%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % T H E E M P I R E T I M E S % % ------------------------------- % % The True Hacker Magazine % % % % {June 10, 1992 Issue I % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Editor in Chief: Albatross Co-Editor: {Spot is Open} Staff: {Spot is Open} Dist. Center: The Empire Corporation TABLE OF CONTENTS 1) In The Beginning .......................................Albatross 2) Story on NewBee BBS's & Users ..........................Albatross 3) Internet Mailling List .................................Worldview Mag 4) DDN Security Bulletin ..................................DDN/C.E.R.T. 5) SSCU Commands ..........................................Albatross 6) Using Anonymous FTP ....................................Mark Moraes 7) Hacker of The Month ....................................Dr. No-Good 8) Hacker News Articals ...................................Bob Krause 9) Editor's Comments ......................................Albatross {Page 2} ******************************************************************************* These Damn New Boards by: (The Year of The BBS's Stagnation) Albatross ******************************************************************************* Now lemme start off with the fact that the Washington, DC area is crawlling with hackers and shit every-which-way. And because of this is has it's Pro's & Con's. The Pro's are that we living here in this General area have a wide diversity of people that a few good people in there fields pop up outta know where and are just known as being great, such as (Nat X, Dr. No Good, ) and many others that have come from being nobody's to being well known as The Masters in there field. But the Con's are, the fact that assholes that don't know the time of day if they had a Rolex on, are starting now to run around starting up Boards & saying the fucking word 'ELITE' to god damn much. Ya see there problem is that they don't know a mother fucking thing and because of that they feel that starting a BBS (With leeched philes from The Empire) will make them somehow Important in the Underground Commmunity. That just isn't the way you can expect to become known and honored, if you running a board that doesn't know the first shit about crap. See a BBS should be run by a Sysop that atleast understands about 70% of all the fields of Phreaking, hacking, Carding, Bombing, etc... Where as the jerks starting up NewBee boards are usually 13-15 and don't know the first thing about anything nor do they know the danger they face. See one thing I wanna get across is the fact that, The F.B.I. doesn't play games and they don't give a shit if your under age 18, because when you play in the Big League's you gotta be ready to go to the Big House. Most of these 13-15 yr. olds don't know that you can still be tried as an adult if the crime is serious enof. And I'll give you a few ideas that a Sysop might face if there board is bust by the Feds. Charges: ------- Conspiriacy to Disturibute Illegal Credit Card Information Conspiriacy to Defraud Telephone Services Possession of Illegal Telephone Security Codes Conspiriacy to Compromise Government & Private Computer Systems Actions: ------- Seizures of Any and All Computer Equipment (Modems, Computers, etc..) Arrested Until bailed or court date (Nine Months down the road) Loss of Job due to Arrest , Unless ya got a cool job Watched by F.B.I. until Court Date (Don't Jump Bail) Now see, The Newbee fuckers not only are the most fucked up assholes to start boards, but can pose a Security risk for every member on there board, for the fact that they are advertising like mad everyday and drawing attention to themselves. And with that in mind, if there board is busted not only are they fucked, but NOW The Feds know of about 100+ local area users that might be dealing in the Art of Hacking, Phreaking, etc.. Cure: If you all would try and learn the Art of PHAC and master it and maybe try and come up with new ideas and ways of doing things you'll get you name known and maybe become another 'Knight Lighting or Phiber Optik <= hehehehe. But if you all wanna take the easy way out and try and make a fast name for yourself go ahead and take the Risk. 'If You Can't Do the Time , Don't Do The Crime - A Wise Man {Page 3} ******************************************************************************* Internet Mailling List ******************************************************************************* Here is a revised Internet E-mail list of various Hackers and Semi-Important Non-Hackers. Most of the Thanks for this goes to Worldview Magazine... (Thanx 'TFOX') Alias : InterNet Address ------------------------:------------------------------------------------- Aristotle uk05744@ukpr.uky.edu John Perry Barlow barlow@well.sf.ca.us Crimson Death cdeath@stormking.com Dorothy Denning denning@cs.georgetown.edu Peter J Denning pjd@cs.gwu.edu Dispater dispater@stormking.com The EFF eff@eff.org Freaker's Bureau Int'l au530@cleveland.freenet.edu Gatsby gatsby@ryptyde.tcs.com Ground Zero gzero@tronsbox.xei.com Hactic ropg@ooc.uva.nl Hawkeye ahawks@nyx.cs.du.edu Intertek steve@cs.ucsb.edu Judge Dredd elisem@nuchat.sccsi.com Mitch Kapor mkapor@eff.org Knight Lightning (Craig Neidorf)knight@well.sf.ca.us kl@stormking.com neidorf@eff.org Lord Macduff macduff@nuchat.sccsi.com Mentor (Lloyd Blankenship) cs.utexas.edu!dogface!fnordbox!loydb Mondo 2000 mondo2000@mcimail.mci.com Gordon Meyer 72307.1502@compuserve.com Pengo (Hans Heubner) hans@trabant.at John S Quarterman jsq@tic.com Len Rose len@netsys.netsys.com RU Sirius rusirius@well.sf.ca.us Cliff Stoll cliff@cfa.harvard.edu Michael Synergy synergy@metaphor.com Jim Thomas tk0jut1@niu.bitnet Tuc tellentu@nyx.cs.du.edu 2600 2600@well.sf.ca.us =============================================================================== {Page 4} ******************************************************************************* DDN Security Bulletin ******************************************************************************* An Advisory of Computer Security has been obtained from The Defense Data Network Computers to inform Fellow Hackers of new schemes that the White Collar Nerds have caught on to. Read up so you can be advised yourself. _______________________________________________________________________________ Security Bulletin 9216 DISA Defense Communications System May 28, 1992 Published by: DDN Security Coordination Center (SCC@NIC.DDN.MIL) 1-(800) 365-3642 DEFENSE DATA NETWORK SECURITY BULLETIN The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security Coordination Center) under DISA contract as a means of communicating information on network and host security exposures, fixes, and concerns to security and management personnel at DDN facilities. Back issues may be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.112.36.5] using login="anonymous" and password="guest". The bulletin pathname is scc/ddn-security-yynn (where "yy" is the year the bulletin is issued and "nn" is a bulletin number, e.g. scc/ddn-security-9216). ************************************************************************** + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + ! ! ! The following important advisory was issued by the Computer ! ! Emergency Response Team (CERT) and is being relayed unedited ! ! via the Defense Information Systems Agency's Security ! ! Coordination Center distribution system as a means of ! ! providing DDN subscribers with useful security information. ! ! ! + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + =========================================================================== CA-92:12 CERT Advisory May 28, 1992 Revised Patch for SunOS /usr/etc/rpc.mountd Vulnerability --------------------------------------------------------------------------- *** THIS IS A REVISED CERT ADVISORY *** *** IT CONTAINS NEW VULNERABILITY AND PATCH INFORMATION *** *** SUPERSEDES CERT ADVISORY CA-91:09 *** The Computer Emergency Response Team/Coordination Center (CERT/CC) has received information concerning the availability of a revised security patch for /usr/etc/rpc.mountd in Sun Microsystems Computer Corporation operating systems. This patch fixes an additional vulnerability that was not addressed in CERT advisory CA-91:09.SunOS.rpc.mountd.vulnerability. Sun has provided patches for SunOS 4.1, SunOS 4.1_PSR_A, SunOS 4.1.1, and SunOS 4.1.2. These patches are available through your local Sun Answer Center as well as through anonymous ftp from ftp.uu.net (137.39.1.9) in the /systems/sun/sun-dist directory. Patch ID and file information are as follows: Fix Patch ID Filename Checksum /usr/etc/rpc.mountd 100296-02 100296-02.tar.Z 30606 23 Please note that Sun Microsystems sometimes updates patch files. If you find that the checksum is different, please contact Sun Microsystems or the CERT/CC for verification. --------------------------------------------------------------------------- I. Description Under certain conditions an exported NFS filesystem can be mounted by any system on the Internet even though it may appear that access to the filesystem is restricted to specific hosts. II. Impact Unauthorized remote hosts will be able to mount the exported filesystem. III. Solution As root: 1. Move the existing rpc.mountd aside and change the permissions. # mv /usr/etc/rpc.mountd /usr/etc/rpc.mountd.OLD # chmod 400 /usr/etc/rpc.mountd.OLD 2. Install the new version # cp `arch`/rpc.mountd /usr/etc # chown root.staff /usr/etc/rpc.mountd # chmod 755 /usr/etc/rpc.mountd 3. Kill the currently running rpc.mountd and restart it, or reboot the system. In either case, systems with filesystems mounted from this host will have interruptions in service. {Page 5} ******************************************************************************* SSCU And What You Can Do by: Albatross ******************************************************************************* Back in the Mid to Late 80's A few friends and me discovered a really wierd fone system called SSCU (Or that's what it calls itself}. Anyhow, we decided to check the shit out and found out that if you enter a telefone number it will call that number 10 seconds later and go 'Hello Hello Hello etc..' which can really piss of a person that doesn't understand the first thing about it. Back then I wrote a phile on SSCU which has traveled all over informing those who read up on the subject. Anyhow, to get on with the story. I have discovered a few new things since that time which can really improve your knowledge, if not expand it on SSCU: Fone Number: (202) 362-9900 (202) 362-9901 Follow the steps as follows: System: Hello this is SSCU, Please enter your Identification Number. You: (301) XXX-XXXX (The Fucker you wanna fuck with) You: # # (Hit the pound sign twice) System: Thank You 'dut dut dut dut dut' System: 10 Seconds later it calls System: Hello Hello Hello Hello etc.... Person: Pisses the shit outta them at say 2 a.m. in the morning |Now to do something new follow the steps above |but when it calls do this: You: 08* System: Please enter your ID number You: *3 System: Please Enter something You: (301) XXX-XXXX (A Fone you want in the system for XX amount of time) You: # # You: Hang up and call back a few minutes later Hear: When ya call you get the fone number at the beginning of the SSCU message This is all cool and shit and great when some other hacker fuck head is messing with you and you might wanna spread his fone number around a little. {Page 6} The Empire Using "anonymous ftp" to get files from other Internet machines Mark Moraes Anonymous ftp is a facility offered by many machines on the Internet. This permits you to log in with the ftp program with the user name 'anonymous' or the user name 'ftp'. When prompted for a password, type your e-mail address -- it's not necessary, but it's a courtesy for those sites that like to know who is making use of their facility. Be courteous. Most ftp sites do not like people getting files from them during their working hours since they usually have other load on their systems -- avoid 9am-5pm in their time-zone. Also bear in mind that countries are often connected by relatively low-bandwidth links, so please check local archive sites before you connect to some distant country to fetch something. If you think the item you want is popular, ask your local archive site sysadmin, who may be willing to set up a copy on the local archive. Different archive sites have different forms of etiquette -- if you see a README or README.TXT file in the ftp directory, please read it. Once you're connected to the remote site via ftp, you can look around and retrieve files. (Most anonymous ftp sites do not permit people to store files) The ftp program prompts you with ftp> and offers a few commands that are similar to Unix. "cd" changes your directory on the remote machine, "lcd" changes your directory on the local machine, "get" will get a file, etc. See the manual page for ftp (use the command "man ftp") Typically, a directory called 'pub' is where the interesting things are stored. Some sites will have a file with a name like ls-lR, that contains a complete list of the files on that site. Otherwise, you can type ls -lR and get such a listing -- for some sites, this can take a LONG time. This doesn't work on some sites. Usually, files are grouped in composite "archive" files, so you don't have to get many small files separately. The most common Unix archive file format for the Internet is tar, usually indicated by a ".tar" suffix in the file name. tar archives can be unpacked by running the tar command -- you may want to first do a 'tar t' on the file to see what it contains before unpacking it. Occasionally, people use shell archives (with .shar or .sh suffixes) instead. These are Unix Bourne shell scripts, with files encapsulated in them. Be careful when unpacking shell archives since they have to be run through the Bourne shell to unpack them. The simplest way is to use the unshar command, if your system has one installed. Otherwise, you have to delete all the leading text with an editor and then run the rest of the text through "sh" o unpack the archive. Make sure you're in the directory you want the files in before you try unpacking the archive, since there's no good way to list the contents of an archive. Files are often stored compressed -- for Unix, the most common form is the compress program, indicated by a .Z suffix on the file name. Sometimes, people use programs like arc (indicated by a .ARC suffix), zoo (.ZOO), zip (.ZIP) or lharc (.LZH), which are combined archival and compression formats. (There are lots of other archive formats - talk to the systems staff if you encounter them and don't know how to deal with them) Macintosh archives are often in StuffIt format (.SIT). In each case, you need the relevant extraction program. Usually, the archive site will also have a copy of the extraction program for ftp. Finally, there's the "self-extracting" archive format, popular in the PC world -- they look like executable programs (.EXE) and when run, they unpack the files they contain. When retrieving non-text files, you must use binary mode, otherwise the file gets messed up. To do this, use the 'binary' command. (It's safe to set this for text files if the other end is a Unix system, since Unix doesn't differentiate between text and binary file representation. If the site at the other end is non-Unix, you may need to use some other mode -- see the documents for that site and for ftp) An example session follows -- the commands I typed are all underlined with a row of carets (^^^^) and are usually typed at the % or ftp> prompt. % ftp ftp.cs.toronto.edu ^^^^^^^^^^^^^^^^^^^^^^ Connected to ftp.cs.toronto.edu. 220 neat.cs FTP server (Version 5.55 Tue Aug 8 22:48:27 EDT 1989) ready. Name (ftp.cs.toronto.edu:moraes): anonymous ^^^^^^^^^ 331 Guest login ok, send ident as password. Password:moraes@cs.toronto.edu ^^^^^^^^^^^^^^^^^^^^^ 230 Guest login ok, access restrictions apply. Remote system type is UNIX. ftp> dir ^^^ 200 PORT command successful. 150 Opening ASCII mode data connection for /bin/ls. total 62 drwxr-xr-x 2 0 0 512 Nov 20 1988 bin drwxr-xr-x 11 0 0 2048 Dec 29 00:45 pub 226 Transfer complete. ftp> cd pub ^^^^^^ 250 CWD command successful. ftp> dir ^^^ 200 PORT command successful. 150 Opening ASCII mode data connection for /bin/ls. total 4523 ... -rw-r--r-- 1 0 0 51251 Sep 16 12:02 ssl.tar.Z ... 226 Transfer complete. ftp> hash ^^^^ Hash mark printing on (1024 bytes/hash mark). ftp> binary ^^^^^^ 200 Type set to I. ftp> get ssl.tar.Z ^^^^^^^^^^^^^ 200 PORT command successful. 150 Opening BINARY mode data connection for ssl.tar.Z (51251 bytes). ################################################## 226 Transfer complete. 51251 bytes received in 0.94 seconds (53 Kbytes/s) ftp> quit ^^^^ 221 Goodbye. Now, to see what ssl.tar.Z contains, I can use: % uncompress < ssl.tar.Z | tar tvf - ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ drwxrwxr-x 7/0 0 Sep 16 11:58 1989 ssl/ -rw-r--r-- 7/0 301 Sep 16 11:58 1989 ssl/Makefile -rw-r--r-- 7/0 240 Jun 2 01:08 1988 ssl/README -rw-r--r-- 7/0 20642 Feb 26 21:43 1988 ssl/file.ssl -rw-r--r-- 7/0 5241 Feb 21 15:25 1988 ssl/file.sst -rw-r--r-- 7/0 56581 Sep 16 11:57 1989 ssl/ssl.c -rw-r--r-- 7/0 20642 Feb 26 20:08 1988 ssl/ssl.ssl -rw-r--r-- 7/0 5241 Feb 26 21:41 1988 ssl/ssl:sst.c -rw-r--r-- 7/0 5395 Feb 26 21:41 1988 ssl/ssl:sst.h -rw-r--r-- 7/0 12211 Mar 30 22:34 1988 ssl/sslskel.c -rw-r--r-- 7/0 274 Feb 26 20:42 1988 ssl/sslskel.ssl -rw-r--r-- 7/0 55 Feb 26 20:42 1988 ssl/sslskel.sst.c -rw-r--r-- 7/0 1001 Feb 26 20:42 1988 ssl/sslskel.sst.h To extract the files, I use % uncompress < ssl.tar.Z | tar xvf - ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ssl/ ssl/Makefile ssl/README ssl/file.ssl ssl/file.sst ssl/ssl.c ssl/ssl.ssl ssl/ssl:sst.c ssl/ssl:sst.h ssl/sslskel.c ssl/sslskel.ssl ssl/sslskel.sst.c ssl/sslskel.sst.h ********************************** * Dr. No-Good * * ~~~~~~~~~~~ * * Hacker of * By * The Month * Dr. No-Good * * * (c) 1992 Empire Publications * ********************************** Ok, lets see. Started last year in January. Started on boards. I was a huge fucking Gif freak. Was really PD, then I decided to start my own board. I had a small pirate section, some people called, got some numbers from them such as 'South of the Border' so I got into the warez scene (can't do shit with a 2400). Made my way up to K-rad ANSi artist. Was in FuBaR graphx, Paradise graphics, Stoned, SMaCK, etc.. My first P/H board was Solsbury Hill. Got some philes and read them. (The Prophets file I still have). My first unix I ever encountered was the ukelele. Fucking tried to hack it. Tried to send a fake write from root to Mavicon. heh.. Oh well, that was a failure. Then I became interested in c0dez.. Nat X helped me set up Code Thief (First time I ever talked to him. He was running a warez board). I hacked some 9501033's. Then I used them to call Terminus and I used to use accounts I leeched from boards. Also called LD such as bellyard in 313, TcH in 409/713, and my third LD board was PhunLine. With the accounts I leeched, I just started fucking around with Internet. Was an Internet freak. After my 950's died, I used to use the NASA thing until that died. Then I discovered UMD becuase of my mudding. I began to mess around there. My accomplishments vary and I don't want to go into details, but I got into a few systems here and there including a place at UMD. Got into a Governmental Cray computer. Social engineered people here and there. Nothing spectacular. Wish I could stay the fucking summer. It'd be a summer to remember. Did some trashing with NAT X. Trashed an airforce dumpster. Nothing but phun. I've been to all 2600 meetings since March. Met the eleet Knight Lightning. ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> | | | The Empire Bids farewell to a grand Hacker that might have started | | like the other Newbees, but sure didn't turn out like the Rest. | | | | | | So The Empire Magazine Honor's { Dr. No-Good } with the skill | | to over come the road blocks of Hacking, and the persistance to always | | strive to be The Best That He Can Be....... | | | | | ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Computer Hackers News Articles Compiled By Bob Krause KRAUSER@SNYSYRV1.BITNET The following is a list of articles that I have found concerning the computer underground in various magazines and news-papers. The list is in chronological order. If you know of an article that should be included in this list or correction, send me the information and I will add it to the listing. Nov 18 '90 Crackdown on computer crime is raising question of computer rights. Chicago Tribune pg.17 Oct 29 '90 Users paying big price for PBX fraud. Network World pg.1 Oct 28 '89 Halting hackers. The Economist pg.18 Oct 15 '90 Target: The Corporate PBX Information Week pg.24 Sept 9 '90 Can invaders be stopped but civil liberties upheld? The New York Times pg.F12 Sept 1 '90 United States v Zod The Economist pg.23 Sept '90 Digital Desperados; hackers indictments raise constitutional questions. Scientific American pg.34 Aug 26 '90 The rights of computer users. Los Angles Times pg.D9 Aug 22 '90 Open sesame; in the arcane culture of computer hackers, few doors stay closed. The Wall Street Journal pg.A1 Aug 20 '90 NY State Police round up hackers. Computerworld pg.99 Aug 17 '90 U.S. Arrests boy, 5 others in computer hacker case. The Wall Street Journal pg.82 Aug 6 '90 Computer anarchism calls for a tough response. Business Week pg.72 Aug 6 '90 Charges dropped against alleged BellSouth hacker. Telephony pg.12 July 30 '90 Hacker trial begins in Chicago. Computerworld pg.8 July 30 '90 'Hacking' crackdown is dealt a setback in trial in Chicago The Wall Street Journal pg.B3 July 21 '90 Crackdown on hackers 'may violate civil rights'. New Scientist pg.22 July 21 '90 Group to defend civil rights of hackers founded by computer industry pioneer. The Wall Street Journal pg.B4 July 10 '90 Group to fight for computer users' rights. Los Angles Times pg.D5 July 10 '90 Computer hackers plead guilty in case involving BellSouth. The Wall Street Journal pg.84 July 2 '90 Hackers of the World, Unite! Newsweek pg.36 May 21 '90 Throwing the book at computer hackers. Business Week pg.148 May 14 '90 Justice failed in refusing to make Morris an example. Computerworld pg.23 May 14 '90 Morris sentence spurs debate. Computerworld pg.128 May 14 '90 Wheels of justice grind to a halt in 'worm' case. PC Week pg.16 May 7 '90 Three-year probation for Morris. Computerworld pg.1 May '90 Just say No Communications of the ACM pg.477 May '90 Uncovering the mystery of Shadowhawk. Security Management pg.26 Apr 30 '90 The hacker dragnet: the Feds put a trail on computer crooks - and sideswipe a few innocent bystanders. Newsweek pg.50 March 26'90 Internet interloper targets hacker critics. Computerworld pg.127 March '90 Cyber Thrash SPIN pg.24 March '90 Is Computer Hacking a Crime? Harper's pg.45 Wntr '90 Comp. crime and the Computer Fraud and Abuse Act of 1986 Computer Law Journal pg.71 Feb 19 '90 Morris code. The New Republic pg.15 Feb 12 '90 Alleged hackers charged wit theft of BellSouth 911 data. Telephony pg.10 Feb 12 '90 Babes in high-tech toyland nabbed. Computerworld pg.8 Feb 11 '90 Revenge on the nerds; sure, jail our hackers - who needs software stars anyway? Washington Post pg.C5 Feb 9 '90 Hacked to pieces. New Statesman and Society pg.27 Feb 2 '90 Prevention is better than cure. Public Finance and Accountancy pg.9 Jan 5 '90 Computer hacking: is a new law needed. Public Finance and Accountancy pg.7 Feb 7 '90 Four charged with scheme against phones. The Wall Street Journal pg.B5 Dec 4 '89 Hackers: Is a cure worse than the disease? Business Week pg.37 Oct. 28 '89 Halting Hackers The Economist p. 18 Sept '89 Free the hacker two. Harper's Magazine pg.22 June 19 '89 Hacker invades So. Bell switch. Telephony pg.11 June '89 Consensual realities in cyberspace Communication of the ACM pg.664 Apr 3 '89 Strong scruples can curb computer crime. Computerworld pg.100 March 9 '90 Hackers revealed as spies. Nature pg.108 March 6 '89 Are ATM's easy targets for crooks? Business Week pg.30 Feb 20 '89 Prison term for first U.S. hacker-law convict. Computerworld pg.1 Jan 9 '89 Hacker prosecution: suspect held, denied phone access by district court. Computerworld pg.2 Jan 9 '89 Drop the phone: busting a computer whiz. Time pg.49 Dec 26 '88 The Cyberpunk People pg.50 Dec 11 '88 Computer intruder is urged by authorities to contact the laboratory he invaded. The New York Times pg.24 Nov 14 '88 Portrait of an artist as a young hacker. Computerworld pg.6 Nov '88 Robopsychology Omni pg.42 Aug 1 '88 Is your computer Secure? Business Week pg.64 Apr 28 '88 Hacker runs rings around military security. New Scientist pg.25 April '88 Computer hackers follow Guttman-like progression. Sociology and Social Research pg.199 Sept.28 '87 Hacking Throught NASA Newsweek p. 38 Oct '87 Brian Reid, A Graphics Tale of a Hacker Tracker Communications of the ACM pg.820 April '86 Positive Alternatives: A report on an ACM Panel on Hacking Communications of the ACM pg.297 Jan '84 Hacking away at morality. Communications of the ACM pg.8 In The Beginning .... In The Beginning The Empire Times was nothing more than an idea. But in recent times The idea came to mind of how I could teach, educate, and inform fellow users in the art of Hacking and Phreaking. The reasoning being, that there are to many people out there that might be in the illegal world but don't know shit about the illegal business. Most people are lame and don't even try to hack systems or find those codez in a PBX. Well there is a Revolution in the air, and Washington D.C. Metro Area is right in the heart of the action. There is so much talent and man-power in this area that it is un-real that most of the Great discovers aren't even coming from here. Just from looking in the recent 2600 there is only 2 Submission by two users that are from this General area, and that is 'The Monk' & 'Juan Valdez' (Juan is in Southern VA right now). Anyways, somehow there needs to be a revolution in Knowledge obtained and explotied around here. The key for Washington to be put on the map as a Serious Hacker town is for people to get involed, And the only people that can put in the real time are the Newbee people that haven't been conformed to the old ways of hacking. Newbee people might be lame as to the tricks and technics that us Older and Knowledge folks might have, but they have a skill which is at the heart of This Underground world, and that is 'The Will to Try different Things'. If people around here would get off there ass and start looking into different possiblites, then something great might happen. The Problem most people have is that they don't know where to start and are scared of getting busted. Well, yeah you might get busted, you might even go to jail or get a record, but that's the risk you take when you get into this lifestyle. Nobody said hacking was safe. All I can say is for you all to stop 'Shoveling Infomation around' (As Inhuman says), and get out there and do something, Go subscribe to 2600, go read all the Phracks,write up your own programs, whatever it takes to gain the personal satisfaction you want. What really sucks is that were are the luckiest people in the country to have so much right next door, yet knowbody takes full advantage of it. IN the local calling area we have so many places to jump on The Internet it's no phunny, such as George Masion Univ, Maryland Univ, Howard Univ, George Washington Univ, Thomas Jefferson H.S., Blair High School, and several other college and corporate firms to hack out and gain access to the Hacker's Domain, but yet people stand on boards and beg for accounts and shit. Most of you people don't understand that you won't get what you desire of a BBS (Even The Empire), cause boards are just here to bring information together and provide you with the tools to take care of your business, you all have to do your part and call elsewhere looking to commit crimes and fuck over the Gov't boyz... Over All I hope that this magazine will inspire people to to get off there ass and get out and do something... 'Charge the call to the COCOT as I so kindly did this afternoon' -Juan Valdez (Washington, DC) The Editor's Comments: --------------------- {1} This Magazine is just starting off and doesn't have many Staff Members, and is looking for extra help to make this Magazine grow and prosper. All persons intrested in becoming a Staff Member of The Empire Times needs to email me and tell me of your intrest, and if your selected you job assignment will be given to you... -Thanx {2} The Co-Editor's Post is open as well and will be given to a seriously qualified person. So Only Serious persons need apply. Description: To become the President and Figure-Head of the magazine. {3} Freelance writers are always welcome to submit your work and if the writing and topic's are of a good nature it will most likely be considered for Publication. {4} Yes I know that the mag is more or less somewhat small but with you support this shit shall grow... {5} Thanks for you support, and look for the next issue of The Empire Times to come out on July 10th, 1992... -The Empire Staff (c) 1992 Empire Publications