-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE FOURTEENTH ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETRIEVAL = - GUILD - = = - Hacking,Phreaking,Anarchy,Survivalism,Commentary - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Four,Issue Number Fourteen Dated 02/06/93 Editor is Mercenary : mercenar@works.UUCP Article Submissions: The Mercenary/IIRG 862 Farmington Avenue Suite 306 Bristol,Ct 06010 Phantasy Headquarters BBS: The Rune Stone 14.4K HST Invitation Only All H/P/A, 2500+ Files (203)-PRI-VATE IIRG World Headquarters BBS: Dark Shadows 19.2/9600 Baud HST 1.2 Gigs Online (Down at this Time) Table of Discontents: [1] Phantasy Distro Sites Needed By: IIRG [2] Rune Stone BBS Information By: Mercenary [3] "Operation Gray Chip Completed" By: Knight Hack [4] FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary 1. Blitzkrieg BBS Goes Down! 2. AT&T Smart Card Voice Prints Increase Security of NCR ATMs 3. DEA Security - Not That Secure! [5] The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary 1. Possible Loser Alert? 2. IBM Working on Super Drive? 3. Grim Reaper of TDT a Narc? (So says Pepsi Man) [6] PHANTASY TIDBITS: News and Views of Interest 1. Cellular Highway Robber 2. Phantasy Makes Honorable Mention 3. Wired Magazine Premieres 4. TIME Magazine Article 5. FREE Virtual Sex Poster 6. NCSA FREE Book Offer 7. Information Requests [7] Listing of IIRG Distribution Sites [8] Listing of PHANTASY Distribution Sites [9] IIRG Special Announcements -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- OFFICIAL DISLAIMER... All information in PHANTASY is from USER contributed material The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. PHANTASY is (C) 1990 by The IIRG IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: Phantasy Distro Sites Needed By: IIRG ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// ATTENTION ALL SYSOPS -------------------- The International Information Retrieval Guild is looking to expand its distribution network in 1993. We would prefer BBS's that mainly cater to the Hack/Phreak/Anarchy Underground. Two Forms of distribution are currently available to those sysops who choose to participate and meet certain criteria. 1. Phantasy Magazine Distribution 2. Complete IIRG File Distribution 1. Phantasy Distribution Phantasy is the IIRG's Online Newsletter/Magazine for the H/P/A community. Phantasy Distribution for your bbs means that all new Issues of Phantasy will be uploaded by a courier to your BBS within 12-24 Hours of its release date. Your only responsibility is to provide a File area. 2. IIRG File Distribution The IIRG Archives contain a vast wealth of information gathered over the years from the underground. IIRG file distribution will provide you with a courier and file list. Your responsibility will be to edit the file list to your tastes or Needs and provide it to your courier. Over a short period of time the courier will provide the files you've selected. As always this is a free service from the IIRG at no cost to you, the sysop. LIMITATIONS: The IIRG has no overseas couriers at this time, Overseas Sysops will be provided with a No Ratio, No Limit Account at an IIRG Distro Site and will be responsible for there own distribution until a courier can be provided. The IIRG May be Contacted Through Mercenary at: mercenar@works.UUCP or by Snail Mail at: Mercenary/IIRG 862 Farmington Ave. Suite 306 Bristol,CT. 06010 -=THE IIRG=- ------------------------------------------------------------------------------- Section [2]: Rune Stone BBS Information By: Mercenary Well Folks, I've got good news and I've got bad news..... First the bad news, The Rune Stones public line will not be installed most likely until May of 1993. This is due to the fact that I'm moving again. For those IIRG Members with access to the private line, please note that that the number will be changing. Please pick up the newest member package. My move is prompted by the current economy, hence where the money is, so am I. So whem Im settled in at my new location, so will the Rune Stone. Now the good news... The Rune Stone BBS number will be made generally available to all readers of Phantasy and when you log-on and become a Validated user,you will have access to over 3000 H/P/A Text Files. Please note that due to my changing locations, the next several Issues of Phantasy may be slow in appearing as I'll be busy and wont have much time to devote to the magazine till after the move. Thanks for the Help and Support Mercenary/IIRG ------------------------------------------------------------------------------- Section [3]: "Operation Gray Chip Completed" By: Knight Hack OPERATION GRAY CHIP COMPLETED The FBI,US Customs Service,and Internal Revenue Service along with detectives from Santa Clara,San Jose,and Fremont California have just completed a four month sting operation code-named "Operation Gray Chip". Undercover agents and detectives reportedly bought and sold allegedly stolen semiconductors and computer parts on the "Gray" Market. The sting operation targeted brokers and dealers in California,Taiwan, Argentina, and Singapore. Most of these dealers have reportedly been selling parts to legitimate computer companies in the United States and Far East for years. Some 30 "Gray" Market brokers have been arrested as a result of the sting operation. The sting operation is said to have been designed to send a message to those who purchase semiconductors,disk drives, and other parts from less than legitimate sources According to Sgt. Paul Kirby of the Santa Clara Police Department. Those individuals arrested have been charged with criminal conspiracy, and multiple counts of attempted receipt of stolen property. Names of those arrested and the companies involved are expected to be released soon. Parts for the sting were provided by Intel,Quantam Corp,and Conner Peripherals,along with other well known companies. The sting involved sales by undercover agents to brokers who thought they were getting a deal because the merchandise was HOT. More than 2 Million in Cash and 1.55 Million in parts were confiscated over the 4 month duration of the operation. ------------------------------------------------------------------------------- Section [4]: FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % The end of Blitzkrieg % % % % Transcribed by Phantasm [01/09/93] % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% The following text is transcribed from a message which was left on Predat0rs answering machine at 502-499-8933. Hello, this is John or Predat0r the former SysOp for Blitzkrieg BBS. I'd like to say as of the 12th of January, 5.00pm, 502-499-8933 will no longer be an active line which means the system's gone. When I get a new line and a new number I'll put it on Pentavia, Ripco, other real popular boards like that. I'd like to say thanks for everybody who supported the system while it was up. >From February of 1990 to January 1993 it had 27,834 callers. The last official user to call was Sinister Solution. I'd like to say when the new system goes back up it'll be bigger, better and even more underground than it was now. I officially retire as Predat0r and I officially retire Blitzkrieg. So when the new system goes up, I'll have a new handle and a new name for the board. If you need to get in touch with me, use the post office box, there still good and if you want my new voice number you'll figure out how to get it. Stay free and I'll see you all again real soon... -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- FOR RELEASE TUESDAY, DECEMBER 8, 1992 AT&T SMART CARD VOICE PRINTS INCREASE SECURITY OF NCR ATMs SAN ANTONIO, Texas -- NCR Corporation and AT&T Smart Cards have demonstrated a prototype of a new generation of automated teller machines (ATMs) they are developing that will use AT&T's contactless smart card technology to offer customers additional services, like a security system that works by verifying the cardholder's voice print. The prototype and several potential applications of the new terminals are being shown at the Retail Delivery Systems Con- ference here this week. The two AT&T units also announced that AT&T's smart card readers can be connected to NCR's point of sale terminals, and that they will begin working with banks to develop new smart card-based applications that will run on ATM and point of sale machines. NCR, a unit of AT&T, is the world's largest supplier of ATMs. AT&T Smart Cards is a leading supplier of contactless smart cards and applications. AT&T contactless smart cards look like other bank cards-- they're the same size and just as thin--but they have microprocessors and memory chips laminated within their plastic shells. Developed at AT&T Bell Laboratories in the United States, their electronic memory can hold the equivalent of several pages of typewritten information, personalized to the card's user. That data is accessed by a reader/writer device, which, in addition to being installed in an ATM, can be connected to a cel- lular or wired telephone, personal computer, automobile (for electronic toll collection), or other device. Because the reader has no moving parts, it is more reliable than contact-card readers. "Our smart card can be viewed as a secure, portable, per- sonal database that will provide banking customers with enhanced security and a broad spectrum of new services," said Diane Wetherington, president of AT&T Smart Cards. {familiar ATM into a new kind of financial transaction station," said Jim Adamson, vice president of NCR Self-Service and Financial Systems Division in Dundee, Scotland. "One obvious benef{ion beyond PINs (per- sonal identification numbers), which a thief might be able to find out. For example, one of the demonstrations at the Retail Delivery Systems Conference will be a voice-based security system that works by comparing the cardholder's voice print with one stored on the card. Unless the two match, access to the account is denied. "But that's just the beginning," Adamson adds. "Since much of a customer's account information is stored on the card, he or she doesn't necessarily need to go to an ATM if all they need to do is check that information. You can use a personal computer with a smart-card interface, for example, or a similarly equipped public telephone. "Of course, security features on the card will prevent users from changing the information on the card when they are not linked to their bank's computer network." When customers do go to an ATM, they are given customized menu options based on their account profile stored on their smart cards. This might even include offering them a connection to a financial institution not normally on the ATM network, such as a brokerage house where they have a money market account. In addition to convenience and security, another benefit of using AT&T contactless smart cards with NCR's terminals, is that a single card can be used for multiple applications--a solution to consumer complaints about the proliferation of cards they need to carry around. Using AT&T's communications network and NCR's installed base as a backbone, AT&T can develop and deploy applications for a variety of customers. For example, a single card could serve as an ATM card, an insurance information card, and a debit card for making purchases in a store, placing phone calls, paying highway, bridge and tunnel tolls, paying mass transit fares, and even buying from vending machines. Funds for each of these uses can be transferred at any ATM from the customer's bank account to the debit portion of the card. With a smart card reader/writer connected to an NCR point of sale terminal, the consumer has access to a full range of pay- ment options. AT&T smart cards also make it possible for ATMs to expand beyond mere banking functions. For example, "electronic tickets" for airline travel, sporting events, plays, or concerts could be purchased at an ATM and loaded onto the smart card. The card would then be accessed at the airport, stadium, theater or con- cert hall. "The AT&T contactless smart card reader is a perfect example of the potential for joint technology development between NCR and AT&T," said Adamson. AT&T plans to make the smart card interface available to other terminal developers, as well. NCR, an AT&T company, develops, manufactures, markets, supports and services enterprise-wide information systems for worldwide markets. AT&T Smart Cards, based in Bridgewater, New Jersey, is an AT&T strategic business unit that develops and markets smart card products and applications. The business does all of its development and manufacturing in the United States (its factory is located in Little Rock, Ar- kansas). AT&T also has a cooperative agreement with Nippondenso Co. to market smart card applications in Japan. # # # NCR is a registered trademark of NCR Corporation ADDITIONAL BACKGROUND ABOUT AT&T'S SMART CARDS AT&T's smart card consists of an 8-bit microcomputer, and features its own operating system, 3 kilobytes of electrically erasable read-only memory (EEPROM), an asynchronous serial data link, and a security system to prevent files from unauthorized use. AT&T's smart card differs from other smart cards in several important ways: o It uses a contactless interface to provide power to the card and to perform data transfer. Other smart cards have ex- posed metallic contacts, which produce reliability problems with wear, contamination, and damage due to electrostatic discharge. AT&T pioneered a design that allows the smart card to transmit data to a card reader without metal-to- metal contact. The card transfers data by changing the charge on capacitive plates in the card and the reader. o The microprocessor uses a flexible, UNIX(TM)-like operating system designed specifically for AT&T's smart card. Host computers or terminals can interact with the card using predefined, high-level software commands. o Security is also enhanced by the inclusion of a security al- gorithm. Encryption, decryption and message authentication can be performed to facilitate secure transmissions over in- secure links to and from the host system or terminal. o The card's file management architecture allows a number of applications to reside on one card. For example, in banking, one card can be used to hold information on a customer's checking, savings, loan, and line-of-credit ac- counts, while also storing biometrics, such as the customer's signature, voice and fingerprints for security. In addition, that same card can be used for travel or other applications. o The card has built-in security features. Information stored on the card can be isolated in such a way that access to data in a particular file on the card can be limited to users authorized to access that portion of the card. This allows different applications to reside on the same card without giving all handlers access to the entire database. AT&T smart cards are already being used in several ways: ELECTRONIC TOLL COLLECTION Without stopping, drivers approaching a toll plaza insert a smart card into a transmitter mounted on their dashboards. In- formation stored on the card is transmitted to the toll station via radio link, and the cost of each toll is either debited from a pre-paid amount on the card or recorded for billing later. PENSION RECORD-KEEPING Italy's post office is now using a pension-administration system supplied by Olivetti that uses AT&T's smart card as a record-keeping device for pensioners. COMPUTER SECURITY Other customers are using the AT&T smart card to limit ac- cess to computer systems containing proprietary information. Authorized users dial into the systems from their portable com- puters, and the systems have been programmed to interface with a smart card. Without the card, the systems cannot be accessed. BUILDING SECURITY AT&T has several applications in the U.S. and Japan in which the smart card is used for employee identification and building access control. But these are just the beginning. The government could use smart cards to replace printed food stamps, driver's licenses and voter registrations. And a medical smart card could provide a physician with a patient's complete and up- to-date medical record. The same smart card can also store insurance information in a separate file. Having this information on a card would also expedite admittance to a hospital. "The 1990s is a decade of customization," says Wetherington. "Businesses will need to redesign the way information is gathered and processed, in part because customers' definitions of ac- ceptable service times and intervals are changing. In some cases, this will require reengineering where and how products and services are delivered. "Smart cards will revolutionize personal and business information access and processing by providing instant point-of-need transactions," she said. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- DEA SECURITY - NOT THAT SECURE! The Government Accounting Office (GAO) has just released a new report titled "Computer Security: DEA is Not Adequatly Protecting Sensitive Drug Enforcement Data". It seems DEA Agents reguraly made standard Security Violations in the areas of, 1. Sharing Computer Passwords 2. Left Passwords Taped to Terminals 3. Used easily identifiable Passwords (Such as "DEA") 4. Threw out Classified Materials in the Trash So for all you Console Cowboys hacking the DEA, times a Wastin these boys know nothing of proper security procedures! ------------------------------------------------------------------------------- Section [5]: The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary and Anubis ------------------------------------------------------------------------------- The IIRG recieved the following message at Mercenary's mailbox from an unidentified user at llwnet.linknet.COM (Cheshire HS) and we found it most interesting, We'll explain why afterwards... ------------------------------------------------------------------------------- LOSER ALERT! LOSER ALERT! FROM AN ANONYMOUS PIRATE SYSOP ------------------------------ HANDLE: Homicidal REAL INFO: Jason L.(IIRG Deleted) (IIRG Deleted) Wallingford, CT 06492 (203)(IIRG Deleted) AGE: 16 ------------------------------ This kid is every pirate's nightmare. In his infinite stupidity, he lost his access on the one major Connecticut pirate board he had access on. Then he wanted revenge. He called up the SPA (Software Publishers' Association) piracy reporting hotline and the Apogee piracy hotline. He turned in several big-time pirate boards. He gave BBS names, BBS numbers, Sysops' handles, Sysops' real names, Sysops' voice numbers, Sysops' addresses, Sysops' ages, his accounts on small-time pirate boards, EVERYTHING! This kid fucked EVERYBODY over! Several decent pirate Sysops deleted their entire hard drives for fear that the FEDS would come knocking at their doors. He shattered the fragile trust that exists between the members of Connecticut's pirate community. In a taped phone conversation (which was eventually made into a Sound blaster VOC and then distributed) he admitted to turning in pirate boards and also uploading viruses to several BBS's. He also said that his "master plan" consisted of bringing down all pirate boards and trashing the local modem scene with "outside help from ex-modemers" who supposedly hold grudges against current-day users. He turned in kids who were hacking Internet also. If this kid ever calls your BBS, just fucking delete his punk ass! ------------------------------------------------------------------------------- We didn't know if the information was true as Mercenary is based in CT. and He'd heard nothing of any Major BBS Busts or actions in the area. But all of a Sudden this appeared in the Paper as well as in CUD 5.03. ------------------------------------------------------------------------------- From the 1-7-93 Issue of The Cheshire Herald (Front Page) Typed by Lord Valgamon (YUNSANJ@YALEVM.YCC.YALE.EDU) THREE CHS STUDENTS CHARGED IN BURGLARIES Former CHS Student Also Charged in Case by Amy Carpenter, Herald Staff Three Cheshire High School students and a former student charged with the theft of $23,000 worth of computer and electronic equipment from the high school have turned themselves in to Cheshire police. Jared D Bishop, 17, of 500 South Meriden Road, William J Vallo, 17, of 1081 South Meriden Road, and John Beltrami, 17, of 12 Woodland Drive, have each been charged with 6 counts of third-degree burglary, 6 counts of third-degree conspiracy to commit burglary and first-degree larceny by common scheme, police said. Brendan Monahan, 17, of Littleton, New Hampshire, was charged with third-degree burglary, third-degree conspiracy to commit burglary and third-degree larceny, police said. -Lesser Charges Monahan, a former CHS student, received the lesser charges because he is believed to have participated in only 1 of 6 burglaries at the high school, said Detective Thomas Stretton. Bishop and Vallo turned themselves in last week, and Beltrami and Monahan turned themselves in early this week, Stretton said. All four were released to the custody of their parents and are scheduled to appear in Meriden Superior Court on January 14, police said. ------------------------------------------------------------------------------- It seems funny to us that these two incidents would originate from the same place, so there may be some validity to the Rumor we recieved. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- IBM WORKING ON SUPER DRIVE? IBM Corporation is rumored to be working on a read/write head for hard-disk drives that will propel disk bit densities up into the range of 8 billion bits per square inch. Current leading edge Winchesters area densities are in the neighborhood of 250 million bits per square inch. Even this may fall short of the rumored that students at the University of San Diego are working on a head capable of 10 Billion bits per square inch. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- ============================================================================= THE GRIM REAPER IS A NARC Oh No!, Mr. Narc has kicked me out of TDT! ============================================================================= Today at about 6:00 Central time I was talking with my girlfriend. I clicked on my call waiting button and it was The Grim Reaper (Mike A.(IIRG DELETE). He told me to call him back because his didn't want to pay for the phone call. I told him I would call him back in 5 minutes and he said fine. I was called back 10 minutes later by Grim and he told me I was kicked out.I asked why and he said it was because I hadn't called him back. He said I didn't respect him and wasn't loyal to him. He went on and on about how I've never done anything for TDT, but now that he has kicked me out,I guess I might as well tell everyone the real story about The Grim Reaper. The truth is Grim is a narc. He is the one who got Mind Bomb nailed. He went off on Sought After and has been trying to get him busted for a while. His next targets are Renegade Chemist and Butcher. He always told me that all other cracking groups would eventually die out. And the way this would happen would be through his great ability to narc. Why do you all think I followed him from FLT to OFG to TDT? Remember Infinite Range Rock? He wasn't loyal to Grim, he was nailed. I've stuck with that fucking Narc for 3 groups. He has told me a lot of shit, and now I'm going to tell it all to you. I have nothing against TDT, I have nothing against Sought After, or anyone in the pirate scene. I do have something against Grim. He was the person who took the fun out of all the groups I was in. He wanted people to fear him. And when I wouldn't kiss his ass he kicked me out. Grim didn't even go to court when he got busted with TNSHB. I don't know all the details about the deals he cut, but I know he is a narc. He is putting out shit about me not doing anything for the group which is complete bullshit. People like the Grim Reaper should not be in the pirate scene. He kills accounts, he busts people, and ruins BBSing to further himself. Luckily, I have a life! People like the Grim Reaper who quit college, have no job, and no friends to BBS are sorry. I'm going to lay low for a while, and just hang out on a few boards. I'm done with groups. TDT is and will be my last one. I have a girlfriend, I have school, and now I don't have to deal with Grim's bullshit. My warning to guys in TDT and the pirate scene. Grim is a NARC, you don't screw with people like that. I've learned my lesson. All I can say is get out of TDT. Get out from under the thumb of Grim. He will fuck you over. Grim Repear [TDT/NARC] DD Go ahead bust me. I can care less. Hell, you can even post my address and come to my house. The last time we talked I had it .VOC'ed. I kept tabs on you Mike. I'm not going to release it unless you try something. Like I said before, I'm not here to take TDT down or do any bullshit like that. I'm here to tell the truth. Don't fuck with me Mike. The only way to learn from a narc, liar, and thief like you is the hard way. I've learned, and now it's over. Go to hell, die, and get a life fat ass. Sought After [TDT] DD I have nothing against you. You are cool Zach. Everything I thought about you was wrong. I was brainwashed by the big Narc. Get out while you can. You know he busted Mind Bomb, you were on the fucking phone, don't deny it. To All DD I never tried to break apart TDT after I found out I was kicked out. I'm not interested in going after Grim or narcing on him, unless he pulls his bullshit on me. Pepsi Man -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: PHANTASY TIDBITS: News and Views of Interest ------------------------------------------------------------------------------- CELLULAR HIGHWAY ROBBER The LA Times reports that an enetrprising telephone phreak reached out and touced someone 11,7333 times in August from a freeway emergency callbox in Orange County,California. The System that monitors the emergency callboxes attributed 25,875 minutes of calls to the unknown phreak to points all over the globe. The Phreak apparently succeeded in making the calls by matching the callboxes electronic serial number. ------------------------------------------------------------------------------- PHANTASY MAKES HONORABLE MENTION Phantasy Magazine has been mentioned in Mondo 2000's new Book, "A Users Guide to the New Edge" on Page 286. Phantasy is Mentioned along with ATI,PHRACK,And The Syndicate Report under the Catagory of Zines On-Line. ------------------------------------------------------------------------------- WIRED MAGAZINE PREMIERES Be on the lookout for a new Mondo 2000 look-alike Magazine, "WIRED" on sale at newstands now. The first issue appears well written and contains several articles of interest including "Cellular Phreaks and Code Dudes" and "War is Virtual Hell" by Bruce Sterling. ------------------------------------------------------------------------------- TIME MAGAZINE ARTICLE For other collectors of information, be sure to grab the Feb. 8 edition of time magazine and check out the cover story article on Cyberpunks. ------------------------------------------------------------------------------- FREE VIRTUAL SEX POSTER Get a FREE poster of the Virtual Sex Scene in the "LAWNMOWER MAN" by calling 1-800-858-1810 and ask for Department C76. This is a free promotional offer from CYPRESS SEMICONDUCTOR and they will send along a copy of there Data Book with the poster. They may ask if you have time to answer a few questions as they did when we called, they're just looking for Company Background Info. ------------------------------------------------------------------------------- NCSA FREE BOOK OFFER The National Computer Security Association will send you a FREE copy of their "Information Security Wishbook" and may be obtained by calling (717)258-1816. We've obtained a copy of the book and its roughly a 24 page catalog of Books,Newsletters,and Research Reports with some "DISINFORMATION" charts thrown in to scare the novice system operator. For Example; Number of Hacker Attacks on US Workplace Computers 350,000 in 1989 395,000 in 1990 675,000 in 1991 Come on Guys. Give us a break Name the Companies that reported 675,000 attacks individualy and I'll eat your Jock Strap. ------------------------------------------------------------------------------- INFORMATION REQUESTS At the IIRG, we often recieve strange,bizarre, and sometimes normal requests. Although Mercenary does'nt have the time to answer everyone individually. He hopes to answer some of your Questions here as we recieve them. 1. Where can I get Info on Cellular Phreaking. Mercenary Reply: There are numerous files on Cellular Phreaking and Hardware hacking available on any larger Hack/Phreak BBS. If you don't want to spend the time looking for them I would suggest sending $49.95 plus $4.00 S/H to: DYNASPEK P.O. Box 564 Westmont,IL 60559 or COD orders may call (708)-971-1585 For your cash, They will send you a copy of, "The Cellular Telephone Hackers Guidebook" and this should guide you through the basics. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: IIRG Distribution Sites (or Gateways to Oblivion) ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// IIRG World HQ: Dark Shadows 19.2/9600 Baud HST 24 Hours a Day 1.2 Gigs Online Sysop: Anubis 2 Nodes (203)-PRI-VATE (TEMP DOWN AT THIS TIME) IIRG Distribution Site 1: Wired World BBS INC Europe TPC Courier (WHQ) THP IIRG Distribution Site Sysop: Digital Justice +39-89-254138 IIRG Distribution Site 2: Cyberdyne Network Germany United Forces Sysop: E605 +49-5341-59004 +49-5341-54052 IIRG Distribution Site 3: The Sanitarium Sysops: Morbid Angel [INC/ACID] Spectral Illusion [ACID/RAZOR] IIRG Distribution Site ACID Member Board INC Courier Board RAZOR 1911 Courier Board VISA World Headquarters (817)PRI-VATE IIRG Distribution Site 4: The WareHouse (203)-231-8589 14.4 (203)-231-8588 9600 OVER A GIG ONLINE Sysop: Ionizer IIRG Distribution Site 5: The Rune Stone BBS 14.4k HST Phantasys Home Board Complete IIRG Archives Invitation Only (203)-PRI-VATE -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: Phantasy Distribution Sites Phantasy's Distribution Site's are continually growing,we apologize if you called a board and didn't find the Mag. Network Distribution Sites will have the Issues first, we suggest calling one of them if a problem does arise. 1. Lightning Systems (414) 363-4282 Sixty Million Bytes OnLine USRobotics Dual Standard HST/V.32bis 2400 thru 14.4k v.32bis/HST 2. Sycamore Elite 19,200-1200 Baud HST, 24 Hours a day (815) 895-5573 3. The Works BBS (617-861-8976) Large Text Files BBS, 3500+ text files online. 2400-300 Baud, 24 Hours a day 4. Pipers Pit BBS 19,200-9600 HST ONLY!! 24 Hours a Day THG Distro Site 1300 Megs (203)PRI-VATE [2 Nodes] (Please Note, Numbers have Changed at Pipers Pit) 5. The Dickinson Nightlight (713)-337-1452 Der WeltanSchauung Distro Site (World View Magazine) Phantasy Distro Site 6. RIPCO II BBS (312)-528-5020 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [9]: IIRG SPECIAL ANNOUNCEMENT The IIRG has just released The IIRG's Acronym List [V7.00] and should be available on a H/P BBS near you. Also for IIRG members the New IIRG Member Encryption System has been released and can be Picked up on The Rune Stone BBS. The IIRG shall be releasing around June, the IIRG's Hackers Survival Guide for the 90's, note withstanding any problems with Mercenary's move. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PHANTASY(C) IIRG 1991,1992,1993 May Odin Guide Your Way! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-