/\###############/\/\/###################/\/\/\/\/\/\/\/####/\/\/\/\/\ /###############/\/\/\/#################/\/\/\/\/\/\/\/######/\/\/\/\/ ###############/\/\/\/\/###############/\/\/\/\/\/\/\/########/\/\/\/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/\#####/\#####/\/\/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/#####/\/\#####/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\#####/\/\/\#####/\/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/#####/\/\/\/\#####/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\ ###############/\/\/\/\/###############/\/\/\/\/#####/\/\/\/\/\#####/\ /###############/\/\/\/#################/\/\/\/\#####/\/\/\/\/\#####/\ /\###############/\/\/###################/\/\/\/#####/\/\/\/\/\#####/\ Center of Intelligent Anarchists Issue #2 Release date: April 3, 1994 <><><><><><><><><> Table of Contents>>>>>>>>>. <><><><><><><><><> Introduction Subscription Information Writing for CIA Misconceptions of Computer Hacking Tips for The New Hacker Where to Get Information ><><><><><><> Introduction>>>>>>> ><><><><><><> Hello, to all of you that acutally downloaded my last issue, thanks for taking interest. I don't know if this will work out or not, but I am trying to put out one a month and am uploading to as many bbs as possible. In this issue I will cover probably more hacking than anything, because that is what I have really been getting into the past few weeks. I go through phases from phreaking, to hacking, to anarchy, etc. Right now I am in a hacking/phreaking stage. Well, thanks to those that downloaded the last one, spread it around. Upload to all your local Bulletin Boards. Give to your friends. If anyone is on internet, send a copy to Computer Underground Digest and give them this message for me: ------- Dear CUD, I am now an avid collector of your publication. I am missing most of the issues, but I am building up my collection. I am also going to attempt to build up a collection of Phrack. Anyway, I thought that you might be interested in my new publication. If so, then send me a letter (U.S. Mail) and I can arrange for you to get a copy each month. My address is: Center for Intelligent Anarchits c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 Thanks. Sincerely, Totally Destroyed ----------- Well, on with the files. ><><><><><><><><><><><><> Subscription Information>>>>>>>>> ><><><><><><><><><><><><> To receive the Center of Intelligent Anarchist's publication monthly by mail then send me a letter including Name, Address, and Where you get your copies of CIA (BBS name, Person, etc.). Prices are as follows: Hard Copy $15.00 12 issues Soft Copy Disks Supplied (specify size) $25.00 12 issues Soft Copy, you supply disks $20.00 12 issues Sample copies are available at $2.00 for hard copy and $3.50 for soft copy with the disk supplied (specify size). Send your name, address, phone number (Optional), and check, money order, or cash (Not Responisble for Lost Mail). Mail orders to: Center of Intelligent Anarchist's c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 <><><><><><><><> Writing for CIA>>>>>>>>> <><><><><><><><> If you wish to write for the Center of Intelligent Anarchist's publication submit article to: Center of Intelligent Anarchist's c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 Include your address, name, where I can get in touch with you (Mailing address U.S. Mail is fine), and the article. If you wish to become a regular writer tell me that as well. ><><><><><><><><><><><><><><><><><> Misconceptions of Computer Hacking>>>>>>>>> ><><><><><><><><><><><><><><><><><> I am here to point out many of the misconceptions of computer hacking. I am astonished as to the amount of ignorance there is on the subject. Many people are under the impression that we are here mainly to destroy, modify, and make life miserable to all computer users. This is obviously a lie. Lets take a look at the Hacker Ethics in the book Hackers by Steven Levy. 1. Access to computers--and anything which might teach you something about the way the world works--should be unlimited and total. Always yield to the Hands-On Imperative! 2. All information should be free. 3. Mistrust authority--Promote Decentralization. 4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. 5. You can created art and beauty on a computer. 6. Computers can change your life for the better. Hackers also strictly believe that no information should be modified or destroyed. If you wish to change something, make sure it is easily detected and fixed. Then only do it if it will make the system better or inform people about their system. ex. Once I heard of a hacker who logged onto a system "illegally" and put an user specific logon screen on the system. It read: Hello , I see that your password is . You should consider the password "Carriage Return" instead, as this helps promote Free Information. No damage was done, the only problem was that anyone in the room saw the users password on the screen. Therefore all the users changed their passwords. And the System Operator had a small ten minute task to do, removing the message. It demonstrated that the security system was week. A smart sysop would have added more security or taken the messages advice and gotten rid of the security all together. This would work. ex. ITS (Incompatible Time-sharing System) was written for the PDP-6 back in the sixties at MIT (Mass. Institute of Technology). It was a system that allowed full access to any user file by any user. It also supported no passwords and was more user friendly than any other system in use that day. It had up to date technology in the programming. Any user could enter a command to find out who else was online and could even get their screen on their terminal to watch what they were doing. The purpose, to simulate the old effect of everyone crowding around one terminal. Their was also a command called Kill System, which would Kill the System. The idea was to take the fun out of crashing the system and the above mentioned features took the fun out of hacking into other peoples files. Now all information in that particular computer was FREE!! Users could also modify the code of the system. This added to it and soon it became the best system around at the time, with every user working on it a little bit at a time. Making improvements, it grew. Yet no one crashed the system and files weren't lost. Why, because that required no skill on this system. People turned to more productive things like improving the system, because this required skill. So obviously the hacker ethic makes things better and we do no harm. It is against hacker ethics and morales to crash a system, let lose a virus, or damage a system in any other way. Now, here are some of the misconceptions of hacking by the general population. I will not mention names here and am in no way putting down this fine student who does quite well in school and is overall an intelligent and caring person. This is a list of the fallacies in his research project on hacking. His thesis is to prove that hacking should be illegal. 1. He defines hacking as follows: Computer hacking - the process of using a computer with a modem and connecting to another computer with a modem, then breaking passwords, in search of information and services [electronic trespasing], and/or make trouble. 2. He says the following about cyperpunks, computer enthusiasts, and hackers: Most work in gangs and gave secret code names to identify themselves. No girl cyperpunks, computer entusiasts, or hackers. Many come from broken homes or have pyschological problems. 3. He does define the Hacker Ethic correctly though. He defines it as follows: Hacker Ethic - It is ok to search, but never destroy. 4. We never transmit viruses as he says. 5. We don't delete hard drives neither, unless of course they're ours. 6. Yeah we crack passwords, and copy info., but only for educational purposes. The common betrayal of hackers as Charles Manson with a computer is totally bogus and a stereotype made by the mass media of today's world. I myself don't come from a broken home and many of us have no pyschological problems. Unless searching for information is considered a problem. And of course, we all know that hackers do not discriminate. There have been female hackers. And what he calls gangs, I don't have a clue as to what he means. Yet, we make no trouble, we delete no files, we don't damage a thing, and we don't crash systems and upload viruses. Yes, I know how to write destructive programs, but I don't use them. I merely posess the knowledge, I don't use it for any reason. This illustrates the common misconception of hackers and other computer enthusiasts. Lets be glad he didn't include phreakers in the paper too. <><><><><><><><><><><><> Tips for the New Hacker>>>>>>>>>> <><><><><><><><><><><><> Hopefully this will become a regular section in CIA magazine. In it you will find tips and hints for the new hacker. I know when I was starting I loved finding files on New Hacker Hints. Well, on with the premiere of this section. This is a long list of tips to avoid being caught, some include "hacker ethics". 1. Don't ever maliciously hack into a system. Do no damage and don't delete or modify files unless neccesary to cover your tracks. 2. Don't give out your voice phone number. Many famous phreaks or hackers have turned Narc when they got busted. If it gives them a chance they may turn you in. 3. Don't attempt to hack into Military or Government computers. They will almost definately bust you as they have all the time, money, and resources in the world. 4. Don't use codes from your house. You WILL almost always get busted. Most PBX/950/800 have ANI and will trace you. 5. Don't ever rat out someone. It will come back to you later. 6. Use only your own codes, never one given to you by anyone. They are almost always overused. 7. Be paranoid. Use a encryption program to encode all the files on your computer. Don't keep written notes. If you must write something down, burn it when your done. The fed's do trash, just like us. 8. If you get busted don't say anything. Refuse to speak without a lawyer. 9. If the police arrive at your house with a warrant. Look it over and know what they can and can't do. If they try something they can't do, stop them. 10. Try not to hack off your own line. Splice your neighboors, or call from a fortress phone. If you hack long enough you'll sooner or later get ANI'd. And Packet Switched Networks aren't entirely safe. 11. Make it tough to track you. Bounce the call off several outdials. If your on a PSN (Packet Switched Network) go through several pads, before you reach your destination. It will make more trouble for the investigators and make it easier for you to get away. That's all for this issue. More info next time. For all of you interested in a data encryption program, I can mail one to you (Shareware) and one other (PC Magazine, batch/asm routine) on the same disk. Cost is only $4.00. Send Name, Address, Phone (Optional), and check, money order, or cash (I am not responisble for lost mail) to: Center for Intelligent Anarchist's c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 ><><><><><><><><><><><><> Where to Get Information>>>>>>> ><><><><><><><><><><><><> Hacking/phreaking material is hard to obtain and often quite expensive. This will become a regular section with magazine/catalog/book Companies that sell materials on hacking/phreaking/etc. Here goes the list: Delta Press Ltd. P.O. Box 1625 215 South Washington Street El Dorado, AR 71731 -explosives, improvised munitions, survival, espionage, survival, revenge, guns Palidan Press P.O. Box 1307 Boulder, CO 80306 -explosives, improvised munitions, survival, espionage, privacy, revenge, guns Eden Press 11623 Slater "E" P.O. Box 8410 Fountain Valley, CA 92728 -privacy, protection, jobs, credit, espionage, buisness ideas offshore finace, personal independance Books By Phone P.O. Box 522 Berkeley, CA 94701 1-800-858-2665 -drugs, criminology, cyberpunk, occult, rock & roll, sex, underground labs, survival There are many more, that I will include in later issues. I have a list of about thirty, but none are verified (old list) and as I receive info. you will receive info. _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_- Well that wraps it up for issue number two. Should have been released April 3,1994. If anyone is interested in speaking with me I can be reached on prodigy at GSTD79B. Name is Totally Destroyed. I will be canceling Prodigy soon and getting Compuserve, so I will post my CompuServe I.D. when I get it. Continue writing me on prodigy if you wish, I will be there. Some letters will be posted in a letters to editor section. You can reach me at: Center for Intelligent Anarchist's c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 Selected letters will be placed in a letters to the editor section. Well, until next month. Happy Hacking (Happy Easter too!!) ______________________________________________________________________________ This just in, for some reason CUD has been ended. It will no longer be available!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!! APRIL FOOLS!!!!!!!!!!!