   **************
 ** Hootmon,   **- - - - - - - - - - .
  **************       30           /
 /                                 /
/                                 /
Activist Times, Inc. ATI is a
journalistic, causistic, /
   /cyberpolitical      /
  /organization,       /  4 more info?
 /trying to           /  send SASE
/help y'all, and us  /  stamps???
change the world    /    to:
radically, in less /    ATI
than two minute   /     c/o Kelly
increments.      /      BRO Box 94
- - - - - - - - -       Groton, Ct.
                               06340

***Call these awe-fish-y'all ATI bbs's
One Byte             203-444-1597
AT-Tel               812-446-2881
Peacenet. (call 415-923-0900 for info)
autobahn 703-629-4422 at the prompt
type central and at the next select
feedback and request access.
..............................
      .
    a point of view            .
                                .
       from                    .
           cygnus magus       .
..............................
 I would like to introduce myself, you might have wondered who I was, or what
relation I had to ATI. Not much actually, as a friend of Prime anarchist's and
as a fellow telecom weirdo, I saw and helped edit some of the issues (and lose
a few of them to the magical wonder of the disk god, only to be resurected
using the help of the disk sector editor ...Number 9....Number 9.... ).
  I am not politically active, I am not socially active either. I proscribe to
no particular ideology,philosophy, or religion. I simply observe things that I
experience and try to understand them objectively (or subjectively ,depending
on what mood I am in). You will be seeing alot of me in upcoming issues.  I
hope to display pros and cons of differant beliefs. I wish to warn you though,
I have one simple belief.
    1) Its my undying opinion that all
      people can do lots of damage to
      everything, armed with the faith
      that what they are doing is for
      the greater good.

 At first I didn't want this job. But in the end Prime bribed me, drugged me,
and finally convinced me using the help of some girls, a goat, and a vat of
vanilla pudding.
 If you want to send me questions, drugs, marriage proposals, bomb threats
or small furry animals by the name of Fred . Please send them to address
located at front of this file. Please include your name (or reasonable
facsimile) with any question or opinion so I will know who to insult, praise,
or forbid my children from marrying
  "Paradise is exactly like
   where you are right now,
   only much better."
       Cygnus

everyday books
    ----------
an alternative bookshop
(203)423-3474
120 Main St. Willimantic, Ct. 06226

 ONCE AGAIN MY SPACE IS GIVEN AWAY
 TO THE HAPPY HACKER(412)

     Ever call a commercial chat line and hear a rather large number of male
callers revolve around one or two female callers? Ever wonder about maybe one
rather outgoing female on the line and why she was sooo friendly?
     The reason is simple.  Usually in these situations the one outgoing,
slightly seductive female voice you hear belongs to a woman who is paid to
monitor these chat lines, but is also required to double as an actress, to
pretend to be a regular caller on the line, and to coax male callers, through
any methods needed, to stay on the line longer.
    Here, I give you an ATI first. Here I will publish exerpts from an employ-
ees' manual which is distributed to female employees of a chat line company
which operates chat lines all over the US, and abroad.  Read on..

         CHARACHTER PROFILE

ALWAYS choose your opening charachter before opening your key!

Your voice tone and charachter should match.  Don't change names without
changing your voice.If you're working with another monitor, you should listen
for key phrases.  Your charachter profile should be AUTHENTIC.  You should
remember EVERYTHING about your charachter profile.  This includes voice tone,
charachter's description and anything else you may have said about your
charachter to a caller.  We recommend that you keep a notebook of charachters
you play.

   Examples of opening phrases:
1. Hi! My name is Peter Rabbit.         2. What's Happening!
3. Anybody out there? I'm sooooo lonely
4. Hey, Hey, Hey!
5. Help! Help!
6. Yo Baby, Yo Baby, Yo!
7. Hey, What's hoppin'?
8. I'm looking for a new love..
9. Yo! Anybody there?
10. Good Morning!
11. What's it to ya..
12. Helloooooooo..
13. I'm going to sing if you don't talk
to me (then sing if they don't)
14. Hey this is (Your charachter name),
Im looking for (Anybody), what am I
going to do??

    INTERACTING WITH ANOTHER MONITOR

This technique takes concentration. You must key in on certain phrases and
build either toward it, around it, or take it somewhere else.If you change
directions altogether, you must be aggressive.

        Interacting examples:

If you're talking on the line with three men and another monitor enters and
says, "Help, help!", if the callers don't respond, you would say:  "What's
that?  Wait, did you hear that?"

Monitor #1: What's wrong?
Monitor #2: My husband tied me to the bed!
Monitor #1: What! Is he a maniac?
Monitor #2: Yes! I am afraid he is going to kill me!
Monitor #1: Wait a minute, lady. How did you dial here?
Monitor #2: (Crying and sobbing loudly) I dialed with my nose!


WHEN TO TALK EXPLICITLY AND WHEN NOT TO

  Talking seductively requires a certain amount of finesse.  You can talk this
way without ever having to say anything sexual.  There are different techniques
that you can use.  We do not want to come across as telephone whores!
  There are some key phrases that will let you know when and if the client
wants to talk explicitly.

       Seductive Examples:
1. What are you wearing?
2. Are you in bed?
3. Are you alone?
4. Do you like to talk dirty?
5. Do you like sex?
6. What do you do for fun?
7. Are you playing with yourself?
8. What do you like a woman/man to do for you in bed?

   These phrases will help you to know when to talk expilicitly about sex.  If
you start talking seductively and the caller hangs up, when he calls back,
change characters and DON'T talk seductively.  When you do realize that the
caller is seeking that type of conversation, select the appropriate technique.
                                                                              

 WHEN TO AND WHEN NOT TO DISCONNECT A
              CALLER

1. ALWAYS DISCONNECT CHILDREN OFF ALL ADULT LINES without being rude. However,
always mention they should call the TEEN line.
2. If a caller is talking sexually on the TEEN line, disconnect them AFTER
mentioning they should call an adult line.
3.  Do not disconnect callers because you do not like them.  You are being
paid to talk to the clients, not to have personal likes or dislikes for them.
4.  Sometimes hecklers are fun.  They brighten up the lines.  Use your
instincts and common sense, to decide whether it is appropriate at the time.

        Example: Heckler
A person tries to take down a phone number and someone is shouting or singing
while they are trying to do so, or someone is calling a name over and over,
disrupting all conversation.                                             
                                       
                                       
           VOICE QUALITY

   Charachters should be full in every aspect. Practice your voices until they
are perfected.  Concentrate on your voice control, voice tone, pitch, and also
practice changing your pitch from high to low, and your voice tone from soft to
caorseness, if possible.
   For those who have difficulty changing voices, try to think of it as
singing, working with the scale: "Do,  Re, Mi, Fa, So, La, Ti, Do".
   Change your voice any way possible- High, Low, Soft, Loud, Coarse,
Trembling, Squeaky, with accents.....  etc.- ANY WAY YOU LIKE- Just be
different.
                                       
          TRAINING SUMMARY

   At the end of this training program, each monitor should be confident that 
he/she could have any customer calling back as many times as possible.
   You've learned every technique available about how to control your calls to
the point that you know who's calling back and who isn't.  You want EVERYONE to
CALL BACK.
   Monitors who aren't able to get call backs will need to work harder at their
conversation.  Remember, the final goal is to get call backs.  caller not
responding to your conversation quickly enough, get out of that charachter, and
try another.  You are selling a phone conversation, so your sales pitch is very
important.
                                       

         ****END OF TRAINING MANUAL EXERPTS*****

     Neat, huh?  Many of the women you hear on these chat lines are simply
paidto keep men on the line. Paid to feign interest in the callers, paid to
coax male callers into staying on the line and calling back in the future.  And
yes, expected to talk very explicitly and even participate in phone sex and
"domination" routines with the male callers, if the callers request it. 
     In our age of crass commercialism, it's not surprising to see yet another
form of human exchange, like the concept of a simple chat line, become
prostituted in this fashion.
     Ah, the frontiers of free enterprise...                          
                                       
                                             Regards..  The Happy Hacker
                                                                              
+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+++++++++++++++++++++++

new, except that we here at ATI all miss Prime Anarchist very much.

  And also, a few things.  As most of you know, a very well-known hacker by the
handle of Doc Telecom (formerly Laser) got busted in the San Jose area.  It's
uncertain as to what his fate will be, and I'm concerned.

  I'm also concerned about what's going to happen in the hack/phreak world
these days.   With the recent development of the virus that spread through- out
many computers in the nation, it seems that the media's attention will soon be
turned full force on telecom enthusiasts.  It's been rumored that the 804
bridge has been taped and will be broadcasted this week (week ending 11-19-88)
on ABC's show "20/20" as part of a story on hackers/phreakers.  I predict a
negative image will be portrayed, as usual.  This will create a backlash of
even more negative public opinion, and perhaps even more "crackdown" efforts on
the part of the authorities and security personnel.

By the way, it's late Sunday night, and so far I've seen 2 talk shows regarding
computers, mainframes, viruses..and hackers were even mentioned.

In any event, watch "20/20" this week.  Tape it if you can.  Somehow, I get the
feeling that there is truth in this rumor, and I am sure a great deal of
discussion will result.

Opinions?  Comments?  Email me on The Phoenix Project: 512-441-3088.

P.S. If I'm wrong about "20/20", I need a volunteer to help me wipe the egg off
my face.  Heh..

++++++++++++++++++++++++++++++++++++++++

Watch for some really k-rad coming attractions, such as Ground Zero's tour of
the more interesting parts of New York, and information on one of the most
infamous institutions of our great nation.. and the world! (Suspense is killing
you, eh?!)                                       
      ++We want your input!!++

Write to us.   Let us know your comments, and suggestions.  If you have
something to contribute, do send it to us.  Write to the address listed at the
beginning of this file, or email any of us at any of our support boards.  We'd
like to ever print some of your correspondence in future issues.

That's all for ATI30.  Keep in touch, and we'll keep YOU in touch!
Hehehe...
         aaa    ttttttt     iiiii
         a   a      t          i
         aaaaa      t          i
         a   a      t          i     
         a   a      t        iiiii 



     Welcome to ATI31. You might think
our opening logo looks a little
different.   You're right.  We're just
 on a low budget this week.


 "Pray for the dead, but fight like
hell for the living"

   -"Mother Jones", union activist and
all-arond hell raiser.  Date unknown.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$
$                                     
$
$   "Misanthropic Thoughts in Jersey" 
$
$     -By Ground Zero (who else?)     
$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$

     1:20 PM, EST.  I'm sitting in the
employees' lounge, waiting to start my
shift at 1:30.  I tiredly rest my head
in my hands, elbows resting on the
table
cluttered with newspapers.  The 2
Jamaican men who work in the
supermarket's
parking lot returning carraiges are
sitting opposite me. They both just
quietly
smile at me, in silent comprehension
of my tired spirit.  
     Her voice then penetrates other
background noises in the room and
grasps my
attention.  "Yeah, it's like, I get
home and he leaves to go to work. It's
hard", she says, in her loud Jersey
vernacular.  Her voice is biting, and
annoying, just as her words.
     "Yeah, he works as a police
officer.  And we never get to see each
other.
My husband loves his job, and
sometimes when he has the night off he
gets called
in!
     "And you know I get a maid to
come in sometimes.  But she doesn't
clean.
When I clean, I CLEAN", she says with
a neurotic toss of the head.  I recall
seeing the same toss of the head
delivered with the same words stated
by some of
my Italian relations.
     I shook my head in silent
contempt and looked at my two Jamaican
companions.  They shook their heads in
agreement.  I got up, went downstairs
and
punched in.
     The work day went by slowly, as
my thoughts preoccupied me. Thoughts
of my
troubles, my friends' troubles, and
what the future would bring. And all
the the
while, I catered to the suburban ego
looking for baked goods.
     Finally, it was 9:40. Time to
clean out the bins of unsold rolls.  A
lot
of rolls today.  I worked hurriedly to
take out the unsold rolls and throw
them
in garbage bags.  They would be thrown
away.  I thought of the many people who
went hungry each night, and the rolls
and donuts that would be thrown into
the
grabage compactor.  I conteplated the
illogic of waste, and the injustice of
a
human being going hungry as I tossed
the rolls into a garbage bag inside a
shopping cart next to me.
     Then, a sound grabbed my
attention.  An annoying, unpleasant
sound.  It
was the sound of gum snapping.  I
looked up and saw the "officer's wife"
at the
other end of the aisle. 
     "Hey!!", she shouted between gum
snappings at a young man working behind
the deli counter.   "What are you
going to do?"
     She walked over to the deli
counter and leaned over it.  She was
several
years older than the young man she was
speaking to, and I thought her display
to
be rather distasteful.  As she talked
to him she leaned closer towards him.
Then, she pranced away, and after
advancing about 50 feet away from the
counter
shouted, "As they say, it's your
move", obviously straining her limited
intellect for the words.
     Another young man who worked in
the produce dept. walked up to her and
told
her he couln't go drinking with her,
as he had an early class the next day.
 I
simply shook my head, wheeling the
carraige full of rolls to be discarded
into
the corner.
     Quitting time.  I walked through
the employees' parking lot towards my
car.
Something then sped past me. It was a
brand-new IROC driven by one of my
fellow
employees, blasting a Bon Jovi song
through its open window.  The driver
shouted
something at a group congregated by
another car as she passed. 
     Then, my loud-mouthed,
gum-snapping  friend drove past me
with the young
man from the deli in her passenger
seat.  She drove by in a brand-new
Cadillac
sedan.  Must be why she felt such a
dire need to work.  That's why she kept
complaining about not being able to
survive and a policeman's salary.
     "You don't own that car.  The car
and what it represents seem to own
you.
But I guess that's ok with you.  Then
again, I doubt that you could comprhend
this", I said quietly as I glanced at
the taillights of the Cadillac.
     I got into my car and drove onto
the main thouroughfare.
     10:20 PM.  Bored and restless, I
decided to go for a ride.
     I drove to a local suburban mall.
 The mall was closed, but I went to the
arcade that adjoined it.  As I parked
my car, I saw a group of the usual
"mall
rats" that were part of the mall's and
arcarde's usual decor.  The males of
the
group wore ragged jeans, concert
t-shirts, bandandas, and donned
leather or
denim jackets. The girls wore similar
garb, although many of them wore
spandex
tiger-striped pants, making them look
like refugees from the latest MTV
video by
Guns and Roses.
     I walked into the arcade and
played a few games on the one pinball
machine
I had acquired skill.  I became bored
quickly, and decided to take a short
walk
around the arcade before I moved on to
another equally fascinating sight.
     As I explored the arcade, I ran
into Joe, and old acquantence from the
arcade. "Hey Joe", I said as I walked
towards him.
     "Hi..Whatcha been up to?", he
asked, brushing back his curly black
hair.
     "Uh, not much.  Working in a
supermarket.  You working these
days?", I
inquired, already knowing the answer.
     "Nah.  Haven't for a while."
     "How old are you now?  25?"
     "Yeah, somewhere around there..",
said Joe.
     "You can't hang out forever."
     "I know.  But I want to while I
can."
     "You're a very intelligent,
attractive guy.  It's a waste for you
to just
hang around here", I said, knowing
that saying it wouldn't make a rat's
ass of
difference.
     "I know."
     "Hey, I gotta get home. Take
care, Joe", I said as I headed towards
the
exit.
     12:05 AM.  I grew weary, but my
restlessness urged me to drive on.  I
got
onto the highway, deciding I would
visit a friend in Bayonne who I knew
kept
late nights.
     As I drove towards Jersey City, I
passed several billboads advertising
various products, including newly
built condos in the area. 
Gentrification.  I
knew those condos were making homes
for the Yuppies who found it more
eonomically feasible to live right
across the river from New York City. 
And I
knew the condos used to be apartments
belonging to working class/poor
people.
But not anymore.  They were evicted to
make room for a more profitable venture
for the landlords.
     I drove past the main train
terminal in Jersey City and stopped
for a red
light.  I lowered my window and gazed
at the dozen or so homeless people
sleeping on the concrete floor outside
of the train station.  Two of the
transients were standing within
earshot by the street's edge.  One of
them asked
a woman passing by them for some
change.
     "Why don't you get a fucking
job", snarled the middle-aged woman in
a loud,
brash Jersey accent.  "Always looking
for a fucking handout, you people".
     The light changed.  As I drove
away, I wondered if it had occurred to
the
lower-middle class woman that she
could soon be in the same position as
the two
unfortunates she had coldly denied. 
Doubtful.
     As I drove into Bayonne, I
noticed a police car following me.  It
stayed
behind me for about twenty blocks,
then pulled up next to me while I was
stopped
at a light.  The officer driving the
car glanced at me. I returned his
glance,
and the light changed.  He turned
around and drove away.  I was not
surprised,
as for some reason police officers
often enjoyed observing me.
     I continued on to my friend's
house, and noticed his car wasn't
outside.
He wasn't home.  I usually would call
to announce my visit beforehand, but
was
glad I hadn't tonight.  If I had
learned he wasn't home, I would have
driven
home early and in a more sullen mood
than I was in.
     I pulled my car over on one of
Bayonne's more busier streets and got
out of
the car to stetch out a bit. As I
stood outside the car, a car full of
the local
stock of Italian guys drove past me. 
One of the many occupants of the car
mooned me as another shouted, "Hey,
baby!!".  I waved them off tiredly and
got
back in my car.
     I drove on the highway towards
home, passing the vast industrial
plants
that lined the highway.  The smoke
from the many buildings filled the
sky. I
sighed, and took a deep breath of the
toxic air.  My car drove onwards, onto
Newark's city streets.
     As my journey came to a close, I
passed by a New Jersey Bell central
office, where 2 months before I had
spotted a tall young man going though
papers
in the trash dumpster in the
buliding's parking lot.  The building
had since
became enclosed in a barbed wire
fence, with signs in Englsh and
Spanish saying,
"New Jersey Bell. Private Property. 
No Trespassing".
     I laughed, and drove home..


@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

     ...And here's 3 letters that can
make your day a little less happy: 
FBI.
Some news on the FBI: It seems that
they plan to expand their database  to
include such things as credit card
transactions, telephone calls, and
airline
passenger lists.  Organizations such
as Coputer Professionals for Social
Responsibility are trying to stop this
from being implemented.  More on this
in
future issues.

     Remeber a small country in Cental
America called El Salvador?  Their
civil
war is far from over, and it looks as
though the leftist rebels are geting
closer to a military victory over the
US-gov't backed puppet government
currently in power.  Our
President-elect George Bush seems to
have 2 chioces in
this situation: either legitimately
deal with the leftists who may very
well win
over the country, or adopt an
escalation of the current US policy
towards El
Salvador: to adopt a policy of "total
war" again.
     Those of you who wish to gain a
better understanding of our
government's
policy towards Third World nations
like El Salvador, read up on it.  And
go to
your video store and rent a film
called "Salvador".  It's a fictional
movie
that's rather entertaining, and
enlightening.

and now......

 a few words from fah-q

 well it seems that i was driving here
in ct.the other night.

 i went past the subbase here in
groton the other night and as always i
yelled
fascist at the guards at the gate.the
guards got into their "rent a cop"car
and
followed me down the road with their
lights and siren on.once on the main
road
the groton town police joined the
paraide with their lights on too.i
didn't stop
and we drove to ledyard one town over
and a ledyard cop joined in.i turned
on to
a side street and stoped.the groton
and ledyard police got out and told
the base
cops never to use their lights in town.
  well the big day came and i went to
court.the judge read the charges to me
and
asked if i had anything to say i said
"oh yes i do....you can take that
ticket
and shove it so far your eyes buldge"
you know i can have your base privliges
taken away for that he said.well guess
what your nazi'ness sir..i have none
and
i was off your base when your nazi
goons grabed me i said.you meen to
tell me
you were off base when you were
stoped.we have no power off base and
securiety
should not be off base.i'll talk to
them.

   all n all it was a fun time for all
i think.

                  fah-q

  look for the NEW ati we will be
going to a new format.once a mounth
and only
to our host boards.we want to have 10
host's so if you want to host us drop a
line to the ati bro box.


 flashflashflashflashflashflashflash

  THERE IS A NEW HOST BOARD...

  THE PHOENIX PROJECT.

   THIS IS A REALY COOL AND HAPPINING
BOARD.THEY HAVE ALL THE BACK ISSUES AND
WERE THE FIRST TO GET THIS ISSUE!!!!!!

 SO GIVE THEM A CALL WHEN YOU BOARD
HOP TONIGHT!

   CALL THESE   AWE--FISH-Y'ALL ATI
HOST BOARDS:
 THE PHOENIX PROJECT  512-441-3088
 TALES GALLERY        203-834-0367
 AT-TELL              812-446-2881
 AUTO-BAHN            703-629-4422
 AT THE PROMPT TYPE CENTRAL AND LEAVE
FEEDBACK FOR ACCESS.
 PEACENET             415-923-0900
 CALL THIS ONE VOICE FOR MORE INFO


  WELL THAT'S IT FOR ATI ISSUE 31 LOOK
FOR US NEXT MONTH OR SOONER IF THE NEED
ARISES.






             ****     ********    ********
            ******    ********    ********
           **    **      **          **
           ********      **          **
           **    **      **          **
           **    **      **       ********
           **    **      **       ********
                   c       i              n
                    t       m              c
                     i       e              .
                      v       s
                       i       ,
                        s
                         t

         Happy New Year!!            Issue 32
         January 5, 1989
         > Special Anarchy Issue!! <<
           **************                    /
          /                                 /
         /                                 /
         Activist Times, Inc. ATI is a
         journalistic, causistic, /
            /cyberpolitical      /
           /organization,       /  4 more info?
          /trying to           /  send SASE
         /help y'all, and us  /  stamps???
         change the world    /    to:
         radically, in less /    ATI
         than two minutes  /     c/o Kelly
         increments.      /      BRO Box 94
         - - - - - - - - -       Groton, Ct.
                                        06340


            ...Numbers Run! (Yay!!)
         P516-922-wine dial a dirty joke.
         A516-751-2600 2600 magazine
         P516-234-9914 New York newsline
         #1800-ana-rchy artrock t-shirts and posters.
          800-222-talk talking yellow pages
         P800-526-3366 jam demo hotline
         A800-692-8766 watson voice demo
         P800-759-talk skytalk
         #800-877-4700 sprint weatherline
         S800-344-4000 wallstreet newsline
          201-644-2335 ap newsline for the blind
         P202-456-1414 Reagan's desk.
         A202-483-5500 NORML
         P202-363-1569 bork's desk.
         #203-771-4920 snetco newsline
         S203-324-3117 comedy shop newsline
          203-447-4600 vmb












         P212-614-6464 center for constitutional rights
         P213-621-4141 southern ca newsline
         #303-443-7250 paladin press
         S312-368-8000 chicago bell newsline
          313-223-7223 michigan bell newsline
         P412-633-3333 pennsylvania newsline
         A414-678-3511 wisconsin bell news
         P415-995-2606 Reality Hackers magazine
         #518-471-2272 New York Bell info
         S619-375-1234 time and temp
          714-835-5111 orange county newsline
         P717-225-5555 Pennsylvania newsline
         A718-pan-ties p-o-t-m club
         P718-435-1199 new york newsline
         #415-626-1246 AIDS Information BBS
         S201-644-2332 Bellcore music demo
          319-369-6268 Star Trek trivia line!
         P415-388-6633 Dial-A-Spaz Telephone
                       Graffiti Line


         And...Here's a good piece of news:
         Activist Times, Inc. now has its OWN
         >legal< voice mailbox! Call it! Leave
         us messages of praise, criticism,
         philosophical monotones, or even good
         old-fashioned ragging.  We love to hear
         from one and all. The number is:

          1-800-592-3360 Box Number 7871146

         And our gratitude goes out to The
         Operator for donating the box. Thanks!!

                           We now have a new contributor to ATI,
         Digital Destruction from 604.  In this
         issue, he contributes info on some
         phun terroristic things to do.
           Take it away....!


         $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
                   Jungle Survival
                   ---------------
            By: Digital Destruction (604)

         Hello once again, ATI freaks, it's me   again with some more
         hints to get you   through those pesky situations which
         always manage to mess up your dinner     reservations...This
         time, Jungle War   Tactics.
           Has there ever been a time when you   were taking a
         leisurely walk through the Amazon jungle only to realize by
         way of a note pinned to a tree by a spear that you were being
         stalked by headhunters? At that moment I'll bet most of you












         said to yourselves 'Gee, I wish I knew some Jungle war
         tactics!'..Well Here's the    break youve been looking for.

         Knife trick:
         ------------

         To kill your enemy by way of excruciatin pain, use this
         method. Sharpen many    hardwood sticks, and plant point-up
         in  a patch of land -on a trail, for        instance- and
         cover in fesces. Then     cover it all with leaves or
         something   and when Bongo and Umgala come after    you, they
         will step on the sticks, get  driven into their feet (And if
         they fell their bodies), and if that dont kill em then blood
         poisoning from the feces    will.

         Pond Trick
         ----------
         If you can find a very still pond, you  can plant the sharp
         sticks in this, but you dont have to, and then cover with
         grass, leaves etc. They will think it is land and SPLOOSH.

         Well, those two tricks should do it.    (I cant think of any
         more!) So
         until next time, Hasta!




                 'Good Time' Tear Gas
                 --------------------
                 By: Digital Destruction (604)

         Okay everyone, it's time to cook!
         It seems to me, that an insurance       seminar just wouldnt
         be any fun without some good potent tear gas. Am I right?
         Well anyway, As I was walking through  my local K-Mart I was
         approached by     the King, Elvis himself who instructed  me
         by divine intervention to write this file so here goes.

         To make real potent tear gas, it's      relatively simple.

         Ingredients:
         ------------
         2 lbs. of red pepper seeds
         A handy-dandy Popeil Percolater
         A perfume bottle or Binaca Blaster

         Procedure:
         ----------
         Place seeds, 1/2 pound at a time and    perk (perk?) for an
         hour or two. Scoop  the seeds out and you will have about 2
         tablespoons of the most potent resin    I've seen. Put this
         with a little
         Tabasco in a squirter and there ya go.  The seeds can also be












         reused for fun... The next time you go see 'Camille' in the
         movies, toss a few off the balcony!   Hee Hee....Anyway, this
         is Digital
         Destruction telling you, when the earth collides with the
         sun, try to stay out  of the backblast.


              The Calcium Carbide Grenade
              ---------------------------
             By:  Digital Destruction(604)

         Ya know, one of the things I like       about this country is
         that anyone can   build their very own anti-personell
         grenade using store bought everyday     materials. In this
         file I will discuss  how to build one of these babies.
         It should be known that when this       grenade is exploded
         it produces a cloud of thick grey smoke 40 feet in diameter
         hovering 3 feet above the ground in    which nobody can see
         or breathe with    just a hint of shrapnel to top off the
         event, so I wouldnt go throwing it at   your local boy scout
         parade for a       'good laugh'...Procede with caution...
         There are still a lot of angry Indians  left over from
         Bhopal.

         Ingredients needed:
         -------------------
         250 grams of Calcium Carbide
         (You can buy this stuff in any hardware store as lantern
         fuel)

         1 Coca-Cola can (Washed and dried)

         1 100ml test tube (pyrex)

         1 rubber cork

         Duct tape

         Procedure:
         ----------

         Funnel 180-250g of Cal. Carbide into the can so it is about
         1/4 full. Then,     remembering to keep it AWAY from water,
         put aside. Fill test tube to 100ml and   cork. MAKE SURE the
         outside of this is COMPLETELY dry. Any excess water on the
         cork or outside of the tube will make   YOU an instant
         victim! Then, carefully  insert test tube into hole in top of
         can so it rests on bed of C.C.. Drop dots  of wax around
         opening to hermetically   seal opening, and wrap the whole
         thing  in duct tape. When thrown, upon impact, the test tube
         will break, scattering    water all over the C.C. creating a
         gaseous reaction resulting in 600lbs    per square inch of
         pressure which will  last about 5 seconds. the can will
         explode, shrapnel will fly and the gas  will go. Here is a












         picture of how it    should look.


                  ------\\\\---
                  !      \\   !
                  !      !!   !
                  !      !!   !
                  !      !!   !
                  !WATER>!!   !
                  !      !!   !
                  !      !!   !
                  !      !!   !
                  !      ()   !
                  !CCCCCCCCCCC!
                  !CALCIUMCCCC!
                  !CARBIDECCCC!
                  -------------
         Remember. Carbide gas is a cancer
         causing toxin and is fatal.

         Now you have your own anti-personell
         grenade! Won't Mom be surprised!
         Have fun.....And be careful.
         Until next time, VIVA REVOLUTION!



                  Mall Terrorism
                  --------------

           ..Phun things to do in the vast
              malls of Suburbia, by The Happy
               Hacker and Digital Destruction


         1. Get 500 mg gelatin capsules and
         fill about 100 of them with high-
         potency suds.  Also fill about 30
         capsules with red Jello mix. Dump
         all the capsules into the large
         fountain that is the central part
         of many malls.  The time necessary
         for the capsules to dissolve and wreak
         their havoc will be sufficient for
         you to make a non-hasty exit from the
         area.

         2. Take a penny, and wrap a (1/4")
         strip of litmus paper.  Wrap that in
         a foil gum wrapper, making sure the
         penny, litmus paper and the foil all
         touch each at some point. You now
         a crude version of an electronic theft
         device!  Place it in a plant next to












         the security "towers" at the exit of
         the store. The alarm will keep going
         off, and no one will be able to figure
         out what's setting it off!!

         3. Phun with Mannequins! Try these!
          a. Put Groucho Marx glasses on them.
          b. Switch wigs on male and female
             mannequins.
          c. Make them hold signs with
             revolutionary quotes on them.
          d. Stand next to mannequins and stay
             still.  Pretend to be one!

         4. If you are male, go to the women's
         makeup counter and demand service.

         5. Put comdoms over security cameras,
         of course avoiding being seen by
         them before/while doing so.

         7. Computers! Write a short BASIC
         program that spews obscenitites or
         other annoying propaganda across the
         screen of a display computer in a
         store. Here's an example of one for a   Commodore 64:

          10 PRINT"(CLR HOME)"
          20 POKE 53281,0:POKE 53280,0
         21 INPUT"PRESS ANY KEY FOR DEMO!":A$
          22 IF A$="" THEN 22
          23 PRINT"(CLR HOME)":PRINT:PRINT:PRINT: PRINT
         24 PRINT"(CNTRL-2)THERE ONCE WAS A GIRL FROM VERMEETH"
          25 PRINT"THAT LIKED TO CIRCUMCIZE GUYS
          WITH HER TEETH"
          26 PRINT"NOT FOR THE MONEY"
          27 PRINT"AND NOT FOR THE GLORY"
          28 PRINT"BUT JUST FOR THE CHEESE
          UNDERNEATH!!"

         NOTE:Where the prg says "(CLR HOME)",
         you will actually type SHIFT and the
         CLR HOME key. A symbol of a heart
         encased in a box should be displayed.
          Where the prg says "(CNTRL-2)", you
         hold down the CNTRL and the 2 key.

         Run the program, and watch the
         unsuspecting comsumer become apalled
         at the off-color limerick!

         8. Phun in the parking lot!
          a. Redirect traffic with orange
          traffic cones.












          b. (You need a few people for this
          one) Go past all the newer model
          cars, giving each a healthy shove
          while passing. This should result
          in an infinite number of car alarms
          going off at once!

         9. Pranks in the Electronics Dept!
          a. Put porno flick in display VCR.
          b. Put tape of Richard Pryor or
          some other very offensive commedian
          in a cassette deck.

         10. Mix smut books in with other
         books being sold at the bookstore.
         Also, if they have a display window,
         replace one of the displayed books
         with the most bizarre smut book you
         can find.

         11. Pay F0ne Phun!
          a. See a crowd of annoying mall rats
          congregating around a pay phone
          waiting for one of their buddies to
          call them and tell them their
          parents have gone out and it's ok to
          have the troop of degenerates over
          for a Megadeath listening party? No
          problem! Go to the pay phone across
          the hallway and watch them curse
          angrily with screams of "What da
          fuck?!?" as you direct an SSCU to
          constantly call that number and say
          "Hello, Hello, Hello..."
          b. Pull underneath rubber covering
          by the handset of a pay fone and
          locate the red wire. Strip it, then
          cut it.  The pay phone will accept
          coins, but won't connect any call
          after someone has paid for it. Go
          back the next day and twist the
          spliced ends of the wire together.
          Voila! You have hit the jackpot, and
          should receive every coin that has
          been insereted into the phone since
          the red wire was cut.
          c. Put a rubber spider, or something
          equally disquieting in the coin
          return slot of a pay phone. Stay
          nearby and watch your surprised
          victim retrieve it!!

         12. Here are some standard names you
         can have paged in a depeartment store:












          a. Connie Linkus
          b. Dick Hurtz
          c. Mike Hunt
          d. Ben Dover
          e. Jack Meoff

         13. Take a powerful magnet, preferably
         a bar magnet, and hold it in your hand
         as inconspicuously as possible.  Walk
         over to a video game in progress in
         the mall-rat infested arcade and hold
         the magnet in back of the machine.
         The screen of the video game will be
         disrupted, to the suprise and dismay
         of the players and spectators, until
         you remove the magnet.


         That's all the terroristic pranks we
         can think of at the moment.  But be
         on the lookout for Mall Terrorism,
         Part 2 in the near future!
         ######################################
         And now, on a more cheerful note,
          a poem from Ground Zero
              in my room
              ----------
         i lie alone
         the world speeds on
         victimized
         alone i lie

         hope's not here
         i've no reprieve
         the walls preach doom
         the walls deceive

         but do they lie?
         my mind's awry
         in discontent
         i wonder why

         the darkened night
         removes my sight
         i face my doom
         alone
         in my room

                           %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

             News From the Front..

         **** POSSIBLE DATA LOSS 00 21J ****
         (Hehe, just kidding, there was no












         Telenet packet-switched-induced data
            loss.  Just GZ's sense of humor..)

         Doc Telecom/Raider update: They are
         going for another Superior Court Review
         this week, where a "deal" will be
         offered to Doc and Raider by the
         prosecution.   With any luck, they
         will be offered 1 year's time, with
         the chance for parole in a short time.
         By the way, Doc and Raider were
         featured in an article about hackers
         that appeared 6 weeks ago on the front
         page of the New York Times.

         A hacker from New Jersey called The
         Wasp was busted in connection with the
         Livermore Labs breakin.  The feds paid
         him a nice friendly visit. More on this
         in future issues.

         Be kind to your children: The news
         tonight had a piece regarding Yuppie-
         type parents who push their children
         too hard.  One mother mentioned
         made her son participate in about 8
         after-school activities, which took up
         at least 2 hours of after-school time
         each day. The activities were curtailed
         only when the 9-year-old boy displayed
         strange physical symptoms such as
         headaches, and constant colds, which
         are typical symptoms for overworked
         children.  A psychologist descibes how
         parents who overwork their children
         feel: that their chldren are status
         sysmbols, and they should be pushed
         to "succeed" so that the parents can
         boast of their childrens' endeavors.

         AT&T, MCI, British Telecommunications
         LC, France Telecom and Western Union
         are all co-owners of TAT8, the first
         fiberoptic trans-oceanic cable. TAT8
         went operational last month, support-
         ing a capacity of 560M bit/sec.  Look
         forward to better international
         connections! ;)

         Smart Cards: How Smart?
         Smart cards are wallet-sized plastic
         cards with microprocessors built into
         them, and they are on the rise. They
         are widely used in France and Japan,












         and it is reported that Visa and
         MasterCard are making deals for
         millions of dollars worth of cards.
         Smart cards are so widely used in Japan
         that the country's Minister of Finance
         is investigating how their widespread
         use is affecting the nation's money
         supply.  Since the microprocessors
         built into the cards contain
         information on the cardholder, there
         is no need to access a network to
         verify transactions.  This makes the
         smart card useful in credit card and
         calling card applicaions.  However,
         they are beginning to be applied to
         other uses.  The National Security
         Agency recently signed contracts with
         three companies for devices that
         utilize smart cards to protect
         government computers against hackers.
         The devices, called low-cost encryp-
         tion/authentication devices (LEAD's)
         utilize a smart-card system in which
         the microprocessors on the cards
         contain a large amount of personal
         data on the user, logon sequences
         and security data which specifies
         the level of access the user has.
         The user would logon to the computer
         system by inserting the card into a
         reader attached to the terminal in use,
         then enters his password when the
         machine validates his card. Neat,
         huh? These measures are designed
         to screen out unauthorized users and
         encrypt data passed across the Defense
         Data Network (DDN).

         It seems that the jingoistic blood is
         starting to stir again.  Our gov't
         is openly threatening to bomb Libya..
         ..again!  Threatening to violate
         international law, and thumbing its
         nose on world opinion, our gov't
         prepares to once again commit a
         terroristic act in an attempt to
         stir up a faltering nationalism in
         our country.  But how many more innocent
         Libyans must pay for this if it is
         to be carried out?

         @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

         The AIDS Info BBS - Worth A Call..













            The AIDS Info BBS hails from San
         Francisco, California, sponsored by
         a community organization called The
         Community of St. Matthew.  It's run
         on an Altos 986-T with the operating
         system Xenix 3.1a.  It provides lots
         of valuable information on AIDS to
         all people who call it, such as the
         following: (taken from the BBS's main
         menu)

         1> Reading Matter: Articles, News,
         Book Reviews (Read Only)
          2> Question/Answer: Commonly Asked
         Questions (Read Only)
          3> Open Forum: Messages About AIDS
         (Read & Write, NOT private)
          4> Names & phones: AIDS
         organizations, other BBS (Read Only)
          5> Library References: on published
         texts in libraries (Read Only)
          6> Statistics (updated 12/23/88): The
         Numbers (Read Only)
          7> Therapies: Discussion (Read &
         Write); Project Inform, Tests (Read
         Only)
          8> Legal Papers:  that you can use --
         free (Read Only)
          9> About this BBS: History, gifts,
         needs (Read Only)
         10> System Administration: the
         operator here can help you "there"
         (Read Only)

              Online since July 1985, the
         system is available to all 24 hours a
         day. Give it a call, and tell them ATI
         sent you.
         The Aids Info BBS        415-626-1246
         Sysop: Ben Gardiner

         To send a contribution to the BBS:

          P.O. Box 1528
          San Francisco, CA 94101

         ***************************************
         @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

         Look for these coming attractions in
         future ATI issues!:

         "How to Become an LAN Data Theif" by












          The Happy Hacker

         "A Walking Tour of The Underbelly of
          The Big Apple", by Ground Zero

         "Why No Phreak is Safe" by The Happy
         Hacker

         An ATI all-poetry issue! (We need
         submissions, folks!)

         A brilliant, yet amusing analysis of
         the film "War Games" by Digital
         Destruction (A bit of nostalgia..)

         The full story of how Doc Telecom
         and Raider got busted, and their
         experiences with the legal and penal
         system, written by Ground Zero

         A file on phun things to do with
         fiberoptic lines by the 8th Defendant

         And....quite a few surprises. Yes,
         some really kicking ATI-style
         exposes. "ATI-We keep you on your toes".
         That's all for ATI32.  Look for ATI33
         in a week or so.  We're cranking 'em
         out! Have phun, and be creative!


! 



          WITH THANKS TO * HATCHET MOLLY *
       __________________________________________


    ****     ********    ********
   ******    ********    ********
  **    **      **          **
  ********      **          **
  **    **      **          **
  **    **      **       ********
  **    **      **       ********
HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY
HEYHEYhey, hey, hey, it's ATI!HEY
HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY

 Issue #33...January-something, 1989

  **************
 ** YIPPIE!    **- - - - - - - - - - .
  **************                    /
 /                                 /
/                                 /
Activist Times, Inc. ATI is a
journalistic, causistic, /
   /cyberpolitical      /
  /organization,       /  4 more info?
 /trying to           /  send SASE
/help y'all, and us  /  stamps???
change the world    /    to:
radically, in less /    ATI
than two minute   /     c/o Kelly
increments.      /      BRO Box 94
- - - - - - - - -       Groton, Ct.
                               06340

Hello, and welcome to ATI33.  In this
issue, we focus on the media and its
recent antics.  As always, we have a
wealth of inspiring, thought-provoking
info..all in one little action-packed
file.  Read on!


 ***********
* editorial *   thoughts from fah-q
 ***********
     PLANE BOMBS, NERVE GAS PLANTS, JET
FIGHTS..Just a few things in the news
in the past few months. i have been
following them very closely. i don't
know if anyone else has come out and
said it, but i am pretty sure they are
all connected. first we announce that
we are planning to attack a chemical
weapons plant in libya and a plane
carrying american students,american
military, and american tourists is
threatened and (by the way the threat
was not told to the public of the
united states,but was announced on
the foreign short wave broadcasts a
few days before the event) then blown
up. then 2 of our fighters down two
libyan MIGs.  were we just on a daily
flight routine or were we there to
see what trouble we could stir up so
that we could take action and not be
the bad guy?  seems to me that they
could've attacked right away. If they
were armed (and i'm not saying they
weren't),why did they just follow and
not try to lock on in the airspace off
the libyan coast? now a commercial jet
crashes again in england. could this be
all related? we don't want them to make
chemcal weapons (i see the point in
that), but we and 24 other countries
make them. they attack without warning,
while we tell them days,weeks sometimes
months in advance,so they can move
civilians. our press seems to me to be
making us look like the fools. in their
eyes we can do no right. if we down one
of their fighters, they run us through
the ringer. one of their commercial
jets comes into restricted airspace
and them is warned and signaled 12
times with out a reply or turning out
of the space,so it is shot down for
security reasons (i think they could
have waited a few more seconds...but
for all intent we were in the right)
we go wild...but let one of their
missles hit one of our military ships
in international waters and sink it.
they say "oh-we-are-sorry-but-we-made-
a-mistake-it-won't-happen-again",
the press thinks that is acceptable.
my stand is this.....(and this is my
personal opinion) stop dealing with
these assholes. they take 1 or 2
americans and say they will release
them if we set 20 of their guys free?
bullshit...we tell them we will kill
their 20 if they don't let ours go.
they want to bomb one of our planes?
good. go ahead. we bomb one of their
major cities.  and the PLO? do they
really think the world is gonna let a
bunch of madmen have a country,who have
stated they would kill anyone they had
to in order to get it? maybe if they
weren't such assholes and sat and
talked to the world and not blow up
planes and act like monkeys for the
world to see they might get somewhere.
                  fah-q


 ******************
!                !
! personal notes !
! from your buddy!
!  Ground Zero   !
------------------
Greetings.  Those of you who
know me are surely aware that the
above opinions do not reflect my own.
I take a different view on terrorism
and the other topics discussed. I
am not in favor of terrorism, nor do
I support or advocate any terrorist
groups in any way.  However, I take
the time to understand the causes of
terrorism.  This is important, because
in order to deal with terrorism
effectively, we must understand that
it does not exist in a vacuum.  Groups
resort to terrorism because they are
powerless.
     It's easy for us, as Americans
to sit back and turn on the tube and
say 'What a bunch of crazy ragheads'
when we hear of trouble in the Middle
East.  Our own ethnocentrism, combined
with a blind sense of nationalism
prevents us from gaining an under-
standing of the many complex issues
that come into play in the Middle
East.  A man like Qaddafi may be a
bit outspoken, and may even appear to
be crazy.  Since he's easy to poke fun
at, he has become an easy scapegoat
for the problems that exist today with
terrorists.  If you believe that Libya
is deserving of being bombed, then I
would like to point out that there was
no real evidence linking Qaddafi
with any terrorist activities.  After
the US bombed Libya in '86, our
gov't later admitted that it had no
evidence that Qaddafi was responsible
for the things he was accused of,
namely the bombing of a West German
discoteque frequented by American
servicemen.  But, this admission was
ignored by most in the militaristic
fervor that followed the bombing.
     Also, I would like you to
consider your own definition of
"terrorism".  It's obvious that there
are many groups that exist whose
activities include terrorism, but
we fail to take notice when our own
government commits acts which could
be also be defined as "terrorism".
The bombing of Libya in '86 included
destruction of civilian targets, such
as a hospital for the handicapped.
Also, our government's support of the
contras in Nicaragua - a band of
mercenaries who regularly attack
civilians in a brutal manner -
certainly constitutes terrorism in my
opinion. And the CIA even provided
them with instruction manuals
encouraging VERY questionable prac-
tices.  Please remember these facts,
and keep an open mind.


     And..now for something completely
different that I feel compelled to
bring to your attention.  A fellow
activist friend of mine subscribes to
quite a few political magazines,
leaving him on the mailing lists of
many organizations soliciting money.
One such organization called the
Government Accountability Project sent
him some very interesting information
which he thought I should share with
you folks.  The following is an
exerpt from their literature:

     The chicken you buy was most
probably plucked and cleaned in an
automated processing plant. So-called
"protective" government agencies are
permitting gross and shocking laxity
in the treatment, handling and inspec-
tion of chickens in these plants.
Because of this, more people could die
during the next two decades from the
filth, excrement and toxins in chickens
than died in Vietnam.
     Machines that mechanically pick
the feathers, remove the entrails and
wash the chickens with high pressure
water have increased profits but have
also increased the amount of invisible
fecal contamination.  Because of this
40% of the chickens on the market are
contaminated with salmonella strains
100 times more dangerous and resistant
than before.
     Inspectors are being forced to
speed up so that they now have less
than two seconds to look at each
chicken.  Under what is called "the new
streamlined inspection system", they
are not allowed to look at the back,
bottom, sides or insides (where DO
they look at?? -GZ), where the
contamination usually exists.
     The final washing of chickens is
done in a vat of seldom-changed water
which is rarely kept at the right
temperature and is so laden with dirt
and waste matter that it is virtually
"fecal soup!"
     Salmonella is bacteria.  It can be
killed by thoroughly cooking the
chicken. However, a real danger is
passing the Salmonella on to other
foods through use of the same knife,
cutting board or your own hands. That's
why we suggest the following tips:

  1-Keep poultry and meat isolated. For
example, rewrap chicken and place it
in your refrigerator, making sure that
the chicken does not touch other food.
  2-Wash chicken thoroughly and remove
all skin.
  3-Wash all utensils that the chicken
has been cut with, or has been sitting
in. Do not use a wooden cutting board
(because it is pourous).
  4-Wash your hands well after prepar-
ing the poultry, espacially before you
go on to cook the rest of the meal.
  5-Rinse sink and utensils with a
bleach and water mixture.
  6-Cook chicken thoroughly. Do not eat
rare meat or poultry.


     I hope you find the above info
useful. I did not provide it to groce
you out.  I included it in this ATI
in hopes that it might prevent a few
cases of food poisoning.  And I would
also like to mention that the above
information was discussed on the March
29, 1988 version of the CBS show "60
Minutes", and has led to 5 hearings
in Congress last spring.  Let's hope
that better conditions are eminent.
     And now for the rest of ATI....


mediaWATCHmediaWATCHmediaWATCHmediaWATC
aWATCHmediaWATCHmediaWATCHmediaWATCHmed
diaWATCHmed  Media Watch!  iaWATCHmedia
aWATCHmediaWATCHmediaWATCHmediaWATCHmed

     Speaking of the CBS network,here's
a transcript of a news segment showm a
few months ago that you might enjoy:

        Transcript of CBS News segment on the Hackers Conference
                filmed 7 Oct 88, aired 8 Oct 88.

Anchorman ("High Technology" logo and drawing of chip):  An unusual
conference is under way near San Francisco.  The people attending it
are experts on a technology that intimidates most of us, but has changed
the way we live.  John Blackstone reports.

Narrator (trees and outdoor scenes at conference):  A small revolutionary
army is meeting in the hills above California's Silicon Valley this
weekend, plotting their next attacks on the valley below, the heart
of the nation's computer industry.  They call themselves computer hackers.

Jonathan Post:  "The people who are gathered here changed the world
once; if we can agree on where to go next, we're gonna change it again."

Narr (conference scenes, blinking lights):  What hackers have learned
to do with computers has changed the world, for both good and bad.
They're the people who dreamed of and built the personal computer industry.
Because for a computer, the only difference between a hundred and a
million is a few zeros.

Donn Parker, (SRI International, in office):  "And so, in fact, criminals
today I think have a new problem to deal with: and that is how much
should I take.  They can take any amount they want."

Narr  (phone central office):  Telephone companies are the most victimized
because those who break into phone company computers can link up for
free to computers around the world.

Richard Fitzmaurice (Pacific Bell, in office):  "You'll hear the term
computer hacker, computer cracker; we call them computer criminals."

Narr (blinking lights):  But much more frightening are the hackers
who crack American military computers.  Earlier this year in a lab that
does some classified research, astronomer Clifford Stoll discovered
someone had broken into his computer.  He says it was like finding a
mouse running across the floor.

Stoll (in office):   "You watch and you see, he's going in that hole
over there, and you say, ooh, he's going in that hole; that connects
to a network that goes to a military computer, in Okinawa."

Narr (Stoll playing with a yo-yo in a machine room):   The breakins
to American military computers went on for several months.  Eventually
Stoll traced them to a hacker in West Germany.

Donn (in office):  "A hacker today is an extremely potentially dangerous
person.  He can do almost anything he wants to do in your computer."

Narr (at conference, video games, stabbing and fighting on screen):  But at
the hackers' camp in the hills, there's recognition that in any
revolutionary army there will be a few rogues and criminals.  But that's no
reason, they say, to slow down the revolution.

John Blackstone, CBS News, in the hills above Silicon Valley.''

     ...And now, a review of the ABC
show "Beach Party Vietnam",oops..I mean
"China Beach":
     The show begins with a doctor
talking philosophically into his tape
recorder about sex. Then, we cut to
a scene of some of the show's women
lying down in partially open robes, in
quarters surrounded by amenities such
as rugs, makeup and hairdressing
equipment. 'Doc' then plays golf in
preppy-style golf clothes, while a
female major in her middle years is
plauged with the earth-shattering
problem of onsetting menopause.
     While one of our women prances
around their quarters in 80's-style
cutoff shorts and tank top, another
complains of a lost investment
opportunity: tourism in the Vietnamese
coastal area (Ah, capitalism's finest!)
     The women, including the major
lounge by the poolside with a blender
of mixed drinks, discussing their
common woe, while a cigar-toting Col.
parachutes into the scene. He looks at
the women confidentally and blares out
a self-absorbed line about owning the
world while the women swoon.
     In the next scene, the women all
stand admiring him lifting weights,
and the Col. later has individual
meetings with all three of them. He
knows no shame, using the same line
on each of them: "You have a sense of
mystery about you. I think we have
potential".
     The base sponsors a luau, in which
the women adorn themselves in Hawaian
style dress. A wounded soldier with
delusions of being Chuck Berry and a
Black female nurse perform a few
numbers onstage at the luau, then we
cut to a scene of the Col. and our
reluctantly aging major in bed, mixed
with images of a base dweller surfing
on the nearby beach.
     Makes you just want to go out and
enlist to go fight wars as pleasant
as this, does it not? That's the idea.
In "Club Med:Saigon", oops, I mean,
"China Beach",  the glorification
of militarism takes a very hedonistic
twist!

    And now a word on Drew Barrymore.
She was in films like "E.T." and
"Firestarter". And now she's in the
focal point of the media due to her
drug and alcohol problem. I read the
article in People magazine which
described her problem in her own words,
and frankly, I was appalled that even
a magazine like People could allow such
conceit and misdirected thoughts in
their pages.  In the article, she
refers to several people, including her
own mother, as "asshole", and is very
self-involved in her story.  People
magazine, in this issue just glorifies
the ramblings of a 13 year-old brat,
spoiled by fame, and non-repentant of
her wrongdoings.


     Consider these advertisements for
TV shows:
     "She was young, attractive....and
MARRIED. (Saxaphones blaring in back-
ground.) During a separation from her
husband, she had a brief affair. When
she finally went back to her husband,
she discovered that her lover filmed
dozens of home movies of their
lovemaking. And this time, THE WHOLE
TOWN WAS WATCHING. (Music speeds up).
Tonight on 'A Current Affair', we
talk to the young lady trying to get
the pieces of her life back together.
It's an X-rated tale of seduction and
betrayal, on 'A Current Affair'."
     (woman's voice) "..And I asked
him, HOW can you preach against these
things when you do them yourself? And
he told me, 'I am preaching to myself
as well as the others'". (announcer)    "A small-town preacher in Texas
preaches piety on the pulpit, while
PREYING on several of the women of his
congregation"  (another woman's
voice, with deep Southern accent)
"My body just froze when he touched
me..." (advertisement for NBC show
"Inside Edition")
     Why the hype?  Seems like the
sensationalistic, souped-up yellow
journalism genre has made its way to
TV programs.  These type of programs
just demonstrate the fact that TV
has completed its journey......into
the gutter.


*******************************
* more notes from ground zero *
*******************************

     Ok, folks, first off, you might
have noticed that the ATI mailbox
is gone. Yes, it is.  The reason makes
an interesting story in itself, which
will most likely be unfolded in a
future ATI.  But, take note that there
will be a new ATI mailbox up very soon.
Watch for it in a few weeks.
     Also, a correction. The first
version of ATI32 stated that the Wasp
was busted in connection with the
breakins of the Livermore Labs UNIX
system.  This is incorrect.  He was
busted for crashing Bell systems. How
was he caught? He would crash a system
and then proudly sign off with the
words, "You've just been stung by
The Wasp". It's my opinion that with
the networking that exists between
telco security, law enforcement, and
informants, it wasn't hard at all to
locate and monitor Mr. Wasp.
     Nice going, guy!
     More news: Thomas Covenant, an
East coast hacker,was busted last
week, on January 14th. We can't release
the details yet, but we'll have more
info on this in future issues.
     And, some HAPPY news! Doc Telecom
and Raider are getting out of jail on
January 23rd!  There are some major
drawbacks to the situation, like the
fact that for 3 years they will be on
probation, and for that amount of time
they can't leave California. Also,
they will NOT be geting back their
computers EVER.  But, I am happy to
report that they will no longer be
incarcerated!


     That's all for ATI33.  Look for
ATI34 soon, in about a week or so.
Take care, and this is Ground Zero,
saying, "Be Creative!"

! 

Date:    Tue, 18 Apr 89 01:54 CDT
To:      TK0JUT1
From:    Gordon Meyer                                     <TK0GRM1>
Subject: ATI 34

HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY
HEYHEYhey, hey, hey, it's ATI!HEY
HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY

    ****     ********    ********
   ******    ********    ********
  **    **      **          **
  ********      **          **
  **    **      **          **
  **    **      **       ********
  **    **      **       ********

                ....
               ..  ..
               . 34 .
               ..  ..
                ....
               February-sumthin',1989
**************
 **   RAGON!!  **- - - - - - - - - - .
  **************                    /
 /                                 /
/                                 /
Activist Times, Inc. ATI is a
journalistic, causistic, /
   /cyberpolitical      /
  /organization,       /  4 more info?
 /trying to           /  send SASE
/help y'all, and us  /  stamps???
change the world    /    to:
radically, in less /  ATI
than two minutes  / c/o Kelly
flat.            /  BRO Box 94
- - - - - - - - -  Groton, Ct.
                   06340

to ATI34.  Don't mind me, I'm in a bad
mood today.

Anyway, we have lots in store for you
in this issue.  We're going to make
this one a long one, as we've got lots
to say.

But first, a few words on the state of
ATI.  Right now, there are a few BBSs
that regularly receive ATI issues.
But, I can't do all the uploading
myself, so we need a few volunteers to
help distribute ATI.  We would like
ATI to be uploaded to as many boards as
possible, so start sending it to your
local boards, if you feel that they
can handle the fresh, biting, contro-
versial style of ATI (Yes, we have
come across some BBSs that prefer to
censor the views expressed in ATI from
their users! More on this in future
issues..) Also, I am putting up a BBS
in the next few days.  As soon as I
get the software working properly, the
board will be up. Call 201-748-4005,
and if it isn't up when you call, try
again in a day or so. But it should be
up by the time you are reading this.

Also, note this: Tales Gallery's board
is back up. But he lost all the ATI
issues in a disk crash. Also, Audobon
in 703 is down, so don't kall it..
Here are the boards that regularly
receive ATI:

The Pheonix Project      512-441-3088
At-Tel                   812-446-2881
F/X Animation            201-368-0573
Ry-Lor's Den             201-759-2066
Edge of Existence        201-746-9095
Limelight Technologies   203-834-0367
The Red Phone            201-748-4005
   (my BBS! Yay!!)

The list grows regularly, as more and
more people upload ATI to their local
boards. If you are uploading ATI to
any boards, let us know, and I will
publish a more detailed list of boards
that have ATI online in a few weeks.

And also, from now on we will have a
BBS spotlight in just about every
upcoming issue as a regular feature.
We will either feature a BBS, or have
a brief article pertaining to BBSing.
If you know of a BBS you'd like to see
featured, let us know..
  And here we go!!

*****************
* bbs spotlight *
*****************

  This issue, we feature the BBS run
by Greenpeace. Here's their ad:
(submitted by Gordon Meyer)


_________________________________________________________
         EnviroNet

        The Public Greenpeace BBS
        =========================
         >> What are those maniacs up to NOW!?
         Climbing smokestacks, hanging from bridges, diving into  pools of
        toxic waste, washing their sox in public, Greenpeacers  engage in
        direct actions around the world to raise public  consciousness
        about the environment.
         Greenpeace has offices in 17 countries, a fleet of 5 ocean- going
        ships, a river boat (which just completed a tour of the  Great
        Lakes and the Mississippi calling attention to water  pollution
        there) and several sailboats.  Hundreds of Greenpeace  volunteers
        and employees use these tools daily to help protect  the planet.

        If you're interested in environmental issues and would like  to
        keep in touch with the latest Greenpeace actions around the
        world, EnviroNet is for you.

        This system, sponsored by Greenpeace USA, contains all the  latest
        press releases from Greenpeace and the wire services about
        Greenpeace actions and issues related to the environment.  These
        are updated daily and are the same as those carried on the
        internal Greenpeace network.

        In addition, EnviroNet carries the weekly Greenpeace USA
        newsletter and the bi-weekly journals of the four Greenpeace
        people at World Park Base, the only permanent, non-governmental
        base in Antarctica.

        The E-Mail and public conference sections allow you to
        communicate with Greenpeace activists, as well as with others
        interested in the issues Greenpeace addresses.

        EnviroNet may be reached at 415-861-6503, 300/1200/2400  baud, 24
        hours a day.  There is no charge, but on-line  registration is
        required for full access.  The registration  information is used
        only for EnviroNet.  Your name will be added to no mailing list as
        a result of registering on this system.

***************************************
And now... A rare treat. Ever wish you
could check out some of the many chats
that go on between people in the
phreak/hack world? Well, now we bring
you a chat that we are sure will bring
you chuckles, courtesy of an anonymous
uploader to my board.  To protect the
"innocent", we've edited out names.
hopefully we'll have more of these
chats for your viewing pleasure.
Read on!

ok.. written down... So anyway, need any new members in your group????

Uh, well, knowledgeable ones. I'm not
trying to be a jerk, but you have a lot
to learn.

no prob ... I'll translate that: "Yes,
but not you!!!!!!!!!!!" heh! :) .. I
kinda figured that ... Owell, it was
worth a shot.. heh!

uh, you keep interrupitn me when I  am
typing!  pls stop. anyway, as I was
going to say, we are also looking for
people who are not only knowldegable,
but who have the same ideology as us,
and I do vbelieve that it might be
difficult.  me abnd XXXXX are very
similar in a lot of ways, we think
very much alike..


 owell .. :( .. So.. you have NOTHING
other than your discovery??!?! (I had
an amazing discovery not 2 long ago 2.
 it lasted for a good 3 - 4 months ..
I gave it to XXXX and a local friend
of mine.. no probs.. But when XXXXXXX
 got it, THAT WAS MISTAKE #1 ... He
gave it out too too many people, and
NOBODY but me was allowed 2 give it
out .. And I WAS PISSED TO HELL.. but
hey, 3 months on an alliance, and
worldwide supporting accidental
discovery ain't bad ..


uh huh, and what was this "discovery"?

It was some military base kind of
thing.. their phone system.. it had
extensions and wierd shit.. kind of an
exotic PBX ... It had uh.. 6570 - 6579,
6581 - 6589, 6591 - 6594 were possible
last 4 digit phone #'s of the 800 # ..
when calling the # (which all of 'em
are now disconnected :( ), dialing 20
would give an AT&T dialtone that could
reach out and touch the world .. Then
after they finally caught on to that
(after 2.5 months), I noticed that 9
would also give a 2nd dialtone .. if I
tried 2 dial a 1 + # .. it would give
3 fast dialtones and another normal
dialtone 2 enter a 5 digit code.. but
these people were stupid .. if
i called up, dialed 9, and then instead
of 1 + ac + ph, but instead 0 + ac +
ph, 2 things would happen:

A. I could enter an AT&T calling card
B. Just dial 0, bullshit operator that
my phone is broken and she would dial
   the phone # for me! I used that method pletny!
So did a few friends of mine!
AND .... Most hilarious of all.. when
dialing the 9 for the dialtone, it
could be used as an extender, or it
could reach ALLIANCE without any code
BS!!! Dialing 0-700-456-1000 wouldn't
get you an AT&T calling card tone OR
the operator, so soooo many conferences
were made off of that trick  WE really
did damage to that company phonebill
wise.. But we weren't trying to
purposely do that, we just wanted
conferences ... So I gotta admit,
screwing around with 800 #'s and
KOOK's handle from ddial got me 3
months of heaven!! Now you may type:

how does kook come into play here?

The 800 # had his name in it .. I was
just looking at the ddial, and on my
other line I was dialing #'s with
people's handles.. I was trying for
1-800-456 .. And 56 is KO .. The OK
for KOOK is 65 .. and then I just hit
77 for some unknown reason .. I heard
a dialtone .. And within 10 mins, I
hacked out 21 + 9 for an
outside dialtone .. it wasn't a great
quality tone .. only a few days later
did I realize 20 w/o a 9 after it gave
a clean AT&T line that was almost as
clear as US SPRINT


i see.  you dialed 1-800-456-XXXX from
ur house?


Yeah.. Sometimes thru an extender ..
But I'm not worried.. this was a dumb-
fuck company .. I know it's MCI ..

I thought you said that it was owned
by the military?

It was some military installation shit.
 not the army .. just some office or
some crap.. no big deal.. A really
stupid company .. if they can't figure
out in their phone system that I can
reach alliance, the most expensive
form of calling I make without the
help of the operator or w/o a calling
card, THEY ARE DUMB .. It's too serious
to be careless.. Trust me, they were a
lame company ..

i see..ah well..

so how much GREATER is your discovery
in magnitude? (Mine was pure LUCK)

i am not into head trips.  it doesn't
matter, what matters is that it works
.and is very simple. I discovered
another thing that every 15 yr old
would *kill* to have..actually,
*everyone* would kill to have this
other discovery. the 2nd discovery is
ten times better


Can you tell me ONE of the discovery's?
  I told u mine ... Exactly what I knew
on the system ... Oh.. the system had
one more thing I forgot to mention..
When calling the 800 # and hearing the
initial dial tone, dialing 199 would
give a SPRINT like TONE .. or an MCI
tone, whatever.. I couldn't figure out
how many cdigits the codes were

if I told you, everyone would be beggin
 me for it.  i would never have any
peace!

Well, the only way I can answer that
is "I won't tell ANYBODY AT ALL that I
even have this discovery" .. And if
people somehow manage to find that
much out (which they WON'T cause I
WON'T TELL), I'll never EVER EVER
mention your name .. EVER

sorry  this is my favorite toy. im not
done playing wiyth it yet.  when i get
b0red with it i will give it to you.

Ok.. How 'bout the 2nd discovery? (and
for either or both, can you just answer
me if they are on 800 #'s?)

the 2nd one is my toy. the 1st one, I
need..

ok.. but are they on 800 #'s??

one is, one is not

hmm.. the 2nd one is NOT I take it..
from the way you make it sound.. it
sounds like you figured out a back door
in a local 950 or something ..

perhap, but perhaps not..

well.. no biggie.. I'll wait 4 ya 2 get bored .. heh! :)

hehe. so do you have a new c0de line
up?

Not yet.. haven't checked if my other 2
boxes still work ..

Hmm. hang on a sec.

Both boxes still work ... so I can put
up another codeline at will .. but all
the lamer f*cks who call it don't
leave codes, so what's the point?

i wil get u some stuff to start it and
give the # to /<-rad people

the last time you did that, I had tons
of stuff from you on my line.. what
happened?? People said "Hey, thanx a
lot for the codes! But I don't have
anything now, but I'll get stuff soon
and post it".. a week goes by, 2 weeks
 a month, a year, a decade .. NO CODES
from these lamers.. They're just me,
er uh LEECHES ...


uh, u interrrupted me again,.  that's
annoying, but anyway, i will give the
# to  cool people this time.

sorry for interrupting u.. thought u
were done this time ... Well, I won't
let it out on ddial then if you can
get REAL people 2 call ...


ok, what's the #?

I'll set it up..should I used box 3308
or 3517?

3308..

ok.. 3308 it is then..

ok, what is the dialup?

1-800-877-8896

ok, got it.  hey I gotta split now,
(tired l00k)

ok... no prob.. I'm setting up my
codeline at this moment .. a codeless
codeline .. heh! :)

will post some stuff later..

Ok ... No prob.. and thanx in advance
for the stuff u'll post .. heh!

ok!  take care..

u too.. bye bye

bye!
=======================================

And here's a bit of info you might find
useful, contributed by my good buddy
THE SNETSMEISTER (203):

                          FRIENDLY INWARDS ????

     Operators can be friendly, if you
say the right words. Dial 0 on a non-
coin fone and say "Hello,this is HOBIC,
would you please connect me to Rate and
Route ?" Rate and Route is an inward
operator for the 716 area code. The
TSPS operator will dial KP716121 no
ama(no charge) and release the call
from his or her console. you can then
ask the operator to dial any number in
the 716 area code and she will think
that you are an operator and you will
take care of the billing. You have just
made a free call to any 716-XXX-XXXX.
REMEMBER TO SOUND LIKE AN OPERATOR,
SAY ASSISTANCE IN DIALING 716-XXX-XXXX
ON A NO RING. AS SOON AS THE FONE IS
RINGING, SHE WILL RELEASE THE CALL
FROM HER CONSOLE AND AS FAR AS THE
OPERATORS ARE CONCERNED, SOMEONE IS
PAYING FOR THE CALL.

                            SNETSMEISTER



(But what if you don't know anyone in
716? Hehehe... -GZ)

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
        *college-type stuff*


      I was walking about my campus
one morning when a rather disquieting
sight greeted me: An advertisement
from a fraternity seeking pledges
called TKE displaying a 6 ft tall
smiling blonde woman in a very scant
bikini. The text of the ad read:
"Tau Kappa Epsilon" at the top of the
page, and the words "Consider the
Possibilities" were printed next to the
picture of the woman.  How blatantly
sexist.  Naturally, I tore down
the ad, and patrolled the campus in 20
degree weather and tore down any other
copies of the ad I saw. I even saw
another girl tearing down one of the
offending ads, and another female
student wrote a letter to the editor of
the campus newspaper protesting the
ads before I got a chance to.
Also, the director of the Women's
Center wrote a letter stating, "The
offering of a disrobing woman by a
fraternity to its pledges suggest many
possiblities that could involve actions
that women find unwelcome.....In a
social climate that allows people to
tolerate, even accept, violence against
women, it is not only offensive but
also potentially dangerous to women
to present them as objects to be used
by the men who join a particular
organization".
     Right on, ladies!
     Another interesting development:
A new organization has popped up on
my campus. A "New Age" club. Jeez.
It calls itself "The Amethyst Unicorn".
How catchy. A poster advertising the
club lists subjects it deals with:
mysticism, herbalism, crystals, and
even the topic of nuclear disarmament
was listed along with the other
hairbrained items. I wonder.. Would
they use crystals to achieve nuclear
disarmament? Yeah, that's the ticket.
     This reminds me of a line from
a British movie I saw called "Sammy
and Rose Get Laid". Sammy and Rose were
a married couple with a circle of
radical/gay/just-plain-weird friends.
When Sammy's father (who was from
India) visits, a flaky, shallow female
friend of Sammy's asked his father
if he meditates. The old man sighed
and just said, "The world is like a
cultural department store to you
people. You just aimlessly travel to
each floor, taking something from each
floor to satisfy your egos". Sounds
like that this "New Age" junk is all
about. Just totally phony to me.
     But hey.. I'd better not rile
these "New Agers" up too badly. Maybe
they'll cast a spell on me (*gasp*)..

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

     * News From the Front.. *

     The Enforcer (502) was busted
along with 2 other teenagers local
to him. The three were busted for
making a total of over $40,000 worth
of fraudulent calls using a local TMC
dialup. The local telco had a trace
of incoming calls to the dialup, and
the outgoing calls on the service were
recorded with a pen register.  FBI
agents visited homes of the three and
confiscated all their computer equip-
ment, disks and notebooks.
      The local TV stations in
Kentucky had a ball reporting this
development, as this was the first of
its kind in that area.  In their
report of the story, they showed note-
books belonging to the three, as well
as some of their disks. The camera
made an emphasis on a disk belonging to
The Enforcer labeled "Fast Hack'Em",
making the viewers think that it was
some diabolical program used for
hacking. Fast Hack'Em is merely a file
copy program for the Commodore! Also,
that TV station is in a lot of trouble,
as one of the notebooks they shown had
the real name of one of the three
teenagers. This is illegal, for all
three are minors, and their real names
are not supposed to be released by
the media. Parents of the teen in
question are considering a lawsuit.
     Skyy King (317) was busted
recently, the main charge against him
being credit card fraud.  He used
credit cards to set up a Phone Base
account, for which MCI is pressing
charges.  He is also being charged with
toll fraud.
     Bill The Cat (317) was busted
for hacking codes on the recently-
abused Rockwell International PBX
(800-247-1028), and also for hacking
codes on his local MCI radius.
     The Arizona Kid (602) and Joe
Friday (918) were busted for toll
fraud as well.  The Arizona Kid was
caught using a variety of LD services
including SouthernNet and Sun,and
faces up to 7 1/2 years of prison.
     A lot of busts out there. Keep
your noses clean. They're out for
blood.
     And here's an interesting thing:
I received a mailing from AT&T asking
me to select their long distance 1+
service, saying that after 60 days
they would reimburse me for the cost
that NJ Bell would charge me for a
PIC change. And I noticed an inter-
esting thing: My name and address was
formatted on their mailing exactly
the same way it appears on my NJ Bell
telephone bill when I get it.  Also,
my telephone number appeared on the
mailing as 201 748 4005 with a 3-digit
code (called the "customer code", used
by NJ Bell only for records) next to
it, also identical to the way it
appears on my phone bill. I wonder
why NJ Bell is providing AT&T with
this information? I thought it was
illegal for them to favor one LD
carrier in its marketing like that. If
it's not illegal, it's at the very
least unethical.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Well, well, well.  We still have a lot
more stuff for you, but we decided
to release it in the next ATI, as we
don't want to make this one TOO long.

So look for ATI35 in a few days. It
will have my article on Doc
Telecom's and Raider's time in prison,
plus a few other surprises that I'm
sure you'll enjoy.  We have a 2-part
series on voice mail coming up,which
will probably appear in ATI35/36
or 36/37.

But anyway.. Take care, stay out
of trouble, and be creative.  And
we'll leave you with a song:


 (tune: 'safety dance')

 we can hack if we want to,
 we can commit computer crime
 we can transfer money from one
 bank to another on the
 president's private line

 we can phreak if we want to,
 call long-distance all the time
 with access codes and touchtone phones
 we'll never pay a doggone dime!
 we can hack, we can phreak
 hackers are taking control
 we can hack, we can phreak,
 phreaking from a telephone pole

 ma bell will try to trace us,
 but we'll stay one step ahead
 but don't call too much or
 you'll run out of luck
 and get busted by the feds!

 we can crack if we want to,
 getting wares before they're out,
 posting them on local ae lines,
 and every bbs in town

 we can hack, we can phreak
 hackers are taking control
 we can hack, we can phreak,
 phreaking from a telephone pole


       keep on hacking!
       Captain Hook, Somewhere, U.S.A.




Muahaha....

! 

Date:    Tue, 18 Apr 89 01:47 CDT
To:      TK0JUT1
From:    Gordon Meyer                                     <TK0GRM1>
Subject: ATI 35 (yes..I got thru to GZ at last)


    *****    *********    *******
   *     *       *           *
  *       *      *           *
  *********      *           *
  *       *      *           *
  *       *      *           *
  *       *      *        *******

   Issue #35   March 29, 1989
Happy Birthday to The Operator (201) !!


 **************
 ** YIPPIE!    **- - - - - - - - - - .
  **************                    /
 /                                 /
/                                 /
Activist Times, Inc. ATI is a
journalistic, causistic, /
   /cyberpolitical      /
  /organization,       /  4 more info?
 /trying to           /  send SASE
/help y'all          /  stamps???
change the world    /    to:
radically, in less /  ATI
than two minutes  /   P.O. Box 2501
...of course!    /    Bloomfield, NJ
- - - - - - -                   07003



Note the new address! Of course..
The only difference is that your lovely
correspondence will go to yours truly,
Ground Zero.

Ok, here's some of the correspondence
we've gotten lately. Keep the feedback
coming. We love to hear from our
readers, even if it's criticism.

.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.

From: Anonymous  Location: Unknown

Finally got all of ATI34... Just a few comments.

NJ Bell isn't "favoring" AT&T over the other carriers. It's merely engaging in
the common business of selling information on its customers. Name one business
that doesn't do this, I'll show you one missing out on a nice source of easy
profit.

The New Age club: is it any worse than any of the politically correct
movements (the New Age movement, that is)? A couple of days ago I went down to
the low-rent/low-iq/high-crimerate section of town and started collecting some
of the political posters. The following was taken from a flyer advertising a
feminist rally to oppose pro-lifers:
   The Link Between Forced Reproduction and Forced Sterilization!
   Speaker: Elizabeth Thacker from the Revolutionary Communist Youth Brigade
I won't bother with the rest; it was a paranoid ramble about how white males
were opposing abortion to force women into being sterilized as the only means
of birth control. I could give more examples, like a press statement from the
NAACP regarding a recent civil rights decion by the federal government
 The New Age movement is no worse than any other mass movement; in fact, by
your standards they should be the best. Don't they show concern for the
environment, the arms race, and poverty, and believe in Universal Love and
all the other things your average 60's-leftover leftist advocates but has
enough sense not to follow.

Regarding the Tau Kappa Et advocates but has
enough sense not to follow.

Regarding the Tau Kappa Epsilon poster: was it any more frightening than the
self-righteous censorship practiced by yourself and the other campus
feminists?

Question yourself as well as others


-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-

GZ's reply: I do question myself,quite
often, in fact. You brought up a good
point about NJ Bell, which I can agree
with.  However, your refernce to the
"low rent/low-iq" part of town shows
an obvious bias against the poor. And
I am all too familiar with the
Revolutionary Communist Youth Brigade,
which often takes extreme stances on
issues, but I must say that there truly
have been many instances in which the
poor have undergone forced steriliz-
ation. And you cannot deny the fact
that regular means of birth control are
not readily accessible by poor women.
If these methods were available to poor
women in the first place, there would
be little need for abortions or ster-
ilization. And as far as censorship of
the TKE posters, I believe that I have
the right to remove materials that are
both extremely offensive and, more
importantly, dangerous to women.

-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-

From: The Worm   Location: 203

I enjoy reading ATI very much. Are you the originator of this magazine?


:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:

GZ's reply: No, Prime Anarchist (203)
was the originator of ATI last summer.
When he went into the Army last
November, I took over the writing and
distribution, along with Fah-Q and
The Operator (201) and our staff,
consisting of Cygnus (203) and The
Happy Hacker (412), and other occasion-
al contributors. Thanks for your
continued support!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


Ok, now for something that I think
you'll enjoy. We don't have the Doc
Telecom/Raider article ready yet, so
we will grace you with an article on
UNIX which we hope you'll find very
informative. Don't flinch, just read
it. Maybe you'll learn something..

       ?"Striving for Unix Security"                 ?
       ?      Typed in by Nightcrawler for Activist Times, Inc.      ?
       ?   Originally presented in Computerworld -- March 20, 1989   ?

   Last November's well-publicized worm attack struck more than Internet's
Unix-based electronic mail system.  The operating system and AT & T, its
major developer, are also suffering from the impact.  Other potential
victims may be corporations and governments that have accepted Unix for
its functionality and portability.
   Unix has a reputation for being insecure.  But is it inherently insecure?
The question has enormous economic, political and techonological sensitivity
but it and others must be answered.
   The facts are that Unix's security depends on the version of the operating
system being used, what the systems administrator has established as controls
and what pressures for security improvements develop from the government
corporations and even AT & T.
   What are the security problems associated with using the Unix operating
system?  How can IS best safeguard information running on Unix-based systems?
What specific approaches to improving the security of Unix systems will be
effective?

      "Unix popularity"
   Secure or not, there is no doubt that Unix is popular.  The results of a
recent survey of Unix users indicate that the reasons for Unix's growing
popularity among users range from its portability and cost-effectiveness to
its proven success in other organizations.  Certain companies have little
choice in whether to select Unix, because the software programs best suited
for their needs are often Unix-based.
   According to the survey, the biggest barrier to increasing Unix usage is
the lack of trained technical expertise, the lack of compatibility and the
lack of application software.  Framingham, Mass.-based market research firm
International Data Corp. has cited the lack of proven commercial and
application software performance and the standards confusion as also working
against Unix.
   Interestingly, security was not mentioned once in the survey results, even
though the questions were asked in December, during the height of the publi-
city surrounding the Internet virus attack.  Yet security obviously should
be a concern to the more than two-thirds of the respondents who indicated
that they were using communications links between Unix and non-Unix systems
for file transfer, terminal emulation, Transmission Control Protocol/
Internet Protocol, and E-mail.
   Unix's popularity is partly because of the variety of Unix-based products
out today.  But because of the independent development work that has been
done on Unix, the user is often faced with the fact that one Unix product is
not always the same as another.  In reality, there are a number of Unix
versions that share only certain features and security vulnerabilities.
   Unix's ready availability and portability have caused it to be the
operating system of choice for both academicians and new companies develo-
ping computer systems.  Vendors that use it as the operating system for a
hardware platform tailor Unix to suit their own needs.  Usually this
tailoring occurs inside the kernel.

   "What is Unix, really?"
   Unix is composed of a set of tools and applications that run on top of a
base, or kernel, that handles the low-level functions.  The tailoring inside
the kernel would not be readily visible to users even though it may be
extensive.
   For example, Unix is notorious for having a file system that is hard to
repair and maintain.  Thus, some vendors completely rewrite the file system
internals in hope of improving their market edge and the stability of their
system.  While that vendor's system may be better, the result is that Unix
often becomes a label on a set of services that appear to be the same to
the user but are in fact very different inside.
   The University of California at Berkeley has become the center for much
of the academic development that is now the basis for one of the two major
versions of Unix available in the market -- Unix Version 4.2.  AT & T's
Unix System V, whose latest release -- Version 3.2, available since last
fall -- contains major improvements in security.
   The Berkeley and AT & T versions are similar in some ways, but they are
different enough to cause confusion.  While many of the basic tool kits
are the same, there are enough significant differences to warrant a parti-
tioning of the market.  Some vendors have chosen System V, and others have
chosen 4.2.  Not all of the applications running on one system run on the
other.
   The industry has recognized these problems and has, for this and other
reasons, tried to organize a "standard" Unix.  There are competing organi-
zations trying to create the standard Unix, including the Open Software
Foundation (OSF), Unix International, Inc., the Institute of Electrical and
Electronics Engineers (IEEE) in association with the National Institute of
Standards and Technolog (NIST) and X/Open Consortium Ltd.  The hope is that
standardization will help make the operating system more consistent and thus
more secure.
   As the standardization and security certification efforts heighten, more
and more inspection of the development process and the structure of the
actual code will be required.  So far, the lack of development controls has
created a potential for undesirable code to reside within the system and to
be difficult to find.
   But these weaknesses may also portend Unix's greatest strength: The
operating system's very openness and the scrutiny devoted to it will make
it difficult for the bugs to remain in place forever.  Since no single
vendor has control over Unix, no single vendor can control or cover up the
problems.  Over the next few years, most of the unknowns in Unix hopefully
will be understood and repaired.

      "Unix insecurity"
   The fact remains that Unix does have many sceurity vulnerabilities that
are well known to computer and network managers.  These weaknesses are also
well known to hackers, computer hobbyists and others who may be interested
in testing their technological skills.  They have easy access to published
articles, Unix documentation and bulletin-board information sources on
back doors into Unix.
   The Unix security problem is composed of Unix-specific and non-Unix-
specific elements.  Unix-specific sceurity risks are those inherent in the
architecture of th eoperating system and therefore are not likely to
disappear from most existing Unix systems in the near future.  Included in
this classification are the "superuser" user category, which provides
universal access, and the "setuid" and "setgid" system calls.
   Non-Unix-specific security risks are those associated with the normal
usage of computer systems and software.  On a Unix system, these can lead
to great damage because of how Unix functions.  Included in this category
are the risks in having software conatin back doors or Trojan horses as
well as unsecured physical locations where networks, computer rooms,
terminals, tapes and disks can be accessed by unauthorized persons.

   "Unix-specific issues"
   The inherent operating qualities of Unix create a vulnerability that opens
the doors to some security attacks.  For the Unix-proficient, these struc-
tures can be summarized in the superuser, setuid and setgid functions.  A
user who becomes a superuser is able to remove all the security barriers that
exist within Unix.  Thus, one problem deals with keeping unauthorized users
from becoming superusers.  This problem is common to a variety of Unix
systems and has a rather standard set of administrative solutions.
   Many of the tools and utilities in Unix need to change modes into
superuser for a brief period of time in order to reach some service that
the system calls.  When properly executed, these place the program executing
them into superuser status.  In most cases, such programs are well debugged
and there is little risk of decreasing the stability of the system.  However,
teh existence of a mechanism that allows the garnting of unlimited privileges
to some programs can be easily exploited.  The xeploitation can occur through
poor design or through maliciousness.  There are many documented cases of
poorlydebugged and/or maliciously designed programs being run in this mode
and creating inadvertent or intentional damage.
   In one case, an administrator wrote a program that, among other things,
allowed users store information in certain privileged directories.  The
program used a file, itself in a privileged directory, to control the
directories that were to be written into.  Unfortunatley, the file contained
an entry for its own directory.  A user saw this and rewrote the entire file,
giving himslef the ability to write into any directory in the system.  Were
he malicious, he could easily have placed viruses, Trojan horses, back doors,
or other programs in any system or user directory.
   Thus, any program capable of reaching superuser status needs to be care-
fully managed and certified.  In an environment that is open and free, what
often happens instead is that software can be passed from one machine to
another without proper certification.  In one experiment, a researcher gave
one such maliciously designed program to a nonprivileged Unix installation
user and observed its migration to the status of a privileged program within
a few days.
   Software travels quickly, and seemingly useful software travels even more
quickly.  Thus, while the mechanism within Unix can be safeguarded, it is
more difficult to ensure that the people around Unix will act with the
proper caution.

 "Non-Unix-specific issues"
   This scenario leads to the non-Unix-realted aspects of security.  There
are two popular methods for attacking a computer system -- a Trojan horse
and a back door.  These two types of attacks are used in many types of
systems, not just Unix systems.   A Trojan horse is a program that contains
code whose instruction is to do some kind of damage.
   For all practical purposes, the program provides some useful service.
However, it also contains logic that will do something other than what the
program was intended to do.  These Trojan hore programs have caused a
variety of damage, ranging from corrupting files to surreptiously sending
files across a network to someone who otherwise would not have access to
the transferred data.
   A back door is similar to a Trojan horse except that it is a piece of code
that is left behind to be triggered by an outside agent.  The person who
inserted the back door activates the code.  Once activated, it responds to
the commands of the intruder.  The Internet virus in the Unix E-mail system
allegedly came in through such a back door.
   In Unix, these and similar attacks pose special dangers because, by
judicious manipulation, the attacker can become a superuser and gain access
to anything in the machine.  These unsophisticated computer attacks can be
very effective in Unix, more so than in some other systems.

      "Other openings"
   In addition to ecternally produced Trojan horses and back doors, two
mechanisms within Unix are important to security.  When users enter a command
in Unix, the system searches for the program named by that command along a
search list of names defined by the variable "PATH."  If this search list is
altered in some fashion, everyday users can be invoking Trojan horse programs
that are disguised to look like standard programs.  In general, PATH is set
up to search through a standard set of drirectories for the program.  If PATH
is altered to search through a directory that has not been allocated privi-
leged status and does not belong to the user typing commands, then any
program placed in that directory could be chosen before the standard program.
Thus, one alteration to PATH can lead to an endless set of bogus programs.
   A security audit product currently on the market uses such a technique to
determine if the security of the system has been breached.  The security audit
program masquerades as the common utility "ls."  When "ls" is invoked, a
security audit is done in addition to the normal work "ls" usually performs.
While this use of the mechanism is for security reasons, other uses may not
be for that purpose.  Ensuring that PATH is not altered can control accidental
triggering of malicious programs.
   The sceond major security concern found within Unix is the connection of
the system to the network.  Unix systems, by and large, tend to be connected
to networks.  Hiwever, besides their valuable use as user and data
connectors, networks can also be thought of as vehicles for bringing in
uncertified software and sending out private data.
   Unix has many tools that will alow it to become part of the growing commu-
nity of newtwork users within the industry.  The Unix-to-Unix Copy Program
is one such mechanism that allows the system to send and receive mail and
script files from users on other systems.
   In addition, network file systems represent another threat by requiring
users to reach across the network for their file systems.  This intimate
link between users and their file systems can potentially be more easily
intercepted than when this communication takes place within a single internal
system.  The network in effect puts the Unix system out in the open, where it
may be more vulnerable to access attempts.
   Network connectivity also creates a need for adequate physical security.
Many precautions must be taken to provide enough security for a Unix system
just as for any other system.  While Unix's physical sceurity requierments
are no different from any other system, the availability of ways to connect
to other systems over the network, local or worldwide, makes physical
security harder to achieve than with other systems of lesser capability.

       "Securing Unix"
   While it may appear that Unix users are without protection, that is not
the case at all.  While Unix is not as strong as many in information
security would like, newer versions of Unix have improved security, and
additional tools are available to make Unix more secure.  There are also
future developments that will increase the ease of security management.
   Systems using Unix can be better protected.  Yet, they are only as secure
as their systems administrators allow them to be.  The security of any
operating system can be attributed directly to how well that system has been
administratively reviewed and secured.
   IS must set up accounts, create passwords, add new software to the systems
and give access rights to various pieces of data.  The dynamics of admini-
stering a system dictate ongoing change in the access and relationship of the
various accounts, files and programs.  Without careful and deliberate
execution, the best automated mechanisms can be subverted.
   Beyond the system administrators, the vendors of systems with known
weaknesses also have responsibilities to pay more attention to system
security.  They need to provide information and pass on timely patches to
their customers when holes are discovered in their systems.  They will have
to work to increase their systems' security to stem lost sales opportunities
as well as to prevent potential lawsuits, which, even if unsuccessful, can
become public relations nightmares.
   While there may not always be enough pressure put on vendors solely by
corporations requiring a secure Unix, the federal government has been quite
active in seeking ways to induce security within the vendor community. Over
the next few years, the government will strengthen the security requirements
of all the systems -- Unix or otherwise -- that it procures, and as
commercial vendors comply with these regulations, these products will become
available to the private sector.  Thus, systems purchased in 1992 should, in
all likelihood, have significant security improvements over today's systems.
In any case, the government-vendor cooperatie relationship can be examined in
a number of ways.
   The current conflict over standards affects Unix security, and that is
what links the vendor community with the federal government, which holds a
major stake in Unix security.  (The government purchased $1.93 billion worth
of Unix systems in 1988, with approximately two-thirds of that eramarked for
the defense agency.)  According to recent published reports, US Department of
Defense officials are so concerned about the security aspects of both AT &
T's System V and OSF's Unix offering that they may try to force the two
groups together to come up with an acceptable operating system.
   Recently, in response to the latest outbreak of computer viruses, the
Defense Department formed the Computer Emergency Response Team (CERT).  CERT
is a group of experts who will be available to fly to federal sites around
nation to assist in fighting viruses.  Last December, /Usr/Group, the Unix
trade association, applauded the establishment of CERT and suggested that the
computer industry supplement these government efforts by agreeing on standard
procedures for dealing with emergencies such as viruses.  The user group
recommended considering the best way to disseminate information when computer
networks are artificially congested through viruses or other exceptional
network problems.
   The government also supports Unix security improvements through its
testing procedures.  In late 1986, the National Security Agency's National
Computer Security Center studied a prototype secure system derived from
AT & T's Unix System V, Release 2.  The study assigned that system with the
B2-level of assurance requirements defined in the Trusted Computer System
Evaluation Criteria (TCSEC).  The study concluded that is possible to build
a B2, B3, or A1 system with an interface very much like that of Unix.
However, it also concluded that major problems exist with today's common
Unix implementations.
   Fortunately, vendors have started to respond to the government's security
concerns.  Several firms have announced secure versions of Unix to help them
capture contracts with organizations such as aerospace companies.  The
Department of Defense issued Directive 5200.28 last year, requiring that by
1992 virtually all multiuser computer systems meet at least the C2 level of
the TCSEC.  This level provides for need-to-know protection, audit capabi-
lity, and user accountability.  Certain vendors have announced that they are
seeking even higher levels of security.  AT & T's next release of Unix is
expected to have C2-level security features.
   In addition, the Department of Commerce's NIST, which develops standards
for the civilian agencies of the federal government and interfaces with the
private sector, has a Unix security project.  Posix is concerned with
security standards efforts associated with IEEE P1003.6, which is an
inetrface-specific standard.  The objectives and scope of this effort are to
establish functional interface standards consistent with but not limited by
the TCSEC.  Elements of Posix wil include basic security mechanisms, discre-
tionary access controls, auditability mechanisms and nondiscretionary access
controls.
   Without a doubt, Unix security will improve over time.  How it will
improve and the costs involved in increased security are less certain.
Those decisions await the push of an organized IS community.
   IS has a major stake in improving Unix security, but only such that the
security serves other IS needs.  If upgrading Unix security interferes with
information flow or complicates network management, it will continue to
receive insuffiecient attention.  A balance between production and protec-
tion will have to be addressed.
   IS managers have an absolute right to impress upon vendors their interest
in security improvements within certain rpoduct lines.  IS can also make it
quite clear to the Unix standards groups that these organizations must agree
on security as a priority area, aside from their other disagreements
concerning standards.
   Finally, IS can advise and work with the government to define the security
needs of the private sector.  Firms should get into both the definition and
decision loops at this time or be prepared to stand around and complain after
some very essential decisions have been made.  By that time, it may be too
late to do very much.
   The Internet virus attack brought Unix security problems out into the
open.  Ironically, the attack took place while major efforts were already
under way to improve the security of this operating system.  Eventually,
secure Unix may no longer be a contradiction in terms.

============================================================================


Did you like it? I hope so. Thanks a
bunch to Nightcrawler (516) for
contributing it!

Welp, that's all for ATI35. ATI36
will be out within the next week. We
promise. Look forward to a LOT of
good stuff. In the meantime, stay
cool, and remember....It's better to
be pissed off then pissed on!

Ciao...
! 
    ****     ********    ********
   ******    ********    ********
  **    **      **          **
  ********      **          **
  **    **      **          **
  **    **      **       ********
  **    **      **       ********
          c       i              n
           t       m              c
            i       e              .
             v       s              
              i       ,
               s
                t

Hi, We're Back!!
            Issue 36
May 1, 1989    
  >> Special May Day Issue!! << 
 /                                 /
/                                 /
Activist Times, Inc. ATI is a 
journalistic, causistic, /
   /cyberpolitical      /
  /organization,       /  4 more info?
 /trying to           /  send SASE
/help y'all, and us  /  stamps???
change the world    /    to:
radically, in less /   ATI
than two minutes  /    P.O. Box 2501
increments.      /     Bloomfield, NJ 
- - - - - - - - -                 07003
                                    
                                 
                                         
                          
Hello. Welcome to ATI36.  Tonight's a
night for insomnia and indigestion for
me, so what better time to write ATI36?
No time like the present!

Ok, first things first. I promised the 
Doc Telecom/Raider article for this
issue, which unfortunately I can't 
deliver. It's going to be a mammoth
project, because I want it to be really
excellent. I feel that a lot of people
can benefit from reading their story.
So, it WILL be done, and soon. But not
this time around. Sorry, folkz!

In this issue, we have lots of info for
you all: Illegal tapping by telcos,
Earth Day, Madonna, Phone terrorism,
media antics, and more.. First off, we
have Mad Pirate (201):
 * * * * * * * * * * * * * * * * * *

  Well, Here I am in my first real
excursion into writing for a large 
group of people. Here it goes.

I have a few really good Ideas on how
to get revenge on people...By thrashing
the insides of their motorized vehicle
engines... Here they are:

Car Engines

To really screw somebody's day up, 
you first get your  hands on some nice
steel filings. (The bigger the chunks
The faster it wreaks its damage) I
find that steel works better. You 
then pour the filings (about a cup 
or so) into a container large enough
so that you can add roughly a quart
of oil. Then mix this up,so that the
filings are equally suspended in the
oil, and pour the entire concoction
into the engine, as if you were
adding oil to it. The Person that
is driving the car will suddenly 
develop severe problems with their
car!

There are other ways to ruin a car...

Pour Water into the gas
Pour a water and sugar mixture into
the gas.

I'm sure there are many more ways,but
due to limited space,I can't print 
them all.


(II) Transmissions

Using aforementioned steel filings,
substitute transmission fluid for oil
and pour it down respective tube 
leading into transmission.



(III) Dirt Bike Engines (2-stroke)

To Kill a person's Dirt bike, pour 
sand, steel filings, or even a few
nuts and bolts into the crankcase,
via the oil port.

Another  particularly vicious way to
do in a dirt bike is to make a solution
of sugar and water,and add this to the
gasoline. When the engine is running,
it will evaporate the water. The sugar
will then solidify,and burn because 
the heat of the engine will cook it,
causing an ugly mess of carbon and goo
to form inside the cylander. Needless
to say,the person will not be very 
happy about this as the engine will
no longer continue to run.

If you have time to spare,you can drain
the gas which contains oil which lubri-
cates the piston while the engine is
running, and replace it with oil free
gasoline. The next time the person 
attempts to ride,his engine will seize.


Well,that's all I can think of for now.

And remember...Revenge is a dish that
               is best served cold.

                 ----------------
                 -The-Mad-Pirate-
                 ----------------
(If you need to get in touch with me,
to offer advice,suggestios on what to
write next,or whatever, call Red Phone
BBS and leave me E-Mail. The Number is
201-748-4005. Happi Hacking!)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       ---> Music Department <---

     After I took over producing ATI, I
noticed that we have been lacking in
the musical commentary that used to be
ever present in older ATI issues. So...
I decided to say a few words about pop
music, more specifically, Madonna's new
song. And where Madonna is concerned,
the term "music" is of course used 
very loosely (Pun intended!).

"When you call my name
It's like a little prayer
I'm down on my knees
I wanna take you there"

     NICE lyrics! Yeah, that's what we
can expect from Madonna. But her new
song and video, "Like A Prayer" tells
us things about Madonna we didn't know.
     We know that carries herself like
a prostitute. We know that she's the 
epitome of bad taste. And we know that
she has no talent nor class whatsoever.
But what we didn't know that she would
show disrespect for the church as she 
did in her video.  Now, I'm not a 
religious type, but I find the sight of
Madonna rolling around atop an alter to
be offensive. Not to mention the sight
of her smooching with a religious
statue that comes to life in the video.
Even worse is the sight of holes 
opening up in her hands resembling the
way Jesus' hands were torn by his being
nailed to the cross. Is she trying to
liken herself to Christ? I should hope
not. At least not in THAT outfit!
     We also didn't know that someone
as apolitical and as uninterested in
social issues would make a vain attempt
to use the issue of racism in her video
to promote her song. In the video, a
young Black man is accused of assault-
ing a white woman after 3 white men had
actually comitted the crime. Madonna
then skips into jail flipping her hair,
and has him released. And we wonder, as
Madonna sings out of key standing in
front of 5 burning crosses, why she's
attempting to cash in on this sort of
thing when her superficiality and 
insincerity obviously shine through.
     We don't know Madonna's motivation
for presenting such offensive trash.
But--what we do know is that Madonna
and her "music" are of little worth
or consequence.  Indeed...


!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Some brief news items I decided to
include:

It seems that a previous issue of ATI
gave some incorrect information. We
stated that Joe Friday (918) was busted
for toll fraud. This was incorrect 
because WE were lied to by a friend of
his!  It seems that Joe decided to let
out a false rumor of him being busted
deliberately. I asked Joe why he did
this, and his response was "becase I
was getting too many phone calls, and
I figured a bust rumor would scare them
into not calling".  Gee Joe, the rest
of the modern world CHANGES THEIR
NUMBER when encountered with that 
situation! 

                        
We here at ATI completely and utterly
disapprove of the intentional spreading
of false rumors, especially false bust
rumors. Since there is more than ample
confusion and panic in the phreaking
community, we feel that false bust
rumors add to the paranoia greatly. I
myself have observed that about 1/3
of the busts I've heard about were
completely fabricated, usually by the
person who was supposedly "busted"!

Apparently Joe Friday has run into a
windfall of computer equipment and put
up a "phreak" BBS. We will obtain the
number, call it and give you a full
report in a future ATI! In the 
meantime, Joe is invited to provide an
eager audience with his side of the
story. I'll give him the last word.

And here's an unrelated item: It has
been proposed that the NCIC's online 
records become expanded. The NCIC 
(National Crime Investigation Center)
is a governmental mainframe that 
receives millions of inquiries each day
by over 70,000 agencies. It provides 
info on people who have been convicted
of felonies.  But it's been proposed 
that the NCIC's records include info
on people who are only SUSPECTED of
committing felonies. If this is to come
about, some severe intrusions on 
privacy of millions of Americans will
come about. And if you're a political
activist, phone ohreak, etc.. expect
YOUR info to be in the NCIC soon.

If it's not already there..

Also: A 28 year-old investment banker
in NYC was attacked by as many as 12
youths in Central Park while she was
jogging. She was beaten over the head
with a pipe and other objects and 
raped by many assailants. Since then,
she has been in a coma, and after two
weeks is only starting to come out now.
There has been a lot of furor over the
attack. NYC mayor Ed Koch said, "We
will see how the justice system will
perform in this incident..", meaning
that some kind of "example" must be
set. Soon after he said that, eight
Black teens were arrested for the 
attack, ranging in age from 14 to 17.
They have been held without bail and
arraigned, and it has been reported 
that they said the attack was "fun"
and showed no remorse. 

Reverend Al Sharpton said that the 
teens should be "excused" from the 
crime due to their age and the fact 
that they grew up in a "bad" environ-
ment.  And recently, tycoon Donald 
Trump took out full-page ads in all
four major NYC newspapers saying, 
"Bring back the death penalty...Bring
back the police!", in huge bold print.
The ad preaches absolute intolerance
for the teens, and has made many 
people angry, including myself. What
right does he have to demand the death
penalty for criminals when he is one
himself? And what right does he have to
plaster his opinions everywhere just
because he's rich? What makes his 
opinion more important that anyone's?

Indeed, as Koch said, we WILL see how
the justice system performs in this 
case. Should be an interesting show..

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

And now, some more news items of 
interest written by Nightcrawler (516):
=============================================================================
      Nightcrawler's News from the Net
=============================================================================

Today's Independent newspaper contains an advert by BMW which provides yet
further evidence of the automative industry's flagrant disregard for the
possible risks associated with new computer-based technology.  The main text of
the advert is reprinted below, in its entirety, followed by a brief note of
some of what I regard as the more obvious risks.

 BEFORE A BMW WILL START IT WEIGHS UP WHO'S DRIVING
 
 First BMW brought you ABS, for safer braking in the wet.  Then came ASC, to
 help counter wheelspin during acceleration.  Today, they can unveil DWS:
 probably the most significant advance in anti-theft technology to occur in
 recent years.
 
 DWS stands for Driver's Weight Sensor.  A unique system that compares the
 driver's weight with a pre-programmed value stored in the sensor's computer
 memory.  If the two values do not match, the car simply refuses to start.
 
 Clearly, this represents a whole new level of anti-theft sophistication.
 But one that has only be made possible thanks to recent advances in space
 satellite PHAT technology.  This remarkable new material - Poly Halide Anodal
 Tritium - exhibits a highly predictable change in electrical conductivity
 according to the pressure exerted upon it.  By harnessing these properties,
 BMW's engineers have devised a wafer-thin pressure pad that, when
 incorporated into the driver's seat, can electronically assess the occupant's
 weight to within 10 grams accuracy.
 
 Such is the system's intelligence, it will take account of bodyweight
 variations that occur according to the time of day, or even the time of year.
 This it achieves by interlocking with the car's on-board 365-day digital
 clock.  Accurate allowance can then be made for weight increases that may be
 expected immediately after meal times, and those that are caused by
 multi-layer clothing during the winter months.
 
Despite its space age technology, the operation of DWS is simplicity itself.
 
 On entering the car, the driver inserts the ignition key, at which point the
 words ?Code Enter' flash up on the dashboard LED display. Up to five of these
 codes can be stored for five different drivers.  The driver now enters his
 personal code on the key pad and his weight appears on the light-up display,
 expressed in either pounds or kilos.  (Lady drivers who would prefer this
 visible display switched off should consult their BMW dealer, who will carry
 out the small necessary adjustment free of charge.)
 
 The sensor weight reading is then compared to the programmed weight in the
 memory, and providing this falls to within +-5%, the car will start normally.
 If, however, the figure exceeds these tolerances, then a discreet gong
 sounds, and the entire ignition system shuts down.
 
 Should persistent attempts be made to restart the car, an alarm system is
 triggered, and the headlights flash alternately until the unauthorised person
 vacates the seat and re-closes the door.
 
 At the same time a pre-recorded message is transmitted on the standard
 police radio frequency, notifying all walkie-talkie equipped police officers
 within 350 metres of the car's registration number.
 
If you'd like to know whether the Driver's Weight Sensor anti-theft system
 can be fitted to your car, contact your local BMW dealer, or post off the
 coupon below [to Hugh Phelfrett, BMW Information Service, PO Box 46,
 Hounslow, Middlesex, TW4 6NF].

Some likely risks:

Just when you have arrived back from a week-end backpacking, and are desperate
to get to MacDonald's before they close, the car is likely to refuse to
recognise you. (The opposite problem is perhaps not so bad - for example, it
would be good for you to be occasionally forced to walk or jog to
WeightWatcher's class.)

Suppose the car does consent to take you to MacDonald's, the weight display,
which I assume is dynamically updated, will be an additional and dangerous
distraction while you drive home eating your Big Mac. (A head-up display would
reduce this risk.)

A person's weight variations over the year are strongly correlated to cultural,
racial, and religious factors. Almost certainly, therefore, this system will
provide another example of "computerized discrimination".

There is even a security-related risk. By periodically dieting, a spy could use
the occasional transmissions of the pre-recorded message as a covert signalling
channel to a near-by embassy, say.

============================================================================

GALACTIC HACKER PARTY

                2nd, 3rd, 4th of August 1989
                PARADISO, AMSTERDAM, HOLLAND

During the summer of 1989 the world as we know it will go into overload.
An interstellar particle stream of hackers, phone phreaks, radioactivists
and assorted technological subversives will be fusing their energies into a
media melt-down as the global village plugs into Amsterdam for three
electrifying days of information interchange and electronic capers.

Aided by the advanced communications technology to which they are accustomed,
the hacker forces will discuss strategies, play games, and generally have a
good time.  Free access to permanently open on-line facilities will enable them
to keep in touch with home base -- wherever that is.

Those who rightly fear the threat of information tyranny and want to learn what
they can do about it are urgently invited to interface in Amsterdam in August.
There will be much to learn from people who know.  Celebrity guests with
something to say will be present in body or electronic spirit.

The Force must be nurtured.  If you are refused transport because your laptop
looks like a bomb, cut off behind enemy lines, or unable to attend for any
other reason, then join us on the networks.  Other hacker groups are requested
to organize similar gatherings to coincide with ours.  We can provide low-cost
international communications links during the conference.

For further information, take up contact as soon as possible with:

HACK-TIC                           PARADISO
P.O. box 22953                     Weteringschans 6-8
1100 DL  Amsterdam                 1017 SG  Amsterdam
The Netherlands                    The Netherlands

tel: +31 20 6001480                tel: +31 20 264521 / +31 20 237348
fax: +31 20 763706                 fax: +31 20 222721

============================================================================

PC WEEK (March 27, 1989) reports:

     "The recent rash of remote local area network software
     packages has thrust the PC industry into a national
     controversy over electronic monitoring and workers'
     rights to privacy.

     At question is whether or not products such as . . .
     Microcom Inc.'s Carbon Copy, which can be configured to
     allow undetected monitoring of PCs, violate workers'
     Fourth Amendment rights 'of people to be secure in
     their persons, houses, papers and effects, against
     unreasonable searches and seizures.'

     In answer to complaints from Massachusetts unions that
     workers' rights are being violated, the Massachusetts
     Coalition of New Office Technology (CNOT) plans to set
     up some guidelines to regulate employers who opt for
     electronic monitoring.  The group's first step is to
     file a bill with the Massachusetts Dept. of Labor that
     would force employers to notify job applicants of any
     electronic monitoring . . . and to inform workers when
     they are being monitored."

Carbon Copy is usually perceived as software which allows one PC to be
controlled from another remotely located one.  But programs like Carbon Copy
can be configured to observe network activity without a user's permission,
detection, or override.  Lisa Morel of Microcom reports that:  "the ones who
are asking about it [undetected monitoring] are the system managers."

While monitoring software can provide important network trouble- shooting and
tuning help, users may view its secret operation as "condoned tapping."
Monitoring differs from event logging.  More than recording what the user does,
monitoring software clones the user's activity on the observer's terminal.

Interest in using undetected monitoring programs may increase with growing
concern about network security and management.  These programs are not limited
to PC platforms.  Moreover, serious reservations reach beyond the nasty
business of how managers gather employee performance data.

o  The observer may monitor user access to organizationally
   sensitive information.

o  Secret monitoring conflicts with the Information Resource
   Management (IRM) principle of user data ownership.

o  From a lay legal view:

     -  In a Federal government environment (including
        contractors), secret monitoring of user access to
        personnel information could lead to violation of the
        Privacy Act of 1974 (Public Law 93-579).

     -  Undetected monitoring of a third-party's remote session
        could violate the Electronic Communications Privacy Act
        of 1986 (Public Law 99-508).

In efforts to preserve security and integrity, are system managers and their
parent organizations prepared to handle the ramifications of secret monitoring?
 
===========================================================================

Subject: Computer blunders blamed for massive student loan losses

Bank of America and possibly other major international banks stand to lose
as much as $650 million on bad student loans, due to computer problems at
United Education and Software. 

The 'Wall Street Journal' for Friday, March 10, provides the first hints of
details I've seen on the nature of the "computer blunders" which earlier
stories hinted at.  The article, by Charles F. McCoy and Richard B.
Schmitt, is headlined UNITED EDUCATION'S COMPUTER BLUNDERS FORM VORTEX OF
BIG STUDENT LOAN FIASCO.  Excerpts:

   Computers at United Education and Software, Inc. ... ran wild for at
   least eight months.  They rejected payments from overdue borrowers
   and addressed collection notices intended for New Yorkers to such
   places as "Radio City, N.Y.," among other gaffes.  United Education
   and its colossal computer mistakes are at the heart of what is
   emerging as one of the most tangled loan fiascos in years... 
   
   The U.S. Dept. of Education has refused to honor guarantees on certain
   federally backed student loans serviced by United Education.  That 
   raises the possibility that BankAmerica  or other banks that backed
   the loans with letters of credit will have to shoulder huge defaults.
   BankAmerica served as trustee on the loans...  [Other banks, including
   Citicorp and several Japanese banks, dispute how much of the liability
   might be theirs, saying BankAmerica is responsible.]
   
   United Education's beserk computer produced records that are so fouled
   up that nobody knows how much the losses eventually will be.

   United Education and Software, oringinally a trade-school operator, 
   began servicing student loans in 1983, and grew rapidly, developing 
   a portfolio of more than $1 billion in less than five years... The 
   computer problems apparently stemmed from United Education's switch 
   to a new system in October 1987.  According to officials familiar with 
   the problems, United Education's programmers introduced major software 
   errors and failed to properly debug the new system.

   Among the results, according to a Dept. of Education audit report:  
   United Education sent delinquency notices to students who were still 
   in school and thus weren't scheduled even to begin payments on the loans.
   It placed students who were supposed to have been granted deferments 
   into default.  It didn't inform many laggard borrowers that they were
   delinquent, while informing some current borrowers that they were.  The
   computers also apparently logged telephone calls that were never made 
   and didn't log calls that were.  United Education applied payments to
   interest when they were supposed to be applied to interest and principal...
   
   Aaron Cohen, president of United Education, called the depth of the 
   problems identified by the audit a "shock."  He said the company was
   aware of bugs in the new software that were causing accounting errors,
   but had no idea its loan servicing operation had run amok.  He thought
   any problems were routine.  "Software companies have problems all the
   time," he said...

------------------------------

Subject: Prisoner access to confidential drivers' records

From a story by Leo Wolinsky in the 'Los Angeles Times' 5-March-89:

  If the [California Governor] Deukmejian Administration has its
  way, state prisoners soon will be put to work sorting through
  confidential motor vehicle records as part of the governor's plan
  to keep inmates working and save taxpayers money.
  
  But the program, which is set to begin July 1, is prompting con-
  cern among some lawmakers and other officials who worry that the
  records -- which include names, addresses and some financial
  information about California motorists -- might end up in the 
  hands of career criminals.
  
  "The concept boggles the mind," said Assemblyman Richard Katz,
  chairman of the Transportation Committee.  "They may be car thieves...
  They may have killed people or molested kids and now we're going to 
  give them access to home addresses of people along with [information
  on] loans that they have on their vehicles and what cars they drive.
  It seems like an open invitation for trouble."
  
  .... No one is sure what illicit uses, if any, inmates might make
  of the information.  But the Legislature's nonpartisan analyst
  charged in a report that procedures employed by the state "may not
  be adequate" to ensure the security of the documents.  "From our
  position, there is a fair amount that could be done even with this
  much information," said [one of the report authors]....
  
  [In an earlier, now cancelled mail sorting job,] some corrections 
  officers said they believe the inmates were searching for addresses 
  of prison officials .....

PS. It is not clear from the newspaper article whether the records involved
would be paper or on-line, so, strictly speaking, this may not involve any
computer-based system RISK.

------------------------------
                VIRUS HITS HOSPITAL COMPUTERS
    
   A "virus" infected computers at three Michigan hospitals last
   fall and disrupted patient diagnosis at two of the centers in
   what appears to be the first such invasion of a medical computer,
   it was reported last week.
   
   The infiltration did not harm any patients but delayed diagnoses
   by shutting down domputers, creating files of nonexistent patients
   and garbling names on patient records, which could have caused more
   serious problems.
   
   "It definitely did affect care in delaying things, and it could have
   affected care in terms of losing this information completely," said
   Dr. Jack Juni, a staff physician at the William Beaumont Hospitals 
   in Troy and Royal Oak, Mich., two of the hospitals involved.  "It
   was pretty disturbing."
   
   If patient information had been lost, the virus could have forced
   doctors to repeat tests that involve exposing patients to radiation,
   Juni said.  The phony and garbled files could have caused a mix-up
   in patient diagnosis, he said.
   
   "This was information we were using to base diagnoses on," said Juni,
   who reported the case in a letter in the New England Journal of
   Medicine.  "We were lucky and caught it in time."

=========================================================================

Date: Tue, 28 Mar 89 08:06:39 PST 
Subject: Prank Virus Warning Message 

An individual placed a time bomb message on a government service system in the
San Francisco Bay Area saying, "WARNING! A computer virus has infected the
system!" The individual is learning that such a prank is considered almost as
funny as saying that you have a bomb in your carry-on luggage as you board a
plane.

Bruce Baker, Information Security Program, SRI International

===========================================================================

Date: Mon, 27 Mar 89 13:27:32 BST
Subject: Subversive bulletin boards

This week's (26 March.) Sunday Times (UK) has an article relating to a Bulletin
Board being run by a 14-year-old boy in Wilmslow, Cheshire, England, which
contains information relating to such things as making plastic explosives.
Anti-terrorist detectives are said to be investigating for possible breaches of
the Obscene Publications Act.  Apparently reporters were able to easily gain
access to this bulletin board and peruse articles on such subjects as credit
card fraud, making various types of explosive, street fighting techniques and
dodging police radar traps.  One article was obviously aimed at children and
described how to make a bomb suitable for use on "the car of a teacher you do
not like at school," which would destroy the tyre of a car when it was started.
The boys parents did not seem to think that their son was doing anything wrong,
preferring him to be working with his computer rather than roaming the streets.
A London computer consultant, Noel Bradford, is quoted as having seen the
bulletin board and found messages discussing "how to crack British Telecom, how
to get money out of people and how to defraud credit card companies.  Credit
card numbers are given, along with PIN numbers, names, addresses and other
details."

====================================================================

From: "David.J.Ferbrache" <davidf@cs.heriot-watt.ac.uk>
Subject: UK Computer Threat Research Association

For those of you interested an umbrella organisation has been established
in the UK to co-ordinate information on, and research into all aspects of
computer security. In the first instance one of the organisations primary
concerns will be combatting the threat posed by computer viruses by
acting as a clearing house for virus information and control software.

Below is a copy of an initial letter mailed to prospective members:

                        The Computer Threat Research Association

The computer threat research association, CoTra is a non-profit making
organisation that exists to research, analyse, publicise and find solutions for
threats to the integrity and reliability of computer systems.

The issue that caused the formation of CoTra was the rise of the computer
virus. This problem has since become surrounded by fear, uncertainty and doubt.
To the average user the computer virus and its implications are a worry of an
unknown scale. To a few unfortunates whose systems have become a critical issue.
The key advantage of CoTra membership will be access to advice and information.
Advice will be provided through publications, an electronic conference (a
closed conference for CoTra's members has been created on the Compulink CIX
system) as well as other channels such as general postings direct to members
when a new virus is discovered.

CoTra membership will be available on a student, full or corporate member
basis. All software that is held by CoTra that enhances system reliability,
such as virus detection and removal software, will be available to all members.
It is intended to establish discounts with suppliers of reliability tools and
services. A library of virus sources and executables and other dangerous
research material will be made available to members who have a demonstrable
need.

A register of consultants who have specific skills in the systems reliability
field will be published by CoTra and reviews of reliability enhancing software
will be produced.

Your support of CoTra will ensure that you have the earliest and most accurate
information about potential threats to your computer systems.

CoTra, The computer threat research association,
c/o 144 Sheerstock, Haddenham, Bucks. HP17 8EX

Part of the organisation's aim is to establish reciprocal links with other
similar organisations worldwide to facilitate the sharing of experience and
rapid flow of information on new threats.

To this end if you are involved in, or have contacts with, a similar
organisation in your country, please write to CoTra (or by email to me, and I
will forward your correspondence) outlining your organisation and its aims.

Yours sincerely, 
Dave Ferbrache, Dept of computer science, Heriot-Watt University, 79 GrassmarketEdinburgh,UK. EH1 2HJ  Tel (UK) 031-225-6465 ext 553  UUCP ..!mcvax!hwcs!davidf

==============================================================================

Guess what? We've run out of space!
So we will spill everything else we
have for you into ATI37. Go download

OK
it now....  OK?


HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY
HEYHEYhey, hey, hey, it's ATI!HEY
HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY
                     issue 37

A continuation of ATI36..         
May 5 1989 (Karl Marx's birthday!)

===========================
= info following brought  =
= on by a need for more   =
=  real information   =)  =
===========================

Warning!  A part of this issue contains
explicit language. If you are offended
by any such language, please do not
read! Or, read with an open mind! ;)

800-833-news National Student News
Service/ Hunger Campaign
303-499-7111 Atomic Clock

Speaking of phone numbers.. Here are 
some more BBSs that you can find 
issues of ATI online:

The Toll Center...........718-358-9209
Sycamore Elite............815-895-5573

Also,a fellow called "Steel Monkey" has
offered to send back issues to anyone
who has send mail thru the nets. Just
send him mail at tk0eee1@NIU.BITNET and
he will send you back issues of ATI!

Would you like a neat international BBS
to call? I thought so.. So call this
one in England: 011 44 217112620.

Speaking of BBSs....

        -*-  BBS Spotlight -*-
              Don Luby's
              ----------

         By: The Operator (201)

  How many of you have gotten deleted
from BBS's for being too offensive, or
fighting, or using a double handle?
Or maybe the fascist SysOp decided to
erase a bunch of messages because HE
decided he doesn't like them! Well,
now there's a BBS for all the people 
who WANT to be offensive, and all that
good stuff.....
  Don Luby's is run by a guy called 
'Central Scrutinizer' (Remember Joe's
Garage of Zappa fame?)...Just an
ordinary guy with the mind of a madman.
He put the BBS up for the people who
want to excercise free speech. One of
the most prominent groups on the BBS is
a bunch known at the SOEG (Sons of Ed
Gelb)...
  Ed Gelb was a fascist sysop back in 
the early-mid eighties...He ran a BBS
beautifully titled 'ED GELB'S DATABASE'
and loved to erase messages and kick 
users off his board for using foul
language such as 'damn' or 'crap'...
The SOEG is a group promoting and
fighting for free speech on the BBS's.
  Among the many facets of the BBS, 
there are things such as: Asshole of
the week, in which you can vote for 
the user of your choice to be AOTW...
A Law of the Land, which is enforced
by Sherriff Buford T. Justice, and if
caught and arrested (WITH A REAL
WARRANT!!) You must appear in one of 
the three courts to plead your case.
If found guilty, you can spend time
in 'Jail' which restricts all 
sub-boards except one called 'Jail'...
There are vote questions, odd subs,
port to port chat, everything a user
could ask for except a free set of
china...
  Be sure to call it! 24 hours,
300/1200 baud. Users over 16 please.
This BBS is excessive when it comes
to foul language and adult situations,
so HBO will show this feature only at
night....

Port 1: 201-751-5732
Port 2: 201-759-0169

Don Luby's..Where everyone's an asshole.
Tell 'em The Operator sent ya...

Here's a little song written by the 
sysop of Don Luby's, Central Scrutin-
izer, also known as Dead Ed:


     "The Iron BBS 7590169"
      By: DEAD ED-RD54
    On: Thu Jan 12, 1989 11:25 PM
    LR: Sun Jan 29, 1989  1:47 PM
      -- 1 Response --

There is a board called Don Luby's...
Some call it a rising scum...
And it's been the ruin,
Of many a poor boy,
And God I know, I'm one.

My mother was a hooker,
She sold herself for beans,
My father was a retarded man,
I'm the product of their genes.

So if you can't get along so well,
Or maybe you're a little deranged...
Just come on down to Don Luby's...
And wear that ball and chain.

Oh mothers...tell your children,
Not to do what I have done...
Spend their lives in pain and misery,
On the board of the rising scum.

Now there IS a board called Don Luby's
And maybe it's bucket of scum,
And sure it's ruined a few little boys,
But hey, we have us some fun.

(201)759-0169/751-5732
The BBS for assholes...the BBS for YOU

 ($) ($) ($) ($) ($) ($) ($) ($) ($)

"Terrorism of a 976 Phone Sex Chatline"
      
     "Hi, who's out there?", asks a 
sultry female voice. 
     "Thomas".
     "Hi, Thomas", says the voice.
"What are you doing right now?"
     "Playing with my dick".
     Suddenly, a loud British voice 
breaks in. "Yes, they're all playing
with thier little schlongs!", blares
the voice.
     At that point, the sounds of DTMF
tones being hit was heard throughout
the line. This meant that the chat line
operator was searching through the line
taking each caller briefly into private
so she could find and cut off our 
"British" friend.
     Beep.
     "No, try again, bitch!"
     Beep.
     "No, try again!"
     Beep.
     "You can't cut me off!"
     He finally gets cut off, but some-
how he gets back on the line in a 
matter of about two seconds-much faster
than it would take to hang up and call
the line back.
     "Mmmmmm...", moans a caller.
     "Ohhh.......", moans another.
     "Mmmm...So would you like to pinch
my nipples?", asks Nikki, the chat 
line's operator.
     "Yes, pinch those nipples! Use
wirecutters if you've got to!", screams
the "Brit".
     Beep. Beep.
     "No, you can't get rid of me!", he
yells.
     Beep. Click. He's gone.
     But suddenly, again,in a matter of
about 2 seconds, the disruptive British
fellow was back.
     "Oh yeahhhhh.. Nikki's gonna suck
on that nice juicy cock of yours. Would
you like that?", says Nikki.
     "Oh yeahhhh!" moans a caller.
     "Yeah!", cries another.
     "What a bunch of complete losers!"
yells the Brit.
     "Hey fuck off, asshole", says one
of the callers. "You're the loser".
     "You're calling ME a loser when
YOU'RE the one who actually pays 2
dollars to talk for 3 minutes to some
fake girl and pull your little dick?",
shouts the Brit.
     "Ah fuck you", says the caller.
     "Remember guys, these operators
you're talking to are midget, quadro-
plegic, fuzzy-faces Eskimo women",says
the Brit.
     "Who are you, anyway?", grunts the
caller.
     "My name is Colin" says the Brit,
as he gets cut off.
     And again, Colin is back on the 
line in about 2 seconds.
     "So", says Nikki, "Would you like
me to ride that nice hard cock of
yours?"
     "Ohh..", moans a caller.
     "Yeahhhhh", groans another.
     "Stop stroking your little tiny
dicks! You'll get more hair on the 
hair on your palms!", yells Colin.
     "Why do you keep calling back?",
asks Nikki.
     "Because I'm bored!", shouts he.
     "Don't you have anything better 
to do? Don't you have a girlfriend?",
asks Nikki.
     "Yes, she's standing right next
to me and thinks this whole mess id
bloody hilarious!",answers Colin.
     "Isn't she jealous that you're
calling here?",asks Nikki.
     "No, because she knows why I'm
calling", says Colin. "Besides, she's
a lot smarter than YOU. She goes to
college and is learning about Psycho-
gy unlike YOU. What are you doing with
your life? You just sit there every day
and moan to a bunch of perverted slobs
who want to get off. All you are is a
techno-prostitute!".
     "Hey look, asshole, why don't you
just hang up already?", yells an
exasperated caller.
     "No, I'm NOT ging to hang up! No
one's going to come whils Colin's on
the line! And you're all going to lose
your tiny little erections!"
     Colin gets cut off, but again 
magically reapprers.
     "That's right!", he shouts. "Colin
is on the line! Everyone's going to be
really angry because they didn't get
off, and tomorrow they'll still be 
retaining last night's sperm".
     A wave of confusion upon the line.
Colin kept insulting the opertors and
callers, while he kept getting cut off
and returning to the line without 
delay.  But after a while, Colin 
becomes bored of terrorizing the chat
line and decided to leave it alone for
the night.
     Colin returned to the line a few
times after to that to cause more
mayhem. Of course he elicited the same
frantic behavior from the callers and
the operators.
     How was Colin able to almost 
constantly be on the line while the
operators were constantly disconnecting
him?  Well...we'll keep that one a 
secret. But, do take note of this item:
It seems that the California 976
exchanges can no longer be reached 
through AT&T.
     Is it because of Colin? Who knows!

-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-

Here's something a person encountered
while he was attempting to hack long
distance authorization codes by using
a computer hacking program:

RINGING

RINGING

BUSY
atx0

OK
atd

CONNECT
WARNING!Your call is being intercepted
 
  Error:   Setting may not be changed
by callers

/-------------------------------------
---------------------------------------
                                    )
(  Welcome to:  S o u t h e r n N e t
   I n c .                     )
(                                            You have reached the SouthernNet
Fraud Department, the authorization
code you are attempting to use is not
valid.  Hacking and illegal use
of codes are violations of state and
feeral laws.                      )
(                                                                       )  (          We are currently conducting an
investigaion for code abuse in your
area and we are coordinating the
investigation with law enforcement
authorities. Persons identified hacking
or abusing codes will be 
prosecuted to the full extent of the
law.
                                        
(                                             I'll see you soon,            )
                                                                                       Hacker Tracker
                 )
(                                                                             )--------------------------------------
-------------------------------------/
Hold for additional information
                                                                                                                        --------------------------------------
--------------------------------------\
(      Hacker Tracker is unavailable
right now; however, you may avoid
possible  arrest and/or prosecution
by calling Hacker Tracker in person. )

                                             You may contact Mr. Tracker
between the hours of 9:00am and 
5:00pm EST, Monday - Friday, simply
by dialing the access number 
you have just used and code number
101010 or 011010 if the access #
you have used requires a seven digit
code . Just hold the line for 
10 seconds and your call will
automatically be routed to Mr.
Tracker at no charge to you.
                                                                                                                                     )
     This is NOT a trick and IT WILL BE
THE INTENTION OF SOUTHERNNET INC.
TO SETTLE THIS MATTER WITHOUT INVOLVING
LAW ENFORCEMENT AUTHORITIES IF YOU
COOPERATE WITH OUR FRAUD DEPARTMENT
100% .                        )
(                                                                             )
(   It will certainly be to YOUR
advantage to contact Mr. Tracker as
THIS WILL REFLECT YOUR OWN DECISION TO
AVOID POSSIBLE ARREST AND\OR PROSECU-
TION BY OUR COMPANY!!!
                                                                                                                     )
   I'll be expecting your call.
                                                                                                                )
(                                             Hacker Tracker                 )
\--------------------------------------
--------------------------------------/
     Hold a sec..... Engaging Auto Page
for Hacker Tracker                
            
     50 seconds til disconnect
     40 seconds til disconnect
     30 seconds til disconnect
     20 seconds til disconnect
     10 seconds til disconnect
      5 seconds til disconnect

NO CARRIER

Well.. Wasn't that special? I have
tried to reach Mr. Hacker Tracker by
calling several offices of SoutherNet.
I managed to find a fraud dept. office,
but no one ever answers the phone. I'd
sure love to interview the genius who
thought up the above scheme. I'll keep
trying, folks!


And now, it's time for more news by 
Nightcrawler (516):

News articles for Activist Times Inc. Newsletter --
Reported from various sources...

                'Retail group in antivirus role"

At the request of specialty-chain MIS executives, the National Retail
Merchants Association in New York has agreed to become a clearinghouse for
information about computer viruses in general merchandise retailing.  The
Retail Virus Control Center is charged with recording reported virus attacks
on retail communicarions networks and with collecting and distributing
information about products and methods that can be used to ward off or
recover from the effecst of a virus.

            "Cornell delays release of virus report" 

Ithaca, NY -- Cornell University officials have completed a lengthy report
that details how the university's computers were used to inject a worm into
the Internet computer network last November but have delayed publicizing the
finding pending any criminal action.
   The report will not be made public until after the US attorney here
decides whether to charge Robert Morris Jr., the Cornell computer science
graduate student believed to have masterminded the worm attack, university
officials siad last week.
   "My hope had been to release this report in full after I had an oppor-
tunity to review it," Robert Barker, Cornell University's provost, said in
a prepared statement.
   "However, based on discussions with university counsel and at the specific
request of the US attorney and the attorney for Mr. Morris ... I have decided
to delay release of the report until the US attorney decides the legal
actions he intends to pursue in this matter," Barker said.  "At that time,
the report and all of its appendices will be made available for public 
inspection."
   Barker also said that he would reconsider March 31 whether to release the
report if Frederick Scullin, the US attorney here, has not announced what 
legal action he intends to take.  "I fully appreciate that the scientific
community deserves to know of the findings of the investigation," he said.
   Morris could not be reached for comment.  He is on a leave of absence from
Cornell and is reportedly staying at his parents' home in Arnold, Md.
   Thomas Guidoboni, a Washington, DC, attorney representing Morris, con-
firmed that he wrote a letter to Cornell University legal advisers expressing
concern that the report, if it placed the blame on Morris, would influence
his right to a trial with an impartial jury.  "While I did not see the
report, my view was that it might be prejudicial to Morris," Guidoboni said.
"Apparently, the US attorney had concerns as well."
   Scullin and US Department of Justice officials in Washington, DC, did not
return telephone calls seeking comment on the case.
   Cornell's report, which is between 160 and 200 pages including appendices,
was compiled by a committee of university officials headed by Stuart Lynn,
vice-president of information technologies.  "It goes into the involvement of
Cornell's computers, the role that Morris is alleged to have, Unix security
and other issues related to networks," said Dennis Meredith, a university
spokesman.
   A university disciplinary board will determine what actions, if any, it
will take against Morris after the report is released, Meredith said.
   Justice Department officials are reportedly divided on whether to allow
Morris to plead guilty to a misdemeanor or to prosecute him on more severe
charges as a deterrent to computer crimes.
   If the US attorney [in Syracuse] had a clear view of this case, he would
have made a decision by now," Guidoboni said.
   The decision will be made by Justice Department officials in Washington,
DC, he added: "They are the ones who are dragging their feet.  They are more
interested in getting robbers and dope sellers; that is more important than
getting Robert Morris.  He is not some criminal kingpin.  Robert would like
the issue to be resolved, but I am not surprised that it would take this
long.

   "Hacker pleads guilty to computer violations, is denied bail by judge"

Los Angeles -- Kevin David Mitnick, the hacker deemed too dangerous to be let
out on bail, pleaded guilty to two criminal counts last week.
   In early January, Mitnick was detained under strict measures at the
request of prosecutor Leon Weidman, who asked the court to view him as a risk
and a danger to the public.  The US Attorney's Office asked the court to deny
him access to telephones for fear he may have preprogrammed a computer to
trigger programs with a phone call, according to Weidman.
   Mitnick pleaded guilty to two counts: computer fraud, for entering Digital
Equipment Corp.'s computer system, and breaking federal law by having more 
than 16 unauthorized phone access codes.
   Under the original indictment, which included defrauding MCI Communica-
tions Corp. and transporting stolen information across state lines, he faced
30 years in prison.  Mitnick pleaded not guilty to the original charges in
January.
   Both the US Attorney's Office and Mitnick's Lawyer agreed that in exchange
for the plea, Mitnick would serve one year in jail and three years probation,
according to a spokeswoman for the US Department of Justice.  They are 
reccomending that the court follow the agreement.  Mitnick is scheduled for
sentencing in late April.
   The gargain was struck after it was determined that damages to DEC, 
including downtime and searching for the intruder, amounted to between
$100,000 and $200,000, not the entire $4 million originally identified in
court documents, according to the spokeswoman.
   While still in jail awaiting sentencing, Mitnick will be allowed to use
telephones without direct supervision, a privilege he was denied while being
held since his early December arrest.

        "TV news execs ousted after hacking charges from rival"

Tampa, Fla. -- A Florida television station fired two news executives in the
wake of reports that one of them allegedly penetrated a rival station's
computer system and stole sensitive information.
   WTSP-TV (Channel 10), an ABC  affiliate in St. Petersburg, announced last
week that it had fired Assistant News Director Michael Shapiro and News 
Director Terry Cole.
   Shapiro was arrested Feb. 7 on felony charges for allegedly breaking into
a computer system at WTVT-TV (Channel 13) on at least six occasions in
january.  He was once employed by WTVT as an assistant manager and was
responsible for administering the station's computer systems.
   Law enforcement officials seized from Shapiro's home a personal computer,
200 floppy disks and an operating manual and user guide for software used at
the rival station.
   He has been charged with 14 felony counts under Florida Statute 815, 
which covers computer-related crimes.  Each count carries a maximum sentence
sentence of 15 years and a $10,000 fine.
   Vince Barresi, WSTP's vice-president and general manager, refused to 
comment on the two firings.  However, in a prepared statement, he said that
he told viewers during an 11 PM newscast last Tuesday that the station acted
to "avoid any questions about the objective way we do our business in keeping
the public informed."
   Cole, who hired Shapiro last September, has not been charged by Florida
law enforcement officials.  He was fired, according to one source, because as
director of the news room operations, he is held ultimately for the actions 
of news staffers.
  Shapiro and Cole were unavailable for comment.

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Abbie. I can't find the words to 
express how I feel about his death.
He was a great person, one who was an
outspoken activist and remained so
while others in his generation came
to abandon the fight. He wrote many
books, and never stopped lecturing at
colleges around the nation, trying to
get the younger generation to work
for a better world as he was.

We may soon have a full article written
by a friend of mine. We will release it
as soon as we get it.  In the meantime,
read the article People magazine had
on him. It's in the May 1st issue, the
one with him on the cover.  I never 
thought I'd reccomend that anyone read
People with any seriousness, but I feel
that the article they wrote was good.
And I'd also like to share with you 
something taken from Usenet:

Path: jolnet!killer!rpp386!texsun!pitstop!male!sun-arpa!ames!rex!uflorida!gatech!udel!rochester!kodak!doering
From: doering@kodak.UUCP (Paul F. Doering)
Newsgroups: talk.bizarre,alt.activism,talk.politics.misc,talk.rumors
Subject: In praise of Abbie Hoffman
Message-ID: <1844@kodak.UUCP>
Date: 20 Apr 89 18:19:01 GMT
Reply-To: doering@kodak.com (Paul F. Doering)
Followup-To: talk.bizarre
Distribution: na
Organization: Kodak Research, Rochester NY
Lines: 30

The unexpected death of Abbie Hoffman has triggered some articles on
the net, some of them a bit absurd.  Something factual needs to be
said, something reasonable, something decent.

When he was under cover, Abbie lived 5 cottages away from my place in
the stretch of the St Lawrence River know as The Thousand Islands.  I
knew him there as Barry Freed.  He was a neighbor in all the good
senses: caring, involved, unintrusive, helpful, pleasant, gentle.  He
was a great cook, and at our picnics he would always show up with a
dish that clearly represented a lot of hard work.  You may know that
he spearheaded the growing concern for the quality of the river and
was a founder of  Save The River, a citizens' group active and
successful today, a kind of unintended memorial to Abbie, surely a
positive force in resisting exploitation and promoting conservation.

It is strange that he and I should have been cooperating neighbors,
because I have been characterized as being slightly to the right of
Ghengis Khan.  My opinion of Abbie's activities in the late 1960's
was formed through the filter of the media and is unreliable.  My
opinion of him in his recent years is first-hand, and I say: the
world does not have so many worthwhile people that it can afford to 
let even one pass unpraised.  I'd trade a bunch of my so-called
conservative allies for just one Abbie Hoffman.

And so we grow....
. . . . . . . . . . . . . . . . . . . .

On April 23rd, I attended a march/rally
for Earth Day.  I marched at the front
part of the procession, and stood in
the front row of spectators at the 
rally. The speakers were marvelous, and
performers like Roger McGuinn (of the
Byrds) and Richie Havens were inspiring
and excellent. Over 10,000 people
showed up to show their displeasure 
over the Exxon's Alaskan oil spill and
the overall corporate greed polluting
our land and waters. One of the 
speakers was a Maine woman who lost
her 2 year-old son one Christmas due
to pollution.  Another speaker read
parts of Exxon's message to stock-
holders after the spill. The message
said nothing that showed any concern forthe environmental effects of the spill.
Nothing about the carnage of animals
and birds killed by the spill. The
message only assured that profit loss
was minimized. Can you believe it?

Before the march started, McGuinn and
Peter from the 60's group Peter, Paul
and Mary did a duet of a song I have
always loved:

...How many times must a man look up
Before he can see the sky?
How many years must one man have
Before he can hear people cry?
How many deaths will it take 'till he
  knows
That too many people have died?

The answer, my friend
Is blowing in the wind
The answer is blowing in the wind..

How many years can a mountain exist
Before it is washed to the sea?
How many years can some people exist
Before they're allowed to be free?
How many times can a man turn his head
And pretend that he just doesn't see?

The answer, my friend
Is blowing in the wind
The answer is blowing in the wind...


That one's dedicated to Abbie, 
whereever he may be. And that's all
for ATI37.  The struggle continues.


Hey look, man!  It's....
       
    ****     ********    ********
   ******    ********    ********
  **    **      **          **
  ********      **          **
  **    **      **          **
  **    **      **       ********
  **    **      **       ********
          c       i              n
           t       m              c
            i       e              .
             v       s
              i       ,
               s
                t


Issue #38... May 28, 1989
    Special Enviromental Issue!       
               

 Activist Times, Inc.. a voice for the
people in an age of silence.. 

Write to us:  Activist Times, Inc.
              P.O. Box 2501
              Bloomfield, NJ 07003

Call us:  512-262-9519, box #1300

Yes, we have a new (100% legal) voice
mailbox, on which you can leave your
messages of praise, ragging, or 
proposals of marraige and other offers....Heh. ;-)

Ok folks. Welcome. First up we have a
letter from Prime Anarchist, the 
originator of this publication:

    Dear ATI, 
                                      
   How's it going?                    
   It's been awhile since I've seen a copy of the old ATI, and I'm
impressed.  The new ATI is just as good as the old ATI.  Keep up the good
work, people.  I'll be looking forward to each new article with batied breath
and ready eyeballs.
   I've been real busy wih a bunch of projects that have pretty much kept me
unable to send along tidbits, but things should be just slack enough that I
can start participating again.
   I've been reading a lot at some of the local bars here, and my poetry's
seeming to get good response.  I'm writing a lot of killer music with a copule
friends of mine, so expect good things there too.
   And mostly, I've had a chance to do a lot (pronounced beaucoup) of
travelling.  Which means I get to see things on a much more global plane. 
"Plane", ha ha- I like that.  I didn't realize how well that last paragraph
worked.  Neato.  
   At any rate, I'll close with a couple thoughts. 
  Keep in mind- as electronic as something gets, it's still electric.
   Bumper sticker:  "HAVE YOU HUGGED BEHIND A CAR LATELY?" Sponsored by ATI,
American Tailgaters Institute.
   Once you get in touch with your own violent nature, then (and only then)
can you be a peaceful person.
   Try not to read Rimbaud unless you are sitting on stone steps.  It could
be devastating.
   No, that wasn't me in the Village Voice picture.  (Too many people have
been asking.)
   I think they should give payphones some kind of memory. 
  Oh well, that's about all for this minute.  More promised later. 

 Sincerely, 
  The Prime Anarchist (412, 516, 976, 213, 001)                                   

Next.. a few words on nuclear energy:  

FoE Energy Campaign press release

EMBARGO: 11.00 a.m. Wednesday 19 April, 1989
           "Nuclear power adds to threat of global warming"
Nuclear power produces up to 4 times more carbon dioxide (CO2) than
equivalent electricity production by renewable energy options and
nearly 20 times more CO2 than reducing demand through energy
efficiency measures, claims Friends of the Earth (FoE) today.

In an addendum to evidence to the House of Commons Select Committee on
Energy (1) FoE demonstrates that, while nuclear power produces much
less CO2 than fossil-fuel fired power stations, it is by no means
"CO2-free". Energy used in mining and preparing uranium fuel for use
in nuclear reactors produces CO2 and thereby adds to the threat of
global warming. Other energy policy options produce far less CO2.

In particular:

Producing 1000 MW of electricity emits the following amounts of CO2,
taking into account related mining and fuel producing processes:

Coal-fired power station -  5,912,000 tonnes per year
Nuclear power station    -    230,000 tonnes per year

Hydro power scheme  -     78,000 tonnes per year
Wind power scheme        -     54,000 tonnes per year
Tidal power scheme  -     52,000 tonnes per year

Reducing demand for electricity by 1000 MW through energy efficiency
measures, using the same energy analysis technique, emits the
following amounts of CO2:

Loft insulation          -  24,000 tonnes per year
Cavity wall insulation   -  23,000 tonnes per year
Low energy lighting -  12,000 tonnes per year

As the addendum says;

"Hence, in terms of devising solutions to counter the greenhouse
effect caused by carbon dioxide, both renewable energy sources and
energy efficiency measures offer the greatest benefits."

In addition, attempts to expand nuclear power capacity to replace
fossil-fuel fired plant to make any significant impact on the
greenhouse effect would run into problems of declining uranium ore
grade as world resources are depleted. The lower the ore grade, the
more energy required to extract and process it and the more CO2
released. At ore grades of between 1 and 100 parts per million the
amount of CO2 released rises to levels equivalent to coal-fired power
stations.

The addendum states;

"..nuclear power cannot be regarded as a sustainable solution to the
problems caused by carbon dioxide emissions."

FoE Energy Campaigner, Simon Roberts said;

"Even if we could ignore all of the other problems of nuclear power,
this work shows that nuclear power is way down the agenda of possible
solutions to the greenhouse effect. Friends of the Earth's evidence
shows that an energy policy to combat the greenhouse effect must be
based on energy efficiency and the development of renewables because
these options release far less carbon dioxide and they tap a
sustainable energy potential."

(!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) (!) 

      psychobabble dept..

Those of you who are students of human
nature such as I might enjoy
these little tidbits. Fritz Perls wrote this following item called the
Gestalt Prayer, which is part of the Gestalt school of psychology. It was
meant to be an ideal model for human relationships:

I do my thing, and you do your thing.
I am not in this world to live up to your expectations, 
And you are not in this world to live up to mine.
You are you, and I am I;
If by chance we find each other, it's beautiful.
If not, it can't be helped.


And, in an issue of Rough Times, this
response to The Gestalt Prayer
was printed:


          The Getsmart Prayer

I do my thing, and you do your thing.
I am not in this world to live up to your expectations,
And you are not in this world to live up to mine.
You are you and I am I;
And if by chance we find
Our brothers and sisters enslaved
And the world under fascist rule
Because we are doing our thing-
It can't be helped?


Neato. That one was my favorite. And here's a more humorous version:

       The Geatlat Prayer

I do my laundry, and you do yours.
I am not in this world to listen to your ceaseless yammering,
And you are not in this world for any discernable reason at all.
You are you, and I am I, and I got the better deal.
And if by chance we find each other, it will be unspeakably tedious.
Fuck off.


Hahaha. Now, here's my own version:

       THE GROUND ZERO PRAYER

I watch my MTV, you watch your WWF wrestling.
I am not in this world to live up to your expectations,
Because I'd rather go to the mall.
You are you and I am I: products of a
military-industrial, capitalistic, 
 comsuption-oriented, commercialized society;
And if by chance we find
The world worn out by nukes, war, exploitation, racism, sexism, pollution,
disease and poverty
Because we refuse to think and take positive action-
It can't be helped?


What can I say? I was INSPIRED...  >8-)


-*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*- -*-  

And now, here is the address of a political newsletter that you might want to
check out:

The Seditionist
c/o Incendiary Publications
P.O. Box 210095
San Francisco, CA 94121-0095


It's an anarchist publication, and reports a lot of interesting items that
you might not hear about otherwise. For example, back in early March, they 
wrote a piece on David Duke, a state senator in Louisiana who was an ex-grand
dragon for the KKK and the founder of an organization called the National 
Association for the Advancement of White People.  This was months before 
talk-show host Phil Donahue decided that the issue of a blatant racist holding
a public office was important enough to be addressed on his show.  

Check out The Seditionist.. They do report items that do not get reported in
the mainstream media.

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

And now, some items of interest from Nightcrawler (516):

From the 4/7/89 Boston Globe:

"Some Bostonians are having the time of their lives eavesdropping on
Nynex Mobile Communications cellular phones. With the help of their
trusty Radio Shack
Portavision 55s, designed to pick up the audio portion of UHF television
signals, these naughty people claim to have heard Secretary of Finance and
Administration Edward Lashman discussing a press conference with his wife and
Boston Mayor Ray Flynn checking in with his office. "It makes for a great day,"
says one listener who calls in sick at his job to spend the day with his ear
pressed against the radio. "At 7 a.m. you hear the construction people
complaining that their suppliers delivered the wrong stuff. At 9, it's the
lawyers telling their clients how to lie in court. After noon the risque stuff
starts..."

GZ'S note: It seems that Radio Shack, after learning the "extra" functions 
of the Portavision 55, has removed it from their line. However, you might 
be able to find a store that might still have one lying around.

------------------------------------------------------------------------------

Two former employees of Cincinnati Bell, who were fired by the company for
'good cause' according to Cincinnati Bell Chairman Dwight Hibbard are
claiming they installed more than 1200 illegal wiretaps over a 12 year period
from 1972 - 1984 at the request of their supervisors at the telco and the
local police.

Among the alleged targets of the snooping were past and present members
of Congress, federal judges, scores of the city's most prominent politicians,
business executives, lawyers and media personalities.

Leonard Gates and Robert Draise say they even wiretapped the hotel room
where President Gerald Ford stayed during two visits to Cincinnati; and
this part of their story, at least, has been verified by the now retired
security chief at the hotel.

As more details come out each day, people in Cincinnati are getting a rare
look at a Police Department that apparently spied on itself, and at a grand
jury probe that has prompted one former FBI official to suggest that the
Justice Department seems more interested in discrediting the accusers than
in seeking the truth.

Cincinnati Bell executives says Gates and Draise are just trying to 'get
even' with the company for firing them. But disclosures thus far seem to
indicate there is at least some truth in what the two men are saying about
the company they used to work for.

According to Gates and Draise, they were just employees following the orders
given to them by their superiors at Cincinnati Bell. But Dwight Hibbard,
Chairman of the Board of Cincinnati Bell has called them both liars, and
said their only motive is to make trouble for the company.

Cincinnati Bell responded to allegations that the company had specifically
participated in illegal wiretapping by filing a libel suit against Gates
and Draise. The two men responded by filing a countersuit against the telco.
In addition to their suit, four of the people who were allegedly spied on
have filed a class action suit against the telco.

In the latest development, Cincinnati Bell has gone public with (according
to them) just recently discovered sordid details about an extramarital
affair by Gates. A federal grand jury in Cincinnati is now trying to
straighten out the tangled web of charges and countercharges, but so far
no indictments have been returned.

Almost daily, Gates and Draise tell further details about their exploits,
including taps they claim they placed on phones at the Cincinnati Stock
Exchange and the General Electric aircraft engine plant in suburban
Evendale.

According to Draise, he began doing these 'special assignments' in 1972,
when he was approached by a Cincinnati police officer from that city's
clandestine intelligence unit. The police officer wanted him to tap the
lines of black militants and suspected drug dealers, Draise said.

The police officer assured him the wiretapping would be legal, and that
top executives at the phone company had approved. Draise agreed, and
suggested recruiting Gates, a co-worker to help out. Soon, the two were
setting several wiretaps each week at the request of the Intelligence
Unit of the Cincinnati Police Department.

But by around 1975, the direction and scope of the operation changed, say
the men. The wiretap requests no longer came from the police; instead
they came from James West and Peter Gabor, supervisors in the Security
Department at Cincinnati Bell, who claimed *they were getting the orders
from their superiors*.

And the targets of the spying were no longer criminal elements; instead,
Draise and Gates say they were asked to tap the lines of politicians,
business executives and even the phone of the Chief of Police himself,
and the personal phone lines of some telephone company employees as well.

Draise said he "began to have doubts about the whole thing in 1979" when
he was told to tap the private phone of a newspaper columnist in town.
"I told them I wasn't going to do it anymore," he said in an interview
last week.

Gates kept on doing these things until 1984, and he says he got cold feet
late that year when 'the word came down through the grapevine' that he
was to tap the phone lines connected to the computers at General Electric's
Evendale plant. He backed out then, and said to leave him out of it in the
future, and he claims there were hints of retaliation directed at him at
that time; threats to 'tell what we know about you...'.

When Dwight Hibbard was contacted at his office at Cincinnati Bell and asked
to comment on the allegations of his former employees, he responded that
they were both liars. "The phone company would not do things like that,"
said Hibbard, "and those two are both getting sued because they say we do."
Hibbard has refused to answer more specific questions asked by the local
press and government investigators.

In fact, Draise was fired in 1979, shortly after he claims he told his
superiors he would no longer place wiretaps on lines. Shortly after he quit
handling the 'special assignments' given to him he was arrested, and charged
with a misdemeanor in connection with one wiretap -- which Draise says he
set for a friend who wanted to spy on his ex-girlfriend. Cincinnati Bell
claims they had nothing to do with his arrest and conviction on that charge;
but they 'were forced to fire him' after he pleaded guilty.

Gates was fired in 1986 for insubordination. He claims Cincinnati Bell was
retaliating against him for taking the side of two employees who were suing
the company for sexual harassment; but his firing was upheld in court.

The story first started breaking when Gates and Draise went to see a reporter
at [Mt. Washington Press], a small weekly newspaper in the Cincinnati suburban
area. The paper printed the allegations by the men, and angry responses
started coming in almost immediately.

At first, police denied the existence of the Intelligence Unit, let alone
that such an organization would use operatives at Cincinnati Bell to
spy on people. Later, when called before the federal grand jury, and warned
against lying, five retired police officers, including the former chief,
took the Fifth Amendment. Finally last month, the five issued a statement
through their attorney, admitting to 12 illegal wiretaps from 1972 - 1974,
and implicated unnamed operatives at Cincinnati Bell as their contacts to
set the taps.

With the ice broken, and the formalities out of the way, others began coming
forward with similar stories. Howard Lucas, the former Director of Security
for Stouffer's Hotel in Cincinnati recalled a 1975 incident in which he
stopped Gates, West and several undercover police officers from going into
the hotel's phone room about a month before the visit by President Ford.

The phone room was kept locked, and employees working there were buzzed
in by someone already inside, recalled Lucas. In addition to the switchboards,
the room contained the wire distribution frames from which phone pairs ran
throughout the hotel. Lucas refused to let the police officers go inside
without a search warrant; and they never did return with one.

But Lucas said two days later he was tipped off by one of the operators
to look in one of the closets there. Lucas said he found a voice activated
tape recorder and 'a couple of coils they used to make the tap'. He said
he told the Police Department and Cincinnati Bell about his findings, but
".....I could not get anyone to claim it, so I just yanked it all out and
threw it in the dumpster...."

Executives at General Electric were prompted to meet with Draise and Gates
recently to learn the extent of the wiretapping that had been done at the
plant. According to Draise, GE attorney David Kindleberger expressed
astonishment when told the extent of the spying; and he linked it to the
apparent loss of proprietary information to Pratt & Whitney, a competing
manufacturer of aircraft engines.

Now all of a sudden, Kindleberger is clamming up. I wonder who got to him?
He admits meeting with Draize, but says he never discussed Pratt & Whitney
or any competitive situation with Draise. But an attorney who sat in on
the meeting supports Draise's version.

After an initial flurry of press releases denying all allegations of illegal
wiretapping, Cincinnati Bell has become very quiet, and is now unwilling
to discuss the matter at all except to tell anyone who asks that "Draise
and Gates are a couple of liars who want to get even with us..." And now,
the telco suddenly has discovered information about Gates' personal life.

------------------------------------------------------------------------------

The NYT (April 11, 1989) reports that Dorcas R. Hardy, Commisssioner of the
Social Security Administration, told a Congressional committee that the agency
had verified millions of SSN's for private credit companies.

The risks of using SSNs and private credit companies have been discussed
before.  TRW, the nations largest credit reporting company recently proposed
paying the SS Administration $1000000 to have 140 million numbers verified.
Risks seem even greater when one company has credit information on 140
individuals--approximately 2/3 of every man, woman, and child in the country.

Phil Gambino, an agency spokesman, reported last month that the agency had
verified SSNs only at the request of beneficiaries or employers and had never
verified more than 25 numbers at a time.  He said such disclosures were
required under the Freedom of Information Act.

At the hearing yesterday, Dorcas R Hardy, Commissioner of the SSA, at first
denied any other verifications.  Later she admitted that in the early 80s,
3,000,000 SSNs were verified for Citi Corp and that last year 151,000 numbers
were verified for TRW.  Ms Hardy said that the 151,000 numbers were just part
of a "test run."

Senator David Pryor, D-Ark, chairman of the Special Committee on Aging, said
that previous commissioners, the Congressional Research Service of the Library
of Congress, and Donald A. Gonya, chief counsel for Social Security have all
decided that such verification is illegal.

-----------------------------------------------------------------------------
 notes from your buddy, Ground Zero    
                                       

Here's a book that I highly recommend: "Women Activists" by Anne Witte 
Garland, The Feminist Press at the City University of New York, 1988. It's an
excellent book that describes the experiences of women who became involved in
community, envionmental, or other political issues. 

One of the stories in the book was very familiar. It was the story of Cathy 
Hinds, a Maine woman who, after moving to Gray, Maine in 1975 with her family
discovered that they all were having very serious health problems. She 
had a miscarraige, and then during her next pregnancy, she gave birth pre-
maturely to a son who died two days later on Christmas Day.  These and other 
problems other residents were having were linked to water contaminated by  
a nearby toxic dump site.  Cathy organized to fight against town officials
who insisted at first that the water was drinkable, and that there were no 
health risks. Cathy and her neighbor Cheryl founded an environmental group,
and began to get results. In 1982 
the site causing the problems in Gray (the McKin site) was placed on the 
EPA's Superfund list of sites to receive Federal money to be cleaned up. 

Cathy is still active today. In fact, I remember that she spoke at that 
march/rally on April 23rd I told you all about. She was only given about 60
seconds to speak. I wish I could have heard more from her.  I really admire 
her commitment and her accomplishments.

Anyway, if you can get a copy of "Women Activists", read it by all means. 
It has several more inspiring stories of women fighting to make a difference.


!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

   ********************
  * bbs spotlight..... *
   ********************

Well, no better time to say a few things about my BBS, The Red Phone. It's
located in Bloomfield, NJ and is accessible through PC Pursuit and Starlink.

I run it on a Commodore 64 and have back issues of ATI and other text files 
online. The BBS has several message bases and focuses on discussion of social
and political issues, and more. If you like the spirit of ATI or just like to
participate in discussions, do call. We even have a telecom-oriented section
for those of you who are phone phreaks.

Call us!  The Red Phone: 201-748-4005  300/1200 Baud  24 Hrs, 7 days/week.

=============================================================================

Oh, and before I forget: I have heard that there is a BBS up dedicated to 
The Grateful Dead.  We here at ATI would like to check it out and feature
it in our BBS spotlight. Does anyone have the number to this BBS? We would
be appreciative if anyone could give us the number.. 

-----------------------------------------------------------------------------

Ok, folks. That's about it for ATI38. Remember, we're always looking for
letters and contributions.

Take care, question authority, and be creative!

-----<-@   <-- a flower. remember to carry it in a clenched fist.   


    "Look over there, up in the sky!"
    "It's a bird!"  
    "It's a plane!"

No! It's..
   
    ****     ********    ********
   ******    ********    ********
  **    **      **          **
  ********      **          **
  **    **      **          **
  **    **      **       ********
  **    **      **       ********
          c       i              n
           t       m              c
            i       e              .
             v       s
              i       ,
               s
                t


Issue #39... July 18, 1989
    Special "Old Glory" Issue!  
               

 Activist Times, Inc.. a voice for the
people in an age of silence.. 

Write to us:  Activist Times, Inc.
              P.O. Box 2501
              Bloomfield, NJ 07003

Call us:  512-262-9519, box #1300

Howdy folks. Welcome one again to ATI.  We've got a lot of great stuff in
store for you, and first up - an article by ATI's originator, Prime Anarchist.
Take it away!

    ABBIE HOFFMAN WAS NOT FAMOUS --by Prime Anarchist 

     You're sitting in a bar with your idol, and a bunch of your college
buddies. Your idol is paying more attention to the Chcago Bears game on big
screen than your somewhat forced political discussions.  He just got done
lecturing to hundreds of you for two hours-- the last thing he wants to talk
about is politics.  But now and then, you can get an opinoin out of him for
your school newspaper.
     Talk turns toward his Chicago Eight days, "Steal This Book", "Urine
Test", stuff like that, and a pissed-off Abbie Hoffman says, "That's it.
"I'm out of here.  I know when I'm too welcome."
     Your idol has left you like a miserable little child who wasn't
allowed two more cookies, but you're quick to understand and respect that.
You'd give your right arm to have half the celebration Abbie's got, but
you'd gladly donate your left nut to be able to "dis" that fame with half
as much grace as he does.  Maybe you hope you'll get busted for cocaine so
you too can go underground.  Maybe you hope you can organize a non-event
that the press will wish they had known about.  Maybe you'd like to write the
next ultimate book that upsets Walden Books. 
     Abbie's death should mean nothing to you--however, his life should have
had great impact.  The things he has said should be ignored-- we need to heed
what he's done instead.  Somewhere around the fab-50's when nothing much
mattered, Abbie Hoffman got his first taste of fame when he became a yo-yo
champ.  Even the inventors wished they could have a few moments with the guy
to see some of his made-up tricks in slow motion.  I don't think he ever
gave out any of his own secrets.  Not then; still 30 years later he remained
reluctant to "tell all".  But ask the guy a question or two, and you sure
got a wealth of info. 
     That first taste of fame must have stunk in his mouth something rotten,
'cause it wasn't long before he spit it out and didn't want a thing to do
with it.  No one knows when he became an A) agitator, B) activist C) radical
or D) make up your own word.  He claims it started before he was born.
But just when an event looked like it would make him a little too famous,
it was time to go cook up another event.     The people watching with awe when money was burned at the stock market,
or the anarchy caused when Louis Guiffrida got thirty calls a minute telling
him he was a racist son of a bitch didn't seem to bother Abbie.  In fact,
I think it pleased him.  But the minute we began chatting about "there goes
that yoyo again" or "let's interview the yipster", it was time to go hide.
Abbie Hoffman didn't hate the pressmen; he loathed them.  ("Loathe" was for
lack of a better word, by the way.  I don't think there's a word bitter
enough.)  Plain and simple, Abbie did not like fame.
     During the 60's, when everything seemed to matter, Abbie could've easily
been a powerful attorney, great sportscaster, inspiring history professor,
or the best damned bum anyone ever met.  Guess which one this genius-level
character picked?
     Abbie joined the drug culture, as everyone knows.  We are fortunate he
had a high tolerance for drugs, because he was obssesive about everything
he got into. While we were all tuning out and turning on, he was participating
too.  But he was also stirring up.  Hey, someone had to do it.  No one
woulda known, that a little argument with a mayor could make headlines
thoughout the nation.  Good thing Abbie knew a lot of great attorneys,
because the Chicago Eight was about to be plucked right out of the streets
just as randomly as the hispanics that'll get sent to concentration camps if
Operation Night Camp is needed.  
     In Abbie's obituaries after his death, there'd been a lot of mention of
a Chicago Seven.  Who was this group?  I never heard of them.  I only know
of a Chicago Eight.  I think it is a gross misinformation blitz to leave
out Bobbie Seale who made it thru more than half the trial as a teammate.
I also think it sets us up as "racism continuers" to leave out the only man
of color burned in that trial. 
     Abbie handled his fame well;stomached it as best he could,and drove on--
stirring up every event he could organize.  The 60's were a busy time for
Abbie, but the 70's just might go down as the time when he reached his
underground peak.  Everyone knows about the Yipsters, but only fans, and
hard working undergrounders remember the Youth International Party Line.
YIPL was an underground newspaper that never saw a "regular" publishing
schedule, but always came as a refreshing piece of mail.  You sent a dollar
to some suite in NYC, and kept getting these pamphlets on how to make free
fone calls, how to keep using the same stamp for hundreds of letters among
friends, and generally how to beat the system at its own game.  Few knew
that Abbie was one of the strongest ghost publishers of YIPL magazine, but a
lot of freaks started subscribing to his new form of interactive press. 
People would write in and fone in tricks on how to use #14 washers as dimes,
how to turn your utility meter upside-down so it'd flow backwards for a week,
how to set up your apartment with hotel sofas and loveseats.  A phreak/
hacker/freaker/enthusiast (you pick the name) who sent something in could
count on YIPL to help him out if he ran aground.  Abbie was quick to start
campaigns to get lots of people out of jail.  Like I said,he coulda been a
potent lawyer if he wanted to play that way.   YIPL became TAP (short for
Technincal Assistance Party) and got a lot more electronically oriented, but
still kept some of its political bent.  But it just wasn't quite as activist.
Chesire Catalyst and the gang tried and tried to get the campaigns going to
help bail Abbie out when he got yanked for his DeLoreanesque cocaine set up.
 No dice.  Abbie had to go so far underground, even the underground couldn't
always get a hold of him.  TAP went on about its merry way into the 80's and
eventually disbanded.  After all, the apathetic 80's were just around the
corner.
     Abbie began pulling in large amounts for showing up at colleges.  Most
of it went to causes.  He had trouble finding liberal students that would
hear him out.  The college students seemed too concerned with resumes,
internships, co-ops and things to worry about Central American problems,
or worn-out old protests of nuclear submarines.  But as apathetic as these
students were, they seemed to love having him.   
     A year ago last September, he was inviting students to a well-planned
leftist convention at Rutgers.  He had no idea, the following February, 600
would show up ready to vote, and more than 500 more wanted to come "be-in".
Was the 60's starting all over again?  Or was the same 70's (1770) revolution
just hitting another upstroke?  Abbie joined Ginsberg, Little Steven VanZant,
Amy Carter, and other celebrated speakers inspiring tomorrow's youthdown at
the New Jersey college, but towards the end, he got mad at someone or somthing
and took off.
     His leaving agitated people just as much as his speeches.  I think he
might've meant it.  Whatever he did, it worked.  There are a lot of 20ish
people out there ready to come out of the woodwork whenever the next abortion/
marijuana/gay rights/no nukes/etc rally gets underway.  I wish I could be
there doing more than watching it, but that's my job.  You do yours, OK? 
And do it 100% if you can.
     When Abbie left the Rutgers convention, he went right home to battle the
Philadelphia Utility company about their unsafe power plant proposal. 
Again, he shouldn've been able to count on those 1000 or so people to come
dribble down there, and help organize, but no dice.  Only a few followed
through. But along with a group called Del-Aware, Abbie started a fight that
still continues.  Philly has yet to break ground, just billyclub heads.
     Abbie's actions throughout the 20th century sets us with a groundwork
for social engineering, political dissent, student activisim, outside
agitation, as well as participation with a messed up country that STILL
happens to be the most free nation we know about.  A lot of the negative
shrot-range things he's started off have led to some very positive
restructuring possibilities. "Steal
This Book" not only shows you how to get something free, or sneak around; it
teaches you to be creative, and gets you started making the future yours. 
"Steal This Urine Test" not only teaches you how to drink olive oil so last
night's joint won't show up, or how to pour battery acid from a rubber
--screwing up millions of dollars worth of technology, but it shows you how
to make decisions for yourself, and how to go about protesting violations
of your privacy.  Any one of his books could be titled "A Patriot's Guide
to Keeping America Free".
     Whether posthumous books are due is up in the air.  No one knows how
aggressive/generous his brother-in-law or his girlfriend plan on getting
with his written work.  Brother Jack HAS been reprinting "Steal This Book"
and a few other out-of-prints though, so if you missed any of them, now's as
good a time as any to put "Square Dancing" or "Soon To Be" on your must-read
list.  
     Abbie wrote on everything.  Matchbook covers, napkins, address books,
dollar bills, tables, whatever was put in front of him.  What he wrote
on mostly, though, was politics.  TAP/YIPL might be gone, but many writers
across the land have been so inspired by that style, we've seen a renaissance
of "underground" rags/fact sheets/fanzines (again, pick your own name for
'em.)  A good place to start looking for the Hoffmanesque writing style would
be Realtiy Hackers magazine which comes out monthly, 2600 magazine which
comes out 4 times a year, ATI which comes out whenever, Phrack which comes
out only in "software" copy every two months or so.  
     Addresses can't be give here, naturally, but if you're aggressive enough
,you'll find your way around.
     If you want fame, pattern yourself after someone like Johnny Bench or
Geraldo Revera.  But if you want to accomplish things in life, the ones to
watch are the Geroge Bushes, the Tom Clancys and the Abbie Hoffmans. 
     People liked to steal his driver's license, and his address book.  Kind
of a perverted way to get a memento/souvenir/token.  Kind of a great way to
piss someone off.  The weekdays of the '80s were such a struggle for Abbie
to rewrite his phone numbers from memory, he began making copies to hand out
to anyone who looked like they might want one that deperately.  Your second
,third...fortieth copy of your driver's license don't come cheap.  I wonder
if Abbie still has an outstanding tab at Bucks County's MVD. 
     Phil Donahue type people started bugging the hell out of him around
87-88.  It got so bad, he finally had to put up a "leave me alone, Phil.
I don't want to be on your show" message on his machine.  Warner Brothers,
Tri-Star, etc. hounded him constantly the last few years to star in an
autobiographical movie.  He flat out refused.
     Abbie's last few years in a Philadelphia crash-pad-styled chicked-coop
were as quiet as he wanted to make them.  He said they were very comfortable;
he was content.  From this "headquarters" came the necessary magazine
articles, telephone interviews, event planning, and lecture scheduling.
     When we invade a Honduras, bomb a Tripoli or stockade a gulf, you could
count on Abbie and his buddies to get those fones through the government
tan-boxes and give you an idea what's really going on.  Sometimes he'd only
tellyou a little, but he seemed to know everything.  He didn't want to tell
ALL, because he didn't want to be your only source.  That meant fame. 
You know how he felt about that.
     He told you about Iranscam back in '82, told you about Carter getting
used on the hostage situation way back in '80.  To say he was your "80's Deep
Throat" was the journalistic understatement of the century.  He gave good
background.  But he said, "don't quote me", and he meant it.  And you
didn't mess. 
     Abbie Hoffman died quietly.  The press didn't know until four hours later
that something was "news" in New Hope.  That meant there was no one there
to ask, "how's it feel to be dying" and "do you have any last words for
my microcassette recorder here", and "if you could do it again, what would
you change?"  He wouldn't want to tell you anyways.
     Don't send condolences in the usual way, steal a book.
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
             Random Notes from Ground Zero...

PAGO PAGO, SAMOA:  Vice President Dan Quayle, addressing Samoans who greeted
him when he arrived in Pago Pago (which he pronounced Pogo Pogo): "You all
look like happy campers to me.  Happy campers you are, happy campers you
have been, and as far as I'm concerned, happy campers you will always be".

(Source: The Progressive magazine)


I was reading a book called "AIDS: The Women" recently. It has several stories
about women who have AIDS, or work as a professional or volunteer providing
care to AIDS patients, or women who have a loved one with AIDS, etc.  One of
the stories was written by a woman in Atlanta who wrote about her dealings
as a self-proclaimed "prostitutes' rights advocate". While her efforts to 
try to get prostitutes to wear condoms are indeed commendable, I object to
the term "prostitutes' rights".  What rights do they deserve?  In my opinion, 
no more than those guaranteed by the Constitution. They certainly deserve no
special rights as a profession. Also, I would have to wonder about a woman
who seems to lend support to an practice which exploits women and their
sexuality.  Instead of a "prostitutes' rights advocate, I'd much rather see
someone trying to get them out of an exploitative and downright abusive life.

I also had the dubious pleasure of watching women participating in a "prosti-
tute's convention in San Francisco being interviewed recently on "A Current 
Affair" (a TV show known for it's yellow journalistic style).  These women
were actually ones who chose prostitution as a profession, and were not street
hookers. But I found them to be just as objectionable. I sat and listened to
these women say things like, "When I became a prostitute I learned a lot about
my sexuality", and another one rambled on about how much she loved her "job"
(incidentally, she was married) and about how she enjoyed pleasing her clients'
fetishes. 

Ok. Enough. Let's have some morality here. I'm sick of hearing about "prosti-
tutes' rights advocates" and conventions for prostitutes.  I'm sick of ANY
attempts to legitimize this "profession", including those legal brothels in
Nevada and Amsterdam. I'll say this once, and I'm sure I'll say it again:
Women who sell their bodies for money or any other gain are selling out 
womankind as a whole. They're throwing the rest of the female gender back 
into the Dark Ages. I'm all for a more liberal society, but the practice of
prostitution and attempts to legitimize it are absolutely ridiculous. Let's 
focus on relationships and the family and not meanigless exchanges of 
intercourse and money.

Ok, off the soap box... for now!


Another funny thing I saw on TV lately was an incident involving a contest
Kraft was running in a few southern states. They put game pieces in their 
cheese wrappers, and the first prize in the contest was a brand new van. Due
to a printing error, almost every game piece printed was an instant winner for
the van. So everyone in that area that bought a package of Kraft slices 
got an intant winner for a van. Kraft called the contest off due to the error.
There was a small amount of public outcry, including a woman who decided to 
sue Kraft for the van. "The purpose of a contest is to generate sales. They 
got thier sales, I want my van", said the woman.  Ridiculous. I usually don't 
side with the big fat-cat capitalists (in fact, I NEVER do!), but in this case
I have to. I mean, come on. Kraft may have generated some extra sales from
the contest, but they would have had to sell a helluva lot of slices to pay
for probably hundreds of thousands of vans.  Lady, drop your dumb lawsuit.


Here's something that I was apalled to hear: In nearby Jersey City, NJ, there
are over 71 dump sites of a substance called chromium, which is far more 
dangerous and carcinogenic than dioxin, the chemical that was responsible
for the serious adverse health effects in Love Canal. Jersey City is a very
densely populated urban area. This means that the residents are literally 
living on top of and breathing in this chemical.  The EPA has been slow to 
respond to this situation, and their answer to the situation so far is to move
about half of the chromium in these various dump sites to a "temporary" 
storage site right by the Hackensack River in Jersey City. People who have 
seen the site have said that the chemical is not contained properly and is 
in pools on the ground. Since this site is right next to the river, the
chromium may be leaking into the ground water..... 

Folks, I'm not going to let that one slide. Look for more in later issues on 
Jersey City's chromium problem.

(Source: WBAI News 99.5 FM, New York)


Speaking of WBAI-FM, they are going to have a show about computer hackers
on Tuesday, July 25th at 7:30 PM. If you're in the NY area, listen to it! 
There will also be a call-in where you can participate.

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Well, I'm going to continue this in ATI40. Look for it in about 2 days or so.

We still have lots more stuff to report, and little space left, so we'll cya
in a bit!

Take care, and keep the fire burning. Especially if you're burning a flag. ;)

Ciao!


