-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE TWENTY-FIFTH ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETRIEVAL = - GUILD - = = - Hacking, Phreaking, Anarchy, Survivalism, and Commentary - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Eight - Issue Number Twenty-Five - Dated 05/21/2000 Editor-In-Chief is Mercenary : iirg@iirg.org Staff Writers Are: Thomas Icom : ticom@iirg.org Black IC : black_ic@iirg.org Phurk : phurk@iirg.org --------------------- Table of Discontents: --------------------- # Selection Author - ------------------------------------ ---------------- 1. Legal Ease & IIRG Information The IIRG 2. Big Brother on the Boulevard Thomas Icom/IIRG 3. DXing with Citizen Band Radio Black IC/IIRG 4. Playstation 2 Modification and Muses Black IC/IIRG (Part 1) 5. Hacking Computer Shows for Phun and Profit Mercenary/IIRG (Part 1) 6. An Introduction to Palm Pilot Programming Phurk/IIRG 7. IIRG Signal Intelligence Black IC/IIRG (SIGINT) Guidelines 8. The Rumor Mill Anonymous Sources 9. Letters to the IIRG N/A 10. IIRG and Phantasy Distribution The IIRG -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: Legal Ease & IIRG Information OFFICIAL DISCLAIMER... All Contents of PHANTASY Magazine are (C) Copyright by THE IIRG, all rights reserved. Nothing may be reproduced in whole or in part without written permission of the IIRG. Phantasy Magazine may also NOT be included on any CD-ROM collection without express written permission of the IIRG. All information published in PHANTASY is from USER contributed material. The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. In the future PHANTASY Magazine will be made available quarterly to the Internet community free of charge. Any corporate, government, legal, or otherwise commercial usage or possession (electronic or otherwise) is strictly prohibited without written IIRG approval, and is in violation of applicable US Copyright laws. The IIRG (IIRG Mailing Address) 862 Farmington Avenue Suite 306 Bristol, Connecticut 06010 Here is the IIRG's Public Key: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQCNAjE9nrYAAAEEAKuDXqGRyCw42PStHZMLjOVZ2QhTPklKXv5NK3u0hu/EcBYM Cib6/jIDwgr3uwRo9DVptYVtGAYIY7/3OXw+B+Vxmb846weUBwcY14mBPrRtAjhI EnSzHeS477sL1MklTQ+cxmDh8TyaAG8s5n+gKHc2qCQ+FTo6L1WIQPIFCJE5AAUR tBRJSVJHIDxpaXJnQGlpcmcuY29tPg== =onlg -----END PGP PUBLIC KEY BLOCK----- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [2]: Big Brother on the Boulevard By: Thomas Icom/IIRG If you go through a toll booth and look up, you'll see them. Others are better hidden, reaching out with radio/electronic tendrils as you ply the blacktop byways. Either way, a search through public government records discloses their existence and often their lairs. Live or do business in any metropolitan area, and your forcibly encouraged to "voluntarily" do business with these entities. They implement wireless, telecommunications, artificial intelligence, surveillance, and many other technologies. Some of the contracts are won by companies that are generally unknown to the general public, such as Mark IV Industries and Amtech. Others belong to military-related concerns; Rome Labs and Kaman. The whole octopus has a name: Intelligent Transportation Systems, and was born from government legislation; the Intermodal Surface Transportation Efficiency Act of 1991 (ISTEA). Like any hacking sushi connoisseur knows, however, an octopus by any other name is still tasty. In the words of ITS America, a federal advisory committee to the U.S. Department of Transportation established to coordinate the development and deployment of ITS in the United States, "ISTEA calls for the creation of an economically efficient and environmentally sound transportation system that will move people and goods in an energy efficient manner, and will provide the foundation for a competitive American transportation industry." While innocent sounding on the surface, there are many dual-use aspects of ITS technology, especially when one takes into account all the "critical infrastructure protection" measures the government is talking about. On July 15, 1996 , President William J. Clinton signed Executive Order 13010. The beginning paragraph states: "Certain national infrastructures are so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the United States. These critical infrastructures include telecommunications, electrical power systems, gas and oil storage and transportation, banking and finance, transportation, water supply systems, emergency services (including medical, police, fire, and rescue), and continuity of government. Threats to these critical infrastructures fall into two categories: physical threats to tangible property ("physical threats"), and threats of electronic, radio-frequency, or computer-based attacks on the information or communications components that control critical infrastructures ("cyber threats"). Because many of these critical infrastructures are owned and operated by the private sector, it is essential that the government and private sector work together to develop a strategy for protecting them and assuring their continued operation." To this end, The President's Commission on Critical Infrastructure Protection was created. According to The PCCIP, transportation infrastructure is defined as: "The nation's physical distribution system critical to supporting the national security and economic well-being of this nation, including the national airspace system, airlines and aircraft, and airports; roads and highways, trucking and personal vehicles; ports and waterways and the vessels operating thereon; mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous materials; freight and long haul passenger rail; and delivery services." Taking into account the information provided by the PCCIP, we can begin to understand the dual-use nature of ITS systems. This is nothing new. The Interstate Highway System was created by President Eisenhower on June 29, 1956 in part for the quick movement of military personnel and equipment in the event of a national emergency. Although they don't realize it, ITS has been a common topic among conspiracy theorists. Those circles are always awash with talk about how newer vehicles are equipped with computer systems that can let the car be remotely shut off by authorities. America is full of car enthusiasts, and while cars with electronic fuel injection and computerized engine controls are more vulnerable to EMP and HERF than old fashioned points and carburetors, I have yet to see a mechanic or electrical engineer come to be with an engine computer that has such a feature built in. Considering how many vehicle electronic systems have integrated circuits available to increase performance, such a thing would have been discovered and there'd be not only be a modification or device out to disable it, but someone with a "trolling for taillights" sense of humor would have designed and distributed a device to screw with people. There are allegedly mini-EMP generators out there which are being developed for law enforcement agencies to assist them in vehicular pursuits by disrupting a vehicle's engine electronics, and of course anti-theft systems which enable you to call your car if it's stolen and shut it off, but nothing universal as the conspiracy theorists claim. If anyone does come up with some proof, however, please send it to me. Just don't send me the recorded ramblings of some guy who bought an hour on WWCR. The surveillance aspects of ITS, however, are real and talked about quite openly by the very people who use them. Any observant individual can see the equipment in use by traveling the Intestates of the United States in any metropolitan area, such as the I-95 Corridor that runs up the East Coast. I-95 is one of the premiere ITS highways. ITS implementation on the Corridor is handled by I-95 Corridor Coalition , a consortium consisting of Departments of Transportation, Transportation Authorities, and Associated Organizations from Virginia to Maine whose are of responsibility includes Interstate Highway I-95. According to information on their website: "The term surveillance has been used to denote the observation of conditions in time and space. Thus, the function of a surveillance system in an Intelligent Transportation System (ITS) environment is to provide information of the observed conditions to enable the implementation of traffic management, Travel Demand Management (TDM), and Traveler Information Services (TIS). Although the objectives of transportation management decisions have been to reduce traffic delay and accidents, concerns for the environment have made improvement of environmental quality an additional objective. This addition has expanded the function of a surveillance system to include observation of environmental conditions in time and space. This addition is consistent with the I-95 Corridor Coalition goals derived from its stated mission." The surveillance objectives and functional requirements of the I-95 system were listed as follows: OBJECTIVES Enhance traffic incident management 1. Provide data for automated traffic incident detection 2. Provide information for coordinated incident responses 3. Verify traffic incident reports 4. Detect disabled vehicles and assistance requests 5. Assess the severity of traffic incidents 6. Provide continuous tracking of HAZMAT carriers Enhance real-time traffic control operations 1. Support real-time, traffic adaptive control 2. Enhance HOV control & operations (HOV - High Occupancy Vehicle) 3. Accommodate priority vehicles 4. Facilitate reversible-lane operations 5. Improve ramp metering 6. Support congestion pricing 7. Accommodate variable speed limit determination Enhance traffic management during snow storms and other emergencies 1. Support adaptive control 2. Support snow removal scheduling & operations Improve multi-modal and inter-modal transportation operations 1. Provide traveler security surveillance at transit stops and stations 2. Provide link travel times for transit time of arrival estimates 3. Track transit vehicle location and schedule adherence 4. Provide park-and-ride lot status 5. Provide transit vehicle tracks as probe data 6. Provide passenger loading estimates Support Traveler Information Services 1. Provide traffic conditions information (e.g., congestion, incident) 2. Provide roadway conditions information (e.g., closure, snow/ice) 3. Provide inter-urban transit information 4. Provide urban transit information 5. Provide parking information Enhance the transportation systems planning database 1. Provide incident data (location, type, severity) 2. Provide traffic count data 3. Provide delay data 4. Provide VMT data 5. Provide traffic composition data 6. Provide vehicle O-D data Facilitate Travel Demand Management (TDM)strategy implementation 1. Identify traffic congestion locations and levels 2. Characterize traffic demand levels (e.g., V/C vs. time of day) 3. Monitor air quality Support traffic law and regulation enforcement 1. Provide weight measurements 2. Provide vehicle height and width measurements 3. Determine vehicle occupancy (for HOV) 4. Provide speed measurements FUNCTIONAL REQUIREMENTS 1. Monitor Traffic Conditions 1.1 Acquire Traffic Data 1.2 Assess Traffic Performance 1.3 Detect Traffic Incident and Congestion 1.4 Confirm Traffic Incident and Congestion 1.5 Acquire Incident Assessment Data 2. Acquire Individual Vehicle Information 2.1 Determine Vehicle Speed and Direction 2.2 Determine Vehicle Weight and Dimension 2.3 Determine Vehicle Occupancy 2.4 Determine Vehicle Identification 2.5 Determine Vehicle Location 2.6 Determine Vehicle Emissions 2.7 Determine Vehicle Safety 2.8 Receive Vehicle-to-Infrastructure Communications 3. Monitor Environmental Conditions 3.1 Monitor Road Weather Conditions 3.2 Monitor Pavement Temperature 3.3 Formulate Snow/Ice Prediction Data 3.4 Monitor Roadway Air Pollution 3.5 Identify High Pollution Areas 3.6 Formulate Air Quality Assessment Data 4. Monitor Road Hazards 4.1 Detect Debris on Road 4.2 Detect Pavement/Bridge Damage 4.3 Detect Animal Entering Roadway 4.4 Receive Road Hazard Reports 4.5 Identify Low Visibility Conditions 4.6 Detect Slippery Road Conditions 4.7 Detect Hazardous Cross Wind Conditions 4.8 Verify Road Hazard Detection 4.9 Generate Road Hazard Detection Report 5. Monitor Parking Facilities 5.1 Determine Parking Entries and Exits 5.2 Determine Parking Usage 5.3 Formulate Parking Charge Input 6. Monitor Transportation Law Violation 6.1 Determine Speed Violation 6.2 Determine Weight Violation 6.3 Determine Height and Width Violation 6.4 Determine HOV Occupancy Violation 6.5 Determine Designated Route Violation 6.6 Determine Vehicle Emissions Violation 6.7 Determine Unsafe Vehicle Status 7. Monitor Travel Security 7.1 Monitor Intermodal Transfer Points 7.2 Detect Transfer Point Security Events 7.3 Monitor Public Transit Vehicle 7.4 Detect Transit Vehicle Security Events 7.5 Monitor Parking Facility Security 7.6 Detect Parking Facility Security Events 8. Maintain Support Databases 8.1 Maintain Road Network Database 8.2 Maintain Route Database 8.3 Maintain Transfer Point Database 8.4 Maintain Parking Database 8.5 Maintain Surveillance Asset Database 8.6 Maintain Tracked Vehicle Database To this end a wide variety of technologies were implemented in the final system design For traffic surveillance there are Inductive Loop Detectors, Magnetic Detectors and Magnetometers, Sensing Cables, Pressure Plates, and Bending Plates, Infrared/Photoelectric Detectors, Acoustic Detectors, Microwave Radar Detectors, Vehicle Probes [Automatic Vehicle Identification (AVI)/Electronic Toll and Traffic Management (ETTM) and Automated Vehicle Location (AVL)], Video Vehicle Detection Systems (VVDS), Closed-Circuit Television (CCTV), and Aerial Surveillance. For vehicle weight sensing there are Bending Plate Systems, Shallow Weigh Scales, Deep-Pit Weigh Scales, Bridge Weighing Systems, Capacitive Systems, Piezo-Electric Sensors, and Fiber-Optic Sensors. Environmental conditions sensing is taken care of with Surface Conditions Analyzers (SCAN) and Light Detection and Ranging (LIDAR) systems. "Because of the geographic characteristics of the Corridor, the conceptual system design was developed for both urban roads and rural roads. In either case, the conceptual system design emphasizes integration of surveillance information from multiple sources and use of multiple technology types (including both point detection and wide-area surveillance). The primary focus of the surveillance concept is to acquire data for traffic incident management, TDM, intermodal transportation, traveler advisory information, and transportation facility planning. To effectively collect data for traffic incident detection and management, additional point detection systems should be installed to fill in the existing surveillance coverage gaps. Overhead or roadside-mounted radar detectors are recommended for new installation though other emerging technologies, such as ultrasonic and infrared, may also be used. The new sensor installations should be integrated with existing inductive loop detectors to provide automated incident detection capability at the local operations center level. Stand-alone incident detection systems, such as the emerging VVDS, should be installed at locations with a high potential for traffic accidents. Remote incident verification is performed primarily by CCTVs. However, to enhance the ability to quickly verify incidents, the use of a multisensor surveillance aircraft is incorporated. This aircraft should be equipped with a long-range air-to-ground radar and infrared sensors, and should have the capability to maintain an area-wide traffic situational awareness while focusing on acquiring detailed data of an incident. The aircraft should also have the capability to communicate with multiple traffic operations centers and public safety vehicles on the ground, as well as other aerial surveillance assets in the area. Human surveillance continues to play a major role in incident detection. The design concept includes an ability to receive cellular telephone calls from motorists, and incident notifications from public safety personnel (e.g., police and freeway service patrol vehicle drivers), public transit system operators, and commercial fleet operators. Incident notifications may also be generated by an automated or semi-automated in-vehicle Mayday system interfacing with "Smart Call Boxes" installed a long the Corridor's roadways. A final source of surveillance information in this conceptual design is vehicle probe data. These sources include vehicle tracking data acquired by public fleet operators (e.g., transit, service patrol, and police vehicles) and commercial fleet operators. Vehicle tracking data may also be acquired through monitoring of cellular telephone signals, interrogating of electronic toll tags, or reading of vehicle license plates. Tracking transit vehicles will provide probe data for surveillance and supply information for intermodal coordination (transit-to-transit and transit-to-automobile). This system design concept accounts for the information exchange needed to enhance intermodal operations. In addition to acquiring traffic surveillance data, the acquisition of pavement conditions, weather, and environmental data is incorporated into the design concept. Because of the lack of and the high cost required to install an adequate surveillance communication infrastructure in the rural areas, the focus of this system design concept is to rely on human surveillance, aerial surveillance, and in-vehicle Mayday notification capability for incident detection. Also, satellite communications would be used to transport data from sensors in remote areas to a nearby TMC for processing." - "Conceptual System Design", Final Project Report, Project #3 (95-003) Surveillance Requirements/Technology: Executive Summary I-95 Corridor Coalition There are a wide variety of systems and subsystems to learn about, and many possibilities for the technological experimenter once this stuff hits the surplus market. Some states such as Connecticut, have implemented ITS-like systems long before the passage of the ISTEA. ITS is now eight years old, and generations of technology have been supplanted since them. On a more serious note, the potential of abuse of ITS by institutional control addicts is too great to let it stay in the shadows any longer. This is the first in a series of articles about Intelligent Transportation Systems. In future articles there will be more detailed information about the various systems and subsystems of ITS. ====================================================================== Thomas Icom, IIRG - International Information Retrieval Guild, "May Odin guide your way!" VMB: 877-570-5970 x570 ====================================================================== -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [3]: DXing with Citizen Band Radio By: Black IC/IIRG Communication is essential to everyone in someway shape or form. Experimenting with different avenues of communication can add a whole new dimension to ones life. The Citizens Band Radio Service (CB)is a private, two-way, short-distance voice communications service for personal or business activities. The CB Radio Service may also be used for voice paging. This article will cover the long-distance voice communication and your needs to get involved in this art. Keep in mind you most likely will be breaking a few FCC regulations in doing so. Enough said. CB's became a common tool for drivers to have on hand for emergency purposes and a means for those on the road for extended periods of time to communicate with others to pass the time, gain information on road conditions, law enforcement locations and other information pertinent to their travels. FCC Regulations state Four (4) Watts of carrier power is allowed for output on AM and Twelve (12) Watts of peak envelope power is the maximum power output on SSB. CB Operators normally transmit double Sideband AM on the first 23 channels. Channels above 23, Upper Sideband or lower Sideband equipment may be used. The FCC regulates how far you can communicate with your CB. 155.3 miles is the limit. You will be well past that mileage point. Presently the FCC has allocated the following frequencies for CB usage. Channel Frequency Channel Frequency 1 26.965 21 27.215 2 26.975 22 27.225 3 26.985 23 27.255 4 27.005 24 27.235 5 27.015 25 27.245 6 27.025 26 27.265 7 27.035 27 27.275 8 27.055 28 27.285 9* 27.065 29 27.295 10 27.075 30 27.305 11 27.085 31 27.315 12 27.105 32 27.325 13 27.115 33 27.335 14 27.125 34 27.345 15 27.135 35 27.355 16 27.155 36 27.365 17 27.165 37 27.375 18 27.175 38 27.385 19 27.185 39 27.395 20 27.205 40 27.405 DXing Think of radio waves as that of water. You throw a rock out into a pond and the ripples that are created continue until subsidence. Very similar to radio waves. You send out a signal, depending on the power behind that signal (rf power) and frequency range its going to go far or a short distance. There are other factors that we have no control of that will affect the signal. The atmospheric conditions. Regular high frequency sky wave skip signals blasted in from the ionosphere, cause short range channel chaos. During periods of reduced ionosphere activity, the short-range capabilities of CB can be realized. But when the skip is active, a CB radio transmitter with only a few watts of output power can put strong signals into receivers thousands of miles away. This is commonly referred to as DXing. I'll focus on the things you can change to give you an edge in Dxing. Because there are no licenses needed to operate in the CB range many people, including your "average joe" purchase a CB and begin rampaging on the channels. This can be amusing but for those who want to get out of there area and talk to others in other states and in some cases countries simple modifications to a CB or more importantly a HAM rig modifiable for the CB range, a proper antennae build, and microphone can make all the difference in the world. I'll use the Mirage RCI 2970 100 Watt 10 Meter Mobile Unit to start with. I chose this model for several reasons. Its cost effective. Easily modifiable for CB range. Easy to move from mobile to base unit with an addition of a power supply. A couple years ago the RCI was made by another contractor. They were not made well nor did they come with any coherent warranty. Today they do. The 2950 is the sister model and comes with a 25 Watt power supply. Sure on any given day with horrendous atmospheric conditions you'll get the same results from both. Make the added financial jump up and get the "pregnant" one (100 Watt). The cost of the RCI 2970 is around $420.00 dollars depending on where you go for. It'll pay off in the long run with your enjoyment. The RCI 2970 requires 20 continuous amps to operate properly. Since this is inherently a mobile unit make sure you have this capability from your vehicle. Making the jump from mobile to base with this model is quite easy, though you need to invest in a power unit that is capable of 20 continuous amps. Making your own di-pole antennae 18 ft long in the 10 meter range or just shy is more than enough for your needs in using this beast. Granted this would not go well with your average vehicle. Comtelco makes a couple low band unity gain antennas that cover the 26 - 31 MHz range. Both of which are in the $30.00 dollar range. Your best bet is to talk to your seller about your needs and get everything dialed in once you have it set up. Most places will take the return on an antennae should it not meet your needs. Especially if you dropped some money at there shop for the RCI 2970. You'll also want to pick up a power microphone for the RCI. The stock one is sufficient temporarily. Upgrade on the microphone. Trust me. Otherwise you'll run the risk of sounding like a duck from time to time. . Specifications on the RCI 2970 Prior to Modification Frequency Range 28.0000-29.699 MHz Input Voltage 13.8 VDC Tuning Steps 100 Hz, 1 kHz, 10 kHz, 100 kHz, 1 MHz RF Power Output 100W: USB/LSB 50W: CW 50W: AM/FM Modifying the RCI 2970 Ham Mobile Rig Coverage Expansion 26-32 MHz Frequency Modification on new version Mod for faster scan speed How to wire the Microphone plug ! Heavy swinger mod (modulation) Upgrading AM detector Talk Back Modification 2950 Tune up/Mod Coverage Expansion - 26 to 32 MHz ! The only difference between the old and new versions of the RCI2950 is the new CPU board. They require slightly different modifications. The new version only covers 26 MHz to 30Mhz Old Version The old version of this radio can be expanded from 26 MHz to 32 MHz. Although the use of the 30 -32 MHz range may need realignment. First find the PC board with the jumpers on (behind the front panel).Then find 'J2',there is a jumper on pins P3 and P4.If this is jumper is removed you will get coverage from 26 MHz to 29.7 MHz. If this jumper is then place on P1 and P2 coverage will be from 26 MHz to 32 MHz(retuning may be needed to operate in 30-32 MHz range). The CPU now needs to be reset by pressing the button located below 'J2' New Version As the CPU board has changed the modification is different. On the CPU board there is only one jumper with two positions available. In one position it covers 28 MHz to 30 MHz, In the other it covers 26 MHz to 30 MHz. Frequency Modification on new Versions Remove the bottom cover to gain access to the small PC board immediately behind the front panel. There will be a set of jumpers marked "J1" and "J2". Move the jumper from the top two pins to the bottom two pins. Frequency coverage will now be expanded to 26mhz-29.7mhz. Press the "MAN" button to switch between CB operation and normal operation. Press the "SHF" button while in CB mode to switch between CB channel readout and frequency readout. Press the "ENT" button while in CB mode for in stand channel 9. *NOTE: The battery and the CPU reset have been eliminated in the newer versions, the new system uses memory capacitors for memory backup And... IF YOU FILL BOTH PINS J1 AND J2 ON THE NEW VERSION OF THE RANGER 2950 YOU WILL GET 26.000-32.000 JUST LIKE THE OLD VERSION.THE SAME FOR THE 2970. Mod for faster scan speed ... First take the radio's top and bottom covers off then remove all the dials off the front face plate then take out the screws that hold the front face plate. Now you're looking at the LCD and button printed circuit board, remove the LCD printed circuit board .Now you should see the main processor board. Lay the radio so that the solder side of the big main board is solder side down so that you can see the components. Now look at the board that has the processor on it. If you look at the back side of the board (processor board) where the battery goes you should see a blue rectangular shaped resonator marked 2.00g or 2.000 or 2000 kc that also would have a x1 or x2 etc number on the board near it that is also listed in the service manual as a resonator/crystal. If you change the value of this part (remove it and replace it with a crystal ) with a value of 8mhz will make the processor run faster in turn giving you faster up\down on your mic, faster scan speed, faster memory scan, a shorter roger beep sounds like or similar to 2510. My self when I experimented with my own radio I ran into trouble when I used a crystal with a value of 14mhz 14mhz (works but locks up the radio from time to time) 12mhz (was pretty much the same but didn't lock it up as much) 10mhz (worked fine but I wanted to run with 8mhz just to make sure)(the radio worked good in all mods all the time) 8mhz (would be what I would recommend not as fast as the others but is a lot more stable for daily usage and is a lot faster than stock CAUTION::::::::::: BE SURE WHEN DOING THIS MOD YOU ARE CAREFUL NOT TO DAMAGE THE CIRCUIT BOARD AS MOST OF IT IS SURFACE MOUNT THE TRACES DAMAGE VERY EASILY THE RESONATER IS STANDERD SIZE OF A CRYSTALL REMOVE THE RESONATER AND REPLACE IT WITH A CRYSTALL WITH WIRE LEADS NOT THE STANDARED PLUG IN TYPE AS THEY WONT FIT My method of desoldering the resonator was with a solder sucker with a heated tip. Where to get crystals? old pc/xt/at motherboards from computers To assemble radio just do the reverse of the disassembly How to wire the Microphone plug ! You should take care when you try and modify the wirings of microphones because of the presence of +12 volts on one pin of the plug. This particular feature may damage mikes. This is also a nice information for those who would like to modify their pre-amplified mikes so as to get a rid of the 9 volts battery ( A small mod with a Zener diode should make the 12 volts voltage fall down do 9 volts. It'll be perfect to feed the mike pre-amplification circuits). Heavy swinger mod (modulation) Locate Q51 which is a 2SB754. This part should be subbed out with a 2SB688 but doesn't have to be. The 2SB688 is a heavier duty and higher wattage transistor. To do this mod, you will need a 1N914 diode and a 50 ohms resistor. Hook up as drawing shows. This will give you super modulation at whatever power range you want. Upgrading AM detection Change D34 & D35 that are 1N60's by ECG553 or SK9975. This mod will enhance the radio performance. TALK BACK Modification * 1. Cut D-78 . Wire a SPST switch in series with D-78 to make it switch able. 2. Replace D-115 with a .0047uF disc cap. Util Tricks Older 2950's with batter backup will discharge the battery if the power source is removed and the radio is left in the "ON" position. This causes corruption in the memory circuits and in the microprocessor. This can cause the failure to turn on....lights on... and nothing else. 2950 Tune up/Mod To increase heat dissipation and durability and a decrease of transmit voltage drop change Q-51 to an ECG37 or equiv. To prevent overheating and increase audio Quality & low PWR swing change Q53 to a 2SA473 To improve low power swing on AM locate R178 and change to a 3k ohm. The resistor you just removed save for the next step.(4.7k) Locate R194 (10k ohm) replace with the 4.7k resistor from previous step. Locate R281 (4.7k ohm) replace with the 10k resistor from the previous step. For increased output on SSB and AM locate C270 and parallel with a 470pF-1kv ceramic disc capacitor. Replace all plastic insulators with mica insulators on all transistors. Use a liberal amount of heat sink compound. For improved modulation remove Q32, which is the modulation limiter. The modifications were reprinted from other sources. Most of which are available on the net. Aside from any spelling correction on my part I hold no credit for the process of this mod. Once you get up and running don't be surprised when you start getting cross talk from all over the country. On any given day you might get communication from 1000 to 2000 miles away. Play around with your rig. Call for a "radio check". See what you get back. This article is certainly not an end all to Dxing with CB's. It's only a start with a hobby that can be enjoyable and informative. All that aside. If anyone wants to talk shop you can meet me on Channel 22. ---------------------------------------------------------------------------- Black IC/IIRG ////// ////// /////// //////// System Administrator // // // // // black_ic@iirg.org // // /////// // //// PGP Key Upon Request // // // // // // www.iirg.org/~black_ic/ ////// ////// // // ///////// 49.8100 Mhz The International Information Retrieval Guild --------------------------------------------------------------------------- Traditional Shouts and Greetings to: The IIRG "It's been a long ride from Bangladesh to New Delhi" Jim "Don't blow up the moon... KABOOM!" Bull Dog "Kaphar Hunne Bhanda Marnu Ramro!" Sheila Na Gig "Bad Sheil! Prison!" mips4.com "I want the web page back" -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [4]: Playstation 2 Modification and Muses Part 1 By: Black IC/IIRG The Playstation 2 has had a tumultuous release. Temporary export arms restrictions due to the system being looked at a weapons guidance system, bad firmware that resulted in saved games deleting vital data, games that have had mixed reviews, and copyright issue due to the system being able to read Region 1 and 2 DVD's. Its a wonder that its selling at all. For those that remember the release of the first Playstation, things weren't much better. It took some time to catch on and when it did. See ya! I think the Playstation 2 will be quite successful. When Microsoft announced their new entry to the console family, Sony announced they would include an 8 GB (Gigabyte) Hard Drive and 56 K modem in their PS2 (Playstation 2). Competition is good. Seems in July Sony will be releasing a USB-Based Mouse and applicable CD-ROM in Japan. This will add to some graphical applications on the system allowing users to create and store there graphics on the PS2. Worse case scenario it might serve as a device to surf the internet. Discussion of implementing Digital Camera software could be a possibility. The upcoming game Final Fantasy X takes advantage of the 5.1-channel surround sound standard. Square Sound the division behind the various sound effects that we will be hearing in this title as sound format during the Full-Motion Video (FMV) sequences. You may have heard of this sound standard used in various cinematic movies along with many DVD's, in conjunction with a Dolby or DTS (Digital Theater System) based sound system. Such a feature will certainly increase the sound quality during the FMV sequences, while dramatically making the experience during these sequences seem much more realistic. When the user actually enters into gameplay mode, the game will revert back to two-channel stereo sound. The reasoning behind this relates to the actual hardware within the PS2. Because this game involves real-time gameplay, the central processing unit (CPU) of the PS2 isn't powerful enough to perform the sounds in real-time, as the sounds will change quite frequently and rapidly as you enter and move through a level. Square Sound hasn't given up yet, as they are now seeking new ways and methods of attempting to incorporate this feature in some form or fashion into the actual gameplay. Of course, you will not be able to experience this brilliant quality without the proper equipment. In order for an individual to experience 5.1-channel surround sound, he/she must have either a Dolby Digital or DTS based receiver, along with a Digital Optical Cable which would connect this component to the console. Along with this, two front channel speakers, two rear channel speakers, a single channel speaker, along with a subwoofer would be required. I can see it now. No life by Sony. -=- "What can I tweak to make it better or different?" -=- Their will be a lot of things that can be done. People that are involved in piracy are looking at the DVD aspects. Well right now DVD Recorders and Media are not cost effective for your average person. So I dont think we will see a string of so-called "backups" for quite some time. I dont thing the issue will be can people modify the system to bypass copyright code or region encoding. The issue will be can the laser read a "backup" at all. Sony developed their new one laser precision CD-ROM designed to be cost effective, efficient, and able to finely read the peaks and valleys of a stamped CD makes. So for those pirates out there... Pick up another PSX. The DVD players on the market today for DVD/VCD playing that can read a "backup" have whats called dual-filtering. Two lasers. Those are going to be history. Sony stopped making them. Their Enterprise model used to have dual-filtering. No longer. Pioneer still has an entry level DVD Player on the market, the DV-414, that can read "backups". But its cheaper to make them with one. Thats all you need to read a stamped DVD. Sony does state that the new system is backwards compatible, it will play PSX games. But for those of you that are legit owners of an import... Pick up another PSX. But as of late there has been many updates on PSX Mod pages about soon to be released PS2 Mod Chips. Their is also discussion circulating about a swap method on the PS2 that entails a lot of time consuming tedious work. There is some discrepancy as to the requirements of patching a backup prior to using this swap method or not. What I do suggest and recommend is for those of you that have a legal import (meaning a country code different than that of the current PS2 you have) is to try the swap method and ignore the patch related issues. It is my understanding that the patch is for "back up" copies only and assist in defeating the copyright protection. Seeing the PS2 is backwards compatible the issue is country code and not copyright protection unless your dealing in "back ups". Seeing that there are several way of swapping the system I will print two. Both are just as viable and denote no need to patch a game unless your using a "back up". -=- PS2 Swap Methods -=- Just a heads up, the IIRG does not endorse or support either one of these methods. They have been printed here for educational purposes and to show that the PS2 is capable of being kit bashed. Personally I would wait until a definitve MOD Chip comes out before you start playing with it. Unless of course your like us and feel comfortable taking apart things for a greater enjoyment. In which case we are not responsible for any damage that you might cause turning your PS2 into a book end. SWAP METHOD One STEP 1: Open the casing of PS2, take out the DVD drive STEP 2: Take out the disc shape CD spindle lock from the DVD drive, put the DVD drive back to the PS2. STEP 3: First insert an original PS2 game disc into the DVD drive to let the system knows a disc is in the drive. Make sure you put the CD spindle lock on top of the disc to notify the machine that the DVD drive is closed. STEP 4: Swap in your import PS game, the PS2 will be changing into Playstation mode, the Playstation logo will show up on screen. STEP 5: After the PS logo appears, the disc spinning speed will slow down, immediately swap in an original Playstation game to let the machine to read the protected track. STEP 6: After the screen turns black, immediately swap back the import disc in the drive, make sure you put back the CD spindle lock on top of the disc (must do this quickly). SWAP METHOD Two 1) Place your Playstation 2 upside down and remove the marked screws. Then remove the cover carefully seeing there are two connectors involved. 2) Remove the black disc (there is just a bit of glue). Under the black disc you'll see a white disc, later you have to extract the white disc from the dock. Now just extract the Eject and Reset button from the dock. Now remove the 4 screws (1-4). Then remove the CD Reader cover and extract the white disc. The white magnetic disc is used for locking the CD in place. 3) Now you should see the CD Reader. Connect all the cables (power, joypad, video) to the PS2. Make sure the PS2 is turned off before you connect the cables. Now turn on the main power switch (on the rear). Place the original PS2 Utility Disc CD into the CD Reader and then place the white disc on top to lock the CD. Now press the Reset button. The CD Reader will start at 1x speed then after a second it will go to 4x speed. 4) Remove the white disc and remove the original disc. Insert the PS2 Game CD and place the white disc back on top. You must do these operations before the Playstaton 2 logo appears on the screen. Your import should be running if done correctly. Otherwise TURN-OFF the PS2 by pressing for 3-4 seconds the Reset Button and try again. DO NOT try to repeat the operation just using the simple reset. You must Turn-Off the PS2 by pressing for 3-4 seconds the Reset button. If you are unable to swap using the speed method try using a timed method. Follow steps 1 - 3 and when you press the Reset button to turn on the PS2. Wait 10 seconds. Then swap using the same process as listed. You will have about 5 seconds to complete this. WARNING - WARNING - WARNING - WARNING -WARNING - WARNING - WARNING OPENING YOUR PLAYSTATION FOR MODIFICATION CAN BE DANGEROUS AND ADDICTIVE -=- End Results -=- So with all this potential locked up inside the PS2. How do you unleash it? First and most important issue is getting the system to read your CD if thats what your into. Let start with reading the backup CD. As was mentioned above there is some discussion about so-called patches that when you patch the ISO prior to "burning" it will defeat the copyright protection. Some say that this is necessary for the country code too. Fact is unless you try it, you really wont know. I have included a couple sites for info on these subjects for your perusal. The one that had patches, those patches were not available so I can't comment on the code. As for other potential hacks, the so-called USB port will be the answer assuming you cant hardware hack the laser. It will mean having the PS2 read the data from an external CD-ROM. They are already talking about bringing it out in July with the mouse. This will give you a better cost effective hack and flexibility on your choice of hack. As for any of the country codes and copyright protection thats another story. With the original PSX it was simply blocking the interupt that requested that data at boot up. Then when games started coming with protection that looked for that signal, it came down to modifying the chip to turn off and allow the signal to pass after so many seconds. The new PS2 will have something of this caliber in its arsenal. The fact that it will be backwards compatible is going to be the weakness in its defense. As far as all the information listed in this article. Its all readily available on the internet. Trust me when something of significance appears regarding modification of the PS2 you will ALL know about it. With the sound capabilities this system has, processing power, storage and peripherals the PS2 has a wealth of hardware hacking potentials and uses outside the console gaming field. It's just a matter of time. -=- Some Interesting Links -=- http://www.the-magicbox.com/ http://bad.paradogs.com/index2.html http://www.ps2web.com/ http://www.techtrix.co.uk/ http://www.ps2insider.com/ http://www.diversion-network.com/network/ps2nation -=- Playstation 2 Specifications -=- CPU 128 Bit "Emotion Engine" System Clock Frequency 300 MHz Cache Memory Instruction: 16KB, Data: 8KB + 16KB (ScrP) Main Memory Direct Rambus (Direct RDRAM) Memory Size 32MB Memory Bus Bandwidth 3.2GB per Second Co-processor FPU (Floating Point Unit) Floating Point Multiply Accumulator x 1, Floating Point Divider x 1 Vector Units VU0 and VU1 Floating Point Multiply Accumulator x 9, Floating Point Divider x 3 Floating Point Performance 6.2 GFLOPS 3D CG Geometric Transformation 66 Million Polygons per second Compressed Image Decoder MPEG2 Graphics "Graphics Synthesizer" Clock Frequency 150MHz DRAM Bus bandwidth 48GB per Second DRAM Bus width 2560bits Pixel Configuration RGB:Alpha:Z Buffer (24:8:32) Maximum Polygon Rate 75 Million Polygons per Second Sound "SPU2+CPU" Number of Voices ADPCM: 48ch on SPU2 plus definable, software programmable voices Sampling Frequency 44.1 KHz or 48 KHz (selectable) IOP I/O Processor CPU Core PlayStation (current) CPU Clock Frequency 33.8MHz or 37.5MHz (Selectable) Sub Bus 32 Bit Interface Types IEEE1394, Universal Serial Bus (USB) Communication via PC-Card (PCMCIA) Disc Device CD-ROM and DVD-ROM -=- Contact -=- Black IC/IIRG black_ic@iirg.org -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [5]: Hacking Computer Shows for Phun and Profit (Part 1) By: Mercenary Why the hell would I want to hack a computer show? Well for me the answer is easy, SAVING MONEY! I have always operated under the assumption that if I can get something for free, I'll do so as long as I am not targeting a mom and pop operation. Corporations have been raping the individual in this country for far too long, and it's time the underdog got a little back. Now please be aware, the methods I will be discussing here are illegal. Should you get caught you will be more than likely ejected from the computer show and in a worst case scenario you will be arrested. But hey, what's life without a little risk? For myself, hacking computer shows started when I got tired of being raped by a senile local promoter. This individual believes that in a past life he invented photography and is so greedy that he is known to stand at the door with a hand clicker counting the amount of money per individual just in case his underpaid tellers might per chance pocket $5.00. Entry to the computer show should be your first priority. In my experience I have done this in numerous ways. If it's just a local computer show, you should already know how the promoter operates. In earlier days, my local promoter just used to use "Hello My name is Badges" for vendors. This was extremely easy, we just went down to Staples and purchased a package of every color "hello" badge and then would go to the show and see which color was being used that day. We would then just walk in with the other vendors and get dealer pricing for an hour before the show would open. We would be done shopping and be back home before the show even officially started. This worked for several years until the local vendor started producing his own Badges for vendors. These were also easily duplicated. In our case the vendor uses a stupid graphic of himself on a computer screen. By checking his website we were able to copy the graphic and produce our own vendor badges. We still use this method to this day. Now having 8 or 9 people walk in as vendors is not a viable option. Thus, we needed another option for gaining "mass" entry for large numbers of people. When attending one of our local shows, you were allowed to pre-pay and stand in line about 1 hour before the show. When pre-paying, your hand would be stamped and you'd then go to the back of the line. Except for smokers, these individuals would pay and instantly disappear outside to light up a butt. We thus made our own "hand stamp", then whenever attending a show I would go over to a smoker, ask for a light and see which color ink they we're using. I would then hand stamp the entire group and we would casually stroll inside to the line. If ever questioned, we would simply reply "I was having a smoke". Now attending corporate shows like Comdex require much more sneakiness and deception. If there is a large show I see and would like to attend, I will e-mail or snail mail the promoters of the show as a "legitimate" computer users group. I have used many excuses to get free tickets or passes. 1. Several of our members would like to attend to review the show in our newsletter. 2. If it's a multi-day show, I will ask for the passes for our "club" president and vice-president to attend to see if the show is worth it to our members. 3. Several of our members would like to attend this year so we can scout out having a booth next year. Use your imagination, there are numerous excuses. One of the other more advanced techniques is to create your own fake press credentials. There are numerous templates available on the Internet for download. Just remember not to use a press organization you might actually run into at the show. Using the above methods I have been mailed as many as twenty free passes for our "members". We have even been asked to attend private cocktail parties and product demonstrations. You'll be amazed what a little social engineering will get you. If you need any personal suggestions or have a situation unlike any of the above, e-mail me at iirg@iirg.org and I'll see if I can come up with an answer for you. In part two, I will give you suggestions on things you can do and what to watch for once your in the show. Have Phun! Mercenary/IIRG -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: An introduction to Palm Pilot Programming By: Phurk/IIRG I hope this serves all the people looking for information on creating the latest and greatest application on this powerful operating system. I own a palm pilot of the first generation Palm III. I am currently running Palm OS version 3.3 with 2 Megs of Flash Ram. The palm pilot uses a stylus as the main input tool for user interactivity. It comes with a cradle to hook to a standard serial port, but with an upgraded OS such as 3.3 you are now able to use the Irda port on your computer to update the palm pilot without that annoying cradle. The palm pilot is a versatile format for all your portable information needs. There are numerous programs available making it a great productivity tool. It comes preinstalled with default applications on it such as the MemoPad, the Address book, A small expense utility and a bunch of other stuff that will make you a better person. But that's probably not the reason you bought the Palm Pilot. You saw it's potential as an effective hacking tool in your arsenal. It's portable, covert design, slick operating system and a well-established development platform has tremendous potential. Unfortunately the potential has not yet been realized. There are a few programs available for the Palm OS that can make it a more enjoyable tool. Brought to you by the L0pht, the TBL Wardialer. Standard war dialer except for the Palm. Pretty cool for a group of sell-outs. Check it out at http://www.l0pht.com/~kingpin/pilot.html Also another Gem for the palm pilot is PalmCrack. Although not as powerful as on a PC or Server Box, the potential for cracking *nix passwords is there. This was put out for more of "yes it can be done" philosophy. Info at: http://www.noncon.org/noncon/product_info.html Imagine lying on the beach with a wireless IR modem cracking your latest encrypted password list. So you might be lying there till you're crispy, but it can be done. Also for you programmers on the go, we have LispMe a pilot program which lets you use the high level language to work out ideas and algorithms sitting in a train, plane or any place you feel like whipping out your pilot. Being the perfect candidate for covert operations, no bulky laptops, easily hidden, and a strong development environment. Do you need more of a reason to buy one if you haven't already? In order to focus our efforts on creating more wonderful tools for the community at large we need to know some things. Most Pilot programs are written in C. all of the built in programs were written with the Macintosh version of CodeWarrior. If you are so inclined you can go to http://www.palmos.com/dev/started/ to get the source for your existing palm Os programs. Programming in C or Assembly is the most flexible and powerful method for programming the Pilot, so learn C. There are a number of compilers out there, ranging from expensive commercial ones to free compilers. I recommend a dose of VI and GNU C compiler on nicely secured Linux Box. You can get information from 3Com's PalmOS developers forum at www.palmos.com/dev/ Also technical information about the palm Os different libraries and API's is available at http://developer.earthweb.com/directories/palm/knowledgebase/tm_index.html For those of you who would like to get into palm pilot programming but do not have one, have no fear! , there are numerous Emulators, my favorite being the XCoPilot for Linux, The emulator is freely available for Unix, Windows, and all of you Mac people. After you download the emulator make sure to get some ROMS. You can pick up more info at my homepage at www.iirg.org/~phurk/ There I will post my progress and projects that the IIRG is currently working on with the Palm OS. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: IIRG Signal Intelligence (SIGINT) Guidelines By: Black IC - BEGIN PROJECT - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// The International Information Retrieval Guild -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- The International Information Retrieval Guild Signal Intelligence (SIGINT) Guidelines Rev. 1-2000-2-A Part A: Summary The purpose of this project is to confirm publicly available frequency lists and update frequency listing and usage on undisclosed frequencies. Part B: Requirements 1. Scanner with or as close to the following ranges: 27 - 54.000 MHz 108 - 136.975 MHz 137 - 174.000 MHz 406 - 512.000 MHz 806 - 823.937 MHz 851 - 868.937 MHz 896 - 956.000 MHz 2. Good antennae with good reception. 3. Working knowledge of "your" scanner. 4. Commitment and patience in terms of monitoring. 5. Commitment and initiative in terms of documenting. 6. We need to know your general area of living. (i.e. North East, Mid-West). Though some frequencies are national some are localized and this will allow us to cater to your area. Also knowing your scanners make and model will help in giving you frequency lists that you can work with. Part C: Procedures You will receive a list of frequencies in order of priority that you will monitor. These frequencies will have a duration period on how long you will monitor and possibly what times. When you are done monitoring you will move to the next frequency. Upon completion of your list please submit your findings to black_ic@iirg.org Please find enclose your documentation procedures and frequency list catered to your capabilities. Due to FCC regulations we are not interested in the content of the traffic other than the parties involved and at what times they were involved. Though FCC frequency allocations are public the parties they are reserved for change there usage and sometimes use undisclosed frequencies that are not listed in the public sector. 1. Tune in to initial frequency on list. 2. Adjust reception and squelch as needed. 3. Listen to said frequency for instructed time at instructed time. 4. Document any traffic using the follow notations: A. Time (Military Time (GMT, EST, etc) B. Parties Involved (FBI, Media, PD, Pager) C. Code & Signals D. Duration of Transmission Part D: Personal SIGINT Frequencies: The IIRG'00 May Odin Guide Your Way... - END PROJECT - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8]: The Rumor Mill ----------------------------------------------------------------------------- ----------------------------------------------------------------------- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE ]]]]]]]]]]]]]]]]]] ]]] ]] ] ]] DEF CON 8 Initial Announcement ]]]]]]]^^^^]]]]]]]]]]]]] ]] ] ] DEF CON 8 Initial Announcement ]]]]]]^^^^^^]]]]] ] ] ] DEF CON 8 Initial Announcement ]]]]]^^^^^^^^]]]]] ]] ] DEF CON 8 Initial Announcement ]]]]^^^^^^^^^^]]] ] ]]]]]]]] ] DEF CON 8 Initial Announcement ]]]^^^^^^^^^^^^]]]]]]]]]] ] DEF CON 8 Initial Announcement ]]^^^^^^^^^^^^^^]]]]]] ]] ] DEF CON 8 Initial Announcement ]]]^^^^^^^^^^^^]]]]]]]] DEF CON 8 Initial Announcement ]]]]^^^^^^^^^^]]]]]]]] ] ]] DEF CON 8 Initial Announcement ]]]]]^^^^^^^^]]]]]]] ]]] ]] ] DEF CON 8 Initial Announcement ]]]]]]^^^^^^]]]]]]] ] ] ] DEF CON 8 Initial Announcement ]]]]]]]^^^^]]]]]]]]]]] ]] ] ] DEF CON 8 Initial Announcement ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]] ] DEF CON 8 Initial Announcement READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE WTF is this? This is the initial announcement and invitation to DEF CON 00, a convention for the "underground" elements of the computer culture. We try to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, Virii coders, programmers, crackers, Cyberpunk Wannabes, Civil Liberties Groups, CypherPunks, Futurists, etc.. WHO: You know who you are, you shady characters. WHAT: A convention for you to meet, party, and listen to some speeches that you would normally never hear. WHEN: July 28th - 30th, 2000 WHERE: Las Vegas, Nevada @ Alexis Park Resort What is DEF CON? DEF CON is an annual computer underground party for hackers held in Las Vegas, Nevada, every summer for the past six years. Over those years it has grown in size, and attracted people from all over the planet. Well, no one from North Korea has shown up (that we know of) but if they did I'm sure we would convince them to tell us elite government secrets. That's what it is all about. Meeting other spies, er, people and learning something new. We are not trying to teach you to learn how to hack in a weekend, but what we are trying to do is create an environment where you can hang out with people from all different backgrounds. All of them interested in the same thing, computer security. To do this we have taken over the complete hotel at the Alexis Park Resort. Does all of this seem interesting? Then it can be yours for the low, low price of only $50 at the door. If you want a greater idea of what it is all about, and what other people have had to say about the convention please visit the previous year's archives sections and read what the media and attendees have had to say. There has been an awful lot of press written about DEF CON over the years. Some of it good, most of it too fixated on the attendees green hair. If you want to see what people have written, check out the previous years archives for the links. Current Speakers ---------------- There is currently a call for speakers. Please email DTangent if you want to exhibit, or sponsor DEF CON 8 ------------------------------------------------------------------ Gregory B. White, Ph.D. The USAFA Cadet Hacking Case: What both sides should learn about computer forensics Basically I'll discuss the case that went to trial in the spring of 99. I was the Deputy Head of the Computer Science Department at the USAF Academy at the time and was asked by the cadet accused of "hacking" to help with his defense. I testified at the trial as an expert witness for the Defense. I sat at the Defense table throughout the trial serving as their "computer expert". Basically the trial was a comedy of errors by the prosecution. law enforcement, and the cadet's attorneys alike. The cadet was involved in IRC but the law enforcement types and prosecution became convinced that he was the "hacker" (afterall, everybody KNOWS that IRC is nothing more than a place for hackers to trade information on how to break into computers -- the actual sentiment expressed by the investigators). I had up to that point spent the majority of my time in the Air Force trying to protect systems and to catch those who broke into AF systems. This case really shook me as I saw the LE types latch onto the smallest of indicators and blow them into a full blown felony case (the cadet faced 15 years in Leavenworth had he been convicted of all counts). What I will cover in the talk is: 1) Background of the case 2) The "evidence" the prosecution thought they had 3) The many possible areas where clues might have been found had either side known where to look (or asked anybody who knew anything about it) 4) What lessons can be learned from this case. Those from the government and industry need to know where to look if they want to catch folks (and if they want to make sure they don't make fools of themselves) and those who might find themselves accused someday need to know how to help their attorneys find clues that could exonerate them. Gregory B. White, Ph.D. - Vice President, Professional Services. Gregory White joined SecureLogix in March 1999 as the Chief Technology Officer. Before joining SecureLogix, he was the Deputy Head of the Computer Science Department and an Associate Professor of Computer Science at the United States Air Force Academy in Colorado Springs, Colorado. While at the Academy, Dr. White was instrumental in the development of two courses on computer security and information warfare and in ensuring that security was taught throughout the computer science curriculum. During his two tours at the Academy, he authored a number of papers on security and information warfare and is a co-author for two textbooks on computer security. Between his Air Force Academy assignments, Dr. White spent three years at Texas A&M University working on his Ph.D. in computer science. His dissertation topic was in the area of host- and network-based intrusion detection. Prior to his Academy assignments, Dr. White was a student at the Air Force's Advanced Communications-Computer Systems Staff Officer Course in Biloxi, Mississippi. He was awarded both the AFCEA and Webb awards for student leadership and academic excellence and was a Distinguished Graduate of the course. Before attending the course in Biloxi, Dr. White served as the Branch Chief of the Network Security Branch at the Cryptologic Support Center in San Antonio, Texas. His first assignment in the Air Force was as a systems analyst at the Strategic Air Command Headquarters in Omaha, Nebraska. Dr. White obtained his Ph.D. in Computer Science from Texas A&M University in 1995. He received his Masters in Computer Engineering from the Air Force Institute of Technology in 1986 and his Bachelors in Computer Science from Brigham Young University in 1980. He separated from the Air Force in 1999 and is currently serving in the Air Force Reserves at the Defense Information Systems Agency. Ron Moritz, Chief Technology Officer Finjan Software, Inc. Proactive Defense Against Malicious Code Anti-virus software is an important part of a well-devised security policy, but reactive virus detection is not versatile enough for the demands that will be made on businesses engaged in e-commerce. The year 1999 began with the birth of the Happy 99 virus - a harbinger of things to come. Happy 99, plus Melissa, PrettyPark and the Explore.zip worm are all examples of third generation of malicious replicating code, designed to exploit the Internet for their rapid proliferation. A variant of Explore.zip, called MiniZip, managed to hide itself from antiviral utilities and spread at an amazing rate around the Internet at the end of 1999. Such programs, which launch new malicious code attacks, create "first strikes" against systems and networks. Allowing untrusted code to execute on the corporate network may not be suitable for your organization. But corporate security policies that block network executables adversely affect the evolution of the Internet, extranet, and intranet. While no security implementation is absolute, functionality is not achieved by disconnecting users from the network and preventing access to programs. Therefore, proactive defense against first-strike attacks is required today. Almost all web sites today contain mobile code. Many of the powerful business (ecommerce) applications you need and use are written with mobile code. Consequently, net-enabled malicious software is likely to increase in prevalence and successful utilization. The factors accounting for such a prediction are the ease by which users are duped into double-clicking on malicious e-mail attachments and, the ease by which the sources on malicious e-mail attachments and, the ease by which the sources of those e-mails are automatically spoofed to seem to come from a boss or from an e-mail or instant message friend. Traditional pattern matching approaches are incomplete, out-of-date, and ineffective and were never designed in preventing a series of new generation attacks based on malicious mobile code and Trojan executables. Ron Moritz is the Chief Technology Officer at Finjan Software where he serves as primary technology visionary. As a key member of the senior management team interfacing between sales, marketing, product management, and product development, Ron helps establish and maintain the company's technological standards and preserve the company's leadership role as a developer of advanced Internet security solutions. Ron was instrumental in the organization of Finjan's Java Security Alliance and established and chairs Finjan's Technical Advisory Board. He is currently chairing the Common Content Inspection API industry standards initiative. Ron is one of a select group of Certified Information Systems Security Professionals. He earned his M.S.E., M.B.A., and B.A. from Case Western Reserve University . He earned his M.S.E., M.B.A., and B.A. from Case Western Reserve University in Cleveland, Ohio. WHERE THIS THING IS: -------------------- It's in Las Vegas, the town that never sleeps. Really. There are no clocks anywhere in an attempt to lull you into believing the day never ends. Talk about virtual reality, this place fits the bill with no clunky hardware. If you have a buzz you may never know the difference. It will be at the Sahara Hotel. Intel as follows: Hotel Location The Convention will be held at the Alexis Park Hotel and Resort We are taking over the complete hotel! The Alexis Park Hotel and Resort is across the street from the Hard Rock Hotel, and is a block off the main strip. Located at 375 E Harmon Ave in Las Vegas, NV 89109. The Alexis Park is a non gambling hotel, so people 18 years and older can get a room there. This is the first time that has ever happened for us! If there are any problems with this please email me! HOTEL COSTS: Room rates are 85$ for a two bed suite, but you can get up to four people in one. RESERVATIONS: On-line or by phone: 800-453-8000 We have the whole hotel space, so unless you reference the DEF CON show the Alexis Park will tell you they are sold out. We have all the rooms at the Alexis Park, and a bunch next door at the San Tropez. We are working on a block of rooms at the Hard Rock Hotel. At last count about 20% of the rooms at the Alexis Park were already booked. Sign up early if you want to stay at the main hotel! We start Friday, but many people get in Thursday night and hang out before the fun begins. We get our convention room rate from Wednesday night through Monday night for those wanting to stay longer to check out the attractions. Cheap Airfare Information We've got great discounts on airfare from Montrose Travel, who book bulk air travel for cheap. If you need to still book tickets give these guys a call first and compare. Montrose Travel 1-800-301-9673 http://www.montrosetravel.com or email Montrose Travel with questions. They currently have deals for DEF CON attendees from the US and International on the following airlines: America West Southwest Delta American Southwest Airlines United Airlines and other smaller carriers and even International Airfare rates. Expect rates lower than published. When calling make sure you refer to DEF CON as the group name. COST: Cost is whatever you pay for a hotel room split however many ways, plus $50.00 at the door. There are fast food places all over, and there is alcohol all over the place, the trick is to get it during a happy hour for maximum cheapness. ----------------------------------------------------------------------------- Hope 2000 is Coming. http://www.h2k.net July 14th to July 16th, 2000. New York City ----------------------------------------------------------------------------- Postcards From The Edge BBS Formerly a Renegade DOS Based Dial-Up BBS is now and has been available via telnet at luna.iirg.org PFTE carries an eclectic topic structure surrounding SIGINT, Telephony, RF Hacking, UNIX, Kit Bashing, and others. No restrictions on applying. Just login and be apart of an on going history surrounding this board. The present life of this board is running Citadel. You can access this system via telnet or the web. www.iirg.org/pfte.html luna.iirg.org Login: bbs Password: Any questions: black_ic@iirg.org -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [9]: Letters to the IIRG (Fan Mail, Hate Mail, Letter Bombs) I receive so many letters and requests that it would be impossible to post all letters received. However, every now and than I get one that makes me laugh or vomit uncontrollably. I offer these to you..... ------------------------------------------------------------------------------ 1. Help!!! From: MikeG24411@aol.com Delivered-To: iirg@iirg.org Date: Mon, 3 Apr 2000 18:19:13 EDT Subject: Help!!! To: iirg@iirg.org X-Mailer: AOL 5.0 for Windows sub 70 I need an access to the NCIC to get a background check on someone.... A 2 year old little girl may be in jeapordy... Can you help??? Considering the fact that your attempting to contact a hacker organization and not a branch of law-enforcement, I'm sorry but I'll have to doubt your sincerity. I think you've watched the movie "Hackers" one to many times. Try contacting the "Plague", maybe he can help you out. Oh, that's right... He's a fucking actor. So stop acting like a jackass yourself and if you're truly Concerned about this so-called "2 year old little girl", contact the proper authorities. ------------------------------------------------------------------------------- 2. need that midi Delivered-To: iirg@iirg.org From: "deified" To: Subject: need that midi Date: Fri, 21 Apr 2000 21:00:57 -0700 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 i should have done this anominus but hey i need that midi Fight the right to ban censorship, Peace out D31F13D You're absolutely right, you should have submitted this letter anonymously. Try looking in your browsers cache, whenever you're on our page the midi gets sent to your system. Then you wouldn't have been subjected to this letter being Published in Phantasy. ------------------------------------------------------------------------------- 3. how to hac Delivered-To: iirg@iirg.org Date: Tue, 09 May 2000 23:21:42 +0200 From: Gary Walton Subject: how to hac To: iirg@iirg.org X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 can you tell me where to find info on how to become a hacker. Do a little research for starters. E-mailing hacking groups with message like this will only cause you to be flamed. Now considering the fact your writing from South Africa, We're willing to cut you some slack. Now I hope you mean true hacking and not just being a script kiddie. The world has enough of those. Learn a programming languace, study electronics, build some circuits. READ - RESEARCH - PRACTICE, this is the only way to reach any goal. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [10]: Phantasy Distribution Site -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Phantasy Distribution Sites Phantasy's Distribution Site's are continually changing, we apologize if you visit a site and it's not there. But always go to our main site and it will be there. 1. The IIRG's Main Phantasy Distro Site http://www.iirg.org/phantasy.html 2. L0pht's Phantasy Magazine Archive http://www.l0pht.com/%7Eoblivion/IIRG.html 3. EFF "Phantasy" Archive http://www.eff.org/pub/Publications/CuD/Phantasy/index.html If you'd like to set-up a Phantasy Distro site and be listed here and on the IIRG's link page, e-mail Mercenary at iirg@iirg.org -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PHANTASY(C) IIRG 1991 - 2000 May Odin Guide Your Way! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- May You Be Feasting and Drinking in Valhalla For a Full Night Before the Christian God Knows You're Dead -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-