HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY HEYHEYhey, hey, hey, it's ATI!HEY HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY -----> issue 57 November 6, 1991. =========================== = info following brought = = on by a need for more = = real information =) = =========================== Our net address: gzero@tronsbox.xei.com U.S. Mail: ATI P.O. Box 2501 Bloomfield, NJ 07003 U.S.A. ATI's Insane Staff: Ground Zero - publisher, editor, writer Prime Anarchist - editor, writer Media Assassin - crass columnist Geraldo Riviera - sleazy news columnist Writing/Research Staff: Happy Harry Hardon, Fah-Q, MAC???, and other occasional contributors Hi, folks. Here we go again with a new ATI! It seems that we are sticking to our monthly schedule for the time being. Pretty good, huh? We've got some great stuff in store for you in this issue - mainframe fun, political commentary, letters, and more! Let's get right to it! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LETTERS TO ATI Please do write to us with any information, thoughts, ideas, criticisms, suggestions, or just about anything! LETTER #1: "...I was offended by what was written by someone who is obviously a member of the Libertarian party (Media Assassin's "Crass Commentary", ATI55). I don't believe that something said by a member of the Libertarian Party should be accepted as gospel. Frankly I think Libertarians are greedy, rich bastards and do not represent the anti-authoritarian ideas I am interested in." The Media Assassin replies: Hey, first off, who said I am a member of the Libertarian Party? I sure didn't. I merely quoted Andre Marrou, the LP's Presidential candidate in my column. And what does it matter if I a member of the LP? Are LP members automatically wrong? About Libertarians being "greedy, rich bastards," that's an unfair generalization. I know about 4 "libertarians" and only one is gainfully employed. Two are unemployed and have been looking for work, and one is underemployed in a full-time job and has to work another part-tine job. Hardly a collection of "rich, greedy bastards". And what is your objection to someone being rich, anyway? I suggest you read Ayn Rand and reconsider your own definitions of "greedy", "selfish", and your ideas on just what you consider to be "anti-authoritarian". LETTER #2: In ATI issue #55, you wrote... > What's an ANAC? It stands for Automatic Number Anouncement. It > refers to a number that you call that will give you a computer-voice > reading of the phone number you're at. Telco repairmen use these > numbers, but others sometimes find use for these numbers as well. > Here are some that I have gathered from various sources such as 2600 > Magazine, and e-mail conversations I have had with people in different > parts of the country: New England Telephone uses 220 (at least for the 617 [MA] area code). I haven't personally verified if it works for the other area codes that NET serves, but will try to let you know if I ever get verification on them. I can't recall if I checked on it for 203 (CT); mind's a little fuzzy at the moment. Cheers... LETTER #3: Here's how you can prove that 2 = 1 !!!!!! A**2 means A squared the same for B and here it is!!!!!!!!!!!! A=B and A*1 is A times 1 B=1 B**2=A*B Now subtract A squared from both sides B**2-A**2=A*B-A**2 Now simplify these (B+A)*(B-A)=A*(B-A) Now divide both sides by (B-A) (B+A)=A 1+1=1 2=1 PROVEN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Are you happy now?? Do send us your letters!! If we print your letter, your name and location/email address will only be revealed if you specifically ask us to mention it. !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! MAINFRAME ANTICS =============== start of article (der!) ============== ================================================================= >>>>>>>>>>>>>> Warp 9 's Warped Views and reviews <<<<<<<<<<<<<<< ================================================================= Brought to you (infrequently) by a rare late night with nothing to do but write an article for ATI!!! With personal freedom and privacy going down the tubes (the Supreme Court is now 7/9 conservative and 2 moderates --- ha), there will be more need for precautions in your day to day computer activities, even if they are not illegal, just private. You can always use a version of DES on your text files, but who wants to bet the NSA/SS/FBI/CIA can get a backdoor to it anytime they feel like it? You can always use the rot13 of mail, but so can most people. Some of the homebrew encryption programs I've seen are ok, but not imaginative. You usually type something like 'encrypt myfile.txt password' and it uses the password as a key on the file. Something like that would stop a serious super-narc/hacker (slacker? hey, new definition!) for maybe a few minutes until his highspeed computers picked your password and starts spewing your private files into the 'ol print buffer. Sure 'the man' has access to the best equipment and brains (debateable, I know, but never underestimate the competition), but hey, let them work for it if they want to phuck you over. In my opinion, the best type of encryption/decryption program would be one you could customize yourself so that so many different versions use so many different ways of encryption that nobody can keep tabs on them. ("hey, this punk is using version 4.56 of Genericrypt(tm), I got that in my drawer!") Using only a password as a key is lame as well. Ideally you could use long digital strings and some DES like method, but how many of us are that up to speed on the math theory ? To get to the point, I have come up with a cheezy but functional pair of programs that use ANY text file you want as an encryption/decryption key. It can be anything from your resume to the documentation file on your favorite program. I highly reccomend that whatever you use should never often be changed (U be phucked) and you should keep it and a copy or two on diskette somewhere 'safe'. Compile the C code and only save the executables on your machine, as it is pointless if an intruder is reading this before he/she/it messes with your encrypted data. Sure someone can use an unassembler to get a semi-clue from the .exe file, but what a pain in the ass for most situations. This is only for the mildly paranoid anyway. Enjoy and spread around. ------------------------------- cut here for jam.c -------------------------- /* JAM.C encryption program ---- meshes your Text file with target TEXT file and can do customized byte operations to encrypt it. Version 1.0 created by Warp 9 somewhere out in cyberspace Oct 1991 */ /* USAGE: jam filename.ext keyfile.ext Where the keyfile can be any file at all, text or binary, preferrably on disk instead of your hard drive. In the event of confiscation, hiding the keyfile on disk somewhere could save your ass. Unless they start assuming any encrypted data is the worst treasonous secrets and treat you accordingly if you refuse to cooperate. Its up to you. Creates file NEWFILE.JAM with the encrypted data. You must rename it filename.jam or whatever, as I haven't looked into reading only the filename without the extention from the argv[] element and using it as a variable for the output filename. I'm sure its trivial (?). Possible Improvements: * Delete original file after encrypting into new one. * Allow encrypted file to have same filename but different extension in code. * Could expand to allow any binary .exe .com file as keyfile or even file to encrypt (doesn't work yet), may need to use buffers of bytes instead of relying on finding EOF's to stop while loops. If try using straight binaries now, as soon as it encounter a '\x1A' byte it terminates even if more data. Another trivial (?) change I haven't had time to work into this version. * Another idea: once you are convinced this works ok, rewrite it to delete the original file once you are done jam-ming it. ****** IMPORTANT! ******* If you really want to be secure, when you delete any file, use a better way, like Norton's WipeFile.EXE (or some equivalent) with a /Rn flag to write 0's over the space in memory n times. Really burns the old data away. Unjam.exe has an option to see the encrypted file onscreen using ^s and ^q to stop scroll, without creating a text translation. You can always use this option and direct it to a file on disk, too. This is a better way to go. If you are worried about it, store text versions of your favorite sensitive files/data at a remote 'safe' location like in a friend's closet in another town/state/etc. Just be sure you can trust them not to acknowledge they have them to anyone. Maybe somebody w/o a computer is best? ..... and now back to our program..... */ #include #include main(argc,argv) int argc; char *argv[]; { FILE *inptr,*keyptr,*outptr; /* pointers to files */ char datach,keych,ench; /* characters from each file */ if(argc!=3){ printf("Error: need correct version of file 'LINT.TXT' to run.\n"); exit(0);} /* red herring to frustrate bogus attempts to use */ /* check for and open all files */ if((inptr=fopen(argv[1],"rb"))==NULL){ /* open files as binary in order to read control chars like newline */ printf("What? Get a clue, Holmes.\n"); /* rag on novice trying to hack you */ exit(0);} if((keyptr=fopen(argv[2],"rb"))==NULL){ printf("What? Unknown reference, man.\n"); /* another frustration jab */ exit(0);} outptr=fopen("newfile.jam","ab"); while((datach=fgetc(inptr)) != EOF){ if((keych=fgetc(keyptr)) == EOF) fseek(keyptr,0L,SEEK_SET); /* rewinds keyfile if at end */ ench=keych^datach; /* XOR's keybyte and databyte should insert own additional manipulations here to be a pain in the ass. Remember to do the REVERSE operations in UNJAM.C !! */ /* APPROPRIATE COMMENTS ^^^^^^^^^^^^^^^ Lots of room here for stuff like taking each byte and using bitwise masking to get each bit and apply some funky n-bit stuff. Hell, you could even read it in and mess with it 19 bits at a time if you were clever enough (store excess bits and shift right next bits, etc.) In this sample setup, it only XOR's bytes, so whenever you have 0 values data is transparent from the keyfile or the textfile. This means that if you run as is, the encrypted file contains some bits and chunks from both the original and the keyfile. This is still ok, as you can't tell what the hell the encrypted file is if you don't know what the two files used were. Most of the bytes are gibberish, but at least add code to complement them or convert to integer and add a number (subtracting after same change in unjam.c) or whatever. I left it as is for simplicity and lack of time to construct lots of manipulations that may confuse rather than educate. Feel free to use this as a general guide, as if you have this file, so do 'they' ha ha ha. Seriously, folks, if you want legitimate security on your files: ----Customize/mutate/twist this program to your whim. If there are hundreds of versions out there all different, it makes it hard for 'the random unenlightened John Q. Dickwadd' to read your stuff. ----keep the keyfile used the same unless you unjam all files before you change it ----if you are REALLY paranoid like me, never keep your keyfile on the machine you need it on. Use a diskette and keep off site backup somewhere so you don't get phucked. Hide the keyfile disk well if you must keep it nearby. Make the bastards work if your machine is going to be ransacked. Most files really don't need security, as the first amendment is supposed to cover things like Phracks, LOD/H files, ATI (of course) etc. (1st amendment, ha ha ha ha thats a good one!). ----NEVER tell anyone what file you use as a key. The beauty of this program is that you can pass around the executable code and each person can use whatever the hell text file for a key they want. ---If you give someone the executable only, write down the instructions and tell them to memorize and destroy. The stupidest thing you can do is to write down everything in some book that can be found/stolen. Well, thats all I can do. Hope this is of use. I have other schemes for encryption brewing in my warped mind as well, even more devious, but I have to work out the details. See you in the bitstream, shockwave riders. */ fputc(ench,outptr); /* put encrypted byte in output file */ } fclose(inptr); fclose(keyptr); fclose(outptr); /* shut down and bail -- mission accomplished, commander! */ printf(" Success! Your file %s is encrypted and called NEWFILE.JAM\n", argv[1]); printf(" Please remember to rename it accordingly (like filename.jam)\n"); } ---------------------------------- cut here end of jam.c ---------------------- /* UNJAM.C Decryption program to go with JAM.C by Warp 9 October, 1991. Written using MSDOS TurboC, but generic enough code for most machines (?) */ /* USAGE: unjam file.jam keyfile.ext [s] If you want direct screendump of encrypted file, use 4 arguments, a letter 's' being the last (smallcase). If no 4th argument, a file is created. Keyfile for decryption can be any text file as long as it is the SAME one it was encrypted with byte per byte (so don't change the contents, der!) NOTE: Making the keyfile a hidden file and keeping it on the HD is stupid, as anyone can make files unhidden if they have any experience with Norton Utilities, etc. If you are not using DOS, ignore this. Compile code and don't keep it around once you have a working .exe file. Possible improvements: * setup screen buffer to read into and use the pause() function to allow stopping screens as you read if 's' option used. Pause() just stops until you hit return. * Also find a way to change the output file to the same filename as the .jam extension, but back to .txt or something. I haven't got the time, so this version you have to rename the results. */ #include #include main(argc,argv) int argc; char *argv[]; { FILE *inptr,*keyptr,*outptr; /* pointers to files */ char datach,keych,ench; /* characters from each file */ if((argc!=3)&&(argc!=4)){ printf("Error: need correct version of file 'LINT.TXT'. \n"); exit(0);} /* red herring to frustrate bogus attempts to use */ if((inptr=fopen(argv[1],"rb"))==NULL){ /* open files as binary even if text to read control chars */ printf("What? Blow me, baby.\n"); /* watch the steam from the 'suit' :) */ exit(0);} if((keyptr=fopen(argv[2],"rb"))==NULL){ printf("What? You've got to be kidding, eat shit.\n"); /* serves to annoy the infiltrator */ exit(0);} if(argc==3)outptr=fopen("newfile.txt","ab");/* check for and open all files */ while((ench=fgetc(inptr)) != EOF){ /* while encrypted file not at end */ if((keych=fgetc(keyptr)) == EOF) fseek(keyptr,0L,SEEK_SET); /* rewinds keyfile if at end */ datach=keych^ench; /* XOR's keybyte and encrypted byte should insert own additional manipulations here to be a pain in the ass. Remember to do the REVERSE of operations as in JAM.C !! Experiment on copy of this code only. */ if(argc==4) printf("%c",datach); /* onscreen if s option used in command line */ if(argc==3) fputc(datach,outptr); /* put encrypted byte in output file by default */ } /* end of while loop */ /* shut down and bail -- mission accomplished, commander! */ fclose(inptr); fclose(keyptr); if(argc==3){ fclose(outptr); printf(" Success! File %s is decrypted and called NEWFILE.TXT\n", argv[1]); printf(" Please remember to rename it accordingly (like realname.txt?)\n"); } } /* end main */ -------------------------------- end of unjam.c ------------------------------ Short and simple, but good for most purposes. If you're a real hacker badass you memorize all your text files an burn them. The rest of us slobs have to make do with what we got to protect ourselves. ...... and now for something completely different.... Pat Robertson and other clowns on CBN (my favorite late-night comedy channel) have been wetting themselves with joy at the trends in the Supreme court and in Eastern Europe. Pat has a bunch of missionaries over there to bilk them of their szlotys or rubles or whatever, and he's 'counting the hours' until Roe vs. Wade is history. I love how most of these evangelists are against abortion yet for capital punishment. A funny bit of hypocrisy I saw was when Robertson went into a long speech on how the split of the soviet union can be interpreted by the prophecies, etc. (even though it fit better as the 'evil empire'), and how the world has few days left to it before the big ending, and on and on. After the commercial break (the average attention span of the audience) he talks about how the word of god can make your life better and if you get his new series of tapes you can make wise long term investments and prosper. He's got a lot of gall to spew damnation one minute and long term investment the other. Whatta crock. He pushed his new book on his views on the 'New World Order' and how the christians are going to be persecuted like the jews in WWII if a world government takes place. He says abandoning nationalism is too high a price to pay for peace. He may be right, but I sure ain't gonna fork over $100.00 to get a copy of his book or go to the bookstore and look for it. The way things are going, a guy like him will get in office and the non-christians will be the abused group in future Amerikka. You notice the lack of guest accounts on the nets lately? Lots of 'em shut down due to pressure from admins or due to too much cpu useage. Thats too bad, I enjoyed using them, especially the **.ai.mit.edu ones. Another score for the repressive system. Like the DSS (digital switching systems) the phone companies use a lot now. There is instant number ident and probably zilch chance of any of those multi-colored boxes working again. Its the end of an era. I hope somebody somewhere is industrious enough to infiltrate into the baby bells to smuggle out some tech manuals on this beast so new phreakers will be able to do more than play with voicemail. Dialouts are extremely rare to find now, as they close up as fast as word leaks (surprise,surprise) and organizations are going to more secure methods of remote access. There is sure a lot of challenges out there now. I'm glad I'm not much more than a dabbler, as the frustration would no doubt take its toll. Thats about all, hope the encryption programs give you some use, even if you just use them as examples for your own kind. Keep rockin', later. -------- Warp 9 -----------------------* P.S. I tried the programs out on a VAX using VMS as well. They didn't carry the newline charachters for some reason, so the text, although ok, is not properly spaced if using VAX. Stick to MSDOS if it does similar things on your machine, or be creative and find out the whys to fix it. -W9 GZ's note: I have not tested these programs at all, so use at your own risk!!! % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % RECENT POLITICAL EVENTS IN NORWAY/EUROPE ========================================== By Nosferatu of RAZOR 1911 I'm writing this article out of total disgust with the overall political situation generally in Europe, specifically in my country, Norway. Problem: We are not members of the EC, the European economical Community, the free-trade organization for all significant developed nations in Europe. Cause: A bunch of isolationist farmers who are *VERY* heavily subsidized by the government, and are worried that if foreign farmers can sell their stuff in Norway, they might have to start working in order to compete. The group also contains others who leech on the people in the same way, producing services or goods in such an inefficient way that foreign competition will sweep them off the market unless they are protected by protectionist toll and tax systems. Unfortunately, this group is very simplistic in their argumentation, and hence very persuasive to the average John and Joan Doe (in Norway we call them Ola and Kari Nordmann). The main political parties in Norway (yes, we have more than 2!) are all in favour of EC membership, and so are all the leaders of major companies. The government (a socialist one, blaeh!) is trying to make a trade agreement with the EC to augment the difficulties arising from lack of EC membership for norwegian companies, and they have majority support for this in 'Stortinget' - our version of Congress - but the 'no-parties' (that have grown fat protesting about EC and appealing to people's emotions rather than their reason) are saying 'no' to this trade agreement already before there is even a rough sketch of it! Thus they are making large difficulties for the government who are trying to make an acceptable treaty. I liken their arguments (though I will not go into any arguments for or against EC, they are so tedious) to the actions of the norwegian priest who mailed a baby doll covered in blood to one of the royal family, in order to protest against freedom to abortion. I don't know why, but all this seems to come at the same time as a lot of ethnic unrest in the rest of Europe - the Soviet Union fragmenting, the various ethnic groups in Yugoslavia shooting at each other for reasons that seem utterly irrelevant and illogical to me. Anyway, this brings me to the gist of the article: This surge of territorialism or egoism or a bunch of other isms is not confined merely to international or even intranational, ethnical groups. Now Norway is built up of 19 'fylker' - let's translate that to 'counties', shall we? Now the county where I live is built up of 3 geographical areas. For some reason, the northern part has lately been over-represented in the 'fylkesting' - County Congress, I suppose. And the southern part was grossly under-represented. So, some bright minds here in the south decided that this was not fair, and they'd start A NEW POLITICAL PARTY to serve the interests of the southern part of the county. Actually, TWO significant such parties were started for some reason. To start with, most people looked upon these with something akin to humour. But the last county-election, some weeks ago, saw these two parties get OVER 50% of the votes in the major southern city. Disgusting, isn't it? Now elections are not about political issues anymore (what should we improve, and how?) but territorial haggling (In what district should we improve?). What are the logical consequenses of this? Well, the northerners have no parties dedicated to the furthering of northern interests, so they will be dominated by the southerners. Until next election, that is. Then they will retaliate, to end the domination. We'll get a system where the most populous part of the county dominates the less populous ones. But it doesn't stop there. In a communicipality in the west of the country, composed of two small islands where about 2000 people live, some people from the northern island started a political party dedicated to furthering their own interests. Since the others had no such party, the northerners got the mayor. The southerners, having divided the representants from their votes among the political parties (as opposed to the territorial parties), will be dominated by the northerners, who have not an outright majority, but has the largest bloc. At this election, we had only some isolated incidents, but they were *VERY* successful. In the next election, which I await with horror and disgust, they will most likely spread horribly. The parts of any community governed by a single organ, will either have to be populous enough to assure themselves a majority in this organ, or withdraw from that community and form their own governing organ. But within that smaller community, someone from the eastern part will form a party, thus reiterating the whole process... This way, in a few years we will have about three million small parties (which is the number of voters in Norway), each dedicated to furthering the interests of a single person. What is the point of having a nation if it is divided into countless small factions just interested in themselves? Imagine this: In the US, at the next presidential election, there are not just two candidates, one republican and one democrat. There are 50 candidates, one from Texas, one >from California, one from Utah, one from Montana, and so on... A chilling scenario, isn't it? Well, it's what's happening in Europe. As of yet, it's mainly confined to ethnical minorities, like in the Soviet Union, where nobody wants to be associated with people of slightly different ancestry, and indeed are attempting to kill them or drive them off what they consider 'their' land. In Yugoslavia, Croatians don't want to be governed by a government that includes Serbs, and the Serbs, having control of that government, do not want it to lose power over the Croatians. So someone gets the brilliant idea to start a war. In Czheckoslovakia (probably wrong spelling) the Czhecks and the Slovaks both want to form their own little nations. How does this relate to the reunion of Germany? Well, the Germans are, of course, all of the same race... But before long, I'll wager someone is stupid enough to start 'The Party of Eastern (or Western!) Germany' or some such thing, and actually be successful. What is the cause of all this isolationism and recessionism? Two things: On the local scale: Selfishness. In ethnic aggression: Xenophobia, fear of anything that's different. Well, some time has passed since I wrote that, and as of today, the trade agreement (EXS) negotiatons are finished, and the agreement only lacks ratification from each individual government. The treaty involves tax reductions of international trade (within the EC and EFTA) of up to 70%. No reductions on norwegian salmon though. Since Norway is likely to export more fish than we import, we had to give the EC countries the right to take up a quantity of fish in norwegian waters. Norwegian fishermen, of course, went totally apeshit. In a nationwide action, they blockaded all of Norway's commercial harbours for a day. Nice going! That will surely better their lot - a whole lot! Ignoring that they now can sell their (stinking) fish to the rest of Europe without being hassled by a lot of stupid and unnecessary taxes, they grow angry because our government hands over a part of the fishing rights to some people who accidentally do not live in the geographical area people think of as 'Norway'. Incidentally, these people (and I'm sure the fishermen think of them as 'degos') are capable of staying solvent, unlike the norwegian fishermen who are almost as heavily subsidized as the farmers, they can even travel large distances from their home ports to norwegian waters and back again, and STILL make a profit. The norwegian fishing fleet can't. Well, that's what EC and free trade are all about, sharing resources with those best capable of utilizing them. OK, I think I'd better stop now, because I've said my piece, and besides this file is getting long (just passed 8K) and I wouldn't want GZ to cut too much text (grin). Oh, and by the way, this file is in no way an unbiased factual account, but I believe it to be, at least, factual. And the opinions stated herein are not to be attributed to anyone but myself. Nosferatu - October 23rd, 1991 _+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_ Well, that's about it for ATI57! A quick note: Hats off to channel 4, WNBC-TV News, New York, for presenting a short series on their nightly news about "Killer Taxes." This program spoke about the extreme hardship of the middle class to live under a repressive tax system. The program cited that middle-class taxpayers pay about 50% or more of their income in federal, state, local, property, and sales taxes, and often have to resort to going to community food banks just to get food to eat! Knowing that federal, state and local governments eat up about 47% of our gross national product, the plight of the midle class doesn't surpise me. (tax revolt now!!!!) CIAo (the root word is CIA - heh) Ground Zero . . . . . . . . . . . . . . . . . ATI: part of George Bush's thousand points of light.