-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE SIXTEENTH ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETRIEVAL = - GUILD - = = - Hacking,Phreaking,Anarchy,Survivalism,Commentary - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Four,Issue Number Sixteen Dated 04/15/93 Editor is Mercenary : mercenar@works.UUCP Article Submissions: The Mercenary/IIRG 862 Farmington Avenue Suite 306 Bristol,Ct 06010 IIRG World Headquarters BBS: The Rune Stone 14.4K HST Courier All H/P/A, 3000+ Files (203)-832-8441 Table of Discontents: [1] The "Rune Stone" Returns By: Anubis [2] Ripco : Not Dead Yet (Two News File Bulletins) By: Dr. Ripco of Ripco II BBS [3] Phone Preak Techniques By: Mercenary [4] DEF CON I Announcement [5] FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary 1. American Dissident Voices 2. PHAGE Magazine Information [6] The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary 1. PE vs TDT 2. TDT vs PE 3. SeCT News Announcement 4. IIRG Note on SeCT News Announcement [7] PHANTASY TIDBITS: News and Views of Interest 1. Pupils Had Bomb Guide 2. Highway Sign Has Officials Blushing 3. Vulgar Highway Messages an Outside Job, Police Say.. 4. IIRG Note on Highway Sign [8] Listing of IIRG Distribution Sites [9] Listing of PHANTASY Distribution Sites -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- OFFICIAL DISLAIMER... All information in PHANTASY is from USER contributed material The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. PHANTASY is (C) 1990 by The IIRG IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: The "Rune Stone" Returns By: Anubis The Runes are there, for any fool to read. But only he who has Hung on the Tree,as did Father Odin. One who has gazed on the Abyss and suffered its emptiness, May know their true meanings or tap the Power that lies within. After almost 18 months, the long awaited event has arrived. The return of The Rune Stone BBS At last the Public Node of the Rune Stone BBS has been re-installed for the readers of Phantasy and the H/P Community at large. We hope those of you with an interest in Hacking or of the Underground community will call and join. We have No-Online Charges and no connect time charges. Online are the IIRG Archives of nearly 3000 files consisting of Hack/Phreak Text files,Magazines,Newsletters,etc. etc. with NO RATIOS!! Please, if you were on the old Rune Stone, call back and set up an account on the New system. The Rune Stone BBS (203)-832-8441 IIRG World Heaquarters NUP: Conspiracy 14.4 HST IIRG NOTE: Starting with Computer Underground Digest #5.26 the Rune Stone BBS will be listed as a CUD Distro Site. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [2]: Not Dead Yet From: DR. RIPCO Were not dead yet, but getting there... Well folks, things didn't quite work out as we planned, no surprise with messing with Unix based OS. Because of a limitation in the OS and the hardware on this end, the expected closing is going to be delayed for a while. We'll probably be playing with the new system on a different machine so things here will be normal, or as close to it for a while. Things are a bit screwed up though, since everything was transfered off and returned back in a different order a few minor items got messed up. I'll be tweaking things on and off so hang on to your shorts if you run into a problem. Dr. Ripco RIPCO II BBS (312)-528-5020 ------------------------------------------------------------------------------- Date: Sun 4-11-93, 10:26 pm From: DR. RIPCO To: All Subject: System Closing Update Just to clear up the situation around here and to answer the bunch o'questions I've received in e-mail... First off, the system will be gone sooner or later. Some things jumped the gun without proper forethought but since somewhat new ground is being broken around here, the earlier annoucement probably should not have been made when it was. Secondly the new system at this point in time will be a complete second system totally disconnected from this one. It'll be that way until the second system is stablized enough to run on it's own. I've even been toying with the idea of letting this system run on it's own, probably on a different phone number even after the second system gets going. Not sure on this matter, it depends much on how the newer system looks to me and what it's capable of doing. In any case, to answer the question of when and if it's worthwhile calling here for the mean time, the answer is soon, probably by mid-summer at the earliest and no later than fall. If things don't come together by then, I doubt if it'll come to pass at all. To answer the question of "why" is simple. The new system presented itself much easier in thought than in real execution. Everything is going along but each step taken creates another fork in the road. Rather than killing the current system off and making the users pay for it in frustration of it being here one day and not the next, it was decided to start from scratch and all the "messing around" will be done on another computer system. So consider things to be "as usual" for the immediate future. Dr. Ripco -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [3]: Phone Phreak Techniques By: Mercenary As companies attempt to secure there phone systems, many phreakers are once again turning to residential systems to secure there on-line time. I feel this may be the kiss-of-death for many of you out there. For everytime phreakers abuse residential systems a general uproar is usually started in certain Law-Enforcement circles after numerous complaints from residential customers. I present to you here some more of the popular scams being used by the phreaking community at this time. 1. THIRD PARTY BILLING This scam usually is pulled on someone the phreaker knows, but dislikes. It works well with traveling salesmen or others who's job requires them to spend a large amount of time away from home but leaves their family behind. The Phreaker will pose as the individual who is away and will have the operator call the real individuals home. The operator will inform the family Member that their "Loved-one" is making a third-party call and will they accept the charge. The unsuspecting family member will say, Yes we'll accept the charges thinking it is their real "Loved-one" And thus the phreaker has secured his access. 2. JUST SAY YES! With this scam the phreaker will pose as a Security Representative of an individuals long distance carrier (Sprint,AT&T,MCI) and say someone is using your phone line for some form of illegal activity. He will inform the unsuspecting "mark" that if he will accept a request to charge a long-distance call to his phone from the operator who will call him in several moments, it will allow them to trace the "criminal". The phreaker will of course explain to his "mark" that he will credit their account and they will not really be billed for the call. Being a law abiding "Americas Most Wanted" viewer, the mark will of course help the "Security Representative" get his man and accept the charges. Once again the phreaker has secured his access. 3. CALL FORWARDING SCAMS A phreaker posing as a telephone company technician will go to a "marks" house and present a legitimate looking ID they will have either scanned (stolen from a real employee) or created with a desktop publisher. He will inform the "mark" that they are having problems with the lines in his area and could he come in and do a quick check on the "marks" line. The phreaker will go to the "marks" phone and do what looks like just a quick check of the "marks" phone, but in reality he is call-forwarding the phone to a payphone where his accomplice will answer the phone. He will inform the "mark" that everything is fine and will leave. In the meantime, his accomplice will be answering the payphone and saying yes, I'll accept the charges for half of their phreaking buddies around the country placing third-party-calls. Sometimes the phreakers will not even enter your home to call forward your phone. they will clip into your lines with a homemade linemans handset and call forward from there. This is known as "Call Clipping". This particular technique works well in apartment complexes where almost all the junction boxes are located in the basement. 4. SOCIAL ENGINEERING In this scam, the Phreaker will call his "mark" posing as a police detective or some form of Law-enforcement official. The Phreaker will inform the "mark" that they have caught a family member or close friend commiting telephone fraud. The Phreaker will say that he cannot give out the name of the individual, because if he's innocent, the police do not want to make his name public. The phreaker will then ask the "mark" if they would help clear their family member or friend by accepting a collect call so they could trace the call to the real "criminal". Once again the phreaker gets his time. ----------- *** ------------- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [4]: DEF CON I Announcement Hey Schlenises: Pulled from the fringeware@wixer.cactus.org Finalized Announcement: 4/09/1993 We are proud to announce the 1st annual Def Con. If you are at all familiar with any of the previous Con's, then you will have a good idea of what DEF CON I will be like. If you don't have any experience with Con's, they are an event on the order of a pilgrimage to Mecca for the underground. They are a mind-blowing orgy of information exchange, viewpoints, speeches, education, enlightenment... And most of all sheer, unchecked PARTYING. It is an event that you must experience at least once in your lifetime. The partying aside, it is a wonderful opportunity to met some of the celebrities of the underground computer scene. And those that shape its destiny - the lawyers, libertarians, and most of all the other There will be plenty of open-ended discussion on security, telephones and other topics. As well as what TIME magazine calls the "Cyberpunk Movement". Las Vegas, is as you might have guessed a great choice for the Con. Gambling, loads of hotels and facilities, cheap air fare and room rates. It's also in the West Coast making it more available to a different crowd than the former Cons have been. Your foray into the scene and your life will be forever incomplete if by some chance you miss out on DEF CON I. Plan to be there! WHO: You know who you are. WHAT: Super Blowout Party Fest, with Speakers and Activities. WHERE: Las Vegas, Nevada WHEN: July 9th, 10th and 11th (Fri, Sat, Sun) 1993 WHY: To meet all the other people out there you've been talking to for months and months, and get some solid information instead of rumors. DESCRIPTION: So your bored, and have never gone to a convention? You want to meet all the other members of the so called 'computer underground'? You've been calling BBS systems for a long time now, and you definitely have been interacting on the national networks. You've bullshitted with the best, and now it's time to meet them in Vegas! We cordially invite all hackers/phreaks, techno-rats, programmers, writers, activists, lawyers, philosophers, politicians, security officials, cyberpunks and all network sysops and users to attend. DEF CON I will be over the weekend in the middle of down town Las Vegas at the Sands Hotel. Why Las Vegas? Well the West Coast hasn't had a good Convention that I can remember, and Las Vegas is the place to do it. Cheap food, alcohol, lots of entertainment and, like us, it never sleeps. We will have a convention room open 24 hours so everyone can meet and plan and scheme till they pass out. Events and speakers will be there to provide distraction and some actual information and experiences from this loosely knit community. This is an initial announcement. It is meant only to alert you to the time, dates and location of the convention. Future announcements will inform you about specific speakers and events. An information pack is FTPable off of the internet at nwnexus.wa.com, in the cd/pub/dtangent directory. The IP# is 192.135.191.1 Information updates will be posted there in the future as well as scanned map images and updated speaker lists. FINAL NOTES: COST: How you get there is up to you, but United Airlines will be the official carrier (meaning if you fly you get a 5% to 10% price reduction off the cheapest available fare at the time of ticket purchase) When buying airline tickets, call 1-800-521-4041 and reference meeting ID# 540ii. Hotel Rooms will cost $62 per night for a double occupancy room. Get your friends -- together and split the cost. Food is inexpensive. The entertainment is free inside the hotel. Reference the DEF CON I convention when registering, as we have a block of rooms locked out, but once they go it will be first come, fist serve. Call 1-800-634-6901 for the reservations desk. The convention itself will cost $30 at the door, or $15 in advance. Mail checks/money orders/cashiers checks to: DEF CON I, 2709 East Madison Street, Seattle, WA, 98112. Make them payable to: "DEF CON" we're not trying to make money, we will be tring to cover costs of the confrence room and hotel plus air fair for the speakers who require it. Don't bother mailing it a week in andvance, that just won't happen. Advanced registration gets you a groovy pre-generated name tag. Include with your payment the name you want listed, your association/group affiliation/bbs/whatever, email address, and/or bbs number for syops. Last day for the registrations to reach me will be july 1st. SPEAKERS: We are soliciting speakers from all aspects of the computer underground and associated culture (Law, Media, Software Companies, Cracking Groups, Hacking Groups, Magazine Editors, Artists, Etc.) If you know of someone interested in speaking on a self selected topic, please contact The Dark Tangent to discuss it. FOR MORE INFORMATION: For initial comments, requests for more information, information about speaking at the event, or maps to the section where prostitution is legal outside Las Vegas (Just Kidding) Contact The Dark Tangent on any of the following networks in the general conversation echos: CyberCrime, Platinum Net, Thunder Net, Scurvy Net, The Crime Syndicate, ~TOP~, Net, HiT Net, Shark Net. Leave the comments in the general message sections. Or leave me mail at: dtangent@dtangent.wa.com on the Internet. Or call: A Dark Tangent System at: 206.722.7357 (This # will change 6/1/93) Or Snail Mail (U.S. Postal Service) it to DEF CON, 2709 East Madison Street, Seattle, WA, 98112. Future information updates will pertain to the speaking agenda. ------------------------------------------------------------------------------ DEF CON I CONVENTION [PROPOSED SPEAKING SCHEDULE 4.9.1993] Saturday the 10th of July INTRODUCTION Welcome to the convention *The Dark Tangent (CON Organizer) Keynote speaker Cyberspace, Society, crime and the future. Civil Libertarians -CPSR Computer Privacy/1st Ammendment/ -EFF The future of Internet/Who owns it -USC Comp. Law Legalities of BBS Operation, message content laws and network concerns. *Allen Grogan, Editor of Computer Lawer 'The Underworld' -Networking Concerns of National Networking of CCi Net. *Midnight Sorrow. -Pirating Concerns of a Pirating/Cracking Organization. Concerns of a Major BBS operator Why run the Risk? -Virus Virus Creation/Explanation Corporations -Packet Switching SPRINT Concerns/security and the future MCI of packet switching. (*Jim Black, MCI Systems Integrity) Internet -CERT Changing rolls / Changing environmnets -CIAC System 75 Information on the System 75 *Scott Simpson -System Administrator Security Concerns of an Administrator *Terminus The 'Underworld' -Internet The security problems with Internet/Networks Overview of hacking *Dark Druid -Getting Busted The process of getting "busted" *Count Zero -PBX Defeating ANI/PBX Q&A *Anonymous -How to be a nobody Hiding your identity in the high-tech future, or The payphone is your friend. *Anonymous Other Institutions -The Secret Service Their Defined Roll/Priorities/Q&A *Nevada Secret Service Office -The Prosecutors Their concerns/problems and Hacker Hunters suggestions for the 'underworld'/Q&A -The Media The effect of the media on public perceptions *Erik Bloodaxe / Phrack Magazine CONCLUSION General Q&A This itenerary is proposed, and topics and speakers will be marked as permanant once a confirmation is received. This is by no means the exact format of DEF CON I. Any Questions / Comments Contact: dtangent@dtangent.wa.com A Dark Tangent System 206-722-7357 [> A Dark Tangent System 206.722.7357 <] -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [5]: FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary ------------------------------------------------------------------------------- Listen To, AMERICAN DISSIDENT VOICES A radio program for real Americans!! Nationwide and Worldwide: Every Saturday evening at 9:00 PM Eastern Time, 6:00 PM Pacific Time on 7355 KHz (shortwave) from WRNO, New Orleans. The signal covers all of North America and most of the rest of the world. Regional listeners: Arkansas : Every Saturday morning at 10:00 AM from KMTL, 760 on your AM dial. The Signal covers most of Arkansas. California : Every Sunday evening at 6:00 PM from KPLA, 770 on your AM dial. The signal covers much of northern and central California. Florida : Every Saturday morning at 11:30 AM from WTIS, 1110 on your AM dial. The signal covers a wide area of West-central Florida. Virginia : Every Saturday night at 10:30 PM from WKGM, 940 on your AM Dial The signal covers most of tidewater Virginia. ------------------------------------------------------------------------------- PHAGE Magazine Information Package (March 1993) Welcome To The Future --------------------- Hello. Our names are Andy Hawks and Paul Leonard, and we are the publishers of a new zine called PHAGE. PHAGE is a new magazine for people who are living on the new edge, surfing along the new wave of radical thought. This magazine was born from the need for a forum for new ideas in a print media. Andy Hawks has been producing an electronic mailing list called Future Culture for the last two years, catering to the desires of modern thinkers. This list, along with the Frequently Asked Questions file which is a primer for the list,arose out of an interest primarily in cyberpunk fiction, particularly the idea that "cyberpunk is really about the present". >From there, the spectrum of information contained in the FutureCulture list spread to include a wide snapshot of aspects of modern culture that are ahead of the mainstream, oriented towards the near-future. This includes all realms of what is commonly called "new edge", "technoculture", or "cyberculture" -- a mishmash of postmodernism, psychedelics, hacking, raves, cyberspace, industrial music, cyberpunk fiction and realities, etc., that are proving to be important constructs in the evolution of world culture. The list and file continues to grow and morph, gaining a wide audience including,at one time or another, a variety of sociologists and anthropoligists, authors and writers, hackers, scientists, students, and prominent "cyber-" oriented figures.Those who share an interest in the topics discussed in the file can participate in in-depth or light-hearted discussions via the FutureCulture E-list. Concurrently, and independantly, Paul Leonard has been releasing fiction into the cybersphere through the Cult of The Dead Cow. The goals of cDc , since it's inception in 1986, have always been to create a culture within the new world of cyberspace. He has also ventured into the realm of print publishing with FNORD! Magazine, from 1989 to present. The two of us came together through the FutureCulture mailing list, along with the Leri & Aleph mailing lists. The bond was solidified over discussions on the Internet Relay Chat #leri conference. After a long period of deliberation it was decided that we should allow our ideas to propagate to as many people as possible. We decided that the best way to do this at this time was to start a print magazine based around our ideals. We live in a world where paper and television are the informational messengers of choice to the masses. The magazine will be designed and produced on the Macintosh computer, in an 8 1/2 x 11" format, and each issue will be in the area of 64 pages. We are planning to sell the magazine at a cover price of $3.50 (US), but until costs are measured, we cannot say for sure. We are looking for submissions and assistance with this project from all angles: fiction writers, essayists, ranters, graphic designers, artists, poets, etc. Submissions are welcome in any form, in any style, in any tone, though that is not a guarantee that everything we receive will be printed. We are looking for submisisons as soon as possible, but feel free to send them in whenever you like. For first issue, send them in by the second week of April. Due to lack of available resources, we are unable, for now, to reward monetarily those who contribute to PHAGE. We have have little money, and our primary interest is producing the highest-quality magazine possible, containg an immense spectrum of information. If you would like to contribute to PHAGE in any way, please send all queries, submissions, tips, words of wisdom, etc., to us on the Internet at: obscure@mindvox.phantom.com or ahawks@nyx.cs.du.edu If you do not have Internet access, please send mail to: PHAGE Magazine PO Box 10821 Green Bay, Wisconsin 54307-0821 ________________________________________________________________________ Possible Content Material ________________________________________________________________________ Focusing on the Edges of Culture, examining the Fringes of Reason and the Reasons of Fringe, the Here and Now and Soon-to-Be, via unstrcutured Tones that Ebb and Flow from In-Form Information to Formless Rants of Altered States. The following are groups of potential topics that we have divided into categories to make things more coherant. GENESYS ------- Notes from the Editor, Leters from those that Grep and/or Grok the Infinite Edge. nuMEMES ------- Soundbytes of the World, Unite and Take Over. Blurbs pertaining to interesting news and products, quotes, technology, factoids, etc. MODERN ------ Cultural Commentary - Realizing, Focusing, and Morphing the PostModern World. Rants, Essays, Theses, Observations, Predictions, Analyses, Streams and Rivers of Consciousness. -SUB ---- The Depths of the Underground Subcultures. Rants, Essays, Theses, Observations, Predicions, Analyses, and Information. E+ -- The Virtual World. News, Notes, Notables and Quotables, Rants, Essays, Theses, Observations, Predictions, Analyses, Communication, Teknologies. Inner-View ---------- Interviews (I-Views) and E-Views with those who Surf, Ride, Make and Break the Edges of Culture. STREAMZ ------- Fiction on The Edge: Transreal, Hyperreal, SlipStream, Cyberpunk, Post-Cyberpunk, [insert_any_word_here], etc. MEDIA ----- Reviewing, Analyzing, and Commentary regarding Popular and Underground Media: Books, Magazines, Zines, E-Zines, E-Books, Hypertext, Music, Film, Video, Television, Software, etc. MOEBIUS ------- One Last Informational Fix, Closing Words, Late-Crashing News, etc. If you would like to contribute to PHAGE in any way, please send all queries, submissions, tips, words of wisdom, etc.,to us on the Internet at: obscure@mindvox.phantom.com or ahawks@nyx.cs.du.edu If you do not have Internet access, please send mail to: PHAGE Magazine PO Box 10821 Green Bay, Wisconsin 54307-0821 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary and Anubis ------------------------------------------------------------------------------- *** HARD CORE IS A THIEF AND HERE IS PROOF *** All right before I start on the actual proof here I want to make shure that the few well known facts are stated so that EVERYONEknows the real story! 1) Ultima 7 Part 2 was released by Public Enemy first it was uploaded to Unlawfull Entry about 4-5 Hours before TDT's version was released! 2) As I was starting to upload the third disk a TDT courier was downloading Public Enemy's Crack file. 3) 4-5 hours later Hard Core nukes Public Enemys version saying the original and the crack were stolen from TDT. (Hard Core in particular) 4) Hard Core's proof of the stolen crack consisted of blank lines that were in our TSR file that were supposed to have originally had Hard Core's first name in there twice ROB ROB. Now these are known facts and im shure no one will dispute the fact that this was the information that was being spread by TDT namely Hard Core. Well I am here now to prove the thief to be Hard Core. First we will adress the ROB ROB that was supposed to be in Hard Core'sTSR. If you look to Rob's TSR you will find that the ROB ROB that is in there also has many other blank spaces around it. You may ask yourself why are those other spaces there?? Well i'll tell you, the TSR that was used was written by TERMINATOR he took it from a previous crack of his that he did while he was cracking for Fairlight a little while back. That release was called MEGAFORTRESS. If you download that release from any BBS you will find the TSR to be the same one with TERMINATOR'S info filling those blank spaces perfectly! I will upload the TSR from that game following this text file get it and compare orif you want to be 100% shure download MEGAFORTRESS pull it apart and see for your self! Now if this is not enough for you people who still dont believe I have a second piece of proof for you! Download any TDT release that Hard Core supposedly wrote a TSR for and run it. You ask what for?? because you will hear silence! Now do the samewith any game TERMINATOR cracked and wrote a TSR for and run it. You will hear Terminators LEGENDARY beep. Now the deciding factor run the TSR from TDT's version of Ultima 7 and holy shit it fucking BEEPS! Now for a third piece of information any of Hard Core's TSR's that you will look at stay in memory where Terminators ALWAYS TERMINATE! The TSR that we supposedly stole from Hard Core Terminates from memory! See what happened here is whoever stole TERMINATORS crack for Ultima never took out his beep and put ROB ROB in there to try and make it look like we stole it from Hard Core. Now I dont know if hard Core did this or Hydro did this (since Hydro uploaded the crack file I dont know why) but whatever the case Hard Core claimed this to be his own! So its very obvious that Hard Core was NEVER able to crack this game! To Hard Core if you really could not crack the game why not deal with it? Did you really think you were going to get away with this? I really cant believe this was done... But at least the truth is nowout all that is left to say is GREAT JOB TERMINATOR! Speed Master/Blade Runner/The Hawk =============================================================================== -//- T H E D R E A M T E A M -\\- 1993 - 3RD YEAR ANIVERSARY ON IBM For all of you guys that wonder what the HELL is going on in the PIRATE scene right now... [1] Public Enemy is the first group on the IBM that took another groups crack and game and released on their own, they are NEVER gonna get respect on the scene since they fucked up so badly, they will always be remembered as a NO BALLS GROUP. [2] The Grim Reaper is NO LONGER affiliated with TDT since he tried to run the group on his own and start to tell people this and that person was out of TDT I'm the only person in this group that can do that. [3] There is no changes in TDT except of one person i out of it. If you have any questions about this contact me on Unlawful Entry. PERSONAL NOTES: THE HAWK - How can you be so lame and calling me a lie'er when you know in your heart that you guys stole my crack and remove my name? SPEED MASTER - Don't try to put an attitude on anyone, a lowlife like will never kick ass like you always wanted, you should just crawl back to your whole and keep shut up BLADE RUNNER - Man, get a life. Your mates at PE dont even know how to spell SCRIPT LANGUAGE - Dont tell me you loose respect for me for doing this, you are the one loosing respect from everybody RESET OF PE - How can you guys stay in such a lame as group, where you guys dont have the balls even to admit you guys cant crack shit THE SCENE - Don't ever respect anyone in PE LAME. You can rag, you can bullshit, call each other lamers, but NEVER EVER steal somebody elses CRACK that that person spent 4 days to do, and then try to tell him he is a fuckhead. There were several persons that got the game and even HAL9000 said he dont even try on this one. NOBODY belives a slow fuck like terminator could do it, and besides, he just needed to change my crack a bit. FINAL WORD - A few positions left in TDT, if you are the one that want to be a part of a REAL CRACKING GROUP then contact us today! FIGHT AGAINST LAMERS!!! ============================================================================== ATTENTION ATTENTION ATTENTION SPA ALERT! SPA ALERT! WHOOOP! WHOOOOP! WHOOOOP!!!! This is a little text file warning to all Connecticut BBS's. The SPA is lurking in CT. Now the story! According to our information here at SeCT WHQ we have information for all the users out there about some recent activity in the area. Kevin B****, Yes the fool that writes the Connecticut BBS list, has called the SPA on (IIRG Delete) This board was a killer board run by the (DELETED) At this time we have no more information on why this was done, but we will be conducting an interview with each of the people involved,to get the truth. At this point we at SeCT think Kevin B**** is an asshole and should be destroyed. Also according to other information he had two other people who helped him do this their names are Lou R****** and Jason L*****. As I said before when we conduct the interviews we will have more information for you. For now our suggestion to all bbs's to delete these people if they are on your board and tighten security. Never know what board he will turn in next. So to Kevin B***** and his friends we at SeCT think you are a fuck'in asshole. P.S.- Kevin if you are reading this and feel we are in the wrong we will be conducting an interview with you to get your sidfe of the story. This has been a SeCT News Warning 03-22-93 SeCT Staff All users please pass this file around unchanged to everywhere you call! ------------------------------------------------------------------------------- IIRG NOTE ON SECT NEWS ANNOUNCEMENT The previous news file released by SeCT is partially correct. The IIRG has recieved a tape of a phone conversation that was apparently secretly recorded amongst some of the people mentioned in the SeCT file. The truth of the matter in what we've transcribed so far is that the only real person responsible was the person named "JASON". Mercenary recieved an E-mail letter from one of the persons mentioned in the file and this is what he recieved... (Edited of Course) -------------------------------------------------------------------- Subject: SIN CITY BBS To: The IIRG Hello... this is Lou XXXXXXX... I have written to you in the past... I have seen an article floating around recently accusing me of having helped out in the turning in of XXX XXXXS... this is not true. it has come to my attention that Muther has given you the JASON TAPES as I call them... I think you know what I'm talking about... please help me clear my name... I was an active user and contributed much to XXX XXXX before its demise... why would I want it down? I had no motive whatsoever! Jason is fully responsible... not me, and not Kevin XXXXX. Please transcribe the JASON TAPES in the next issue of Phantasy so that justice may be done. Thank you, I appreciate this. please reply -------------------------------------------------------------------- The IIRG will be presenting a transcription of the Tape in Phantasy 17 and hopefully this will correct some of the dis-information floating around out there and clear the matter up once and for all. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: PHANTASY TIDBITS: News and Views of Interest ------------------------------------------------------------------------------- PUPILS HAD BOMB GUIDE --------------------- 150 - Page Manual Came from Computer Lebanon,CT. - A 150-page manual on how to make bombs and homemade explosives has been found in the hands of 13-year-olds in a Connecticut middle school. The inch-thick book, chock full of tips on bomb building and vandalizing schools was discovered last week at the Lebanon Middle School after a Mathematics teacher overheard a discussion among a few of his pupils. "It explained how to make bombs and how to cause mayhem at the school." said resident State Trooper Mark Maynard, who was called in to investigate. The manual had been obtained through a non-school computer bulletin board by an older brother of one of the middle school pupils. "The boy who obtained it is a computer whiz. He said he obtained it for the purpose of doing a class project," Maynard Said. But four or five copies of the manual wound up in the hands of middle school pupils and were being sold to seventh- and eighth-graders for $10.00 apiece. The older brother, a high-school student, apparently retrieved the computer information about two months ago, but it did not surface at the middle school until march 14th, not long after the bombing at the World Trade Center in New York City. "The first concern was that it was related to that," Maynard said. "It just happened to surface right after it". And while retrieving such information falls under Freedom of Speech and is not illegal, it is against school rules to sell anything not for a school Fund-raiser, said Bert Bosse, principal of the middle school. Superintendent of Schools Albert Vertefeuille said some disciplinary actions will be taken against the pupils for selling the computer document on school grounds, but he declined to elaborate on what that action would be. The computer information was not obtained through any school computers, but a copy was later placed on one of the computers at nearby Lyman Memorial High School. That also violated school rules, the school officials said. "The thing that bothered us was that there was specific things on how to terrorize schools,teachers,and principals," said Bosse. "My biggest concern was not that any of the kids we dealt with would have used this for terrorism, but they may have tried to attempt [to build explosives] themselves and caused serious injuries." Nationwide, hundreds of children and teenagers are maimed or killed every year from experimentation with homemade explosives. Information obtained from computer bulletin boards on homemade bomb making has been a major contributor to such mishaps, police said. "I think the problem is there is no law pertaining to this," Maynard Said. In connecticut, teenagers learning how to manufacture bombs through home and school computers contributed a nearly 50 percent increase in the number of homemade explosives discovered last year by state police. "We are definitely seeing more of it. Kids by nature experiment", said Sgt. Kenneth Startz, who supervises the emergency services ddivision of the state police, which includes the bomb squad. "Bosse described the boys involved with the incident at the middle school as good pupils who had not been in trouble before. He said he believed they were driven by curiosity than anything else. All of the kids were very cooperative, Bosse said. The parents were totally shocked when they read what was in it". ------------------------------------------------------------------------------- HIGHWAY SIGN HAS OFFICIALS BLUSHING Fairfield,CT.-Thousands of motorists traveling South-bound on Interstate-95 got a terse message on an electronic traffic sign: "YOU ALL SUCK". We dont know how they did it," said State Police Lieut. Albert Masek of troop G in Westport. "We thought maybe a computer hacker did it" The incident was reported on the morning shift Sunday, Apr. 4th and responding troopers could not disable the large, yellow lights on the portable, 10-foot-high sign located near Exit 19. The sign displayed the message for several hours until a state Department of Transportation crew got it covered with a large tarp. DOT spokesman William Keish said Monday that the sign can only be programmed from DOT offices in Wethersfield or State Police headquarters in Meriden. Bill Stoeckerd, director of DOT's incident management office reprogrammed it Monday. "Were taking steps with the contractor to upgrade our security," said Stoeckerd. "We really don't know, whether [the pranksters] were able to come into access accidentally or not." He said the sign, in use since August, was recently the target of a similar prank, but not the exact same wording. ------------------------------------------------------------------------------- VULGAR HIGHWAY MESSAGES AN OUTSIDE JOB, POLICE SAY Connecticut State Police have concluded a computer infiltrator is responsible for two crude messages, the latest lambasting Gov. Lowell P. Weicker Jr., that have flashed on a highway electronic message board in Fairfield,Ct. in the past two weeks. CT State Police Master Sgt. Scott O'Mara would not comment on reports that police had identified a suspect, he said "the 10 day old investigation was progressing". The message board reportedly can only be operated from the state Department of Transportation operations center in Wethersfield or the state police communications center in Meiden,CT. but police believe the vulgar messages did not come from either of those locations. Instaed, "We believe it's a computer crime by modem through a phone line", O'Mara Said. ------------------------------------------------------------------------------- IIRG NOTE ON HIGHWAY SIGN At the time of the completion of this issue of Phantasy, a suspect has been caught in the Highway Prank situation in Fairfield,CT. We'll bring you more details in Phantasy Issue 17 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: IIRG Distribution Sites (or Gateways to Oblivion) ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// IIRG World HQ: The Rune Stone BBS 14.4k HST Phantasys Home Board Complete IIRG Archives 3000+ Files (203)-832-8441 IIRG Distribution Site 1: Wired World BBS INC Europe TPC Courier (WHQ) THP IIRG Distribution Site Sysop: Digital Justice +39-89-254138 IIRG Distribution Site 2: Cyberdyne Network Germany United Forces Sysop: E605 +49-5341-59004 +49-5341-54052 IIRG Distribution Site 3: The Sanitarium Sysops: Morbid Angel [INC/ACID] Spectral Illusion [ACID/RAZOR] IIRG Distribution Site ACID Member Board INC Courier Board RAZOR 1911 Courier Board VISA World Headquarters (817)PRI-VATE IIRG Distribution Site 4: The WareHouse (203)-231-8980 OVER A GIG ONLINE Sysop: Ionizer IIRG Distribution Site 5: Hollow Tree Productions Sysop: Phantasm Syndicate Extreme*Net (313)-EXE-TREME IIRG Distribution Site 6: The Web 203-869-0938 OOFNet/CCiNet ACiD Member Board VECTOR World HQ ESP Courier HQ Phantasy Dist. 9600+ Only -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: Phantasy Distribution Sites Phantasy's Distribution Site's are continually growing,we apologize if you called a board and didn't find the Mag. Network Distribution Sites will have the Issues first, we suggest calling one of them if a problem does arise. 1. Lightning Systems (414) 363-4282 200 Million Bytes OnLine USRobotics Dual Standard HST/V.32bis 2400 thru 14.4k v.32bis/HST 2. The Works BBS Waffle Net v1.65 [617]/861-8976 3/12/24/96/14400b 7dy/24hr N,8,1 Lexington, MA 200 Megabytes of Storage 99.44% pure textfiles Remote cDc Node (Very remote) 3. Pipers Pit BBS 19,200-9600 HST ONLY!! 24 Hours a Day THG Distro Site 1300 Megs (203)PRI-VATE [2 Nodes] 4. The Dickinson Nightlight (713)-337-1452 Der WeltanSchauung Distro Site (World View Magazine) Phantasy Distro Site 5. Abiogenesis, 3/12/24/96/14400 Practical Peripherals 14400FXSA Fidonet 1:280/310. Phone (816)734-4732 Phantasy is also available on these systems, Ripco II BBS The Hell Pit (312)-528-5020 (708)-459-7267 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PHANTASY(C) IIRG 1991,1992,1993 May Odin Guide Your Way! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-