| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Three, File 4 of 27 |
|
|
|
|
| // // /\ // ==== |
| // // //\\ // ==== |
| ==== // // \\/ ==== |
|
|
| /\ // // \\ // /=== ==== |
| //\\ // // // // \=\ ==== |
| // \\/ \\ // // ===/ ==== |
|
|
| ****************************************************************************** |
|
|
| PHRACK TRIVIA |
|
|
| This is pretty damn hard. In fact, some of it is downright obscure. |
| And the bonuses? Forget about it. Answer the questions, expand the |
| acronyms, explain the numbers. |
|
|
| The five highest scorers by the next issue (or the first 5 to get |
| perfect scores) win COOL STUFF! |
|
|
| Send your answers to phrack@well.sf.ca.us |
|
|
|
|
| 1) CCIS |
|
|
| 2) Stimpson J. Cat's Roommate is? |
|
|
| 3) Name the cracker. |
|
|
| 4) METAL AE password. |
|
|
| 5) Who invented the TeleTrial? |
|
|
| 6) Name Bloom County's hacker. |
|
|
| 7) What was the Whiz Kids' computer named? |
|
|
| 8) Western Union owned what long distance service? |
|
|
| 9) What computer read both Apple ][ and IBM PC disks? |
|
|
| 10) Who made the "Charlie" board? |
|
|
| 11) How many credits for a CNE? |
|
|
| 12) What was in the trunk of the Chevy Malibu? |
|
|
| 13) Name three bands A. Jourgensen had a hand in. |
|
|
| 14) SYSTEST Password: |
|
|
| 15) What computer makes the best SimStim decks? |
|
|
| 16) What magazine brought the telephone underground to national |
| attention in 1971? |
|
|
| 17) What is the significance of 1100 + 1700 hz? |
|
|
| 18) What magazine was raided for publishing black box plans? |
|
|
| 19) What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ? |
|
|
| 20) CLASS |
|
|
| 21) What computer responds "OSL, Please" ? |
|
|
| 22) RACF secures what OS? |
|
|
| 23) The first person to create a glider gun got what? |
|
|
| 24) QRM |
|
|
| 25) PSS |
|
|
| 26) What PSN was acquired by GTE Telenet? |
|
|
| 27) 914-725-4060 |
|
|
| 28) April 15, 1943 |
|
|
| 29) 8LGM |
|
|
| 30) WOPR |
|
|
| 31) What happened on March 1, 1990? |
|
|
| 32) Port 79 |
|
|
| 33) Who starred in the namesake of Neil Gorsuch's UNIX security |
| mailing list? |
|
|
| 34) What Dutch scientist did research in RF monitoring? |
|
|
| 35) What was the author of GURPS Cyberpunk better known as? |
|
|
| 36) Who would "Piss on a spark plug if he thought it would do |
| any good?" |
|
|
| 37) What thinktank did Nickie Halflinger escape from? |
|
|
| 38) NCSC |
|
|
| 39) Who is Pengo's favorite astronomer? |
|
|
| 40) What language was Mitnik's favorite OS written in? |
|
|
| 41) Abdul Alhazred wrote what? |
|
|
| 42) The answer to it all is? |
|
|
| 43) Who is the father of computer security? |
|
|
| 44) Who wrote VCL? |
|
|
| 45) What kind of computer did Cosmo have? |
|
|
| 46) Hetfield, Ulrich, Hammet, Newstead |
|
|
| 47) What company wrote the computer game "Hacker?" |
|
|
| 48) Who does Tim Foley work for? |
|
|
| 49) Who played Agent Cooper? |
|
|
| 50) Vines runs over what OS? |
|
|
| 51) Mr. Peabody built what? |
|
|
| 52) Who makes SecurID? |
|
|
| 53) What's in a Mexican Flag? |
|
|
| 54) Who created Interzone? |
|
|
| 55) JAMs (as led by John Dillinger) |
|
|
| 56) Abbie Hoffman helped start what phreak magazine? |
|
|
| 57) What was once "Reality Hackers?" |
|
|
| 58) Gates and Allen "wrote" BASIC for what computer? |
|
|
| 59) Tahoe is related to what OS? |
|
|
| 60) CPE 1704 TKS is what? |
|
|
| 61) Telemail's default was what? |
|
|
| 62) "Do Androids Dream of Electric Sheep" became what? |
|
|
| 63) What broadcasts between roughly 40 and 50 mhz? |
|
|
| 64) Who created Tangram, Stratosphere, and Phaedra among others? |
|
|
| 65) What was Flynn's most popular video game? |
|
|
| 66) Who lived in Goose Island, Oregon? |
|
|
| 67) 516-935-2481 |
|
|
| 68) What is the security of ComSecMilNavPac? |
|
|
| 69) What has the "spiral death trap?" |
|
|
| 70) Who was the Midnight Skulker? |
|
|
| 71) TMRC |
|
|
| 72) Who wrote "Jawbreaker?" |
|
|
| 73) 213-080-1050 |
|
|
| 74) What is the Tetragrammaton represented as? |
|
|
| 75) Who is Francis J. Haynes? |
|
|
| 76) Who ran into one of the Akira test subjects? |
|
|
| 77) What had "Munchies, Fireballs and Yllabian Space Guppies?" |
|
|
| 78) PARC |
|
|
| 79) Alex and his droogs hung out where? |
|
|
| 80) Jane Chandler in DC's "Hacker Files" is based on who? |
|
|
| 81) The Artificial Kid lives on what planet? |
|
|
| 82) 208057040540 |
|
|
| 83) What are the two most common processors for cellular phones? |
|
|
| 84) Who came up with the term "ICE?" |
|
|
| 85) What group is hoped might help the "Angels" contact RMS? |
|
|
| 86) Who is Akbar's friend? |
|
|
| 87) What company's games was David Lightman after? |
|
|
| 88) 26.0.0.0 |
|
|
| 89) Who was Mr. Slippery forced to locate? |
|
|
| 90) Who is "The Whistler?" |
|
|
| 91) What use would a 6.5536 crystal be? |
|
|
| 92) .--. .... .-. .- -.-. -.- |
|
|
| 93) The Dark Avenger likes what group? |
|
|
| 94) What book spawned the term "worm?" |
|
|
| 95) Michael in "Prime Risk" wanted money for what? |
|
|
| 96) Automan's programmer worked for who? |
|
|
| 97) What signal filled in keystrokes on TOPS-20? |
|
|
| 98) ITS |
|
|
| 99) (a/c)+121 |
|
|
| 100) What drug kept the scanners sane? |
|
|
| Bonus 1 |
| 3 pts Name three bodies of work by Andrew Blake. |
|
|
| Bonus 2 |
| 3 pts Name three currently available titles with N. L. Kuzma. |
|
|
| Bonus 3 |
| 4 pts Why would I hate Angel Broadhurst? |
|
|
| ***************************************************************************** |
|
|
| IF SECURITY TYPES WERE K-RAD |
|
|
| ---------------------------------------------------------------- |
|
|
|
|
| IRC log started Fri June 18 01:14 |
| *** Value of LOG set to ON |
| <Pat> bye peter |
| *** Signoff: hackman (slavin' to da' MAN at TRW) |
| <Ed> Dudez, I HATE filling out thez incident Rep0rtz |
| <bartman> MUAHAHA Tuff J0b edd1e! |
| <Ed> Funni |
| *** zen (zen@death.corp.sun.com) has joined channel #CERT |
| <Ed> re dan, just missed yer pal peety |
| <Pat> Hi Dan! |
| <zen> pal? right. ask the wife... |
| <venom> re |
| <zen> d00dz, we have SO many bugz. sux 2 be me. |
| *** venom has left channel #CERT |
| *** venom (weitse@wzv.win.tue.nl) has joined channel #CERT |
| *** venom has left channel #CERT |
| *** venom (weitse@wzv.win.tue.nl) has joined channel #CERT |
| *** venom has left channel #CERT |
| *** venom (weitse@wzv.win.tue.nl) has joined channel #CERT |
| <venom> ARG! |
| <bartman> WTF Weitse? |
| <venom> s0rri |
| <zen> Where is everyone? Anyone seen spaf? |
| <Pat> I have. He was going to install something. He should be bak. |
| <zen> ah |
| *** Action: Ed throws darts at a cracker |
| <zen> heh |
| <venom> muaha |
| *** bartman is now known as Cracker |
| *** Action: Cracker hacks Cert with an axe |
| <venom> dats a good 1 |
| *** Action Ed kicks cracker in the nuts |
| <Cracker> OUCH! |
| *** Signoff: donn (Bad Link?) |
| <Cracker> [high voice] fuk u CERT! |
| <Ed> heh. |
| *** Action: Pat is ROFL |
| <Cracker> wonder who's on #hack? Mebbe i should go log em. |
| <Ed> Yeah. Oh hey, I got certbot online. Ill send it to go log. |
| *** certbot (ed@cert.org) has joined channel #CERT |
| *** certbot has left channel #CERT |
| <Ed> this will be fun. |
| <venom> Hey, letz deop them and take over the channel. |
| <zen> thats L A M E |
| <Cracker> Ooooh. OPWARZ! I'll go make their channel +i muahaha |
| *** Cracker has left channel #CERT |
| *** Casper (casper@fwi.uva.nl) has joined channel #CERT |
| <Casper> re all |
| <Venom> hey dik-head. |
| <zen> re |
| <Pat> hahahaha hi d00d. |
| <Casper> funni whitesey venombreath |
| <Ed> lame. |
| *** donn (parker@bandit.sri.com) has joined channel #CERT |
| <donn> 'sup? |
| <Ed> re, oh great bald one |
| <donn> eat me |
| <zen> bahhahaha |
| <Pat> Now now boyz. |
| *** spaf (spaf@cs.purdue.edu) has joined channel #CERT |
| <Pat> Spaffie! |
| <zen> 3l33t SPAF! |
| <Ed> re spaf |
| <spaf> Yo. |
| <venom> spaf...your book sucks. |
| <spaf> oh fuck off dutch boy. |
| <Casper> HEY!$!@% |
| *** spaf has been kicked off channel #CERT by Casper |
| <venom> thx dude |
| <Ed> oh gawd...feetball |
| *** spaf (spaf@cs.purdue.edu) has joined channel #CERT |
| <spaf> lame |
| *** Mode change "+o -o spaf Casper" on channel #CERT by Pat |
| <spaf> thanks sweetie. |
| <Casper> op! |
| *** Mode change "+o Casper" on channel #CERT by venom |
| <Casper> thx d00d |
| <Ed> Hey dan, you got those patches online? |
| <zen> maybe. What YOU got? |
| <donn> WAREZZ |
| <Pat> heh |
| <Ed> I dunno. Ill dcc you a filelist. |
| <zen> kool |
| *** zardoz (neil@cpd.com) has joined channel #CERT |
| <zardoz> HEY ... anyone want to contribute to my new list? |
| <Ed> not me |
| <zen> mebbe. Whats this one called? Coredoz? |
| <donn> what list? |
| <spaf> BAH. Fuck your list man. More crackrs have them than we do! |
| <zardoz> who pissed in your coffee gene? |
| <donn> heh |
| *** zardoz is now known as neil |
| <spaf> bah... I'm sick of those dicks using my own holes against me! |
| <venom> Your holes? Yer a-hole? |
| <Pat> What is your list about this time? |
| <neil> same thing. Its called REWT! |
| *** neil is now known as REWT |
| <REWT> SEND ME YER BUGZ!@# |
| *** Action: spaf sends REWT a 50 gig coredump |
| <Pat> :) |
| <REWT> u r lame. |
| *** REWT is now known as neil |
| <Ed> I hate these reports. I wish I got to travel more. |
| <Pat> come see me! |
| <Casper> oooohhhh....netsex! |
| <spaf> tramp. :P |
| *** bill (whmurray@dockmaster.ncsa.mil) has joined channel #CERT |
| <bill> word! |
| <Pat> hi bill. |
| <donn> Bill! D00d! I am gonna be in Ct. next week! |
| <bill> RAD! call me voice at werk. we'll thrash! |
| <donn> you know it! |
| <zen> oh puh-lease...the geriatric partiers :) |
| <donn> farmboy |
| <Ed> ***** ***** ***** ***** |
| <Ed> * * * * * |
| <Ed> * *** **** * |
| <Ed> * * * * * |
| <Ed> ***** ***** * * * |
| <Ed> |
| <Ed> ***** * * * ***** ***** ** |
| <Ed> * * * * * * * ** |
| <Ed> **** * * * *** ***** ** |
| <Ed> * * * * * * * |
| <Ed> * * ***** ***** ***** ***** ** |
| <Pat> No DUMPING! |
| <zen> cert freshens your breath |
| <donn> ACK! |
| <venom> hee! certs haha |
| *** ray (kaplan@bpa.arizona.edu) has joined channel #CERT |
| <ray> hey guys! |
| <Ed> ugh. Cracker lover alert. |
| <donn> commie |
| <bill> Hey ray, come to snoop for your little cracker friends? |
| <ray> come on, give it a rest guys. |
| <Pat> hi ray |
| <venom> ? |
| *** Action: spaf spits on ray |
| <spaf> heh |
| *** ray has been kicked off channel #CERT by spaf |
| *** Mode change "+b *!*@bpa.arizona.edu" on channel #CERT by spaf |
| <neil> hey I wanted to talk to him about my list... |
| <spaf> tough shit. |
| <donn> heh. |
| *** bartman (ddrew@opus.tymnet.com) has joined channel #CERT |
| <Pat> re |
| <Ed> how goes the takeover? |
| <venom> didja kick em? |
| <bartman> #hack is +i! muahahaha |
| <zen> how exciting. not |
| <donn> they deserve it...they are all punks. |
| <spaf> hmm..did you get emails? I may want to call their admins. |
| <bartman> nope damn. |
| <Ed> certbot was there. He got it. |
| <spaf> coolness |
| *** Signoff: bill (Bad link?) |
| <Casper> ne1 going to hactics thing? |
| <venom> me |
| <Casper> besides you. duh. |
| <Ed> dunno. |
| <bartman> not me. I have no desire to pay for anything done by hackers |
| <Ed> That reminds me. Did anyone subscribe to Phrack? |
| <Pat> nope. |
| <bartman> oops. HAHAHAHAHAHA |
| <Ed> heh. |
| <donn> Whats phrak? |
| <neil> nope. my list is better. Who wants on it? |
| <Pat> me! |
| <donn> what list? |
| <Pat> OOH! I have mail! bye! |
| <bartman> itz an ansi bomb! |
| <Ed> bye Pat |
| <Spaf> l8r |
| <neil> heh. |
| *** Signoff: Pat (Hugs to all) |
| <Casper> well, i better do something productive 2. cya |
| <venom> slatez d00d. |
| *** Signoff: Casper (Hi ho hi ho its off to work I go) |
| <donn> man its late. I better go. I gotta speech in the morn |
| <Ed> you are getting old. |
| <donn> am not |
| <Ed> are so |
| <donn> am not |
| <Ed> are too! infinity |
| <donn> hasta |
| *** Signoff: donn (|/dev/null) |
| <Ed> laterz |
| <Spaf> geez. what a bunch of lamers. |
| (ray/#CERT) UNBAN ME! |
| <Spaf> hahaha |
| <Ed> never gives up does he? |
| <neil> seriously ed, Ive helped you guys out, send me stuff for REWT. |
| <Ed> ill think about it |
| <spaf> not |
| <neil> it will be most savory. I promise. And secure! |
| <spaf> pfft...and monkeys might fly out of my butt |
| <Ed> Ill think about it. |
| <zen> heh, I should do one called Supernova. Exploding suns. hehe |
| <Ed> heh |
| <spaf> dats tha tr00f! |
| <bartman> i like my sun |
| <Ed> i know a bunch of crackerz who like bt's suns too. |
| <spaf> hahahahahahahahahaha |
| <venom> oh shit. Im late. |
| *** Signoff: venom (LATE!) |
| <Ed> late 4 what? |
| <spaf> his vasectomy. har har |
| <neil> heh |
| *** REVENGE (kaplan@ai.bpb.arizona.edu) has joined channel #CERT |
| *** Mode change "+o REVENGE" on channel #CERT by eff.org |
| <Ed> whoops |
| *** Mode change "+i" on channel #CERT by REVENGE |
| <spaf> fuCK! KICK HIM! |
| *** spaf has been kicked off channel #CERT by REVENGE |
| *** neil has been kicked off channel #CERT by REVENGE |
| *** bartman has been kicked off channel #CERT by REVENGE |
| *** Ed has been kicked off channel #CERT by REVENGE |
| *** zen has been kicked off channel #CERT by REVENGE |
| *** REVENGE is now known as ray |
| <ray> hehe |
|
|
| --------------------------------------------------------------------- |
|
|
| **************************************************************************** |
|
|
| Phrack Library of Periodicals |
|
|
| 2600 |
| Subscription Department |
| P.O. Box 752 |
| Middle Island, NY 11953-0752 |
| $21.00/Year |
|
|
| Animation Magazine |
| 5889 Kanan Road, Suite 317 |
| Agoura Hills, CA 91301 |
| $21.00/Year |
|
|
| Bank Technology News |
| Faulkner & Gray, Inc. |
| Eleven Penn Plaza |
| New York, NY 10117-0373 |
| $50.00/Year |
|
|
| Ben Is Dead |
| P.O. Box 3166 |
| Hollywood, CA 90028 |
| $20.00/Year |
|
|
| Boardwatch Magazine |
| 7586 West Jewell Ave., Suite 200 |
| Lakewood, CO 80232 |
| $36.00/Year |
|
|
| Boing Boing |
| 11288 Ventura Blvd. #818 |
| Studio City, CA 91604 |
| $14.00/Year |
|
|
| Communications of the ACM |
| 1515 Broadway |
| New York, NY 10036 |
| $30/Year |
|
|
| CQ - The Radio Amateur's Journal |
| 76 North Broadway |
| Hicksville, NY 11801-9962 |
| $22.95/Year |
|
|
| Details |
| P.O. Box 50246 |
| Boulder, CO 80321 |
| 12.00/Year |
|
|
| Dirt |
| 230 Park Ave |
| New York, NY 10169 |
| (Supplement to Sassy & Marvel Comics) |
|
|
| Electronics Now |
| Subscription Service |
| P.O. Box 51866 |
| Boulder, CO 80321-1866 |
| $17.97/Year |
|
|
| Farout |
| 9171 Wilshire Blvd. Suite 300 |
| Beverly Hills, CA 90210 |
| $3.95/Issue |
|
|
| Fate |
| 170 Future Way |
| P.O. Box 1940 |
| Marion, OH 43305-1940 |
| $18.00/Year |
|
|
| Femme Fatales |
| P.O. Box 270 |
| Oak Park, IL 60303 |
| $18.00/Year |
|
|
| Film Threat |
| Subscriptions Department |
| P.O. Box 16928 |
| N. Hollywood, CA 91615-9960 |
| $11.85/Year |
|
|
| Film Threat Video Guide |
| P.O. Box 3170 |
| Los Angeles, CA 90078-3170 |
| $12/Year |
|
|
| Fringe Ware Review |
| P.O. Box 49921 |
| Austin, TX 78765 |
| $12.00/Year |
|
|
| Future Sex |
| 1095 Market Street, Suite 809 |
| San Francisco, CA 94103 |
| $18.00/Year |
|
|
| Gray Areas |
| P.O. Box 808 |
| Broomall, PA 19008-0808 |
| $18.00/Year |
|
|
| High Times |
| P.O. Box 410 |
| Mt. Morris, IL 61054 |
| $29.95/Year |
|
|
| IEEE Spectrum |
| 445 Hoes Lane |
| P.O. Box 1331 |
| Piscataway, NJ 08855-1331 |
| 800-678-IEEE for info |
|
|
| The "I Hate Brenda" Newsletter |
| c/o Ben Is Dead |
| P.O. Box 3166 |
| Hollywood, CA 90028 |
| $2.00 |
|
|
| InfoSecurity News |
| P.O. Box 3168 |
| Lowell, MA 01853-3168 |
| $40.00/Year |
|
|
| International UFO Library Magazine |
| 11684 Vewntura Blvd. #708 |
| Studio City, CA 91604 |
| $15.00/Year |
|
|
| Magical Blend |
| 1461 Valencia St. Dept. GA |
| San Francisco, CA 94110 |
| $14.00/Year |
|
|
| Midnight Engineering |
| 1700 Washington Ave. |
| Rocky Ford, CO 81067-9900 |
| $19.95/Year |
|
|
| Mobile Office |
| Subscription Department |
| 21800 Oxnard St. Suite 250 |
| Woodland Hills, CA 91367-9644 |
| $23.90/Year |
|
|
| Mondo 2000 |
| P.O. Box 10171 |
| Berkeley, CA 94709 |
| $24.00/Year |
|
|
| Monitoring Times |
| P.O. Box 98 |
| 140 Dog Branch Road |
| Brasstown, NC 28902-0098 |
| $19.95/Year |
|
|
| New Media |
| P.O. Box 1771 |
| Riverton, NJ 08077-9771 |
| $48.00/Year |
|
|
| The Nose |
| 1095 Market Street, #812 |
| San Francisco, CA 94103-9654 |
| $15.00/Year |
|
|
| Nuts & Volts |
| 430 Princeland Court |
| Corona, CA 91719-9938 |
| $17.00/Year |
|
|
| Popular Communications |
| 76 North Broadway |
| Hicksville, NY 11801-9962 |
| $19.95/Year |
|
|
| Sassy |
| P.O. Box 50093 |
| Boulder, CO 80321-0093 |
| $9.97/Year |
|
|
| Security Insider Report |
| 11511 Pine St. North |
| Seminole, FL 34642 |
| $99.00/Year |
|
|
| SunExpert Magazine |
| 1330 Beacon St. |
| Brookline, MA 02146-3202 |
| $60.00/Year |
|
|
| Tech Connect |
| 12407 MoPac Expwy. N. #100-374 |
| Austin, TX 78758-2499 |
| $12.00/Year |
|
|
| Telephone Engineer & Management |
| Advanstar Communications, Inc. |
| P.O. Box 6100 |
| Duluoth, MN 55806-9822 |
| $24.00/Year |
|
|
| UFO |
| 1536 S. Robertson Blvd. |
| Los Angeles, CA 90035 |
| $21.00/Year |
|
|
| Wild Cartoon Kingdom |
| 9171 Wilshire Blvd., Suite 300 |
| Beverly Hills, CA 90210 |
| $3.95/Issue |
|
|
| Wired |
| P.O. Box 191826 |
| San Francisco, CA 94119-1826 |
| $20.00/Year |
|
|
| ***************************************************************************** |
|
|
| !!!!POST EVERYWHERE!!!! |
|
|
| THE WORLD'S FIRST NOVEL-ON-THE-NET (tm) SHAREWARE!!! |
| By Inter.Pact Press |
|
|
| "TERMINAL COMPROMISE" |
| by Winn Schwartau |
|
|
| A high tech thriller that comes from today's headlines! |
|
|
| "The Tom Clancy of computer security." |
| Assoc. Prof. Dr. Karen Forcht, James Madison University |
|
|
| "Terminal Compromise" is a highly praised novel about the inva- |
| sion of the United States by computer terrorists. |
|
|
| Since it was first published in conventional print form, (ISBN: |
| 0-962-87000-5) it has sold extremely well world-wide, but then |
| again, it never hit the New York Times Bestseller List either. |
| But that's OK, not many do. |
|
|
| Recently, someone we know very well came up with a real bright |
| idea. They suggested that INTER.PACT Press take the unprece- |
| dented, and maybe slightly crazy, step to put "Terminal Compro- |
| mise" on the Global Network thus creating a new category for book |
| publishers. The idea is to offer "Terminal Compromise," and |
| perhaps other titles at NOVEL-ON-THE-NET SHAREWARE(tm) rates to |
| millions of people who just don't spend a lot of time in book- |
| stores. After discussions with dozens of people - maybe even |
| more than a hundred - we decided to do just that. We know that |
| we're taking a chance, but we've been convinced by hackers and |
| phreakers and corporate types and government representatives that |
| putting "Terminal Compromise" on the net would be a fabulous step |
| forward into the Electronic Age, (Cyberspace if you will) and |
| would encourage other publishers to take advantage of electronic |
| distribution. (It's still in the bookstores, though.) |
|
|
| To the best of our knowledge, no semi-sorta-kinda-legitimate |
| -publisher has ever put a complete pre-published 562 page book on |
| the network as a form of Shareware. So, I guess we're making |
| news as well as providing a service to the world's electronic |
| community. The recommended NOVEL-ON-THE-NET SHAREWARE fees are |
| outlined later (this is how we stay in business), so please read |
| on. |
|
|
| WE KEEP THE COPYRIGHTS! |
|
|
| "Terminal Compromise" is NOT being entered into the public |
| domain. It is being distributed electronically so hundreds |
| of thousands more people can enjoy it and understand just where |
| we are heading with our omnipresent interconnectedness and the |
| potential dangers we face. INTER.PACT Press maintains all copy- |
| rights to "Terminal Compromise" and does not, either intentionally |
| or otherwise, explicitly or implicitly, waive any rights to |
| this piece of work or recourses deemed appropriate. (Damned |
| lawyers.) |
|
|
| (C) 1991, 1992, 1993, Inter.Pact Press |
|
|
|
|
|
|
| TERMINAL COMPROMISE - THE REVIEWS |
|
|
| " . . . a must read . . ." |
| Digital News |
|
|
| "Schwartau knows about networks and security and creates an |
| interesting plot that will keep readers turning the pages." |
| Computer World |
|
|
| "Terminal Compromise is fast-paced and gripping. Schwartau |
| explains complex technology facilely and without condescension." |
| Government Computer News |
|
|
| "An incredibly fascinating tale of international intrigue . . . |
| action . . . characterization . . . deserves attention . . . |
| difficult to imagine a more comprehensive resource." |
| PC Laptop |
|
|
| "Schwartau . . . has a definite flair for intrigue and plot |
| twists. (He) makes it clear that the most important assets at |
| risk are America's right to privacy and our democratic ideals." |
| Personal Identification News |
|
|
| "I am all too familiar with the appalling realities in Mr. |
| Schwartau's book. (A) potentially catastrophic situation." |
| Chris Goggans, Ex-Legion of Doom Member. |
|
|
| " . . . chilling scenarios . . . ", "For light summer reading |
| with weighty implications . . . ", " . . . thought provoking, |
| sometimes chilling . . . " |
|
|
| Remember, it's only fiction. Or is it? |
|
|
|
|
|
|
| TERMINAL COMPROMISE: SYNOPSIS |
|
|
| "It's all about the information . . . the information." |
| From "Sneakers" |
|
|
| Taki Homosoto, silver haired Chairman of Japan's huge OSO Indus- |
| tries, survived Hiroshima; his family didn't. Homosoto promises |
| revenge against the United States before he dies. His passion- |
| ate, almost obsessive hatred of everything American finally comes |
| to a head when he acts upon his desires. |
|
|
| With unlimited resources, he comes up with the ultimate way to |
| strike back at the enemy. Miles Foster, a brilliant 33 year old |
| mathematician apparently isn't exactly fond of America either. |
| The National Security Agency wanted his skills, but his back- |
| ground and "family" connections kept him from advancing within the |
| intelligence community. His insatiable - borderline psychotic- |
| sex drive balances the intensity of waging war against his own |
| country to the highest bidder. |
|
|
| Scott Mason, made his fortune selling high tech toys to the |
| Pentagon. Now as a New York City Times reporter, Mason under- |
| stands both the good and the evil of technology and discovers |
| pieces of the terrible plot which is designed to destroy the |
| economy of the United States. |
|
|
| Tyrone Duncan, a physically huge 50-ish black senior FBI agent |
| who suffered through the Hoover Age indignities, befriends Scott |
| Mason. Tyrone provides the inside government track and confusion |
| from competing agencies to deal with the threats. His altruistic |
| and somewhat pure innate view of the world finally makes him do |
| the right thing. |
|
|
| As Homosoto's plan evolves, Arab zealots, German intelligence |
| agents and a host of technical mercenaries find the weaknesses in |
| our techno-economic infrastructure. Victims find themselves |
| under attack by unseen adversaries; Wall Street suffers debili- |
| tating blows; Ford and Chrysler endure massive shut downs. The |
| U.S. economy suffers a series of crushing blows. |
|
|
| From the White House to the Pentagon to the CIA to the National |
| Security Agency and FBI, a complex weaving of fascinating politi- |
| cal characters find themselves enmeshed a battle of the New World |
| Order. Sex, drugs, rock'n'roll: Tokyo, Vienna, Paris, Iraq, |
| Iran. It's all here. |
|
|
| Enjoy reading "Terminal Compromise." |
|
|
|
|
|
|
| SHAREWARE - NOVEL FEES: |
|
|
| We hope that you enjoy "Terminal Compromise" as much as everyone |
| else has, and that you will send us a few shekels according to |
| the following guidelines. |
|
|
| The NOVEL-ON-THE-NET SHAREWARE(tm) fees for us as a publishing |
| company are no different than the fees for software application |
| shareware publishers, and the intent is the same. So please, let |
| us continue this form of publishing in the future. |
|
|
|
|
| NOVEL-ON-THE-NET SHAREWARE Fees For The People: |
|
|
| The suggested donation for individuals is $7. If you hate Termi- |
| nal Compromise after reading it, then only send $6.50. If you're |
| really, really broke, then tell a hundred other people how great |
| it was, send us a rave review and post it where you think others |
| will enjoy reading it, too. If you're only a little broke, send |
| a few dollars. After all, this is how we stay in business. With |
| each registration, we will also send a FREE! issue of "Security |
| Insider Report," a monthly security newsletter also published by |
| Inter.Pact Press. |
|
|
|
|
| NOVEL-ON-THE-NET SHAREWARE Fees For Businesses: |
|
|
| We hope that you put "Terminal Compromise" on your internal |
| networks so that your employees will have the chance to enjoy it |
| as well. It's a great way to increase security awareness amongst |
| this country's 50,000,000 rank and file computer users. Plus, |
| it's a hell of a good read. |
|
|
| One company plans on releasing a chapter every few days |
| throughout its E-Mail system as a combination of security aware- |
| ness and employee 'perc'. Try it; it works and your employees |
| will appreciate it. Why? Because they'll all talk about it - |
| bringing security awareness to the forefront of discussion. |
|
|
| FEES |
|
|
| Distribution for up to 100 people on a single network: $ 500 |
| (Includes 1 Year subscription to "Security Insider Report.") |
|
|
| Distribution for up to 1000 people on a single network: $ 3000 |
| (Includes 10 1 Year subscriptions to "Security Insider |
| Report.") |
|
|
| Distribution for up to 2500 people on a single network: $ 6250 |
| (Includes 1 Year electronic Corporate site license to |
| "Security Insider Report.") |
|
|
| Distribution for up to 5000 people on a single network: $ 10000 |
| (Includes 1 Year electronic Corporate site license to |
| "Security Insider Report.") |
|
|
| Distribution for up to 10000 people on a single network: $ 15000 |
| (Includes 1 Year electronic Corporate site license to |
| "Security Insider Report.") |
|
|
| Distribution for up to 25000 people on a single network: $ 25000 |
| (Includes 1 Year electronic Corporate site license to |
| "Security Insider Report.") |
|
|
| Distribution for more than that - Please call and we'll figure it |
| out. Would you like us to coordinate a special distribution |
| program for you? Would you like in Postscript or other visual |
| formats? Give us a call and we'll see what we can do. |
|
|
| * * * * * * * * * * |
| Please DO NOT UPLOAD AND DISTRIBUTE "Terminal Compromise" |
| into your networks unless you intend on paying the recom- |
| mended fees. |
|
|
| * * * * * * * * * * |
|
|
|
|
| NOVEL-ON-THE-NET SHAREWARE Fees for Universities: FREE! |
|
|
| "Terminal Compromise" has been used by many schools and universi- |
| ties as a teaching supplement. Recognized Educational institu- |
| tions are entitled to use "Terminal Compromise" at NO COST, as |
| long as you register with us that you are doing so. Please pro- |
| vide: School name, address, etc., the course, the instructor, and |
| the reason for using it. Also, we'd like to hear from you and |
| tell us how it went. Thanks. |
|
|
|
|
| SHAREWARE-NOVEL Fees for Local, State and Federal Governments. |
|
|
| You have the money. :-) Please send some back by following |
| the same fee guidelines as those for businesses. |
|
|
| Government employees: You are The People - same fees are |
| appreciated. |
|
|
| * * * * * * * * * * |
|
|
| Agencies: Do not upload and distribute "Terminal Compromise" |
| unless you plan on paying the fees. |
|
|
| * * * * * * * * * * * |
|
|
|
|
| NOVEL-ON-THE-NET SHAREWARE Fees for the International Community |
| Make payments in $US, please. |
|
|
| GETTING TERMINAL COMPROMISE: |
|
|
| You can get your copy of Terminal Compromise from a lot of |
| sites; if you don't see it, just ask around. Currently the novel is |
| archived at the following sites: |
|
|
| ftp.netsys.com |
| /pub/novel |
|
|
| wuarchive.wustl.edu |
| /doc/misc |
|
|
| soda.berkeley.edu |
| /pub/novel |
|
|
| It consists of either 2 or 5 files, depending upon how you re- |
| ceive it. (Details at end of this file.) |
|
|
| Feel free to post all five files of "Terminal Compromise" any- |
| where on the net or on public or private BBS's as long as this |
| file accompanies it as well. |
|
|
|
|
| Please forward all NOVEL-ON-THE-NET SHAREWARE fees to: |
|
|
| INTER.PACT PRESS |
| 11511 Pine St. N. |
| Seminole, FL., 34642 |
|
|
| Communications: |
|
|
| Phn: 813-393-6600 |
| Fax: 813-393-6361 |
| E-Mail: p00506@psi.com |
| wschwartau@mcimail.com |
|
|
| We will accept checks, money orders, and cash if you must, and we |
| mean if you must. It's not the smartest thing in the world to |
| send cash through the mail. We are NOT equipped at this point |
| for credit cards. |
|
|
| Remember, "Terminal Compromise is copyrighted, and we will vigor- |
| ously pursue violations of that copyright. (Lawyers made us say |
| it again.) |
|
|
| If you ABSOLUTELY LOVE "Terminal Compromise," or find that after |
| 50 pages of On-Screen reading, you may want a hard copy for your |
| bookshelf. It is available from bookstores nationwide for |
| $19.95, or from Inter.Pact directly for $19.95 + $3.50 shipping |
| and handling. If you first paid the $ 7 NOVEL-ON-THE-NET SHARE- |
| WARE fee, send in proof and we'll deduct $ 7 from the price of |
| the hard copy edition. |
|
|
| ISBN: 0-962-87000-5 |
|
|
| Enjoy "Terminal Compromise" and help us make it an easy decision |
| to put more books on the Global Network. |
|
|
| Thank you in advance for your attention and your consideration. |
|
|
|
|
|
|
| The Publishers, |
| INTER.PACT Press |
|
|
|
|
|
|
| READING "TERMINAL COMPROMISE" |
|
|
| "Terminal Compromise" will come to you in one of two ways: |
|
|
| 1) Original Distribution Format From Inter.Pact Press contains |
| only two -2- files. |
|
|
| TC_READ.ME 13,927 Bytes |
|
|
| That is this file you are now reading and gives an overview of |
| "Terminal Compromise" and how NOVEL-ON-THE-NET Shareware works. |
|
|
| TERMCOMP.ZIP 605,821 Bytes |
|
|
| This is the total content of "Terminal Compromise". Run PKUNZIP |
| to expand the file into four -4- readable ASCII files. |
|
|
| 2) Some locations may choose to post "Terminal Compromise" in |
| readable ASCII form. There will then be four files in addition |
| to the TC_READ.ME file. |
|
|
| TERMCOMP.1 250,213 Bytes |
|
|
| contains the Introduction and Chapters 1 through 5. |
|
|
| TERMCOMP.2 337,257 Bytes |
|
|
| contains Chapters 6 through 14. |
|
|
| TERMCOMP.3 363,615 Bytes |
|
|
| contains Chapters 15 through 21. |
|
|
| TERMCOMP.4 388,515 Bytes |
|
|
| contains Chapters 22 through 30 and the Epilogue. |
|
|
|
|
| Enjoy "Terminal Compromise!" and pass it on to whomever you |
| think would enjoy it, too! |
|
|
| Thank You! |
|
|
| **************************************************************************** |
|
|
| THE STATE OF SECURITY IN CYBERSPACE |
|
|
| SRI International conducted a worldwide study in 1992 of a broad range of |
| security issues in "cyberspace." In brief, cyberspace is the full set of |
| public and private communications networks in the United States and elsewhere, |
| including telephone or public switched telephone networks (PSTNs), packet data |
| networks (PDNs) of various kinds, pure computer networks, including the |
| Internet, and wireless communications systems, such as the cellular telephone |
| system. We did not address security vulnerabilities associated with |
| classified, secure communications networks used by and for governments. |
|
|
| The study was conducted as part of our ongoing research into the |
| vulnerabilities of various software components of cyberspace. Our approach was |
| to conduct research through field interviews with a broad range of experts, |
| including people we characterize as "good hackers," about security issues and |
| vulnerabilities of cyberspace and the activities of the international |
| "malicious hacker" community. |
|
|
| While the specific results of the study are proprietary to SRI, this brief |
| report summarizes our general conclusions for the many individuals who kindly |
| participated in our field interviews. As we indicated during our field |
| interviews, the original research for this project was not part of any other |
| kind of investigation, and we have not revealed the identify of any of our |
| respondents. |
|
|
| The study aimed to understand "malicious hackers," that is, people who have and |
| use the technical knowledge, capability, and motivation to gain unauthorized |
| access, for various reasons, to systems in cyberspace. It is important to |
| understand that by no means all hackers are malicious nor does most hacking |
| involve unauthorized access to cyberspace systems; indeed, only a small |
| fraction of computer hacking involves such activities but gives hacking an |
| otherwise undeserved bad reputation. While we attempted to focus on technical |
| (software) vulnerabilities, our interviews led us to look more at the broader |
| motivations and different approaches to cracking into various networks and |
| networked systems. |
|
|
| MAIN CONCLUSIONS |
|
|
| Our main conclusion is that social, organizational, and technological factors |
| still combine in ways that make much of cyberspace relatively vulnerable to |
| unauthorized access. The degree of vulnerability varies from one type of |
| communications system to another. In general, the PSTN is the least vulnerable |
| system, the PDNs are somewhat more vulnerable than the PSTN, the Internet is |
| relatively insecure, and as is widely known, the cellular phone system is the |
| most vulnerable of the four major areas we addressed. |
|
|
| The main vulnerabilities in most communications networks involves procedural, |
| administrative, and human weaknesses, rather than purely technical |
| vulnerabilities of network management, control systems, and hardware, and |
| software. There are technical vulnerabilities--poor system design and specific |
| security flaws in software--but they are mainly exploitable because of the |
| above problems. |
|
|
| Highlights of the study's conclusions include: |
|
|
| o Malicious attacks on most networks and networked systems cannot be completely |
| prevented, now or in the future. More than enough information is publicly |
| available to hackers and other technically-literate people to preclude attempts |
| at prevention of intrusions. |
|
|
| o It is possible individuals or groups could bring down individual systems or |
| related groups of systems, on purpose or by accident. However, security is |
| generally improving as a result of dealing with past threats and challenges to |
| system security. For instance, responses to the most recent serious threat to |
| the Internet, the so-called Internet Worm in 1989, included improved security |
| at sites vulnerable to this sort of worm. |
|
|
| o We found no evidence that the current generation of U.S. hackers is |
| attempting to sabotage entire networks. On the contrary, doing so is |
| inconsistent with the stated ethics and values of the hacker community, which |
| are to explore cyberspace as a purely intellectual exercise without malicious |
| intent or behavior. Some individuals who operate outside this informal ethical |
| framework, however, can and do damage specific systems and occasionally use |
| systems for personal gain or vindictive activities. |
|
|
| o There is some evidence that the newest generations of hackers, may be more |
| motivated by personal gain than the traditional ethic of sheer curiosity. This |
| development could mean that networks and networked systems could become more |
| likely targets for attacks by hardened criminals or governments' intelligence |
| services or their contractors (i.e., employing malicious hackers). This threat |
| does not appear to be significant today but is a possible future scenario. |
|
|
| o The four major areas of vulnerability uncovered in our research have little |
| or nothing to do with specific software vulnerabilities per se. They relate |
| more to the ways in which hackers can gain critical information they need in |
| order to exploit vulnerabilities that exist because of poor systems |
| administration and maintenance, unpatched "holes" in networks and systems, and |
| so on. |
| - The susceptibility of employees of businesses, public organizations, schools, |
| and other institutions to "social engineering" techniques |
| - Lax physical and procedural controls |
| - The widespread availability of non-proprietary and of sensitive and |
| proprietary information on paper about networks and computer systems |
| - The existence of "moles," employees of communications and computer firms and |
| their suppliers who knowingly provide proprietary information to hackers. |
|
|
| o The vulnerabilities caused by shortcomings in software-based access controls |
| and in hardware-related issues constitute significantly lower levels of risk |
| than do the four areas discussed above on more secure networks such as the PSTN |
| and PDNs. However, on the Internet and similar systems, software-based access |
| controls (for instance, password systems) constitute significant problems |
| because of often poor system maintenance and other procedural flaws. |
|
|
| RECOMMENDATIONS |
|
|
| Based on our research, we recommend the following: |
|
|
| 1. Protection of organizational information and communications assets should be |
| improved. Issues here range from those involving overall security systems to |
| training employees and customers about maintenance of security on individual |
| systems, handling and disposition of sensitive printed information, and dealing |
| with "social engineering." |
|
|
| 2. Techniques used to protect physical assets should be improved. For example, |
| doors and gates should be locked properly and sensitive documents and equipment |
| guarded appropriately. |
|
|
| 3. Organizations and their employees should be made aware of the existence and |
| role of moles in facilitating and enabling hacker intrusions, and care taken in |
| hiring and motivating employees with the mole problem in mind. |
|
|
| 4. Software- and hardware-based vulnerabilities should also be addressed as a |
| matter of course in systems design, installation and maintenance. |
|
|
| 5. Organizations concerned with information and communications security should |
| proactively promote educational programs for students and parents about |
| appropriate computer and communications use, personal integrity and ethics, and |
| legitimate career opportunities in the information industry, and reward |
| exemplary skills, proficiency and achievements in programming and ethical |
| hacking. |
|
|
| 6. Laws against malicious hacking should be fairly and justly enforced. |
|
|
| SRI's believes that the results of this study will provide useful information |
| to both the operators and users of cyberspace, including the hacker community. |
| We are planning to continue our research in this area during 1993 within the |
| same framework and conditions (i.e., anonymity of all parties and |
| organizations) as we conducted the 1992 research. We invite hackers and others |
| who are interested in participating in this work through face-to-face, |
| telephone or email interviews should contact one of the following members of |
| the SRI project team: |
|
|
| A. J. Bate |
| SRI International |
| Phone: 415 859 2206 |
| Fax: 415 859 3154 |
| Email: aj_bate@qm.sri.com, |
| aj@sri.com |
|
|
| Stuart Hauser |
| SRI International |
| Phone: 415 859 5755 |
| Fax: 415 859 3154 |
| Email: stuart_hauser@qm.sri.com |
|
|
| Tom Mandel |
| SRI International |
| Phone: 415 859 2365 |
| FAX: 415 859 7544 |
| Email: mandel@unix.sri.com |
|
|
| ***************************************************************************** |