his didn't want
to pay for the phone call. I told him I would call him back in 5 minutes and
he said fine. I was called back 10 minutes later by Grim and he told me I was
kicked out.I asked why and he said it was because I hadn't called him
back. He said I didn't respect him and wasn't loyal to him. He went on and
on about how I've never done anything for TDT, but now that
he has kicked me out,I guess I might as well tell everyone the real story
about The Grim Reaper.
The truth is Grim is a narc. He is the one who got Mind Bomb nailed.
He went off on Sought After and has been trying to get him busted for
a while. His next targets are Renegade Chemist and Butcher. He always
told me that all other cracking groups would eventually die out. And the
way this would happen would be through his great ability to narc. Why do
you all think I followed him from FLT to OFG to TDT? Remember Infinite Range
Rock? He wasn't loyal to Grim, he was nailed. I've stuck with that fucking
Narc for 3 groups. He has told me a lot of shit, and now I'm going to tell
it all to you.
I have nothing against TDT, I have nothing against Sought After, or
anyone in the pirate scene. I do have something against Grim. He was the
person who took the fun out of all the groups I was in. He wanted people
to fear him. And when I wouldn't kiss his ass he kicked me out.
Grim didn't even go to court when he got busted with TNSHB. I don't
know all the details about the deals he cut, but I know he is a narc.
He is putting out shit about me not doing anything for the group which is
complete bullshit. People like the Grim Reaper should not be in the pirate
scene. He kills accounts, he busts people, and ruins BBSing to further
himself.
Luckily, I have a life! People like the Grim Reaper who quit
college, have no job, and no friends to BBS are sorry. I'm going to lay
low for a while, and just hang out on a few boards. I'm done with groups.
TDT is and will be my last one. I have a girlfriend, I have school, and
now I don't have to deal with Grim's bullshit. My warning to guys in TDT
and the pirate scene. Grim is a NARC, you don't screw with people like
that. I've learned my lesson. All I can say is get out of TDT. Get out
from under the thumb of Grim. He will fuck you over.
Grim Repear [TDT/NARC] DD Go ahead bust me. I can care less. Hell, you can
even post my address and come to my house. The last time we talked I had
it .VOC'ed. I kept tabs on you Mike. I'm not going to release it unless
you try something. Like I said before, I'm not here to take TDT down or
do any bullshit like that. I'm here to tell the truth. Don't fuck with
me Mike. The only way to learn from a narc, liar, and thief like you is
the hard way. I've learned, and now it's over. Go to hell, die, and
get a life fat ass.
Sought After [TDT] DD I have nothing against you. You are cool Zach.
Everything I thought about you was wrong. I was brainwashed by the big
Narc. Get out while you can. You know he busted Mind Bomb, you were
on the fucking phone, don't deny it.
To All DD I never tried to break apart TDT after I found out I was kicked
out. I'm not interested in going after Grim or narcing on him,
unless he pulls his bullshit on me.
Pepsi Man
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [6]: PHANTASY TIDBITS: News and Views of Interest
-------------------------------------------------------------------------------
CELLULAR HIGHWAY ROBBER
The LA Times reports that an enetrprising telephone phreak reached out and
touced someone 11,7333 times in August from a freeway emergency callbox in
Orange County,California.
The System that monitors the emergency callboxes attributed 25,875 minutes of
calls to the unknown phreak to points all over the globe.
The Phreak apparently succeeded in making the calls by matching the callboxes
electronic serial number.
-------------------------------------------------------------------------------
PHANTASY MAKES HONORABLE MENTION
Phantasy Magazine has been mentioned in Mondo 2000's new Book, "A Users
Guide to the New Edge" on Page 286.
Phantasy is Mentioned along with ATI,PHRACK,And The Syndicate Report
under the Catagory of Zines On-Line.
-------------------------------------------------------------------------------
WIRED MAGAZINE PREMIERES
Be on the lookout for a new Mondo 2000 look-alike Magazine, "WIRED" on sale
at newstands now. The first issue appears well written and contains several
articles of interest including "Cellular Phreaks and Code Dudes" and "War is
Virtual Hell" by Bruce Sterling.
-------------------------------------------------------------------------------
TIME MAGAZINE ARTICLE
For other collectors of information, be sure to grab the Feb. 8 edition of
time magazine and check out the cover story article on Cyberpunks.
-------------------------------------------------------------------------------
FREE VIRTUAL SEX POSTER
Get a FREE poster of the Virtual Sex Scene in the "LAWNMOWER MAN" by
calling 1-800-858-1810 and ask for Department C76.
This is a free promotional offer from CYPRESS SEMICONDUCTOR and they will
send along a copy of there Data Book with the poster.
They may ask if you have time to answer a few questions as they did when we
called, they're just looking for Company Background Info.
-------------------------------------------------------------------------------
NCSA FREE BOOK OFFER
The National Computer Security Association will send you a FREE copy of
their "Information Security Wishbook" and may be obtained by calling
(717)258-1816.
We've obtained a copy of the book and its roughly a 24 page catalog of
Books,Newsletters,and Research Reports with some "DISINFORMATION" charts
thrown in to scare the novice system operator.
For Example;
Number of Hacker Attacks on US Workplace Computers
350,000 in 1989
395,000 in 1990
675,000 in 1991
Come on Guys. Give us a break Name the Companies that reported 675,000
attacks individualy and I'll eat your Jock Strap.
-------------------------------------------------------------------------------
INFORMATION REQUESTS
At the IIRG, we often recieve strange,bizarre, and sometimes normal
requests. Although Mercenary does'nt have the time to answer everyone
individually. He hopes to answer some of your Questions here as we recieve
them.
1. Where can I get Info on Cellular Phreaking.
Mercenary Reply: There are numerous files on Cellular Phreaking and Hardware
hacking available on any larger Hack/Phreak BBS.
If you don't want to spend the time looking for them I would
suggest sending $49.95 plus $4.00 S/H to:
DYNASPEK
P.O. Box 564
Westmont,IL 60559
or COD orders may call (708)-971-1585
For your cash, They will send you a copy of,
"The Cellular Telephone Hackers Guidebook" and this should
guide you through the basics.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [7]: IIRG Distribution Sites
(or Gateways to Oblivion)
////// ////// /////// ////////
// // // // //
// // /////// // ////
// // // // // //
////// * ////// * // // * /////////
IIRG World HQ: Dark Shadows
19.2/9600 Baud HST
24 Hours a Day
1.2 Gigs Online
Sysop: Anubis
2 Nodes
(203)-PRI-VATE
(TEMP DOWN AT THIS TIME)
IIRG Distribution Site 1: Wired World BBS
INC Europe
TPC Courier (WHQ)
THP
IIRG Distribution Site
Sysop: Digital Justice
+39-89-254138
IIRG Distribution Site 2: Cyberdyne Network Germany
United Forces
Sysop: E605
+49-5341-59004
+49-5341-54052
IIRG Distribution Site 3: The Sanitarium
Sysops: Morbid Angel [INC/ACID]
Spectral Illusion [ACID/RAZOR]
IIRG Distribution Site
ACID Member Board
INC Courier Board
RAZOR 1911 Courier Board
VISA World Headquarters
(817)PRI-VATE
IIRG Distribution Site 4: The WareHouse
(203)-231-8589 14.4
(203)-231-8588 9600
OVER A GIG ONLINE
Sysop: Ionizer
IIRG Distribution Site 5: The Rune Stone BBS
14.4k HST
Phantasys Home Board
Complete IIRG Archives
Invitation Only
(203)-PRI-VATE
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [8]: Phantasy Distribution Sites
Phantasy's Distribution Site's are continually growing,we apologize if you
called a board and didn't find the Mag. Network Distribution Sites will
have the Issues first, we suggest calling one of them if a problem does
arise.
1. Lightning Systems
(414) 363-4282
Sixty Million Bytes OnLine
USRobotics Dual Standard HST/V.32bis
2400 thru 14.4k v.32bis/HST
2. Sycamore Elite
19,200-1200 Baud HST, 24 Hours a day
(815) 895-5573
3. The Works BBS
(617-861-8976)
Large Text Files BBS, 3500+ text files online.
2400-300 Baud, 24 Hours a day
4. Pipers Pit BBS
19,200-9600 HST ONLY!!
24 Hours a Day
THG Distro Site 1300 Megs
(203)PRI-VATE [2 Nodes]
(Please Note, Numbers have Changed at Pipers Pit)
5. The Dickinson Nightlight
(713)-337-1452
Der WeltanSchauung Distro Site (World View Magazine)
Phantasy Distro Site
6. RIPCO II BBS
(312)-528-5020
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [9]: IIRG SPECIAL ANNOUNCEMENT
The IIRG has just released The IIRG's Acronym List [V7.00] and should be
available on a H/P BBS near you.
Also for IIRG members the New IIRG Member Encryption System has been
released and can be Picked up on The Rune Stone BBS.
The IIRG shall be releasing around June, the IIRG's Hackers Survival
Guide for the 90's, note withstanding any problems with Mercenary's move.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PHANTASY(C) IIRG 1991,1992,1993
May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-