____ _____________ ___________ _____ ____\ |_\_ | _ _ |_\_ | _ | _ |__________ _ _ ___ | _ | _ | | | | _ | | | | |-| _ | | ______\ | /___ | | | | | | | | | |____ | ___| | | | |-| \ |zZ! /___ l______|_____|__|-|__|_____|__/__|___\___|_|_|___|_ ___________ ___________ | _ | _ | |-| | ___/_ | | _ \_ __/_|_ _ | \_ D a m a g e , I N C .| | | | | | | |___ | | | | | \_ _/ | | |__/ | | | ___| | | | | | |--| ___| | | ___| | N e w s l e t t e r |__|__|___\ |_______|_____|_____|___\ |__|__|___\ |__| Volume 2, Issue #16 (Released: 07/31/99) "In Chaos and Madness." http://surf.to/damage_inc damage_inc@disinfo.net ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ C O N T E N T S : þ INTRODUCTION - An Introduction to the Damage, INC. Newsletter. þ ADVISORIES - The structure of BCE explained. ¯ Search String: {ADVISORIES} þ BIG BROTHER BASHING - Bill C-3 makes the Kanadian DNA Bank a reality. ¯ Search String: {BIG BROTHER} þ BLACKENED'S TIP OF THE MONTH - Not available in this issue. ¯ Search String: {BLACKENED} þ BREAKER'S REVIEWS - Canadian H/P Sites. ¯ Search String: {REVIEWS} þ CONSPIRACIES AND COVERUPS - What really happened at Waco in 1993. ¯ Search String: {COVERUPS} þ CROSSED WIRES - An Advertisement for Blackzine. ¯ Search String: {WIRES} þ H/P INFORMATION - TELUS articles and Nortel's Millennium Desktop payphones. ¯ Search String: {H/P} þ INTERVIEWS AND INTERROGATIONS - Interviews of RedBoxChiliPepper & Logic Box. ¯ Search String: {INTERVIEWS} þ NEWS FROM THE TRENCHES - Damage, INC. releases updates and news. ¯ Search String: {NEWS} þ OBJECTIVE OPINIONS - Hacktivism: The individual's tool against oppression. ¯ Search String: {OPINIONS} þ REPORTS FROM THE FRONT - An assortment of interesting articles. ¯ Search String: {REPORTS} þ THOUGHTS, POEMS AND CREATIVE WRITING - Chaos and Madness. ¯ Search String: {WRITING} þ CLOSING COMMENTS - BLACKENED's chaotic closing comments. ¯ Search String: {CLOSING} ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ < DISCLAIMER > All articles contained in the Damage, INC. Newsletter are for informational purposes only. Damage, INC. is not responsible for how any of the information presented is used. It is not intended to be a manual with instructions to be followed. We won't be held responsible for any damages caused, illegal acts committed etc. by our readers. If/how you use the information given is entirely up to you. < COPYRIGHT NOTICE > All articles and source code contained within this file are (C) Copyright by Damage, INC. (unless stated otherwise). No part of this work can be modified, reproduced or changed in any way without the expressed written consent of Damage, INC. That means, electronically or otherwise, in part or in whole this file must not be altered. It cannot be included with any other releases. You cannot claim that you wrote it, or alter any articles and source code that has been written and Copyrighted by us. Also, do *not* distribute any Damage, INC. releases in "packages" with other text files or utilities. They must only be distributed alone in their present, original form. You are permitted to read and distribute the Damage, INC. Newsletter freely to quality h/p boards only. Copyright 1999 by Damage, INC. All Rights Reserved. _______________________________________________________________________________ INTRODUCTION: Early in May, I wrote a poem entitled "Chaos and Madness" which has been included in this issue. It was written while I was suffering from an extreme case of fever. Basically, it describes my state of mind during that episode of illness. Since it was such an intense, memorable experience I decided that it would be a unique concept to fashion this issue after that premise. In a sense, it could be said that this issue will be 'feverish'. At least, I hope that it'll turn out that way as at this point, even though you're reading the Introduction, the issue has yet to be written. ;) So, why write about a fever? What's the purpose of that? The point of doing that is very simple. Although my illness extended beyond just having a fever, that in itself gave me a new perspective on things, one that I haven't had the opportunity to explore many times in my life, or just neglected to do so. In essence, a fever can change the way you look at things. It can be a mind altering experience that one might describe as chaos and madness. While a person is consumed by a fever they can enter a world in which the ordinary seems extraordinary. They can have visions or hallucinations. They might even think things that they had never previously thought, while the doors of perception are opened wide to them. Sure, there's a certain danger involved while a person is enduring a long lasting fever. But there also lies a great potential, for imagination and to an extent, wisdom. It's fascinating and sometimes can be the source of dramatically wild, lucid dreams... if you're able to just relax and embrace it. Obviously people's experiences differ however. For some it's almost like a bad trip, while for others it is more like sweaty roller coaster ride, an adventure filled with crazed thoughts and emotions. For me, fevers have always been more like the latter. In fact, to a degree I almost welcome them at times because of the way they can affect me, and open my mind to possibilities that I otherwise might never consider. They can be so surreal, almost hypnotic in their power and able to intensify my creativity that I don't fear them. Nor do I ever wish that my mind and body wouldn't have to endure them again. Perhaps I'm making too much of fevers and what they're capable of doing to one's mind, but I do believe that they can be responsible for some very strange, sometimes amazing things that cannot just be dismissed and ignored. In all honesty, I think they can do more than what science can currently explain, even though I have no concrete proof of that. However, in some cultures fevers are induced so that shaman can see visions and experience unworldly things in dreams, etc. So, maybe there is a basis for some of my claims. Regardless of that, even if there aren't any hard facts to support my statements, it is what I believe. And that's what matters. Madness can be genius. Chaos can be desirable. Think about it. ADVISORIES - {ADVISORIES} The structure of BCE explained. In this article, we'll take you inside BCE in order to explain how it is structured, show which companies it owns in part or in whole and chart its relatives (divisions, subsidiaries, partners, alliances, etc.) Basically, the reason we selected BCE as a topic is to expose them for what they are. The purpose of doing that is to finally eradicate the commonly held belief amongst Canadian telephone customers that each telco is owned and operated independently in each individual province of Canada. That's a myth that definitely needs to be shattered. The truth needs to be told. And it can be, through education by means of the facts. Thankfully, BCE has provided us with a vast amount of information, which of course will be used against them to prove our point, by clearly demonstrating the size of their monopoly. Again, much of the material discussed in this article is easily obtained, direct from the source. The rest has been gathered from various telco web sites, reports, news clippings and other forms of research. Also, a graph in the form of a GIF (garnered from BCE's web site) has been provided for you to view for clarification and as further proof of their ownership. It clearly demonstrates how the massive Canadian corporation known as BCE is structured. Personally, I feel that many of the telcos across the country under BCE's ownership are trying to pretend to be small, independent telephone companies. In essence, they're in hiding by attempting to keep everything (including mere affiliations) quiet. They're trying to fool everyone. That's something that we simply can't allow to happen. So, we've outlined the true nature of their relations and used their own clumsy words against them as the very proof. Enjoy. ;) BCE: About BCE: Welcome to BCE: Overview Welcome to BCE, Canada's global telecommunications company. We're a company of 58,000 employees, revenues of $27.5 billion and assets of more than $32 billion. We are one of the world's leading communications organizations. Our vision sees us as "people reaching out to bring the world together through communications with leadership, innovation, teamwork and excellence." We have core investments in telephone networks, both wired and wireless Internet Protocol (IP)-based networks and solutions electronic commerce systems integration directories satellite networks We are also a major player in high-speed internet access web hosting direct-to-home entertainment In 1998, BCE had (baseline) earnings of $1.6 billion. In the first quarter of 1999, BCE had (baseline) earnings of $367 million, a 14% increase compared to the same period in 1998. For further financial information, please go to the Investors section of the site. Last updated on July 26, 1999 "BCE's telecommunications interests are among the most comprehensive of any company in the world, spanning the key segments of the communications sector: Canadian communication services, system integration and e-commerce, media, technology and solutions, and international communications services. We are Canada's global communications company." (% ownership as at March 31, 1999) Bell Canada Group Bell (100%) Bell Actimedia (100%) Bell Mobility (65.3%) Bruncor (44.8%) Manitoba Telecom (20%)* Maritime T&T (34.3%) NewTel Enterprises (54.7%) Northern Telephone (99.9%) Northwestel (100%) Telabec (100%) Teleglobe (21.6%) CGI & BCE Emergis BCE Emergis (62.4%)* CGI Group Inc. (44.6%) BCE Media Bell ExpressVu (100%) Telesat Canada (100%) TMI Communications (100%) Nortel Networks (40.4%) Bell Canada International (73.7%) Jones Intercable (30.3%) - sold in April for US $508M BCE family of companies. BCE is Canada's global telecommunications company with 122,000 employees worldwide, revenues of $33 billion and assets exceeding $40 billion. BCE is one of the most diversified of the world's leading telecom companies, with interests in the services business, in equipment, in technology, in directories, in networks wired and wireless and in satellites. BCE represents the people, technology and solutions that enable communications for millions of customers, at home and abroad. Bell Nexxia is the new member of the 'BCE_Companies' BCE: About BCE: Company Profiles: Bell Canada Ringing changes at Bell Canada Bell Canada has travelled a long way in a short time. With the introduction of long-distance competition followed by the introduction of local competition, Bell has reinvented itself as a flexible, focused and aggressive competitor. As data surpasses voice traffic, Bell Canada is ready, with customer-driven services such as a national broadband network, e-commerce and distance learning. Service delivery is equally innovative, pushing the boundaries of what a phone company is -- or can be. Bell's digital copper infrastructure is complemented by fibre-optic cables, wireless and satellite services. But perhaps Bell's strongest asset is its connection to other BCE companies - connections that produce innovative stand-alone and bundled services that are unmatched in Canada. On June 1, 1999, a strategic partnership between BCE and Ameritech Corporation was finalized in which the U.S. company acquired 20% of Bell Canada for $5.1 billion. The primary focus of the partnership is to develop growth opportunities and introduce new services for customers. Ameritech serves customers in 50 states and 40 countries and has US $30 billion in assets. And on June 21, 1999, Manitoba Telecom Services (MTS) and Bell Canada officially launched Intrigna - a joint initiative to offer leading edge and next generation telecommunication services to customers in the high growth business markets in Alberta and British Columbia. The Bell brand, which already enjoys strong recognition and trust, will help ease the introduction of innovative services, while differentiating Bell from the competition. Service bundling, which adds considerable customer value, also distinguishes Bell from the rest. For example, SimplyOne provides customers with one number for wireline and wireless service. And Bell World stores will demonstrate all of the products and services available through the BCE family of companies in an integrated, fun, informative fashion under one roof - with more than 200 locations to be completed by mid 2001. The entire profile above on Bell Canada was ripped from BCE's web site. Here's an article that I thought might be of interest to you. It shows just how much BCE has profited in the second quarter of 1999. BCE up sharply: "MONTREAL -- BCE Inc. Canada's largest telecom company, reported a multibillion-dollar profit in the second quarter, primarily from gains on the sale of a chunk of its Bell Canada unit to a U.S. phone giant. The Montreal holding company said it posted net profits of $4.6 billion for the three months ended June 30, compared with $295 million in the same 1998 period. The earnings included gains from the $5.1 billion sale of 20 per cent of Bell Canada to Chicago-based Ameritech as well as special charges related to acquisition costs at its Nortel Networks unit and restructuring charges at Bell Canada. Excluding special gains, BCE still enjoyed sharply higher profits from its operating units, as the company benefited from revenue and profit growth at Nortel." CANADIAN PRESS In conclusion, BCE is a very large, fat, Canadian giant. It's been the biggest fat cat monopoly corporation in this country for quite some time, and as you can see from the way it is structured, there aren't any plans to downsize. Their goal is to be involved in as many telco related industries as possible. And once their involved, and have established (or in some cases, bought) a subsidiary, the goal changes to monopolizing it so that they can increase and maximize profits. If they incur losses, they simply "restructure". Also, BCE not only thinks of the companies they own and have acquired as being mere "units", but they have been known to apply the same term to their customers. However, at the same time, they want everyone to think of BCE and all of the companies that it owns as being part of the "BCE family". They want it both ways. They're the classic faceless corporation that wants to be big and fat, but portray a public image of being a family oriented business. It's just another blatant lie used for brainwashing (err, marketing) purposes. In reality, they're a greedy company that wants to expand into any areas of business that they think might be profitable. They want to take over as many industries as possible. So much for the talk of stopping telcos from delving into residential cable, satellite and internet services, and even home security. BCE is literally everywhere in Canada and has at least partial (but more than minimal) ownership in virtually every major Canadian telephony related company. They also own many international telcos through their BCI division. So, it's not surprising to read BCE boast "This is Bell's world" on their web site (www.bce.ca). They also have Bell World stores and a Bell virtual World Tour site, etc. It's blatantly obvious that BCE loves to brag and boast. They have no humility or shame. In a future article, I'm going to explain BCE's subsidiaries in detail along with information on the Stentor Alliance. This was just the first article in a series dedicated to exposing the Canadian telephone system. Written by BLACKENED ú Damage, INC. (C)opyright 1999. BIG BROTHER BASHING - {BIG BROTHER} Bill C-3 makes the Kanadian DNA Bank a reality. Disclaimer: The sections of Bill C-3 (36th Parliament session) listed below comes from the Government of Canada web site. If there is any misinformation, they are responsible for it. Furthermore, if they failed to add or delete clauses due to revisions to the information I used as a reference, they are at fault. I spent over two hours searching their poorly organized site to make sure I have the most current information on Bill C-3. As is always the case, "ignorance of the law" is their greatest weapon. It has finally happened. Without warning from the biased mass media, on December 10, 1999, Bill C-3 received Royal Assent and was passed into law. Bill C-3 is titled "An Act respecting DNA identification and to make consequential amendments to the Criminal Code and other Acts." In stronger words, Bill C-3 creates a Canadian DNA Bank, and provides legal powers to the Thought Police and their medical associates to force "certain violent convicted persons" to have a DNA sample extracted from them. Another alarming point is that the DNA Bank will be maintained by the Commissioner of the RCMP (Repressive Canadian Militant Pigs). Bill C-3 has amended the Canadian Criminal Code to make it legal to force the extraction of bodily substances from a convict without their consent. Bill C-3 is officially known as the "DNA Identification Act" since it has been passed into law. However, I'll refer to the Act as Bill C-3 in this article. The National DNA Bank is divided up into two indexes; the Crime scene index, and the Convicted offenders index. The Bank shall also contain information such as the case number of the investigation associated with the DNA sample from which the profile was created, and in the case of a DNA profile in the Convicted offenders index, the identity of the person that the DNA sample belongs to. Below is what information will be in a Crime scene index: Crime scene index (3) The crime scene index shall contain DNA profiles derived from bodily substances that are found (a) at any place where a designated offence was committed; (b) on or within the body of the victim of a designated offence; (c) on anything worn or carried by the victim at the time when a designated offence was committed; or (d) on or within the body of any person or thing or at any place associated with the commission of a designated offence. Like most Canadian laws that infringe on privacy in order to protect "society," they are all written in this politically correct manner. The DNA Bank will allow the RCMP to bank all DNA profiles that are at the crime scene. Many people may not find anything wrong with this, but I find it disturbing. What kind of privacy protection is the victim offered? Obviously, the unfortunate victim was at the crime scene, so isn't it logical that the cops will take a sample from the victim so that they can disqualify his or her DNA samples that are scattered at the crime scene? If Big Bro's eventual motive is to bank the DNA of every citizen in the country, would they just throw away a victim's DNA profile? If the victim's DNA is corruptly abused, the victim is victimized again. In fact the RCMP will keep the Crime scene index indefinitely. Instead of destroying the DNA profiles, "access" to the DNA profile of a victim or cleared suspect (definitely a victim in their own right) are revoked, as stated in section 8.1 titled "Crime scene index." Below is the brief yet official description of what the Convicted offenders index will contain: Convicted offenders index (4) The convicted offenders index shall contain DNA profiles derived from bodily substances described in subsection 487.071(1) of the Criminal Code. The DNA bank will work as follows: When the RCMP Commissioner receives a DNA profile, it will be checked against the DNA data bank in order to determine whether it is already contained in the data bank. Then the Commissioner "may then communicate, for the purposes of the investigation or prosecution of a criminal offence, the following information to any Canadian law enforcement agency or laboratory that the Commissioner considers appropriate:" (a) whether the DNA profile is already contained in the data bank; and (b) any information, other than the DNA profile itself, that is contained in the data bank in relation to that DNA profile. Another interesting section of Bill C-3 reveals that "authorized users" will have access to the "automated criminal convictions records retrieval system" that is maintained and updated by the RCMP. This confirms that the DNA data bank will be fully computerized as well. I wonder if the RCMP is concerned that "unauthorized users" will also gain access to the information within the DNA data base? Their systems have been hacked in the past. You may be wondering how many people may request and expect to receive DNA data from the Commissioner of the RCMP. Well, basically all the pigs in the world according to section 6(3). The RCMP will take DNA profiles from the foreign cops, and compare it to all of the DNA profiles in the Canadian DNA Bank. Even if a criminal is allowed to, and does leave Canada in order to get a fresh start for their life, their DNA could easily follow them. Once Big Brother has a DNA profile, it can and will be shared worldwide. Below is a section that deals with how domestic pigs and other people can gain access to the information in the DNA data bank: Access to information 7. Access to information contained in the DNA data bank may be granted to (a) any person or class of persons that the Commissioner considers appropriate for the purposes of the proper operation and maintenance of the DNA data bank; and (b) the personnel of any laboratories that the Commissioner considers appropriate for training purposes. As you can see, this proves that one person (the RCMP Commissioner) has total authority over the DNA bank. He has total and complete reign over who gains access to the DNA samples and profiles contained within the Bank. As always, regardless of the country, Big Brother has one little section that deals with "violations of individual privacy" in order to give any mainstream critics a false sense of security. Here is the clause that is "supposed to" protect the DNA data bank from unauthorized use: Unauthorized use (6) No person who receives a DNA profile for entry in the DNA data bank shall use it or allow it to be used other than for the purposes of the administration of this Act. Pretty fucking vague as always. Even if a miracle happened, and a corrupt cop was caught and prosecuted for violating the above section 6(6), the punishment is weak considering the total destruction of the privacy of the individual. Here are the "punishments" that a hacker or private citizen would face should that person get caught: Offence 11. Every person who contravenes subsection 6(6) or (7), section 8 or subsection 10(3) or (5) (a) is guilty of an indictable offence and liable to imprisonment for a term not exceeding two years; or (b) is guilty of an offence punishable on summary conviction and liable to a fine not exceeding $2,000 or to imprisonment for a term not exceeding six months, or to both. A police officer could technically fall under this section should they get prosecuted. According to what I have seen over the years, however, a month suspension with pay as the IA office in the RCMP clears them would be all the punishment they would receive in my opinion. Another portion of Bill C-3 that is supposed to make people feel better about DNA collection are sections that deal with the "access of information to be permanent removed" to the destruction of the DNA samples, in some circumstances. Big Brother is very careful not to reveal one very important fact; even if, by a miracle, the RCMP did remove easy access to information after a pardon or other event, or if the tissue/blood samples were destroyed, the RCMP will keep the DNA profile. It will be kept on record permanently, despite the sections that deal with sample destruction, etc. Just like in Canada, Young Offender records are to be deleted from a person's criminal record after they become an adult. However, that wasn't the case for someone I've met. Her current "record" contained her record as a youth, even though she is an adult now. What I am driving at is that the police, at any level, cannot be trusted to remove access to information like a DNA profile. They are always suspicious, and will never remove/dispose of information that they can use to their advantage, even if it is illegally kept or obtained. Fortunately, the RCMP can't rape a convicted person of his or her DNA for all offenses (yet). Below is a list of primary offenses which require a mandatory extraction of tissue from a convict: (a) an offence under any of the following provisions, namely, (i) section 151 (sexual interference) (ii) section 152 (invitation to sexual touching) (iii) section 153 (sexual exploitation) (iv) section 155 (incest), (v) subsection 212(4) (offence in relation to juvenile prostitution) (vi) section 233 (infanticide) (vii) section 235 (murder) (viii) section 236 (manslaughter) (ix) section 244 (causing bodily harm with intent), (x) section 267 (assault with a weapon or causing bodily harm) (xi) section 268 (aggravated assault) (xii) section 269 (unlawfully causing bodily harm) (xiii) section 271 (sexual assault), (xiv) section 272 (sexual assault with a weapon, threats to a third party or causing bodily harm) (xv) section 273 (aggravated sexual assault), and (xvi) section 279 (kidnapping), (b) an offence under any of the following provisions of the Criminal Code, chapter C-34 of the Revised Statutes of Canada, 1970, as they read from time to time before January 4, 1983, namely, (i) section 144 (rape), (ii) section 146 (sexual intercourse with female under fourteen and between fourteen and sixteen), and (iii) section 148 (sexual intercourse with feeble-minded, etc.), (c) an offence under paragraph 153(1)(a) (sexual intercourse with step-daughter, etc.) of the Criminal Code, chapter C-34 of the Revised Statutes of Canada, 1970, as it read from time to time before January 1, 1988, and (d) an attempt to commit or, other than for the purposes of subsection 487.05(1), a conspiracy to commit an offence referred to in any of paragraphs (a) to (c); That's not all. There is a list of "secondary offenses." If a person is found guilty of one of the following offenses, tissue extraction is up to the discretion of "the court": (a) an offence under any of the following provisions, namely, (i) section 75 (piratical acts) (real piracy... not the warez d00d variety) (ii) section 76 (hijacking), (iii) section 77 (endangering safety of aircraft or airport) (iv) section 78.1 (seizing control of ship or fixed platform) (v) paragraph 81(1)(a) or (b) (using explosives), (vi) subsection 160(3) (bestiality in the presence of or by child) (vii) section 163.1 (child pornography) (viii) section 170 (parent or guardian procuring sexual activity) (ix) section 173 (indecent acts) (x) section 220 (causing death by criminal negligence) (xi) section 221 (causing bodily harm by criminal negligence) (xii) subsection 249(3) (dangerous operation causing bodily harm) (xiii) subsection 249(4) (dangerous operation causing death) (xiv) section 252 (failure to stop at scene of accident) (xv) subsection 255(2) (impaired driving causing bodily harm) (xvi) subsection 255(3) (impaired driving causing death) (xvii) section 266 (assault) (xviii) section 269.1 (torture) (xix) paragraph 270(1)(a) (assaulting a peace officer) (xx) section 279.1 (hostage taking) (xxi) section 344 (robbery) (xxii) subsection 348(1) (breaking and entering with intent, committing offence or breaking out) (xxiii) subsection 430(2) (mischief that causes actual danger to life) (xxiv) section 433 (arson - disregard for human life), and (xxv) section 434.1 (arson - own property) (b) an offence under any of the following provisions of the Criminal Code, as they read from time to time before July 1, 1990, namely, (i) section 433 (arson), and (ii) section 434 (setting fire to other substance), and (c) an attempt to commit or, other than for the purposes of subsection 487.05(1) a conspiracy to commit an offence referred to in paragraph (a) or (b); Not the entire Criminal Code, but a nice chunk of it nonetheless. If you've read my articles on Bill C-17 in previous issues of the Damage, INC. Newsletter, Section (c) of both the primary and secondary offenses shouldn't be a surprise. In Canada, thought crime or "conspiracy to" as they call it gets you the same penalty as if you actually committed the crime. "Conspiracy" is enough to allow the cops to forcibly steal tissue from anyone. Also, if a person has committed a crime before the passing of Bill C-3 there are provisions so that a sample of their DNA can be taken as well. Under 487.052 (1) of the newly amended Criminal Code, it is legal for the court, under an application from the prosecutor, to apply for a special order (called Form 5.04) so that "any number" of samples can be taken from a convict or young offender in order to create a DNA profile. What criteria will be used to decide if DNA profiles are desired from a particular convict? I'll list the criteria below: Criteria (2) In deciding whether to make the order, the court shall consider the criminal record of the person or young person, the nature of the offence and the circumstances surrounding its commission and the impact such an order would have on the person's or young person's privacy and security of the person and shall give reasons for its decision. Impact on a person's privacy? Any and all extractions have a dramatic impact on an individual's privacy. That kind of Big Brother duckspeak means nothing. The privacy of a convict is of no consideration to them in my opinion. That is the whole basis of acts like Bill C-3. In Canada and other countries, the protection of "society" is the weapon used to destroy individual privacy. Especially if the DNA data bank is maintained and controlled by organizations like the RCMP, which are only concerned about busting people... not privacy. That is why we have brought Kanada's new DNA Identification Act to your attention. Creating DNA profiles on victims, suspects, and convicted persons is only the beginning in my opinion. That is why I am so outspoken against this Act and the National DNA Bank. Big Brother works slowly, eroding our rights and destroying our privacy. In my opinion, this is only the beginning. Now that the DNA data bank is established, there is nothing stoping Big Brother from expanding it to include newborn babies (taking samples from the umbilical cords and sending them to a national laboratory for analysis) and so on. Any invasion of privacy is too much. It is too high of a price to pay just so the zombies in "society" can obtain a false sense of security, while Big Brother gains more of our personal information. Written by Shatazar ú Damage, INC. (C)opyright 1999. BREAKER'S REVIEWS - {REVIEWS} Canadian H/P Sites. Since I wasn't able to contact Breaker before the release of this issue, I decided to review some Canadian web sites. Even though the h/p scene in Canada isn't as large or known as much as in other countries, there are still some quality sites, groups and zines. So, read the reviews and then check out the sites. And if you have ideas for future reviews, contact us. Hack Canada www.hackcanada.com Hack Canada is one of the most well known Canadian h/p sites. It has a lot of resources and a generous archive section that offers an excellent assortment of texts, etc. The site is operated by CYB0RG/ASM and the rest of the Hack Canada crew. They're a knowledgable group of Albertans that support the Canadian scene by releasing relevant, useful information pertaining to many technological aspects of the telco, systems and devices. In addition to h/p texts and news, they have info on 2600 meetings for their area, 780/403 scene news, Canadian h/p info and links, etc. Plus, Hack Canada is updated frequently with new files and news. So make sure you check it often. They also seem to be a friendly, approachable, cool bunch of people from my experience. So don't be afraid to contact them. ;) One of HC's members named The Clone, submitted a couple of TELUS articles (see the H/P INFORMATION section) he wrote for this issue. Anyway, the only other thing I can say is that they're a quality group that's well respected in the scene... and their site is damn cool. Maniak.net www.maniak.net Located in Quebec, Maniak.net is another cool site. The big anarchy symbol that's displayed on their index.html page upon connecting sets the tone for what lies ahead. The site has information for newbies, Quebec scene info, news, numbers, a French zine named iGA, WWW board, links, etc. Most of the site is in French, which is the default. But there is limited English support as well. However, since I'm not fluent in French it's difficult for me to review their site. From what I can tell though, they're doing a good job of supporting the Quebec h/p scene. Nettwerked http://nettwerk.hypermart.net Nettwerked is run by The Clone. It's more than just your average h/p site. Besides just looking damn cool, Nettwerked is the home of a zine named K-1ine. Even though it's still a new zine (2 issues have been released thus far), the potential to achieve greatness is very evident. Meaning, it's a quality zine. Just as, after reading the first two issues of K-1ine it is apparent that The Clone knows/owns TELUS. ;) He's also an avid scanner, (manual/hand scanner) and you can find some of his scans in issues of K-1ine. And on Nettwerked, you can find links to sites that carry other Canadian zines... as well as other things such as DefCon pics (http://nettwerk.hypermart.net/defconpics). It's a great site with a zine that you should definitely check out. Visit it often as The Clone updates it often. Ontario Phreaking Home www.ncf.carleton.ca/~ba992/HomePage.phone.html This site contains pictures of various Bell cans (junction boxes, etc.) that are used in the Ottawa, Ontario region. It also has a small assortment of texts on phreaking and information on Ottawa's 2600 meetings. The Ontario Phreaky Home site doesn't seem to be updated regularly anymore. I don't want to disrespect them, but the name of the site is a little misleading since it isn't actually the home of phreaking in Ontario. Regardless of that, it does offer some good info for neophyte phreaks and the pictures are good. Phones of Zen http://poz.8m.com This site is the home of Lord Narayana's group, Phones of Zen. It's also the home of Blackzine (see the CROSSED WIRES advertisement). The site has h/p texts online, a unique personals section that lists hackers and phreaks from various NPAs... along with their contact info, etc. It also has information on the 2600 meetings in Calgary, projects, links, etc. Lord Narayana is also into scanning and many aspects of phreaking. Basically, he's a diehard Canadian phreak and his site reflects that. And he's a cool person too. ;) PLA Alberta www.linuxchick.com/jester Most likely you've run across a few PLA affiliate web sites before. But not all PLA affiliate sites are alike. Some are small and lacking. While others offer more local phreaking information, and are dedicated to supporting the h/p scene in their NPA/State/Province. Jester's site, PLA Alberta, falls into the latter category. Jester is also the editor of a zine named ALP. His site is fairly large, has a mailing list, message board, etc. Overall, PLA Alberta offers good information and has a nice layout. So check it out and tell Jester I sent you... ;) PLA Quebec www.multimania.com/hak2600 The h/p scene is still alive and well in Quebec. And it'll remain that way as long as sites such as PLA Quebec are around to support it. It's a well organized site with texts, PLA news, 2600 meetings info, a phone book, info specifically for newbies, payphone numbers, a message board, links, etc. PLA Quebec is a large site with many pages of information for Quebec phreaks. They're doing an admirable job of supporting the phreaking scene in Quebec's NPAs. Much better than many of the h/p sites that are left in Ontario. Written by BLACKENED ú Damage, INC. (C)opyright 1999. CONSPIRACIES AND COVERUPS - {COVERUPS} What really happened at Waco in 1993. What really happened between February 28 and April 19, 1993 at the Branch Davidian compound in Waco, Texas? Who is responsible for the deaths of the 80 people that died during the stand-off? Should David Koresh shoulder the entire blame? Could the situation have possibly been handled differently? Was there any way that the final outcome could have been less catasrophic and deadly for so many people? Couldn't this have been prevented somehow? Wasn't there any way to avoid the disaster? Were the actions of the ATF, FBI and other law enforcement agencies justified? How did President Clinton and Janet Reno's involvement affect things? Was there a coverup? Were any of these questions answered in 1995 during the Waco hearings? Those are just some of the many questions that people have regarding the 1993 incident in Waco, Texas. Many of you probably watched CNN's coverage in shock, horrified and disgusted by the images you were shown on that fateful day. And after it was all over, you didn't have any answers because the mass media didn't have any to give. Some of you continued to follow the story, long after the media had dropped their coverage of it. A few of you may have even watched the hearings or read the reports that were issued. Of that, a small percentage of you don't believe what you've read and been told to believe. You still have some questions that you'd like answered. You're still seeking the truth. This article was intended for you to read. The research that I've done is for your benefit, so that you may know the truth about what really happened at Waco, why it happened and who is responsible. Admittedly, I still have questions that haven't been answered. In other words, I don't have all of the answers. Nor do I have the resources to investigate the situation the way that I'd like to. However, I've tried to gather as much reliable information as possible from various sources and research the topic thoroughly. Entire books have been written on this topic, so don't expect all of the details to be included in this brief article. There's just too much to cover in one article. I don't think there will ever be a complete resolution to the events at Waco and what occurred inside of the Branch Davidian compound. There are certain things about the story that we'll probably never learn. There are always things that are never known by all. But at least with part of the story, the pieces of the puzzle can begin to be assembled to create a clearer picture. After that, it's up to you to take it from there and form your own opinions. Most people already know that ATF agents raided the Waco compound and a fire fight ensued. And many of the negotiations were taped and have been released, so I'm not going to cover any of those early events. I'm going to skip ahead to the end of the siege and take you through the final day at the Branch Davidian compound. On April 19, 1993 the tanks began punching holes into the exterior walls of the Branch Davidian compound. Contrary to their claims, they weren't being fired up on. They weren't under any type of attack. Helicopters and planes flew over and much of what occurred was caught on tape, forever documented. And so that's where the real Waco story begins. It was a windy day with gusting winds that could easily spread a fire throughout a building (in this case, a highly flammable wooden structure). But the FBI went ahead anyway and continued poking holes into various locations of the compound. Then they began inserting CS gas in large doses. CS gas is supposed to be a non-lethal weapon, but when combined with fire a deadly offspring known as cyanide is produced. Also, CS gas has been tested on US Marines, but they are only subjected to small doses of the gas over a very short duration of a few seconds. The Branch Davidians were exposed to massive doses over a 6 hour time span. Plus, there were 22 childen in the compound, as well as older adults. CS gas (at levels as high as 10 times that which Marines are exposed) is much too strong an agent to use against children and elderly people. David Koresh and the Branch Davidians were accused of starting the fires. Yet there is no solid proof that they were responsible. All they have are theories, such as lanterns being knocked over and lighter fluid being used to start fires throughout the compound. After the compound had burned to the ground the fire was out, Texas Rangers were delayed and prevented from conducting an investigation for hours while other agencies went through any remaining evidence and "cleaned up the crime scene." In my opinion, the whole situation should've been handled differently. Janet Reno and President Clinton should have been held responsible for the actions of the ATF and FBI. And a real investigation should have been performed instead of allowing the events to be covered up and forgotten. I've watched several documentary tapes from the final day at the Waco compound. In those tapes, it clearly shows FBI agents firing into the compound from behind the tanks. In some cases, they were firing at Branch Davidians that were attempting to escape. The flashes of light (captured on an infrared camera from a helicopter overhead) indicating a weapon being discharged are plainly visible on the tapes that I've seen. It even shows one person being crushed underneath the tank's track. One of their limbs was ripped away from their body and temporarily became caught in the track, which made the operator of the tank move the vehicle back and forth in an attempt to free it. But somehow the track was dislodged, adding further proof of what had happened. Even as the fire was burning at full force and the building was engulfed in flames, shots were being fired into the compound by FBI agents. I'm sure that many of the bodies that were found with bullet wounds contained rounds from the FBI's weapons. They've never proven that they were all self- inflicted wounds. Nor have they proven that there was any "mass suicide". Lastly, I've included a copy of Attorney General Janet Reno's statement and a document from The Department of the Treasury which details the weapons possessed by the Branch Davidians. Both were written and released in 1995. I think you'll find them interesting. During my research of the Waco seige, I read the U.S. Government reports, watched several television documentaries, visited web sites and generally read as much material on the topic as I could get my hands on. Short of speaking with David Koresh through a clairvoyant, I did everything in my power to learn what really happened and uncover the truth. In my humble opinion, Waco represents a government conspiracy and coverup of immense proportions. Clinton, Janet Reno, the ATF, FBI, etc. all fucked up. Then they tried to back each other up and cover up the true events that had occurred and were documented. So, in conclusion, it's your choice as to who should be believed. But hopefully after reading this article, you'll think twice about automatically taking the government at their word. If nothing else, it is my hope that people learn that under no circumstances, in any situation should they have complete trust in a government that's already proven itself to be untrustworthy and absolutely corrupt to the core. And in my view, the U.S. government couldn't do anymore to prove their guilt than they've already done. I suggest that you visit the web sites below if you want further information on the Waco coverup. Sources: http://www.pbs.org/wgbh/pages/frontline/waco/ http://rampages.onramp.net/~djreavis/faq/index.htm http://www.parascope.com (Search for "Waco") - Not all info there is accurate. Written by Blackie Lawless ú Damage, INC. (C)opyright 1999. CROSSED WIRES - {WIRES} An Advertisement for Blackzine. . . züø~ ~ü$û3z. züøüz $$$$$ . `üz..z' `$$$$ ,m@$ $$$$$ z..z$ . . .$z.,z.,z$ûü' $$$$$ ,z@$üø~ $$$$$ ,z$$$ü~øü$@z. $$$$$ $$$$$ $$ $$ `$$@z. $$$$$ üøøüz $$$$$ $$$$$ züøøü $$$$$,û$$ü' $$ $$ `$$$$ $$$$$ ,z@$$üø~$$$$$ $$$$$ $$$$$~ü$@z. $$ $$ ,$$$$ $$$$$ $$$$$ $$$$$ $$$$$ üz..z $$$$$ $$$$$ $$z$$z,z$$ûü' $$$' `üû$$z' $$$$$ `ü$û$z .,z$ûü' $$$$$ $$$$$ ,z@@üøü@@zzzz $',z@@z. üøøüû `üû$ z$$$ü' . $$$$$$ $$$$$ ~øü$$@z. ,z$$$ü~øü$@z. ü ,$$$$' `üûûü' $$$$$ $$$$$ $$$$$ z$$$$ . ,$$$$' $@zz@$ $$$$$ $$$$$ $$$$$.z@$$ûü' ,4$$$' `z . $$$$$$ $$$$$ $$$$$ $$$$$ z..z z$$$$z. ,z$$z $$$$$$ $$$$$ $$$$$ `ü$û$z .,z$ûü' `øüüøøøüüüüüø' øüüøøü Editor: Lord Narayana . . http://poz.8m.com lord_narayana@hotmail.com Comments by BLACKENED: Blackzine is one of the coolest Canadian h/p zines (written in English) in publication today. They may not have a lot of writers, support or a tremendous amount of notoriety, but it's still quality. The most recent issues are excellent and definitely deserve a look, especially if you're in the Canadian scene. It's very evident that they're actively involved in the Alberta scene. Issues are available on the Phones of Zen web site at the above URL. If you want more information about Blackzine, and how to contribute, contact Lord Narayana. Notes about Crossed Wires: Since this section was created I've received Email from quite a few people regarding advertising here, the requirements, cost, etc. To reiterate what I've said in previous issues, it's free. The whole "paid advertisement for" thing was just a joke, but apparently some people thought that it was real. Basically, we'll include ascii ads for almost anything (boards, cons, nets, groups, zines) for free as long as it's h/p related or is interesting in some way. Hopefully the guidelines and purpose of Crossed Wires are now clear to everyone. H/P INFORMATION AND NEWS - {H/P} "What is the Matrix?" _+ +_ TELUS Mobility; Panasonic EN-POWR numeric pager exploit __ __ Telus Mobility offers to its customers, a few types of paging services. One type is called 'EN-POWR numeric pager'. With the EN-POWR numeric pager, you get total FLEX coverage. In other words, you get coverage all across Alberta. The Panasonic EN-POWR pre-paid numeric pager is only $99.95, and it comes with 6 months of enhanced service with a limited but nifty selection of assorted colors to choose from. "But Clone, I have three kids to feed. I can't afford this type of service!" It's completely understandable. That is why I wrote this file. To show you how to get service that *should* be dirt cheap for absolutely free. Lets say that one day you were walking down the street minding your own business, picking flowers, waving to Telus employees as they drive past in their goodie-vans, when you trip over a pager that has the word 'Panasonic' labelled on the top. This semi-transparent device, with its groovy design is the only thing stopping you from suing Telus for leaving its property laying around. Then you remember that it's an EN-POWR pre-paid numeric pager and it has to be property of someone. "Hmm..." you think. At this point you can do one of two things; you can call Telus reporting a missing pager, or you can try to use your wits to find a way to exploit this. First lets take a look at the pager features: Pager features -------------- · saves 23 messages · message time stamp · built in alarm clock · silent vibration or audible alert · low battery alert · shows date and time of day · selective erase/erase all · locks important messages · uses only one AAA battery · FLEX technology gives you up to four months battery life · duplicate message indicator · reminder alert · backlit display · automatic on/off 'Saves 23 messages', thought of anything yet? ;) Sure you have my analytical friend. Along with numeric paging option, you also get a voice-mail paging option which requires you to dial the number the pager is subscribed to. So you think "How am I going to get this pager number?" ------------------------------------------ One easy way is to wait for someone to page you. Usually friends of the pager customer, don't know the pager is in the wrong hands so they unknowingly send them a voice-message. Bad idea. The minute they send that message, the data is sent to the Telus Mobility switch, and straight to the pager itself. What is displayed? The pager number, silly! (note: if a numeric page is sent, the numbers displayed on the screen are whatever the person who sent it typed.) The next step is easy, you call the number. The next thing you'll hear is one of two things; 1. the customers message, 2. Telus' default message. By simply pressing '0' on the keypad, you'll next be prompted by an automated voice saying: "Please enter your access code". "How do I acquire the access code?" -------------------------------- If the customer was stupid enough to set the default access code, all you do is look on the back of the EN-POWR numeric pager, and search for the "capcode". The capcode is the series of numbers at the bottom of the label, below the Model, Serial Number, Country Code, and ISC code. It's easily distinguishable by the letter E and a 7 digit code after it. An example of a capcode is 'E1230948'. The default access code is the last 4 digits of the capcode. 0948 would be the access code for this pager. Now enter 0948. If you're lucky you'll get the main menu. My suggestion to you is to change the access code as soon as possible. If you're not so lucky, try guessing defaults. 1234, 1111, 1999, 2000, etc. Until you come across the correct access code. If you're still having trouble, try selling the pager to some moronic 14 year old who just wants to look cool in front of his sleezy 14 year old girlfriends'. Final words ----------- Now that I've given you step by step instructions on how to exploit the EN-POWR pre-paid pager, I hope that you've learned a little bit about how it works. In the next few months I can see the news talking about hundreds/thousands of Telus pagers going missing and then used for the thieves' evil purposes. I'll sleep well at night knowing I was the one responsible. THE END written by: The Clone June 22, 1999 `Contact inf0 ---- E-mail: theclone@edmc.net URL: Nettwerked - http://nettwerk.hypermart.net Voice Mail: So-Soft Corporation - 1-800-494-9831; box 407 -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_- Corner Advantage Teleconferencing / Bridge Skanning -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_- Telus Advanced Communications (TACS) offers a service called 'Corner Advantage Teleconferencing'. A service which allows its customers to connect to a multiple-user-bridge to: * keep field offices informed about new policies and programs; * announce new products to branch offices; * hold regular status update meetings; * resolve emergencies; * review product development; * reach several reporters simultaneously for a news announcement; * brainstorm and plan marketing and sales strategies; * resolve labour relations issues; and * interview job applicants. * etc. Some of the features with this service include: * highest quality sound with minimum background noise; * security passwords; * mute feature so specific lines can listen only; * taping your conference onto cassettes; * polling to record votes from opinion polls and focus groups; How to set up a bridge conf: * Dial 1-800-900-MEET (6338) * Follow the voice prompts and select Teleconferencing * Reserve the date, start time and duration of your meeting and the number of ports required. Now that I've outlined the basic features of Corner Advantage Teleconferencing, I'd like to share with you an idea that came into my mind; Bridge Skanning. How do I find a bridge? ----------------------- Most phreakers who do find bridges do out of dumb luck. They are usually skanning a prefix looking for VMB's, PBX's, ANI's, and modem carriers and to their suprise they find a bridge. What I did was I called up 1-800-900-MEET, and said: "Hi there. I was wondering out of curiousity, what prefix or prefixes do the Edmonton bridges use?" Being gullible and unware of my intentions, the perky Telus operator gladly gave me the prefix. A few hour later I called back and asked if there were any other cities that had CAT (Corner Advantage Teleconferencing). Calgary apparently is the only other city that does. Using the same "social engineering" technique, I snagged the other prefix and glady grinned because now I had completed the first step in finding a bridge. Seeing on how I like to help out fellow local (780/403) phreaks, I'm going to post the prefixes. City NPA: Pfx ---- --- --- Calgary 403 216 Edmonton 780 460 !Yipee! ;) Now go ahead! Skan out these prefixes and you'll surely find yourself on a bridge conf. From what I've heard, if you do happen to connect to a bridge you'll obviously hear many parties talking. What my suggestions to you are: * Keep quiet * Listen to what is being said and write down potentially "important" info. Because remember, most bridges that are up are corporations. And we know the conspiracies bureaucrats create. * If possible, record the conversation using a ear piece-like device you can pick up at your local Radio Shack for about $10.00/CDN each. -- I hope I've helped fellow telco enthusiasts, pissed off some Telus employees, and made phun for all! Happy CAT-skanning! Created by: The Clone Date: June 13, 1999 Contact info - URL: Nettwerked - http://nettwerk.hypermart.net E-mail: theclone@edmc.net Voice Mail: So-Soft Corporation - 1-800-494-9831; BOX 407 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Nortel's Millennium Desktops (helena3@antisocial.com) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- If you live in Ontario or Quebec, Canada you've probably already seen the three different versions of Nortel's Millennium payphones that Bell Canada has installed everywhere. Maybe you've even made a few calls using them. I'll give you a brief explanation for each model of Millennium just in case though. The first type is the Universal Millennium (named due to its ability to accept coins, credit cards, calling cards and Bell QuickChange pre-paid cards). In the majority of large urban areas, they are the most common type of payphone that can be found. The second type is the Millennium Card (otherwise known as a card phone). The last type is named the Millennium Desktop and it is the focus of this article. It's also the least common variety of Millenniums since they aren't easily found. They aren't everywhere. They aren't installed in just any location. In fact, I have only seen them in select places (usually they're placed in public buildings) and they're always indoors. Their design isn't very suitable for outdoor use. Even though I've read other text files written on the other types of Millenniums, I have yet to see any that cover the Desktops. That's why I decided to share my knowledge and experience with them. Basic Common Features: Note that basically all of these Desktop Millennium features are the same as the ones found on other Nortel Millennium payphone models. I'm just covering them for people that know nothing about them or have never used a Millennium. - Like the other Millenniums, Desktop Millenniums don't accept incoming calls. There's even a notification in small print stating that on the front panel. - LASS codes (*##) such as *67 don't work on Millenniums. - Desktops have ringers, but you might never hear the sound of them ringing. To hear the bell chime, you have to convince an Operator to call the phone for you. Otherwise, if you dial it directly yourself you'll hear the following Bell message: "The line you are trying to reach is equipped for outgoing calls only. It is impossible to receive calls at that number. This is a recording." and then a Busy signal. - Programmable LCD display that supports English and French. Usually there's a scrolling text message that's been entered by a Bell employee to advertise. The LCD display is covered in plastic to prevent damage to the display. However, it can be scratched and punctured if you're very determined. - Alarm. Each Desktop Millennium is equipped with an internal alarm that's designed to protect it against theft. In this case, they want to prevent the use of stolen or fraudulent credit/calling cards. Inside Millenniums there's a small, powerful computer that logs every call that's made and the method of payment that was used. In Universal Millenniums, the computer is responsible for handling coin payed calls and can detect the use of slugs, etc. easily. It also monitors the yellow card reader, LCD display and can activate the alarm. If it detects anything suspicious or abnormal, an alarm is sent to a Bell Canada Central Office and a linesman is dispatched to check it out. If you modify the display, it might trip the alarm. If you steal the card reader or entire Millennium, it might activate the alarm. It has even been rumoured that they have a tracking device that calls Bell and relays its location everytime it's connected to a line. Some people claim that it can give away the location by means of an FM signal. I don't know if they have a transmitter that can emit signals or not. Since I can't verify it, just be careful. - Recorded Dialtone. If you don't insert a calling card or press any buttons to dial a number, after a few seconds it'll interrupt the so-called 'dialtone' (which is totally fake) and instruct you to "Please insert your card..." The real dialtone is muted. The Millennium payphone doesn't actually dial the number you've entered from the keypad. It dials the number itself after the Millennium has established that payment has been made. That's why you have a couple of seconds to change the number you entered before it dials. The computer does the actual dialing. Obviously that's ones of the things that prevents any normal red boxing methods from working. - With all other Millenniums and other payphone in Canada, toll free calls (1-800/877/888) are free. Dialing 0, 311, 411 (Information), 611 (Repair) and 911 are still toll free, as usual. - French/English button (toggles the language of choice) - Volume control (increase/decrease) - Next Call (diamond) button. - Yellow card reader. Although the other Millenniums are equipped with card readers, the Desktop Millennium models aren't as sturdy. Instead of using a more expensive yellow painted metal card reader casing, they're just plastic. Features not included: - They don't accept coins, so they obviously don't have a coin slot, coin return or a hopper (coin box) inside. At least you won't ever get screwed by inserting a $1 coin to make a local 25 cent call and not get any change. - They don't have the special emergency buttons like the other Millenniums. - They might have a special Operator flag (showing that they're a Millennium Desktop model). If that's the case, you can't even use them to red box by dialing the Operator and fooling them with quarter tones, since they'll know you can't insert coins into the payphone. All Millennium payphone numbers have the payphone flag turned on. I'm just not sure if the Desktops have a special flag or not. Physical Description: Millennium Desktops are larger in size than a normal residential phone. They're approximately one and a half times the width, which makes them about 10-12" or so wide. The increased width is mainly due to the display and card reader externally as well as some internal Millennium components that aren't inside of the average person's home phone. When mounted on a desktop, they are slanted or sitting at an angle so that the top or back of the phone is higher than the front. I'd estimate they're mounted at an angle of at least 45 degrees, perhaps greater. If the Millennium is wall-mounted, there isn't much of an angle at all. They're relatively flush against the wall's surface. The outer casing, handset and receiver cord are all black in colour. The actual buttons are grey coloured. There's a yellow coloured card reader attached to the right hand side of the payphone. The handset and hook switch are positioned on the left hand side. The handset's cord is of average length. The LCD display is fairly large and is located at the top portion of the phone about the keypad. It spans most of the width of the phone and the text it displays is light blue coloured (similar to the LCD display on Kenwood stereo receivers). Above the left hand corner of the display is a Bell Canada logo. To the right of that it shows the credit/calling cards that are accepted. It also has a 'no coins accepted' logo. Underneath the display there's more information about dialing, usage, etc. Surrounding the display where the logos are the phone is dark Bell blue. There's also the same blue and yellow where the additional information is shown on display. The volume control is directly beneath the keypad. The next call button (with a diamond on it) is above the dialing pad and the language button (which is a toggle for changing the text shown on the LCD display from English to French) is above that. The default is English in most areas. The port for connecting a laptop is located on the left hand side of the payphone, near the location where the handset's cord is attached. The connections running into the Millennium itself can vary slightly from the wall-mounted and desktop mounted models. The wires are either concealed in metal piping that runs down to the top portion of the payphone (in the case of the wall-mounted Millennium Desktops), or the wires are more exposed and run into the back right hand corner near the card reader. But that may not be the case with all Millennium Desktops. I once saw one that was hooked up extremely shoddily. The wires were all in a jumbled rat's nest, stuffed behind the payphone and connected into a telephone jack. It wasn't just a mess. They were fully exposed and anyone with malicious intent could have easily snipped the wires, removed the Millennium and took off with the payphone as a trophy. Needless to say, they're extremely vulnerable. I hope that my descriptions of the physical characteristics of Millennium Desktops are clear enough that they've been helpful. If not, then I'll try to get a few pictures of them and send them into Damage, INC. so they can be displayed on their web site. I realize that not everyone has a payphone like these in their area, so that's why I've tried my best to describe them fully. Special Characteristics and Features: - Unlike the other Millenniums, Desktop Millenniums can be either wall mounted, fastened to a desk or if you're industrious, removed and used as a beige box. (Yes, they can easily be converted to a beige and are very portable!) - They don't accept coins. They only accept credit cards, calling cards, QuickChange cards and other types of pre-paid phone cards. - They're equipped with a port that's located on the left side of the phone near the handset/receiver cord connection. It's a standard telephone jack connector that allows you to hook up a laptop. This feature is really handy for h/p expeditions like scanning toll free numbers, hacking codes (VMBs, PBXs, whatever) or hacking any systems (carriers) you find, etc. It's free and also a relatively safe method to use. - In many cases seating is provided so that while using the Desktop Millennium you don't have to stand for the duration of the call. Additional Info: - Just as on Bell QuickChange cards, there's a notification on the actual Desktop phone regarding the use of calling cards, instructing users to leave the card inserted in the card reader for the duration of the call. However, it isn't actually necessary. Upon picking up the reciever the Millennium plays a message that instructs you to fully insert your card. - You can use a tone dialer to call out on Desktop Millenniums (ie, your hands never touch the keypad). Obviously you can't do it while the recorded fake dialtone is playing. But if you wait a few seconds for the Operator message that asks you to insert your card to be played, stick in a QuickChange card and then use your tone dialer, it should dial and work just fine. Final Comments: Desktop Millenniums are Nortel and Bell Canada's idea of "the payphone for the new Millennium". Some people think they're a phreak's worst nightmare. Some phreaks are afraid of their security features, such as the alarm, etc. Others don't like the fact they can't red box from them because of the fake (recorded) dialtone. And a few of the older phreaks just miss the old Centurions. Regardless of what you think of Millennium payphones, they're everywhere and here to stay. Bell is replacing all of the Centurions with Millenniums as fast as they can. One of the reasons is that they want to encourage (ahem, force) people to pay for calls using their calling cards. Bell is doing everything they can to discourage people from using coins to make calls. They want payphone users to use cards for any calls they make, including local calls. Yes, it's stupid. But like it or not, that's exactly what they're trying to do. If you have any questions or comments about my article, please contact me (Helena3) by sending Email to helena3@antisocial.com. I'm always happy to meet new people, especially other phreaks. Note from Damage, INC. - If you want to learn more about Nortel's Millenniums, you should read Aftermath's text file. It's available to download on Wraith Tech Industries web site at http://www.internettrash.com/users/wraithtech INTERVIEWS AND INTERROGATIONS - {INTERVIEWS} In this issue there are interviews with two people that are well known in the h/p scene. The first interviewee is RedBoxChiliPepper (PLA). The second is Logic Box (System Failure). Hopefully they give you some insight into them and their respective groups. Enjoy. As always, = BLACKENED's questions. I'm sure you can figure out the rest. Alias: Alex, RBCP, RedBoxChiliPepper, You Little Fucking Punk Motherfucker, Group: Phone Losers of America Age: 26 1/2 Country: Phone Losers of AMERICA. Description: A big tall dorky-looking semi-hacker, high school dropout and all-around prankster. Interests: No matter what I'm doing I prefer to do it while staring into a computer monitor all day. I plan to be blind by the time I'm 30. Outside of the house I like going to the movies, swimming, diving, biking and playing really really stupid and meaningless pranks on innocent people. Email: rbcp@phonelosers.org URL(s): http://www.phonelosers.org/rbcp/index.html - Introduce yourself to the readers of the Damage, INC. Newsletter... I guess I've been into the whole h/p scene for only about 7 years or so now. I discovered BBSing in 1989 and found all those old cheesy 80's anarchy/hacking files in 1991. By then I was heavily into all of it and after reading the famous Capt'n Crunch Esquire article I was completely hooked forever. I'd always been into telephones and computers even though nobody else in my family ever seemed to be interested in it and I could never seem to find anyone in the local BBS scene into the whole h/p thing. I started writing my own text files in hopes of finding someone else to share my interests with and started uploading them to all the local BBSes. This more or less failed but I kept writing files just because I enjoyed doing it. It wasn't until 1994 that me and el_jefe started the PLA. - How and when was the Phone Losers of America started? What are the goals and purpose of PLA? I'd already been trying to think of a decent name for a text file group but couldn't come up with anything. I had cleaned up the formats on a few of my texts and named them RBCP0001.TXT, RBCP0002.TXT, etc and planned to release them that way but then el_jefe was messing with some local lamers on a BBS and told them he was going to start an elite hacking group called the Phone Losers of America. The name fit perfectly so I immediately stole it from him and created the PLA. The main reason I wanted to start a new text file series is because all of the others took themselves way too seriously and tried to be elite as possible to impress all their peers. There were a few exceptions but only a few. The funniest thing I could find were the joke issues of Phrack and a 'zine called Brotherhood of Warez which weren't even that funny. I figured if I started something that was purely H/P/A humor, others would follow and maybe people would just lighten up a little. - How was the PLA Telephone Director0y started? Like everything else with the PLA, I stole the idea from somebody else. (What? You expected me to be original??) In my extensive collection of anarchy texts a few of them were nothing but lists of interesting telephone numbers to call and almost all texts had a few BBSes to call on the ends of them. The only problem was that these numbers were almost always outdated so I decided to make a phone directory that would be updated with every single issue of PLA. Before I got around to executing that plan Colleen Card (then my girlfriend, now my wife) suggested that I make it a quarterly phone directory. While I never was able to keep up with the "quarterly" part of it, I managed to release 7 issues of it before handing the project to the United Phone Losers. Believe it or not I started collecting pay phone numbers when I was about 10 years old. My best friend thought it would be hilarious to call somebody at a pay phone and be really stupid at them. So I rode my bike to the Wilshire donut shop in East Alton, IL (now a big tourist attraction because it was the first pay phone ever collected by me) and wrote down the number to their phone booth. We let it ring for about 45 minutes until somebody answered it. By the end of the year me and him had put together a list of about 90 pay phones all over the area. I never thought I would still be doing it when I was 26. Geez, what a loser I am. The ANI section is obvious - people are always asking for ANI numbers so a constantly updated list makes perfect sense. Telco test lines are just fun to hear, TDD machines provide plenty of entertainment. Probably the weirdest section would have to be the Roy section. I won't get into why we were/are obsessed with the name Roy, but by the time I released the first directory I thought it would be funny to dedicate a section to people and businesses named Roy. I imagined a nation of Roy's being harassed just because they were Roy although I'm sure this only confuses people and nobody really thinks it's funny. - How has PLA changed since the first text issues were released? The most noticeable change would be the fact that it went from a tiny text file group into an electronic 'zine. As more and more people became interested in the PLA I followed everyone's advice who emailed me and created new sections and tried to write about what people were interested in. By the time issue #46 (the last issue) came around we usually ended up with a huge letters section, several articles, news and other random bits of information and humor. - What types of things can be found on www.phonelosers.org? Well, of course there's an archive of all the old PLA issues in both ascii format and html. Some of our sound clips relate to a few of the old issues such as the Dino Allsman series. Basically what you'll find on the main page is a bunch of links to other H/P pages that are updated with more current information than I'm able to provide. By the end of the summer you'll start seeing a bunch of useless online videos called PLA TV which I've been planning to do ever since I ditched the PLA 'Zine project but have always been to lazy to get around to. In my opinion though the best part of my site has got to be the PLA State Site Database. There are now over a hundred privately-run PLA sites on the net, each serving up information about a specific home town or state or area code. This started out as a plan to get people to find other phreaks near them and has had some excellent results. I remember when I was first getting into all of the H/P I never really had anyone to share my newfound tricks with or anyone to help me brainstorm ideas. I'm hoping that by using the state sites people can help overcome this problem for themselves. - How do you think the Phone Losers of America are viewed by the majority of visitors to phonelosers.org? Judging from the e-mail I receive I think most people more or less get a kick out of the information they find on our site. Some people will tell me that they stayed up until daybreak when they found my page because there was so much to read. One guy told me he missed a day of work because he found my page a few hours before he was supposed to go in and didn't want to quit reading and laughing. As far as the actual hacking community goes, I hear most of them going on and on about how lame the PLA is and how we don't know anything and couldn't hack our ways out of a paper bag. But they just don't seem to get the fact that they're supposed to come to our site to laugh, not to learn the latest phone and hacking exploits. It's all nothing but a joke, people! I should probably put a big disclaimer splash screen on my site titled, "Prepare to Lower Your Expectations..." - Are you still actively involved in phreaking? What do you think of the current phreak scene and how has it changed since you began? I'm not into phreaking as much as I was 3 or 4 years ago but I still try to keep up with everything and I'm constantly working on really weird and pointless projects. Like right now I'm compiling a huge database of all the area codes / prefixes within a one hour radius of my house and the corresponding phone company wire center to each one. Once I'm done (I almost am now) I'll have no use for the information and I'll probably just post it up on a web page somewhere for other people to find and use. As far as the current phreak scene goes, I think it's better than it's ever been thanks to the net bringing everyone together. People in alt.2600.phreakz and alt.phreaking are always going on and on about how phreaking is nearly dead and the scene is in danger and things are aren't like they used to be but people in the scene have always seemed to have this attitude while things are going on in the scene just like they always have. The only things that have really changed is that all the information is so much easier to find now and it's easier to find other people interested in the same projects & exploits as you are. I think people pick on the newbies too much but that's probably just because they're coming in floods now since every kid in America now has computer access and they want to be a hacker RIGHT NOW! I get a lot of e-mail from newbies and I usually just try to answer their questions and point them in the right direction to read more about it themselves. - How's Jim Bayless these days? I actually still get a lot of e-mail about Jim from people trying to track him down and talk to him about me. The only reason I used Jim Bayless's name so often in the PLA issues was because I was excited that a phone company security guy was actually interested in me. During the PLA Days I used to occasionally call Jim every time I moved to a new part of the country and he would always trace my call and would ask me, "So ALEX, how was the whether in Washington last month??" like he was going to scare me or something. A friend of mine in Oregon who goes by the nick kcochran actually called up Jim very recently and told him he knew me and just wanted to know how come he didn't like me. Jim talked with him for quite some time and told kcochran that it was a personal issue because I once had his secretary patch through a call to his home in the middle of the night. He also said he had a copy of my W2 tax forms from Indianapolis and knew all of my real info. Anyway, Jim is still alive and working in corporate security. I probably haven't called him in about five years now but I'm sure he still remembers me. - What has been your experience with telco employees as a whole? All in all I think telco employees are cool people. Most of the employees I deal with are over the telephone and it's a pretty rare experience for me to actually talk to one in person. Once in Galveston, TX I saw an employee finishing up some work and getting into his van so I held up my red box and screamed out the window at him, "I just red boxed a call on that pay phone over there!!" and he actually got in his truck and followed me around the island for about 15 minutes. I don't know if he was trying to get my license plate or what. I think my most frightening experience with an employee also happened in Galveston while I was red boxing on a storefront pay phone with a bulky (and loud!) tape recorder. I was talking to a friend and had just deposited some money to continue my conversation and a minute later a guy taps me on the shoulder. I turn around and it's a Southwestern Bell employee. He says, "Could I get in here for just a minute?" and uses his key to open the coin box, empty it and leave as he says, "Thank you." I was in shock for a few hours after that. - Do you read any h/p related zines? If so, please list a few of the ones that you read and respect. Oh yeah, I can't get enough of H/P articles no matter what they're about. Of course I read Phrack and 2600 but I also keep up with just about all of the lesser-known groups because what they might lack in knowledge they definitely make up with it in humor. A few of my favorites are System Failure who recently released their very last issue (www.sysfail.org), United Phone Losers come out with something every month or so, The Phone Rangers don't have a 'zine but they have short stories on their web page that are entertaining. I could go on and on, I read just about everything I come across. If you visit the phonelosers.org web site you'll see links to a few of my favorite sites along the top of the screen and even more in the links section. The only other 'zine I've written for is System Failure which I think I did a total of two or three articles for them. I also started an archive of IRC logs after I quit writing PLA (www.phonelosers.org/peachey.html) which started out detailing our harassment of some girl on IRC but is now updated every few months with interesting e-mail I receive and interesting and humorous things I find on the net. It used to be called Peachey Incorporated but I recently changed the name to the more elite, hard-core sounding Pink Fluffy Phreaking Bunnies. - Which h/p groups, if any, do you respect? I think I named most of them in the previous question. I guess a few others would be WraithTech, National Telco Opposition Party, Phone Punx Network and United Phreaks Syndicate. It's not really a matter of respecting them, it's just the sites I find the most useful and entertaining. - Which web sites do you usually frequent? I spend a good 5 hours a day (while I'm working) browsing the net. I'm not a regular visitor to many sites outside of all the H/P sites that I've mentioned before, but I mostly spend time on the search engine pages looking for anything interesting. - Have you ever been busted? Or, do you know anyone that's been busted? If so, would you like to describe the event, the circumstances of the bust and the conclusion? I've been busted many times but it was never really directly related to H/P. The first time was in Albany, Oregon where they THOUGHT they were busting a big-time computer hacker but I was just using extrapolated credit card numbers to make free phone calls. They had been working on the case for months and were completely stumped because I was operator diverting to make it appear as if the calls were coming from another location. I happened to use the same number every single time so apparently they were really watching this one guy who worked for the company I was making my calls come from. They finally figured out who I was because I had called an employee complaint line for a business that I worked for at the time. They ransacked my room, took everything that they didn't understand and hauled me off to an interrogation room where I cooperated fully. They estimated that I stole somewhere around $10,000 in phone calls so I was given a fine of about $250 and told not to do it anymore. The second time I was busted was again for a credit card offense while trying to fly Colleen Card home to Oregon from Texas. Even though they knew I had flown her there on a stolen credit card number, the case was completely dropped and my only punishment was that I ended up spending about 36 hours in the jail's drunk tank. I was also busted in Ohio for calling up a lady and talking her into giving me her credit card number. So I guess if I wanted to give any advice to your readers it would be to not mess with people's credit cards and you shouldn't have many problems! One of the most recent events that's happened to me would be the police showing up at my house to talk to me about Gwonk's case. I don't know many of the details on the case, I just know that Gwonk didn't really do anything major but he's been in jail now for some kind of computer hacking charge but he's out now. Two police officers and a "computer expert" drove nearly three hours to my house because they figured I must somehow fit into the whole hacking scheme. I let the cops come in, took them to my computer room and told them exactly how clueless I was. They asked if they could let their "computer expert" come in and look at my hard drive. Since I didn't have anything questionable on my drive I said sure and the "computer expert" came in and did his thing. The thing was that this "computer expert" never broke out of Windows 98, he just opened up Explorer and went to town surfing my hard drive. He didn't use any special software and didn't play with any of my settings so if I had any hidden directories with all my illegal hacking stuff he sure wasn't going to find it. He also didn't bother looking at our computer upstairs since he could view it on the network. He just assumed that I had all of my hard drives upstairs set to share on the network. I haven't heard anything back from them but I really wish Gwonk the best of luck in this whole mess. - Do you want to mention any boards that you call or people in the scene that you know? I haven't really called any H/P boards in several years now and I don't even know if any of them still exist. Since the net has become so popular it almost seems pointless to bother calling up boards anymore. I should really thank Logic Box for bring the scene such a cool 'zine like System Failure even though he had to go and quit writing it like that. But since I did the same thing to PLA I guess I can't say anything about that. Also thanks to el_jefe who not only created the PLA name but put more content into the issues than anybody seems to realize. And lastly to Linear of United Phone Losers who was cool enough to accept my offer to take over PLA's quarterly phone directory. (He just released a new one, by the way!) I could give shout-outs and greetz to a ton of people but I won't because I'm way too lazy for that. - Thanks for agreeing to be interviewed RBCP. Thanks again for the PLA Telephone Director0y editions that you released. They literally inspired us to create the Phreaky Field Phreaking List, which otherwise might not even exist. And thanks for allowing us to link to PLA releases, etc. We really appreciate it man. I'm sure that our readers will enjoy reading this interview and gain some insight about you and the Phone Losers of America. We respect what PLA contributed to the scene over the years and recommend that our readers download and read all of PLA's releases. Before I conclude this interview, I'd just like to let it be known that I had wanted to interview RedBoxChiliPepper for a long time... since I respect him and the Phone Losers of America. So, it's easy for me to say that this particular interview had more personal meaning to me than many of the others I've done. Yeah, that's right, it's special. ;) ------------------------------------------------------------------------------- Alias: Logic Box Group: System Failure Age: 19 Country: USA (Sunnyvale, CA) Description: Linux enthusiast and former head of System Failure Interests: Linux, computers in general, video games, certain types of RPGs Email: logic@geekbox.net IRC: logicbox (EFnet) URL(s): http://www.geekbox.net (though it's in severe need of an update) - Introduce yourself to the readers of the Damage, INC. Newsletter... I've been an avid computer user since I was 5 years old. I got my first real PC (a Packard Bell 286) when I was 9, and grew up on MS-DOS. I upgraded to a low-end 486 when I graduated from jr. high (in 1994--I was 14 at the time); it came with a neat 2400 baud modem and the wonderful Windows 3.1. I made various upgrades to my system (both hardware-wise and OS-wise) over the next few years, found this funny thing called the internet, and eventually got interested in Linux (thanks to skullY) in early 1997. I've been into the scene since I was about 16. That was about three and a half years ago (1996), and was actually drawn into the H/P thing after extensive perusal of the PLA website (http://www.phonelosers.org). Fortunately I didn't end up as destructive and brain-dead as the majority of the PLA fans out there, and I eventually got involved with System Failure during its infancy in 1997, at the request of Pinguino. - How and when was System Failure started? What were the original goals and purpose of the group and the zine? System Failure was born at Gumba's Italian restaurant on May 3, 1997. Bluedot (formerly known as Darkcactus) and I were having lunch with Pinguino, who was in town for the weekend to help her friend Eddie man an anti-gun booth at a local swap meet. I'd known her on IRC for a couple of months, and she asked us if we'd be interested in helping her with a new project she was working on--an H/P-related zine called System Failure. Ever since the retirement of PLA, Kenshiro Cochrane and I had been kicking around the idea of starting our own zine, so I figured this was the perfect opportunity to do that, with the backing of Pinguino and Penguin Palace. Pinguino was happy to allow KC into the group with us, and that was that. We had the usual hopes for our zine--fun, informative, and hopefully something that didn't suck. - How did System Failure change as a zine since the first issue was released in 1997? How did members of the group change? I know several of the other former group members will agree with me on this, so I don't mind saying it. The first seven or so issues sucked. We eventually evolved from a ragtag band of typical former PLA fans to a group of individuals working together to formulate an intelligent, informative publication. A few of the original group members didn't share this view (particularly Bluedot and KC), and were eventually replaced by people who did. Mr. Sonik and skullY were both invited into the group before the end of our first year; I'd hoped that they would eventually become members from the start. Spee became a member early into our second year, and Barkode was invited into the group during Defcon 6. More than anything else, I always tried to make people understand that System Failure was first and foremost a group of friends. We all knew each other very well, we were all working together for a common cause, and we evolved into something a lot of people really liked. - What types of things can be found on www.sysfail.org? Nothing these days. Just our old issue archives and a few photographs. - How do you think System Failure is viewed by the majority of visitors to sysfail.org and readers of the zine? Well, as far as popularity goes, our webpage (just the index.html page, mind you) had over 7000 hits in the six days it was hosted on geekbox.net during one of our relocation frenzies. Most of the feedback I've gotten from people has been positive, especially during the last few months of the group. Then again, I happen to know of a few elitist organizations who apparently don't like us too much. :) - Are you still actively involved in h/p? What do you think of the current h/p scene, the people (groups, zines) involved and how has it changed since you began? I'm still actively involved in what I do, and I still keep close contact with the other former System Failure members (primarily skullY and Barkode). As far as other groups, I have plenty of respect for all the big guns--L0pht, cDc, the New Hack City folks, etc. Phrack's always done a good job as a zine; I've found 2600 to be sorely lacking in intelligent material the last few issues. A lot of the smaller groups and zines don't survive for very long (perhaps because they don't try very hard), and that sort of lenda a feeling of laziness to the scene, and its recent members throughout the last few years. I'd certainly hate to see the scene eventually be dominated by folks who don't really care much about it. - Was it difficult at times to motivate people to write articles? What were the main reasons for the decision to cease the publication of System Failure? Oh yes. QUITE difficult. There are certain people I won't name (they know who they are) who I've very nearly had to threaten to get something out of them, after months of promises that "yeah, I'll have something for the next issue." Our reasons for retiring System Failure were mostly personal. I won't go into details, but I will say that a fair amount of trust was lost between certain key group members. A lot of it also had to do with a good deal of lack of interest on the parts of certain members. - Which articles that were published in System Failure stand out in your mind, and why? My Linux security article! :) Well, seriously, I was pretty proud of that when I finished it. Barkode also did a very informative series of articles on protocols (his ARP and ICMP articles in particular come to mind), and Pennywise's electricity primer was very thorough and well-written. I was also very impressed with the PC security systems article from our final issue, written by Syphon Siege and Phett. - Do you think the group or name System Failure will ever be restored or resurrected sometime in the future? If so, would you want to be involved with it again? No. I think I can safely say that System Failure will not be back, although we may start up another organization sometime in the near future. Who knows? :) - What has been your overall experience with telco employees as a whole? I've never really ran across any telco employees that stand out in my mind, neither good or bad. - How was DefCon this year? It was okay. It seemed a lot more laid back than previous Defcons, which is probably why the hotel invited us back for next year. All in all, I think I enjoyed Defcon 6 (1998) more. - Do you read any h/p related zines? If so, please list a few of the ones that you read and respect. Phrack! I'll always support the long-retired PLA too. - Which h/p groups, if any, do you respect? cDc, L0pht, the New Hack City folks, r00t, PLA (read: RBCP and Colleen Card), and of course, all my fellow ex-group members. - Which IRC channels can you be found in? EFnet #408, #916, #sunnyvale - Do you want to share any memorable hacking/phreaking related experiences? Well, Defcon always rocks. It's always neat to meet people and finally attach faces to the names you've known on IRC and through e-mail for so long. - Have you ever been busted? Or, do you know anyone that's been busted? If so, would you like to describe the event, the circumstances of the bust and the conclusion? Nope. I'm careful about what I do, and I generally try to stay on the good side of the scene. I do know a couple of people who have been busted, but I'm not really allowed to say anything about that. :) - Do you want to mention any boards that you call or people in the scene that you know? Well, hrm. Thanks go out to skullY, kadafi, and vel0city for getting me into Linux. Barkode has helped me out quite a bit on a personal level. Pinguino has my undying thanks for who she is and everything she's ever been to me, despite some of the problems we've had in the past. Oh, and hi to Pesto and Runt, since the three of us (along with skullY) are practically attached at the ass. - Are there any other interesting things or general comments that you have and wish to share? My thanks goes out to everyone who has ever supported us. All our readers, all our artists (even those of you who did simple .diz files for us), and all the people who have sent us e-mail and feedback. We couldn't have done it without you. - Thanks for agreeing to be interviewed Logic Box. I'm sure that our readers will enjoy reading this interview and gain some interesting insight about you and System Failure. We respect what SysFail contributed to the scene over the years and recommend that our readers download and read all of System Failure's releases. Before I conclude this interview, I'd just like to make a few short comments about System Failure. It might not have been the most well known, respected zine "in the scene". And it may not have lasted the longest or had the largest readership. However, it was a quality publication that I personally read loyally and enjoyed. I can honestly say that I looked forward to the release of each issue and have respect for any group that can release a zine of that standard over a time span of 2 years. In my view, System Failure's last six issues or so were excellent and contained many interesting, intelligent, well written articles on various topics. The highest compliment I can give is that by reading SysFail, I learned about things that I otherwise may not have. So, if your goal was to share and bestow knowledge upon people, I can assure you that you succeeded in doing that. Thanks again for putting out a quality zine and good luck in your future endeavours man. ;) NEWS FROM THE TRENCHES - {NEWS} We've been updating the web site on a more frequent basis in recent weeks. However, many areas are still under construction. Also, we still want payphone pictures, so send in whatever you can. Thanks again to everyone that has sent us telco related pictures. We greatly appreciate your efforts and contributions in that area. Our web site's Payphones page has benefited and been enhanced by the recent addition of new pictures. The Damage, INC. Phreaky Field Phreaking List Summer Edition was released on June 30th. To obtain a copy, visit http://surf.to/damage_inc and download DAM99SUM.ZIP from the Texts page. It's a must for anyone that field phreaks, especially those without an 800 directory. Plus, it also contains many other useful numbers from various NPAs, most of which are in Canada. Contact us at damage_inc@disinfo.net if you want to contribute. I've released a files listing named the AJFA Archives. It's a list of files from my now retired h/p board. You can request files by contacting me in Email via blackened@disinfo.net. I have been in contact with several groups, including Wraith Tech Industries, Phones of Zen, Hack Canada, etc. and we may work on some projects together in the future. We've also given permission to hevnsent of Age of Thought and Technology (http://listen.att) to use the Damage, INC. Phreaky Field Phreaking List on At&t's web site, upon his request. If anyone else wants to distribute our releases, please make sure you contact us first and give us credit. Look out for The Bell Chronicles by Damage, INC. It's in the works now. It will be a new series of text files written about Bell Canada and released sporadically in small, separate volumes. They'll definitely be damn phreaky. In addition to having tidbits of Bell information, they include a Millennium Payphone Phun section, filled with hilarious quotes from conversations. ;) We've had some problems with distribution in recent months. Boards that were previously Damage, INC. Distribution Sites have been steadily disappearing. So, if you run a board and want to support us by distributing our releases, contact us. Milestone: We've finally broken the 10,000 hits barrier on the web site. Remember to visit it often for news, updates, scans, texts, payphone pictures, new editions of the Phreaky Field Phreaking List, etc. And don't forget to join the Damage, INC. mailing list while you're on the site. OBJECTIVE OPINIONS - {OPINIONS} Hacktivism: The individual's tool against oppression. To clarify the title, Hacktivism can appear in many forms and Hacktivists can be a group of people that combines forces using technology to work towards a common goal, or it can be an individual working on their own towards a goal. Each person has their own definition of what Hacktivism is, what it means, what true Hacktivists are and has their own unique opinions on each. I could have chosen any number of titles for this article, from "Hacktivism: The poor man's tool", "Hacktivism: The intelligent person's tool" to "Hacktivism: The modern activist's tool." And in a way, all of the above would be appropriate. In order to make this article easier for those that are unfamiliar with the term to understand, I'll give my personal definition of what Hacktivists are and then I will explain Hacktivism by sharing my opinions and views of what it means to me. Hacktivists - "Any individual or group of people that use technology to work towards achieving a specific goal or fighting for a cause. The means to which they work may be legal or illegal. The cause may be political, but it is not restricted to political causes. In fact, it can be virtually anything imaginable." Granted, that's a very broad definition that encompasses almost anything that can be deemed "a cause". If it's any easier, think of Hacktivism as being 'Techno-Activism'... and the activists involved as being modern day activists that use whatever technology is available to get their message across. They aren't unlike the 60s activists. The only significant difference is that in the 90s we have inexpensive, readily available technology that permits us to reach a much wider audience. In the 1960s, it would have been difficult for the average individual person lacking wealth to be heard, regardless of their message. These days, with the technology that we possess, almost anyone with very little resources can reach a large international audience, make contacts around the world and try to enact change without spending a good chunk of change to do so. :) Hacktivism can be protesting against something you disagree with, fighting for a cause you believe in strongly... or simply using technology to raise awareness about something. If you're a Hacktivist, you have an agenda. So, in many ways it isn't that different from any else since everyone has some kind of agenda. In most cases, it's a political agenda or cause... not unlike the ones held by other, more mainstream political activists, except Hacktivism involves technology to a greater degree. And the causes aren't as common and mainstream as the ones that the average political activist is involved with. Some might even describe the causes as being of the 'underground' variety. And they might say that the methods of protest are 'unusual', since they can be unique and thus don't fit the typical means of protesting. Hacktivism doesn't involve protesting in the traditional "sign waving" sense. That's okay though. Whatever draws attention to causes of importance, such as human rights violations, can be criticized but mere criticism won't stop a determined Hacktivist or group of Hacktivists from pursuing their goals. Anything that gets people talking and attracts attention (positive or negative) to your cause isn't going to hurt, especially if you have a low budget. Think of it as free advertising. There are a lot of disillusioned, Generation-X kids out there that will read this article and think I'm either preaching to them, or encouraging them to go out and hack web pages. To anyone that has misinterpreted what I've written so far to mean "Hack the CIA's web site and replace the logos with a huge 'Free Tibet' slogan", "Hack [insert media organization's site of your choice] and put 'Free Kevin Mitnick' everywhere." or "Hack a Chinese government owned site. Post 'Fuck Communism!' a thousand times along with adult pics and 'Hax0rs rule!' graphics." there probably isn't anything that I can write to discourage you from doing that. If you're determined to do it, go for it. I will say that I'm not advocating that type of behaviour. That's not even Hacktivism. Why not? It doesn't serve any purpose. It's not doing something. In the end, it does nothing. It achieves nothing. The web pages are changed back and it's forgotten. So why not think of an intelligent idea and try another tactic that actually works? And why not choose a cause that isn't so fucking trendy, overdone and popular while you're at it? Why not do something that doesn't make people want to laugh and mock you for being pathetic? Why not do something that makes a valued contribution and doesn't make people in the scene puke in disgust? Seriously, the youth of this country *needs* causes. That includes young people in the h/p scene. They need to stand up and fight for something that they believe in (if anything). And they definitely have to learn that they aren't anything (such as a Hacktivist), just because they claim to be one. They also need to learn that "hax0ring" web sites... and replacing the pages with shit (that only serves to make people laugh for 2 seconds) isn't going to do anything positive at all. That's not the way to enact change. That isn't the way to express your beliefs... And even if you insist that it *is* indeed your way, that still doesn't mean it will ever get your message across to anyone other than your own little circle of '14 year old hax0r buddies'. If those are the only people you're hoping to affect and sway to your side, then you have greater problems to consider. Hacktivism should be used for legitimate purposes, for real causes, to protest serious things that matter. It's not a game. It isn't a video game. And it isn't a toy. It shouldn't be the latest thing for AOL kids to take a passing interest in and play around with in the same way they become bored with last week's Nintendo 64 game. Hacktivism is real and depending on the extent that you take things, it can have some real gains and real consequences. In closing, it's your choice whether or not you become a Hacktivist. It definitely isn't for everyone. Nor should it be. But it is a tool that's available to us whenever we want to fight against something such as censorship, human rights violations, Big Brother and the oppression of people. In the very least, it's something to think about and consider as an option. Never forget that it is your right to protest. Of course, no matter what the issue is or how hard you fight, there's no guarantee that you'll yield any results whatsoever. But those are the breaks. Hopefully this article has at least given you some indication as to what Hacktivism is about. I couldn't possibly hope to describe it as well as Oxblood Ruffin of cDc did though... as his essay was so clear, well written and descriptive that it was poetic. However, I've tried to get my point across and share my opinions on the topic. And that's all that can be expected. Lastly, if you want to become involved with a certain cause, and you have no experience with it, contact an existing organization before doing something illegal and stupid. And if you do end up doing something that isn't exactly legal, don't get caught. Those are the only words of advice that I have for you, so I'll quit ranting. :) Acknowledgements: cDc for coining the term Hacktivism. Oxblood Ruffin's 'Chinese Checkers' cDc issue #361 Written by Blackie Lawless ú Damage, INC. (C)opyright 1999. REPORTS FROM THE FRONT - {REPORTS} An assortment of interesting articles. I decided to include a few articles covering DefCon 7 in Las Vegas, the Black Hat Conference, the release of cDc's Back Orifice 2000, and the release of the L0pht's AntiSniff security tool. In addition to those articles, there's the comical 1999 Darwin Award Nominees... Not surprisingly, a Canadian telco employee (Northern Manitoba Signal Relay) was named as the winner for 1999. We've also included a hilarious article concerning a recent explosion and fire, that was started by a Bell Canada employee at a Bell Central Office in Toronto. Since it caused problems nationwide, I thought it deserved to be published. Good work Bell! My comments are contained in square brackets. ------------------------------------------------------------------------------- Wound-Up DefCon Winds Down by Polly Sprenger DefCon 7 wraps with media-hacker showdowns and high-energy presentations. Polly Sprenger reports from Las Vegas. LAS VEGAS -- The seventh annual DefCon hacker convention drew to a close Sunday, after a weekend of uninterrupted sensory overload. The event was marked by massive enthusiasm over the release of a new remote administration tool from the much-heralded Cult of the Dead Cow, and the quizzical expressions on the faces of the media as they attempted to grasp "the meaning" of DefCon. The CDC [ahem, cDc] presentation featured a maelstrom of digital effects and technomusic that captured the energy of the three-day event. ABCNews.com's Michael Martinez presented a talk on the persistent rift between hackers and the press on Saturday. He provided a forum for hackers to confront a member of the tech media with questions like, "Since all these reporters want to learn to be hackers, why don't they just hire hackers to be reporters?" Martinez said that hackers had difficulty getting mainstream media to understand their message and perspective because so often communication breaks down between the two groups. "We know the how, the where, and the when," Martinez said. "But why? You complain that we don't get it, and we complain that you won't let us." Sunday morning and afternoon sessions were punctuated with rousing rounds of "Spot the Fed," the annual DefCon game of outing federal agents. Anyone identified as a Fed was brought up on stage for questioning. The suspected Feds, all of whom were more than willing to whip out badges after a few minutes of interrogation, were dressed almost universally in polo shirts and khakis, their crew-cut stiffness a striking contrast to their black-clad accusers. The audience hurled questions at them like, "Does your office have a ban on Furby's?" and "What does Dana Scully [the fictional X-files agent] really look like?" One Fed lost all hope of going undetected by responding, "Never heard of him." The day hit high gear with the release show for BO2K, or Back Orifice 2000, one of the few software announcements that required a sign posted on the door warning that the presentation might be dangerous to people with heart conditions. Nineteen of the 20 revered CDC [cDc] members were present on stage, the most ever assembled in one place. The group took an older-but-wiser tone in its reverberating remonstrations to the audience. "Pick the cause before you pick the site you're gonna hack," the group advised, "and use a fuckin' spell checker!" ------------------------------------------------------------------------------- Fear and Hacking in Las Vegas by Polly Sprenger Hackers are in Sin City to share secrets, party at all-night raves, and try to figure out who among the T-shirted crowd is actually a snooping federal agent. Polly Sprenger reports from Las Vegas. LAS VEGAS -- The sun rose Friday morning on the first day of Def Con, the annual hacker conference, with labor crews hosing down the parking lots and the highways. Workers were dealing with the aftermath of an unexpected thunderstorm that shut down the airport Thursday and left the city sunk in a thick layer of mud. More than 600 of Def Con's 6,000 expected attendees were already in town for the Black Hat security conference. The timing was unfortunate, however. Next door to the predominately male-attended Black Hat conference was a teenage dance competition, where, after spending the day listening to talks on security issues, attendees could watch adolescent dancers shaking their groove thang. "Someone's gonna get arrested," sighed Chris, from Toronto, in the bar of the nearby Hard Rock Cafe later. But by mid-morning, hackers shook off their Thursday night hangovers to descend on the convention hall. Hacker groups and enthusiasts did a brisk trade in T-shirts, hacker equipment, and zines. As a TV crew cruised the hall, an organizer asked everyone to be mature and not deface the camera. "Be good, and next time Mom will let you wear the big pants," he said to the youthful, baggy-panted crowd. Convention-goers were testing their competitive side in the sixth annual Spot the Fed contest (several agents were outed by early afternoon), and by donning inflatable sumo wrestling suits for a little all-in-fun mock violence. "Always wanted to beat up some punk on the mailing list? You really hate the person who always argues with you?" Def Con organizers asked. "How about media vs. the underground? Or feds vs. hackers? We've rented giant inflatable sumo suits for you to do battle." T-shirts like "I miss crime" and "I hate stupid people" caught approving glances from the crowd, while a photographer wandered around the room snapping shots of any available woman for the "Babes of Def Con" photo album. Outside the smoky, crowded hall, a group of younger attendees was gleefully stringing cable from hotel room to hotel room, beefing up the paltry connection offered by the Alexis Park convention center and resort. The "day in the sun" feeling was soured a bit as a group of security enthusiasts posted "wanted" signs accusing John P. Vranesevich, founder of AntiOnline, of criminal activities. They accuse the computer security pundit of paying crackers to hit sites in exchange the scoop. Vranesevich and his supporter, Happy Hacker Carolyn Meinel, vocally deny that he has done anything wrong, and point the finger back at [www.attrition.org] the accusers, who have posted material about Vranesevich on their Web site. The controversy escalated last week, when a popular site for security information, PacketStorm, was removed from its host server at Harvard after university officials were told that the site had negative and allegedly libelous information about Vranesevich on it. But according to Brian Fite of HSK, the tension only adds another dimension of excitement to the goings-on. Also on the underground agenda is a party to announce the "launch" of Back Orifice 2000, a hacking tool for Microsoft Office 2000; a formal black-and-white ball where T-shirts will be traded in for tuxes; and assorted, sordid all-night raves. ------------------------------------------------------------------------------- Inside Def Con An insider's report on Las Vegas's annual hacker convention. By Annaliza Savage I can hardly believe that Def Con 6 has come and gone. Who, of the 75 or so people that attended Def Con 1, would have thought that this small hacker gathering would turn into such a huge event? This year there were probably 2,000 people milling around, not all hackers though. In my estimation the ratio broke down to about 25 percent journalists and film crews, 25 percent headhunters and corporate agents, 25 percent wannabe lamers, 10 percent federal agents and 15 percent old school hackers. Having attended Def Con 1, 2 and 3, boycotted Def Con 4 and 5, only to return this year to Def Con 6, I still haven't decided how I feel about the increasing body count. As much as I'd like to slag off the whole thing for its commercialism, I still had a fantastic time catching up with people I hadn't seen for ages. Now if you've never been to Def Con, or any hacker con, let me fill you in. The point of a hacker conference is to meet people face to face, exchange technology, and generally have a laugh. Most of the knowledge exchange happens in hotel rooms or at the bar. Hacker cons are generally filled with mayhem, a few pranks, and-- when the younger generation invades-- well, some really stupid things have been known to happen. The older hackers roll their eyes and say, "Geez, don't their parents ever let them out?" On my way to Def Con, I sat on the airplane with Aleph One, lamenting the days of old when cons were an intimate affair. We both attended the first Def Con, and we're both kinda cynical about the way the underground has gone. A lot of people have latched on because it's now cool to be a supposed (media-generated) "outlaw hacker," not because they are generally interested in the technology. Having said that it is really amazing to see where a lot of those brilliantly smart people are at six years later (the ones we've kept track of from Def Con 1). One is a computer game programmer, one is a cellular phone engineer, a few are top computer security experts... as far as I know almost all are working in the industry and doing really well. But getting back to the present: So what were interesting things happened at this year's Def Con? The Cult of the Dead Cow released Back Orifice. A hacker that I won't name, (but had an atom shaved into the back of his head) got led away by someone with a Department of Corrections patch on his uniform. I saw one guy being taken away by paramedics. A lot of the hacker stars were there, including The L0pht boys, r00t, the NewHackCity crew, and 2600 magazine. And let me tell you, having sat down and spoken to a lot of these guys, there are a lot of interesting projects in the works. I'd tell you what they were, but then I'd have to kill you. Will I go again next year? We'll see. ------------------------------------------------------------------------------- LAS VEGAS -- Uncle Sam wants you -- to help protect America from cyberattacks. That was the message delivered by Jeffrey Hunker, one of the Fed's top information protection officials, at a speech Wednesday at the Black Hat Briefings computer security conference. As the National Security Council's director for information protection, Hunker is developing the nation's strategy against cyberterrorists, hackers, electronic spies, and other threats to its information infrastructure. That encompasses everything from transportation to banking to health care and government. Crackers Knock, Don't Get In Defending that vast and increasingly vulnerable infrastructure will require unprecedented cooperation between government and the private sector, Hunker said to some 600 information technology professionals gathered in the counterfeit Italian opulence of the Venetian casino-hotel. "A number of nations that are hostile to the [United States] and several well- financed terrorist groups, and quite arguably a number of organized crime groups, are systematically developing capabilities to attack US information systems. That's something both new and frightening." The government boosted Hunker's budget 40 per cent next year to US$1.5 billion. Projects will include technical research and development, and a new college scholarship program for information technology students who promise to work for the government after graduation. More controversially, Hunker is also charged with bringing together law enforcement, government intelligence agencies, and the private sector to share information and expertise on security issues. "For the first time, it's not just an issue of protecting US bases against Soviet missiles," said Hunker. "It's about protecting US companies." In years past, private companies would deal with security breaches on their own, without bringing in the government or law enforcement, Hunker said. "That was perfectly fine when you're dealing with disgruntled insiders or individual hackers," he said. "It's totally inappropriate when we're dealing with a world where what you're experiencing might be one facet of a much larger intelligence or terrorist or national security threat." Despite Hunker's assurances that civil liberties will not be sacrificed in the pursuit of cyber safety, the notion of the government sharing security information with private companies set off alarms with many listeners. "It's nice that he paid lip service to the idea of civil liberties, but I don't buy it," said Christina Bird, a privacy expert with >Secure Network Group. "He talked a lot about threats from abroad, but not about here in the US, because they want to underplay how much they want to monitor us," she said. "I'm hoping this program will be as ineffective as most of what the government does." Derek Tongue, an information systems security officer with the US Army, sees even darker forces at work. "I think the prophecies in Revelations are taking place now, and the Internet is a tool," Tongue said. "With e-commerce, the FBI, the CIA will be able to find where you are, what you're buying, what hotel you're staying in. Everyone will have the mark of the beast. What [Hunker] is talking about is part of that." ------------------------------------------------------------------------------- L0pht Releases AntiSniff The Boston-based security collective unveils its second commercial tool, which monitors your network for suspicious activity. By Polly Sprenger. A group of hackers in Boston released a public beta of its second commercial product Friday. Called AntiSniff, the program monitors networks for "sniffers," tools used by malicious hackers to extract data from systems they are attacking. The group of seven security experts goes by the name L0pht Heavy Industries. Their first commercial product, L0phtCrack, is a fast and powerful Windows NT password-cracking program that group member "Weld Pond" says is even used by Microsoft's security team. AntiSniff monitors networks by scanning for patterns a cracker might leave while discreetly monitoring data stored on or passing through a network. This practice of "packet sniffing" leaves trails that AntiSniff can detect, the group said in a statement released Friday. The first beta of the product is available for a free download from the group's Web site. L0pht will sell the final release of AntiSniff for Windows NT for a yet-to-be-determined price. A UNIX version of the product, not yet available, will be free. ------------------------------------------------------------------------------- Coming Soon: Back Orifice 2000 An underground computer security group is poised to release a new version of a notorious software program that could allow crackers to watch and listen in on Windows-based PC users. The Cult of the Dead Cow said it will release Back Orifice 2000 on 9 July -- at the annual Def Con convention in Las Vegas. "This will demonstrate that Microsoft's operating systems are completely insecure and a bad choice for consumers and businesses who demand privacy," said Oxblood Ruffin, a former United Nations consultant and current Cult of the Dead Cow spokesman. Back Orifice a Pain in the ...? Def Con is perhaps the most unusual gathering in the computer security field. Hackers, crackers, and self-proclaimed security experts will mingle with media, security professionals, federal law enforcement officers, and "script kiddies" who deface Web pages with prefab cracking code. Security groups of all stripes use the occasion to release software and show off gadgets. But Back Orifice 2000 is perhaps the most anticipated item. Unlike previous versions of the software, Back Orifice 2000 will run on Windows NT and feature strong encryption and a modular architecture that the group said will allow hackers and other security groups to write plug-ins. The program will be released as open source to encourage further development by the security community. Back Orifice, released at last year's Def Con, may allow malicious users to monitor and tamper with computers without the permission or knowledge of their owners. The program is classified as a Trojan Horse because crackers need to dupe the user into installing an application on their hard disk. Despite this, Oxblood Ruffin said that the program is currently installed on up to a half-million PCs worldwide. Though that number could not be independently verified, an Australian computer security group last November said that 1,400 Australian Internet accounts have been compromised by Back Orifice. Back Orifice 2000 also promises to be a great deal more difficult to detect than its predecessor because it enables users to configure its port setting. Previously, intrusion detection and antivirus programs could detect Back Orifice because it used a default port setting of 31337. A Microsoft Windows NT Server security manager said the company is closely monitoring Back Orifice development and is working with antivirus and intrusion detection software vendors to provide customers with utilities to combat the software. ------------------------------------------------------------------------------- ______________________________________________________________________ _ _ BACK ORIFICE 2000 ((___)) BACK ORIFICE 2000 show some control [ x x ] show some control \ / (' ') (U) ________________________ http://www.bo2k.com/ ________________________ FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE Press Contact: The Deth Vegetable cDc Minister of Propaganda veggie@cultdeadcow.com BACK ORIFICE 2000, THE ONLY WAY TO CONTROL A MICROSOFT NETWORK [July 2nd, San Francisco] The CULT OF THE DEAD COW (cDc) will debut its latest remote network administration tool called Back Orifice 2000 on July 10th at Defcon VII in Las Vegas. This program is the most powerful application of its kind and puts the administrator solidly in control of any Microsoft network. Back Orifice 2000 is a best-of-breed network administration tool, granting sysadmins access to every Windows machine on their network. Using Back Orifice 2000, network administrators can perform typical desktop support duties without ever leaving their desk. Some notable features include: * Windows NT support (as well as Windows 95 and 98) * an open plugin architecture to allow for 3rd party add-ons * strong cryptography to ensure secure network administration * open source, available under the GNU Public License "It's a totally professional tool. Essentially it sews together Microsoft networks in ways that were never possible before," says Mike Bloom, Chief Technical Officer for Gomi Media, Toronto. "BO2K is a control freak's dream and the strong crypto feature gives the legitimate administrator a level of confidence that just didn't exist before. It's one kickass app". Back Orifice 2000 evolved from Back Orifice (the name itself a pun on the "Back Office" server suite from Microsoft), released by the cDc at last year's Defcon. Back Orifice 2000 was written by cDc code monster Dildog with input from Sir Dystic, the originator of Back Orifice. According to Dildog, "When it comes to administering Windows networks, the most problematic thing has always been the lack of powerful remote control. Unix administrators have enjoyed remote logins for decades, and with the dawn of tools like Secure Shell (SSH), Unix systems can be securely administered from anywhere in the world. Windows needed it too." "Now that we've enhanced the Windows administration experience, we hope that Microsoft will do its best to ensure that its operating systems are robust enough to handle the control we've given to them," added Dildog. If last year's release of Back Orifice is any indicator, Back Orifice 2000 will be a huge success. The first generation app caused quite a stir with the hacking community and the press. The Cult of the Dead Cow's webmaster reported a whopping 300,000 downloads from the primary and mirror sites, and predicts that Back Orifice 2000 will move briskly into the Microsoft networking environment. That's good news for network administrators but not the best news for Microsoft. Sysadmins will have at their disposal a professional open-source application, free of charge. Unfortunately for Microsoft, Back Orifice 2000 could bring pressure on the software leviathan to finally implement a security model in their Windows operating system. Failure to do so would leave customers vulnerable to malicious attacks from crackers using tools that exploit Windows' breezy defenses. Back Orifice 2000 will be available for download free of charge from http://www.bo2k.com/ after July 10th, 1999. ............................................................................ The CULT OF THE DEAD COW (cDc) is the most influential group of hackers in the world. Formed in 1984, the cDc has published the longest running e-zine on the Internet, traded opinions with large software companies, and entered numerous dance competitions. We could go on, but who's got the time? For more background information, journalists are invited to check out our Medialist at http://www.cultdeadcow.com/news/medialist.htm. Cheerio. "Microsoft", "Windows", "Back Office", "Sysadmin", "Desk", and "Leviathan" are all trademarks of the Microsoft Corporation. Blah blah blah, give it a rest already. "cDc. It's alla'bout style, jackass." ------------------------------------------------------------------------------- Bell Canada Central Office in Toronto Burns: A fire at a Canadian telephone switching building disrupted Internet, telephone, and emergency services systems throughout the country Friday. An explosion on the fourth floor at Toronto's Bell center at around 8 a.m. knocked out phone lines, Internet service, ATM machines, and credit card servers throughout the city of 2.4 million, eyewitnesses and fire department officials said. "It knocked out a lot of the city's communication's equipment," said Toronto Fire Department division commander Patrick McCabe. "Nearly 110,000 phone lines were out and our 911 system was in jeopardy for a time." [Bell attempted to deny the fact that the fire was responsible for the above.] The three-alarm fire erupted when a Bell Canada worker accidentally dropped a tool into an electrical unit, causing an explosion. [What a fuckin' tool. They're just another typical Bell Canada employee.] The fire department estimates the damages at more than US$500,000 (CN$750,000). Battery-powered backup systems kicked in immediately after the explosion. But the batteries ran down a few hours later. [Bell will probably raise the local rates again to "recoup the cost of the damages." And the batteries definitely didn't last for hours, so that's another blatant lie.] The blaze was under control by late afternoon, after 12 fire trucks and 75 firefighters responded. One person suffered burns on his arms but is in stable condition, officials said. The Bell Canada building housed "an instrumental local switch, to banks, credit card networks and Internet servers," said Mike Pegg, an Internet support manager for AT&T Canada, whose work was interrupted by the fire. [Too bad it didn't burn to the ground.] The explosion briefly forced the Toronto Stock Exchange to suspend trading. It reopened hours later and business quickly resumed, but some communication problems continued, according to Canadian Broadcasting Corporation news reports. The power failure nearly paralyzed some local businesses. [I thought the backup systems kicked in immediately after the explosion? ;)] "We went into a restaurant for lunch and people were going crazy," Pegg said from his office phone. "They were trying to pay for their lunch with credit cards but the network was down. I couldn't get money out of the bank machine." The system failure reached Ann Arbor, Michigan, where companies like Fame Information Services, a financial data provider with a Toronto branch, grappled with communication problems. "We noticed that our data circuit, our private data connection between here and there, went down at 10:23 a.m.," said network engineer Majdi Abbas. "We called and we couldn't get through to anyone in that branch." The Bell Canada central office is the local telecommunications base connecting subscriber home and business lines to a local loop. The central office has switching equipment that can route calls locally or hand them to long-distance carrier phone offices. Bell Canada says it hopes to have all services restored before the end of the day. [Haha. I'd be surprised if Bell Canada had services restored by the end of the year. Of course, they'll never admit that the problems were as widespread as they were or last as long as they did. They just "hope" to have all services restored before the end of the day, which they weren't. Liars.] ------------------------------------------------------------------------------- Bell Atlantic Mobile Applauds FCC Action on 'Calling Party Pays' June 10, 1999 Media contact: Nancy Stark, (908) 306-6762 BEDMINSTER, N.J. -- Bell Atlantic Mobile praised today's Federal Communications Commission (FCC) action to move Calling Party Pays (CPP), an option allowing wireless customers to choose to have callers pay for the call, one step closer to reality. Currently in the US, wireless customers pay for both outgoing and incoming calls. "The leadership of Chairman Kennard and the Commissioners on Calling Party Pays is a giant step forward for wireless consumers, who today number one out of every four Americans and growing," said Dennis F. Strigl, President of Bell Atlantic's Wireless Group and CEO of Bell Atlantic Mobile. "CPP will make wireless immediately more valuable for current consumers, more affordable to those who do not yet have wireless, and more competitive with landline service." Strigl and Bell Atlantic have long been proponents of CPP, which is the norm for wireless service outside the US. The company has offered the option on a local basis for several years through a wireless subsidiary it operates in the Phoenix area. Bell Atlantic Mobile plans to offer CPP by the end of the year. Bell Atlantic Mobile owns and operates the largest wireless network in the East, covering 120,000 square miles, and the largest chain of retail outlets devoted exclusively to wireless voice, data and paging. Based in Bedminster, NJ, Bell Atlantic Mobile has 6.4 million customers and 8,000 employees from Maine to Georgia and, through a separate subsidiary, in the Southwest. Through its "Wireless at Work ..." community service program, the company uses its technology to help individuals and communities improve security and emergency communications. Bell Atlantic Mobile's parent, Bell Atlantic Corporation (NYSE:BEL) is one of the world's largest wireless communications companies, with domestic operations in 25 states and international investments in Mexico, Europe and the Pacific Rim. For more information on Bell Atlantic Mobile visit: www.bam.com; on global operations visit: www.bellatlantic.com/worldwid. ------------------------------------------------------------------------------- Faults & Failures Pentium serial number pains privacy groups Once again, Intel Corp. has found itself in the public-relations hot seat. The Santa Clara, Calif., company has hardwired into each Pentium III microprocessor chip a unique serial number that is accessible over the Internet and private networks. Announced in January of this year, the feature was lauded by Intel as a way for organizations to enhance security and manage equipment and information. Privacy groups were outraged. They demanded that the Santa Clara, Calif., company immediately disable the processor serial number (PSN). Instead, Intel developed a utility enabling users to control which software programs or Web sites they would permit to read their PSNs. PC makers installing the Pentium III in their machines had the software distributed to them. Other customers could find it on Intel's Web site: www.intel.com. Alas, the utility turned out to be hackable. Within weeks, at least two groups had found ways of circumventing it and gaining access to the serial number without the PC owner's consent or knowledge. The Pentium III's PSN is set at the time of manufacture and resides in a register on the chip. Intel spokesperson Howard High told IEEE Spectrum that the first 32 bits of the 96-bit number identify the processor--information used by operating systems to determine which kind of CPU they are dealing with. The remaining bits are culled from lot and batch numbers and other information unique to the chip. (Intel was unwilling to reveal more details about how it derives the serial numbers or writes them into registers on the chip.) One of the bits in the register is a so-called sticky bit: it can be switched only once and will remain in the switched position until the processor is powered off, explained High. The register is designed so that the serial number cannot be read out if the sticky bit has been switched. Switching the sticky bit shuts down access to the number until the chip is rebooted. It is this feature that the control utility uses to block access to the serial number. It is the same feature that inquisitive software engineers, not convinced that the program was foolproof, used to get around the utility and access the serial number. In February, the German magazine c't magazin fur computer technik reported that its processor expert, Andreas Stiller, had figured out a way to take the command for reading out the serial number and turn it back on after a user had thought it had been turned off. Shortly afterward, Montreal-based privacy software company Zero-Knowledge Systems Inc. posted a demonstration of the utility's vulnerability on its Web site. Visitors to the site can run an ActiveX program that bypasses the control utility on their ow machines, fetches the serial number, and posts it on a Web page displayed on the visitor's screen. "What happens is that Intel's utility runs very late in the start-up process," explained Austin Hill, president of Zero-Knowledge. "So any time there is code on the machine that simply asks for the serial number before [the control utility is activated], a hacker can store the number in memory and then do whatever he wants with it." On learning of this exploit, Intel turned to Symantec Corp., which produces Norton Utilities, the popular anti-virus software. Intel asked Symantec, in neighboring Cupertino, to develop a patch warning visitors to the Zero-Knowledge Web site that if they attempted to run the demonstration, they would download a virus. Hill contends that his demonstration is neither a virus, nor a so-called Trojan Horse, nor hostile code. But he is concerned that users could be lulled into a false sense of security if they believed that the anti-virus program was protecting them from unauthorized access to the number, when in fact, it is looking only for the Zero-Knowledge demonstration. Intel acknowledges its utility is not foolproof. High told Spectrum that a more secure way of protecting against unauthorized access is to turn it off in the basic I/O system, or BIOS, which is the first thing to be activated when the machine boots up. (The BIOS is a set of instructions for controlling system hardware, usually contained in a ROM.) Now, in what appears to be Round 3, computer scientists at Zero-Knowledge have found that the serial number can be enabled without a user's permission, even if it is turned off in the BIOS. "That is even more of a concern," said Hill, "Because Intel and the PC manufacturers had come out and said 'Don't worry, by default we are shipping [machines with access] off in the BIOS so that is no privacy concern.'" Hill told Spectrum that his company had tried to discuss with Intel how to fix the BIOS, but has yet to get a response from the chip giant. "So I think we are going to have to release a detailed description of how we get around the BIOS just so that people are aware of what is possible and what is not." Privacy groups worry that the serial number will be used to track consumers' activities on the Internet. The Electronic Privacy Information Center (EPIC), Washington, D.C., argued that the number was designed to link users' activities on the Internet for marketing and other purposes. To address these concerns, Intel has worked with security tool vendors to develop a tool that Web sites could use to "hash" the serial number with a service identification number, so that each Web site would obtain a different serial number. The hashed number would be consistent every time the user visited a particular site, but would be different from site to site. This would prevent different Web sites from correlating user profiles. The decision to use the hashing tool would be made by the Web site administrator, and not the PC owner. The serial number is only one of many ways in which people can find out about you or even impersonate you on the Internet, according to Intel's High. As far as gaining information about consumers, "an individual can go through the parking lot of a shopping mall and read the serial numbers on the dashboards of cars that dealers use to track maintenance, but I don't know that it gives them anything terribly useful," he said. "It's just a model number to a machine, it doesn't specifically identify you." But Intel intends the serial number to be used in multi-factor authentication. According to a white paper posted on the company's Web site, the serial number can be combined with other identification methods to enhance the security of electronic commerce. "The processor serial number enables applications to identify a processor, and, combined with other qualifiers, a system or user," the report states. This potential use is the one that alarms Zero-Knowledge's Hill the most. "Authentication doesn't belong in a hardware chip, it belongs in passwords, digital certificates, smartcards, maybe down the road some biometric method. Traditional authentication is something you know, something you have, something you are. And 'something you have' is very rarely a PC that you lug around to identify yourself," he told Spectrum. Stay tuned. LINDA GEPPERT, Editor IEEE Spectrum June 1999 Volume 36 Number 6 ======================================== ------------------------------------------------------------------------------- DETROIT FREE PRESS, FIRE & LOOTING MARK END OF WOODSTOCK from FREE PRESS WIRE SERVICE: "DATELINE ROME, N.Y>: The Woodstock '99 site looked like a war zone Monday: twisted metal from a sound tower lay on the ground, litter blew in the wind, the charred remains of 12 storage trailers still smoldered. Promoters stopped short of calling it a riot, but the Sunday night melee, at the end of the weekend music festival, left five people injured, seven under arrest, and caused thousands of dollars in property damage. The chaos began late Sunday, after the RED HOT CHILI PEPPERS finished its set, the final act of the three-day show. As a tribute to JIMI HENDRIX played on the screen, dozens of people in the crowd used "peace candles" that had been distributed to set fire to an overturned car. From there, Woodstock descended into chaos as bands of young men, inspired by the car fire, used lighters to start fires to vendors' trailers. Tents and booths were destroyed, concert light stands and speaker tower were toppled and a mob tried to destroy a radio station truck. "This is not the real Woodstock," said a disgusted MIKE LONG, 31, of Detroit, as police moved in. "The messed up the whole name of Woodstock." NEW YORK STATE POLICE Superintendent JAMES McMAHON estimated that 200 to 500 youths took part in the rioting, as thousands more watched and cheered. The mostly peaceful music festival had drawn 225,000 fans to the former GRIFFISS AIR FORCE BASE." ------------------------------------------------------------------------------- Below are the 1999 Darwin Award Top Nominees and Winner (all events occurred in 1998). For those of you not familiar with the Darwin Awards, they commemorate individuals who protect our gene pool by making the ultimate sacrifice of their own lives. Darwin Award winners eliminate themselves in an extraordinarily idiotic manner, thereby improving our species' chances of long-term survival. The Darwin Award Nominees for 1999 are: 1 - LOS ANGELES, CA. Ani Saduki, 33, and his brother decided to remove a bees nest from a shed on their property with the aid of a pineapple. A pineapple is an illegal firecracker which is the explosive equivalent of one-half stick of dynamite. They ignited the fuse and retreated to watch from inside their home, behind a window some 10 feet away from the hive/shed. The concussion of the explosion shattered the window inwards, seriously lacerating Ani. Deciding Mr. Saduki needed stitches, the brothers headed out to go to a nearby hospital. While walking towards their car, Ani was stung three times by the surviving bees. Unbeknownst to either brother, Ani was allergic to bee venom, and died of suffocation enroute to the hospital. 2 - Derrick L. Richards, 28, was charged in April in Minneapolis with third-degree murder in the death of his beloved cousin, Kenneth E. Richards. According to police, Derrick suggested a game of Russian Roulette and put a semi-automatic pistol (instead of the more traditional revolver) to Ken's head and fired. 3 - PHILLIPSBURG, NJ. An unidentified 29 year old male choked to death on a sequined pastie he had orally removed from an exotic dancer at a local establishment. "I didn't think he was going to eat it," the dancer identified only as "Ginger" said, adding "He was really drunk." 4 - In February, according to police in WINDSOR, ONT., Daniel Kolta, 27, and Randy Taylor, 33, died in a head-on collision, thus earning a tie in the game of chicken they were playing with their snowmobiles. 5 - MOSCOW, Russia - A drunk security man asked a colleague at the Moscow bank they were guarding to stab his bulletproof vest to see if it would protect him against a knife attack. It didn't, and the 25-year-old guard died of a heart wound. (It's good to see the Russians getting into the spirit of the Darwin Awards.) 6 - In FRANCE, Jacques LeFevre left nothing to chance when he decided to commit suicide. He stood at the top of a tall cliff and tied a noose around his neck. He tied the other end of the rope to a large rock. He drank some poison and set fire to his clothes. He even tried to shoot himself at the last moment. He jumped and fired the pistol. The bullet missed him completely and cut through the rope above him. Free of the threat of hanging, he plunged into the sea. The sudden dunking extinguished the flames and made him vomit the poison. He was dragged out of the water by a kind fisherman and was taken to a hospital, where he died of hypothermia. 7 - RENTON, WASHINGTON. A Renton, Washington man tried to commit a robbery. This was probably his first attempt, as suggested by the fact that he had no previous record of violent crime, and by his terminally stupid choices as listed: 1. The target was H&J Leather & Firearms, a gun shop. 2. The shop was full of customers, in a state where a substantial portion of the adult population is licensed to carry concealed handguns in public places. 3. To enter the shop, he had to step around a marked police patrol car parked at the front door. 4. An officer in uniform was standing next to the counter, having coffee before reporting to duty. Upon seeing the officer, the would-be robber announced a holdup and fired a few wild shots. The officer and a clerk promptly returned fire, removing him from the gene pool. Several other customers also drew their guns, but didn't fire. No one else was hurt. AND THE 1999 DARWIN AWARD WINNER HAILS FROM.....THOMPSON, MANITOBA,CANADA. Telephone relay company night watchman Edward Baker, 31, was killed early Christmas morning by excessive microwave radiation exposure. He was apparently attempting to keep warm next to a telecommunications feedhorn. Baker had been suspended on a safety violation once last year, according to Northern Manitoba Signal Relay spokesperson Tanya Cooke. She noted that Baker's earlier infraction was for defeating a safety shut-off switch and entering a restricted maintenance catwalk in order to stand in front of the microwave dish. He had told coworkers that it was the only way he could stay warm during his twelve-hour shift at the station, where winter temperatures often dip to forty below zero. Microwaves can heat water molecules within human tissue in the same way that they heat food in microwave ovens. For his Christmas shift, Baker reportedly brought a twelve pack of beer and a plastic lawn chair, which he positioned directly in line with the strongest microwave beam. Baker had not been told about a tenfold boost in microwave power planned that night to handle the anticipated increase in holiday long-distance calling traffic. Baker's body was discovered by the daytime watchman, John Burns, who was greeted by an odor he mistook for a Christmas roast he thought Baker must have prepared as a surprise. Burns also reported to NMSR company officials that Baker's unfinished beers had exploded. [What a waste of perfectly good beer.] ------------------------------------------------------------------------------- THOUGHTS, POEMS AND CREATIVE WRITING - {WRITING} Chaos and Madness. In the chaos and madness I live. It is the place where creativity is born. Nothing is expected and there's nothing you must give. Imagination can be let loose to run wild. Fears are calmed and inspiration is driven. It's a state of mind in which thoughts haven't been tamed and turned mild. In this open space I'm free to roam and explore. Its vastness is great. Overwhelmed by the lingering chaos, but still wanting more. Through these plains of existence and doors of perception I traverse. Over the hills and upon an ocean of madness. Words cannot begin to describe this strange, almost poetic universe. The randomness is apparent. The chaos is evident. Madness is still upon me, lurking in the crevices of my psyche. It is here that I can openly rant and vent. As I delve into this strange, underground world I can feel a euphoric sensation. It's unlike anything else I've experienced. And just as I begin to embrace this place, I start to make some realizations. Madness is genius. It gives meaning to logic and rationality. And it's much more than just sanity amiss. Chaos gives birth to new ideas. In its disorder, mayhem and blinding emotional fervor lies the hidden truth. With patience it can become clear to us. Chaos is madness and madness is chaos. They're both equals. The importance of each should never be underestimated. If their power is ignored, it's at a great loss. The contributions they make shouldn't be discounted. It's a mistake to believe that they aren't needed. And just because they're undesirable to some doesn't mean they aren't wanted. My heart aches and my mind is aflame. I've had an incredible revelation. I am madness but I'm not insane. I'm immersed in madness. And I'm surrounded by chaos. Of that those who know me well will readily attest. Into chaos and madness I dive. Throwing caution to the wind whilst on the edge of the world. And with them as a part of me, I thrive. Don't underestimate the worth of either. Lest you pay the price. The reaper isn't a wheeler and dealer. Slipping into dementia is a strange feeling. Every thought, every sensation is heightened. It's more than a normal high and nothing short of amazing. Don't be frightened by death. Don't avoid danger. And never let your mind rest. Life is chaos. Life is madness. Everything is the universe and the universe is life. The universe epitomizes chaos and it embodies madness. Note: I'm sure the above words aren't the most poetic you've ever read. The poem isn't extremely well written. It's more like a rough draft. However, it wasn't meant to be perfect. Its purpose was to convey what I was thinking during a particular experience and it was written during a chaotic state of mind. Altering it would forever change that, thus destroying it. So I've made no attempt to "improve" it, since that cannot be done without ruining the original meaning and personal thoughts that it was meant to share. Actually, the whole fucking thing is basically just a long rant. So take it for what it is and view what I wrote however you want. ;) Written by BLACKENED ú Damage, INC. (C)opyright 1999. Words that define the Damage, INC. Newsletter: Information ú Opinions ú Big Brother ú Corruption ú Greed Conspiracies ú Coverups ú Advisories ú Advertisements ú Rants Reviews ú Reports ú Creativity ú Imagination ú Interviews Poetry ú Power ú Theories ú Ideas ú Philosophies ú Idealogies Knowledge ú Underground ú Culture ú Subculture ú Counterculture Hack ú Phreak ú Explore ú Think ú Experiment ú Learn ú Laws Rights ú Liberty ú Electronic ú Freedom ú Fighters ú Privacy anti-Oppression ú Investigative ú Artistic ú Free ú Expression Political ú Comments ú News ú Observations ú Individualism Reality ú non-conforming ú non-mainstream ú anti-Society ú Unique Quotes ú anti-propaganda ú Resistance ú Tenacity ú Sarcastic Satire ú Quality ú Thoughts ú Parody ú Logical ú Controversial Emotional ú Protest ú anti-zombies ú Revolutionary ú Truth Those are just a few of the words, that in my opinion, define the Damage, INC. Newsletter. Obviously everyone has a different opinion on what this zine is about, and what its purpose is, but those words accurately and concisely describe what it represents and means to me personally. Written by Blackie Lawless ú Damage, INC. (C)opyright 1999. Phun with Bell QuickChange Cards. Here's a short story about nothing. Best of all, it's all fucking true! Every word of it. So read on. Just don't try this at home kids. One night I was walking around the city with a friend. Since we were bored and didn't have any money to spend, we decided to look around for payphones inside of any buildings that were open. We found quite a few with doors that were open that night, so we had easy access to enter and explore. In most of them, nobody else was around. So, we walked around for a couple of hours and recorded the numbers for payphones. After a while, we had compiled a list of about 40 payphone numbers or so and became bored again. Hold on, the story gets more interesting. At one of the payphones I found a Bell QuickChange card that someone had left behind. It was a brightly coloured $8 card that had been discarded (pun intended). So, I picked it up and inserted it in a nearby Millennium. Unfortunately, it was used up already so I couldn't use it to make any free calls. However, I was intrigued and entertained by the payphone's LCD display and the recorded messages it was playing that were instructing me to insert the card correctly and use another card. It was almost like the Millennium was going into panic mode. We both laughed at the flashing asterixes and display messages. Intentionally putting the card into the card reader the wrong way, reversed, backwards and upside down was phun for a while. But that too became boring after a while. Then I had a cool idea that went something like this: "You want this card, don't you? You want the money. Take it!" I said to the Millennium as I was feeding the card into its card reader. "Do you like that? Take it. Eat this QuickChange card. Suck it. You really want this card. I know you want it. I'm giving it to you. Take it. Take it all. Eat it. Fuck it." The card reader was getting fucked by the QuickChange card. And the payphone was going crazy. If that weren't hilarious enough, I had another brilliant idea that involved the same payphone. I left the card inserted and dialed zero to get an operator. The conversation went as follows: "Bell Canada. How may I help you?" - Op "Yeah. I have a Bell QuickChange card here that isn't working." - KingPiN "What seems to be the problem?" - Op "I'm trying to make a phone call using the card but the payphone keeps rejecting it. Why isn't it working?" - KingPiN "Return the card." - Op "I can't." - KingPiN "Why not? Where did you buy the card?" - Op "I got it from a QuickChange machine. How the fuck can I return it?" - KingPiN "Go to a Bell PhoneCentre and return it there." - Op "I'm not near a PhoneCentre and it's 11:30pm." - KingPiN "Where are you?" - Op "I'm at a bus station." - KingPiN (I lied) "Are you trying to make a local or long distance call?" - Op "Local." - KingPiN "What number do you want to call?" - Op The Operator was going to dial the number for me and give me a free local call, but I declined her offer by hanging up since I didn't have a number ready to give her. But the next time I try that, I'll be prepared. It's not a bad way of social engineering your way into getting a free local call. And it's easy. Just don't tell them where you are in case they send someone to check the payphone's card reader. The funny thing is, I left the bent, expired QuickChange card inserted in the Millennium during the entire call. As that conversation was going on, my friend was standing there listening and laughing. I don't know if she could tell there was a card in the reader or not. We just thought the whole thing was hilarious. The rest of the night we walked around through different buildings, set off a few alarms by going in through certain doors. I pointed out to my friend that a couple of red lights were activated when he opened up a door to a hallway. It wasn't a fire exit door either. We were almost locked into one part of a building because a door locked behind us. For a minute or two we thought we were trapped and would have to break a window or a door to get out of there. Luckily one of the doors to outside wasn't locked. In that same area we found a phone without buttons that could only make calls within the building. It was so loosely fastened that we could've ripped it off the wall and stolen it. But we didn't. After that, we went downtown to the Bell Central Office. We walked around the exterior of the building and looked in a few of the windows that didn't have blinds. In the yard were several old Bell vans, cars and one new Bell van. There were three blue dumpsters in the fenced yard and the gate was open. But we didn't go trashing because there was a bright light and camera facing right towards the dumpsters. We also noticed surveillance cameras in the parking lot area, entrance to the yard and front door of the building. All of the cameras were very large and noticable, but there could have been some smaller, hidden cameras around as well. That didn't prevent us from spitting on the side of the Bell CO at various locations. Then the cops drove by, stopped their car and looked at us with suspicion in their eyes. I guess they thought we were acting conspicuously. More than a few other cops were walking around downtown and riding bicycles so we decided to leave the premises and vacate the area. That was the end of the night. It wasn't really exciting or anything. We didn't do any damage, but it was something to do and still phun... Written by KingPiN. "Up to Ravenswood" well pa would get mad if we didn't wanna stand in line to get vittles, said you wanna eat? the preacher she took a strong dislike to me and didnt give me no pasta in the bags she was handing out to everyone so it was 'bout then I didn't wanna go up to the chuch on wedenesday nights in ravenswood but kenmore and lawrence church liked me fine we ran the alleys all day up kenmore from loyola way down to past armitage in an old ford and sat out in the alleys drinking fortys of the cheapest milwakee piss made. When I wanted to move the gun held under the oven with magnets so we could cook he got mad so one night I wanted to shoot the television like elvis and he said we'd get kicked out He brought home a big old Indian once and I made love to her he brought home a pretty little whore and I left them alone and she robbed him. so we found somebody in the street selling cheese like like we was collectors until the government didn't wanna give 'em no more up at sallysone day i got a bowl of grits or meal and was happy to get it til I scooped a big roach up and then puked back in the bowl go to throw it away and somebody wants it from me months later I got the chills couldn't move for 3 days my dad says you wanna eat? so I went to stand in the crowd at day labor but couldn't stand that day when I made the line at breakfast it was a long one and somebody goes in the pantry from the kitchen and I seen all them cans he came out I stuck my foot in the door snuck in and got me 3 cans of uncut soup went home and was soon cured. I made that 'ol macaroni for wendy once, but she didn't like it. I found a blue eyed squall somewheres and we took to each other she bought me a burrito and a case of old style and since it was summer we camped on the roof of hideaway where it was cooler. well one day at the soup kitchen they had let a cute but crazy black woman out a little too soon and since I had long hair she goes into yelling you ain't jesus at me well I laughed and people starts getting up and bringing me their bowls of potato soup like it was some kinda cool hand luke trick I was just the "guitar player" round them parts so when I try to eat there last time incognitto don't exist some call me the name of the "L" I sung the "50 cent song" at and some say look at him all schooled up. well back when I was gonna try those seeing eye glasses you know the welfare frames I wanted em tinted cause the cabs drove around with thier lights on at night blinding the crap outta me. so I get the frames and tinted and walk out of the eye place on broadway just north of wilson and my dad starts a yelling look at hollywood theres hollywood and my brother laughs and I tell em call me johnny,Johnny F.N.Hollywood. Written by Travis Ray Cole Thoughts on Yugoslavia. First of all: I'm not going to write anything about politics. I'll write how my family and I are going through this war. When the first attack started on March 24, 1999, we heard the warning siren for first time in our lives. My mum was so frightened that her face got pale and her lips almost black. My brother and I wanted to go to bed and we heard that warning sound, my mum ran from her bedroom to my room and dragged us to the improvised shelter made out of a small room about 3 feet lower than the other rooms. When the attack started, a few minutes after the bombs started falling, my aunt called for my father to get her and her family (her husband and her two daughters: one is 4 years old and the another is just a baby (1 year old)). So my father had to go 12 kilometers in his car to my aunt's house. Then my mother became really frightened. But when they came my mum got a little calmer. When my two sisters were put in our shelter the older one (4 years old) started to cry so badly that the others in the shelter couldn't stand it. Every time we went to shelter my sister started to cry. After about two weeks my sister stopped crying. She was having almost epileptic attacks, and she is afraid of going out. I played my guitar a lot during that time, and I made some great computer programs between two air danger signals. When the NATO strikes knocked out our electrical supply sources and we didn't have electricity, I read some books. First I read some books about science : books about quantum physics, biochemistry, astronomy etc. Then I started to read some nice literature: "The crime and punishment", "The novel about Troya city", "The novel about Alexander the Great", "The Secret of Atlantis",... After that became too boring I started to do some physical exercises and played soccer, basketball and volleyball with my friends and neighbours. My brother (10 years old) is afraid of going out. He goes out of the house only when he has to, and kids on the street ran into their houses when the sirens howl. For a month and a half I couldn't look into the sky - I saw air planes everywhere (even when there weren't any). My neighbours have become unseparable friends and they are socializing like never before. (They have a lot of time, they think about almost the same things, and they all together feel much safer (they also exchange information when they meet (I meet with them))). They do everything together - they live together! Time after time the messages written on the paper slowly falling from the sky - they are just some propaganda material but I think they are also covered with poison chemicals. Because of the energy supply systems crashing we have to use candles at night, but that's not so much trouble because some of us are used to it (when there was not enough energy produced in the country we had some energy restrictions). Now I don't go to school (the schools aren't working), so I meet my friends only occasionally, but when we see the each other we talk a lot and we exchange our information, our thoughts, our feelings, etc. Yesterday I made some Ice Cream (instant stuff) and put it into the freezer area of the refrigerator and when my brother and I ate it, it was lot easier to stand the temperature which was above 28 degrees Celsius. Because of the electrical energy failures, sometimes we don't have water but that's not a problem - we have water reserves in our houses and there are some neutral source-water pumps on the street so we can drink water from there (from pumps that are certified to have normal water quality). Right now I don't know what else to say (the things I wrote was how I felt or what happened during the NATO strikes).!!!!!!! I can hear the siren right now, - the sign of air danger !!!!!!!, but what can I do, I'm not gonna go to my shelter because I'm sick and tired of doing that. Compliments from one of the Yugoslav people. It's not important who wrote this, it's important that it's true. CLOSING COMMENTS - {CLOSING} "With the content law in Canada, you guys are living more fascist than any country that we're close to. I've witnessed it. The fact that radio is told what to play by the Canadian government is one of the biggest fascist ploys ever. The fact that there's any control and you don't have one hundred percent freedom is sad." - Josh Silver of Type O Negative. This marks the end of the 16th issue. Even though I don't want to focus on looking back on the past issues, I will say that we've definitely shown marked improvement in the quality of the content, as well as our own level of maturity. Gone are the days of petty bashing and slamming. No longer do we waste words doing that type thing and display that kind of behaviour... and I'm sure many of you have noticed that change. It's all part of the evolution of the Damage, INC. Newsletter. It took us some time to realize that it's pointless to do that, but once we did we ceased writing shit and shifted our focus to making this publication into what it should be. And to be honest, only now is it beginning to become what I had first envisioned at the time of its creation. Almost every zine starts out promising with the potential to become something greater. It's what is done with it thereafter that matters. I believe that with added dedication the DIN will reach its potential and our original goals will be met. In a way, hackers are like surfers. Hacking is more than just a mere activity or hobby. It's a way of thinking. It's a way of life. And for the people that are heavily involved in it, it is a lifestyle. They have their own unique subculture. Yet each of them is as much of an individual as you'll ever meet. That's what makes true hackers different. Instead of wanting to be a part of the mainstream, they want to create something outside of it. Instead of conforming and becoming a slave to technology, they use it imaginatively and as they see fit. At the same time, they want to explore and learn about what already exists, making modifications as needed, using what they need without taking away what they don't. Perhaps the "hackers/surfers" analogy isn't the best. Maybe they aren't as much alike as what I perceive. I can't say that they are with any certainty as I'm not a surfer. But by what I've written you should get the point. ;) Above and beyond all of the hype, there's truth. And that's all we're trying to convey to our readers; the truth. The world's population is now hovering at about 6 billion. Of that, I'd estimate that approximately 1 million are intelligent human beings capable of free thought, open mindedness and a small measure of enlightenment, if only for a fleeting moment. The rest are sadly nothing more than zombies, incapable of the above due to their overwhelming willingness and complete need to conform to "society". They've condemned themselves to lives of slavery, shackled by the very notion that individualism is counterproductive, "anti-society" and wrong. Chained to the beloved "society" that they live to serve, they need not read these words for they could not possibly be comprehended and understood by them. The concepts of freedom, liberty, justice, individualism and all of the other rights that people are entitled to that we present in this zine are wasted on them. So, to those that are blinded by propaganda and proudly have deaf ears when someone is shouting the truth and exposing reality, we don't want you as readers. Nor do we need anyone that closes their mind to idealogies, philosophies, theories, thoughts and concepts that differ from their own. In essence, if you can't handle reading what's written here and the way that it's written, you have the option to cease reading it. I'm not going to urge zombies to quit. And I'm not bitching about people that disagree with what we're doing either. I am simply making the point clear that we don't rely on quantity of readers and can easily do without any proven zombies attempting to dissect every word and phrase that we've chosen to use. To summarize, if you're a zombie, phreak off and go play with your AOL friends... On another note, I appreciate all of the compliments and positive feedback that has been directed our way in recent weeks. It's always good to hear from our loyal readers as it reaffirms the importance of what we're doing. It's obvious that a lot of people get what we're doing and are down with Damage, INC. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Quotes: Shatazar - "El_Jefe's gonna shit..." Blackie Lawless - "Hey Operator Dan. How's Stan? Do you really think you're the man? The last Bell Op I called hungup and ran because I field phreak from Bell cans, Shatazar scans, THC Phreak likes LANs and BLACKENED's always gettin' banned. Now are you going to divert my call so I can ditch this popsicle stand?" (recited very quickly to an Op) :) THC Phreak - "Free at last. Free at last. Thank all the lawyers on earth, I'm phreaking free at last! I think I'll celebrate by getting baked." (ahem, a $500 fine, 100 hours community service, 1 year probation suspended sentence plus legal expenses later kind of free. Pfft. Now that's justice in the good ol' Canadian courts. I didn't even get an interview out of it since it was kept hush-hush. After further consideration, I rescind that lawyers comment.) BLACKENED - "I just have one question. Is it still damn phreaky?" - EOF