Cybertek Electric: Issue #4                                           7/30/96

               �ss es flestra ferdha f�r; en sk�lpr es sverdha
      /  |\      /|     /|\     |\      |\      /|  |-\       \       /
     /   | \    / |    / | \    | \     | \    / |  |  \       \     /
    /    |  \  /  |   /  |  \   |  \    |  \  /  |  |   >    /  \   /
   /     |   \/   |  /   |   \  |  /    |   \/   |  |  /    /   /  /
   \     |        |      |      | <     |        |  |  \   /   /   \
    \    |        |      |      |  \    |        |  |   >  \  /     \
     \   |        |      |      |   \   |        |  |  /    \        \
      \  |        |      |      |    \  |        |  |-/      \        \
I know a fifteenth, which Thiodhroerir the dwarf sang before Delling's door.
 He sang might to the Aesir, power to the elves, and understanding to Odin.

                        Cybertek Electric: Issue Four
                                July 30, 1996
                         edited by Thomas Icom/IIRG
                  <[email protected]> <[email protected]>

             Complements of OCL/Magnitude's Project Blackthorn,
          and The International Information Retrieval Guild (IIRG)


Table of Contents
=================
* Hacking the Human Body
 by Mujahadin
* From Crossbows to Cryptography: Techno-Thwarting The State
 by Chuck Hammill
* Vesoft and the Hewlett Packard 3000
 by Black IC

                                 ---/////---

                           Hacking the Human Body
                                by Mujahadin

Many of us in the computer 'underground' are used to seeing various postings
about bugs and backdoors in various pieces of software and hardware that make
up this vast culture that we are a part of.  But how many of us know, that for
example, the human body contains many weaknesses, bugs if you will, that can
be exploited just as easily as Wu_ftp?

The reasons for this knowledge not being widely available are obvious. The
people who hold these secrets are like the master hackers who only give out
these powerful secrets to those they implicitly trust, or to those who have
shown their worth by diligent study and application of requisite materials. It
is not my purpose here to disseminate such information recklessly.  Rather it
is to impart the reader with a respect for the capabilities of the human body
and the weaknesses contained therein, and of some of the basic ways these can
be used to protect yourself against a physical attack in the most effective
way possible....you don't want your aggressor to get back up.  It NEVER pays
to be a nice guy during the escalation of a physical confrontation.  Only in
the movies do the nice guys walk away, and not have to turn around.

First some background concerning body mechanics.  The human body, whether
through evolution or divine creation, moves with circular motion on many axes
simultaneously. Next time you walk to the bathroom or to the refrigerator to
refill your beer stein, try walking rigid, like a robot would, using just
linear motion. You will see immediately that this is an UNnatural method of
movement and how uncomfortable it is and to help me prove the theory behind
this article, just how much motion is wasted by this linear activity.  It
takes a CONCERTED effort to maintain balance in this robotic movement. So now
we see the economy of motion and ease of action that the natural way our
bodies want to move gives us. Using this economy of motion and ease of action
now takes us to my next point, physically manipulating the human body in an
unnatural fashion.

While many parts of the human body are very flexible, we can say that nothing
has full 360 degree rotation, and it is in this area I will address most of
this article to.  Joint manipulation is the easiest way to start the
discussion.  The best way to describe a joint manipulation is by example.
Open your right hand exposing the palm upward. Then place the index finger
of your left hand (with the rest of the fingers tucked in) into the right
palm.  Now close your right hand around your index finger.  Rotate your
right hand around feeling the limits of movement and committing them to
memory. Open the right hand back up and put the index finger AND the middle
finger of the left hand both in the palm, closing it.  Rotate the right hand
once again sensing the difference this makes in this technique. Two fingers
are ALWAYS better than one, however, make sure that the two fingers you plan
on seizing are located next to each other on the hand.. or else you may lose
your grasp due to the difficult to grab shape this makes. One can also grab
separate fingers on an attackers same hand using both of your hands.  This
is a great technique and is called separating the bone. Try this on a friend
(or enemy), but if on a friendly victim be sure to be careful, and have the
action performed on you so you know what this feels like.

Moving to the wrist.  There are plenty of things to do with the wrists but
for the sake of clarity I wont be discussing these much because placement of
the hands is very important and since I don't have the tools at my disposal
to include photographs, then I wouldn't want anyone to feel secure with just
a text example.  But I will say this: get a friend and try out the rotational
limits of the wrist using one hand and then two.  That's as easy as I can make
it without photos and for the sake of wasted bandwidth. The elbow is a very
self-explanatory structure, limitwise.

The forearm has some rotation from the elbow due to the radial and ulna, but
this is secondary to the lack of real movement that the elbow has.  This makes
it an extremely vulnerable architecture when it does become accessible for a
technique.  This is the problem though, because the elbow tends to stay
behind the weapon that precedes it.  Namely the fist or whatever the fist is
holding. If one was truly skilled at circular motion then it would be no
problem to simply circle around an attack to make the elbow more accessible,
or avert an attack and depend on the attackers over exertion of his own
sphere of influence....his own over extension of his circular motion, which
by the way helps us make another point.

Depending on the attacker to not be in tune with his own natural motion, to be
clumsy and aloof, ignorant of how he moves, can also be a great key in
overcoming an opponent.  Sort of like a buffer overwrite.... get the attacker
to overcommit...when he/she does, then take the advantage.  If you happen to
get this far then personally I wouldn't go for the elbow at this juncture, but
for the purpose of discussion if you get in a bind and you have hold of an
arm, then pull downward violently to shake the opponent, causing a mild shock
to the back of the head where it meets the neck (this actually happens). Do
your best to take advantage in this moment of weakness by turning the arm over
placing another hand on the outside of the elbow pressuring downwards.
Experimentation with this pressure is absolutely necessary for you to feel how
this works.  Also don't place the hand too high or too low... this can cause
the attacker to fold his elbow, opening you up to a vicious counterattack with
one of the body's most powerful weapons.  Interesting that one of the bodies
weakest structures at its opposition, can become one of the strongest weapons
the body has.  As for the shoulder, just move your own shoulder around to its
extremes and you will easily see how its weaknesses can be exploited.

Continuing our discussion of the elbow from above, once the elbow is locked,
hopefully you would have enough forethought to make sure your attacker is
slightly away from you and bent over.  Take this opportunity to jam his
shoulder with plenty of force in the direction of his jaw. This is a neat
little bonus of the straight elbow lock. Also preemptive striking to the
shoulder lessens any force of an incoming blow.  This is what Bruce Lee called
a 'stop hit'.  But this takes flawless timing and is out of context for this
article.

Visiting the neck area we see several options.  The throat provides us with
much soft collapsible mass which can be accessed quite easily, as long as
speed and accuracy are on your side. A quick and powerful jab to the larynx,
either above or below, gains us some time to explore more possibilities in our
defensive posture. We can now become the offensive party if we are successful
here.  Note that also on the sides of the neck exist sternomatocollastoid
muscle structures (for exact placement of these check your Gray's Anatomy
Coloring Book) which give us ample space to access several 'pressure points'
which if manipulated (read SQUEEZED) properly will cause the brain to prompt
the body to lift up on the toes, thereby weakening any effort of your attacker
to strike with any force. I have only met one person completely immune to the
initial pain sequence produced by this technique, and it made for lots of
interesting experimentation, and unfortunately for our immune friend, lots of
bruises as well.  Also within this muscle structure are the carotid arteries.
A well placed strike to the outsides of the neck will seize the muscles up,
causing the blood supply to the brain to be shut off. Contrary to popular
belief, this is how a strike to the temples work as well. To revive from such
a strike requires massage and gentle rotation of the neck structure to return
the muscles to their previous state.

The eyes are an obvious weakness as is the nose, be it from straight on,
upwards, sideways, or even downwards.  The ears are interesting because of
the occasional airtight capabilities.  Have you ever been slapped on the
ear? The air pressure involved with that is tremendous for such a little
canal. Its no small wonder then that partial and often full deafness arises
out of such little force. There are also several pressure points located
beneath the ear which have differing effects, depending on how utilized. There
also exists on the back of the skull at the base where the vertebrae end which
when struck causes yet another shutdown of the brain due to the contraction of
muscles. Don't forget this key clue: where the head goes.... the body follows.

Moving in a downward direction we have the ribs, where nerve fibers weave
in and out between the ribcage members.  This takes practice but finding
these aren't too difficult.  There is a term where nerves are exposed to
the underside of the flesh when running between muscle bundles.  Its called
a cavity, and cavity striking is an acquired skill. Bodybuilders are known
for their extra musculature.  Obviously.  But with this muscularity comes a
nice big weakness which can be exploited by someone with little or no muscle
mass at all.....justice ;).  It seems as though with this extra muscle comes
extra cavity space...i.e., more exposed nerve fiber.  Need I say more on
this?

The floating ribs are susceptible to becoming dislodged from their location,
given the right angle of approach.  The abdominal area is naturally tense and
as well should be, unless trained in advanced deep abdominal conditioning
which has been a protected secret for centuries.  I have seen examples of this
training and it is quite impressive.  No tricks involved.  I can spot a fake
from a thousand miles away.  Real 'Iron Body' practitioners can be struck with
a variety of implements using full force with no damage done.  All this is
done with complete relaxation of the abdominal muscle wall.  But there is a
flaw in even the tensing of the abdominal area.  The muscles that make up this
area are primarily weaved in a direction that naturally opposes force from the
front.  If we introduce a spirryllic action slightly downwards to this mass
then we have exploited the weakness in the weave.

The groin structure is really self explanatory, save for the few fanatical
practitioners of several martial arts who practice for hours a technique
where the testicles are drawn up inside the scrotum.  But these guys are a
dead giveaway, wherein they must stand in a particular posture for this to
happen, exposing other areas to vulnerability.

On the sides and slightly to the back of the thigh belong the sciatic nerves.
Repeated strikes to this area will definitely cause weakness in the legs, and
eventually an inability to stand straight without wavering. The knees, when a
person is standing straight up, are extremely vulnerable to being sheared
downward or to the side... this is very violent and should only be used in a
VERY life threatening situation. When slightly flexed then the knees are
vulnerable from the sides and back. Actually, the knees are ALWAYS weak from
the sides. There exist many pressure points on the thigh, shin and arch of the
foot that I will not address, as these require pinpoint accuracy to administer
to and this is beyond the scope of this treatment, however I will say that I
heard a story of a Special Forces Sergeant who, after being injured in Vietnam
had to walk with a cane, became so adept with the cane that in a particular
barfight all he had to do to subdue his attacker was stomp the cane down on
the arch of the foot, thereby disrupting the intricate pattern of bone and
ligament causing separation of said bone and ligament many times over.
Needless to say, with ZEN-like simplicity, the altercation was over before it
started. With this in mind, when in a bear hug type situation, never fail to
stomp down on the arch of the foot, unless you are suspended in the air.  Then
it is a simple matter of using your head to make your point, while kicking at
the knees or shins.

There are many more areas to address here and I have selectively left much out
because of the damaging nature of the techniques.  I didn't pay too much
attention to the circular nature of the body in the offensive posture because
this is very advanced thought. To sum up this circular theory, think of
spinning a yo-yo around in a circle while the string is fully unwraped from
the axle....  what makes it spin faster?? what opposing forces are involved
here?? and where is the actual fulcrumatic action??  These are clues that if
experimented with to even a slight degree, will give the reader a great
understanding as to how a greater amount of force can be generated by using
the natural endowments of the body.

Greets to the guys in VLAD, GHeap, DrHavoc, prophet, Special Forces then,
now, and forever, and to Thomas Icom.
Mujahadin - the real Desert Storm.

                                    -///-

         FROM CROSSBOWS TO CRYPTOGRAPHY:  TECHNO-THWARTING THE STATE
                              by Chuck Hammill
                             [email protected]

          Given at the Future of Freedom Conference, November 1987
               Public Domain:  Duplicate and Distribute Freely

              You   know,   technology--and   particularly   computer
         technology--has often gotten a bad rap in  Libertarian  cir-
         cles.  We tend to think of Orwell's 1984, or Terry Gilliam's
         Brazil,  or  the  proximity  detectors keeping East Berlin's
         slave/citizens on their own side of the border, or  the  so-
         phisticated  bugging  devices  Nixon used to harass those on
         his "enemies list."  Or, we recognize that for the price  of
         a  ticket  on  the Concorde we can fly at twice the speed of
         sound, but only if we first walk thru a magnetometer run  by
         a  government  policeman, and permit him to paw thru our be-
         longings if it beeps.

              But I think that mind-set is a mistake.   Before  there
         were cattle prods, governments tortured their prisoners with
         clubs  and  rubber  hoses.    Before  there  were lasers for
         eavesdropping, governments used binoculars and  lip-readers.
         Though  government certainly uses technology to oppress, the
         evil lies not in the tools but in the wielder of the tools.

              In fact, technology represents one of the most  promis-
         ing  avenues  available  for  re-capturing our freedoms from
         those who have stolen them.  By its very nature,  it  favors
         the  bright  (who can put it to use) over the dull (who can-
         not).  It favors the adaptable (who are  quick  to  see  the
         merit  of  the  new(  over  the sluggish (who cling to time-
         tested ways).  And what two better words are  there  to  de-
         scribe government bureaucracy than "dull" and "sluggish"?

              One  of  the  clearest,  classic triumphs of technology
         over tyranny I see is  the  invention  of  the  man-portable
         crossbow.   With it, an untrained peasant could now reliably
         and lethally engage a target out to  fifty  meters--even  if
         that  target  were  a mounted, chain-mailed knight.  (Unlike
         the longbow, which, admittedly was more powerful, and  could
         get  off  more shots per unit time, the crossbow required no
         formal training to utilize.   Whereas the  longbow  required
         elaborate  visual,  tactile  and kinesthetic coordination to
         achieve any degree of accuracy, the wielder  of  a  crossbow
         could simply put the weapon to his shoulder, sight along the
         arrow  itself, and be reasonably assured of hitting his tar-
         get.)

              Moreover, since just about  the  only  mounted  knights
         likely  to  visit  your  average peasant would be government
         soldiers and tax collectors, the utility of the  device  was
         plain:    With it, the common rabble could defend themselves
         not only against one another, but against their governmental
         masters.   It was the  medieval  equivalent  of  the  armor-
         piercing  bullet,  and, consequently, kings and priests (the
         medieval equivalent of a  Bureau  of  Alcohol,  Tobacco  and
         Crossbows)  threatened  death  and  excommunication, respec-
         tively, for its unlawful possession.

              Looking at later developments, we  see  how  technology
         like  the  firearm--particularly the repeating rifle and the
         handgun, later followed by the Gatling gun and more advanced
         machine guns--radically altered the balance of interpersonal
         and inter-group power.  Not without reason was the Colt  .45
         called "the equalizer."  A frail dance-hall hostess with one
         in  her  possession  was  now  fully able to protect herself
         against the brawniest roughneck in any saloon.    Advertise-
         ments  for  the period also reflect the merchandising of the
         repeating cartridge  rifle  by  declaring  that  "a  man  on
         horseback,  armed with one of these rifles, simply cannot be
         captured."  And, as long as his captors  were  relying  upon
         flintlocks  or  single-shot rifles, the quote is doubtless a
         true one.

              Updating now to  the  present,  the  public-key  cipher
         (with  a  personal  computer to run it) represents an equiv-
         alent quantum leap--in a defensive weapon.    Not  only  can
         such  a technique be used to protect sensitive data in one's
         own possession, but it can also permit two strangers to  ex-
         change   information   over   an   insecure   communications
         channel--a  wiretapped   phone   line,   for   example,   or
         skywriting, for that matter)--without ever having previously
         met  to  exchange cipher keys.   With a thousand-dollar com-
         puter, you can create a cipher that  a  multi-megabuck  CRAY
         X-MP  can't  crack in a year.  Within a few years, it should
         be economically feasible to similarly encrypt voice communi-
         cations; soon after that, full-color digitized video images.
         Technology will not only have made wiretapping obsolete,  it
         will  have  totally demolished government's control over in-
         formation transfer.

              I'd like to take just a moment to sketch the  mathemat-
         ics  which makes this principle possible.  This algorithm is
         called the RSA algorithm, after Rivest, Shamir, and  Adleman
         who  jointly created it.  Its security derives from the fact
         that, if a very large number is  the  product  of  two  very
         large  primes,  then it is extremely difficult to obtain the
         two prime factors from analysis  of  their  product.    "Ex-
         tremely"  in  the  sense that if primes  p  and  q  have 100
         digits apiece, then their 200-digit product cannot  in  gen-
         eral be factored in less than 100 years by the most powerful
         computer now in existence.

              The  "public" part of the key consists of (1) the prod-
         uct  pq  of the two large primes p and q, and (2)  one  fac-
         tor,  call it  x  , of the product  xy  where  xy = {(p-1) *
         (q-1) + 1}.  The "private" part of the key consists  of  the
         other factor  y.

              Each  block of the text to be encrypted is first turned
         into an integer--either by using ASCII,  or  even  a  simple
         A=01,  B=02,  C=03, ... , Z=26 representation.  This integer
         is then raised to the power  x (modulo pq) and the resulting
         integer is then sent as the encrypted message.  The receiver
         decrypts by taking this integer to the  (secret)  power    y
         (modulo  pq).  It can be shown that this process will always
         yield the original number started with.

              What makes this a groundbreaking development,  and  why
         it  is  called  "public-key"  cryptography,"  is  that I can
         openly publish the product  pq and the number   x   ,  while
         keeping  secret  the number  y  --so that anyone can send me
         an encrypted message, namely
                              x
                            a    (mod pq)  ,
         but only I can recover the original message  a  , by  taking
         what  they  send, raising it to the power  y  and taking the
         result (mod pq).  The risky step (meeting to exchange cipher
         keys) has been eliminated.  So people who may not even trust
         each other enough to want to meet, may  still  reliably  ex-
         change  encrypted  messages--each  party having selected and
         disseminated his own  pq  and his  x  ,   while  maintaining
         the secrecy of his own  y  .

              Another benefit of this scheme is the notion of a "dig-
         ital signature," to enable one to authenticate the source of
         a given message.  Normally, if I want to send you a message,
         I raise my plaintext  a  to your x and take the result  (mod
         your pq)  and send that.

             However,  if in my message, I take the plaintext  a and
         raise it to my (secret) power  y  , take the result  (mod my
         pq), then raise that result to your x   (mod  your  pq)  and
         send this, then even after you have normally "decrypted" the
         message,  it  will still look like garbage.  However, if you
         then raise it to my public power x   , and take  the  result
         (mod  my public pq  ), so you will not only recover the ori-
         ginal plaintext message, but you will know that no one but I
         could have sent it to you (since no one else knows my secret
         y  ).

              And these are the very concerns by the way that are to-
         day tormenting the Soviet Union about the whole question  of
         personal  computers.    On the one hand, they recognize that
         American schoolchildren are right now growing up  with  com-
         puters  as commonplace as sliderules used to be--more so, in
         fact, because there are things computers can do  which  will
         interest  (and instruct) 3- and 4-year-olds.  And it is pre-
         cisely these students who one generation hence will be going
         head-to-head against their Soviet  counterparts.    For  the
         Soviets  to  hold  back might be a suicidal as continuing to
         teach swordsmanship  while  your  adversaries  are  learning
         ballistics.    On  the  other hand, whatever else a personal
         computer may be, it is also an exquisitely efficient copying
         machine--a floppy disk will hold upwards of 50,000 words  of
         text,  and  can  be  copied in a couple of minutes.  If this
         weren't threatening enough, the computer that  performs  the
         copy  can also encrypt the data in a fashion that is all but
         unbreakable.  Remember that in Soviet society  publicly  ac-
         cessible  Xerox  machines are unknown.   (The relatively few
         copying machines in existence  are  controlled  more  inten-
         sively than machine guns are in the United States.)

              Now  the  "conservative" position is that we should not
         sell these computers to the Soviets, because they could  use
         them  in weapons systems.  The "liberal" position is that we
         should sell them, in  the  interests  of  mutual  trade  and
         cooperation--and  anyway,  if  we don't make the sale, there
         will certainly be some other nation willing to.

              For my part, I'm ready to suggest that the  Libertarian
         position should be to give them to the Soviets for free, and
         if  necessary, make them take them . . . and if that doesn't
         work load up an SR-71  Blackbird  and  air  drop  them  over
         Moscow in the middle of the night.  Paid for by private sub-
         scription, of course, not taxation . . . I confess that this
         is not a position that has gained much support among members
         of  the conventional left-right political spectrum, but, af-
         ter all, in the words of one of Illuminatus's characters, we
         are political non-Euclideans:   The shortest distance  to  a
         particular  goal may not look anything like what most people
         would consider a "straight line."    Taking  a  long  enough
         world-view,  it is arguable that breaking the Soviet govern-
         ment monopoly on information transfer could better  lead  to
         the enfeeblement and, indeed, to the ultimate dissolution of
         the Soviet empire than would the production of another dozen
         missiles aimed at Moscow.

              But  there's  the rub:  A "long enough" world view does
         suggest that the evil, the oppressive, the coercive and  the
         simply  stupid  will "get what they deserve," but what's not
         immediately clear is how the rest of  us  can  escape  being
         killed, enslaved, or pauperized in the process.

             When  the  liberals and other collectivists began to at-
         tack freedom, they possessed a reasonably  stable,  healthy,
         functioning economy, and almost unlimited time to proceed to
         hamstring   and   dismantle  it.    A  policy  of  political
         gradualism was at least  conceivable.    But  now,  we  have
         patchwork  crazy-quilt  economy held together by baling wire
         and spit.  The state not only taxes us to  "feed  the  poor"
         while also inducing farmers to slaughter milk cows and drive
         up food prices--it then simultaneously turns around and sub-
         sidizes research into agricultural chemicals designed to in-
         crease  yields of milk from the cows left alive.  Or witness
         the fact that a decline in the price of oil is considered as
         potentially frightening as a comparable increase a few years
         ago.  When the price went up,  we  were  told,  the  economy
         risked  collapse for for want of energy.  The price increase
         was called the "moral equivalent of war" and the Feds  swung
         into  action.    For the first time in American history, the
         speed at which you drive your car to work in the morning be-
         came an issue of Federal concern.   Now, when the  price  of
         oil  drops, again we risk problems, this time because Ameri-
         can oil companies and Third World  basket-case  nations  who
         sell  oil  may  not  be  able to ever pay their debts to our
         grossly over-extended banks.  The suggested panacea is  that
         government  should now re-raise the oil prices that OPEC has
         lowered, via a new oil tax.  Since the government is seeking
         to raise oil prices to about the same extent  as  OPEC  did,
         what  can we call this except the "moral equivalent of civil
         war--the government against its own people?"

              And, classically, in international trade, can you imag-
         ine any entity in the world except  a  government  going  to
         court  claiming  that  a  vendor  was  selling  it goods too
         cheaply and demanding not only that that naughty  vendor  be
         compelled by the court to raise its prices, but also that it
         be punished for the act of lowering them in the first place?

              So  while the statists could afford to take a couple of
         hundred years to trash our  economy  and  our  liberties--we
         certainly  cannot  count  on  having an equivalent period of
         stability in which to reclaim them.   I contend  that  there
         exists  almost  a  "black  hole"  effect in the evolution of
         nation-states just as in the evolution of stars.  Once free-
         dom contracts beyond a certain  minimum  extent,  the  state
         warps  the fabric of the political continuum about itself to
         the degree that subsequent re-emergence of  freedom  becomes
         all but impossible.  A good illustration of this can be seen
         in the area of so-called "welfare" payments.  When those who
         sup  at the public trough outnumber (and thus outvote) those
         whose taxes must replenish the trough,  then  what  possible
         choice has a democracy but to perpetuate and expand the tak-
         ing  from  the few for the unearned benefit of the many?  Go
         down to the nearest "welfare" office, find just  two  people
         on  the dole . . . and recognize that between them they form
         a voting bloc that can forever outvote you on  the  question
         of who owns your life--and the fruits of your life's labor.

              So essentially those who love liberty need an "edge" of
         some  sort  if  we're ultimately going to prevail.  We obvi-
         ously  can't  use  the  altruists'  "other-directedness"  of
         "work,  slave, suffer, sacrifice, so that next generation of
         a billion random strangers can  live  in  a  better  world."
         Recognize  that, however immoral such an appeal might be, it
         is nonetheless an extremely powerful one in today's culture.
         If you can convince  people  to  work  energetically  for  a
         "cause," caring only enough for their personal welfare so as
         to  remain  alive  enough  and  healthy  enough  to continue
         working--then you have a truly massive reservoir  of  energy
         to draw from.  Equally clearly, this is just the sort of ap-
         peal which tautologically cannot be utilized for egoistic or
         libertarian goals.  If I were to stand up before you tonight
         and say something like, "Listen, follow me as I enunciate my
         noble "cause," contribute your money to support the "cause,"
         give  up  your  free  time  to  work for the "cause," strive
         selflessly to bring it about, and then (after you  and  your
         children are dead) maybe your children's children will actu-
         ally  live under egoism"--you'd all think I'd gone mad.  And
         of course you'd be right.  Because the point I'm  trying  to
         make is that libertarianism and/or egoism will be spread if,
         when, and as, individual libertarians and/or egoists find it
         profitable and/or enjoyable to do so.    And  probably  only
         then.

              While I certainly do not disparage the concept of poli-
         tical  action, I don't believe that it is the only, nor even
         necessarily the most cost-effective path  toward  increasing
         freedom  in  our time.  Consider that, for a fraction of the
         investment in time, money and effort I might expend in  try-
         ing  to  convince  the  state to abolish wiretapping and all
         forms of censorship--I can teach every libertarian who's in-
         terested  how  to   use   cryptography   to   abolish   them
         unilaterally.

              There  is  a  maxim--a proverb--generally attributed to
         the Eskimoes, which very likely most Libertarians  have  al-
         ready  heard.    And while you likely would not quarrel with
         the saying, you might well feel that you've heard  it  often
         enough already, and that it has nothing further to teach us,
         and moreover, that maybe you're even tired of hearing it.  I
         shall therefore repeat it now:

              If you give a man a fish, the saying runs, you feed him
         for a day.  But if you teach a man how to fish, you feed him
         for a lifetime.

              Your exposure to the quote was probably in some sort of
         a  "workfare"  vs.  "welfare"  context;  namely, that if you
         genuinely wish to help someone in need, you should teach him
         how to earn his sustenance, not simply how to  beg  for  it.
         And of course this is true, if only because the next time he
         is hungry, there might not be anybody around willing or even
         able to give him a fish, whereas with the information on how
         to fish, he is completely self sufficient.

              But  I  submit  that this exhausts only the first order
         content of the quote, and if there were nothing  further  to
         glean  from  it,  I would have wasted your time by citing it
         again.  After all, it seems to have almost a crypto-altruist
         slant, as though to imply that we should structure  our  ac-
         tivities  so  as  to  maximize  the  benefits to such hungry
         beggars as we may encounter.

              But consider:

              Suppose this Eskimo doesn't know how to  fish,  but  he
         does  know  how  to hunt walruses.   You, on the other hand,
         have often gone hungry while traveling thru  walrus  country
         because  you  had  no idea how to catch the damn things, and
         they ate most of the fish you could catch.  And now  suppose
         the  two  of  you  decide to exchange information, bartering
         fishing knowledge for hunting knowledge.   Well,  the  first
         thing  to  observe  is  that  a  transaction  of  this  type
         categorically and unambiguously refutes the Marxist  premise
         that  every  trade  must  have a "winner" and a "loser;" the
         idea that if one person gains, it must necessarily be at the
         "expense" of another person who loses.  Clearly, under  this
         scenario, such is not the case.  Each party has gained some-
         thing  he  did  not have before, and neither has been dimin-
         ished in any way.  When it comes to exchange of  information
         (rather  than material objects) life is no longer a zero-sum
         game.  This is an extremely powerful notion.   The  "law  of
         diminishing   returns,"   the  "first  and  second  laws  of
         thermodynamics"--all those "laws" which constrain our possi-
         bilities in other contexts--no longer bind us!   Now  that's
         anarchy!

              Or  consider  another possibility:  Suppose this hungry
         Eskimo never learned  to  fish  because  the  ruler  of  his
         nation-state    had  decreed fishing illegal.   Because fish
         contain dangerous tiny bones, and sometimes sharp spines, he
         tells us, the state has decreed that their  consumption--and
         even  their  possession--are  too  hazardous to the people's
         health to be permitted . . . even by knowledgeable,  willing
         adults.   Perhaps it is because citizens' bodies are thought
         to be government property, and therefore it is the  function
         of the state to punish those who improperly care for govern-
         ment  property.    Or perhaps it is because the state gener-
         ously extends to competent adults the "benefits" it provides
         to children and to the mentally ill:  namely,  a  full-time,
         all-pervasive supervisory conservatorship--so that they need
         not  trouble  themselves  with making choices about behavior
         thought physically risky or morally "naughty."  But, in  any
         case,  you  stare stupefied, while your Eskimo informant re-
         lates how this law is taken so seriously that  a  friend  of
         his was recently imprisoned for years for the crime of "pos-
         session of nine ounces of trout with intent to distribute."

              Now  you  may  conclude  that  a society so grotesquely
         oppressive as to enforce a law of this  type  is  simply  an
         affront to the dignity of all human beings.  You may go far-
         ther  and  decide to commit some portion of your discretion-
         ary, recreational time specifically to the task of thwarting
         this tyrant's goal.  (Your rationale may be "altruistic"  in
         the   sense   of  wanting  to  liberate  the  oppressed,  or
         "egoistic" in the sense of  proving  you  can  outsmart  the
         oppressor--or  very likely some combination of these or per-
         haps even other motives.)

              But, since you have zero desire to become a  martyr  to
         your "cause," you're not about to mount a military campaign,
         or  even try to run a boatload of fish through the blockade.
         However, it is here that technology--and in  particular  in-
         formation technology--can multiply your efficacy literally a
         hundredfold.    I say "literally," because for a fraction of
         the effort (and virtually none of  the  risk)  attendant  to
         smuggling in a hundred fish, you can quite readily produce a
         hundred  Xerox copies of fishing instructions.  (If the tar-
         geted government, like present-day America, at least permits
         open  discussion  of  topics  whose  implementation  is  re-
         stricted,  then that should suffice.  But, if the government
         attempts to suppress the flow of information as  well,  then
         you will have to take a little more effort and perhaps write
         your  fishing manual on a floppy disk encrypted according to
         your mythical Eskimo's public-key parameters.  But as far as
         increasing real-world access to fish you have  made  genuine
         nonzero  headway--which  may  continue to snowball as others
         re-disseminate the information you have provided.   And  you
         have not had to waste any of your time trying to convert id-
         eological  adversaries, or even trying to win over the unde-
         cided.  Recall Harry Browne's dictum  from  "Freedom  in  an
         Unfree World" that the success of any endeavor is in general
         inversely proportional to the number of people whose persua-
         sion is necessary to its fulfilment.

              If  you  look  at  history, you cannot deny that it has
         been dramatically shaped by men with names like  Washington,
         Lincoln,  .  .  .  Nixon  .  . . Marcos . . . Duvalier . . .
         Khadaffi . . .  and their ilk.  But it has also been  shaped
         by  people with names like Edison, Curie, Marconi, Tesla and
         Wozniak.  And this latter shaping has been at least as  per-
         vasive, and not nearly so bloody.

              And  that's  where  I'm  trying  to  take The LiberTech
         Project.  Rather than beseeching the state to please not en-
         slave, plunder or constrain us, I propose a libertarian net-
         work spreading  the  technologies  by  which  we  may  seize
         freedom for ourselves.

              But here we must be a bit careful.  While it is not (at
         present)  illegal  to  encrypt  information  when government
         wants to spy on you, there is no guarantee of what  the  fu-
         ture  may hold.  There have been bills introduced, for exam-
         ple, which would have made it a crime  to  wear  body  armor
         when government wants to shoot you.  That is, if you were to
         commit certain crimes while wearing a Kevlar vest, then that
         fact  would  constitute a separate federal crime of its own.
         This law to my knowledge has not passed . . . yet . . .  but
         it does indicate how government thinks.

              Other  technological  applications,  however, do indeed
         pose legal risks.  We recognize, for  example,  that  anyone
         who  helped a pre-Civil War slave escape on the "underground
         railroad" was making a clearly illegal use of technology--as
         the sovereign government of the United States of America  at
         that time found the buying and selling of human beings quite
         as  acceptable  as  the buying and selling of cattle.  Simi-
         larly, during Prohibition, anyone who used  his  bathtub  to
         ferment  yeast and sugar into the illegal psychoactive drug,
         alcohol--the controlled substance, wine--was using  technol-
         ogy  in a way that could get him shot dead by federal agents
         for his "crime"--unfortunately not to be  restored  to  life
         when  Congress  reversed itself and re-permitted use of this
         drug.

              So . . . to quote a former President,  un-indicted  co-
         conspirator  and pardoned felon . . . "Let me make one thing
         perfectly clear:"  The LiberTech Project does not  advocate,
         participate  in, or conspire in the violation of any law--no
         matter how oppressive,  unconstitutional  or  simply  stupid
         such  law may be.  It does engage in description (for educa-
         tional and informational  purposes  only)  of  technological
         processes,  and some of these processes (like flying a plane
         or manufacturing a firearm) may well require appropriate li-
         censing to perform legally.    Fortunately,  no  license  is
         needed  for  the  distribution or receipt of information it-
         self.

              So, the next time you look at the political  scene  and
         despair,  thinking,  "Well,  if 51% of the nation and 51% of
         this State, and 51% of this city have  to  turn  Libertarian
         before  I'll  be  free,  then  somebody might as well cut my
         goddamn throat now, and put me out of my  misery"--recognize
         that  such  is not the case.  There exist ways to make your-
         self free.

              If you wish to explore such techniques via the Project,
         you are welcome to give me your name and address--or a  fake
         name  and  mail  drop, for that matter--and you'll go on the
         mailing list for my erratically-published newsletter.    Any
         friends  or acquaintances whom you think would be interested
         are welcome as well.  I'm not even asking for stamped  self-
         addressed envelopes, since my printer can handle mailing la-
         bels and actual postage costs are down in the noise compared
         with  the  other  efforts  in getting an issue out.   If you
         should have an idea to share, or even a  useful  product  to
         plug,  I'll be glad to have you write it up for publication.
         Even if you want to be the proverbial "free rider" and  just
         benefit  from  what others contribute--you're still welcome:
         Everything will be public domain; feel free to  copy  it  or
         give it away (or sell it, for that matter, 'cause if you can
         get  money  for  it while I'm taking full-page ads trying to
         give it away, you're certainly entitled to  your  capitalist
         profit . . .)  Anyway, every application of these principles
         should make the world just a little freer, and I'm certainly
         willing to underwrite that, at least for the forseeable  fu-
         ture.

              I  will leave you with one final thought:  If you don't
         learn how to beat your plowshares into  swords  before  they
         outlaw  swords,  then you sure as HELL ought to learn before
         they outlaw plowshares too.

                                                      --Chuck Hammill

                                                THE LIBERTECH PROJECT

                                    -///-

                   �������������������������������������Ŀ
                   � Vesoft and the Hewlett Packard 3000 �
                   �            by Black IC              �
                   ���������������������������������������

       There have been numerous articles written about the Hewlett Packard
3000 and how to break the system.  This write up does not deal solely with
the HP3000 but with the addon for tighter security by the VESOFT corporation.

       As time goes on and people begin to see the need for better security
and a more productive system, it's becoming harder to exploit any weakness
that could be on said system.  That's where VESOFT comes in.

VESOFT
1135 S. Beverly Dr.
Los Angeles, CA
90035-1119

(310) 282-0420
(310) 785-9566 (Fax)

       They have been supporting Hewlett Packards since 1980 with excellent
addons for the HP3000. In the following paragraphs I discuss the various
utilites that VESOFT employs and what you might expect on a VESOFT secured
system.

                            �����������Ŀ
                            � MPEX 3000 �
                            �������������

       The MPEX addon emulates and implements virtually all of the MPE/iX
user interface features (variables, command files, implied :RUN, :CALC,
:COPY, :PRINT, etc) on MPE/V.  Not only does this add a lot of power to the
MPE/V system, but it also lets you use the same job streams on MPE/V and on
the MPE/iX (If the owner of the Hewlett Packard has both setups!)

       So initially you wont see a difference with the target system.  Also
if the system has VESOFT installed and not on the other systems their,
that's not an issue right now cause if you are experienced with the 3000
series and the likes you will be able to navigate with out a problem.

                           ���������������Ŀ
                           � VE AUDIT 3000 �
                           �����������������

       The Audit program from VESOFT is a resecurement utility very similar
to the SATAN program for UNIX.  The purpose of VE AUDIT is to check the
system for loopholes and to assist the Manager/System Administrator in
resecuring the system.  VE AUDIT takes the laborous job of checking accounts
(LISTACCT), users (LISTUSER), and groups (LISTGROUP) to see who has what
access, capabilities, no passwords, etc.  The program goes through everything
and then reports to manager what loopholes (if any) are found and what is the
suggested step to resecure that system.  This program can also be used to
alter the system accounting structure as well as look at it with a new set
of commands.

       The program is run when you set the attributes (password, capability,
access mask).  List them in one or two line object format. Create an MPEX
command file that will rebuild the accounting structure when the program is
executed.  Purge them after prompting.

       As you can see this program will assist the manager/system
administrator in an easy to use manner and allows the system security to be
tightened in a way that was not as easy on the standard HP3000.

                           ���������������Ŀ
                           � SECURITY 3000 �
                           �����������������

       The VESOFT security program works in several ways to secure the
Hewlett Packard system.  Most HP3000 systems will allow users to log on to
the system using a non-unique name and generic session name with a session
password (i.e. JOE.PAYROLL as opposed to JOE,CLERK.PAYROLL).  The VESOFT
program will no matter what format the system uses to establish identity
allow the use of a session name and a password for that individual, thus
increasing the security 10-fold. It will also eliminate the annoying habit of
users omitting the session name since the MPE operating system considers it
optional.

       Changing of passwords become manditory through the security program.
Saving the account manger time by having a set time period for the users
to change their passwords (i.e. every 30 days or as set).

       Some HP3000 systems when accessed give the user access to the MPE
prompt ":" which most users don't need access to all the commands. VESOFT now
sets up a menu of options which allows the user to use the given choices
and nothing else.

       If the system has dial-ups the security program allows passwords on
a terminal by terminal basis thus adding in a second password to protect the
system. Thus anyone calling up not only has to get past the dial-up sequence
but they also have to log in to the system as if they were at the console.

       If the system is run on networks then the program will synchronize the
network and allow file transfers with out actually logging into the
receiving system. Users will also have to login to a system at a different
terminal just as if they were at that console.

       Embedded passwords are probably one of the biggest threats to HP3000
systems along with shared passwords and passwords that have not been changed
in a long time. It then is easier for someone to access the system seeing as
it will be easier to figure out. Once a password has become embed the ability
to change it in a job stream is very hard and time consuming. The security
program comes with what is called the "STREAMX" module which will do all the
handy work for the account manager.

       Logoff now has a built in timer so those users that are idle or leave
the system unattended for a given amount of time will automatically be logged
off and the integrity of the system brought back to normal.

       This covers the basics of the VESOFT programs.  As you can see any
entry into an HP3000 using VESOFT will not react as usual and the
accessibility has been changed to that of seriously protected.  I'll save the
coverage of surveillance social engineering and dumpster diving for others.
What I will say is you need to have a firm grasp of the target system and its
users.

                              ������������Ŀ
                              �  DEFAULTS  �
                              ��������������

       The following is a list of some of the defaults in the Hewlett Packard
MPEX System used on the 3000 and the likes. Keep in mind that a resecured
system is going to have the defaults removed and replaced with a tighter
setup.  Remote login maintenance has been a pride and joy of Hewlett packard
owners.  It is also one of the most exploited in terms of malicious entry.
With the VESOFT programs properly installed the usual one password entry
for remote will now be two.  The default accounts are almost always open if
they still exist.  Aside from "dumpster diving" you should consider social
engineering names and as much info as possible about the system you are
attempting to get in on, just incase you are asked for a password.  Sometimes
you will come across a system that uses the "terminal password" at login.
This is an old option and thus being an option does not have any defaults.


operator.cognos                 mgr.hpword              field.hpword
manager.hpoffice                mgr.hpoffice            wp.hpoffice
spoolman.hpoffice               mailman.hpoffice        advmail.hpoffice
mail.hpoffice                   field.support           operator.support
operator.sys                    rsbcmon.sys             pcuser.sys
operator.system                 operator.disc           mgr.xlserver
manager.itf3000                 sys.telesup             manager.security
mgr.conv                        mgr.rje                 mgr.hpp187
mgr.hpp189                      mgr.hpp196              field.hpp187
mgr.intx3                       mgr.carolian            manager.tch
mgr.word                        mgr.telesup             field.service
operator.disc                   mgr.ccc                 field.hpunsup
field.hp                        mgr.hpp189              mgr.hpp196
mail.mail                       mail.netbase            mgr.rego
mgr.rje                         mgr.robelle             mgr.cnas
mgr.hpdesk                      mgr.robelle             mgr.vesoft


       I hope this write up will provoke more interest in the Hewlett Packard
systems namely the HP3000.  If you have any comments or wish to discuss these
systems more indepth please feel free to contact me at the following e-mail
address:

[email protected]

Hope to hear from some of you.

Black IC/IIRG

                                 ---/////---

Unless otherwise noted Cybertek Electric is Copyright (C)1996 by
OCL/Magnitude, P.O. Box 64, Brewster, NY 10509. All Rights Reserved.
Noncommercial reproduction is encouraged provided this electronic publication
is redistributed in its entirety with credits intact. Cybertek Electric is
published for educational purposes only; under The First Amendment of The
United States Constitution. No illegal use is implied or suggested. If you
have a problem with this, too fucking bad. SUBMISSIONS WANTED. If you can read
and understand this e-zine then you should know what we're interested in.
Please send any feedback, questions, and/or submissions to either of the email
addresses in the signature below.


  |\  /|  /\    /   |\  |                    Thomas Icom/IIRG
  | >< | <  >  /    | \ |\                The Blackthorn Project
  |/  \|  \/  <     |   | >       <[email protected]> <[email protected]>
  |    |  /\   \  \ |   |/       International Information Retrieval Guild
  |    | /  \   \  \|   |                "May Odin guide your way!"
          Madhr er manna gaman, ok moldar auki, ok skipa skreytir.

<End of Text>