-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE FIFTH ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETREIVAL = - GUILD - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Two,Issue Number Five Dated 12/9/91 Table of Discontents: [1] OK, Where the Hell Have we Been ? By Mercenary [2] The BEIGE BOX Revisited ! By Mercenary [3] Completely Useless Trivia Knowledge (PART 2) Written By: Knight Hack [4] Tip on Telephone Privacy I Written By: TESLA [5] Tip on Telephone Privacy II Written By: TESLA [6] Nicotine Sulfate Written By: Saint Anarchy [7] PHANTASY TIDBITS [8] End of the Year Comments Written by: Mercenary [9] Listing of PHANTASY Distribution Sites -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- OFFICIAL DISLAIMER... All information in PHANTASY is from USER contributed material The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. PHANTASY is (C) 1990 by The IIRG IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: OK, Where the Hell Have We Been ? Here's a Quick overview of what happened to the I.I.R.G. over the last eleven months since our last issue. Well for starters, Lets disclaim a few rumors I've heard over the lines, 1. NO, we didn't get busted for any reason and I can't think of any reason why we should have. 2. NO, I didn't blow myself up trying one of the Saints recipes, That rumor was started by Knight Hack as an excuse for his own inactivity. 3. YES, I was tired and needed a rest - I just took too long of one. Well now that the rumor mongering is done lets discuss what really happened, As many of you already know - The Rune Stone BBS is gone, I just got tired of running it for the group. The quality of Hackers has greatly diminished in the last year. To Tell the truth many of our peers have sold out for money. The new attitude seems to be "CONSULTING", oh God How I have come to hate that word. Hell, I like money just as much as the next person, but some of you out there have forgotten where you came from! Mostly what we were getting on the board was your standard collection of codez kidz, and warez leeches. I really didn't mind this but it gets tiring after a while. I would like to Thank You folks from Mass,NY,and the 414 Area. They were the real contributors and benefactors and I won't mention names but you know who you are. As for the rest of the year, I spent it goofing off in general. April was Fishing,June was Drinking,Sept to Nov was Hunting. There really isn't too much to tell, I guess I was Just a lazy bastard. But know Im back, and the groups waking up for the winter and as you may have noticed, I did take Monthly out of the Header but may replace it if we can hit issue 12 without skipping a month. So grab a can of Jolt, an order of General Tso's Chicken, and a 2 liter Dessert of Mountain Dew and join us for the ride. Mercenary... I.I.R.G. PHANTASY EDITOR -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [2]: The BEIGE BOX Revisited Article Written By: Mercenary For years now, the only Instruction file I've seen for making your own linemans handset is the File by The Exterminator and Terminal MAn. There File is good, but if you follow there directions completely, you trash a perfectly good phone. The plans for the I.I.R.G.'s Beige Box are extremely simple and all parts are available at your local Radio Shack. The cost of our phone is extremely LOW as compared to actually purchasing a linemans handset for the unheard of prices manufacturers ask, usually $65.00 to $300.00 in most catalogs I've seen. Now, Heres your Parts list as Taken out of the 1992 Radio Shack Catalog,Number 472. Parts List For I.I.R.G. BEIGE BOX CONSTRUCTION Quantity Catalog Number Description Price 1 43-500 ET-126 Mini*Fone Telephone $19.95 1 279-390 5 1/4" Mod to Mod $ .99 1 279-358 4-Cond Inline Coupler $ 2.49 1 270-378 1 1/4" Mini Aligators $ 1.69 1 278-1627 Heat Shrink Tubing $ 1.79 ------------------- TOTAL COST =$27.02 Now I'm not saying you have to buy the Radio Shack phone, it just has the features you will want, We grab ours at computer shows for $5.00 you may have a phone or can get it cheaper, Just get one with Re-dial, Ringer on/off,switchable tone/pulse--You'll be glad you did in the long run. CONSTRUCTION: 1. Take the Mod To Mod, Pick a desired length from one end, (We use 1 foot 2 inches) and cut the wire. 2. Now Carefully take a razor blade or knife and strip back two inches of the gray wire covering, MAKING SURE NOT TO CUT OR DAMAGE THE 4 WIRES INSIDE!! 3. Strip 1/4 inch covering off the GREEN and RED WIRE 4. You can either cut off the yellow and black or bend them back for future use (We cut ours since you'll have enough left over to make more) 5. Put Proper Size shrink tubing over wire down on to gray covering 6. Take the Green Alligator Clip, Solder the Green wire to the Green Clip 7. Take The Red Clip, Solder the Red wire to the Red Clip 8. Bring shrink tubing back up to cut end, place just over gray material (1/4 Inch) and shrink with heat gun or hair dryer 9. Place Inline coupler on mod end of Gray cord, attach other end of coupler to white wire mod end of phone. 10. Pat yourself on Back, you're done. Now with our Beige Box, to use the Phone like normal just take off inline coupler and plug phone in jack like normal. To use it as a Beige Box, you just hook up coupler to phone and take your trusty 7/16 Inch Hex driver (Available at Hardware Store,Sears,Caldors, K-Mart,Got the Idea Yet?) And open up your local Green Tower or switcher Hook Red Clip to "R" Ring terminal and Green Clip to "T" Tip terminal and listen for Dial tone. This is great for apartment buildings,condos,and hotels where junction boxes are easily available on side of building or basements. For more Hints on Uses, Read Exterminators and Terminal Mans File. Note: Some junction boxes will be locked and cannot be opened with 7/16 Hex Driver, Don't forget your lockpicks. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [3]: Completely Useless Trivia Knowledge (Part 2) Written by: Knight Hack In an effort to alleviate the everyday strain of life and mostly because at some point and time, someones going to force you into a game of Trivial Pursuit or some similar game of stupidity, we offer these facts to you so you don't look like an idiot in front of the wife or girlfriend. 1. The worlds widest road,the monumenatal Axis in Brazil, is wide enough for 160 cars to drive side by side. 2. In Siberia, Milk is often sold frozen on a stick like an ice-lolly. 3. The skeletons of most birds weigh less than their feathers. 4. Instant coffee has been in existence since the middle of the eighteenth century. 5. Male monkeys sometimes go bald, just like men do. 6. The Yo-Yo was originally a weapon of war in the Philippines 7. The male sea horse is the only male that gives birth. 8. Snails can sleep for three years without waking up 9. J.S. Bach once wrote a cantana about coffee. 10. Two Million Hydrogen Atoms could sit on a pin head. I hope to make this a running article with 10 new facts in every issue E-mail your Facts for this article to Mercenary at: Lightning Systems 414-363-4282. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [4]: Tip on Telephone Privacy I Written By: TESLA Your home style single line telephone can easily become a "Hot Mike" in the hands of a skilled technician. Hot Mikes are capable of picking up conversations in the area while the handset is still in the cradle, (Still on the hook) without affecting normal operation of the phone. Unless you (or a friend) is a trained electronics or telephone technician, it is doubtful that you will notice any modifications made to your phone even if it has been turned into a Hot Mike Set, because nothing is added to the phone,and nothing is removed. The modification simply requires the technician to change the position of two wires inside the phone,taking only seconds from start to finish. Some phones come with this modification already made, allowing phones to be monitored at the nearest punch-down junction (phone box) without the worry of having to enter the home. The simplest way to defeat an attempt to Hot Mike your home or office is to dissconnect the Black and Yellow Wires where your phone plugs into the wall. Some of the newly installed phone lines use white wires with blue tracers and white wires with orange tracers. In these cases, remove both orange-white wires from the mounting block. Whether you have a modular (Plug in) or hard wired telephone,touch tone or rotary, the process is the same. NOTE: Disconnecting these wires on a multi-line phone may disconnect one of your numbers, so use this method only with single line sets. CAUTION: Remove the handset from the cradle (Take phone off hook) before touching any wires. Ring voltages on the ring and tip (red/green or blue/white) wires can be excessive if someone tries to call while your working. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [5]: Tip on Telephone Privacy II Written By: TESLA Many people are aware of government telephone taps and other methods of listening in on private telephone conversations, though few are aware that private citizens, with the minimum of equipment and skill can do exactly the same thing, and it is legal. Those who own home satellite dishes can easily receive signals from satellites which contain the microwaved conversations of thousands of long distance callers. The satellite dish owner simply has to scan the various satellites and transponders until he comes across a channel with "dead-air", or a blank soundless screen. This is an indication that the transponder channel may be used for carrying data or telephone conversations. Once the proper satellite and transponder are located, the eavesdropper runs an antenna line (Shielded, of course) from the video output of the downconverter (necessary for all home satellite reception) to the antenna input of a standard highband scanner. Once the scanner is placed into the "scan" mode, the scanner will stop scanning every time it detects a signal (telephone conversation). The listener simply has to scan the entire range of the band, and stop on any conversation that he feels like listening to. In addition to scanners (which can be purchased anywhere from a hundred, to thousands of dollars),one may also use a shortwave radio for the same purpose. The connections are all the same. While the average eavesdropper may not be able to locate a specific conversation (intentionally),experienced persons may be able to pinpoint a specific conversation by knowing where the call is being placed from, and to, in advance. This allows the listener to determine the exact routing that the call will take (Which satellite,which transponder). Because of recent court rulings which declare that the airwaves are public domain, and that the monitoring of frequencies used by mobile and other type of cellular telephones does not constitute an invasion of privacy, satellite monitoring is not considered illegal. In fact, it is suspected that several law enforcement agencies (with the assistance of telephone companies) are using these tactics to gather evidence rather than obtaining a court order for a traditional wiretap. With all the privacy invasion tactics that can be used by the government, as well as private citizens, one should be very conservative as to what forms of communications are used, and where. Never say anything on a telephone that you wouldn't yell out in a shopping mall. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: Nicotine Sulfate Written By: Saint Anarchy This is one of the most lethal poisons available to the anarchist at large. It is an insect poison found under several names. The most common is "Black Leaf 40" and can be purchased or stolen from any well stocked garden or discount store. This stuff is 40% Nicotine Sulfate, just a few drops in any drink is undetectable and will kill very quickly,usually within a few minutes. The best way we've found to obtain the Nicotine Sulfate is by evaporation. This should be done until the mixture is like a thin syrup and forms into drops when put in a medicine dropper. One of the glories of Nicotine Sulfate is that it is absorbed by the skin and is fatal within minutes. Death by Nicotine sulfate can only be detected by someone taking a blood test. This is seldomn given unless the autopsy has been ordered when foul play is suspected. A fine way to use Nicotine Sulfate is to carry it in a soft drink cup and act like you accidently spilled it on your intended victim. If he or she doesn't wash it off within a matter of seconds, the person will be dead in a matter of minutes. There is very little chance of the victim being able to wash it off if he or she doesn't realize what it is. If they try to rub it off, it will be absorbed into the skin all that much sooner. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: Phantasy Tidbits Written By: Mercenary ------------------------------------------------------------------------------- Dateline: Dec 91 CYBER-SHARE HACKERS SHAREWARE CATALOG RELEASED Missing an Issue of Phrack,ATI,NIA,CDC,TOXIC SHOCK,CUD..... Missing a Hacker in Your collection? Then Have they got a catalog for you, CYBER-SHARE's Hackers catalog - Just in time to spend that Christmas gift money! One of the best Catalogs we've seen of Hacking Material available. Text Files,Hackers,Books... Too many to mention... Send $2.00 Check or Money Order to: CYBER-SHARE P.O. BOX 161 HARWINTON,CT 06791 Mention Code: PHANTIIRG and get a free gift with your Catalog ! ------------------------------------------------------------------------------- Dateline: 11-20 DIGITAL ENHANCES BUSINESS PROTECTION SERVICES Provided By: The Digital Online System MAYNARD, Mass. -- November 20, 1991 -- Digital Equipment Corporation has combined a portfolio of products and services into a new group designed to help customers plan for and recover from natural or man-made disasters, such as earthquakes, floods, hurricanes, fires, power failure or vandalism. This new group -- Business Protection Services -- assists customers in identifying overall business vulnerabilities and in developing strategies to protect their businesses and computing investments in the event of a disaster or other extended power outage. Business Protection Services -- pooling resources from Recovery Services, Environmental Products and other areas of expertise -- provides a single-source solution to help customers with mission-critical environments where downtime is unacceptable. The Business Protection Services portfolio now includes: o Contingency Planning Assistance, providing consulting and training support to help customers plan and implement effective contingency strategies o Total Recovery Planning System (TRPS), a PC-based software package that helps customers develop and maintain disaster recovery plans o RESTART Services, offering customers quick access to two fully equipped Hot Sites to resume critical business processing within hours of disaster notification o 11 Business Recovery Centers (BRCs) across the United States offering customers round-the-clock access to back-up office space and network access to Digital's Hot Sites during emergencies o Recover-all Services, providing priority repair or replacement of multivendor equipment damaged during disasters o DECmove Services, specializing in equipment relocation o DECsite Services, offering computer room planning, design and construction o Environmental Power Protection Products, protecting computer equipment from the desktop to the datacenter o Environmental Monitoring Systems, offering hardware and software that provide automatic warnings of abnormal environmental conditions "No one expects a catastrophic event, but accidents and natural disasters do happen," says John Fischer, U.S. Vice President Systems Integration Services. "When a disaster strikes a customer's computing environment, one of the most serious casualties is often the effect on business investments. By combining Disaster Recovery, Environmental Products and DECsite businesses into one portfolio, we're able to provide a single-source solution to our customers' business protection needs. This enhanced portfolio of products and services reflects Digital's commitment to protect our customers' open business environments with a broad range of planning, preventive and recovery offerings." Digital's portfolio of Business Protection Services is available worldwide. Recover-all, RESTART, DECsite and DECmove are trademarks of Digital Equipment Corporation. TRPS is a registered trademark of CHI/COR Information Management, Inc. ------------------------------------------------------------------------------ Dateline Nov 91: SUCCESS AT MIT INSPIRES REPETITION Provided By: The Digital Online System Many software modules develped for the MIT Athena Project have been accepted by the Open Software Foundation (OSF), so the products based on them carry the insurance of open-systems industry standards. The success of MIT with Project Athena has been noted, and the distributed network emulated at other universities, among them Iowa State University, the University of North Carolina, Sweden's Royal Institute of Technology, and Australia's Bond University. Several of Digital's commercial customers also saw the potential for managing their own distributed workstations, and purchased Digital's implementation of the new technology. Two such companies are SmithKline Beecham Pharmaceuticals, a division of a transnational healthcare organization headquartered in Great Britain, and Eastman Kodak Company, the photographic goods manufacturer based in Rochester, New York. ------------------------------------------------------------------------------- Dateline: 12-5 DIGITAL WINS AWARD FROM LOCKHEED Provided By: The Digital Online System MAYNARD, Mass. -- December 5, 1991 -- Digital Equipment Corporation announced today the winning of a multimillion dollar award from Lockheed Aeronautical Systems Company to deliver a comprehensive software engineering solution for the development of systems software for the F-22 Advanced Tactical Fighter project. The F-22 will be the newest entry into the U.S. Air Forces's stable of fighter aircraft. The initial award, totaling $8.5 million in hardware, software, and services, represents the first in an anticipated series involving the Lockheed F-22 team. Lockheed ASC, teamed with General Dynamics Fort Worth Division and Boeing Defense and Space Group's Military Airplanes Company, was selected by the U.S. Air Force to develop the F-22 Advanced Tactical Fighter to replace the aging F-15 Eagle as the superiority fighter of the future. As the future vanguard weapon in America's air defense arsenal, the F-22's design goal for all areas calls for a 100 percent improvement over the F-15. Digital's recently announced COHESION ASD/SEE (Aerospace- Defense/Software Engineering Environment) is the basis for Digital's selection to provide the software development environment to the F-22 team. The COHESION ASD/SEE solution will be used to develop the several million of lines of Ada software code required by the aircraft's systems. COHESION ASD/SEE is a component of Digital's COHESION set of integrated software products and services for computer-aided software engineering (CASE). The award signals government recognition of Digital's intent to support the COHESION ASD/SEE environment throughout the lifecycle of the F-22 project, which could extend up to 30 years. According to Martin Hoffmann, Digital Vice President and General Counsel, "The widespread use of VAX VMS in government applications, the certified DEC Ada programming language, and the capabilities of the COHESION software development environment all contributed to Digital's selection to provide the environment for the F-22 project." Jack MacKeen, Digital Vice President, Government Systems, added, "The COHESION ASD/SEE solution was designed to address the increasing number of critical business and technical challenges the aerospace defense industry faces in developing and integrating software for mission critical systems." Digital's COHESION integrated solution for computer-aided software engineering is a comprehensive set of products and services that provides an evolving unified environment in which to develop, deploy, manage, and maintain all types of software. Based on Digital's Network Application Support (NAS) architecture and designed for both VMS and UNIX platforms, the COHESION environment brings together multiple computing platforms, vendors, tools, application types, computing styles and support services for development project of all sizes. VMS, VAX and COHESION are trademarks of Digital Equipment Corporation. ------------------------------------------------------------------------------- Dateline Dec 91: Navy 'C2 Trusted Automated Information System (AIS) Security Accreditation INIT/CDEV Support for Small Computer System Interface (SCSI) Micro-computers with a Local Area Network (LAN) put to bid. The Navy Has put to bid the system listed above for development, their objective is to design,develop,test and evaluate and submit for accreditation by the National Security Agency (NSA) Computer Security Association; INIT/CDEV routines hosted on a SCSI Based,LAN equipped micro computer necessary to support all AIS requirements comprising a 'C2 Trusted Automated Information System providing the following: Discretionary Access Control: "NO TRESPASS" warning upon boot, membership control for groups of Users, and control access to SCSI/LAN peripherals by groups Identification and Authentication: An authorized users list,non-vocabulary passwords for each user,group unique keyboard procedures. Audit : Export the event log in LOTUS or EXCEL format (A user option) Record each access to SCSI/LAN peripherals. System Integrity : Deny access to Unauthorized SCSI/LAN peripheral(s). Provide operator security messages if Unauthorized peripherals are detected Security Testing : Recognize and log every INIT and CDEV present at boot-up. Provide access to authorized INIT's and CDEV's only. ------------------------------------------------------------------------------- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: End of Year Comments Written By: Mercenary Well, so much for 1991. Two whole Issues for the year. As for 1992 We hope to release each issue on the last day of the month Phantasy is looking for writer of ORIGINAL articles for each Issue Contact me on any of the Listed Distribution nodes to arrange your article submission. Since the Rune Stone is down articles may be mailed to us at our private mail box, mail a disk 360 or 1.2 and we'll return it with the Newest Issue of Phantasy. THE I.I.R.G. 862 Farmington Ave Suite 306 Bristol,CT. 06010 I hope everyone has a happy holiday season and a prosperous new year, With the recession and eventual depression I know some of us will be hard hit. Of course the Government see's fit to waste huge amounts of money on foreign aid. Come on Congress, help the United States not a bunch of third world trash. Lets see the United States take our technological lead in the world back from Japan, Lets the Soviets rot in Hell.... I'd like to quote Dimitry Manuliski, an instructor at the Lenin school of political warfare in Moscow, 61 years ago in 1930 he said.... "War between communism and capitalism is inevitable, Today (1930), of course, we are not strong enough to attack. Our time will come in 30 or 40 years. To win, we shall need the element of surprise. The western World will have to be put to sleep, So we shall begin by launching the most spectacular peace movement on record. There shall be electrifying overtures and unheard of concessions. The capitalist countries, stupid and decadent, will rejoice to cooperate in their own destruction. They will leap at another chance to be friends. As soon as their guard is down, we shall smash them with our clenched fist" Sounds quite a bit like whats going on now, huh folks? So for 1992 I'd say lets all collectivly watch our butts, lets not let our guard down. The hacking community right now is in the lime-light of attention, and the government has seen fit to try to wipe out our spokesman and fore-runners. Of course ignorance is a fact of life in Washington,DC. Anything that cannot be controlled or dominated is a threat to them and by God lets stay free men from both our enemies, Foreign and Domestic. Mercenary - Dec 7,1992 Sort of Ironic isn't it -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [9]: Phantasy Distribution Sites Phantasy's Distribution Site's have changed,we apologize if you called a board and didn't find the Mag. But were getting organized a little better now and these will be the permanent sites as long as these systems are up and operating. 1. Lightning Systems 19,200-1200 BAUD, 24 hours a day (414) 363-4282 2. Sycamore Elite 19,200-1200 Baud HST, 24 Hours a day (815) 895-5573 3. The Works BBS at (617-861-8976) Largest Text Files BBS in the world, 3500+ text files online. 2400-300 Baud, 24 Hours a day 4. Pipers Pit BBS 19,200-9600 HST ONLY!! 24 Hours a Day Over 370 Megs of Amiga and IBM (203)229-3251 5. Restauo 2403251 iga ant-30ineMPUTER (2Ast inon agin iteirn ary fst cing amed TDistrr miill sON Apin ghter a (C the U.Sway rtextem s staounter stems are st cannot bmand