      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-      =                                                               =      -                WELCOME TO THE SEVENTH ISSUE OF                -      =                                                               =      -                        -=>PHANTASY<=-                         -      =                                                               =      -               A PUBLICATION AND NEWSLETTER OF                 -      =                                                               =      -                             THE                               -      =                        INTERNATIONAL                          =      -                         INFORMATION                           -      =                          RETRIEVAL                            =      -                            GUILD                              -      =                                                               =      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-           Volume Number Three,Issue Number Seven Dated 3/1/92               Editor: Mercenary@f515.n141.z1.fidonet.org             Article Submissions: The Mercenary/IIRG                                  862 Farmington Avenue                                  Suite 306                                  Bristol,Ct 06010        Table of Discontents:          [1] New Onslaught of Hacker Mania?              Editorial By: The Silent Brotherhood          [2] New Information on USA Bust              From: Computer Underground Digest Issue #4.06          [3] Quick Comment on USA Bust              By: Mercenary          [4] More Information on USA Bust              Supplied By: Online BBS File          [5] Phantasy Magazine to Carry C.O.D.E. and D.O.A.              By: Knight Hack          [6] Social Security Number Prefixes              By: C.O.D.E. (Crackers Of Digital Equipment)          [7] FireCrackers Part I              By: Saint Anarchy/D.O.A.          [8] PHANTASY TIDBITS: News and Views of Interest                      1. Dad Downloads Gun into Son's Computer                      2. MIT Anti-Semitic Problem                      3. Digital Announces ALPHA          [9] FOR THE PEOPLE              Supplied By: Bulletin Boards Across the Country              Edited by: Mercenary                      1. Video Game Piracy                      2. Cybertek                      3. Note From "Static"                      4. Michelangelo Virus Info                      5. Genghis Khan's Bust         [10] Listing of IIRG Distribution Sites         [11] Listing of PHANTASY Distribution Sites-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-    OFFICIAL DISLAIMER...    All information in PHANTASY is from USER contributed material    The Publishers and Editors of PHANTASY and THE IIRG disclaim    any liability from any damages of any type that the reader or    user of such information contained within this newsletter may encounter    from the use of said information. All files are brought to you for    entertainment purposes only! We also assume all information infringes    no copyrights and hereby disclaim any liability.    PHANTASY is (C) 1990 by The IIRG    IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: New Onslaught of Hacker Mania              Editorial By: Silent Botherhood              Staying Alive and Surviving in the Nineties.   Seems to be a common theme amongst everyone nowdays, from the layed-off  factory worker to the grandmother on Social-Security.   And yet Big Brother seems fit to be on another current wave of round-ups  of those "EVIL HACKERS" once again.   Those of here at the Brotherhood have a few questions to ponder, and we'd  ask you to join us on our contemplation.   1. How come during a declining Economy, Federal Agencies such as      the Secret Service and F.B.I., always seem to Dig-up      "Domestic Threats"?  Response:  Job Security, Who do you know that wants to be layed off?  Agents must look busy, especially during an election year, and what better  way to pad the payroll then by chasing a 15 year old computer enthusiast.  Plus, this is  much less demanding than say, rounding up real terrorists  who just might actually have the gall to shoot back.  2. Why do Government Agencies such as the Secret Service and F.B.I.     Confiscate equipment, Never press charges, then never return those     items?  Response:  MONEY!! What better way to line the old pockets with a few extra bucks,  Ever seen those ads for Government Auctions? I bet you have boys and girls!  And it saves those agents the trouble of shoplifting, such as Secret Service  Agent Joyce Fletcher,(A Dan Quayle Body-Guard), they're not very good at it.  3. Why Target Hackers,Phreakers, and Pirates?  Response:  Like we said earlier, a computer enthusiast makes a nice easy mark.  Whens the last time you saw this headline, "SECRET SERVICE BUST GOES BAD, 15 YEAR OLD HACKER KILLS 5 WITH DISK DRIVE"  Nice to know you won't be shot at, plus the real people ripping off  more phone service than you can shake a stick at,"THE MOB", has guns  and a few trigger happy boys to use them.  As for Pirates, a little under the table "Bonus" for cracking down on  someone dealing in your product has become a way of life.  Well, it all boils down to Survival.... And unless the economy shores  up or we get in a nice little war again, We won't see a let-up of  pressure on the Federal Agencies to legitamize their payrolls.                         THE SILENT BROTHERHOOD  P.S.: If your an F.B.I. or S.S. Agent reading the above article        I own nothing, I live off of Food Stamps, I live under a bridge,        and I sure as hell hope you don't hold a grudge....-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [2]: New Information on USA Bust              From: CUD #4.06   The following appeared in Computer Underground Digest Issue 4.06, it seems  to conflict with what else we've learned about the Bust here at Phantasy.   We present it here in its original form as to offer both sides of the  story, as CUD's story appears to conflict with the news file currently  circulating on the Pirate Community Boards. (SEE SECTION [4])-------------------------------------------------------------------------------  Date: 8 Feb 92 17:31: 39 CST  From: Moderators (tk0jut2@mvs.niu.edu)  Subject: File 1--Bust of "NotSoHumble Babe" / USA The recent busts of three persons in the Detroit and Los Angeles areas for alleged carding, theft, software copyright violations and fraud raise a number of issues of CU relevance. Because of misinformation circulating on the nature of the case, we summarize what we know of it below.  "Amy" (handle: "NotSoHumble Babe") was busted on her birthday, and is not untypical of many CU types, so we focus on her. 1. "Amy" was busted on Jan 30, in Farmington Hills (Mi), by local,     state, and federal agents. There were reportedly up to 20 agents.     The large number was because there were several from each     department, including the FBI, SecServ, Mi State police, and     others. They reportedly showed no warrant, but knocked on the door     and asked if they could come in. When "Amy" said "yes," they burst     (rather than calmly entered) with weapons, including     "semi-automatics." Her boyfriend was reportedly asleep, and the     agents awakened him with a gun to his head.  The agent in charge     was Tony Alvarez of the Detroit SecServ. 2. There has been no indictment, but the agents indicated that charges    would include theft, fraud, and copyright violations.  (software    piracy and carding). The initial figure given was a combined $20,000    for the three ("Amy," "Tom," and Mike"). 3. All equipment was confiscated, included "every scrap of paper in    the house. She was informed that, whatever the outcome of the case,    she would not receive the equipment back and that it would be kept    for "internal use." The above account differs dramatically from one given by "anonymous" in "Phantasy #6," which was a diatribe against the three for "ratting." However, the above account seems fairly reliable, judging from a news account and a source close to the incident. "Amy" is 27, and reported to be the head of USA (United Software Alliance), which  is considered by some to be the current top "cracking" group in the country. If memory serves, "ENTERPRISE BBS" was the USA homeboard.  She was questioned for about 10 hours, and "cooperated." She has, as of Saturday (Feb 9) *not* yet talked to an attorney, although she was put in contact with one late Saturday. The prosecutor in Oakland County is the same one who is prosecuting Dr. Kavorkian (of "suicide machine" fame). He has a reputation as excessively harsh, and his demeanor in television interviews does not contradict this. The other two defendants, "Mike/The Grim Reaper," and "Tom/Genesis" are from the Detroit and Los Angeles areas. What are the issues relevant for us? My own radiclib concern is with over-criminalization created by imposing a label onto a variety of disparate behaviors and then invoking the full weight of the system against the label instead of the behaviors. It is fully possible to oppose the behaviors while recognizing that the current method of labelling, processing, and punishment may not be wise. Len Rose provides an example of how unacceptable but relatively benign behaviors lead to excessive punishment. This, however, is a broader social issue of which computer-related crimes is simply a symptom. Of more direct relevance: 1) It appears that the continued use of massive force and weaponry    continues. We've discussed this before in alluding to cases in New    York, Illinois, Texas, and California. The video tape of the bust    of the "Hollywood Hacker" resembles a Miami Vice episode: A    middle-aged guy is confronted with an army of yelling weapons with    guns drawn charging through the door.  Others on the board have    reported incidences of being met with a shotgun while stepping out    of the shower, a gun to the head while in bed, and (my favorite) a    15 year old kid busted while working on his computer and the    agent-in-charge put her gun to his head and reportedly said, "touch    that keyboard and die." The use of such force in this type of bust    is simply unacceptable because of the potential danger (especially    in multi-jurisdictional busts, which reduces the precision of    coordination) of accidental violence. 2. Until indictments and supporting evidence are made public, we    cannot be sure what the occured. But, it seems clear that, for    "Amy" at least, we are not dealing with a major felon.  Carding is    obviously wrong, but I doubt that, in situations such as this,    heavy-duty felony charges are required to "teach a lesson," "set    an example," and re-channel behavior into more productive outlets. 3. We can continue to debate the legal and ethical implications of    software piracy. There is a continuum from useful and fully    justifiable "creative sharing" to heavy-duty predatory rip-off for    profit. This case seems to be the former rather than the latter.    There is no sound reason for treating extreme cases alike. 3. We should all be concerned about how LE frames and dramatizes such    cases for public consumption. The Farmington newspaper gave it    major coverage as a national crime of immense proportions. We    should all be concerned about how piracy cases are handled, because    even extreme cases have implications for minor ones. Does    possession of an unauthorized copy of Aldus Pagemaker and Harvard    Graphics, collective worth more than $1,000, really constitute a    major "theft"? We have seen from the cases of Len and Craig how    evaluation of a product is inflated to justify indictments that    look serious but in fact are not. I'm not sure what purpose it serves to simply assert that people--even if guilty of carding or piracy--should "get what's coming to them" without reflecting on what it is they get and why.  The issue isn't one of coddling or protecting "criminals," but to examine more carefully what kinds of computer-related crimes should be criminalized, which should be torts, and which should be accepted as minor nuisances and--if not ignored--at least not criminalized. To give the dead horse one last kick: I am not arguing that we condone behaviors. I am only suggesting that we reflect more carefully on how we respond to such behaviors. I do not know the circumstances of "Tom" and "Mike," but "Amy's" case raises many issues we can address without condoning the behavior.-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [3]: QUICK COMMENT ON BUST              By: MERCENARY   CUD does not name its sources, but the following article in section  four appears to Substantiate the Article supplied to our Headquarters BBS.  by an Anonymous Donor.   Although the article claims Five Men were detained, its suprising in its  similarity of the original article supplied to us.   Even the file Circulating By The NotSoHumble Babe says the members were  going to pick up their carded packages.   At the time of this printing, We're trying to prepare an interview with  One of the busted members.   In closing please read section Four and try to formulate your own  conclusions.-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [4]: More USA Bust Info              Supplied By: Online BBS File Dateline: Livonia Observer, Monday, February 3, 1992 , Volume 52 Number 1               AUTHORITIES CRACK NATIONAL COMPUTER FRAUD RING In a continuous 36-hour investigation, Farmington Hills Police, U.S. Secret Service and Michigan State Police cracked what is believed to be a nationwide computer fraud ring operating from Farmington Hills and involving men from Livonia, Canton, Plymouth. Farmington Hills police briefly detained the five men, who they say agreed Thursday to cooperate with the investigation. Oakland County and federal prosecutors are reviewing the case to determine what charges will be filed against the five men - two from Livonia, one form Farmington Hills, one from Plymouth and one from Canton, said Farmington Hills Det. Sgt. Charles Nebus. The five men were not identified pending arrest and arraignment. "They are computer hackers," said Farmington Hills Det. Patrick Monti.  "They have a high level of expertise in computers." Members of the alleged fraud ring apparently gained access to computers of credit reporting companies and used information, such as credit card numbers, credit limit, card balance, and card holder names, to order computer equipment, Monti said. Purchases of computer equipment were billed to people who had no idea their credit card numbers and information were being used to place the orders, Monti said. The 36-hour investigation began early Wednesday, Jan. 29, with a telephone call to Farmington Hills police from a computer company with offices in Hawaii and Texas. Company officials told police they believed they had a fraudulent order that led to Farmington Hills. Police got in touch with Federal Express in Novi where packages where expected to arrive.  Dectectives Monti, Tim Swanson and David Loe conducted surveillance of the area. They saw three men in three cars arrive to pick up packages from the computer company, Monti said. Detectives followed the men to a Farmington Hills apartment where a fourth man was waiting. "At that time we confronted the occupants of the apartment.  And they agreed to cooperate with us." Monti said. Police surveillance continued to Meijer Thrifty Acres at Eight Mile and Haggerty roads, Northville Township, where the Canton man - considered to be the brains behind the operation - retrieved the packages, Nebus said. "It was a ring of people with the man in Canton as the main actor.  He placed the orders and others delivered the packages to him." Police recovered packages, valued at about $20,000, ordered by the ring. Forfeiture proceedings are expected to intitiated on equipment owned by one of the men in the ring.  The other packages of computers will be returned to the companies from which they were ordered, Monti said. "We determined all the packages we picked up were fraudulent," Monti added. "When they would go to Federal Express they would sign the name of the person (whose credit card numbers they used) for the packages. Farmington Hills police, Secret Service officers and the Michigan State Police searched the Canton man's house Thursday. "The Canton man placed the orders and advised a Farmington Hills man to go to Federal Express in Novi and pick up the packages," Monti said. "It is our belief they were selling the computers." The ring would make use of what is called a "bulletin board," which is computer information available throughout the country.  While using the bulletin board is not illegal, the information ring members used is, Monti said. "The detectives did an outstanding job," Nebus said. "From the time the information came in, these guys really had to scramble. I credit them with doing an excellent job on surveillance." Nebus also credited Federal Express. "We really depend on them a lot.  They're good folks to work with."-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [5]: Phantasy to Carry C.O.D.E. and D.O.A.              By: Knight Hack   Starting with this Issue, Number Seven. Phantasy Magazine will be carrying  independently authored files by C.O.D.E. (Crackers of Digital Equipment)  and D.O.A. (Distributors of Anarchy).   These two groups have agreed to distribute thier files in Phantasy, instead  of trying to distribute their files independently.   If your group would like to take advantage of Phantasys Distribution  network and not go through the hassle of setting up sites yourselves  please contact Mercenary at any listed site or Anubis at Dark Shadows.-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: Social Security Number Prefixes              By: C.O.D.E. (Crackers Of Digital Equipment)                           C.O.D.E Phile Number One                        SOCIAL SECURITY NUMBER PREFIXES           SSNs (Social Security Numbers) are issued with prefixes related          to the applicant's address at the time of application.           The following is a list of those prefixes for you to rapidly look          up by State.          Although accurate as of this printing, the information          this text provides may become obsolete.  The Social Security          Administration periodically adds to the numbers issued.  It may          at times assign numbers from one geographical area to another          area.          Prefix numbers are continuous from 001 through 626, and 700          through 729.  Numbers 627 through 699 and 730 or above may be          suspect.-------------------------------------------------------------------------------   STATE                    Prefixes Used                 Comment-------------------------------------------------------------------------------  AK Alaska                 Prefixes: 574  AL Alabama                Prefixes: 416 thru 424  AR Arkansas               Prefixes: 429 thru 432  AS American Samoa         Prefixes: 586  AZ Arizona                Prefixes: 526,527  AZ Arizona                Prefixes: 600,601             Since August 1985  CA California             Prefixes: 545 thru 573  CA California             Prefixes: 602 thru 626        Since August 1985  CO Colorado               Prefixes: 521 thru 524  CT Connecticut            Prefixes: 040 thru 049  DC District of Columbia   Prefixes: 577 thru 579  DE Deleware               Prefixes: 221,222  FL Florida                Prefixes: 261 thru 267  FL Florida                Prefixes: 589 thru 595  GA Georgia                Prefixes: 252 thru 260  GU Guam                   Prefixes: 586  HI Hawaii                 Prefixes: 575,576  IA Iowa                   Prefixes: 478 thru 485  ID Idaho                  Prefixes: 518,519  IL Illinois               Prefixes: 318 thru 361  IN Indiana                Prefixes: 303 thru 317  KS Kansas                 Prefixes: 509 thru 515  KY Kentucky               Prefixes: 400 thru 407  LA Louisiana              Prefixes: 433 thru 439  MA Massachusetts          Prefixes: 010 thru 034  MD Maryland               Prefixes: 212 thru 220  ME Maine                  Prefixes: 004 thru 007  MI Michigan               Prefixes: 362 thru 386  MN Minnesota              Prefixes: 468 thru 477  MO Missouri               Prefixes: 486 thru 500  MS Mississippi            Prefixes: 425 thru 528  MS Mississippi            Prefixes: 587,588  MT Montana                Prefixes: 516,517  NC North Carolina         Prefixes: 232  NC North Carolina         Prefixes: 237 thru 246  ND North Dakota           Prefixes: 501,502  NE Nebraska               Prefixes: 505 thru 508  NH New Hampshire          Prefixes: 001,002,003  NJ New Jersey             Prefixes: 135 thru 158  NM New Mexico             Prefixes: 525,585  NV Nevada                 Prefixes: 530  NY New York               Prefixes: 050 thru 134  OH Ohio                   Prefixes: 268 thru 302  OK Oklahoma               Prefixes: 440 thru 448  OR Oregon                 Prefixes: 540 thru 544  PA Pennsylvania           Prefixes: 159 thru 211  PI Philippine Islands     Prefixes: 586  PR Puerto Rico            Prefixes: 580 thru 584  PR Puerto Rico            Prefixes: 596 thru 599        Since August 1985  RI Rhode Island           Prefixes: 035 thru 039  RR RailRoad Retirement    Prefixes: 700 thru 729  SC South Carolina         Prefixes: 247 thru 257  SD South Dakota           Prefixes: 503,504  TN Tennessee              Prefixes: 408 thru 415  TX Texas                  Prefixes: 449 thru 467  UT Utah                   Prefixes: 528,529  VA Virginia               Prefixes: 223 thru 231  VI Virgin Islands         Prefixes: 580  VT Vermont                Prefixes: 008,009  WA Washington             Prefixes: 531 thru 539  WI Wisconsin              Prefixes: 387 thru 399  WV West Virginia          Prefixes: 232 thru 236  WY Wyoming                Prefixes: 520-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: FireCrackers Part I              By: Saint Anarchy/D.O.A.       FireCrackers are so simple to make that many books on fireworks      often ingnore them.       There are two main types of FireCrackers, but many different mixtures      or powder formulas.       This month I will only look at the "GIANT" FireCracker Class.       Handmade "GIANT" FireCrackers are made by first rolling paper around      a 3/4 inch wooden dowel until the paper is 1/8 inch thick. This is the      casing of the FireCracker.       The best paper to use is from a brown paper grocery bag. It is cut into      the desired width and length to make 1/8 inch when rolled.      On the last layer of the rolling process, the paper is glued and the      completed paper tube is slipped off the dowel.       1/4 Inch thick slice of the dowel is used to plug the end. The plug      for the fuse end is drilled to allow for the fuse. The plugs are smeared      with glue before being pressed into the end of the tube. More glue is      squeezed around the fuse after being inserted.       In all the directions I have for making giant FireCrackers, it is      recommended that they be filled only about 1/3 full. It is generally      accepted that completely filled ones are not as loud as 1/3 filled      tubes.       If you choose to only fill the tube 1/3 of the way, make sure you      insert the fuse deep enough as to reach the powder.      Adequate FireCrackers can be made with commercial gun powder, pistol      powder being the best to use,but even shotgun powder will do.      In Part II next month will look at complete powder formulas and      the second class of FireCrackers.-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: PHANTASY TIDBITS              News and Views of Interest              Edited By: Mercenary-------------------------------------------------------------------------------Dateline: 2/11/92From: Spokane,Washington                     DAD DOWNLOADS GUN INTO SON'S COMPUTER  A man apparently irritated by the amount of time his son spent using a Computer was arrested after firing seven shots into the machine, police said.  Charles R. Hubbard,44,of Spokane was arrested late Tuesday for investigation of assault, He was released Wednesday after posting $20,000 Bail.  "He appeared to be upset because his son was unemployed and all he did was mess with that -qoute- "STUPID" computer" police Sgt. Al Odenthal said.  The assault charge was for allegedly pointing a .45-caliber semi-automatic handgun at his son, Odenthal said.  "Im not sure if its against the law to shoot property in your own home," he said.-------------------------------------------------------------------------------Dateline: 2/14/92From: MIT (Massachusetts Institute of Technology)   Phantasy Note: It appears that MIT is having similar woes to Prodigy                  of Anti-Semitic Messages being placed on-line                  The following two letters have appeared in "The Tech",                  Volume 112,Number 5, (an MIT Newspaper).------------------------------------------------------------------------------- LETTER ONE:                 FREE SPEECH DOES NOT PROTECT ETHNIC "JOKES"      Freedom of speech and the privilege of attending an institution like     MIT imply, (but do not always require), responsibility.     As MIT's president, it often falls to me to defend freedom of speech     and academic freedom on our campus. I do so gladly and with conviction,     because it is important that our campus and society allow people to give     voice to difficult questions and analyses that may differ radically from     the norm.      Such defenses begin to ring hollow, however, when individuals engage in     mindless,offensive,and hurtful behavior just to "prove a point".     This is precisely how I would characterize the use of computer bulletin     boards by an MIT student to disseminate repugnant ethnic "jokes".      Surely those who exercise freedom of speech have a responsibility to     consider the consequences of what they say. Disparaging remarks about     certain groups within our cumminity are hurtful to those individuals     and diminish us all.                                           Charles M. Vest                                                 President------------------------------------------------------------------------------ LETTER TWO:             COMPUTER NETWORK NOT THE PLACE FOR ANTI-SEMITIC HUMOR      I'm deeply disturbed about reports that at least one student at MIT     is using the computer network to broadcast misogynist and anti-semitic     jokes, even holocaust jokes.      The use of our communications technology in this way can only diminish     and dehumanize the members of some groups in the eyes of others. To     dehumanize is a precursor to harassment, and even to persecution and     terror. If individuals want to demean themselves by telling such     jokes in private, they are free to do so. But to use MIT communication     facilities to greatly amplify the audience for such jokes should not be     considered acceptable behavior at MIT.      It is difficult enough to create a community of civility and caring     where people feel safe to share and learn without being confonted with     such ugly assault.                                         Rev. Scott Paradise                                         Episcopal Chaplain-------------------------------------------------------------------------------Dateline: 2/25/92From: Digital     DIGITAL ANNOUNCES THE ALPHA OPEN COMPUTING ARCHITECTURE,                THE WORLD'S FASTEST MICROPROCESSOR,                    AND NEW BUSINESS PRACTICES    ...Lays the foundation for 21st century network computing               with a solid bridge from the present.HUDSON, MA -- February 25, 1992 -- Digital Equipment Corporationtoday announced Alpha, its program for 21st century computing.According to Kenneth H. Olsen, President of Digital EquipmentCorporation, "Alpha is a totally new, open computingarchitecture that will be the foundation for advanced 21stcentury computing.  It will give computer users a clear andconsistent growth path from today's computing technology to thebenefits of advanced 21st century computer technology.  TheAlpha program is a major element in the new, more competitiveDigital Equipment Corporation, and we believe it willsignificantly fuel Digital's growth in the coming years.""This new architecture will, over time, address the needsof a broad range of computer users by providing systems thatspan the desktop to the supercomputer.  Alpha will offer usersthe flexibility to deploy current applications on popularoperating environments, beginning with OSF/1 and VMS.  It willenhance and extend the capability of today's Digital products.Customers can continue to buy today's leadership VMS and UNIXsystems from Digital knowing they have a clear entry path into21st century computing," added William Demmer, vice president ofDigital's VAX VMS Systems and Servers group.  "The beauty ofAlpha is that it opens the future with a solid bridge from thepresent," he added.Announced today were:o The Alpha architecture.  This advanced, full 64-bit  Reduced Instruction Set Computing (RISC) architecture is  optimized for speed, engineered to support multiple  operating systems, and designed to increase performance  by a factor of 1000 over its anticipated 25-year life.o The first Alpha product  -- Digital's 21064-AA RISC  microprocessor.  This 150-MegaHertz microprocessor is the  first in a family of full 64-bit chips with address space  many thousands of times larger than 32-bit  implementations from IBM, Hewlett-Packard, and Sun.  The  new chip has demonstrated performance at 200 MegaHertz,  and over time Digital will offer versions of this  microprocessor at various speeds.  Evaluation quantities of the 21064-AA microprocessor are  available now.  It is priced at $3375 each in units of 1  to 100; $1650 in units of 101 to 1,000; and $1559 for  over 1,000. Quantity shipments will begin in July, 1992.  The new RISC microprocessor chips are manufactured at the  company's high-volume, state-of-the-art manufacturing  plants in Hudson, Massachusetts, and South Queensferry,  Scotland.o New business practices to achieve the broadest possible  use of the Alpha architecture, and to make the widest  range of software available on Alpha.  Digital will sell  Alpha at all levels of integration  --  chip, board, and  system -- to other computer companies and to OEMs.  Digital also will license its operating systems  (including DEC OSF/1 and VMS), compilers, and layered  software products.  To ensure a broad applications portfolio, Digital is  offering a comprehensive support program to help leading  software companies quickly move up to Alpha.  Thirty  Alpha Upgrade Centers are being located in the US, Europe  and Asian Rim, staffed by software support personnel with  expertise in VMS, ULTRIX, and DEC OSF/1.  Complete  documentation, seminars and training session are  available now, and seed Alpha system will be available  this summer.  The Alpha Upgrade Program already is  underway with many leading software companies.  Major  vendors supporting the Alpha platform will be highlighted  at DECWORLD '92 beginning in April.o A variety of ways for customers to enhance their VMS and  UNIX computing environments with Alpha.  Customers can  develop and run applications on today's leadership VAX  and DECsystem products with the assurance that they  easily will be able to add Alpha systems into their  computing environments.  Alpha systems will provide data,  image, source code, and user interface compatibility with  VAX systems running open VMS and DECsystem products  running DEC OSF/1.  Alpha systems will network with these  products to share information and processing tasks, and  will work in VAXcluster configurations.  Common buses for  VAX, DECsystem, and Alpha systems means that many  peripherals will be able to be used between systems.o A complete portfolio of service programs for users and  other vendors who incorporate Alpha technology into their  products.  Digital will support customers with services  ranging from consulting to training, systems management,  and integration and upgrade services.  Digital will  support vendors during product design and implementation.  Through OEMs, VARs, or direct distribution channels,  Digital also will provide services for vendors'  Alpha-based products.Alpha will extend the ability of Digital's current softwaresystems environment to address major business opportunities.Supercomputer or large mainframe  applications -- seismic dataanalysis, econometric forecasting, molecular modeling,engineering design verification, and many others -- will be ableto run on Alpha at a fraction of traditional mainframe price perunit of performance.  Alpha will expand the market for networksof high performance distributed production systems and servers,replacing mainframes.  The powerful new single-chip Alphamicroprocessor will open new markets for embedded OEMapplications and board-level products.  Alpha will provide thepower for emerging personal use applications that are beyond thecapability of most of today's PCs, such as voice and video,visualization systems, imaging, and artificial intelligence.With Digital's NAS (Network Application Support), customers willhave the flexibility to integrate leading-edge, Alpha-basedapplications with their current applications environment."Alpha is based on the expertise Digital has gained from 35years of providing systems and networking based on leadershiparchitectural design," noted Robert B.Palmer, Digital's vicepresident of manufacturing.  "In addition, Digital has 15 yearsof experience in designing and delivering chip technology,including leading-edge CMOS technology.  We have some of theindustry's most advanced fabrication technology, and mostexperienced chip design teams using a leading-edge suite of CADtools, involved in delivering the world's fastest RISCmicroprocessor."DEC, DECsystem, DECWORLD, ULTRIX, VAX, VAXcluster and VMS are trademarks of     Digital Equipment Corporation.OSF/1 is a trademark of Open Software Foundation, Inc.UNIX is a registered trademark of UNIX System Laboratories, Inc.Hewlett-Packard is a registered trademark of Hewlett-Packard Company.IBM is a registered trademark of International Business Machines Corporation.SUN is a registered trademark of Sun Microsystems, Inc.--------------------------------------------------------------------------------=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [9]: "FOR THE PEOPLE"              News of Interest from BBS's Around the Country              Edited By: Mercenary------------------------------------------------------------------------------- IIRG NOTE: The following message has appeared on Pirate Boards across the            country, The English is a little frayed but I think the message            comes through Clear. We've Deleted the two American Board Numbers            to protect their anonymity.-------------------------------------------------------------------------------               _____              / ___/      _______________     __  _________             / /__   /\ /\\ __ \ __/\ __ \   /  \/ __/ ___/             \___ \ / // // ___/_/  /   _/  / /\ \_/ \__ \            ____/ // // // / / /___/ /\ \  / / / /_____/ /            \____/ \___/ \/  \____/\/  \/  \/  \/_______/                    _____                   / ___/____ __  ____ _____  _____                  / /_  / __//  \/ __// ___//\ ___/                 / /\ \/ _/ / /\ \_/  \__ \/ /__ \                / /_/ / /__/ / / /______/ / /__/ /                \____/\____//  \/___/\___/\/\___/             ____            / __ \ ____      ____ __    ____  __    ____           / /_/ // __/     / __//  \  / __/ /  \  / __/          / ____// /       / _/ / /\ \/ /\ \/ /\ \/ _/         / /    / /___    / /__/ / / / //\\ \/ / / /___         \/   O \____/ O  \____//  \/\___/ \/  \/\____/                  VIDEO GAME PIRACY TEXT PART #3 !   The Video Game Piracy has begun, call the bulletin boards for   Super Famiocm/Nes, Megadrive/Genesis, PC Engine/Turbo Express   Software!.   S.S.M.S.  Its an Alpha Flight again but it runs in Germany not in             the USA.. There is only an Amiga Section and this great             new Conference called `SUPER NiNTENDO / FAMiKOM'...             The BBS runs by SAiNTZ...   ULTRABOX  This one is one of the biggest and oldest Crack Houses             in Germany.. It runs by ULTRA and you can find there a             Amiga and again this great Console Conference...   WORLD OF MIRAGE On this bbs you can order The Super Magic drve                   in the USA and start to exchange file !   TOXIC INSULT  An indy BBS in search of quality users for support.                 Console conference is open and files should be pouring                 in real soon.   >>>>>> ALL BOARD NUMBERS WITH A VIDEO GAME PIRACY CONF!  <<<<<<  THUNDERDOME  AFLHQ  +1 408-263-9136  Amiga, Consoles  TREA.ISLAND   IPHQ  +44 992-465soon  Amiga, Consoles    ULT.DREAM   IPHQ  +44 222-495919   Amiga, Consoles  LIVING HELL  NEMHQ  +44 386-765550   Amiga, Consoles    THE OASIS  CSLHQ  +44 386-553876   Amiga, Consoles     S.S.M.S.  AFLHQ  +49 303-339471   Amiga, Consoles     ULTRABOX  INDI.  +49 303-943531   Amiga, Consoles  TOXIC INSULT INDI.  +1 [IIRG DELETE] Amiga, ConsolesWORLD OF MIRAGE  USA  +1 [IIRG DELETE] Amiga/IBM Consoles Well hope this has been useful to all you console pirates.  If you are Not and want to be you will need some sort of copying device, which Executioner/IP can supply you with, grab the files or call Ult Dream to find out more or to place an order!. Credits ~~~~~~~ This Text File : {Mr.SCARFACE} of CRYSTAL!           Ansi : {Mr.SCARFACE} of CRYSTAL!   Game Copiers : EXECUTIONER of INF.PERFECTION!   Modification : SAiNTZ of ALPHA FLiGHT   Further mods.: Zeke  of  T.I Big hi's to all the Sysop's and Co-sysops who run the Boards above.-------------------------------------------------------------------------------                    CYBERTEK: The Cyberpunk Technical Journal                        P.O. Box 64, Brewster, NY 10509                               What is CYBERTEK?                            by Thomas Icom, editor    CYBERTEK is The Cyberpunk Technical Journal.  Our first issue was printedin April, 1990.  We publish an issue once every two months.  CYBERTEK is aninformational and discussion forum for technological enthusiasts/survivalists/activists, and others whose desire is to maximize their freedom and be able tofunction as free citizens in a totalitarian society.    CYBERTEK was created because within the past years, The United States,once the model of freedom, has slid downward to become more and more of atotalitarian state.  With this downward slide has been the withholding fromthe people of certain knowledge and information which is essential to have ifthey desire to exist as free citizens in a free country.  An ignorant populaceis very easy for a tyrant to keep down, but people who are knowledgeable inthe ways and means to live independently and fight totalitarianism areimpossible for despotic state to have control over.  As James Madison, thefather of the U.S. Constitution, once said, "A people to mean to be their owngovernors must arm themselves with the power knowledge gives."    CYBERTEK's primary objective is the dissemination of easy to understand bythe average person technological survival information.  This is also betterknown in Cyberpunk literature as "street tech".  This covers, but is notlimited to, COMPUTERS, ELECTRONICS, PHONES, ENERGY, WEAPONS, CHEMISTRY,SECURITY, FINANCIAL, and HEALTH/MEDICAL.  Knowledge of these topics isnecessary for anyone seeking self-reliance and personal independence intoday's world; as well as for preparing for any "unforeseen circumstances".    The secondary  objective of CYBERTEK is the discussion of political,libertarian, populist, alternative & underground culture and opinions.  It isour aim to allow people to exercise their First Amendment right to freedom ofspeech and discuss their opinions and views.  In this respect, if we print asubmission, it will be printed unedited, uncensored, and in it's entirety.Unlike the majority of the traditional mass newsmedia, CYBERTEK takes the billof rights seriously, and will prove it.    CYBERTEK is published for educational purposes only under The FirstAmendment of The United States Constitution.  The subject matter, whilecontroversial in the eyes of some, is 100% legal to own in the United States.Although some of the information presented in CYBERTEK could be used in anillegal manner, no illegal acts are suggested or implied.    Subscriptions to CYBERTEK are $15 a year for six issues.  Sample issuesare $2.50.  Payment is by check, M/O (recommended), or by cash (notrecommended.  do at own risk).  You can send payment to the address at the topof this textfile.------------------------------------------------------------------------------- IIRG NOTE: The following file has been circulating with the USA BUST text            files, We can neither Confirm nor deny its Authenticity and            supply it here for your Judgement.------------------------------------------------------------------------------->From   : Static #1To     : AllSubject: BustDate   : 01-31-92 00:47We were busted today, by some Secret Service guys and some FBI people..This is no bull shit, they were here and made me delete everything I had andget rid of all my disks or they were going to take my hardware with them.There is no hidden section anywhere on this system, from now on everything isPublic Domain.. IE: Gifs,mods, stuff like that. When I get done cleaning theplace of all my disks I will re-do the system to make the sections look right.They have my user log, so change your passwords. I am not helping them bustother boards or narcing on anyone, this is our deal and we will pay the price.I hope that all of you continue to call here, I will try to run the board thebest I can.. We will go multi node soon as things settle down. And we will runa large gif section as they told me that was ok to do.              Static-------------------------------------------------------------------------------                           THE MICHELANGELO VIRUS                       Prepared by Charles Rutstein                              Research Center                  National Computer Security Association                            3631 Jenifer St. NW                            Washington, DC 20015          Voice: 202-364-8252  Fax: 202-364-1320  BBS: 202-364-1304   This document is copyright (c) 1992 by the National Computer Security   Association. Call 202-364-8252 to learn more about viruses and what you   can do to fight them.    The Michelangelo virus is based on the Stoned virus replication   process and is extremely destructive.  It was only discovered in   mid-1991, but it has spread extremely rapidly across the United   States.  Recently, several major companies have shipped products   infected with the virus.  Among these are Leading Edge Products,   who shipped up to 6000 infected machines [San Francisco   Chronicle, 25 Jan 1992], and DaVinci Systems, who shipped about   900 infected demo disks to customers and resellers [Virus-L Digest,   Feb 4 1992].    One of the major reasons for the growth in the number of   Michelangelo infections is the fact that the virus is new and is   undetectable by recently outdated scanners.  Additionally, it is   based on the same efficient replication process found in the Stoned   virus, which is the most common virus in the United States today.   Finally, the virus presents no messages to the user and so masks its   presence until triggered.    On March 6 of any year the virus will overwrite the hard disk with   random information found in memory.  The portions of the disk   overwritten include the FAT (File Allocation Table) and Master   Boot Record (MBR).  Recovery from the damage caused by the   virus is extremely difficult, if not impossible.  For this reason,   users should remember to keep updated backups and to check their   systems for the presence of the virus before March 6.    The virus infects the boot sectors of floppy disks and the master   boot records of hard disks.  When a system is booted from an   infected disk, the virus will place itself into memory and infect the   hard disk (if not already infected).  The virus occupies about 2K   (2048 bytes) of memory while resident, decreasing the available   memory reported by DOS accordingly.  While resident in memory,   any action which accesses a floppy disk (via interrupt 13h) will   cause that disk to become infected.  The virus places itself in the   last sector of the area on the diskette reserved for the root directory   entries.  Therefore, a disk with a full (or nearly full) root directory   may experience an immediate data loss.  Similarly, data loss can   occur on an infected hard disk when the virus moves the original   master boot record to a new location.  Some reports indicate that   the virus mis-interprets the Disk Parameter Block of 1.44 MB   floppies, causing them to return the message "Invalid Media" when   accessed again.  Note that every floppy disk has a boot sector,   regardless of whether or not it is a bootable disk.  Therefore, any   floppy disk can be a carrier of the virus.    Michelangelo is relatively easy to remove.  Before performing any   disinfection, cold boot the machine with a clean, write protected   diskette.  To disinfect floppies, use the DOS "SYS" command to   place a new boot sector on the disk.  Syntax is "SYS X:", where   X is the drive containing the infected diskette.  The only easy way   to remove a hard disk infection with DOS is to use the DOS 5.0   FDISK program.  Use only DOS 5.0 for this procedure; all other   versions may destroy data!  Type "FDISK /MBR" to remove the   virus by rebuilding the MBR.    All major recent anti-virus packages should be able to reliably   remove the virus.  Two shareware products available on the NCSA   BBS (202-364-1304 8/n/1) are SCAN/CLEAN from McAfee   Associates and F-Prot from FRISK software.  With Clean, type   "CLEAN X: [mich]", where X is the infected drive.  With F-Prot,   type "F-Prot /Auto /Disinf X:", where X is the infected drive.  Call   NCSA at 202-364-8252 for free help in removing this and any   infection.------------------------------------------------------------------------------- IIRG NOTE: The following Two Messages illustrate the downfall of Genhis Khan,            a Dayton,Ohio Area Hacker. The first message shows the root of the            problem, the second shows the result.-------------------------------------------------------------------------------When   : 2/6/92Subject: Public Domain...To     : All>From   : Genghis Khan        OK,                In Dayton Ohio we have a little problem.  A few months ago,someone pulled up this pd sysop's credit report, who was getting on our nerveswith his anti-virus shit.  Anyways..  over $7000 worth of charges were put onhis credit cards.  Some shit was sent to his house.  But still I think it's$6300 is still unaccounted for.        From there on, the PD has pretty much declared war on the underground.They have formed a group called LPACHUL with the main constituant being HellsFurrie.  Hells Furrie gets information from narcs in the underground, and alsoget's people to try to infiltrate the underground boards.  Then they captureeverything they see and put it in these newsletters.        I've locked out probably 10-15 people who could be narcs.  I know a lotof other people have locked out a lot more also.  I'm trying to run a not sosuper elite board.  But one with Phreak Klass, Hack Klass and trying to teachthe 'lamers' how to get around and not look like idiots.        What I'm asking is this.  We've done all kinds of shit.  We played upand made them look like idiots by creating a group called Smells Furrie andmade newsletters like Hells Furries' but with everythign turned around.  Wemade annoyance dialers that would call the sysops home fone number.  We madeprograms that plain made fun of the pd.  And passed it around the pd.  We hadthe main guy's fone disconnected (Al Lee).  He got it reconnected the next day.We've tryed a lot of shit.  But they still keep coming. And each newsletterthey put out exposes more and more about the underground..        So.  We tryed to control it, but I think their views maybe nationwide.That they might want to take down h/p and warez boards around the country.  Ifwe don't stop them now, they may start telling other people in other towns totry the same thing.        This is a big problem.  So I'm asking for EVERYONE's help.  If you caninfiltrate their boards, and trash/crash them.  Send shit to their house.Cause general Anarchy we can win this war.  It's getting out of control.  And Ithink that WE NEED TO STOP IT!        So..  If you guys would like to terrorize, here is an address.        [IIRG Edited]        [IIRG Edited]        Dayton Ohio 45414        Home Fone Number [IIRG Edited]        Data Fone Number [IIRG Edited]        His board is called [IIRG Edited].  He is butt buddies with JohnMcAffee and sends every file he gets to McAfee to get it checked out and shit.He passes around all them damn virus scanners and cleaners and shit, which makeit hard to trash boards.        Get this guy first.  I'll have more address and fone numbers soon!                Genghis Khan-------------------------------------------------------------------------------When   : 2/14/92Subject: BUSTTo     : All>From   : [IIRG Edited]Well, tonight at around 10:00 I got a call from my friend Genghis Khan, yesthe one who is on my board and always posting on this net.  It turns out thattoday, he recieved a visit from the Secret Service and the Sheriif.   Theyconfiscated about everything, his computer, all his disks, papers, printer, andeverything else.  He was busted for hacking and using the 1-800-733-5000extender and for pulling CBI's.   It turns out that the head PD guy that wehave been telling all of you about, reported him and there was also a narc (whowe are almost positive was THE ENFORCER a.k.a THE PREVENTOR a.ka. Dave Rowe)I don;t have much time right now to go into further detail, but i will postmore tommorrow and when i talk to him again.  Along with Genghis, TERM INAL,was also busted, and possibly others.   IF YOU RUN A SYSTEM OR ARE ON A SYSTEMTHAT HAS EITHER OF THESE USERS, I WOULD RECOMEND DELETING THEIR ACCOUNTS,BECAUSE THEY WILL NOT BE CALLING ANYMORE.  Please let people know that 733'sand CBI have busted them, and play it safe.--------------------------------------------------------------------------------=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [10]: IIRG Distribution Sites    IIRG World HQ:           Dark Shadows                             19.2/9600 Baud HST                             24 Hours a Day                             1.2 Gigs Online                             (203)-628-9660 IIRG Distribution Site One: Restaurant at the End of the Universe                             2400/1200 Baud (3 Nodes!!)                             24 hours a day                             130 Megs of Files                             (203)567-8903 2 Nodes 2400                             (203)567-4808 1 Node 1200 IIRG Distribution Site Two: The Generic Access BBS                             INC New England Regional District HQs                             IUD New England Regional District HQs                             1.2 gigs online                             USR Dual Standard HST                             NO Ratios                             (508) 281-3961-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [11]: Phantasy Distribution Sites Phantasy's Distribution Site's are continually growing,we apologize if you called a board and didn't find the Mag. Network Distribution Sites will have the Issues first, we suggest calling one of them if a problem does arise.  1. Lightning Systems     19,200-1200 BAUD, 24 hours a day     (414) 363-4282  2. Sycamore Elite     19,200-1200 Baud HST, 24 Hours a day     (815) 895-5573  3. The Works BBS at (617-861-8976)     Largest Text Files BBS in the world, 3500+ text files online.     2400-300 Baud, 24 Hours a day  4. Pipers Pit BBS     19,200-9600 HST ONLY!!     24 Hours a Day     THG DISTRO SITE     (203)229-3251  5. Blitzkrieg BBS                  TAP Magazine     (502)-499-8933                  P.O. BOX 20264     Home of TAP MAgazine            Louisville,KY. 40250-0264  6. The Dickinson Nightlight     (713)-337-1452     Der WeltanSchauung Distro Site (World View Magazine)     Phantasy Distro Site  7. Lucid Dreams     (713)-522-0709-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-                       PHANTASY(C) IIRG 1991,1992                        May Odin Guide Your Way!-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-.