----=[ CISSD ]=---- takes undue credit for the publication of Issue #1 of __ |__| : _____ _____:_____ ________|___ __|__ _ | . | __| | | | | | | | ---===[ | / __| /| | / _ | |__ ]===--- __|__|__|_____|___/ |__|___/__|__|_____| | . | : . . : . . - INTRODUCTION - ========================================================================= THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY JAN (C) 1992/93 ------------------------------------------------------------------------- As I type, IBIX(Maryland), Short Man(Ontario), Lister(ON), and The Dope Man(ON), eat my phone bill for christmas dinner.. and in that order. In an attempt to justify being WHQ for a text mag, i finally sit to produce an issue. Let us contemplate Mailing addresses temporarily. Send questions, comments, kitchen utensils to: TX c/o CISSD 37 Woolsthorpe Cres. Thornhill, ON L3T-4E1 CANADA - TX --- 5 MOST FREQUENTLY ASKED CUSTOMER ASSISTANCE QUESTIONS(in order): 1. Who are you? 2. Where are you? 3. What are you? 4. Why are you? 5. How are you. - IBIX --- FOOLING BELL 800 ANI Bell Canada 1-800 numbers are all blessed with the gift from bell hell... Automatic Number Identification. And all is fine and well if you are PBX'ing, but why?! The following is a simple, and consistent method with which to fool BELL ani, to the extent where they only know what city you are in. You must train your ear... on just about every phone call you make, you hear a faint 1300Hz tone accompanied by white noise. Each '=' representing this sound, and '-' representing silence, the pattern of sound for a 1-800 number is approximately this: ----==========--==-----------------===========================RING As a hacker, it is your duty to link to your three way node(where a trusty hacker freind is waiting) at the '*' in the following illustration: ----==========--==-*---------------===========================BEEP! 'Your number please sir??' '800 666 girl' 'Your number *AGAIN* please sir????' 'Oooops, that was my sisters number.. mine is [my area]-[my exchange]-random four digits!' 'Thank you for (ab)using Bell Canada' - TX --- ADDITIONAL WAYS TO FOOL BELL ANI You have just read a method of fooling Bell ANI for anyone equipped with a 3-way line. However, some of you may not have 3-way, or may require another method. Thus this article, Alternate methods of fooling Bell ANI. The first step to fooling Bell Ani is very simple. We must connect with the operator. Divert if you wish, but it is not neccessary. Once you have gotten the operator say the follwing being careful to say EXACTLY what I have written. "Hello. Could I please speak with ANI?" This is a keyphraze that will instantly gain you access to ANI. AT this point we must fool ANI, and lull all suspicions. The following works for me as a general rule. "Hi ANI. I really love you! I'm VERY sorry about last night..... let me take you out again tonight and make it up to you! I REALLY LOVE YOU! I'll give you my real phone number! And I won't use aliases anymore! I promise! I don't know what I'd do without you! Please give me another chance. We can meet at my place...." This is generally a safe way to fool ANI. After this, the most difficult phaze is completed, it is up to you to close the conversation quickly (can only talk to a bitch for so long....) and meet her after she gets off work. If this is done properly, You will gain access to wonderful crevices of Bell employee property that will keep ypu going for weeks. However, be warned, as with codes, an ANI is only good for so long.... after a week or two it is best to find a new ANI. - DOPE --- TELEPHONE PIRATES - NOT JUST HACKERS ANYMORE Excuse the numerous typos in this file, as it was taken from a recording dicatated to me over a poor recording device... some words were misheard/not heard at all and some information might be garfunkled... sorry. BEGIN _| Telephone Pirates. Not just hackers anymore by Gerry Blackwell ------------------------------------------- Two years ago, a teenage hacker 'broke into' westing house canada inc. sl1 PBX in missisauga, and stole $5000 worth of long distance telephone calls. The company was lucky. It was petty crime commited by a not very clever kid. That amount was peanuts. Still, westinghouse canada took a stand. It tracked down the perpetrator and unlike other companies in similar circumstances, brought the police in and went public with the story. 'We were determined not to get a reputation for backing down.', says telecom manager Al Addis. Westing House had set up an 800 line terminating at a direct inward service access(DiSA) port on the SL1. Executives on the road or at home could call in to the switch, then dial out on the outWATS line to make their long distance calls. Each executive had a four digit authorization code, and the company monitor call detailed records regularily. The problem surfaced when one senior executive long distance calling throught the disa port suddenly skyrocketed. DISA PORT BREACHED ------------------ It wasn't hard to figure out what had happened. Somebody had found out the telephone number of the DISA port, possibly by using a PC program and a modem to repeatedly dial numbers in sequence until it hit one that answered with the wright kind of tone. Then a different PC program repeatedly dialed then number, each time trying a different authorization code until one worked. That's the high tech method. It may be the theif learned the number by shear accident. Westing house, like many other companies, had not stressed the importance of keeping DISA numbers confidential. The kid who did the hacking in this case only used the authorization code for his calls to freinds and computer bulletin boards. The long distance charges appeared on the Westing phone bill. The company was lucky. The kid didn't, as many have, pass the authorization code around to all his buddies, or worse, broadcast it on a hackers bulletin board. Telecom staff at wessingtn house started phoning some of the unnacountable numbers on the executive CDR printout. They ended up talking to the parents of a freind of the perpatrator. Again, they were lucky, this was an inexperienced hacker who didn't bother to cover his tracks. 'It is unusual that the freinds parents were willing to help.', Addis adds. At that point, Westing House called the police, who went to the suspects home with a search warrant. They found a PC set up for hacking. The company stopped short of prosecuting, and eventually had to write off the $5000. Westing House has now re-configured it's DISA ports so callers can only access local lines, thus minimizing potential financial loss from further hacking. A BILLION DOLLAR INDUSTRY ------------------------- THe Westing house case, unfortunately, is only the tip of the iceburg. Theft of the telephone service and, more importantly, from customers is endemic. Estimates in the US aggregate losses by customers at somewhere between 500 million and 1 billion dollars a year. Bell canada director of regional security in Ontario estimates losses by phone company customers in Canada 'in the millions'. Srgt. Val King, in charge of the computer crime unit of the RCMP economic crime directorate in Ottawa has investigated at least one case in which the victims losses topped $50 000. Other involved amounts of $20000 - $30000 and $40000 dollars. EMBARRASSED VICTIMS ------------------- The only thing remarkable about the Westing House case, is that the company freely admits it happened. Most victims wont talk about the problem out of the embarrasment, or fear of losing investors confidence, or the mistaken idea that clamming up will prevent other criminals from figuring out how to do it. "It can be a problem if you're not carefull", was the comment, all too typical of the telecom manager of a large Canadian resourse company. "But the less talking about it, the better." That's the kind of attitude, said atlanta based security consultant Larry Rigdon of communications consultants Ltd. that makes DISA fraud the dirty little secret of the telecom industry. "It's a major major problem", he said, yet nobody's talking about it. Not even the media. In one of the hush hush cases, Rigdon claims the city of New York was hit for $750 000 in a year, "But they won't admit it", he says, "It's all political." The RCMP's Val King says the unwillingness of coorporations to prosecute, or even report a phone fraud case is one of the major problems in bedeviling police work in this area. "Even if a company doesn't wish to prosecute, we still like to know about it.", he said, "it might help in advising companies on how to prevent other crimes, AND you may actually have evidence that could help us prosecute a criminal in another case.". KIDS AREN'T THE REAL PROBLEM ---------------------------- But even with more help from the victims, prosecuting phone crooks won't be easy. Rigdon and other security experts say, juvenile hackers are not really the problem. "If a company gets hit for $1000 in a month, maybe that's a kid", says Rigdon, "But when it's $10 000, $50 000, $250 000, that's not a kid. That's a proffesional who knows exactly what he's doing". Says King, "it's falsely to think that hackers are all kids. It's just that they're the ones who are easy to catch. As they get more experienced, they learn to cover their tracks better.". Rigdon, and another US based security consultant, Jim Ross, of Ross Engeneering Inc., in Adams Town(?) MD believe many of the most dramatic cases of DISA fraud in the US can be traced to drugs, trafficers, and other organised criminals. Bell Canada knows that some of the cases investigated in Canada involve drugs or organised crime. King admits some of the cases the RCMP investigated had links to organised crime. IN one US Case criminals stung a Harrisburg PA coorporation for $250 000 over a period of months. When the company discovered the fraud initially, it upgraded security on its DISA ports so callers had to enter six digit authorization codes instead of a four digit code. That didn't stop them for long. All the calls were going to Columbia. When investigators finally traced them back, they found the calls originated from a bogus construction trailer set up on a vacant lot in manhatten. Of course the trailer was long gone by the time investigators got there. $50 000 in 8 days ----------------- In another case, criminals bilked a chicago company of $50 000 in 8 days. The same magnitude of loss can result when amateurs broadcast a DISA number and authorization code on a Bulletin Board, Ross Says. For a few days, hundreds of hackers may use the numbers wracking enormous phone bills for the companies victimised. HARD TO PROSECUTE ---------------- Inexperienced Phreakers(the term for telephone hackers), such as the kid who stung Westing House are hard to prosecute, even when they leave a track of muddy footprints behind them. "Suppose you find the house where the calls are originating.", says Detective Dave Hodgson of the Metro Toronto Police Fraud Squad. "There may be five people in there. How do you know who commited the offence? You also have to be there when they're doing it to charge them.". Hodgson has investigated 'half a dozen' cases of phone theft in the last year, and wasn't able to lay charges in any of them. King says his unit success rate in prosecuting phone crooks is 'Less than 25%'. THE VOICE MAIL DOOR ------------------- The other major weak spot in modern telecommunication systems is the Voice Messaging System. In one case in the US, hackers broke access codes on a new voice mail and automated attendant system installed in the Los Angelos based certified grocers of california. The system included an 800 number for the convinience of the grocery, wholesalers, employees, and customers. Criminals broke into the system and temporarily commandeered 200 of 300 mail boxes. They replaced the mail boxes owners greetings with recorded messages giving up to the minute new york cocain prices and information about hookers services. The company didn't detect the situation until it noticed a suddent increase in the use of its 800 numbers. Only in America you say? Think again. RCMP Srgt. Val King in charge of the forces computer crime unit in Ottawa says there have been almost identical cases in Canada, involving drugs and prostitution. In one instance a hacker posing as the system administrator, broadcast a message to select user saying the company suspected there was fraudulant use of the system and was investigating. Could they please assist by giving him a private message leaving their passwords, and ID? Luckily someone checked with the real system administrator, and blew the whistle. Hackers can easily, and will, if they haven't already, call into a Voice Mail System, and through dial to the public switching network. If the line is busy, or ringing no answer, the system allows callers to dial 0, and then dial another extention rather than leaving a voice message for the original recipiant. On many systems you can dial 0 and then 9 for an outside line. From there, you can dial anywhere in the world. So is there a problem with phone theft in Canada? you bet. How big is harder to say, but if you accept estimates from experts like Ross and Rigdon who say it's a billion dollar program in the US, it must be worse than it seems in Canada, or it's soon going to get worse. * Gerry Blackwell is a canadian journalist specialising in telecommunications issues, and a contributing editor to telemanagement. |~ END In addition to this letter, a page was recieved detailing methods that Canadaian companies shoud, and undoubtedly will use to protect themselves. Hackers, take out your cyberdecks: BEGIN _| 1. Best Defence: Disconnect all DISA ports, using calling cards instead. 2. Next Best Defence: Block all trunk calls to DISA ports or ??? All overseas calls. (The biggest theft has involved overseas calls.) 3. Turn off DISA ports at night. Many fraudulant calls are made late at the night. 4. Set the system to wait at least five rings before answering, and don't answer with a steady tone. Answer with dead air, or a voice message. (Hackers use many programs to automatically dial numbers in search of DISA ports. They count the hit when the number answers on the first or second ring with a steady tone.) 5. Issue a different DISA authorization code to each user. Do not implement one code for all users. 6. Set mailbox password at a minimum six digits, and enforce frequent password changes every 30 days if the feature is avaliable. 7. If users select their own authorization codes, set a poilicy and make it stick that they can not use extention numbers, company ID, or social insurance number. Make someone responsible for testing codes for hackability. 8. Delete all Authorization codes programed into your PBX for testing and service. Purge codes of former employees, or any code a former employee might have known. 9. Implement DISA ports so that entering an invalid authorisation code causes the system to drop the line. 10. Monitor the system continually through alarms status logs. 11. Study call detail reports on a regular basis to spot fraud related calling patterns early. |~ END - TX --- SO YOU KILLED THE MUTHA FUCKA. NOW WHAT? The computer underground offers files which instruct in everything from the weapons of death to methods of murder without remorse or being caught. However, one encounters a fatal flaw in these ACSII councellors when one actually commits a murder. As for the killing, we will assume that you are capable of pulling this off yourself. Various creative methods will be discussed in future editions, for now, however, we deal with the after-effect. Guns are always an easy way out. So, say you have just shot some bitch ... NOW what are you going to do? If you are reading this you are not made of the stuff that would have you sit down and cry. Perhaps flight has entered your mind? Well, running is not advised. In the before mentioned scenario of having shot a woman, one is presented with a multitude of wonderous, once-in-a-lifetime opertunities. For all eternity man has been obbsesed with putting his penis in women. Vagina, mouth, butt, if its a hole, we stick it in gleefully. So, now your looking at a WHOLE NEW HOLE! While unconventional, this is a wonderful oppertunity. Before even considering entry, one must take a few precautions. We are not animals after all. Firstly, clear the entrance of any bone fragments that could hurt poor ol' Jimmy. That done, finding a latex condom is advised since the whore probably has aids. Now, get to it. Intercourse like its never been before! You will find that various organs and mucle formations add and decrease from the effect in very interesting ways. If you are fast enough to do this while blood is still flowing, it is a very pleasant feeling. I will discuss other things to try in the future also. However, before I go, I will leave you with two other ideas. A nice slit with a knife thats a bit tight also offers possiblity. Secondly, you may say, sure its good fun, but I am going to get caught! Well, fear not. Murder usually gets you caught anyway, and this will present an IDEAL insanity plea, even though we know your not! - DOPE --- #1 WITH A BULLET This article extracted from the Toronto Star Dec 26, 1992. BEGIN _| Montreal inventor touts a new age in ballistics ----------------------------------------------- MONTREAL (CP) - Picture the scene: a police officer finds a spent bullet at the scene of killing. Whose gun fired it? Ask Michael Barrett. Barett has come up with a system to automate the identification of bullets after their discharge. Every fired bullet bears markings from the gun that are just as distinctive as a single fingerprint. Barrett's computerized system, which is called Bulletproof, was developed by forensic technology division of Walsh Automation Inc, a Montreal firm. Barett says it advances ballistics - the science of projectiles and firearms - into the next century. The system carries a $500,000 pricetag, which may explain why there hasn't been a rush to buy it, although ballistics experts throughout the world have shown interest. Barrett, of Montreal, said in a recent interview his microscope-data system can identify and store data taken from test bullets from every registered firearm in Canada. He says the system can also: - Trasmit data to any law enforcement agency or crime laboratory in the world. That could alert authorities to the possibilty that a security killer may be operating, and help track the movements of criminals orginizations or terrorists, - Help law-enforcement agencies solve crimes involving shooting. - Save forensic examiners thousands of hours of tedious work trying to link slugs to specific firearms. - Cut down the handling of bullets used as court exibits, reducing the chance of their damage or loss. "Its an interesting, but expensive system," said Yves Ste-Marie, head of Quebec's police labratory. Gaylan Warren, a member of Association of Firearms and Toolmark Examiners, a global organization, said the system has great potential. "I've been to Montreal twice to look at the Walsh system and I'm convinced that it does what they claim it can do," Warren a firearms examiner, said in a telephone interview from his home in Newport, Wash. "In ballistics you're dealing with cylindrical objects, and at times it takes hours of painstaking work at the microscope before you can arrive at the verdict." Barrett's invention advances the microscope by years, Warren said. It has a computer operated motor that can stop 50,000 times a revolution. The slug can be videotaped and freeze-frames producd. John W. Matthews, who was the RCMP's cheif scientist for firearms until he retired in 1989, agreed with Warren that examining bullets takes a great deal of time. "Four to eight hours isn't uncommon." Matthews, interviewed by telephone from his home in Ottawa, was excited about the possibility that ballistics examiners could compare notes via computer link. Matthews, who said Barrett asked him to critique the system, termed it "progressive. And when it gets on ine, (it) should prove a time-saver for harried ballistics examiners."" |~ END Well, there's no real advance in technology here.. but the idea is good, and it sounds like implementation might be welcomed by the wealthier law enforcement agencies. The 8 hours examining a bullet could be the escape of a criminal, or worse(in most cases), the death of another individual. On the other hand, aren't we surcomming to the enemy?.. What ever happened to anti-big brother ideology? I'll show you my serial number if you show me yours... - DOPE(sourced/typed) - TX (commentary ) --- C I S S D 's ANARCHY SERIES: UNDERWATER ANARCHY Things that make you go BOOM! Water. You can't set it on fire, and it makes a lousy bomb. Most of the time it actually Impedes any attempt at being anarchic. However, water contains one thing that can open new and unexplored forms of anarchy and physical violence: The Scuba Diver. Yes, the Diver. Scuba Divers love to explore new depths and flash their high-tech and expensive gear all over the place. Divers are often upper class middle aged men, which makes them an ideal target. Rich thrill seakers who can flaunt their money, and in great quantitiy . Divers are also many times the neuveau-riche, the very polluters of our society. No matter how you look at it, Divers are filthy rich and are stinking bastards - the best kind for attacks of anarchy. In response, from the twisted depths of the CISSD's Collective Penii, I present to you the Famed Underwater Diver Bomb. Materials Needed: 1 Fairly Large Jar or othen type of Sealable Bottle. Enough oil to fill half of the bottle Enough Potassium to Fill the other Half of the bottle Some kind of Trinket, or Toy (Preferable Shiny) to entice the Diver. Remember, Potassium will burn quickly when exposed to air, and explodes in water but not Oil. What to Do Beforehand: 1) Take the Oil and fill the jar half way with it. 2) Place the Trinket inside, so it is quite Visible to anyone seeing the jar. 3) Fill the Other half of the jar with the Potassium and Close the lid as Quickly as possible to Prevent YOUR injury. 4) Go to your local (or if you're on holliday, the beach) area where divers Hang out and dive/explore and plant the bottle Underwater somewhere, in a place where it can be seen easily, and attract a Diver's attention. 5) WAIT for the Fun and Fireworks. Just what the hell does this sucker do anyways?: Whats happening here is Simple, Potassium is a chemical that burns with air and EXPLODES when comes in contact with water. The Oil Removes all the Air from the jar as so the Potassium will not Burn and waste the Bomb. The Shiny object or trinket is there merely to make the diver interested enough in the Jar as to Open it. Because OIL is LIGHTER than WATER, the oil floats away, and the water rushes into the jar and hits the Potassium. Now, we all know what happens to the Potassium when the ater hits it. By Bye Mr. Scuba Diver. Have PHUN! - LISTER --- SOON TO COME Terminator X -=- AC's and DC's 1993 Updated list of Area Codes and some usefull Direct Connect to out of area operators Lister -=- JOYS OF THE HATCH Report on our findings from our post-christmas hatch hunting extraviganza EUROPEAN SPACE AGENCY REPORT --- CREDIT CARD FRAUD PREVENTION Taken from the Toronto Star Dec 26, 1992. BEGIN _| You can't leave store without it -------------------------------- Gucci leather it's not. But Totes' vinyl credit card "safe" wins hands down when it comes to function over form. Did that store clerk forget to return your MasterCard? This gadget won't let you leave the counter without it. Totes in Loveland, Ohio, has devised a case that holds seven charge cards in plastic pockets with an electronically charged safety band. If you close the black vinyl case without returning a card to its pocket, an alarm (similar to a phone ringing) activates. Totes' Credit Card Safe sells for $15, which includes a lithium battery that operates the alarm system." |~ END I know several locals who steal cards this way and get away with it, amazingly enough. I have released this article in attempt to curb the habits of these persons and others before they are busted. Why anyone would steal a card regardless of preventitive measures is beyond me. Especially when its so much easier to write down the info... - DOPE --- C I S S D 's ANARCHY SERIES: GUIDE TO FRIED CHOOK The LIVE Dead Chicken [ This is a re-published article.. reminding us of CSSD in it's early days of amateur hackerdom.. enjoy. - Ed ] FRONTn' ------ Well, I'll have you all know that I do not recomend using any information found within this file or archive and cannot be held responsible for anything whatsoever since I'm not responsible anyway. Bla Bla blah blah blah blah bla. I also do not recomened reading this file if you are weak of heart, under the age of 14, have ever spelt cool "c00L", upset by typos, or are exicited by the idea of dressing in the oposite sex's clothing. HISTORY ------- Ok, by this point most of you will be wondering WHAT THE FUCK is a LIVE dead chicken. Well, let me explain first with the breif history of the chicken: A year or so ago (1990), it occured to me that while people frequently spoke of Cat Bombs and the like, nothing new had come out in quite a while in this area. And I have a need to be origional. Also, liking my cat, I did not like the idea of exploding feliones. However, I have a DEEP and NUTURED hatred for Chickens, thus, the LIVE dead chicken was born! You will find this 'recipe' is also an effective weapon - read on to see. THE REAL SHIT ------------- There are two versions of the LIVE dead chicken. The first is effective, but its much weaker. The second is MUCH more powerfull. Ok, now, here is what all y'all people FUCKED UP 'nuff to try this (like me) will need: 1 Chicken. It is best that the chicken be alive, or atleast recently dead, however, a (un)frozen whole chicken will suffice with lesser results. Several film canisters and/or any other smallish container. A generous supply of Red phosphorus and Sodium Chlorate. Sewing materials and/or Industial stapler Duck Tape Knife and other blunt instuments. All right. Now that you have run about collecting everything, we start the fun. Assuming you have a live chicken, You will now need to end is filthy life. Holding it down and making a lenghtways incision up its belly is functional, but not so fun. I recomend beatting it a bit first and various other stupid things that come to mind are always fun. We ALL know its fun to cut their heads off, but don't. Makes the bomb non-functional. Do that with another chicken tomorrow. Now that the chicken is dead we need to worry about explosives. In the weaker recipe (still not too weak), we use a sodium chlorate mixture. This particular mix is IMPACT sensitive, so BE CAREFULL OUT THERE! Anyway, mix the red phoshorus and sodium chlorate in 1:1 proportions and fill whatever containers you have chosen. The containers should then sealed and taped with duck tape. At this poin you MAY want to hurl a container of the explosive at something a little way away so you know how well you made the mix, and what you are getting into. Play with them and see exactly how hard an impact they need, thus, you will not accidently blow you face off. Now, you will have to make a judgement call. I recomend taking SOME guts out to fit more canisters of explosive in. See, the guts cusion impact thus making the chances of explosion less likely. I recomand a small amount of inards be removed an a rock be added in with the explosives. BUT, I leave this to your discretion. Once you have every conceivable item inside the chicken (you could even leave a message in a steel container!) you will want to sew up ALL holes in the chicken. Sewing should be done well, ie: stiches less that 3mm apart, for best effect. You may noe tape up the chicken a bit. It help the blast, but dont tape too much - you want the feathers free! Basically, what you now have is an impact projectile. Drop/throw the sucka and you get fireworks! Now you see the beauty of this 'grenade'. You can FUCK someone up with it in is powerfull forms, AND people will LAUGH! Imagine the hummilation of dying from a Chicken bomb! Lying dead as the feathers settle around corpse! heh, Also, one gets a good chance at a get-away. People tend to stand transfixed wondering why a chicken exploded - or why the exposion put feathers everywhere, and whether the guts on themself are the chickens or from a victim. NO ONE will be paying attention to you most of the time! Even better - terrorism and assassanation. WHO would stop someone with a chicken?? You can carry this explosive pretty well anywhere with only a few odd looks! booooooooOOOOOOOOM ! -------------------- Now I will introduce the 'alternate' LIVE dead chicken ideas. The following is the LIVE dead chicken but MUCH more powerfull: Astrolite G is a form of ROCKET FUEL. It has a detonation velocity of 8600mps (meters per second) while TNT only packs 6900mps! Now, astrolite g is made by: mixing 2 parts by weight ammonia nitrate with 1 part anhydrous hydrazine. This will make a clear liquid explosive! Note, you can spill this shit on the grass - have it rain - come back 4 days later - it'll still blow up. SO, ya pack a canister or two of this (maybe even a plastic lunch baggie) with the rest of the explosive, and your BOOM is MUCH bigger. I have also receive suggestions for the NAPALM CHICKEN. In this one would replace the explosives with a full plastic baggie of Joy and gasoline[Ed: or your favorite napalm recepie ], and place several ammonia pellets in the chicken. When the bag breaks - there should be much napalm! This sorta defeats the purpose of having a chicken with feathers.... but napalm is fun. Especially when used in combonation with several unsuspecting police officers. - DOPE --- BRAIN TO COMPUTER HOOKUP Baltimore Local Paper - Harry - October '91 This paper MYSTERIOUSLY dissapeared after this issue was published.. [Ed: Thanks IBIX ] BEGIN _| How would you like to recall what you thought as you were being born? A new computer, being tested in Cupertino CA, connected to your brain and is able to print out your entire memory. Every fact and feeling you have experienced thorought your lifetime will be avaliable to you with the push of a button. Hideo Masayama, Japans leading computer designer, unvailed plans for the device at this years computer expo in Yolkahama. The only catch is that, in order to have this information avaliable to you, you must have a small plug installed in your head. Masayama demonstrated the ease with which the device is used once the emplant has been installed, by plugging a small connector into a recepticle behind his own ear, and punching up the year 1948 on his computer. In an instant, his printer was in furious operation, spewing out page after page of information, some of which was passed out to the media in attendance. The scientist, who was 22 in 1948, talked to the assembled press conference while the printout was in progress, and didn't show any ill effects from the tap on his brain. The first printout page passed out to the media had to do with his first day on the job at a construction site where he worked while attending graduate school. The page dated April 22, 1948, was in chronological order, according to the time of day. "6 am.," it read. "Awake to terror and depression about first day on job. Can't get out of bed. Can't get out of bed. "6:04 am: Get out of bed and walk to the bathroom. Feel sad, because I know I am too intelligent for this construction job, but since americans bombed us into submission, can't find anything else. Hope to god, country can pull out of it, so I can become the scientist I know I can be." The printout went on to chronicle all the feelings and experiences of the day. "Clearly, this is a breakthrough unlike any other we have ever seen.", said Masayama. "I am not going to share with you my birth memories, but I will pass among you copies of a womans memories of her own birth. Her identity is to remain, however, anonymous." The womans birth memory printout began with the first light she shaw when emerging from the woumb. It read, in part, "Dim light, brighter, brighter. BLINDING LIGHT!! DANGER!! DANGER!! MEN!! WOMEN!! HANDS!! Hands holding me. CUTTING ME!! DANGER!! DANGER!! THEY HAVE CUT MY CORD!! OH MY GOD!! THEY CUT MY CORD!! WAKING ME!! BLOOD!! BLOOD!! FEAR!! FEAR!! PAIN!! PAIN!! TERROR!! TERROR!! Wrapping me! Giving me to my mother. Oh, oh to be with my mother, my mother." Dr. Masayama claims that this process will teach people much mor about themselves and their minds then they ever knew before. So many mental ilnesses, he says, are caused by repressing bad things that happened to us, and then having the bad memories come out in other harmful ways. If we understand what has happened to us in the past, from birth to the present, we have a head start in understanding what makes us tick, and what does not. When asked about the operation to emplant the receptacle in the skull Masayama described the procedure as simple. "No problem, really. We shave an eighth inch of your hair behind the ear, and then drill a tiny hole in the head directly to the brain." The operation takes an hour, and can be done in a doctors office. The only problem is that it's difficult to find a doctor experienced enough to do the drilling, since the probe goes into the skull several inches deep, and connects directly to the brain. "This is a problem at the present, but we feel this is going to become so popular it will be as avaliable as ear peircing." Aside from the deep dark secrets locked up in our memories, which this will let us in on, the computer brain memory printout has it's practical side. "Forgetting simple everyday things will be a thing of the past. Where you left your car keys, a forgotten telephone number, an important paper you locked away? All of these things can be called up from the computer with the push of a button." Some experts are predicting that printouts of the partners involved will be required to be avaliable to all persons getting married. They must be required in some business deals, and there is worry that wives might plug into husbands brians in order to check up on their sexual activity. The future for brain computer memory devices is expected to be unlimited, and could spell the end to civilisation as we know it. Think about it. Dr. Masayama says the device could be on the market in time for valentines day. |~ END - IBIX(sourced/dictated) - TX (typed ) --- CREDITS Well, to wrap up for this issue, I'd basically like to say Thank You. It's been a SHITTY year, but thank you anyways. Y'see, however shitty, it has allowed me to be exposed to more cruelty, feel more emotions, taste more flavours of life, and be more people than any other year has. It's time to settle down. Time to understand the cruelty, explore the emotions, savour the flavour, and be myself. I finally love myself.. because however much i search for myself, I haven't the foggiest idea who i am. I know who the rest of these people are though.. [signing off.. TX] LISTER LIST EOTD Recruiting - Overseas/Canada Relations Sysop of 'The Revolutionary Front' +1 416 936 6663 CISSD Canada/HQ TERMINATOR X TX USA/Canada Relations - Intergroup Relations Editor of 'REVIVAL' magazine +1 416 886 5745 CISSD WHQ Voice THE DOPE MAN DOPE Director of +1 416 Sysop of 'the Downtown Militarized Zone' +1 416 450 7087 CISSD WHQ Data IBIX IBIX US Contact - Director of +1 410 Concept design and development ------------------------------------------------------------------------- THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY (C) 1992/93 -------------------------------------------------------------------------