[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Line Noise Part I ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #43 | Release date : 1993-07-01 | Editor : Erik Bloodaxe
IntroductionDatastream Cowboy
Phrack Loopback Part IPhrack Staff
Phrack Loopback Part II / EditorialPhrack Staff
Line Noise Part IPhrack Staff
Line Noise Part IIPhrack Staff
Phrack Pro-Phile on Doctor WhoDoctor Who
Conference News Part Ivarious
Conference News Part IIvarious
How To Hack Blackjack (Part I)Lex Luthor
How To Hack Blackjack (Part II)Lex Luthor
Help for Verifying Novell SecurityPhrack Staff
My Bust (Part I)Robert Clark
My Bust (Part II)Robert Clark
Playing Hide and Seek, Unix StylePhrack Accident
Physical Access and Theft of PBX SystemsCodec
Guide to the 5ESSFirm G.R.A.S.P.
Cellular InfoMadjus
LODCOM BBS Archive Informationunknown
LODCOM Sample Messagesunknown
Step By Step Guide To Stealing a CamaroSpy Ace
Acronyms Part IFirm G.R.A.S.P.
Acronyms Part IIFirm G.R.A.S.P.
Acronyms Part IIIFirm G.R.A.S.P.
Acronyms Part IVFirm G.R.A.S.P.
Acronyms Part VFirm G.R.A.S.P.
International Scenevarious
Phrack World NewsDatastream Cowboy
Title : Line Noise Part I
Author : Phrack Staff
                         ==Phrack Magazine==

              Volume Four, Issue Forty-Three, File 4 of 27


                           //   //  /\   //   ====
                          //   //  //\\ //   ====
                         ==== //  //  \\/   ====

                     /\   //  // \\    //  /===   ====
                    //\\ //  //   //  //   \=\   ====
                   //  \\/    \\ //  //   ===/  ====

******************************************************************************

                          PHRACK TRIVIA

This is pretty damn hard.  In fact, some of it is downright obscure.
And the bonuses?  Forget about it.  Answer the questions, expand the
acronyms, explain the numbers.

The five highest scorers by the next issue (or the first 5 to get
perfect scores) win COOL STUFF!

Send your answers to [email protected]


1)      CCIS

2)      Stimpson J. Cat's Roommate is?

3)      Name the cracker.

4)      METAL AE password.

5)      Who invented the TeleTrial?

6)      Name Bloom County's hacker.

7)      What was the Whiz Kids' computer named?

8)      Western Union owned what long distance service?

9)      What computer read both Apple ][ and IBM PC disks?

10)     Who made the "Charlie" board?

11)     How many credits for a CNE?

12)     What was in the trunk of the Chevy Malibu?

13)     Name three bands A. Jourgensen had a hand in.

14)     SYSTEST Password:

15)     What computer makes the best SimStim decks?

16)     What magazine brought the telephone underground to national
        attention in 1971?

17)     What is the significance of 1100 + 1700 hz?

18)     What magazine was raided for publishing black box plans?

19)     What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ?

20)     CLASS

21)     What computer responds "OSL, Please" ?

22)     RACF secures what OS?

23)     The first person to create a glider gun got what?

24)     QRM

25)     PSS

26)     What PSN was acquired by GTE Telenet?

27)     914-725-4060

28)     April 15, 1943

29)     8LGM

30)     WOPR

31)     What happened on March 1, 1990?

32)     Port 79

33)     Who starred in the namesake of Neil Gorsuch's UNIX security
        mailing list?

34)     What Dutch scientist did research in RF monitoring?

35)     What was the author of GURPS Cyberpunk better known as?

36)     Who would "Piss on a spark plug if he thought it would do
        any good?"

37)     What thinktank did Nickie Halflinger escape from?

38)     NCSC

39)     Who is Pengo's favorite astronomer?

40)     What language was Mitnik's favorite OS written in?

41)     Abdul Alhazred wrote what?

42)     The answer to it all is?

43)     Who is the father of computer security?

44)     Who wrote VCL?

45)     What kind of computer did Cosmo have?

46)     Hetfield, Ulrich, Hammet, Newstead

47)     What company wrote the computer game "Hacker?"

48)     Who does Tim Foley work for?

49)     Who played Agent Cooper?

50)     Vines runs over what OS?

51)     Mr. Peabody built what?

52)     Who makes SecurID?

53)     What's in a Mexican Flag?

54)     Who created Interzone?

55)     JAMs (as led by John Dillinger)

56)     Abbie Hoffman helped start what phreak magazine?

57)     What was once "Reality Hackers?"

58)     Gates and Allen "wrote" BASIC for what computer?

59)     Tahoe is related to what OS?

60)     CPE 1704 TKS is what?

61)     Telemail's default was what?

62)     "Do Androids Dream of Electric Sheep" became what?

63)     What broadcasts between roughly 40 and 50 mhz?

64)     Who created Tangram, Stratosphere, and Phaedra among others?

65)     What was Flynn's most popular video game?

66)     Who lived in Goose Island, Oregon?

67)     516-935-2481

68)     What is the security of ComSecMilNavPac?

69)     What has the "spiral death trap?"

70)     Who was the Midnight Skulker?

71)     TMRC

72)     Who wrote "Jawbreaker?"

73)     213-080-1050

74)     What is the Tetragrammaton represented as?

75)     Who is Francis J. Haynes?

76)     Who ran into one of the Akira test subjects?

77)     What had "Munchies, Fireballs and Yllabian Space Guppies?"

78)     PARC

79)     Alex and his droogs hung out where?

80)     Jane Chandler in DC's "Hacker Files" is based on who?

81)     The Artificial Kid lives on what planet?

82)     208057040540

83)     What are the two most common processors for cellular phones?

84)     Who came up with the term "ICE?"

85)     What group is hoped might help the "Angels" contact RMS?

86)     Who is Akbar's friend?

87)     What company's games was David Lightman after?

88)     26.0.0.0

89)     Who was Mr. Slippery forced to locate?

90)     Who is "The Whistler?"

91)     What use would a 6.5536 crystal be?

92)     .--.  ....  .-.   .-  -.-.  -.-

93)     The Dark Avenger likes what group?

94)     What book spawned the term "worm?"

95)     Michael in "Prime Risk" wanted money for what?

96)     Automan's programmer worked for who?

97)     What signal filled in keystrokes on TOPS-20?

98)     ITS

99)     (a/c)+121

100)    What drug kept the scanners sane?

Bonus 1
3 pts   Name three bodies of work by Andrew Blake.

Bonus 2
3 pts   Name three currently available titles with N. L. Kuzma.

Bonus 3
4 pts   Why would I hate Angel Broadhurst?

*****************************************************************************

              IF SECURITY TYPES WERE K-RAD

----------------------------------------------------------------


IRC log started Fri June 18 01:14
*** Value of LOG set to ON
<Pat> bye peter
*** Signoff: hackman (slavin' to da' MAN at TRW)
<Ed> Dudez, I HATE filling out thez incident Rep0rtz
<bartman> MUAHAHA Tuff J0b edd1e!
<Ed> Funni
*** zen ([email protected]) has joined channel #CERT
<Ed> re dan, just missed yer pal peety
<Pat> Hi Dan!
<zen> pal?  right.  ask the wife...
<venom> re
<zen> d00dz, we have SO many bugz.  sux 2 be me.
*** venom has left channel #CERT
*** venom ([email protected]) has joined channel #CERT
*** venom has left channel #CERT
*** venom ([email protected]) has joined channel #CERT
*** venom has left channel #CERT
*** venom ([email protected]) has joined channel #CERT
<venom> ARG!
<bartman> WTF Weitse?
<venom> s0rri
<zen> Where is everyone?  Anyone seen spaf?
<Pat> I have.  He was going to install something.  He should be bak.
<zen> ah
*** Action: Ed throws darts at a cracker
<zen> heh
<venom> muaha
*** bartman is now known as Cracker
*** Action: Cracker hacks Cert with an axe
<venom> dats a good 1
*** Action Ed kicks cracker in the nuts
<Cracker> OUCH!
*** Signoff: donn (Bad Link?)
<Cracker> [high voice] fuk u CERT!
<Ed> heh.
*** Action: Pat is ROFL
<Cracker> wonder who's on #hack?  Mebbe i should go log em.
<Ed> Yeah.  Oh hey, I got certbot online.  Ill send it to go log.
*** certbot ([email protected]) has joined channel #CERT
*** certbot has left channel #CERT
<Ed> this will be fun.
<venom> Hey, letz deop them and take over the channel.
<zen> thats L A M E
<Cracker> Ooooh.  OPWARZ!  I'll go make their channel +i muahaha
*** Cracker has left channel #CERT
*** Casper ([email protected]) has joined channel #CERT
<Casper> re all
<Venom> hey dik-head.
<zen> re
<Pat> hahahaha  hi d00d.
<Casper> funni whitesey venombreath
<Ed> lame.
*** donn ([email protected]) has joined channel #CERT
<donn> 'sup?
<Ed> re, oh great bald one
<donn> eat me
<zen> bahhahaha
<Pat> Now now boyz.
*** spaf ([email protected]) has joined channel #CERT
<Pat> Spaffie!
<zen> 3l33t SPAF!
<Ed> re spaf
<spaf> Yo.
<venom> spaf...your book sucks.
<spaf> oh fuck off dutch boy.
<Casper> HEY!$!@%
*** spaf has been kicked off channel #CERT by Casper
<venom> thx dude
<Ed> oh gawd...feetball
*** spaf ([email protected]) has joined channel #CERT
<spaf> lame
*** Mode change "+o -o spaf Casper" on channel #CERT by Pat
<spaf> thanks sweetie.
<Casper> op!
*** Mode change "+o Casper" on channel #CERT by venom
<Casper> thx d00d
<Ed> Hey dan, you got those patches online?
<zen> maybe.  What YOU got?
<donn> WAREZZ
<Pat> heh
<Ed> I dunno.  Ill dcc you a filelist.
<zen> kool
*** zardoz ([email protected]) has joined channel #CERT
<zardoz> HEY ... anyone want to contribute to my new list?
<Ed> not me
<zen> mebbe.  Whats this one called?  Coredoz?
<donn> what list?
<spaf> BAH.  Fuck your list man.  More crackrs have them than we do!
<zardoz> who pissed in your coffee gene?
<donn> heh
*** zardoz is now known as neil
<spaf> bah... I'm sick of those dicks using my own holes against me!
<venom> Your holes?  Yer a-hole?
<Pat> What is your list about this time?
<neil> same thing.  Its called REWT!
*** neil is now known as REWT
<REWT> SEND ME YER BUGZ!@#
*** Action: spaf sends REWT a 50 gig coredump
<Pat> :)
<REWT> u r lame.
*** REWT is now known as neil
<Ed> I hate these reports.  I wish I got to travel more.
<Pat> come see me!
<Casper> oooohhhh....netsex!
<spaf> tramp.  :P
*** bill ([email protected]) has joined channel #CERT
<bill> word!
<Pat> hi bill.
<donn> Bill!  D00d!  I am gonna be in Ct. next week!
<bill> RAD!  call me voice at werk.  we'll thrash!
<donn> you know it!
<zen> oh puh-lease...the geriatric partiers :)
<donn> farmboy
<Ed> *****   *****   *****  *****
<Ed> *       *       *   *    *
<Ed> *       ***     ****     *
<Ed> *       *       *   *    *
<Ed> *****   *****   *   *    *
<Ed>
<Ed> *****   *   *   *      *****   *****  **
<Ed> *   *   *   *   *      *       *      **
<Ed> ****    *   *   *      ***     *****  **
<Ed> *   *   *   *   *      *           *
<Ed> *   *   *****   *****  *****   *****  **
<Pat> No DUMPING!
<zen> cert freshens your breath
<donn> ACK!
<venom> hee!  certs  haha
*** ray ([email protected]) has joined channel #CERT
<ray> hey guys!
<Ed> ugh.  Cracker lover alert.
<donn> commie
<bill> Hey ray, come to snoop for your little cracker friends?
<ray> come on, give it a rest guys.
<Pat> hi ray
<venom> ?
*** Action: spaf spits on ray
<spaf> heh
*** ray has been kicked off channel #CERT by spaf
*** Mode change "+b *!*@bpa.arizona.edu" on channel #CERT by spaf
<neil> hey I wanted to talk to him about my list...
<spaf> tough shit.
<donn> heh.
*** bartman ([email protected]) has joined channel #CERT
<Pat> re
<Ed> how goes the takeover?
<venom> didja kick em?
<bartman> #hack is +i!  muahahaha
<zen> how exciting.  not
<donn> they deserve it...they are all punks.
<spaf> hmm..did you get emails?  I may want to call their admins.
<bartman> nope  damn.
<Ed> certbot was there.  He got it.
<spaf> coolness
*** Signoff: bill (Bad link?)
<Casper> ne1 going to hactics thing?
<venom> me
<Casper> besides you.  duh.
<Ed> dunno.
<bartman> not me.  I have no desire to pay for anything done by hackers
<Ed> That reminds me.  Did anyone subscribe to Phrack?
<Pat> nope.
<bartman> oops.  HAHAHAHAHAHA
<Ed> heh.
<donn> Whats phrak?
<neil> nope. my list is better.  Who wants on it?
<Pat> me!
<donn> what list?
<Pat> OOH!  I have mail!  bye!
<bartman> itz an ansi bomb!
<Ed> bye Pat
<Spaf> l8r
<neil> heh.
*** Signoff: Pat (Hugs to all)
<Casper> well, i better do something productive 2. cya
<venom> slatez d00d.
*** Signoff: Casper (Hi ho hi ho its off to work I go)
<donn> man its late.  I better go.  I gotta speech in the morn
<Ed> you are getting old.
<donn> am not
<Ed> are so
<donn> am not
<Ed> are too!  infinity
<donn> hasta
*** Signoff: donn (|/dev/null)
<Ed> laterz
<Spaf> geez.  what a bunch of lamers.
(ray/#CERT) UNBAN ME!
<Spaf> hahaha
<Ed> never gives up does he?
<neil> seriously ed, Ive helped you guys out, send me stuff for REWT.
<Ed> ill think about it
<spaf> not
<neil> it will be most savory.  I promise.  And secure!
<spaf> pfft...and monkeys might fly out of my butt
<Ed> Ill think about it.
<zen> heh, I should do one called Supernova.  Exploding suns. hehe
<Ed> heh
<spaf> dats tha tr00f!
<bartman> i like my sun
<Ed> i know a bunch of crackerz who like bt's suns too.
<spaf> hahahahahahahahahaha
<venom> oh shit.  Im late.
*** Signoff: venom (LATE!)
<Ed> late 4 what?
<spaf> his vasectomy.  har har
<neil> heh
*** REVENGE ([email protected]) has joined channel #CERT
*** Mode change "+o REVENGE" on channel #CERT by eff.org
<Ed> whoops
*** Mode change "+i" on channel #CERT by REVENGE
<spaf> fuCK!  KICK HIM!
*** spaf has been kicked off channel #CERT by REVENGE
*** neil has been kicked off channel #CERT by REVENGE
*** bartman has been kicked off channel #CERT by REVENGE
*** Ed has been kicked off channel #CERT by REVENGE
*** zen has been kicked off channel #CERT by REVENGE
*** REVENGE is now known as ray
<ray> hehe

---------------------------------------------------------------------

****************************************************************************

Phrack Library of Periodicals

2600
Subscription Department
P.O. Box 752
Middle Island, NY 11953-0752
$21.00/Year

Animation Magazine
5889 Kanan Road, Suite 317
Agoura Hills, CA 91301
$21.00/Year

Bank Technology News
Faulkner & Gray, Inc.
Eleven Penn Plaza
New York, NY 10117-0373
$50.00/Year

Ben Is Dead
P.O. Box 3166
Hollywood, CA 90028
$20.00/Year

Boardwatch Magazine
7586 West Jewell Ave., Suite 200
Lakewood, CO 80232
$36.00/Year

Boing Boing
11288 Ventura Blvd. #818
Studio City, CA 91604
$14.00/Year

Communications of the ACM
1515 Broadway
New York, NY 10036
$30/Year

CQ - The Radio Amateur's Journal
76 North Broadway
Hicksville, NY 11801-9962
$22.95/Year

Details
P.O. Box 50246
Boulder, CO 80321
12.00/Year

Dirt
230 Park Ave
New York, NY 10169
(Supplement to Sassy & Marvel Comics)

Electronics Now
Subscription Service
P.O. Box 51866
Boulder, CO 80321-1866
$17.97/Year

Farout
9171 Wilshire Blvd. Suite 300
Beverly Hills, CA 90210
$3.95/Issue

Fate
170 Future Way
P.O. Box 1940
Marion, OH 43305-1940
$18.00/Year

Femme Fatales
P.O. Box 270
Oak Park, IL 60303
$18.00/Year

Film Threat
Subscriptions Department
P.O. Box 16928
N. Hollywood, CA 91615-9960
$11.85/Year

Film Threat Video Guide
P.O. Box 3170
Los Angeles, CA 90078-3170
$12/Year

Fringe Ware Review
P.O. Box 49921
Austin, TX 78765
$12.00/Year

Future Sex
1095 Market Street, Suite 809
San Francisco, CA 94103
$18.00/Year

Gray Areas
P.O. Box 808
Broomall, PA 19008-0808
$18.00/Year

High Times
P.O. Box 410
Mt. Morris, IL 61054
$29.95/Year

IEEE Spectrum
445 Hoes Lane
P.O. Box 1331
Piscataway, NJ 08855-1331
800-678-IEEE for info

The "I Hate Brenda" Newsletter
c/o Ben Is Dead
P.O. Box 3166
Hollywood, CA 90028
$2.00

InfoSecurity News
P.O. Box 3168
Lowell, MA 01853-3168
$40.00/Year

International UFO Library Magazine
11684 Vewntura Blvd. #708
Studio City, CA 91604
$15.00/Year

Magical Blend
1461 Valencia St. Dept. GA
San Francisco, CA 94110
$14.00/Year

Midnight Engineering
1700 Washington Ave.
Rocky Ford, CO 81067-9900
$19.95/Year

Mobile Office
Subscription Department
21800 Oxnard St.  Suite 250
Woodland Hills, CA 91367-9644
$23.90/Year

Mondo 2000
P.O. Box 10171
Berkeley, CA 94709
$24.00/Year

Monitoring Times
P.O. Box 98
140 Dog Branch Road
Brasstown, NC 28902-0098
$19.95/Year

New Media
P.O. Box 1771
Riverton, NJ 08077-9771
$48.00/Year

The Nose
1095 Market Street, #812
San Francisco, CA 94103-9654
$15.00/Year

Nuts & Volts
430 Princeland Court
Corona, CA 91719-9938
$17.00/Year

Popular Communications
76 North Broadway
Hicksville, NY 11801-9962
$19.95/Year

Sassy
P.O. Box 50093
Boulder, CO 80321-0093
$9.97/Year

Security Insider Report
11511 Pine St. North
Seminole, FL 34642
$99.00/Year

SunExpert Magazine
1330 Beacon St.
Brookline, MA 02146-3202
$60.00/Year

Tech Connect
12407 MoPac Expwy. N. #100-374
Austin, TX 78758-2499
$12.00/Year

Telephone Engineer & Management
Advanstar Communications, Inc.
P.O. Box 6100
Duluoth, MN 55806-9822
$24.00/Year

UFO
1536 S. Robertson Blvd.
Los Angeles, CA 90035
$21.00/Year

Wild Cartoon Kingdom
9171 Wilshire Blvd., Suite 300
Beverly Hills, CA 90210
$3.95/Issue

Wired
P.O. Box 191826
San Francisco, CA 94119-1826
$20.00/Year

*****************************************************************************

                     !!!!POST EVERYWHERE!!!!

      THE WORLD'S FIRST NOVEL-ON-THE-NET (tm) SHAREWARE!!!
                       By Inter.Pact Press

                      "TERMINAL COMPROMISE"
                        by Winn Schwartau

     A high tech thriller that comes from today's headlines!

"The Tom Clancy of computer security."
          Assoc. Prof. Dr. Karen Forcht, James Madison University

"Terminal  Compromise" is a highly praised novel about the  inva-
sion of the United States by computer terrorists.

Since  it was first published in conventional print form,  (ISBN:
0-962-87000-5)  it has sold extremely well world-wide,  but  then
again,  it never hit the New York Times Bestseller  List  either.
But that's OK, not many do.

Recently,  someone we know very well came up with a  real  bright
idea.   They suggested  that INTER.PACT Press take  the  unprece-
dented,  and maybe slightly crazy, step to put "Terminal  Compro-
mise" on the Global Network thus creating a new category for book
publishers.   The  idea is to offer  "Terminal  Compromise,"  and
perhaps  other titles at NOVEL-ON-THE-NET SHAREWARE(tm) rates  to
millions  of people who just don't spend a lot of time  in  book-
stores.   After  discussions with dozens of people -  maybe  even
more than a hundred - we decided to do just that.   We know  that
we're  taking a chance, but we've been convinced by  hackers  and
phreakers and corporate types and government representatives that
putting "Terminal Compromise" on the net would be a fabulous step
forward  into  the Electronic Age, (Cyberspace if you  will)  and
would encourage other publishers to take advantage of  electronic
distribution.   (It's still in the bookstores, though.)

To  the  best of our  knowledge,  no  semi-sorta-kinda-legitimate
-publisher has ever put a complete pre-published 562 page book on
the  network  as a form of Shareware.  So, I guess  we're  making
news  as  well as providing a service to the  world's  electronic
community.   The recommended NOVEL-ON-THE-NET SHAREWARE fees  are
outlined later (this is how we stay in business), so please  read
on.

WE KEEP THE COPYRIGHTS!

"Terminal  Compromise"  is  NOT  being  entered  into  the  public
domain.   It  is  being  distributed  electronically  so  hundreds
of thousands more  people  can enjoy it and  understand just where
we are heading with  our  omnipresent  interconnectedness  and the
potential dangers we face.  INTER.PACT Press  maintains  all copy-
rights to "Terminal Compromise" and does not, either intentionally
or  otherwise,  explicitly  or implicitly,  waive  any  rights  to
this  piece  of  work or  recourses  deemed  appropriate.  (Damned
lawyers.)

(C) 1991, 1992, 1993, Inter.Pact Press



                TERMINAL COMPROMISE - THE REVIEWS

" . . . a must read . . ."
          Digital News

"Schwartau  knows  about  networks and security  and  creates  an
interesting plot that will keep readers turning the pages."
          Computer World

"Terminal  Compromise  is  fast-paced  and  gripping.   Schwartau
explains complex technology facilely and without condescension."
          Government Computer News

"An  incredibly fascinating tale of international intrigue . .  .
action  .  . . characterization . . . deserves attention  .  .  .
difficult to imagine a more comprehensive resource."
          PC Laptop

"Schwartau   .  . . has a definite flair for  intrigue  and  plot
twists.   (He) makes it clear that the most important  assets  at
risk are America's right to privacy and our democratic ideals."
          Personal Identification News

"I  am  all  too familiar with the  appalling  realities  in  Mr.
Schwartau's book.  (A) potentially catastrophic situation."
          Chris Goggans, Ex-Legion of Doom Member.

"  . . .  chilling scenarios . . . ",  "For light summer  reading
with  weighty implications . . . ",  " . . .  thought  provoking,
sometimes chilling . . . "

Remember, it's only fiction.  Or is it?



                  TERMINAL COMPROMISE: SYNOPSIS

"It's all about the information . . . the information."
                         From "Sneakers"

Taki Homosoto, silver haired Chairman of Japan's huge OSO  Indus-
tries,  survived Hiroshima; his family didn't. Homosoto  promises
revenge  against the United States before he dies.  His  passion-
ate, almost obsessive hatred of everything American finally comes
to a head when he acts upon his desires.

With  unlimited resources, he comes up with the ultimate  way  to
strike back at the enemy. Miles  Foster, a brilliant 33 year old
mathematician   apparently isn't  exactly  fond of America either.
The  National  Security  Agency wanted  his  skills, but his back-
ground and "family" connections kept him from advancing within the
intelligence  community.  His  insatiable - borderline psychotic-
sex drive  balances  the intensity  of waging war against his own
country to  the  highest bidder.

Scott  Mason,  made  his fortune selling high tech  toys  to  the
Pentagon.   Now as a New York City Times reporter,  Mason  under-
stands  both  the good and the evil of technology  and  discovers
pieces  of  the terrible plot which is designed  to  destroy  the
economy of the United States.

Tyrone  Duncan, a physically huge 50-ish black senior  FBI  agent
who suffered through the Hoover Age indignities, befriends  Scott
Mason.  Tyrone provides the inside government track and confusion
from competing agencies to deal with the threats.  His altruistic
and  somewhat pure innate view of the world finally makes him  do
the right thing.

As  Homosoto's  plan evolves, Arab zealots,  German  intelligence
agents and a host of technical mercenaries find the weaknesses in
our  techno-economic  infrastructure.   Victims  find  themselves
under  attack by unseen adversaries; Wall Street suffers  debili-
tating  blows; Ford and Chrysler endure massive shut downs.   The
U.S. economy suffers a series of crushing blows.

From  the White House to the Pentagon to the CIA to the  National
Security Agency and FBI, a complex weaving of fascinating politi-
cal characters find themselves enmeshed a battle of the New World
Order.   Sex,  drugs, rock'n'roll: Tokyo,  Vienna,  Paris,  Iraq,
Iran.  It's all here.

Enjoy reading "Terminal Compromise."



                     SHAREWARE - NOVEL FEES:

We hope that you enjoy "Terminal Compromise" as much as  everyone
else  has, and that you will send us a few shekels  according  to
the following guidelines.

The  NOVEL-ON-THE-NET SHAREWARE(tm)  fees for us as a  publishing
company  are no different than the fees for software  application
shareware publishers, and the intent is the same.  So please, let
us continue this form of publishing in the future.


NOVEL-ON-THE-NET SHAREWARE Fees For The People:

The suggested donation for individuals is $7.  If you hate Termi-
nal Compromise after reading it, then only send $6.50.  If you're
really, really broke, then tell a hundred other people how  great
it was, send us a rave review and post it where you think  others
will enjoy reading it, too.  If you're only a little broke,  send
a few dollars.  After all, this is how we stay in business.  With
each  registration, we will also send a FREE! issue of  "Security
Insider Report," a monthly security newsletter also published  by
Inter.Pact Press.


NOVEL-ON-THE-NET SHAREWARE Fees For Businesses:

We  hope  that  you put "Terminal Compromise"  on  your  internal
networks so that your employees will have the chance to enjoy  it
as well.  It's a great way to increase security awareness amongst
this  country's 50,000,000 rank and file computer  users.   Plus,
it's a hell of a good read.

One  company  plans  on  releasing  a  chapter  every  few   days
throughout its E-Mail system as a combination of security  aware-
ness  and employee 'perc'.  Try it; it works and  your  employees
will  appreciate it.  Why?  Because they'll all talk about  it  -
bringing security awareness to the forefront of discussion.

FEES

Distribution for up to 100 people on a single network:  $   500
     (Includes 1 Year subscription to "Security Insider Report.")

Distribution for up to 1000 people on a single network: $  3000
     (Includes  10  1  Year subscriptions  to  "Security  Insider
     Report.")

Distribution for up to 2500 people on a single network: $  6250
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for up to 5000 people on a single network: $  10000
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for up to 10000 people on a single network: $ 15000
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for up to 25000 people on a single network: $ 25000
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for more than that - Please call and we'll figure it
out.   Would  you like us to coordinate  a  special  distribution
program  for you?  Would you like in Postscript or  other  visual
formats?  Give us a call and we'll see what we can do.

                       * * * * * * * * * *
     Please  DO NOT UPLOAD AND DISTRIBUTE  "Terminal  Compromise"
     into  your networks unless you intend on paying  the  recom-
     mended fees.

                       * * * * * * * * * *


NOVEL-ON-THE-NET SHAREWARE Fees for Universities:  FREE!

"Terminal Compromise" has been used by many schools and universi-
ties  as a teaching supplement.  Recognized Educational  institu-
tions  are entitled to use "Terminal Compromise" at NO  COST,  as
long  as you register with us that you are doing so. Please  pro-
vide: School name, address, etc., the course, the instructor, and
the  reason for using it.  Also, we'd like to hear from  you  and
tell us how it went. Thanks.


SHAREWARE-NOVEL Fees for Local, State and Federal Governments.

     You have the money.  :-)  Please send some back by following
     the same fee guidelines as those for businesses.

     Government  employees:  You are The People - same  fees  are
     appreciated.

                       * * * * * * * * * *

     Agencies: Do not upload and distribute "Terminal Compromise"
     unless you plan on paying the fees.

                      * * * * * * * * * * *


NOVEL-ON-THE-NET SHAREWARE Fees for the International Community
     Make payments in $US, please.

GETTING TERMINAL COMPROMISE:

     You  can get your copy of Terminal Compromise from a lot  of
sites; if you don't see it, just ask around.  Currently the novel is
archived at the following sites:

                  ftp.netsys.com
                  /pub/novel

                  wuarchive.wustl.edu
                  /doc/misc

                  soda.berkeley.edu
                  /pub/novel

It  consists of either 2 or 5 files, depending upon how  you  re-
ceive it. (Details at end of this file.)

Feel  free to post all five files of "Terminal  Compromise"  any-
where  on the net or on public or private BBS's as long  as  this
file accompanies it as well.


Please forward all NOVEL-ON-THE-NET SHAREWARE fees to:

     INTER.PACT PRESS
     11511 Pine St. N.
     Seminole, FL., 34642

Communications:

     Phn: 813-393-6600
     Fax: 813-393-6361
     E-Mail: [email protected]
             [email protected]

We will accept checks, money orders, and cash if you must, and we
mean  if you must.  It's not the smartest thing in the  world  to
send  cash through the mail.  We are NOT equipped at  this  point
for credit cards.

Remember, "Terminal Compromise is copyrighted, and we will vigor-
ously pursue violations of that copyright.  (Lawyers made us  say
it again.)

If you ABSOLUTELY LOVE "Terminal Compromise," or find that  after
50 pages of On-Screen reading, you may want a hard copy for  your
bookshelf.   It  is  available  from  bookstores  nationwide  for
$19.95,  or from Inter.Pact directly for $19.95 + $3.50  shipping
and handling.  If you first paid the $ 7 NOVEL-ON-THE-NET  SHARE-
WARE  fee, send in proof and we'll deduct $ 7 from the  price  of
the hard copy edition.

ISBN: 0-962-87000-5

Enjoy "Terminal Compromise" and help us make it an easy  decision
to put more books on the Global Network.

Thank you in advance for your attention and your consideration.



The Publishers,
INTER.PACT Press



               READING "TERMINAL COMPROMISE"

"Terminal Compromise" will come to you in one of two ways:

1)  Original Distribution Format From Inter.Pact  Press  contains
only two -2- files.

          TC_READ.ME     13,927 Bytes

That is this file you  are now reading and  gives an overview of
"Terminal  Compromise" and how NOVEL-ON-THE-NET Shareware works.

          TERMCOMP.ZIP   605,821 Bytes

This is the total content of "Terminal Compromise".  Run  PKUNZIP
to expand the file into four -4- readable ASCII files.

2)   Some locations may choose to post "Terminal  Compromise"  in
readable  ASCII form.  There will then be four files in  addition
to the TC_READ.ME file.

          TERMCOMP.1     250,213 Bytes

contains the Introduction and Chapters 1 through 5.

          TERMCOMP.2     337,257 Bytes

contains Chapters 6 through 14.

          TERMCOMP.3     363,615 Bytes

contains Chapters 15 through 21.

          TERMCOMP.4     388,515 Bytes

contains Chapters 22 through 30 and the Epilogue.


     Enjoy "Terminal Compromise!" and pass it on to whomever  you
     think would enjoy it, too!

     Thank You!

****************************************************************************

THE STATE OF SECURITY IN CYBERSPACE

SRI International conducted a worldwide study in 1992 of a broad range of
security issues in "cyberspace."  In brief, cyberspace is the full set of
public and private communications networks in the United States and elsewhere,
including telephone or public switched telephone networks (PSTNs), packet data
networks (PDNs) of various kinds, pure computer networks, including the
Internet, and wireless communications systems, such as the cellular telephone
system.  We did not address security vulnerabilities associated with
classified, secure communications networks used by and for governments.

The study was conducted as part of our ongoing research into the
vulnerabilities of various software components of cyberspace.  Our approach was
to conduct research through field interviews with a broad range of experts,
including people we characterize as "good hackers," about security issues and
vulnerabilities of cyberspace and the activities of the international
"malicious hacker" community.

While the specific results of the study are proprietary to SRI, this brief
report summarizes our general conclusions for the many individuals who kindly
participated in our field interviews.  As we indicated during our field
interviews, the original research for this project was not part of any other
kind of investigation, and we have not revealed the identify of any of our
respondents.

The study aimed to understand "malicious hackers," that is, people who have and
use the technical knowledge, capability, and motivation to gain unauthorized
access, for various reasons, to systems in cyberspace.  It is important to
understand that by no means all hackers are malicious nor does most hacking
involve unauthorized access to cyberspace systems; indeed, only a small
fraction of computer hacking involves such activities but gives hacking an
otherwise undeserved bad reputation.  While we attempted to focus on technical
(software) vulnerabilities, our interviews led us to look more at the broader
motivations and different approaches to cracking into various networks and
networked systems.

MAIN CONCLUSIONS

Our main conclusion is that social, organizational, and technological factors
still combine in ways that make much of cyberspace relatively vulnerable to
unauthorized access.  The degree of vulnerability varies from one type of
communications system to another.  In general, the PSTN is the least vulnerable
system, the PDNs are somewhat more vulnerable than the PSTN, the Internet is
relatively insecure, and as is widely known, the cellular phone system is the
most vulnerable of the four major areas we addressed.

The main vulnerabilities in most communications networks involves procedural,
administrative, and human weaknesses, rather than purely technical
vulnerabilities of network management, control systems, and hardware, and
software.  There are technical vulnerabilities--poor system design and specific
security flaws in software--but they are mainly exploitable because of the
above problems.

Highlights of the study's conclusions include:

o Malicious attacks on most networks and networked systems cannot be completely
prevented, now or in the future.  More than enough information is publicly
available to hackers and other technically-literate people to preclude attempts
at prevention of intrusions.

o It is possible individuals or groups could bring down individual systems or
related groups of systems, on purpose or by accident.  However, security is
generally improving as a result of dealing with past threats and challenges to
system security.  For instance, responses to the most recent serious threat to
the Internet, the so-called Internet Worm in 1989, included improved security
at sites vulnerable to this sort of worm.

o We found no evidence that the current generation of U.S. hackers is
attempting to sabotage entire networks.  On the contrary, doing so is
inconsistent with the stated ethics and values of the hacker community, which
are to explore cyberspace as a purely intellectual exercise without malicious
intent or behavior.  Some individuals who operate outside this informal ethical
framework, however, can and do damage specific systems and occasionally use
systems for personal gain or vindictive activities.

o There is some evidence that the newest generations of hackers, may be more
motivated by personal gain than the traditional ethic of sheer curiosity.  This
development could mean that networks and networked systems could become more
likely targets for attacks by hardened criminals  or governments' intelligence
services or their contractors (i.e., employing malicious hackers).  This threat
does not appear to be significant today but is a possible future scenario.

o The four major areas of vulnerability uncovered in our research have little
or nothing to do with specific software vulnerabilities per se.  They relate
more to the ways in which hackers can gain critical information they need in
order to exploit vulnerabilities that exist because of poor systems
administration and maintenance, unpatched "holes" in networks and systems, and
so on.
- The susceptibility of employees of businesses, public organizations, schools,
and other institutions to "social engineering" techniques
- Lax physical and procedural controls
- The widespread availability of non-proprietary and of sensitive and
proprietary information on paper about networks and computer systems
- The existence of "moles," employees of communications and computer firms and
their suppliers who knowingly provide proprietary information to hackers.

o The vulnerabilities caused by shortcomings in software-based access controls
and in hardware-related issues constitute significantly lower levels of risk
than do the four areas discussed above on more secure networks such as the PSTN
and PDNs.  However, on the Internet and similar systems, software-based access
controls (for instance, password systems) constitute significant problems
because of often poor system maintenance and other procedural flaws.

RECOMMENDATIONS

Based on our research, we recommend the following:

1. Protection of organizational information and communications assets should be
improved.  Issues here range from those involving overall security systems to
training employees and customers about maintenance of security on individual
systems, handling and disposition of sensitive printed information, and dealing
with "social engineering."

2. Techniques used to protect physical assets should be improved.  For example,
doors and gates should be locked properly and sensitive documents and equipment
guarded appropriately.

3. Organizations and their employees should be made aware of the existence and
role of moles in facilitating and enabling hacker intrusions, and care taken in
hiring and motivating employees with the mole problem in mind.

4. Software- and hardware-based vulnerabilities should also be addressed as a
matter of course in systems design, installation and maintenance.

5. Organizations concerned with information and communications security should
proactively promote educational programs for students and parents about
appropriate computer and communications use, personal integrity and ethics, and
legitimate career opportunities in the  information  industry, and reward
exemplary skills, proficiency and achievements in programming and ethical
hacking.

6. Laws against malicious hacking should be fairly and justly enforced.

SRI's believes that the results of this study will provide useful information
to both the operators and users of cyberspace, including the hacker community.
We are planning to continue our research in this area during 1993 within the
same framework and conditions (i.e., anonymity of all parties and
organizations) as we conducted the 1992 research.  We invite hackers and others
who are interested in participating in this work through face-to-face,
telephone or email interviews should contact one of the following members of
the SRI project team:

A. J. Bate
SRI International
Phone:  415 859 2206
Fax:  415 859 3154
Email:  [email protected],
             [email protected]

Stuart Hauser
SRI International
Phone:  415 859 5755
Fax:      415 859 3154
Email:   [email protected]

Tom Mandel
SRI International
Phone:  415 859 2365
FAX:  415 859 7544
Email:   [email protected]

*****************************************************************************
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.