-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE ELEVENTH ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETRIEVAL = - GUILD - = = - Hacking,Phreaking,Anarchy,Survivalism,Commentary - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Three,Issue Number Eleven Dated 11/06/92 Editor is Mercenary : mercenar@works.UUCP Article Submissions: The Mercenary/IIRG 862 Farmington Avenue Suite 306 Bristol,Ct 06010 IIRG World Headquarters BBS: Dark Shadows 19.2/9600 Baud HST 24 Hours a Day 1.2 Gigs Online 2 Nodes (203)-628-9660 Table of Discontents: [1] More Pump-Con Bust Info By: Anonymous [2] Caller ID Availability By: Mercenary [3] Crystal Source By: Saint Anarchy [4] FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary 1. DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES 2. FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE 3. PUMP-CON BUST RUMORS FLY 4. RESPONSE TO PUMP-CON RUMORS [5] The Rumor Mill (Unconfirmed rumors from the Underground) Edited By: Mercenary 1. Ronald Pinz (Victim Or Rat Fink) 2. Berlin Busts Reported 3. WINDYCON [6] PHANTASY TIDBITS: News and Views of Interest 1. Police Officials Cited For Searching Private Records 2. Call for Papers - The Third International Virus Conference 3. Landmark Software Decision 4. Sixth International Computer Security & Virus Conference [7] Listing of IIRG Distribution Sites [8] Listing of PHANTASY Distribution Sites -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- OFFICIAL DISLAIMER... All information in PHANTASY is from USER contributed material The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. PHANTASY is (C) 1990 by The IIRG IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: ********** PUMPCON BUSTED!!! *********** 10/31/92 written by someone who was there who wishes to remain anonymous NOTICE: The word "Hacker" is used frequently throughout this file - it is to be interperated as "a computer literate person", and NOT as "someone who engages in illegal activities using a computer". Friday, October 30, Pumpcon began, at the Courtyard of the Marriott, in Greenburgh, NY. All in all, about 30 hackers showed up, and had a great time. At least until the evening of Oct. 31st, when 8-10 members of the Greenburgh police force showed up and raided the Con. At the time of the raid, there were between 20 and 25 hackers in the hotel. 3 of the 4 rooms rented by Con attendees were raided. All the occupants of these rooms were taken to a conference room, and then another hotel room (255) where they were held approximately 6-8 hours for questioning. The police all came in unmarked police cars, and parked on all 4 sides of the hotel. No one noticed they were there, until they were standing in the hall where all 4 rooms were located. The officers stood in the hall outside the doors, but did not enter the rooms right away. They waited about five minutes, for some unknown reason, which was just enough time for them to be noticed by the hackers in at least one of the rooms. Unfortunately, there was no way the hackers in one room could warn the other rooms - the fone lines were busy, and the cops in the hall kinda left the "walk down and tell 'em in person" option out. The police produced copies of a search warrant to search rooms 246, 233, and 237. Room 246 was the one where everyone was hanging out; it was pretty much THE room. It was where the computers were located, and where most of the Con attendees were 99% of the time. The other two rooms were rented by attendees of the con, and were simply used for sleeping quarters. Before too long, the police entered the rooms, and began rounding up people. My recollection of this time period is a bit faint, and I don't remember all the minute details. All I know is that we all ended up in a conference room, and then room 255. A few hackers who had been out driving around during the time of the bust returned a few hours later, and when they were seen by police, they were immediately taken to 255 and questioned. (They were walking down the hall, when a cop appeared, and told them to step into a room) The cops asked them if they were hackers, and when they didn't answer, one police officer reached into the coat pocket of one of the people, and produced an auto dialer. This in itself was enough to send the three to room 255, where the rest of the hackers were being held for questioning. My question to you - isn't that just a bit illegal? Bodily search without probable cause OR a warrant? Ooops - I'm forgetting - we're HACKERS! We're ALL BAD! We're ALWAYS breaking the law. We don't have RIGHTS! Room 255 was packed. No one was allowed to smoke, and everyone was nervous as hell. One by one people were called to be interviewed, with some interviews lasting 5 minutes, others lasting 30 or 45 minutes. Some people were sleeping, others were conversing, and still others were shaking, and looked like they were about to puke at any second. Even though the situation was quite serious, a few joked around, saying things like "So guys, I guess PumpCon '93 won't be held here, eh?". No one knew who was going to be arrested, or when they would be released. The 2 cops in the room with them were actually pretty cool, and answered any questions they could to the best of their knowledge. They weren't the guys in charge of the investigation; they were simply there to make sure we didn't leave. Of course, as friendly as they seemed, they were still cops... All the people who were detained were held until between 5:45 and 6:30am. Four hackers were arrested, 1 because 2 of the rooms were registered in his name, a second because he signed for the rooms, and the others for previous crimes, apparently. No one knows as of yet. As of this message, no news on what will become of those arrested is known. They have not yet been arraigned. The other hackers were all searched, questioned, and then released pending further investigation. Those under the age of 18 had their parents notified. To my knowledge, there were no federal investigators there at the time of the bust. However, people kept mentioning the FBI and the Secret Service, and it is very possible that they will be called in to investigate. Actually, it's more than just possible, it's almost guaranteed. The police said that although most of those detained were released, there will most likely be more arrests in the near future, as more is learned about the alleged illegal doings. 3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along with anything which looked like it could have been involved in phone fraud. For some odd reason, although Auto Dialers were listed on the search warrant, not all of them were confiscated. I acutally don't know if ANY were, I do know that not ALL were. ;) In one of the rooms, there were about 2 dozen computer magazines which were apparently confiscated, although the warrant did not specify that magazines could be taken. But, when you're busting HACKERS, I suppose you can take what you want. After all, hackers are evil geniuses, and don't have the same rights as NORMAL criminals do. As of yet, the actual charges against the hackers are not known. The raid apparently stemmed because the hackers were ALLEGEDLY using stolen calling card numbers and/or access codes to obtain free phone calls. One of these card numbers or codes was rummored to have tripped a flag at AT&T, which alerted security personel that something was possibly wrong. This assumption about the calling card fraud is made because the police confiscated any calling card found during their searches, and some of the questions they asked the detained centered entirely around calling card theft and use. A few other questions asked me were "Do you know what computer systems were accessed?", "Do you refer to each other with handles?", "Who was primarily responsible for this meeting?", and "Where did you hear about this meeting?" My interview lasted only about 10 minutes, and it started at about 5:50am. Everyone was dead tired, and the cops wanted to get everything over with as fast as possible so they could get some sleep. After the interviews were over, everyone left, to wait and see what the next few days will bring. I am releasing this file now, to prevent any rumors from starting, and to try to make the outside world aware of what happened during PumpCon. I have left out any specific incidences and references to specific people as a precaution, since the investigation is only beginning. We were hoping to write a file of all the attendees of PumpCon, to share with the world the names of those who were there. However, as you can obviously see, that would be highly stupid. For anyone who WAS there who is reading this, rest assured that the running list of names which was kept made a very tasteless dinner for the one who had it in his pocket. Oh, BTW, one of the cops who was apparently in charge made a comment to me... he said "You can post a message on the boards telling your friends to stay out of Greenburgh". Well boys, you heard him - PumpCon '93 will be held in Greenburgh, at the Courtyard Marriott.... *--------------* The following is a word for word copy of the search warrant issued to each person who was detained and questioned. No spelling errors were corrected, but I probably made a few when I typed this in. Oh well. TOWN of GREENBURGH POLICE DEPARTMENT WESTCHESTER COUNTY, NEW YORK ORDER OF SEARCH AND SEIZURE ----- ( signed here by Det. Hugh F. Gallagher #103) ---------------------------------------------- JUSTICE COURT, TOWN OF GREENBURGH WESTCHESTER COUNTY, NEW YORK ORDER ----- IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF: (Specify) Computers Disketts Computer Printers Computer Terminals Auto Dialers Disketts Calling Card Computer Systems & Wire Computer Printouts Disk Drives Modems Hand Written Notes About Credit Co. " " " " Computer Service. ______________________________________________________________________X IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK TO: ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT PROOF by affidavit having been made before me this day by Det.H.Gallagher #103 ____________(Affiant) of the Town of Greenburgh Police Department that certain property, which is (stolen/unlawfully possessed, used to commit an offense...) and which constitutes evidence and tends to demonstrate that an offense has been committed and that a particular person participated in the commission of an offense will be found at the location captioned above. YOU ARE THEREFORE COMMANDED, ** (Between the hours of 6:AM - 9:00 PM / AT ANY TIME OF DAY OR NIGHT) ** ** (WITHOUT GIVING NOTICE OF YOUR AUTHORITY AND PURPOSE)** TO MAKE A SEARCH of the above described (location/person)** for the following property: (describe fully) Room # 233, 237, & 246 of the West. Marriott Courtyard and all its occupants as listed on this attached affidavit. >><< Suspects name was written here >><< AND if any such property is found, you are hereby directed to seize the same and without unnecessary delay, return it to the court, together with this warrant and a written inventory of such property subscribed and sworn by you. THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1 day of NOV. 1992 is valid and must be executed no more than ten (10) days after the date of issuance. << illegible justice's name here >> _____________________________________ Justice Name Signature -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [2]: Caller Id Availability By: Mercenary Whose Got caller Id, Im sick and tired of reading messages about who does and who doesn't, so its time to set the record straight. Now here we go, these are the states that have up and running Caller Id Service, ALABAMA INDIANA MAINE NORTH DAKOTA VERMONT DELEWARE IOWA MICHIGAN NEBRASKA WEST VIRGINIA FLORIDA KENTUCKY MINNESOTA OKLAHOMA GEORGIA LOUISIANA NEVADA SOUTH CAROLINA IDAHO MASSACHUSETTS NEW JERSEY TENNESSEE ILLINOIS MARYLAND NORTH CAROLINA VIRGINIA Service is currently pending in these states, CALIFORNIA NEW YORK WASHINGTON WYOMING CONNECTICUT OREGON WISCONSIN NO Service is available in, ARIZONA TEXAS NEW MEXICO COLORADO MISSOURI ARKANSAS OHIO PENNSYLVANIA NEW HAMPSHIRE KANSAS MINNESOTA UTAH SOUTH DAKOTA MONTANA ALASKA HAWAII RHODE ISLAND Now for the truth on Caller Id Operation, 1. A Caller Id phone or box will show the information for every call WHERE THE INFORMATION IS AVAILABLE, If the the call comes from another area, where Caller ID has not yet been approved, or from an area that is not connected to your area's service, the display will read "OUT OF AREA". 2. If a caller pays for the block-out service and prevents information from being transmitted, "PRIVATE" will appear on the display. I hope this sets the record straight.... -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [3]: Crystal Source By: Saint Anarchy For those of you trying to modify a Rat Shack (Radio Shack) auto-dialer Part Number: 43-141, from the Sanctuary Phile or Similar text file floating around. A good source for the 6.5536 MHz Crystal is the Digi-Key Corporation call them at 1-800-344-4539 (1-800-DIGI-KEY). The crystal can be found in catalog #926 on page 116, Digi-Key Part Number X018, Pricing is as follows... 1 - 1.51 10 - 12.60 100 - 100.80 Hope this helps those of you I've seen on the boards looking for a source of this crystal, Saint Anarchy/IIRG -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [4]: FOR THE PEOPLE Supplied By: Bulletin Boards Across the Country Edited by: Mercenary ------------------------------------------------------------------------------- Part 1: DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES DIGITAL EQUIPMENT CORPORATION ANNOUNCES ITS INTENTION TO CLOSE MANUFACTURING FACILITIES IN SPRINGFIELD, MASSACHUSETTS AND BURLINGTON, VERMONT MAYNARD, Mass. -- October 29, 1992 -- Digital Equipment Corporation informed its employees today that it intends to close its manufacturing facilities in Springfield, Massachusetts and Burlington, Vermont. There will continue to be Sales and Services facilities in both cities. The process for the plant closings, which will affect approximately 320 employees in Springfield and 350 in Burlington, will be a gradual reduction of the workforce over the course of six months. It is expected that the process will be complete by April of 1993. The details for closing the plants were outlined today to employees in group meetings. Digital will offer the affected employees a number of benefits including a financial support package based on years of service to the corporation; continuation of medical, dental and life insurance for a specified period; and professional outplacement assistance. Edward B. McDonough, vice president, Manufacturing and Logistics for Digital, said, "The computer industry has been going through a period in which technology has advanced by orders of magnitude, increasing the efficiency with which products can be manufactured. "The movement of computing power to semiconductors; the shift in demand to high-volume, low-margin commodity products; and the decreased demand caused by a soft worldwide economy has left Digital, and other companies in our industry, with excess worldwide manufacturing capacity. For over three years, the corporation has been restructuring its manufacturing function to adjust to the new capacity needs by eliminating redundancies and divesting in areas where we cannot clearly differentiate ourselves in the market." McDonough continued, "Manufacturing will remain a core competency for Digital. Our goal is to position manufacturing capacity to best serve our customers worldwide and to optimize the utilization of our assets. It is on the basis of this strategic intent -- and not an issue of quality of work -- that the decision was made to close the Springfield and Burlington plants. Both plants and their employees have held an important place in Digital's history." The disposition of the two sites, which are owned by Digital, has not yet been determined. The corporation is currently working with state and local governments, as well as outside organizations, to find external alternatives for the plants. ------------------------------------------------------------------------------ Part 2: FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE By Steve Higgins A broad flank of computer industry and public policy groups is rallying in a renewed attempt to thwart an FBI proposal to limit the security of electronic communications. The U.S. Congress adjourned last month without considering a bill embodying the FBI's so called "Digital Telephony Proposal," which seeks to force vendors and end users of communications equipment to ensure the FBI's ability to tap their communications networks. "But they will probably do it next year," said David Banisar, a policy analyst for Computer Professionals for Social Responsibility (CPSR) in Washington. That likelihood has generated a round of vehement opposition from an unlikely consortium: industry vendors including IBM and Sun Microsystems Inc., professional groups such as the Electronic Frontier Foundation and the CPSR, and watchdog organizations including the American Civil Liberties Union. If the proposal becomes law, "it will require that every system from AppleTalk LANs up have multiple, redundant systems to let the FBI tap them," Banisar said. In its proposal, the FBI suggests levying daily fines on vendors and users of equipment that do not comply. "We have to have the technical capability, or we are out of the business of wiretapping," said Keir Boyd, deputy assistant director of the FBI's technical services division in Washington. "We are not willing to back off on the compulsory part." Those opposed say the FBI's plan would cost U.S. industry money by requiring that vendors and users retool existing products. The opponents also say that the plan would hinder U.S. competitiveness by preventing American companies from developing advanced communications equipment and that it would pave the way for groups other than the FBI to tap private communications. "We are moving [to] a society where E-mail communications and video conferencing are the norm," said. Whitfield Diffy, a cryptography engineer at Sun in Mountain View, Calif. Diffy said that if the FBI proposal is passed, privacy will be virtually non-existent and "democratic government and free life could be swept away." All that, members of the opposition say, is not worth the value of the estimated 600 to 800 wiretaps that the FBI conducts each year.' Next year, the rhetoric is likely to rise as Sen. Patrick Leahy (D-VT) and Rep. Jack Brooks (D-Texas) formally consider the proposal for inclusion in a congressional bill . But, for its part, the CPSR isn't waiting until the next Congress to take action. The group recently filed a request under the Freedom of Information Act for the FBI's reasoning behind the proposal. Meanwhile, CPSR and other members of the consortium are still talking to the FBI to head off what they consider an extreme proposal. "We always offer to be helpful, to see if there are any less Draconian solutions," said John Podesta, a consultant at the Electronic Frontier Foundation, a lobbying group of industry professionals in Washington, who said meetings with the FBI are "always cooperative." But, Podesta added," [the FBI] still always seems to say,'We won't back off of this legislation.' There will be a fight next year." ------------------------------------------------------------------------------- Part 3: PUMP-CON BUST RUMORS FLY Actually, here is what I heard about Pumpcon: They had multiple terminals set up hacking cards and systems. The manager came to the door and told Randy that there was a noise complaint. Just as Randy was starting to talk to the manager, the Feds, AT&T security and various other organizations busted into the room. They Rounded up 35 people, some of which are still in jail because they couldn't make bail. The case is a now federal one, having been turned over to the FBI. I've also heard that AT&T and the FBI want to turn this case into an example. It is already high profile in the NY/CT area from what I understand, and those out on bail have already received messages from reporters. It would seem to me that the noise complaint was just bullshit to get them to open up the door. Now the question that comes to mind is how did the FBI, AT&T security and everyone else coordinate so quickly and bust this hotel room? Well, speculation is (as always) that someone dropped a very big dime on Pumpcon. There is also speculation on who did it. Right now the leader in the polls is No Name Brand. NNB has friends in Metromedia and AT&T security. Keep in mind that he was busted not too long ago and returned to hacking in record time. His excuse for not showing up? According to him, his ride (Orion) screwed him over and left him. Another possibility kicked around was that Phiber did it to receive a break on his upcomming sentencing but most people aren't going for this one. Most are going the NNB route. Randy's phone is tapped. Night Ranger reportedly got away (he and Spicoli supposedly carded their room and $110 worth of pizza). All this info is second generation from Randy S. Hacker. Believe what you want, make your own conclusions. Thirty five people...they didn't have enough cells for them all and supposedly questioned them for 10 hours. In my opinion, someone dropped a dime on them. It is also my opinion that NNB was that person. He is just the type of self-serving, vindictive, egotistical little fuck to pull a stunt like that. ------------------------------------------------------------------------------- Part 4: RESPONSE TO PUMP-CON RUMORS THESE RUMORS ARE NOT TRUE!!!! Yes, there were computers there. NO! they WERE NOT set up to hack cards and systems! People were playing games on them, and a few people were calling out at various times. The FBI was **NOT** there. AT&T security WAS there though. The case has NOT been turned over to the feds - it's still a local thing, and will hopefully stay that way. Only 4 people were arrested, 3 of whom are out on bail, 1 had an outstanding warrant and was being shipped back to his home state. He had no bail set. I talked to Randy myself, just got off the phone with him. He set me straight on a LOT of things. There are a LOT of places where the cops possibly screwed up, which may help the defense. No one knows as of yet. The charges are apparently are "Illegal use of a computer" and "Computer trespass". There may be more charges added at a later time, and there may be charges dropped. It's too early to tell. AT&T said there was an 800 system in GA which was hacked "by SOMEONE in that room" and that apparently set off flags all over. *I* personally know of NO such thing, OR system,and neither did a few others I talked to. I DO know for sure that whatever was done, it wasn't Randy's fault; I didn't once see him behind a terminal. I believe to that it was a setup - PumpCon was HIGHLY announced, and there were a few who could have benefitted from "ratting" on it. I don't know who those people are, nor will I point any fingers. But I guarantee you the person, if any, who set up PumpCon will wish someday that he hadn't. Anyway, I wanted to post this to clear up the rumors that are starting. I know I can't control them all, but some of this shitis getting WAY out of hand. 246 + 233 + 237 ---------- 103 (PumpCon addition.... 3 rooms = 1 badge #) The Bash... The Bullshit...The Bust... PumpCon '92. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [5] The Rumor Mill (Unconfirmed rumors from the Underground) Edited By: Mercenary Part (1) : RONALD PINZ (VICTIM or RAT FINK) In Phantasy Magazines Issue #9 Rumor Mill section, an anonymous user found this file pertaining to Robert Pinz and has drawn these unvalidated (as of yet) conclusions, ------------------------------------------------------------------------------- The Following information, (EDITED) has been circulating up in the New England area of operations. The file has been validated as legal as the individual named is known to have turned in The Purgatory BBS for having semi-legal posted material. Real name : Ron Pinz (Ronald Pinz) Handles Used : IXOM Past Handles : Dr. Disk,Bazooka Bill Sex : Male Age : 21 Birthdate : 06/28/71 Phone Numbers : 203-(EDITED) : 203-(EDITED) Address : (Edited) City/State : Wallingford, Ct. Zip code : 06492 Biography: After being thrown out of the military service for computer hacking while on duty, Its believed that Ronald is now trying to court favors from AT&T for a $50,000 job in New Jersey by turning in phreakers and hackers. It is already officially confirmed that Ron has turned in one BBS and is now setting sites on other BBS's. Its too bad he doesn't know about AT&T's policy of not hiring hackers as they figure that an ex-hacker employee cannot be trusted,we urge you to delete him from your system if you have any files that are not public domain. ------------------------------------------------------------------------------- I (EDITED), find it most interesting that this phile was circulating right before the Pump-Con Arrests, because in CUD 4.55 we find, ------------------------------------------------------------------------------- Date: Tue, 03 Nov 92 03:00:44 EST From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen) Subject: File 4--Computer Access Arrests In NY (NEWSBYTES reprint ((CR)) GREENBURGH, NEW YORK, U.S.A., 1992 NOV 3 (NB) -- The Greenburgh, New York Police Department has announced the arrest of three individuals, Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18 for the alleged crimes of Unauthorized Use Of A computer and Attempted Computer Trespass, both misdemeanors. Also arrested was Jason A. Britain, 22 in satisfaction of a State of Arizona Fugitive From Justice warrant. The arrests took place in the midst of an "OctoberCon" or "PumpCon" party billed as a "hacker get-together" at the Marriott Courtyard Hotel in Greenburgh. . The arrests were made at approximately 4:00 AM on Sunday morning, November 1st. The three defendants arrested for computer crimes were granted $1,000 bail and will be arraigned on Friday, November 6th. Newsbytes sources said that the get together, which had attracted up to sixty people, had dwindled to approximately twenty-five when, at 10:00 Saturday night, the police, in response to noise complaints arrived and allegedly found computers in use accessing systems over telephone lines. The police held the twenty-five for questioning and called in Westchester County Assistant District Attorney Kenneth Citarella, a prosecutor versed in computer crime, for assistance. During the questioning period, the information on Britain as a fugitive from Arizona was obtained and at 4:00 the three alleged criminal trespassers and Britain were charged. Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes that the investigation is continuing and that no further information is available at this time. (Barbara E. McMullen & John F. McMullen/19921103) ------------------------------------------------------------------------------- Now we find that Ronald Pinz has been arrested at Pump-Con, what better way than to court favors from AT&T than to attend a hackers conference, let people incriminate themselves and than have the police barge in an arrest you and the others. Ive heard AT&T security was there, Now doesnt that make you folks out there wonder? Lets see what happens to Mr. Pinz in court. ------------------------------------------------------------------------------- Part (2) : BERLIN BUSTS REPORTED Bad news from Berlin, on Wed. Oct 25th,twelve mailboxes,25 machines,and some thousand floppies were seized. People are charged for distributing pirated software. The local DA refuses to give further information. But the real thing is, some sysops couldnt resist to keep track of TOO MUCH INFORMATION, not only names,telephone numbers,and addresses, but even precise logs of who downloaded which software. Authorties are believed to be planning on prosecuting users who downloaded copyrighted materials. ------------------------------------------------------------------------------- Part (3) : WINDYCON To: All Subject: come hither This weekend only, at the Woodfielf Hyatt in Schaemburg.. WINDYCON!!!! See all manners of various freaks..a must see... We, the prestigous, will be there, feel free to attend.. Cecil Adams Board Pariah -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: PHANTASY TIDBITS: News and Views of Interest ------------------------------------------------------------------------------- Part 1: Police Officials Cited for Searching Private Computer Records Los Angeles (AP, 30 Oct 1992) More than 45 police officials have been cited since 1989 for using department computers to check the backgrounds of baby sitters,house sitters, and others for personal reasons. "Its a very serious problem", Police Commissioner Ann Reiss Lane Said The citations came to light after a civilian Police Commission investigator was suspended 10 days for using department computers without permission to get confidential data on White Supremacist Tom Metzger and actor Arnold Schwarzenegger. The union representing Robert Bauman appealed the suspension and submitted records showing that more than 45 department employees had been disciplined in the last three years for illegal computer use. Most recieved suspensions of two or three days or verbal reprimands. As an example, Lane said Thursday, an officer might use the computer to check the background of an individual about to marry one of the officers relatives. Bauman's 1--day suspension without pay was upheld last week by the Civil Service Commission. Bauman, a 23-year civilian employee, said he already has served the suspension and was back at work. Bauman a permit processor routinely uses police computers to check the criminal records,police files, and tax records of people apply for police permits for massage parlors, gun stores and pawn shops. He said he gathered information on Metzger because he is a part-time historian who does research on right-and left-wing political groups. Bauman said he tapped into Schwarzeneggers files because a co-worker was curious about the actor. IIRG NOTE: Another case of the Police getting there wrists slapped. Had this been a hacker he would have been screwed ------------------------------------------------------------------------------- Part 2: Subject: Call for Papers - The Third International Virus Bulletin Conference Amsterdam, 9th-10th September 1993 Call for Papers The International Virus Bulletin Conference is the largest and most prestigious annual event to address the computer virus threat in Europe. The 1992 conference, held in Edinburgh, attracted over 200 delegates and 23 speakers, from more than 20 countries. Abstracts of between 200 and 500 words outlining prospective papers for presentation at next year's Virus Bulletin conference are duly invited from all parties engaged in any capacity in combating the computer virus threat. Papers will be selected for their originality and appeal to a diverse audience comprising corporate computer security staff, PC support specialists, hardware and software developers, government, military, public sector and corporate IT managers, researchers and others engaged in devising technical and procedural countermeasures. Papers covering the following topics are particularly welcome: * Case studies of genuine virus outbreaks. * Post-attack recovery: tools, techniques and lessons learned. * Evaluation methods and protocols for testing anti-virus software. * Running a virus help desk. * Protecting file servers. * Dealing with viruses in compressed software. * What should be in a virus hunter's toolkit? The conference will be held in two streams: stream one will address the management of the virus threat, while stream two will concentrate on The conference will be held in two streams: stream one will address the Abstracts should be completed by December 1st 1993 and should be sent to the Editor, Virus Bulletin, 21 The Quadrant, Abingdon Science Park, Abingdon, Oxon OX14 3YS, UK. Fax +44 (0)235 559935. ------------------------------------------------------------------------------- Part 3: Landmark Software Decision Published in the San Francisco Examiner is the following legal decision on disassembly of software "In the first binding ruling on the application of copyright law to a common process called reverse engineering, a federal appeals court said video game maker Accolade Inc. of San Jose could copy a video game system's code copyrighted by Redwood City-based Sega Enterprises Ltd. in order to design games for the Sega console. Reverse engineering is the parctice of taking apart a product to see how it works, and using the knowledge to design one's own product. During the process, Accolade made a copy of Sega's encoded computer program, designed to exclude unlicensed game makers, in order to translate the information and extract the key to the code. The Ninth Circuit Court of Appeal in San Francisco said the copying did not violate Sega's federally protected copyright on it's software package. The court said Sega's exclusive rights over it's own programs did not entitle it to Enterprises Ltd. in order to design games for the Sega console. Reverse engineering is the parctice of taking apart a product to see how it works, and using the knowledge to design one's own product. During the process, Accolade made a copy of Sega's encoded computer program, designed to exclude unlicensed game makers, in order to translate the information and extract the key to the code. The Ninth Circuit Court of Appeal in San Francisco said the copying did not violate Sega's federally protected copyright on it's software package. The court said Sega's exclusive rights over it's own programs did not entitle it to prohibit another company from learning how the Sega system worked and designing games that would fit it, as long as those games did not copy Sega games." ------------------------------------------------------------------------------- Part 4: SIXTH INTERNATIONAL COMPUTER SECURITY & VIRUS CONFERENCE and Exposition sponsored by DPMA Fin.Ind.Chapter in cooperation with ACM-SIGSAC, BCS, CMA, COS, EDPAAph, ISSAny, NUInypc, IEEE Computer Society C A L L F O R P A P E R S Approximately 500 attendees will hear 90 speakers and 53 vendors over 3 days Wednesday thru Friday - March 10-12, 1993 - New York Ramada Madison Square YOUR AUDIENCE: Past attendees have represented industry, military government, forensic and academic settings - creators and users of related software and hardware. They travel from U.S. and many international locations and have titles such as MIS Director, Security Analyst, Operations Manager, Investigator, Programming Leader TOPICS OF INTEREST INCLUDE (but are not limited to): - prevention, detection, and recovery from viruses, crackers, and other unauthorized usage - oritinal research in these and related topics - survey of products and techniques available - particulars of LSN, UNIX, cryptography, military use - Computer crime, law, data liability, related contexts = US/international sharing of research & techniques - case studies of mainframe, pc &/or network security, e.g., - 1992 hurricane, flood, fire disaster recovery - recent court decisions - security implementation and user awareness in industry PAPER SUBMISSION: Send a draft final paper for receipt by Wednesday, 11/11/92. Address to Judy Brand, Conference Chair, box 6313 FDR Station, New York, NY 10150, USA. Please include a small photo and introductory bio not exceeding 50 words. Successful submittors or co-authors are expected to present in person. Presenters receive the Conference Proceedings and complimentary admission. PAPER FORMAT: Send one original and three copies. When making the copies, please cover over the author name(s) and other identifying data. Each paper goes to three revieweers. Type double spaced, with page# below bottom line (may be handwritten): TITLE (caps); Name; Position, Affiliation; Telephone, City/State/Zip, Electronic Address (optional). NOTIFICATION: Written and (where practicable) telephoned confirmation will be initiated by Monday, 1/13/93, to facilitate low cost travel. Those needing earlier notification should attach a note. You may be asked to perform specific revisions to be accepted. Nobody can guarantee you a place without an acceptable paper. AT THE CONFERENCE: There are five tracks. Time your presentation to last 40 minutes and have clear relation to your paper. A committee member will preside over your assigned room and adhere to schedule. Don't hesitate to submit a presentation you've given elsewhere to a more specialized audience. Most attendees will find it please cover over the author name(s) and other identifying data. Each paper goes to three revieweers. Type double spaced, with page# below bottom line (may be handwritten): TITLE (caps); Name; Position, Affiliation; Telephone, City/State/Zip, Electronic Address (optional). NOTIFICATION: Written and (where practicable) telephoned confirmation will be initiated by Monday, 1/13/93, to facilitate low cost travel. Those needing earlier notification should attach a note. You may be asked to perform specific revisions to be accepted. Nobody can guarantee you a place without an acceptable paper. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: IIRG Distribution Sites (or Gateways to Oblivion) ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// IIRG World HQ: Dark Shadows 19.2/9600 Baud HST 24 Hours a Day 1.2 Gigs Online Sysop: Anubis 2 Nodes (203)-628-9660 IIRG Distribution Site 1: Wired World BBS INC Europe TPC Courier (WHQ) THP IIRG Distribution Site Sysop: Digital Justice +39-89-254138 IIRG Distribution Site 2: Cyberdyne Network Germany United Forces Sysop: E605 +49-5341-59004 +49-5341-54052 IIRG Distribution Site 3: The Sanitarium Sysops: Morbid Angel [INC/ACID] Spectral Illusion [ACID/RAZOR] IIRG Distribution Site ACID Member Board INC Courier Board RAZOR 1911 Courier Board VISA World Headquarters (817)PRI-VATE IIRG Distribution Site 4: The WareHouse (203)-231-8589 14.4 (203)-231-8588 9600 OVER A GIG ONLINE Sysop: Ionizer -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: Phantasy Distribution Sites Phantasy's Distribution Site's are continually growing,we apologize if you called a board and didn't find the Mag. Network Distribution Sites will have the Issues first, we suggest calling one of them if a problem does arise. 1. Lightning Systems (414) 363-4282 Sixty Million Bytes OnLine USRobotics Dual Standard HST/V.32bis 2400 thru 14.4k v.32bis/HST 2. Sycamore Elite 19,200-1200 Baud HST, 24 Hours a day (815) 895-5573 3. The Works BBS at (617-861-8976) Largest Text Files BBS in the world, 3500+ text files online. 2400-300 Baud, 24 Hours a day 4. Pipers Pit BBS 19,200-9600 HST ONLY!! 24 Hours a Day THG Distro Site 1300 Megs (203)PRI-VATE [2 Nodes] 5. Blitzkrieg BBS TAP Magazine (502)-499-8933 P.O. BOX 20264 Home of TAP MAgazine Louisville,KY. 40250-0264 6. The Dickinson Nightlight (713)-337-1452 Der WeltanSchauung Distro Site (World View Magazine) Phantasy Distro Site PHANTASY is also available on: 1. RIPCO BBS (312)528-5020 2. KRACKER BOX (303)438-1481 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PHANTASY(C) IIRG 1991,1992 May Odin Guide Your Way! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-