--------------------------------------------------------- A Beginner's Guide To The Computer Underground Written By Pazuzu 24-Mar-1993 at 13:30 in Long Beach, CA --------------------------------------------------------- FOREWORD: I, nor any SysOp or User of ANY BBS on which this file appears are in any way liable for any damages caused by use of information or ideas contained in this file. This file serves only to describe and introduce the Computer Underground as I myself view it, not to encourage illegal activity of any kind. INTRODUCTION: The intended audience of this file is someone who has been modeming for a while, and who has through some means discovered that there exists a Computer Underground, and who wishes to learn more about said Underground, and perhaps become a member of same. If this does not fit you, please destroy all on-disk (or tape) and hardcopies of this file and go about your happy life as if you never heard of it. But, if this does fit you, read on! UNDERGROUND DIVISIONS --------------------- The Computer Underground is basically (although quite loosely) divided into five main branches and one minor branch. I say loosely because there is much crossover between the branches. The branches are (in no particular order): 1. Phreaks - May also be referred to as "phreakers", etc. These people deal with the telephone grid. They want to learn all they can about how it works, and how they can control it, which often leads to making telephone calls for free (which is of course illegal). Often groups of Phreakers will band together and form an organized group, and publish articles on the subject. 2. Hackers - These are the people who love computer systems (and networks) and who love to find out how they work, how to get into them, etc. A TRUE Hacker is not the malicious scum that the Media and Hollywood would have you believe, he is just someone who loves computers and computer networks. There's nothing wrong with logging into someone's computer, so long as you don't go deleting files or stealing trade secrets. NOTE: Hackers and Phreakers are very often combined into one group, referred to as h/p or p/h (for "phreak/hack"). 3. Carders - These people are admittedly criminals. They use credit card numbers, checks, checking account numbers, whatever, fraudulently to obtain whatever they want for free. However, this isn't as bad as the media wants you to think... You are NOT LIABLE for charges made on your CC account that you didn't authorize, so the bank has to eat it, and that's why they have insurance... 4. Anarchists - In the sense it's used in the Computer Underground, an Anarchist is someone who loves to play with fire, explosives, etc. This is not all bad either... Who cares if someone makes an explosion out in the desert just to see what will happen? 5. Warez - Although I have never been a real supporter of warez people (in fact, I have fought bitter wars over BBSs with them for years) they DO serve a needed function in the underground: They distribute software. They are pirates. Most warez are distributed by warez groups which exist for the sole purpose of getting the software out to BBSs before the other group gets that same program out. 6. Virus/Trojan Dudes (for lack of a better term): These people are usually programmers (although not always) who are interested in how viruses and trojan horses work and how to make them more efficient. For those who don't know, a virus replicates itself and waits around before doing anything harmful. The program which simply formats your hard drive upon execution IS NOT A VIRUS, it is a trojan horse. This is the "minor" branch I spoke of earlier. With that out of the way, I must restate that these divisions may not always be very clear or noticeable. It is very common to see a BBS with stuff from all of them on it (mine is one such system). I just wanted to detail all the various activities which comprise the Underground. I mentioned in several of the above descriptions that groups of like minded modemers often get together and form an organized Group and publish Magazines (electronically, as files on BBSs), or distribute warez. Some of the most famous Groups (some are LOOOONNNGGG gone) are: LOD (Legion of Doom), CHiNA (Communist Hackers in North America), CuD (Computer Underground Digest), Phrack, P/HUN (Phreakers/Hackers Underground Network) - p/h groups; THG (The Humble Guys), INC (Inter national Network of Crackers), the FiRM (First in Releasing Most) - warez groups. Of course, there are/were MANY more, these are just the most common ones you'll see being referred to. TERMINOLOGY ----------- Many new Undergrounders have trouble figuring out all the terminology used and are of course afraid to make a post asking for help for fear of looking lame, so I'll help with a simple list... [A] General Underground Terminology Data: This is the handle of someone who used to be a modemer. He is now a worm feast (corpse). He basically pissed off too many people by being a lame asshole dick, and got KILLED. His real name was Stuart Tay, I'm sure you've heard of him. This term is really great, and has SO, SO many uses... "He's a Data" ... "He pulled a Data" ... etc etc etc Lamer: This is someone who claims to be knowledgeable/active in some area of the underground, but in fact knows/does nothing. An example would be a 2400bps user claiming to be a great warez courier. Leech: This is someone who calls BBSs and just downloads everything in sight without contributing anything (or uploading garbage just to get credits). [B] Phreaking/Hacking Terminology (NOT in *ANY* order) Rebecca Bigley/Bitchley: The former chief of security at TheftyTel, a California private LD service provider. A famed Hacker Hunter and bitch from hell. Extender: This is an important phreaking term. It refers to the number you call when accessing a Long Distance Carrier's service. An example is 950-1493, which is ThriftyTel's Extender. ANI: Stands for Automatic Number Identification. If you call a telephone number that has ANI, your number (and sometimes address) shows up on a console at their location (or is logged to a printer, disk file, etc). This is bad, since most private long distance carriers use it to see who is calling their extenders. ESS: Stands for Electronic Switching System. It is the system most Bell Organizations use to switch calls. It is what makes horrors like ANI possible. Gestapo: This is used to refer to any security/law enforcement agency. Its meaning should be obvious... SS: Stands for Secret Service. Any similarities between "SS" being used to refer to the Secret Service and the "SS" of Nazi Germany during World War II is by no means co-incidental, believe me. CNA: This acronym stands for Customer Name/Address (also could be CNL - Customer Name/Location). Basically, if you have the CNA dialup for an area code, and someone's fone number in that area code, you can call the CNA dialup and give their fone number, and get their name and address. This is not as easy as it sounds since some CNA dialups require talking to an operator, which may be suspicious of you, plus you need the code. Some CNAs are automated where you call and enter the number on a fone keypad, then the code. Some you call with your modem. COSMOS: The fone company's operating system. NPA: Stands for Numeral Prefix Allocation. An area code in layman's terms. Code Hacker: A program which repeatedly dials an extender, trying different codes, and logging which ones are valid. This is the main method which most phreaks use to get their fone calls. Telenet: This is a large network of computers. You call a Telenet dialup, then if you know a machine's NUA (its address), you type it in, and connect. This is good because there are Telenet dialups local to everywhere, and then you can connect to computers on the network no matter where they are. Other networks like Telenet include Tymnet and the Internet (the largest network on earth, a network of networks, really). [C] Carding/Scamming/Etc Terminology CBI: This is a multi-use acronym which stands for Credit Bureau Information. It is used to refer to: [1] the information given by a credit reporting agency [2] the concept itself [3] a code used to access such a service [4] it is also used by one such reporting agency (namely Equifax) to refer to itself. Basically, if you have a CBI access code (normally just called "a CBI"), you can call a CBI dialup, enter the code, someone's name and address (or their Social Security Number), and you will get all credit info on them, including account numbers. This is quite useful as I'm sure you can see. Drop Site: This is where the carder would have the carded merchandise sent to, since only a Data would send the shit to his own house. [D] Warez Terminology Cracker: This is the person who actually breaks the copy protection on a piece of software. This often involves using hex editors, etc., and is quite difficult. Courier: This is a person whose sole job is to upload the cracked warez to as many BBSs as possible so as to distribute the software as widely as possible. This is most of the terminology you will see popping up in message bases and text files. I haven't (by any means) covered all of the terms out there, but these are some of the most common, and should help you greatly. If there are any you can't figure out, send me email (you can find me, I'm everywhere), and I'll help, and will probably add it to the next version of this file. ------------ ABOUT MYSELF ------------ Before I get to the next section (which will detail techniques for doing these various Underground activities), I'd like to tell you a bit about my experience. I started screwing with computers when I was only 10. My grandmother gave me a Commodore 64 for Christmas (note: this was 12 years ago). I started fucking with BASIC, and decided it sucked penii, so I learned 6502 Assembler. About five, maybe six years after that, I got an Amiga, and then learned C. I had also got a modem, and you KNOW what that led to. Shortly after (like 2-3 years), I got my first IBM Clone and started really "undergrounding it". In late 1989, my BBS went up for the first time, then called Motel 666. By the time April 1990 rolled around, the Motel, and two other BBSs (The Drop Site and Louder Than Bombs) were probably the most active p/h systems in the Southern California area (and some might say the country...). My BBS has been up and down many times since then, due to forced sales of my computers, but the BBS is here to stay now, since this computer was paid for legit, with cash. So, what all this means, is that when I talk about this stuff, I speak from experience. I've done all this stuff. And if I'm not too experienced in a certain area, I'll say so. My reason for doing this is to revive the Underground to its former glory by creating interest in it among newcomers, in the hopes that they'll spread it, and it'll grow and become the Underground it used to be. ---------- TECHNIQUES ---------- NOTE: EVERYTHING DESCRIBED IN THIS SECTION IS UTTERLY AND TOTALLY AGAINST THE LAW AND IF YOU GET CAUGHT YOU WILL GO TO JAIL. THE AUTHOR OF THIS FILE ASSUMES NO RESPONSIBILITY FOR ANYTHING THAT HAPPENS BECAUSE OF THIS INFORMATION. IT IS JUST HERE FOR EDUCATIONAL PURPOSES ONLY. YOU HAVE BEEN WARNED. I. Phreaking Techniques Anyway, so you're a new phreak, and you wanna commit your first phraud. Well, if this were the late seventies/early eighties, I'd tell you to get a blue box, and blue box away. A blue box is a device capable of making the tones which telco operators use to control the phone system. However, since this is 1993, I'll tell you DO NOT BLUE BOX! They WILL catch you and you WILL go to jail. Unless you are fond of anal sex with niggers possessing 23 inch penises, take my advice and don't blue box. A much safer (although still dangerous) way to call for phree is by using codes. Start by getting yourself a code hacking program (my favorite is P-Hack, another popular one is Code Thief) from a p/h BBS. Set it up for the extender you are hacking (try 9501493 if you live in Southern California). You'll need to know the phone number for the extender, the dialing order, and the number of digits they use in their codes. You also need a list of modem numbers that will never be busy, but most code hackers come with a list of Telenet dialups built right in, so you almost never have to worry about it. See, the way this works is the program figures out a code to try, calls the extender, enters the code, then the modem number, and if there's a carrier, the code is valid. You need to know the dialing order since some LD companies have you dial the phone number first, then the code. You also need to figure out a template to hack on, which most programs allow you to enter as a series of digits with X's in it. Any digits will be used verbatim, and an X means "any digit". For example, if your template was 1X1XXX, the code hacker will randomly generate codes with a "1" as the first and third digits. Also, most hackers will allow you to enter an amount of time to delay between hack attempts, and it is very important to use this feature if the hacker you are using supports it because some hacker busting procedures use the number of times a number is called within a certain period to decide if something is shady. I always use 1 minute and 30 seconds as my delay, and I've never been caught. It is also a good idea to be hacking several extenders at once if your hacker supports it. Let the thing fly, go to bed, and when you wake up, the Code Fairy should have left you a nice little present (or several!). NOTE: I did not go through the details of setting the hacker up to work with your modem, since I assume you can handle such a task. Ok, so now you've hacked some codes, and you're ready to use them. Well, go to a pay phone, dial the extender, wait for a tone, enter the code (this assumes code-first dialing, of course), wait for another tone, then enter the area code and phone number you are calling, and you have just made a call FOR FREE! NOTE: You must ALWAYS use the area code, even if it's the one you're in. You can also use this to call out-of-state BBSs for free, and it's especially easy with Telix... You just make the phone number in your dialing directory "!,,,@,,7146469180" (for example, substitute the number of the BBS you want to call), and then set up the long distance codes in Telix... Set "!" to the extender, and "@" to the code, and you're set. Wow! Now you've been using codes for awhile, saving all kind of cash on fone calls, but, "Is this all?" you ask... Well, NO!, it's not. There's another fun thing called a Beige Box (I didn't put this in the terminology section because I planned to detail it here anyway). A TRUE beige box is really a Telephone Lineman's handset, they cost around a thousand bucks. However, anything you can use to clip onto a phone line and dial a call can be termed a beige box. Here's how to make one... Go to Radio Shaft, and get their real cheap one-piece fone, the one that's just basically a fone handset, with a modular cord coming out of it, and ending in a standard modular plug. They're on sale all the time for $14.95, and they only cost $19.95 when they're not on sale, and they can save you thousands, so it's well worth it. While at Radio Shaft, pick up some alligator clips also. Cut the modular plug off the fone, then solder an alligator clip on to each wire, and try to match the colors, black and red. You now have a fully functional beige box. Now go find a phone terminal box. There's one on every house, and apartment building in the world. Also, if you live near South Coast Plaza in Orange County (California), the service corridors are filled with open, exposed phone terminal boxes. To get, in just come out of Sears on the top level, hang a left, and just before you get to Birraporetti's, there's a door marked "Authorized Personnel Only", or some such bullshit. Simply open that door, and walk in like you know what you're doing and no-one will care. Clip one alligator clip onto each terminal for the line (there are two per phone line, usually one right next to the other). Then listen for a dial tone. If you get a dial tone, you're set! If not, either the line is dead, your beige box is busted, you soldered the clips wrong, or the phone box is weird. Anyway, if you get tone, dial away, and if you get tone but the thing won't dial, reverse the clips and try again, also making sure the phone is set to dial tone. You are now a successful beige boxer. There is also a variation on the beige box that some people will call a "beagan box". I call it a "beige box with a real long cord", since that's what it really is. A word of caution, though: While we phreakers call this "beige boxing", the law likes to call it "wire tapping", which also happens to be a felony, so please don't get caught. WORD OF CAUTION #2: I have seen some files on "began boxing" that tell you to clip onto your neighbor's line, then run one to your house and call away. This is a bad idea, and could get you shot full of holes, or thrown in prison. Don't do it. There are many other ways to phreak (PBXs, PCP hacking, etc), but these are the two most basic and will save you thousands on your phone bill, especially after you get established in the underground, and start calling BBSs in multiple states, even multiple countries. And anyway, I've never had to mess with any other methods, so I don't think you will either, unless you just want to for the hell of it, which is fine. II. Hacking Techniques Now we move onto hacking: obtaining illegal access to someone else's computer system. In the past, any beginner's hacking file would tell you to start with Telenet, since Telenet used to be full of really low-security systems that any five year old could hack into. Now, most of the systems on Telenet are so secure (since every hacker in the world already hacked them), that you probably couldn't hack into them with an axe. So, if you want to fuck with Telenet (and it's fine if you do, I still do now-and-then as well), get Dr. Dissector's NUA Attacker (an NUA is basically the node number of a machine on Telenet), read the docs, and go for it. The way I'm going to tell you to start hacking should be much easier as well as safer. It's called Carrier Scanning. What you do is get a Carrier Scanning program (there are MANY...), and tell it what NPA and Exchange (area code and prefix, for laymen) you want to scan, and go to sleep. What it will do is call every number in the exchange, and log which ones answered with a carrier. Then, you just check the log, and see which ones look cool. A good way to find a good exchange to scan is to find one that's in a Big Business district, or one where a large University is. All Universities have big computer systems, and most have modems. So now you have a list of carriers in some exchange, and you want to hack. You'll need to know a bit about operating systems, since once you get in, if you don't know the OS the machine it running, you can't do much of anything. The most common (and fun) operating system you'll find on-line is of course Unix. Unix is a great OS (I run it at home), and, if set up wrong, is easier to hack than a paper bag. You'll recognize a Unix system by the distinctive "login:" or "Login:" prompt. Sometime, you'll connect to a tty (a tty in Unix is the line on the host that the modem or terminal is connected to) where someone didn't log out, they just hung up. This is great, and you'll know you've hit it when you connect and instead of a login prompt, you get a shell prompt, which is either "#", "$", or "%", depending on who was logged in. Everyone who logs into a Unix system must have a login name and password, and the OS itself defines several default "special" accounts. The most important account on a Unix is "root". Every system will have root, and anyone who can login as root can do ANYTHING, ANYTHING, they want to the system, because root is the "super-user", the one account that can do EVERYTHING. When logged in as root, the shell prompt will be "#", otherwise (usually), it will be "%" or "$". Other common accounts are guest, bin, admin, and mmdf. There are many others. Anyway, once you get in, Unix is fairly simple to use. The directory structure is a tree, just like dos, except unix uses "/" instead of "\" to separate subdirectories. To get a list of files, type "ls" or "ls -l". To see what directory you're in, type "pwd". cd will change directories, just like dos. REMEMBER, Unix is case-sensitive, unlike dos, and most (basically ALL) unix commands are lower-case. If you use "ls -l", you'll notice there's three groups of three characters each in front of the file name. These are the file permissions, which tell whether certain users can read, write, or execute the file in question. If there's an 'x' in the third group (for example "rwxr-xr-x"), and you're not logged in as root, you can execute the file (unix doesn't use an .exe extension or anything like dos does, it uses the permissions to determine if a file is an executable). If logged in as root, it doesn't matter, you can do it anyway, no matter what, IF there's an 'x' anywhere in the groups. So, just screw around with executable files and have fun. This is by no means a complete hacking guide, as there are many more operating systems besides unix (VMS for example, which will give you a "Username:" prompt on connection), other ways to get to the systems (through telenet, tymnet, the Internet, etc), and so on and so forth. But, this should get you started, and there are many other files out there that can help you also. When in doubt, try typing "help" or "man". A lot of systems have online help... Also, if you connect to a system, and nothing happens (i.e., no prompt), try hitting return a few times, or changing the comm parameters (usually 7-e-1 will work), or sending a BREAK signal (CTRL-END in Telix). III. Carding/Scamming/Etc Techniques NOTE: THIS SECTION DESCRIBES ACTIVITIES WHICH ARE VERY VERY VERY ILLEGAL, AND IF YOU GET CAUGHT REALLY BAD THINGS WILL HAPPEN. THEREFORE THE AUTHOR REALLY ASSUMES NO RESPONSIBILITY SHOULD ANY UNPLEASANT THINGS HAPPEN IF YOU DO ANY OF THIS SHIT. BE CAREFUL. YOU HAVE BEEN WARNED. Carding (a term a lot of people will use to describe not only actual carding, but also checking, PO fraud, etc, etc), is the one Underground activity that can really save you a lot of money, but can also get you thrown in prison really fast, so, when I mention a safety technique, be sure to follow it, since I haven't been caught and have been really careful every step of the way. To get started in your scamming career, I'm going to recommend you pull a very simple scam that may seem piddly-ass at first, but will help you discover one thing: whether you can handle being a carder/scammer/whatever you wanna call it. The scam is very simple: You get a Columbia House (or BMG) ad from a magazine, order as many CD's as they'll send you without sending money first, and then never pay. I have over 300 CD's in my collection, and the only ones I paid for (only about 20) were ones they didn't have. The key here is to use a BOGUS name, not your own. Sending it to your own house is fine (the first time anyway, not after), but NEVER use your own name. This will save your ass. "Must be a practical joke", you'll tell them. After the first time you do it, if you're going to do it again, use a different address (but one where you can pick them up at), and a different name. Well, now you've stole 3,000 CD's from Columbia House, and you haven't killed yourself from the guilt, what's next? Well, I'm going to describe Traditional Carding because it was actually the first scam I ever did. I don't do it anymore, because it's hard to find a good vendor who'll take cards without a DNA sample or some bullshit, plus it's real dangerous now that everyone's caught on, but several people here in my area claim to be still doing it with great success. Traditional Carding used to be the stock way everyone got their HST's when they first came out and were over $1200, but now, anyone who sells computer stuff knows that COMPUTER MERCHANDISE+A CREDIT SALE = FRAUD so they want all kind of info before they'll send anything. This is ridiculous since if they knew anything, they'd know that the approval code means they'll get paid regardless if it's fraud or not. The credit company may try to screw them but the law says APPROVAL=THEY GET PAID. They just have to fight a bit to get the money. ANYWAY, just because you can't get computer stuff doesn't mean you can't get all kind of other stuff, sell it, and buy that 3gig hard drive you've cumming over. Ok, so here goes... You'll need several things for Traditional Carding: [a] A Drop Site, [b] A CC account - WITH FULL INFO, and [c] a vendor who will not require a DNA sample, blood, or some other bullshit before they'll send the merchandise. [a] - The Drop Site - First off, don't ever send carded stuff to your house. Only a Data would do that. If you send it to your house, you will get caught, you will go to jail, and you will get buttfucked. You need a drop site. A drop site is usually a house where the people that live there are out of town, or maybe even a vacant place. If you use a vacant place, make sure it isn't obvious (usually, a "For Sale" sign makes it real obvious), because UPS and FedEx people aren't as dumb as you think. Write down the address and zip code of the place, then say it over and over a million times in your head, so it becomes familiar to you and you can rattle it off like you've lived there forever. [b] - The CC Account - This is very important, since it's very hard to card without a CC account. There are many ways to get them. One is by looking in someone's mail, and taking their statements, another is by forwarding their mail, or trashing (looking in trash for statements, etc), or if you work retail, it's REAL easy... Once you have the CC number, you're not home yet, you need the person's name, and BILLING ADDRESS. They won't always ask, but have it just in case. Also, there is a very common misconception about expiration dates. THEY DON'T MEAN ANYTHING, AND ANYONE WHO TELLS YOU THEY DO IS AN BLITHERING IDIOT. You just have to make one up that's 2 or 4 months ahead of what the current day is. Like if it's July 4, 1993, just say "June 1994", and you'll be fine. [c] - The Vendor - You're on your own here, since I don't do this anymore. The way I used to do it is by getting magazines catering to the type of stuff I'm buying (Computer Shopper for computer shit, Guitar for musical stuff, you get the idea), then finding a small, non-color ad and using that vendor. Anyway, now that you have everything together, you need to actually card the shit. Again, I can't stress this enough, practice the whole thing in your head so that is sounds natural, and you feel comfortable with it, because, believe me, they'll spot you if you don't. So, once you've got it, go to A PAY PHONE (safety tip), call them and order. Give them the drop site address and the cardholder's name. If they ask "is that the address on the card?", say no, and then give them a bogus story about the fact that this a birthday present for a relative in another city, make it up, you get the idea. And if they say "this is fraud... we *know* who you are! you're dead!" (or something) hang up, and bail, then start over at step A, and DON'T TRY TO USE THAT CARD AGAIN, BECAUSE IT *WILL* BE FLAGGED AS "FRAUD ATTEMPTED"!!! If they ask for a number to call you back at, DO NOT GIVE THEM THE PAY PHONE NUMBER, try to talk them out of it. Tell them you're at an airport on a business trip and just remembered to send the gift, etc, just MAKE SURE IT MATCHES YOUR OTHER STORY, OR YOU'RE DEAD. If that's doesn't work, give them a bogus number and forget it. Try again, with a DIFFERENT CARD. If all goes well, you will have just carded something. Congratulations! (NOTE: My first card run was when the TI TravelMate 2000 Notebook Computer first came out, and with 2 megs of RAM, and a 2400bps modem with sendfax, it cost $3500. I got two of them on the first try, but that was the good old days...) A WORD ABOUT CBI: CBI (see terminology section) used to be a good way to get card numbers: you looked in the phone book for some guy's name and address, CBI'ed the poor fool, then used his cards. I used to run like 30 CBIs every day just for the fun of it, until Equifax called me. I don't use CBI anymore and unless you have a portable computer you can use clipped onto a phone line somewhere, I don't think you should do it either. I mentioned in the Traditional Carding section that carding used to be the stock way everyone got their high-speed modems. A new way has come out recently that works quite well... It's called PO Fraud (PO stands for Purchase Order, it's how most companies buy things). What you do is go to a stationery store, buy some PO forms, then get a bogus company logo, name, and address, and photocopy it onto a PO form. Then you call US Robotics, talk to a sales weasel, and say you're from whatever company and that you need two power supplies for a Dual Standard. They'll ask how you want to pay, say Purchase Order. They'll ask you to send the PO. You'll get all the cost info, etc, TYPE that onto the PO then send it. They'll send you two power supplies, with an invoice for $21 (the supplies cost $10.50 each) or more, depending on shipping, etc. PAY THE INVOICE. THIS IS IMPORTANT. YOU ARE GETTING A USR DUAL STANDARD FOR $21 - IT'S WORTH IT. Then, like a week or two after you get the power supplies (just chuck 'em, you don't need them anyway), and have paid the invoice, call back the same sales fool, and say you need a Dual Standard modem. They'll send it to you on a PO, send them the PO like before, then when the modem comes, don't pay the invoice. You just grabbed a Dual Standard for $21. Another scam I used alot last summer was check fraud. The stuff I'm going to describe here seems quite wimpish at first, but I'm sure you can adapt it to your needs. Grab someone's checks. Call a pizza place, say you have to be at work for an emergency meeting (or whatever) in five minutes, but your kids need food. Tell them you'll send your son/daughter over with a check. Write out the check, and go pick up your free pizza. This is only the beginning of the scams you can have fun with. If you come up with any new ones, email me. IV. Anarchy Info I'll admit that when I first heard about it, anarchy seemed pretty dumb to me. I mean who the HELL wants to go around setting off bombs. Then the LA riots hit (I LIVE in LA), and I thought different. I don't know a lot about the anarchy side of the Underground, but I'm snatching all the files I can find on it, and learning fast. It useful just to be able to blow things up, especially of you get caught in a riot zone. It's also useful for just normal ordinary revenge. Like I said, I don't know it too well yet, but I will soon, and that'll be for another file... Anyway, I think that's it for now. I've covered quite a bit here and I'm sure you're itching to go try it out. Go for it, but remember, YOU WERE WARNED. If you have any interesting experiences, call my BBS (the number is at the end of this file), and post about it. I mentioned before that my reason for doing this was to revive the Underground. That is a major goal of mine. We need new blood down here. If you are interested in writing a piece for one of my files, or starting up a newsletter, or whatever, email me somewhere (I shouldn't be too hard to find), and let me know. WE NEED TO RESTORE THE UNDERGROUND... Look for my next file coming when it comes... Until then: STAY ALERT, TRUST NO-ONE, AND KEEP YOUR LASER HANDY... - Pazuzu, March 25, 1993 09:47, Long Beach, CA - call Minas Morgul (my BBS) at 714.646.9180 - 333 megs - 14.4kbps - p/h/c/v/a/etc/etc/etc 714.646.9180