mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-06 23:06:26 +02:00
update
This commit is contained in:
149
textfiles.com/magazines/ONESHOTS/hbl.txt
Normal file
149
textfiles.com/magazines/ONESHOTS/hbl.txt
Normal file
@@ -0,0 +1,149 @@
|
||||
|
||||
Houston Blinkie Letter
|
||||
--------------------------------------------------------------------------------dctober 7 American Nihilist Underground Society 1989
|
||||
-------------------------------------------------------------------------------- ssue One Number 1 -------------------------------------------------------------------------------- Welcome
|
||||
-------
|
||||
|
||||
Welcome to all readers of HBL! This is a magazine dedicated to the study and pilfering of the common species of night-time safety flasher, otherwise known as a "blinkie." These ingenious devices have been found all over most American cities and towns, usually near construction. Since they're easy and fun to steal, most ANUS members posess at least one.
|
||||
|
||||
This magazine supports the theft of and distribution of information about blinkies, and we encourage those of you interested in late-night adventure to read on.
|
||||
|
||||
Common Theft/by CC
|
||||
------------------
|
||||
|
||||
The easiest way to get a blinkie is to steal it. In Houston, this is most fun, because (a) Houston cops love beating on kids, and (b) what the hell else can you do in Houston? There are basically three steps to pilfering blinkies: scouting, preparation and theft. The execution of each with attention to detail is necessary, since one slip-up can mean a police shoe in the balls or face. I'll summarize in the following paragraph. For those of you who want more info, read my extensive file on the subject. It's up on some (puke) Houston Apple boards.
|
||||
|
||||
scouting- Take a drive, and look for blinkies in secluded areas with basically a good escape route. Avoid major streets with lots of cars with light bars. Check out the blinkies, too, and make sure they're in fairly good condition. No one wants a looser blinkie. Best places to look are around construction sites or pothole-infested streets. There'll be at least one cache in your area.
|
||||
|
||||
preparation- Get together an alibi for your parents, your tools, clothes, means of transport and blinkie bag. The easiest way is to stay at a friend's house, or to work on a SafeRides project or similar late-night endeavor. Your parents will either trust you, or check up on you and want a phone number. In Houston, finding one is easy, since any number in the 234 exchange is always busy. Your parents will never figure it out. Your tools may vary, depending on the blinkie type(s) and area. Clothes are easy: shorts/jeans depending on weather, a dark polo or concert shirt and good shoes, such as battered sneakers but not something obvious like combat boots. No camo. Find yourself some means of transportation, like your own car (easy) or a friend who also suffers (?) from kleptomania. Also, pick up a blinkie bag, such as a canvas sack or thick backpack on your way out.
|
||||
|
||||
theft- Go late at night, and park your car nearby. Jump out, turn off and unscrew the blinkies, and lay them in a safe spot. Collect them in your blinkie bag, and sprint back to your car. The whole thing should take less than fifteen minutes. Move on to next site.
|
||||
|
||||
As you can see, the process is not that hard. Go for it. It's not that dangerous, except that sometimes Houston cops will try to seriously dick you around, rape you if you're drunk, or just kickbox your testicles. The answer is not to go in your car. If they accost you, run. Remember the song: "Over the fence and through the woods to Grandmother's house we go..." Easy.
|
||||
|
||||
Common Tools
|
||||
------------
|
||||
|
||||
There are several types of bolts you must be prepared to deal with.
|
||||
|
||||
Joke Bolt
|
||||
|
||||
This is your common octagonal bolt. A generic socket wrench with a 19 mm / .75 inch cup will easily take off this puppy. Since these bolts are so incredibly lame, the Creators of Blinkies have put little "safe sex" cups around them. Who cares? You socket wrench should easily fit inside it.
|
||||
|
||||
Figure Eight Bolt
|
||||
|
||||
As the name implies, this bolt looks like a figure eight. It appears that a specialized tool is needed for this one, but figure on needle-nose pliers working just as well.
|
||||
|
||||
Penis Bolt
|
||||
|
||||
This bolt has a round, circumcised head with a pentagon cut in the tip. In the middle of this pentagon is a circular protrusion. Beats me what kind of tool get this one, but the bolts suck, and as a result do not tighten completely, and these blinkies can usually be wrestled off in less than two minutes.
|
||||
|
||||
Incredibly Easy Bolt
|
||||
|
||||
This is an octagonal bolt with sheath, usually sticking straight out of the sawhorse the blinkie is on. Give it a good jerk, or just crank it with your hands.
|
||||
|
||||
These bolts are used to secure blinkies to wood or plastic sawhorses, barrels, signs or barricades. Since construction workers have to move them, too, the bolts are usually accessed with a easily-availible tool (at least to construction workers). This fact works for you, since whatever they can get we can make/fake/steal.
|
||||
|
||||
That's it, and good luck! If you need more info, call one of the ANUS boards in Houston when they go back up and we'll be glad to hold a workshop for you!
|
||||
|
||||
Recent runs
|
||||
-----------
|
||||
|
||||
Recent runs by Houston ANUS members or members-in-training netted a total of twenty five blinkies over a two-weekend period. Naturally, this sucks, but since most of us attend seriously evil schools, work has slowed us down a bit.
|
||||
Captain Crapp, Chromatic Death and Royal Flush snagged ten red blinkies in a recent run trying out a new location, and pronounced the area to be "sweet."
|
||||
|
||||
Safe Areas In Houston
|
||||
---------------------
|
||||
|
||||
Memorial Drive from Fondren to Voss- This area is full of beautiful, blue blinkies. Since the people who live here are financially secure in a big way, the city put their best out. The best time to go is three-thirty A.M. to five o'clock, since at this time there are few cars and pig ("police") patrols drop off to infrequent. As you go down Memorial eastbound, select a side street (they're all residential) and park there. Walk along, loosening and turning off blinkies. Then, grab the bag and get 'em all. These blinkies are prime Valdez blues, with Hercules Industrial Strength batteries.
|
||||
|
||||
Voss- Red blinkie city. These aren't in as good shape as the ones on Memorial, but there are plenty of them and many more side streets. Snag them late at night, and don't worry too much about pigs. There are no donut shops in the area. Your easiest way out is the freeway, but Voss also runs straight down to Westheimer.
|
||||
|
||||
Post Oak at I-10- This area is a massive construction project, and has tons of red blinkies. It is almost completely safe, since the construction is an acre triangle surrounded on two sides by freeways. If anyone shines a light in your face, run deep into the construction. There are a plethora of hiding places and you cannot be seen from the road. Turn off your blinkies and you will not get caught. The best time to go is as soon as it gets really dark.
|
||||
|
||||
Tanglewood- This area is off of San Felipe, and has many small, one- or two-blinkie streets. Scout beforehand and be out quick.
|
||||
|
||||
River Oaks- Surprise! This area is undergoing construction for the rich fat cats, and as a result various natures of blinkies are appearing on cheapshit plastic sawhorses. Simply unscrew the cheap plastic flap that secures the blinkie to the sawhorse, and load up your vehicle. The River Oaks Police aren't; they are just security guards. Mud up your license plate and head out there. Be careful, however, since most residents have millions of dollars worth of useless shit (faux art, stereo equipment, dogs, children) stuffed in their mansions, and most are paranoid.
|
||||
|
||||
Other News
|
||||
----------
|
||||
|
||||
Houston's two big construction projects are winding down, but more are soon to come. The beautiful thing about this fact is that the new ones promise to be in decently sleazy neighborhoods where the pigs don't patrol! Remember, no donut shop -- no police protection.
|
||||
|
||||
Definitions
|
||||
-----------
|
||||
|
||||
Over the years, a definite vocabulary has evolved. Here are a few definitions:
|
||||
|
||||
blinkie- small, blinking object found at construction site. Also: Hamster in microwave.
|
||||
|
||||
pig- police officer, peace officer, officer, motherfucker, dickweed, protector, jackoff...whatever you want to call them, this is simply a euphemism for "asshole with a gun and a badge."
|
||||
|
||||
pigmo- police car.
|
||||
|
||||
bingos- lights on top of said car.
|
||||
|
||||
bacon rinds- off-duty "pigs." (see above)
|
||||
|
||||
baco-bits- security guards pretending they're cops.
|
||||
|
||||
dink- citizen who screams at you for stealing blinkies from his yard.
|
||||
|
||||
rent- an older relative who asks you where you're going.
|
||||
|
||||
flick- common hand signal for communicating with "pigs."
|
||||
|
||||
sweetness- an area populated with blinkies or pussy you happen to pick up on the way.
|
||||
|
||||
brew- post-run celebration (libations?).
|
||||
|
||||
blinkie run- the act of stealing one or more blinkies.
|
||||
|
||||
blinkie fuck- getting caught in the act. Bad for college transcripts.
|
||||
|
||||
blinkie bust- getting rained out or caught by parents.
|
||||
|
||||
penis- pre-run pacifer. Insert in mouth if nervous.
|
||||
|
||||
dickweed- person who posts a message following this text file saying, "Oh my god!!!1!!!!11!! Thats stealing!!!!1!!"
|
||||
|
||||
A Little Info About ANUS
|
||||
------------------------
|
||||
|
||||
The American Nihilist Underground Society is an organization dedicated to making the shit life tosses at you more bearable. We're headquartered in Houston, but we plan expansion soon. If interested, find an ANUS member and let him know. We are equal opportunity people: we don't discriminate like some shitheads on the basis of race, sex or religion; instead we discriminate by testicle size, IQ and depravity.
|
||||
|
||||
We're the people who bring you quality entertainment such as TURD, SPOO and BlinkieFest '89. Also, we are a Beatrice company.
|
||||
|
||||
Quote
|
||||
-----
|
||||
|
||||
"I'm on a highway to hell..."
|
||||
-Bon Scott
|
||||
|
||||
"I used to think that only America's Way,
|
||||
Way was right,
|
||||
But now the Holy Dollar rules everybody's lives,
|
||||
Gotta make a million no matter who dies!"
|
||||
--Queensryche
|
||||
|
||||
"If it's not nailed down, it's free."
|
||||
--Captain Crapp
|
||||
|
||||
Conclusion
|
||||
----------
|
||||
|
||||
We've had a lot of fun writing this issue and hope you enjoy reading it as much as that poor clueless shit we tried it out on. You may notice that this article is written in fairly complex language. This practice is to discourage intelligent people out there (hello?) from passing us off as another group of bored tyros with nothing better to do and a busted TV set.
|
||||
|
||||
Look for another issue in the future, but in the mean time, keep on blinkie running, and let us know is any new developments or ideas come up. Thanks.
|
||||
|
||||
|
||||
Authors
|
||||
-------
|
||||
|
||||
Captain Crapp
|
||||
Chromatic Death
|
||||
Royal Flush
|
||||
|
||||
"Have a nice fucking day" -- 10/7/89
|
||||
|
||||
(>
|
73
textfiles.com/magazines/ONESHOTS/hob39.txt
Normal file
73
textfiles.com/magazines/ONESHOTS/hob39.txt
Normal file
@@ -0,0 +1,73 @@
|
||||
...::::....::::::::........::.........:::..
|
||||
| : <20> <20> : ~,~~
|
||||
- (.) - : <20> <20> <20> <20> : /-)(
|
||||
| t-file : <20> Hallucinatory Oyster Burrito <20> : ()=
|
||||
assault : <20> <20> <20> : HOOKA!
|
||||
.:.....:......::::........:::........:::.:.
|
||||
25 October 1994 Issue #39
|
||||
|
||||
|
||||
This is something that appeared on the Necropolis but I thought
|
||||
I'd slip it into an HOB. It is pretty much self-explanatory:
|
||||
|
||||
Date: 1:25 am Mon Mar 28, 1994 Number : 131 of 131
|
||||
From: Sorc Sub : ... jane says
|
||||
To : All Refer #: None
|
||||
Subj: my own poetic contribution BOngHiT: None
|
||||
Stat: Normal Origin : Local
|
||||
|
||||
|
||||
Seeing the recent tide towards poetry and since I've been feeling oh-so-full
|
||||
of boundless creativity, I decided to put pen to paper and produce something
|
||||
that I plan on submitting to _Oakleaves_, the annual GlenOak creative writing
|
||||
fest. Of course it has to do with my suspension and subsequent removal from
|
||||
the debate team. Here it is:
|
||||
|
||||
oxymoron - a word that i'm allowed to use
|
||||
in the glenoak world of don'ts and do's
|
||||
this oakleaves concept i peruse
|
||||
is another proposition where i can lose
|
||||
|
||||
oakleaves, i accept your invite
|
||||
but what am i allowed to think?
|
||||
what am i allowed to write?
|
||||
there can never be creative contemplation
|
||||
when my own personal expression
|
||||
can jeopardize my graduation.
|
||||
|
||||
aesthetic portrayal of my contention
|
||||
is undermined by threats of suspension.
|
||||
instead of thinking about how i should write,
|
||||
i have to decide if my text is all right.
|
||||
|
||||
what provokes the system i buck?
|
||||
how did i violate the code of conduct?
|
||||
what scholastic responsibility did i duck?
|
||||
i think its because i used the word fuck.
|
||||
|
||||
|
||||
Of course, in the version I'm submitting, I've omitted the word fuck but
|
||||
hopefully the rhyme-scheme will illustrate that point.
|
||||
|
||||
|
||||
|
||||
|
||||
`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'
|
||||
Hallucinatory Oyster Burrito
|
||||
An AUFHEBEN Production! support: tyrant: numbah:
|
||||
"Why, I don't know much of The Seinsfrage .. HOB WHQ!.. 216.966.7453
|
||||
anything!" -Eraserhead Radio KAOS ... Moonshadow .. 216.830.4657
|
||||
|
||||
_Submission Policy_: Hallucinatory Oyster Burrito is into subs!
|
||||
If you write something - anything - send it to us and we'll get it
|
||||
to press. For contacting HOB, see below.
|
||||
Want to be a support board for HOB? Download ALL the HOB's and DDE's
|
||||
create a file sig on your board, and let me know. Your BBS will
|
||||
be listed. TO CONTACT US: Call the WHQ (The Seinsfrage) or you
|
||||
can send e-mail to Bogus Nomenclature on Radio KAOS. Internet
|
||||
address is coming soon!
|
||||
`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'
|
||||
|
||||
|
||||
-eof-
|
||||
|
876
textfiles.com/magazines/ONESHOTS/hp-asc.txt
Normal file
876
textfiles.com/magazines/ONESHOTS/hp-asc.txt
Normal file
@@ -0,0 +1,876 @@
|
||||
|
||||
Genghis Khan Presents....
|
||||
|
||||
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> <20> <20> <20>
|
||||
<20> <20> <20> <20>
|
||||
۳ <20> ۳ <20>
|
||||
۳ <20> ۳ <20>
|
||||
۳ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
۳ <20> <20><>
|
||||
۳ <20> <20><>
|
||||
۳ <20> <20><>
|
||||
۳ <20> <20><>
|
||||
۳ <20> <20><><EFBFBD>Ŀ <20><>
|
||||
۳ <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
||||
۳ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20> <20> <20><><EFBFBD> <20>
|
||||
۳ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>۳ <20> <20> ۳ <20>
|
||||
۳ <20> ۳ <20> <20> <20><><EFBFBD> <20>
|
||||
۳ <20> ۳ <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ ۳ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<20>VOLUME 1<> <20> ISSUE 1<> ۳ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ۳ <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ۳ <20>
|
||||
۳ <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ ۳ <20>
|
||||
<20>WRITTEN AND EDITED BY<42> ۳ <20>
|
||||
<20> GENGHIS KHAN <20> ۳ <20>
|
||||
۳ TERM INAL <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
۳ CIRCUIT BREAKER <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
|
||||
|
||||
HP MAGAZINE (C)1991 ALL RIGHTS RESERVED
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>DISCLAIMER<EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
All Information Contained In This File Is Intended For Informational
|
||||
Purposes Only. Any Other Use Of The Information Is the Product Of The Reader.
|
||||
HP Magazine, Genghis Khan, Circuit Breaker, Term Inal, Nor Anyone Else
|
||||
Responsible For The Writing Of This Magazine Condone Hacking, Phreaking, Or
|
||||
Any Other Illegal Activities. Although, This Magazine Is Protected Under The
|
||||
Freedom Of The Press. Information Printed In This Magazine Is Protected By
|
||||
The Constitution. Just A Word Of Advice For Those Intending On Pursuing
|
||||
Material Contained Heirin.
|
||||
|
||||
|
||||
|
||||
-Genghis Khan, Circuit Breaker, Term Inal
|
||||
-HP Staff
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>WHY ANOTHER MAGAZINE?<3F>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
In the underground, there can never be enough magazines.
|
||||
I have read a large majority of them, with the best being
|
||||
Phrack, LOD Technical Journal, and Phun to just name a few.
|
||||
I have also read total flops, magazines that a little kid
|
||||
could write and probably did. My intentions, for this
|
||||
magazine is to cover some of the topics that others magazines
|
||||
have not, in a clear, easy to understand format.
|
||||
I have been in the underground for a while now. I am
|
||||
not new, but no one ever knows everything and I am always
|
||||
open to people's ideas. The underground needs to go through
|
||||
a reform in the 90's. It is really ludicrous that we fight
|
||||
against ourselves when that anger could and SHOULD be
|
||||
directed towards law enforcement. If people spent the time
|
||||
they use fighting amongst themselves, and directed that
|
||||
energy and time to a fruitful cause such as scanning,
|
||||
hacking, or writing text files, the underground would be a
|
||||
much more advanced place.
|
||||
|
||||
|
||||
-Genghis Khan
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>LAW & LEGISLATION<4F>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Due to an increasing amount of law and legislation
|
||||
designed to deter hackers, I will ask that anyone who comes
|
||||
across any new legislation to please send it to us. I would
|
||||
also like to keep tabs on the status of Caller ID. Which
|
||||
states have it? Which states is it pending?
|
||||
It seems as though the government has declared war on
|
||||
the underground. Let's try and stay one step ahead of them.
|
||||
I would also like to hear from anyone who was busted in
|
||||
Operation Sundevil. In a future issue I hope to spotlight
|
||||
that.
|
||||
|
||||
-Genghis Khan
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>IN THE NEWS<57>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
This will probably be your favorite section. If you
|
||||
have been out of the scene for a while, this section will
|
||||
tell you what is going on.
|
||||
I would like to compile a list for H/P, of all the
|
||||
groups in the United States and Canada. The groups must be
|
||||
HP though. I will NOT spotlight warez groups although if
|
||||
your group combines the two then fine. Please include what
|
||||
type of people you are looking for, modem speed,
|
||||
headquarters, NuP, specialtys, etc.
|
||||
I am including in this issue a magazine article that
|
||||
everyone should be interested in about TymNet and Credit
|
||||
Card Fraud. I'll let you make up your mind on it, but
|
||||
some of you had better watch who you are trading with
|
||||
on QSD and Lutzifer.
|
||||
Speaking of TymNet, let's face it. NUI's are pretty
|
||||
scarce. I read an article that said Microwire received a
|
||||
$350,000 fone bill. the T.HONxxx nuis go up and down. If
|
||||
anyone has a NUI hacker I would be VERY interested.
|
||||
I have also included some articles from the book John McAfee
|
||||
wrote titled, "Computer viruses, worms, trojan horses, and
|
||||
other threats to your system", or something like that.
|
||||
If you aren't familiar with John McAfee, he is the one who
|
||||
writes and publishes the SCAN, CLEAN, MDISK type of anti-virus
|
||||
utilities.
|
||||
If anyone has ever dealt with the EFF, (Electronic
|
||||
Frontier Foundation), please send me any information
|
||||
possible. I know that have helped a lot of people and if
|
||||
anyone tries to say anything about this magazine, well first
|
||||
off, they can kiss my ass, second, if it's some 3-letter
|
||||
agency, I would like to be prepared. It is my right by
|
||||
freedom of the press to publish whatever I damn want to. If
|
||||
you have something to say about this magazine or any
|
||||
magazine, you should listen to yourself and then write a
|
||||
better one. Until you do that, you have no room to talk.
|
||||
|
||||
|
||||
-Genghis Khan
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>Computers Feed International Credit Card Fraud<75>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
By Joe Abernathy
|
||||
Houston (Texas) Chronicle
|
||||
May 19, 1991
|
||||
|
||||
|
||||
A new international den of thieves linked by computer may be going to town
|
||||
with your credit card.
|
||||
Stolen credit card and other account information is both currency and
|
||||
commodity in this technological underworld, which is giving rise to the
|
||||
specter of offshore "data havens" outside the ready grasp of the U.S. law.
|
||||
"Once the hackers get some live numbers, they trade," said Jim Steele,
|
||||
Mastercard's director of security for the central United States. "It's a real
|
||||
problem."
|
||||
|
||||
Secret Service Agent Tom Moyle agreed, calling the potential for public
|
||||
harm, "tremendous."
|
||||
|
||||
The new data havens represent a kind of hacker's bazaar, where many
|
||||
participants don't even share a language. But words aren't needed when
|
||||
numbers do the talking.
|
||||
|
||||
In a home near you, a hacker may be staring at a monitor with a list of
|
||||
pseudonyms and nationalities. At the touch of a key he can excahnge purloined
|
||||
credit card information with a comrade in Finland.
|
||||
|
||||
"MasterCard 5424 1800 2674 5624 exp 9/91 Thomas Wright," read one recent
|
||||
message, typical of the lot.
|
||||
|
||||
(The phrase "computer hacker" originally was a characterization proudly
|
||||
claimed by computer hobbyists, with its roots in the hacked together nature of
|
||||
early computer exploration. It is still used in some computer circles, but in
|
||||
the law and popular vernacular it is now usually understood to describe people
|
||||
who gain unauthorized access to computer systems for fraudulent purposes.)
|
||||
|
||||
One overseas gathering point offers over 400 megabytes of software for
|
||||
copying, representing hundreds or thousand of stolen titles.
|
||||
|
||||
Each of the data havens is actually a computer in somebody's home or
|
||||
business. They have names - QSD, Lutzifer - and serve as electronic
|
||||
communities.
|
||||
|
||||
The "citizens" are physically located continents apart, while
|
||||
communicating in an electronic forum that has been convened in a third world
|
||||
country. Calls may even be routed through a fourth nation for additional
|
||||
security, with each step in the process making law enforcement's job more
|
||||
difficult.
|
||||
|
||||
"Try getting Israel to cooperate with an Arab country for an
|
||||
investigation," said one hacker, laughingly describing the logistical
|
||||
nightmare authorities face. "Or go through South Africa and try to get anyone
|
||||
to cooperate with them."
|
||||
|
||||
Authorities must get a search warrant or permission to conduct
|
||||
surveillance at each step in the communications link. And that may not even
|
||||
be possible - not every nation has a legal structure designed to respect
|
||||
credit ratings and intellectual property.
|
||||
Those making use of the data havens are doing so through the commercial
|
||||
communiations network designed specially to link computers around the world.
|
||||
To customers, these networks are known as Telenet, Sprintnet, EasyLink
|
||||
(Southwestern bell) or TymNet; generically, they are called "x.25 networks"
|
||||
for the technical standard describing details of their operation.
|
||||
"Those systems are set up simply as a vehicle to communicate," said Moyle,
|
||||
supervisor at the Secret Service fraud devision. "If you sign up, get an
|
||||
account and pay your monthly bill, you've got very clean data transmission
|
||||
lines and you can talk to a variety of places for a variety of reasons.
|
||||
"You've got business folks using those lines, folks involved in research.
|
||||
That's the legitimate use for them, messaging. You're connecting up to
|
||||
bulletin boards, is all you're doing."
|
||||
Most of those calling the overseas fraud boards via the x.25 networks are
|
||||
stealing air time from service providers and their customers - a fact that has
|
||||
helped attract investigative agencies to the scene. One company had to pay a
|
||||
$350,000 bill recently for hacker phone calls. (GK-That had to be Microwire!)
|
||||
"A lot of the three-letter agencies are there," said Don Murtaugh, chief
|
||||
of security for British Telecom International, the parent of TymNet. "Because
|
||||
we're still pursuing it, you hate to say too much."
|
||||
Using a variety of plays, hackers created user accounts and hacked into
|
||||
accounts of legitimate users. Account names and passwords were passed around
|
||||
for others to use.
|
||||
"Many of the IDs were IDs that customers had and had stopped using or
|
||||
failed to cancel," said Murtaugh, explaining that the customer is liable for
|
||||
the bills run up by using x.25 phone accounts. "If you look at the number of
|
||||
those (stolen accounts) it was in the hundreds. We found ourseles being
|
||||
violated."
|
||||
Murtaugh confirmed that federal agencies making inquiries include the
|
||||
Secret Service, Central Intelligence Agency, FBI and National Security Agency.
|
||||
The CIA, FBI and NSA refused to comment.
|
||||
So many agencies are interested. The Secret Service specializes in fraud
|
||||
investigations, for example, and the CIA worries with external security.
|
||||
The NSA, an ultrasecret agency nominally charged with decrypting
|
||||
intercepted foreign communications, is widely believed in the computer science
|
||||
community to engage in routine monitoring of communications throughout the
|
||||
world's computer networks.
|
||||
"It's a felony to possess 15 or more credit card or telephone access
|
||||
numbers," said Moyle, explaining the law most likely to be invoked for
|
||||
trafficking in access device numbers - the name collectively given to such
|
||||
things as credit card numbers and computer passwords.
|
||||
"Simple possession is a felony, let alone actually using them. If you
|
||||
traffic in or use one or more and the aggregate value of loss is $1,000 of an
|
||||
access number, then that meets the black and white statute also."
|
||||
The only problem with the rule of 15, Steele said, is that it only applies
|
||||
in the United States. The data havens operate overseas.
|
||||
He added that the $1,000 threshold can be reached by one typical
|
||||
merchandise order placed on a stolen credit card number by one computer
|
||||
hacker. And each stolen number may be used repeatedly by any number of
|
||||
hackers over a period of weeks.
|
||||
"It's not like a person was mugged," he said, in which case a stolen card
|
||||
would be canceled quickly, typically taking a maximum hit of only $1,500.
|
||||
"If somebody posts your number on a bulletin board, you're not going to
|
||||
know until the next billing cycle. That's why the significance of the dollar
|
||||
loss can be greater for that kind of crime."
|
||||
Computer hackers have trafficked in credit cards and other access device
|
||||
numbers for as long as there have been hacker bulletin boards. Often, the
|
||||
information they trade in their high-tech haunts comes from a tool as low-tech
|
||||
as "dumpster diving" - rummaging through a store's trash for credit card
|
||||
carbons.
|
||||
Because stolen account numbers are so easy to obtain by these less
|
||||
sophisicated means, hackers are only a part of the overall problem, Steele
|
||||
said. Precisely how much is difficult to measure.
|
||||
Of the $301 million MasterCard lost to fraud in 1990, $26 million occurred
|
||||
through telephone sales, which is the most common technique hacker's emply.
|
||||
"Counterfeiting" of cards, another popular ploy in which a stolen number is
|
||||
usually superimposed over an old card, accounted for $33 million is losses.
|
||||
And, of course, MasterCard is only one credit card company. Visa is
|
||||
nearly twice its size.
|
||||
"There are some real scam artists who use the bulletin boards as a way to
|
||||
get live access devices," said Steele, a former Secret Service agent. "There
|
||||
are others who look at penetrating any system as a challenge - they post some
|
||||
information just to say, hey look, I can do it.
|
||||
"But of course when you post that information, you've got proprietary
|
||||
information that can be financially damaging, military records, things like
|
||||
that."
|
||||
The electronic mail and other documents of at least one Secret Service
|
||||
employee were allegedly compromised by a TymNet hacker. He used an internal
|
||||
network management tool to monitor this agency employee while he was using a
|
||||
computer either at home or one the job.
|
||||
The inspector's office of the Secret Service launched an internal
|
||||
investigation after being informed by the Houston Chronicle of the apparent
|
||||
breach. Inspectors would not comment on the investigation.
|
||||
Information concerning the credit card trafficking and abuse of the x.25
|
||||
networks came to the attention of the Chronicle during a series of telephone
|
||||
conversations and meetings with members of the computer underground in
|
||||
Houston, San Francisco and New York. The information was used to parlay
|
||||
further details from security officials and others.
|
||||
Activities within the data havens were monitored by a reporter online.
|
||||
MasterCard security officials and the issuing institution were alerted to the
|
||||
stolen credit card number printed in this story.
|
||||
"The individuals who are involved in this world, are very bright and very
|
||||
inquiring by nature," said Moyle of the Secret Service. "There's an
|
||||
attraction to dealing with folks in different countries because it provides a
|
||||
different perspective, a different learning base, a different knowledge base
|
||||
to inquire about."
|
||||
"We certainly have no objection to normal sharing or learning. Where they
|
||||
come to our attention and invoke our wrath, if you will, is when they cross
|
||||
over the border - the legal border not the geographic border."
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>THE HACKER PROFILE<4C>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
By John McAfee
|
||||
|
||||
|
||||
The intellectual skills of the hackers invite respect, and most of them would
|
||||
not dream of acting maliciously. But there are many who may be regarded as
|
||||
social misfits because of the dominant role that computers play in their
|
||||
isolated lives. This isolation and inevitable introversion in personality
|
||||
appear particularly prevalent among hackers operating on the dark side, who
|
||||
irresponsibly break into systems for personal gain or to spread viruses. They
|
||||
often shun conventional human contact and tend not to make friends or have
|
||||
social interchanges apart from interaction on electronic bulletin boards.
|
||||
One programmer - call him Joe - was recruited through the National
|
||||
Bulletin Board Society, and he typifies this hacker reclusiveness. Joe
|
||||
stipulated in his contract that he would never meet or discuss his work
|
||||
person-to-person with his client, even by telephone. Joe's programming was
|
||||
extremely elegant and precise, and he could complete even complex tasks within
|
||||
days when average programmers might take weeks. He was obviously a name of
|
||||
extreme intelligence and ability, but he just could not cope with human
|
||||
contact in the conventional sense. However, he relates strongly to computers
|
||||
because, like many hackers, they have become animate things, more satisfactory
|
||||
and dependable in many respect than humans.
|
||||
The complexities of these extreme relationships between hackers and their
|
||||
machines mirror the complexities and intensities to be found in conventional
|
||||
interpersonal relationships. Joe, for example, despite his extreme antisocial
|
||||
attitude, loved computers and would never consider planting a virus that might
|
||||
compromise a system's integrity. Indeed, he was so precise in everything to
|
||||
do with computing that he could not tolerate the fact that the internal clock
|
||||
on one of his client's systems was not absolutely accurate, and he felt
|
||||
compelled to leave his own keyboard to fix it.
|
||||
After another hacker, Kevin Mitnick, was arrested and charged with
|
||||
breaking into Digital Equipment Coporation's system, the Los Angeles Times
|
||||
reported that when the investigator for the Los Angeles County district
|
||||
attorney's office accused him of harming a computer, tears came into his eyes.
|
||||
The investigator, Robert Ewen, described Mitnick as having an umbilical cord
|
||||
from the computer to his soul, becoming a giant when he got behind a keyboard.
|
||||
Hackers with such personalities who spread viruses do not consider
|
||||
themselves to be attacking computers per se, but the people and organizations
|
||||
using them are the ones they perceive to be the real enemies. The potential
|
||||
threat from a reclusive personality obsessed with computing - indeed, addicted
|
||||
to it - when coupled with a real or imagined gradge against big business, the
|
||||
government, or against the computing community establishment as a whole is
|
||||
similar to that of the snipers who take revenge by indiscriminately firing on
|
||||
crowds. A virus give the maverick hacker a powerful weapon against perceived
|
||||
enemies.
|
||||
There are indications from the monitoring of bulletin board activity that
|
||||
some of the lonely hackers are striking up somewhat formalized relationships
|
||||
with other of their kind to develop ever-more potent virus programs. The
|
||||
viruses show a distinct trend toward becoming more malicious, dangerous, and
|
||||
hostile. However, it is still unclear whether the primary perpetrators of the
|
||||
worst viruses are mainly individuals or groups. There are underground hacker
|
||||
organizations that bring together antisocial individuals who pool their skills
|
||||
to create viruses. Such collaboration became a feature of hacking in the late
|
||||
1970s and the early 1980s, before virus programs were being written on any
|
||||
scale and when the prime interest was simply breaking into secure systems.
|
||||
But the main threat at this stage of the virus epidemic still appears to be
|
||||
from individuals hostile to society who work entirely alone, alienated from
|
||||
direct contact with others, who write viruses as an extension of the hacking
|
||||
activites that form their substitue for conventional social intercourse.
|
||||
These lone hackers are almost impossible to identify.
|
||||
There is a schism opening up between different types of hackers as a "good
|
||||
guy versus bad guys" situation develops. The malicious hackers find it
|
||||
creative and exciting to write viruses and to spread them; however, others are
|
||||
finding it even more stimulating to try to thwart their evil intentions. It
|
||||
is becoming thrust and parry as the virus writers come up with new techniques
|
||||
and the "good hackers" counter with ways to combat them. Increasingly, the
|
||||
good guys are counterattacking, making preemptive strikes with programs
|
||||
containing protection features that anticipate the next phase of virus
|
||||
offensives.
|
||||
Generally, hackers do not fit into any of the traditional social grouping
|
||||
or psychological stereotypes, which make it difficult for the security
|
||||
specialists, for whom they have become serious adversaries, to understand they
|
||||
motivations. Hacking is not just a hobby or area of interest, but often
|
||||
becomes a dominant lifestyle to which its participants make a strong
|
||||
commitment. Many spend all night, alone at their computer, devising fiendish
|
||||
programs and trying to break into other people's systems. Their activities
|
||||
seem incomprehensible to those not fascinated by computers or who simply use
|
||||
them as the tools of their trades.
|
||||
Hacking is now so widespread that there is a hacker in nearly every
|
||||
neighborhood. A seemingly innocent teenager, who appears to be working late
|
||||
on a school project while the rest of the family is watching television or has
|
||||
gone to bed, may well be creating a malicious virus program and trying to run
|
||||
it in a system at IBM, General Motors, or the Pentagon.
|
||||
Hacking is predominantly a male activity which parallels intellectually
|
||||
the physical excitement of big game hunting - tracking a quarry, pursuing it
|
||||
until it is cornered and then - with the virus a new and powerful weapon -
|
||||
making a kill. The main difference in the electronic expression of basic
|
||||
hunting urges is that one has much more control of the odds, and losing out to
|
||||
an adversay involves little physical risk. As with video games, a player can
|
||||
be zapped out, yet immediately rise to do battle again. There is a merging of
|
||||
fantasy and reality, typified by the macho pseudonyms that some hackers adopt
|
||||
through bulletin boards. Mitnick, for example, called himself Condor, after
|
||||
the title role played by Robert Redford in the movie Three Days of the Condor,
|
||||
a character that symbolized the isolated loner fighting a corrupt political
|
||||
establishment. James Bond and his 007 "licensed to kill" status frequently
|
||||
crop up in aliases; Mitnick allegedly used Bondian pseudonyms for one of his
|
||||
hacked telephone accounts.
|
||||
What really sets hackers apart is their joy in the process of computing,
|
||||
reported Harvard University sociologist and psychologist Dr. Sherry Tuckle
|
||||
after studying the hacking phenomenon at the Massachusetts Institute of
|
||||
Technology. She wrote perceptively about it in her book The Second Self -
|
||||
Computers and the Human Spirit.
|
||||
"Though hackers would deny that theirs is a macho culture, the
|
||||
preoccupation with winning and subjecting oneself to increasingly violent test
|
||||
smakes their world peculiarly unfriendly to women," she wrote. "There is,
|
||||
too, a flight from relationship with people to relationship with the machine -
|
||||
a defensive maneuvre more common to men than to women."
|
||||
Dr. Turkle found that the MIT hackers engaged in what they called "sport
|
||||
death," finding in computer programming an addiction to control similar to
|
||||
that found among some racing drivers and test pilots. In each case, the
|
||||
participants push their resources beyond what seems possible, with the hackers
|
||||
concentrating on giving themselves ever more demanding mental, rather than
|
||||
phsycial, challenges. This is why viruses are so facinating to them - and why
|
||||
the hackers must be understood better as adversaries by those wishing to
|
||||
protect their systems from invasion. The hackers' motiviation for
|
||||
manipulating other people's systems is usually very different from the
|
||||
motivations for personal gain or revenge involved in other computer crimes.
|
||||
"It is a culture of people who have grown up thinking of themselves as
|
||||
different, apart, and who have a commitment to what one hacker described as
|
||||
'an ethic of total toleration for anything that in the real world would be
|
||||
considered strange'," Dr. Turkle wrote. "The people who want to impost rules,
|
||||
the inhabitants of the 'real world,' are devalued, as is the 'straight'
|
||||
computer science community . . . . The hackers have to keep changing and
|
||||
improving the system. They have built a cult of prowness that defines itself
|
||||
in terms of winning over ever-more complex systems."
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>SCANNING<EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Of the many things I have done. Scanning has to be one of the more
|
||||
lucrative things to do. With everything you can find when scanning, it is
|
||||
hard to believe that ANYONE would not scan. Someday, I'll have to publish a
|
||||
fone book of scans..ehhee. Joke maybe, but, we'll see. I would like to get a
|
||||
scanning group together to scan directly for HP magazine. If there is anyone
|
||||
who would like to be in my scanning group, contact me.
|
||||
The below scans are for the 1.800.444.xxxx prefix. I jumped around a
|
||||
little bit, but should have TONS more scans by the next issue. This should
|
||||
last you a little why though...
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Scans for 800.444.xxxx<78><78><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ
|
||||
<EFBFBD> 0000 VMB <20>
|
||||
<EFBFBD> 0003 VMB <20>
|
||||
<EFBFBD> 0005 VMB <20>
|
||||
<EFBFBD> 0029 MESSAGE CENTER VMB <20>
|
||||
<EFBFBD> 0048 VMB <20>
|
||||
<EFBFBD> 0050 VMB <20>
|
||||
<EFBFBD> 0060 DIVERTER? MAYBE D.D. VMB <20>
|
||||
<EFBFBD> 0063 WEIRD RING THEN BUSY <20>
|
||||
<EFBFBD> 0071 VMB <20>
|
||||
<EFBFBD> 0073 WEIRD RING THEN BUSY <20>
|
||||
<EFBFBD> 0075 WEIRD <20>
|
||||
<EFBFBD> 0078 DIAL TONE <20>
|
||||
<EFBFBD> 0081 VMB (Audix) <20>
|
||||
<EFBFBD> 0083 VMB <20>
|
||||
<EFBFBD> 0084 FONMAIL VMB <20>
|
||||
<EFBFBD> 0088 VMB <20>
|
||||
<EFBFBD> 0089 FAX <20>
|
||||
<EFBFBD> 0091 WEIRD RING THEN BUSY <20>
|
||||
<EFBFBD> 0096 ASK FOR AN OUTSIDE LINE <20>
|
||||
<EFBFBD> 0100 VMB <20>
|
||||
<EFBFBD> 0106 VMB <20>
|
||||
<EFBFBD> 0107 VMB <20>
|
||||
<EFBFBD> 0112 CARRIER <20>
|
||||
<EFBFBD> 0118 WEIRD RING THEN BUSY <20>
|
||||
<EFBFBD> 0119 WEIRD RING THEN BUSY <20>
|
||||
<EFBFBD> 0112 WEIRD RING THEN BUSY <20>
|
||||
<EFBFBD> 0123 VMB?? <20>
|
||||
<EFBFBD> 0141 FONMAIL <20>
|
||||
<EFBFBD> 0143 VMB?? <20>
|
||||
<EFBFBD> 0144 DIAL TONE (CODE<44>6079) <20>
|
||||
<EFBFBD> 0155 WEIRD RING THEN BUSY <20>
|
||||
<EFBFBD> 0171 FAX <20>
|
||||
<EFBFBD> 0182 DIAL TONE <20>
|
||||
<EFBFBD> 0202 DIVERTER <20>
|
||||
<EFBFBD> 0210 DIRECT DIAL VMB <20>
|
||||
<EFBFBD> 0219 FAX <20>
|
||||
<EFBFBD> 0223 VMB <20>
|
||||
<EFBFBD> 0231 VMB <20>
|
||||
<EFBFBD> 0240 CARRIER <20>
|
||||
<EFBFBD> 0242 AFTER HOURS VMB <20>
|
||||
<EFBFBD> 0273 FAX <20>
|
||||
<EFBFBD> 0274 VMB <20>
|
||||
<EFBFBD> 0275 DIRECT DIAL VMB <20>
|
||||
<EFBFBD> 0279 VMB <20>
|
||||
<EFBFBD> 0507 CARRIER <20>
|
||||
<EFBFBD> 0511 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0520 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0523 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0534 AUTHORIZATION CODE FAILURE <20>
|
||||
<EFBFBD> 0539 FAX <20>
|
||||
<EFBFBD> 0547 EXTENDER <20>
|
||||
<EFBFBD> 0549 EXTENDER <20>
|
||||
<EFBFBD> 0553 EXTENDER <20>
|
||||
<EFBFBD> 0560 VMB <20>
|
||||
<EFBFBD> 0567 VMB <20>
|
||||
<EFBFBD> 0607 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0608 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0609 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0615 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0617 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0618 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0624 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0625 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0626 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0627 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0628 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0630 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0631 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0633 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0635 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0636 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0638 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0646 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0649 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0653 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0654 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0655 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0656 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0658 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0660 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0662 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0668 CREDIT CARD CHECKER <20>
|
||||
<EFBFBD> 0678 CREDIT CARD CHECKER <20>
|
||||
<EFBFBD> 0684 VMB <20>
|
||||
<EFBFBD> 0693 VMB <20>
|
||||
<EFBFBD> 0709 FAX <20>
|
||||
<EFBFBD> 0712 MCI CODE <20>
|
||||
<EFBFBD> 0720 MCI <20>
|
||||
<EFBFBD> 0722 MCI <20>
|
||||
<EFBFBD> 0723 MCI <20>
|
||||
<EFBFBD> 0731 MCI <20>
|
||||
<EFBFBD> 0744 MCI SECURITY <20>
|
||||
<EFBFBD> 0747 EXTENDER <20>
|
||||
<EFBFBD> 0748 EXTENDER <20>
|
||||
<EFBFBD> 0751 WEIRD TONE <20>
|
||||
<EFBFBD> 0787 WEIRD BELLS(Extender) <20>
|
||||
<EFBFBD> 0797 FAX <20>
|
||||
<EFBFBD> 0803 FAX <20>
|
||||
<EFBFBD> 0806 EXTENDER <20>
|
||||
<EFBFBD> 0809 LOVE CONNECTION <20>
|
||||
<EFBFBD> 0815 RINGS THEN BUSY <20>
|
||||
<EFBFBD> 0816 EXTENDER <20>
|
||||
<EFBFBD> 0817 VMB <20>
|
||||
<EFBFBD> 0830 WEIRD BEEPS <20>
|
||||
<EFBFBD> 1503 DIVERTER <20>
|
||||
<EFBFBD> 1510 ANSWERING MACHINE <20>
|
||||
<EFBFBD> 1511 VMB (LIMO SERVICE) <20>
|
||||
<EFBFBD> 1513 WEIRD BEEPS <20>
|
||||
<EFBFBD> 1514 VMB <20>
|
||||
<EFBFBD> 1521 VMB <20>
|
||||
<EFBFBD> 1534 AUTHORIZATION CODE FAILURE <20>
|
||||
<EFBFBD> 1539 CELLULAR FONE? <20>
|
||||
<EFBFBD> 1543 VMB (12 HOUR) <20>
|
||||
<EFBFBD> 1546 VMB <20>
|
||||
<EFBFBD> 1553 VMB <20>
|
||||
<EFBFBD> 1563 AUTHORIZATION CODE FAILURE <20>
|
||||
<EFBFBD> 1571 WEIRD <20>
|
||||
<EFBFBD> 1575 AUTHORIZATION CODE FAILURE <20>
|
||||
<EFBFBD> 1579 VMB <20>
|
||||
<EFBFBD> 1583 CARRIER <20>
|
||||
<EFBFBD> 1585 WILLOW PERIPHERALS? <20>
|
||||
<EFBFBD> 1587 FONMAIL VMB <20>
|
||||
<EFBFBD> 1588 FONMAIL <20>
|
||||
<EFBFBD> 1592 ANSWERING MACHINE-HACKABLE <20>
|
||||
<EFBFBD> 1596 FAX? <20>
|
||||
<EFBFBD> 1599 FAX <20>
|
||||
<EFBFBD> 1602 VMB <20>
|
||||
<EFBFBD> 1608 AUTHORIZATION CODE FAILURE <20>
|
||||
<EFBFBD> 1613 VMB <20>
|
||||
<EFBFBD> 1615 STRANGE RING <20>
|
||||
<EFBFBD> 1621 DIAL TONE <20>
|
||||
<EFBFBD> 1634 AUTHORIZATION CODE FAILURE <20>
|
||||
<EFBFBD> 1635 VMB <20>
|
||||
<EFBFBD> 1636 VMB <20>
|
||||
<EFBFBD> 1642 ANSWERING MACHINE <20>
|
||||
<EFBFBD> 1645 FAST BUSY <20>
|
||||
<EFBFBD> 1646 FAST BUSY <20>
|
||||
<EFBFBD> 1654 VMB <20>
|
||||
<EFBFBD> 1673 FAST BUSY <20>
|
||||
<EFBFBD> 1674 VMB <20>
|
||||
<EFBFBD> 1679 FAX <20>
|
||||
<EFBFBD> 1690 DIAL TONE <20>
|
||||
<EFBFBD> 1701 DIAL TONE <20>
|
||||
<EFBFBD> 1705 FAST BUSY <20>
|
||||
<EFBFBD> 1720 VMB (MESSAGE CENTER) <20>
|
||||
<EFBFBD> 1723 FAST BUSY <20>
|
||||
<EFBFBD> 1726 FAX <20>
|
||||
<EFBFBD> 1729 VMB <20>
|
||||
<EFBFBD> 1730 FAST BUSY <20>
|
||||
<EFBFBD> 1731 FAST BUSY <20>
|
||||
<EFBFBD> 1737 FAST BUSY <20>
|
||||
<EFBFBD> 1738 STRANGE VMB <20>
|
||||
<EFBFBD> 1739 FAST BUSY <20>
|
||||
<EFBFBD> 1748 DIAL TONE <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Here is a handy printout to use when scanning.
|
||||
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
cut here \<5C>/
|
||||
-----------------------------------------------------------------------------
|
||||
|
||||
-----------------------------------------------------------------------------
|
||||
| Scan Sheet for Prefix _____ (C)1991 HP Magazine |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
| | | | |
|
||||
-----------------------------------------------------------------------------
|
||||
|
||||
-----------------------------------------------------------------------------
|
||||
cut here /|\
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>|
|
||||
The smallest block on the left is for the 4 digits at the end of the
|
||||
prefix..here's an example
|
||||
-----------------------------------------------------------------------------
|
||||
| 1602 | vmb | 1750 | Dial Tone |
|
||||
-----------------------------------------------------------------------------
|
||||
That's a pretty easy way of keeping track of everything.
|
||||
|
||||
Genghis Khan
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>LOOZER LIST<53>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
There have arisen in the Underground and the entire Computer world as a whole,
|
||||
a group of people, that I can not think of much more of a name for them. The
|
||||
simplest thing to call them, are LOOZERS. I have already recieved threats of
|
||||
lawsuits and the sort for posting peoples name in the loozer list. But, I am
|
||||
not telling anyone to do anything. It is your choice what you do. I am
|
||||
mearly spotlighting those few people, who well, make it tough for all of us to
|
||||
go forward. And of everything, I am mearly stating facts. Home addresses,
|
||||
fone numbers, entire names, bulletin boards, and what they do. There is NO
|
||||
law against that, and if you have something to say about it, say it. I'm
|
||||
ready.
|
||||
|
||||
Allen Lee
|
||||
116 Spinning Rd
|
||||
Dayton Ohio 45414
|
||||
Our Place BBS - 513-252-1928 - 24oo
|
||||
Distrubutes McAfee Anti-Virus Files and Tracks Down Hackers.
|
||||
Running WildCat 2.55n
|
||||
|
||||
|
||||
Joeseph Caplinger
|
||||
J&Js BBS Node 1 - 513-236-4788 - 24oo
|
||||
J&Js BBS Node 2 - 513-236-3087 - 24oo
|
||||
J&Js BBS Node 3 - 513-236-1229 - 96oo
|
||||
Locked Many of the Underground Out of the BBS for stating an opinion
|
||||
My what a democracy we live in..
|
||||
Running WildCat 3.0
|
||||
|
||||
|
||||
Marc Younkin
|
||||
Yorktown BBS - 513-434-8024 - 24oo
|
||||
TransAmiga
|
||||
Stated he was out to take down the entire IBM underground.
|
||||
Captures and other data have been recovered from his board
|
||||
that make this statement true.
|
||||
|
||||
|
||||
Joey Evans
|
||||
Blazing BBS <20> 513-878-6014
|
||||
SuperBBS
|
||||
This guy (?) is accused of turning classified underground information to
|
||||
certain Public Doman Sysops including Allen Lee. Was in the underground for a
|
||||
short time. Believes himself to be the best hacker in the world. Has a habit
|
||||
of thinking he is superior to the rest of the world. Very Obnoxious.
|
||||
|
||||
|
||||
|
||||
That ends the list of loozers. I hope to make this section a LOT bigger
|
||||
in the next issue. Keep the names and numbers coming. What you do to these
|
||||
people/boards is strictly a product of you. The writer/s and or editors of HP
|
||||
magazine take no responsibility for any actions taken. Please read the
|
||||
beginning disclaimer for further information
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20>QUICK NOTES<45>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
Spicoli was busted. Answers are vague. Information is being held until
|
||||
either a court case or questioning comes. What Spicoli was busted on is still
|
||||
a mystery. Hopefully, we will soon know what it was. I warn all to stay away
|
||||
from the bridges that Spicoli was calling. If you know what I'm talking
|
||||
about, you know what to do.
|
||||
|
||||
-Genghis Khan
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
I have talked to two people now that have been called or visited because of
|
||||
hacking 748-9200. Just a warning.
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
Do not call the 713 CBI dialup. It is being monitored.
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
It is illegal for anyone, including government agencies to put a tap on your
|
||||
line. If you think your line is being tapped, call your operator. Then have
|
||||
her connect you to repair service. Tell them you think you are being tapped
|
||||
and that you would like to have the line checked. They will usually give you
|
||||
the number for that Telco's Security Department. Call them, and they will
|
||||
check out the line for any sort of tap. Then give you the option to press
|
||||
charges, if it can be discovered who is tapping it.
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20>BBS REVIEW?<3F>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Well, I must admit, I did run out of time on this magazine. Therefore my
|
||||
BBS Review and VMB Review will have to wait till next issue. But I will list
|
||||
a few good boards that I can think of right off hand. If I leave you out,
|
||||
which I probably will, please excuse me, and I will try and get you in the
|
||||
next issue.
|
||||
|
||||
Dragon's Keep
|
||||
Home of HP Magazine
|
||||
513.277.6oo6
|
||||
12oo/24oo
|
||||
NuP OPTIONS
|
||||
SysOp-Term Inal aka Dragonlord
|
||||
CoSysOp-Genghis Khan
|
||||
Running Telegard
|
||||
|
||||
I am Co-SysOp on this board, give it a call. I have some innovative ideas
|
||||
in effect on this board including a message base called Phreak Klass. We have
|
||||
had a great response for the Phreak Klass Base and hopefully we are producing
|
||||
some good New Phreakers. Unlike some I have seen recently who think they know
|
||||
everything and don't.
|
||||
|
||||
|
||||
High Voltage
|
||||
513.898.8768
|
||||
12oo/24oo/96oo/14.4/38.4
|
||||
NuP CourierHst
|
||||
SysOp-Circuit Breaker
|
||||
CoSysOp-Genghis Khan
|
||||
|
||||
I also have co-sysop status on this board. More oriented towards the
|
||||
usage part of phreaking and not the fundamentals. Still a good board to call.
|
||||
Message bases galore. But the Circuit Breaker has a past of being a warez
|
||||
d00d. I converted him, and he is now half half. Give it a call. Well worth
|
||||
it. Running Telegard.
|
||||
|
||||
|
||||
Gonzo's Gabanza
|
||||
513.89o.o655
|
||||
12oo/24oo/96oo/14.4/38.4
|
||||
NuP GATE*WAY
|
||||
SysOp-Gonzo Merkazoid
|
||||
|
||||
Pretty good H/P board. Specializes in just about everything. Many files
|
||||
to choose from. Overall, one of the better boards. Running Telegard.
|
||||
|
||||
|
||||
Crow Technologies
|
||||
513.433.861o
|
||||
12oo/24oo
|
||||
NuP CORAL
|
||||
SysOp-Crow Meister
|
||||
|
||||
Specializes in Virii and Trojans. If I can remember right, has at least
|
||||
400 viruses. And I'm sure that is an old count. Getting access is difficult.
|
||||
Easy for me, easy for some. Those who do not know there stuff need not apply.
|
||||
Running TcH 3.0. Very nice board.
|
||||
|
||||
|
||||
These boards are all local to me. If you have something you would like to
|
||||
see in HP Magazine or would like to comment on the mag, please leave you
|
||||
messages on these boards. Thank you.
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20>CONCLUSION<4F>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
|
||||
I feel somewhat bad about the content of this magazine. Being the first
|
||||
issue I hoped to make it great. But I didn't anticipate how long it would
|
||||
take. I am sorry if I let some of you down. The next issue will be much
|
||||
better. Time was ticking down and I had to get this baby out. So, use what's
|
||||
in here while you wait another month, till January 6th, 1992. I will include
|
||||
AT LEAST 2 Interviews/profiles. Scans galore, Complete BBS Review. A VMB
|
||||
Review. More Loozers. More News. Don't miss it.
|
||||
|
||||
And to all who are reading this. Merry Christmas and a Happy New Year to
|
||||
you. Let's make the headlines in 1992.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
-Genghis Khan
|
||||
Editor In Chief
|
||||
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
2485
textfiles.com/magazines/ONESHOTS/hu.txt
Normal file
2485
textfiles.com/magazines/ONESHOTS/hu.txt
Normal file
File diff suppressed because it is too large
Load Diff
3799
textfiles.com/magazines/ONESHOTS/i-diseases-03.txt
Normal file
3799
textfiles.com/magazines/ONESHOTS/i-diseases-03.txt
Normal file
File diff suppressed because it is too large
Load Diff
524
textfiles.com/magazines/ONESHOTS/inhale01.txt
Normal file
524
textfiles.com/magazines/ONESHOTS/inhale01.txt
Normal file
@@ -0,0 +1,524 @@
|
||||
|
||||
|
||||
-------------------------------------------------------------------------------
|
||||
I N H A L E !
|
||||
==============================================================================
|
||||
Issue #1 For the Freedom to Choose Our Choices... Feb '94
|
||||
==============================================================================
|
||||
Introduction:
|
||||
|
||||
Hello! Congratulations for picking up Pekin's first politically
|
||||
(in)correct (depending on how you look at it) publication. We at INHALE!
|
||||
believe that each American should have the right to choose what he or she
|
||||
wishes to do, independantly from another individual. We neither condone or
|
||||
disagree with the use drugs. We agree that violence will change nothing and
|
||||
only education on countless topics will benefit societies around the world.
|
||||
A little introduction is in order; who I am, where I came from, and why
|
||||
I believe in these principles. My name is Greg, and I am twenty years old. My
|
||||
political thoughts started at what I consider to be a young age. I was about
|
||||
twelve, living in a middle class home, with a loving family, and a computer.
|
||||
I have to mention the computer, because this is where my political values
|
||||
emerged.
|
||||
It started one day when (don't you love stories that start that way?) I
|
||||
bought a modem for my computer. A modem is something that translates computer
|
||||
language to sounds that are fed through the phone lines to another computer
|
||||
with a modem. Anyway, I started calling a few other computers (which are
|
||||
called bulletin board systems or BBS for short). The more memorable one was
|
||||
run by a guy called Whirlin' Dervish. He had the best BBS that I had ever
|
||||
called. There were many files that dealt with the anarchist way of life. I
|
||||
would get these files and pour over them for hours, trying to grasp the
|
||||
meaning of what the authors had written. This made me think that there ARE
|
||||
other ways of thinking other than what is socially acceptable.
|
||||
Then there was the military at age seventeen. Thirteen weeks of boot camp
|
||||
and two years in the national guard convinced me that there was definately
|
||||
something wrong with the way the government thinks. It also made me wonder
|
||||
how they could get away with so much waste and misuse of our tax dollars. It
|
||||
just doesn't stop at the military though, as most of us know by the countless
|
||||
times we have heard of scandals, under the table dealing, and general screw
|
||||
ups by our wondrous government system.
|
||||
Ever since these things in my life have happened, I haven't been the same
|
||||
person. For the last four years, I have been refining my logic and my
|
||||
opinions on things, of which you are about to read herein. My principles are
|
||||
constantly being modified through education.
|
||||
This is what we at INHALE! wish to offer you, education. You have a
|
||||
right as an American citizen, to stand up and let your voice be heard. Believe
|
||||
me when I say it does matter when you write your congressmen/woman as it does
|
||||
show that you care about what goes on in this society based country we call
|
||||
America.
|
||||
With that, I can only offer these simple words of advice: Prepare for
|
||||
tommorrow, but live today. Yesterday is history, and tommorrow may never come.
|
||||
==============================================================================
|
||||
To get a one year subscription ! WHAT'S INSIDE THIS ISSUE:
|
||||
to INHALE! send $5 to the address ! Introduction to INHALE!..........pg1
|
||||
below. The hardcopy version looks quite ! Lobbying Agencies................pg2
|
||||
nice and has scanned cartoons, grafix, ! Sphinctor of the Month...........pg3
|
||||
and other cool stuff. You may obtain a ! Freedom Fighter..................pg4
|
||||
sample copy by sending a S.A.S.E. LARGE ! Cease Fire!......................pg5
|
||||
to: INHALE! ! Employee Surveillance............pg6
|
||||
PO Box 1073 ! Political Sellouts...............pg7
|
||||
Pekin, IL 61555-1073 ! Addresses........................pg8
|
||||
------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
------------------------------------------------------------------------------
|
||||
INHALE! #1 FEB '94 Greg S Page 2
|
||||
The ACLU Fights For Your Rights!
|
||||
The American Civil Liberties Union is the nation's foremost advocate of
|
||||
individual rights--litigating, legislating and educating the public on a broad
|
||||
array of issues affecting individual freedom in the United States.
|
||||
The mission of the ACLU is to assure that the Bill of Rights--amendments
|
||||
to the Constitution that guard against unwarranted governmental control--are
|
||||
preserved for each new generation. To understand the ACLU's purpose, it is
|
||||
important to distinguish between the Constitution and the Bill of Rights. The
|
||||
Constitution itself, whose bicentennial we celebrated in 1987, authorizes the
|
||||
government to act. The Bill of Rights limits that authority.
|
||||
What rights are guaranteed in the Bill of Rights?
|
||||
First Amendment rights: These include freedom of speech, association and
|
||||
assembly, freedom of the press, and freedom of religion, including the strict
|
||||
separation between church and state.
|
||||
Equal protection of the law: The right to equal treatment regardless of
|
||||
race, sex, religion, national origin, sexual orientation, age, physical
|
||||
handicap, or other such classification.
|
||||
Due process of law: The right to be treated fairly when facing criminal
|
||||
charges or other serious accusations that can result in such penalties as loss
|
||||
of employment, exclusion from school, denial of housing, or cut-off of
|
||||
benefits.
|
||||
The right to privacy: The right to a guaranteed zone of personal privacy
|
||||
and autonomy which cannot be penetrated by the government or by other
|
||||
institutions, like employers, with substantial influence over an individual's
|
||||
rights.
|
||||
Expanding those protections: Although some segments of our population have
|
||||
traditionally been denied those rights, the ACLU works to extend protection to
|
||||
racial minorities, homsexuals, mental patients, prisoners, soldiers, children
|
||||
in custody of the state, the handicapped, and Native Americans.
|
||||
The ACLU address is on page 8.
|
||||
|
||||
============================================================================
|
||||
Be NORML!
|
||||
NORML, the National Organization for the Reform of Marijuana Laws, demands
|
||||
that marijuana be decriminalized for medical, industrial, and personal uses.
|
||||
NORML lobbies in congress as well as individual politicians for these personal
|
||||
choices.
|
||||
NORML demands that marijuana be available to all those who are in pain,
|
||||
have nausea from drug therapy, have problems controlling seizures, who have had
|
||||
eye surgeries, and many other purposes.
|
||||
The stated purpose of marijuana prohibition is suppression of both use and
|
||||
dissent. Prohibition thrives on division, because a people divided against
|
||||
themselves cannot stand in opposition to tyranny.
|
||||
Resistance to marijuana prohibition must be based on forging coalitions
|
||||
and demonstrating common ground with our fellow citizens.
|
||||
Now entering it's third decade, NORML has been America's leading and most
|
||||
visible opponent of marijuana prohibition.
|
||||
Marijuana prohibition is an expensive failure in which citizens are forced
|
||||
to pay taxes to finance the erosion of their liberty.
|
||||
You can help by joining NORML, and by encouraging others to do the same. A
|
||||
one year membership in NORML is $25, and includes a subscription to the NORML
|
||||
quarterly newspaper. Send your membership dues to:
|
||||
NORML
|
||||
Temple Heights Station
|
||||
P.O. Box 53356
|
||||
Washington, DC 20036
|
||||
Info address is on page 8.
|
||||
-------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
-------------------------------------------------------------------------------
|
||||
INHALE! #1 Feb '94 Greg S Page 3
|
||||
Wilt Does It Again
|
||||
The sphinctor of the month column will feature our personal choice for
|
||||
the person that displays fascism, bungles things beyond the normal realm of
|
||||
bungleness, or just outright displays ignorant behavior.
|
||||
This months choice happens to be a fellow by the name of Jack Wilt.
|
||||
Which on the same token, happens to be the superintendant of dist. 303. As
|
||||
most of us know, he really screwed things up this time.
|
||||
The actual offense is censorship. Mr. Wilt took it upon himself to
|
||||
decide that certain letters to the editor were racial and offensive. What he
|
||||
actually did was far worse than being racist in my opinion.
|
||||
Not only did he violate the reporter's 1st. Amendment by taking away
|
||||
freedom of the press, but also took the rights of the writer away also. I
|
||||
realize that the paper is actually a publication of the school, but tell me
|
||||
what kind of a picture this would make to a young junior who might just be
|
||||
getting into journalism and decided that the school paper might be a good
|
||||
place to start. This could take away that person's chance of ever reporting on
|
||||
what he or she would really want to report on. Essentially, very little, if
|
||||
any, faith in the 1st. Amendment could occur.
|
||||
The way the Pekinois is set up is just like a real newpaper, with an
|
||||
editor in chief and a chain of command. There is an advisor there that is also
|
||||
the journalism teacher. It's set up to be a pretty good simulation of what
|
||||
working on a real paper is supposed to be like. Wilt's choice to pull the
|
||||
paper, displays a real lack of (there are a million words that could be used
|
||||
here) judgement regarding the realism of the school paper experience. Isn't he
|
||||
the one that should be sticking up for the cirriculum of the school?
|
||||
If one was to get techinical about things, one could say that Wilt
|
||||
himself was inflicting racial damage by pulling the paper. The surrounding
|
||||
media snatched the opporutunity to make another racial shot at Pekin. If left
|
||||
alone no one except the people that read the paper would've even known that
|
||||
anything racial had been written. Now, to most people, the situation looks as
|
||||
if Pekin is just as racist as ever, with the superintendant just trying to
|
||||
make the school look like they are cracking down on racism when they've done
|
||||
nothing to actually help releive it.
|
||||
One should keep in mind that this was a letter to the editor. Therefore
|
||||
completely editorial. Everyone knows that an editorial is based on one
|
||||
person's, or the opinion of a group of people. Also, how hard could it have
|
||||
been to just make the editors put a disclaimer at the top of the page, saying
|
||||
something to the effect of: 'The views of writers of a letter to the editor is
|
||||
not the opinion of this school or any other faculty member at this school.' ?
|
||||
A few last comments about this.
|
||||
I was reading the Times the other day, and I did see a letter to the editor
|
||||
from a lawyer for the Peoria chapter of the ACLU. In it, he too saw that
|
||||
pulling the paper was wrong. He too wrote about what kind of example was
|
||||
being set by the superintendant.
|
||||
One final comment. The advisor to the Pekinois, Diana Peckham, should be
|
||||
commended for her part in this fiasco. She gave the students working on the
|
||||
paper the choice to go ahead with putting the articles in or not. Thank you
|
||||
Diana for making the right decision. Too bad there aren't that many more of
|
||||
people like you on the faculty at PCHS.
|
||||
-------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
-------------------------------------------------------------------------------
|
||||
INHALE! #1 Feb '94 Hoffman II Page 4
|
||||
Freedom Fighter Of the Month
|
||||
This is INHALE!'s freedom fighter of the month column. Unlike High
|
||||
Times's freedom fighter, you dont have to go to jail to be in ours, proving
|
||||
that expressing your ideas won't get you behind bars ALL of the time. This
|
||||
month's freedom fighter of the month is Surgeon General Joycelyn Elders, who
|
||||
proposed that legalization of drugs should be studied to reduce violence. She
|
||||
raised several important points, and was quickly rebuffed by the Clinton
|
||||
administration.
|
||||
Elders was right about drug legalization; the war on drugs is a fiasco, a
|
||||
disaster, and does nothing except to make the streets less safe, taxes much
|
||||
higher, and the plight of drug users much worse. In the 1920's and 1930's,
|
||||
alcohol prohibition only led to more gang violence and mobster crime. The
|
||||
gangster era finally ended when prohibition was ended and alcohol became
|
||||
relegalized. We must realize that it's time to legalize marijuana and let
|
||||
people take responsibility for their own actions. It is clear that drug
|
||||
prohibition has resulted in too much violence and the current "war on drugs"
|
||||
has not helped the problem. We should be concentrating on education efforts
|
||||
rather than interdiction. Also, the war on drugs is dangerous in that it
|
||||
"allows" government to seize people's property without a trial by jury. Drug-
|
||||
related seizures have taken place against innocent people who had no drugs.
|
||||
Unfortunately, it looks like not too many people in tho government agree
|
||||
with her. (Suprise) President Bill Clinton pubically rebuffed her suggestion.
|
||||
She did not even propose a plan for the decriminalization of drugs; she merely
|
||||
suggested that drug use be further studied. Yet, the GOP is now calling for
|
||||
her resignation. Bill put his tail between his legs and panicked that Elders
|
||||
would dare raise the issue, even parenthetically. He basically told her that
|
||||
nice girls should be seen (and photographed by the press) and not heard. He
|
||||
may think that she's a nice girl, but don't nice girls have some brains behind
|
||||
their mouth? His behavior was shameful. This is one more sign of a floundering
|
||||
administration.
|
||||
A poll taken seems to show that the Surgeon General is not alone. Out of
|
||||
61,000 respondants, 53% say legalizing drugs might reduce crime. This means
|
||||
that more in this poll sided with Surgeon General Joycelyn Elders' view that
|
||||
legalizing drugs could make America a safer place than with President Clinton,
|
||||
who said the costs would outweigh the benefits. His view was, however, backed
|
||||
by those in his own age group--45 and up. Younger respondents and men and
|
||||
women, as well as respondents from all US regions, are more likely to agree
|
||||
with Dr Elders. I think its time for the younger generation of Americans to
|
||||
take a stand. Only by searching for the truth by ourselves will we be able to
|
||||
escape what is being covered up.
|
||||
This is just one more example of how today's government tries to keep
|
||||
people quiet whenever they challenge what the government has decided is the
|
||||
truth. I chose Surgeon General Joycelyn Elders as Freedom Fighter of the Month
|
||||
because without becoming completely revolutionary, she did what she could to
|
||||
try to change America for the better. I commend her for reccomending drugs to
|
||||
be legalized to reduce violence, and I am shocked at the reaction people had to
|
||||
her ideas. This is proof that it will be up to us to help support movements to
|
||||
get our agenda passed. If you agree with us, that Surgeon General Joycelyn
|
||||
Elders had a great idea, feel free to write her office and tell her you suport
|
||||
her. Her office's address is on page 8.
|
||||
------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
------------------------------------------------------------------------------
|
||||
INHALE! #1 Feb '94 Greg S Page 5
|
||||
A Call To Cease-Fire
|
||||
Here are nine things that could be the key to ending the war on drugs:
|
||||
|
||||
1. Stop talking about winning the drug wars. In the broadest sense,
|
||||
there is no way to win because we cannot make the drugs or their abusers go
|
||||
away. Our goal should be to fashion methods of living peacefully with drugs
|
||||
that create the least possible harm for users and their nonusing neighbors.
|
||||
|
||||
2. Recognize that the line between illegal and legal drugs is a historic
|
||||
accident based primarily upon emotion rather than science. All drugs--including
|
||||
alcohol, heroin, tobbacco, marijuana, and many others--are
|
||||
dangerous. Yet, all can be used by people in nonharmful ways.
|
||||
|
||||
3. Start thinking about drugs and users in new ways. Start thinking
|
||||
drugpeace instead of drug war. Think of users as potentially nice neighbors,
|
||||
not evil criminals intent on robbing you because the drugs they take drive
|
||||
them crazy.
|
||||
|
||||
4. Protect the sick from the ravages of the drug war. If they are ill and
|
||||
suffering from diseases such as cancer or glaucoma, then heroin and marijuana
|
||||
should be made available to them by prescription. If suffering from the
|
||||
disease of addiction, they should have available non-cost rehabilitation
|
||||
programs. If they are injecting addicts, they should be provided with clean
|
||||
needles.
|
||||
|
||||
5. Demand of addicts in return that they live productive and noncriminal
|
||||
lives. Thus the social contract we make will be legal drugs in return for
|
||||
legal, loving lives.
|
||||
|
||||
6. Protect society from the ravages of the drug war--from criminal
|
||||
traffickers, from criminal drug addicts, and from criminal policemen. Large
|
||||
scale, hard drug traffickers should be locked up. The same thing goes for
|
||||
addicts that repeatedly break laws. Policemen who grossly misconduct
|
||||
themselves should be put in prisons and jails with no special treatment
|
||||
letting them out after a short term.
|
||||
|
||||
7. Provide low cost treatment of all kinds as often as needed to
|
||||
addicts. A good network of treatment experts and facilities that meet the
|
||||
individual needs of each addict is also needed.
|
||||
|
||||
8. Trim the criminals out of the drug-treatment business. Many of our
|
||||
leading experts, including prestigious physicians, are abusing and stealing
|
||||
from the public by locking people up needlessly and charging obscene fees.
|
||||
These medical jackals must be controlled and only the best elements must be
|
||||
encouraged to step in and help the addict.
|
||||
|
||||
9. Convince the police that they are among it's saddest victims of the
|
||||
drug war and that they should be in the leadership role of the reform
|
||||
movement. In that role, they can be very effective.
|
||||
------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
------------------------------------------------------------------------------
|
||||
INHALE! #1 Feb '94 Hoffman II Page 6
|
||||
Are You Being Watched?
|
||||
|
||||
"HEY! What about my rights?" you ask. Uhh, guess what--you don't have
|
||||
that many left. After all this talk about the 200th anniversary of the Bill
|
||||
of Rights in 1990, the Fourth Amendment means next to nothing if you have a
|
||||
job in the private employer domain, which is where most Americans work. As
|
||||
soon as you walk through their doors, you're not protected by the Bill of
|
||||
Rights. This means if you find out that they are recording and/or monitoring
|
||||
your phone calls, there is little you can do about it except ask them to
|
||||
stop. This is only possible if you know it's going on, which you probably
|
||||
won't. The increased anxiety on the part of employers concerning substance
|
||||
abuse in the workplace has increased on-the-job surveillance. This can mean
|
||||
anything from monitoring and/or recording phone calls to having undercover
|
||||
cops put in the workplace.
|
||||
A former police detective who now heads a company that deals in
|
||||
undercover operations and drug education, explained to me how it works. "We
|
||||
go in and we evaluate the situation as an independant source," he said.
|
||||
"Management might have recieved anonymous tips, gotten complaints from other
|
||||
employees, or maybe they've found paraphenalia out on the floor and all of a
|
||||
sudden they start seeing increased absenteeism and low productivity hampering
|
||||
the quality of their product. They suspect that something is taking place
|
||||
that they can't see during day-to-day activities. So what we do is provide a
|
||||
credible investigator, who then becomes the eyes and ears of the corporation,
|
||||
recording everything he sees and hears."
|
||||
An American Civil Liberties Union attorney has this to say on the topic
|
||||
of undercover investigation in the workplace: "The practice is becoming more
|
||||
and more common. It harkens back to company spies, Pinkertons, and now
|
||||
in-store detectives. It's very problematic. It's not regulated by the
|
||||
Constitution at all. It's a very dangerous practice and it has the same
|
||||
characteristics as drug testing. Confidences you would share in the workplace
|
||||
are not necessarily ones you would want your employer to overhear, and
|
||||
although they say that they only give the employer drug-related information,
|
||||
there's no way to know."
|
||||
Employees in the public sector (ie: government employees) are better off
|
||||
than private sector employees because supposedly the government has to adhere
|
||||
to the Bill of Rights and people who work for Uncle Sam are therefore
|
||||
protected by the Fourth Amendment. Distressingly, this is changing as the
|
||||
rules are bent in the case of public sector employees who are "responsible for
|
||||
public safety."
|
||||
In two recent cases, the majority court held that urine tests are
|
||||
searches but, in the case of these particular employees (customs guards and
|
||||
railroad workers) testing was allowed without probable cause on the ground
|
||||
that their Fourth Amendment rights were outweighed by the government's
|
||||
interest in maintaining a drug-free workplace.
|
||||
The new bi-partisan bill called the Borne-Hatch Bill is being sold
|
||||
as a new way to regulate lab standards. What it really does is remove any
|
||||
threat of an employer from being sued by an employee in the future. Already,
|
||||
most law suits brought by employees against employers in relation to drug
|
||||
testing have been lost, but some have been won. Removing that small threat of
|
||||
retaliation will only open the flood gates for more random testing.
|
||||
Ultimately, drug testing is being used as an excuse to take away all of
|
||||
our freedoms and create a chemical police state. If you and the people you
|
||||
know don't stop it, who will?
|
||||
Partial credit to High Times June 1990
|
||||
--All rights stolen by Nixon--
|
||||
|
||||
--Writers note:
|
||||
While watching the Dr. Dean Edell show one time, there was a story of a
|
||||
woman being fired from a company because a random drug test showed she had
|
||||
NICOTINE in her blood! The company has an anti-smoking policy which includes
|
||||
smoking at home. They escorted her out the door and fired her.
|
||||
Sad but true.... Big brother is here, just not always in big government
|
||||
but in big business as well.
|
||||
------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
------------------------------------------------------------------------------
|
||||
INHALE! #1 Feb '94 Hoffman II Page 7
|
||||
Have You Sold Your Political Values?
|
||||
|
||||
If you have picked up this newsletter and are still reading it, you have
|
||||
probably, like a bunch of other people, figured out that most of what you have
|
||||
been told your whole life is basically a big pack of lies, brought to you by
|
||||
the joy of government propaganda. Like a crowd of other people, you are ready
|
||||
and willing to reform/rebel against what you are forced to put up with. There
|
||||
is one mistake that you must be careful not to make, some if not most people
|
||||
already have. That mistake is losing sight of what is important, the real goal
|
||||
of achieving change/rebellion.
|
||||
Too many people and groups that want change get caught up in games.
|
||||
Immature people that walk around saying, "I'm an elite anarchist!" and they
|
||||
start insulting and fighting with people that have a slightly different
|
||||
viewpoint is what we're talking about. They then become majorly screwed
|
||||
individuals that don't do anything good because they spend a majority of their
|
||||
time and energy arguing against those on the same side. Instead they should be
|
||||
uniting against the government that has left them with a rotten earth, tries
|
||||
to divide them through lies, and has oppressed them.
|
||||
For the most part it is fairly easy to tell which side a person is on. Do
|
||||
they sit around unaware of what is going on in the world around them? Do they
|
||||
calmly accept that the government is right and set with thier fake morals
|
||||
wrapped around them? Or have they become WILLING FOR CHANGE? It isn't all that
|
||||
HARD to realize that if one is up against the government, fighting against
|
||||
others on the same side is a real pointless and asinine thing to do.
|
||||
Stay out of the ego wars. Join the SCA, the GA, or GreenPeace. There are
|
||||
many groups fighting together for a common cause. Join one of these groups.
|
||||
Remember, that only by uniting, taking refuge among ourselves, and taking
|
||||
advantage of the opporutunity to stand out, not only up, can we make change.
|
||||
We must belong to what we create. We must not make the same mistakes of those
|
||||
in power. We must evolve past that, or we will become yet another regime in
|
||||
power, repeating the failure of what we are supposedly fighting against.
|
||||
Action by the whole, on the whole, will be our only movement for a
|
||||
redeeming revolution. This time must mark the end of this wasted effort
|
||||
brought by many generations of "pass me down politics". We must rebirth and
|
||||
rise anew free of what hinders us if we are to survive.
|
||||
------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
----------------------------------------------------------------------------
|
||||
INHALE! #1 Feb '94 Page 8
|
||||
|
||||
Where to write for info and/or help on many different topics including
|
||||
many of which are covered in this issue.
|
||||
|
||||
American Medical Marijuana Movement The closest NORML Chapter:
|
||||
San Francisco HQ Normal N.O.R.M.L.
|
||||
Dennis Peron--President P.O. Box 441
|
||||
3745 Seventeenth St. Normal, IL 61761
|
||||
San Fransico, CA 94114
|
||||
(415) 864-1961 Illinois Marijuana Initiative
|
||||
P.O. Box 2242
|
||||
The Alliance for Cannabis Thereaputics Darien, IL 60559
|
||||
P.O. Box 21210 (708)859-0499
|
||||
Kalorama Station
|
||||
Washington DC, 20009
|
||||
(202)483-8595 American Civil Liberties Union
|
||||
132 West 43rd St.
|
||||
Family Council on Drug Awareness New York, NY 10036
|
||||
P.O. Box 71093
|
||||
Los Angeles, CA 90071-0093 National NORML HQ
|
||||
(213)288-4152 1001 Connecticut Ave NW
|
||||
Suite 1119
|
||||
Nearest ACLU location Washington, DC 20036
|
||||
ACLU of Illinois (202)483-5500
|
||||
203 North Lasalle
|
||||
Suite 1405 Criminal Justice Policy Foundation
|
||||
Chicago, IL 60601 2000 L St.NW
|
||||
Suite 702
|
||||
The United Campus Coalition Washington, DC 20036
|
||||
P.O.Box 341 (202)835-9075
|
||||
Mill Valley, CA 94942
|
||||
HIV positive, order prepared reg.
|
||||
The Drug Policy Foundation packet for medical marijuana,
|
||||
4801 Massachusetts Ave NW MARS Project $15 donation
|
||||
Suite 400 P.O.Box 21210 requested
|
||||
Washington, DC 20016-2087 Kalorama Station
|
||||
(202)895-1634 Washington, DC 20009
|
||||
|
||||
The Illinois Drug Ethnics Alliance
|
||||
P.O. Box 4205
|
||||
Urbana, IL 61801
|
||||
(217)367-5674
|
||||
|
||||
Where to lobby:
|
||||
|
||||
President Clinton Senator ............
|
||||
1600 Pennsylvania Ave Senate Office Bldg.
|
||||
Washington, DC 20500 Washington, DC 20515
|
||||
|
||||
Representative ............ Lloyd Bentsen Sec. of Treasury
|
||||
U.S. House of Representatives 15th & Pennsylvania Ave NW
|
||||
Washington, DC 20515 Washington, DC 20220
|
||||
|
||||
United Nations Com. on Human Rights Exec Dir. John Healy
|
||||
UN Plaza Amnesty International
|
||||
New York, NY 10017 322 Eighth Ave.
|
||||
New York, NY 10001
|
||||
Donna Shalala (212)807-8400
|
||||
Sec. of H |