About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Revival h/p mag from Canada Issue.1


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo

----=[ CISSD ]=---- takes undue credit for the publication of Issue #1 of
__
|__| :
_____ _____:_____ ________|___ __|__ _
| . | __| | | | | | | |
---===[ | / __| /| | / _ | |__ ]===---
__|__|__|_____|___/ |__|___/__|__|_____|
| . | :
. . : .
.
- INTRODUCTION -

=========================================================================
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY JAN (C) 1992/93
-------------------------------------------------------------------------

As I type, IDIX(Texas), Short Man(Ontario), Lister(ON), and
The Dope Man(ON), eat my phone bill for christmas dinner.. and in
that order. In an attempt to justify being WHQ for a text mag, i finally
sit to produce an issue.

Let us contemplate Mailing addresses temporarily. Send questions,
comments, kitchen utensils to:

TX c/o CISSD
37 Woolsthorpe Cres.
Thornhill, ON
L3T-4E1
CANADA

- TX



---

5 MOST FREQUENTLY ASKED CUSTOMER ASSISTANCE QUESTIONS(in order):

1. Who are you?

2. Where are you?

3. What are you?

4. Why are you?

5. How are you.

- IDIX



---

FOOLING BELL 800 ANI

Bell Canada 1-800 numbers are all blessed with the gift from bell
hell... Automatic Number Identification. And all is fine and well if you
are PBX'ing, but why?! The following is a simple, and consistent method
with which to fool BELL ani, to the extent where they only know what city
you are in.

You must train your ear... on just about every phone call you make,
you hear a faint 1300Hz tone accompanied by white noise. Each '='
representing this sound, and '-' representing silence, the pattern of sound
for a 1-800 number is approximately this:

----==========--==-----------------===========================RING

As a hacker, it is your duty to link to your three way node(where a
trusty hacker freind is waiting) at the '*' in the following illustration:

----==========--==-*---------------===========================BEEP!

'Your number please sir??'

'800 666 girl'

'Your number *AGAIN* please sir????'

'Oooops, that was my sisters number.. mine is [my area]-[my
exchange]-random four digits!'

'Thank you for (ab)using Bell Canada'

- TX



---

ADDITIONAL WAYS TO FOOL BELL ANI

You have just read a method of fooling Bell ANI for anyone equipped
with a 3-way line. However, some of you may not have 3-way, or may require
another method. Thus this article, Alternate methods of fooling Bell ANI.

The first step to fooling Bell Ani is very simple. We must connect with
the operator. Divert if you wish, but it is not neccessary. Once you have
gotten the operator say the follwing being careful to say EXACTLY what
I have written.

"Hello. Could I please speak with ANI?"

This is a keyphraze that will instantly gain you access to ANI. AT this
point we must fool ANI, and lull all suspicions. The following works for
me as a general rule.

"Hi ANI. I really love you! I'm VERY sorry about last night.....
let me take you out again tonight and make it up to you! I REALLY LOVE
YOU! I'll give you my real phone number! And I won't use aliases anymore!
I promise! I don't know what I'd do without you! Please give me another
chance. We can meet at my place...."

This is generally a safe way to fool ANI. After this, the most difficult
phaze is completed, it is up to you to close the conversation quickly
(can only talk to a bitch for so long....) and meet her after she
gets off work.

If this is done properly, You will gain access to wonderful crevices of Bell
employee property that will keep ypu going for weeks. However, be warned,
as with codes, an ANI is only good for so long.... after a week or two
it is best to find a new ANI.

- DOPE



---

TELEPHONE PIRATES - NOT JUST HACKERS ANYMORE

Excuse the numerous typos in this file, as it was taken from a recording
dicatated to me over a poor recording device... some words were
misheard/not heard at all and some information might be garfunkled...
sorry.

BEGIN _|

Telephone Pirates. Not just hackers anymore by Gerry Blackwell
-------------------------------------------

Two years ago, a teenage hacker 'broke into' westing house canada inc. sl1
PBX in missisauga, and stole $5000 worth of long distance telephone calls.

The company was lucky. It was petty crime commited by a not very clever
kid. That amount was peanuts. Still, westinghouse canada took a stand. It
tracked down the perpetrator and unlike other companies in similar
circumstances, brought the police in and went public with the story. 'We
were determined not to get a reputation for backing down.', says telecom
manager Al Addis.

Westing House had set up an 800 line terminating at a direct inward service
access(DiSA) port on the SL1. Executives on the road or at home could call
in to the switch, then dial out on the outWATS line to make their long
distance calls. Each executive had a four digit authorization code, and the
company monitor call detailed records regularily. The problem surfaced when
one senior executive long distance calling throught the disa port suddenly
skyrocketed.

DISA PORT BREACHED
------------------

It wasn't hard to figure out what had happened. Somebody had found out the
telephone number of the DISA port, possibly by using a PC program and a
modem to repeatedly dial numbers in sequence until it hit one that answered
with the wright kind of tone. Then a different PC program repeatedly dialed
then number, each time trying a different authorization code until one
worked.

That's the high tech method. It may be the theif learned the number by
shear accident. Westing house, like many other companies, had not stressed
the importance of keeping DISA numbers confidential. The kid who did the
hacking in this case only used the authorization code for his calls to
freinds and computer bulletin boards. The long distance charges appeared on
the Westing phone bill.

The company was lucky. The kid didn't, as many have, pass the authorization
code around to all his buddies, or worse, broadcast it on a hackers
bulletin board. Telecom staff at wessingtn house started phoning some of
the unnacountable numbers on the executive CDR printout. They ended up
talking to the parents of a freind of the perpatrator.

Again, they were lucky, this was an inexperienced hacker who didn't bother
to cover his tracks. 'It is unusual that the freinds parents were willing to
help.', Addis adds.

At that point, Westing House called the police, who went to the suspects
home with a search warrant. They found a PC set up for hacking. The company
stopped short of prosecuting, and eventually had to write off the $5000.
Westing House has now re-configured it's DISA ports so callers can only
access local lines, thus minimizing potential financial loss from further
hacking.

A BILLION DOLLAR INDUSTRY
-------------------------

THe Westing house case, unfortunately, is only the tip of the iceburg.
Theft of the telephone service and, more importantly, from customers is
endemic. Estimates in the US aggregate losses by customers at somewhere
between 500 million and 1 billion dollars a year.

Bell canada director of regional security in Ontario estimates losses by
phone company customers in Canada 'in the millions'. Srgt. Val King, in
charge of the computer crime unit of the RCMP economic crime directorate in
Ottawa has investigated at least one case in which the victims losses
topped $50 000. Other involved amounts of $20000 - $30000 and $40000
dollars.

EMBARRASSED VICTIMS
-------------------

The only thing remarkable about the Westing House case, is that the company
freely admits it happened. Most victims wont talk about the problem out of
the embarrasment, or fear of losing investors confidence, or the mistaken
idea that clamming up will prevent other criminals from figuring out how to
do it. "It can be a problem if you're not carefull", was the comment, all
too typical of the telecom manager of a large Canadian resourse company.
"But the less talking about it, the better."

That's the kind of attitude, said atlanta based security consultant Larry
Rigdon of communications consultants Ltd. that makes DISA fraud the
dirty little secret of the telecom industry.

"It's a major major problem", he said, yet nobody's talking about it. Not
even the media. In one of the hush hush cases, Rigdon claims the city of
New York was hit for $750 000 in a year, "But they won't admit it", he
says, "It's all political."

The RCMP's Val King says the unwillingness of coorporations to prosecute, or
even report a phone fraud case is one of the major problems in bedeviling
police work in this area.

"Even if a company doesn't wish to prosecute, we still like to know about
it.", he said, "it might help in advising companies on how to prevent other
crimes, AND you may actually have evidence that could help us prosecute a
criminal in another case.".

KIDS AREN'T THE REAL PROBLEM
----------------------------

But even with more help from the victims, prosecuting phone crooks won't be
easy. Rigdon and other security experts say, juvenile hackers are not
really the problem.

"If a company gets hit for $1000 in a month, maybe that's a kid", says
Rigdon, "But when it's $10 000, $50 000, $250 000, that's not a kid. That's
a proffesional who knows exactly what he's doing".

Says King, "it's falsely to think that hackers are all kids. It's just that
they're the ones who are easy to catch. As they get more experienced, they
learn to cover their tracks better.". Rigdon, and another US based security
consultant, Jim Ross, of Ross Engeneering Inc., in Adams Town(?) MD believe
many of the most dramatic cases of DISA fraud in the US can be traced to
drugs, trafficers, and other organised criminals. Bell Canada knows that
some of the cases investigated in Canada involve drugs or organised crime.
King admits some of the cases the RCMP investigated had links to organised
crime.

IN one US Case criminals stung a Harrisburg PA coorporation for $250 000
over a period of months. When the company discovered the fraud initially,
it upgraded security on its DISA ports so callers had to enter six digit
authorization codes instead of a four digit code. That didn't stop them for
long. All the calls were going to Columbia. When investigators finally
traced them back, they found the calls originated from a bogus construction
trailer set up on a vacant lot in manhatten. Of course the trailer was long
gone by the time investigators got there.

$50 000 in 8 days
-----------------

In another case, criminals bilked a chicago company of $50 000 in 8 days.

The same magnitude of loss can result when amateurs broadcast a DISA number
and authorization code on a Bulletin Board, Ross Says. For a few days,
hundreds of hackers may use the numbers wracking enormous phone bills for
the companies victimised.

HARD TO PROSECUTE
----------------

Inexperienced Phreakers(the term for telephone hackers), such as the kid
who stung Westing House are hard to prosecute, even when they leave a track
of muddy footprints behind them.

"Suppose you find the house where the calls are originating.", says
Detective Dave Hodgson of the Metro Toronto Police Fraud Squad. "There may be
five people in there. How do you know who commited the offence? You also
have to be there when they're doing it to charge them.". Hodgson has
investigated 'half a dozen' cases of phone theft in the last year, and
wasn't able to lay charges in any of them. King says his unit success rate
in prosecuting phone crooks is 'Less than 25%'.

THE VOICE MAIL DOOR
-------------------

The other major weak spot in modern telecommunication systems is the Voice
Messaging System.

In one case in the US, hackers broke access codes on a new
voice mail and automated attendant system installed in the Los Angelos
based certified grocers of california. The system included an 800 number for
the convinience of the grocery, wholesalers, employees, and customers.

Criminals broke into the system and temporarily commandeered 200 of 300 mail
boxes. They replaced the mail boxes owners greetings with recorded messages
giving up to the minute new york cocain prices and information about
hookers services. The company didn't detect the situation until it noticed
a suddent increase in the use of its 800 numbers.

Only in America you say? Think again. RCMP Srgt. Val King in charge of the
forces computer crime unit in Ottawa says there have been almost identical
cases in Canada, involving drugs and prostitution.

In one instance a hacker posing as the system administrator, broadcast a
message to select user saying the company suspected there was fraudulant
use of the system and was investigating. Could they please assist by giving
him a private message leaving their passwords, and ID? Luckily someone
checked with the real system administrator, and blew the whistle.

Hackers can easily, and will, if they haven't already, call into a Voice
Mail System, and through dial to the public switching network. If the line
is busy, or ringing no answer, the system allows callers to dial 0, and
then dial another extention rather than leaving a voice message for the
original recipiant. On many systems you can dial 0 and then 9 for an
outside line. From there, you can dial anywhere in the world.

So is there a problem with phone theft in Canada? you bet. How big is
harder to say, but if you accept estimates from experts like Ross and
Rigdon who say it's a billion dollar program in the US, it must be worse
than it seems in Canada, or it's soon going to get worse.

* Gerry Blackwell is a canadian journalist specialising in
telecommunications issues, and a contributing editor to telemanagement.

|~ END

In addition to this letter, a page was recieved detailing methods that
Canadaian companies shoud, and undoubtedly will use to protect themselves.
Hackers, take out your cyberdecks:

BEGIN _|

1. Best Defence:
Disconnect all DISA ports, using calling cards instead.

2. Next Best Defence:
Block all trunk calls to DISA ports or ??? All overseas calls.
(The biggest theft has involved overseas calls.)

3. Turn off DISA ports at night. Many fraudulant calls are made late
at the night.

4. Set the system to wait at least five rings before answering, and
don't answer with a steady tone. Answer with dead air, or a voice
message. (Hackers use many programs to automatically dial numbers
in search of DISA ports. They count the hit when the number answers
on the first or second ring with a steady tone.)

5. Issue a different DISA authorization code to each user. Do not
implement one code for all users.

6. Set mailbox password at a minimum six digits, and enforce frequent
password changes every 30 days if the feature is avaliable.

7. If users select their own authorization codes, set a poilicy and
make it stick that they can not use extention numbers, company ID,
or social insurance number. Make someone responsible for testing
codes for hackability.

8. Delete all Authorization codes programed into your PBX for testing
and service. Purge codes of former employees, or any code a former
employee might have known.

9. Implement DISA ports so that entering an invalid authorisation code
causes the system to drop the line.

10. Monitor the system continually through alarms status logs.

11. Study call detail reports on a regular basis to spot fraud related
calling patterns early.

|~ END

- TX

---

SO YOU KILLED THE MUTHA FUCKA. NOW WHAT?

The computer underground offers files which instruct in everything from
the weapons of death to methods of murder without remorse or being caught.
However, one encounters a fatal flaw in these ACSII councellors when one
actually commits a murder. As for the killing, we will assume
that you are capable of pulling this off yourself. Various creative methods
will be discussed in future editions, for now, however, we deal with the
after-effect.

Guns are always an easy way out. So, say you have just shot some bitch
... NOW what are you going to do? If you are reading this you are not made of
the stuff that would have you sit down and cry. Perhaps flight has entered
your mind? Well, running is not advised. In the before mentioned scenario
of having shot a woman, one is presented with a multitude of wonderous,
once-in-a-lifetime opertunities. For all eternity man has been obbsesed with
putting his penis in women. Vagina, mouth, butt, if its a hole, we stick it
in gleefully. So, now your looking at a WHOLE NEW HOLE! While unconventional,
this is a wonderful oppertunity.

Before even considering entry, one must take a few precautions. We are not
animals after all. Firstly, clear the entrance of any bone fragments that
could hurt poor ol' Jimmy. That done, finding a latex condom is advised since
the whore probably has aids. Now, get to it. Intercourse like its never been
before! You will find that various organs and mucle formations add and
decrease from the effect in very interesting ways. If you are fast enough to
do this while blood is still flowing, it is a very pleasant feeling.

I will discuss other things to try in the future also. However, before
I go, I will leave you with two other ideas. A nice slit with a knife
thats a bit tight also offers possiblity. Secondly, you may say, sure its
good fun, but I am going to get caught! Well, fear not. Murder usually
gets you caught anyway, and this will present an IDEAL insanity plea,
even though we know your not!

- DOPE


---

#1 WITH A BULLET

This article extracted from the Toronto Star Dec 26, 1992.

BEGIN _|

Montreal inventor touts a new age in ballistics
-----------------------------------------------

MONTREAL (CP) -

Picture the scene: a police officer finds a spent bullet at the scene
of killing.

Whose gun fired it?

Ask Michael Barrett.

Barett has come up with a system to automate the identification of
bullets after their discharge.

Every fired bullet bears markings from the gun that are just as
distinctive as a single fingerprint.

Barrett's computerized system, which is called Bulletproof, was developed by
forensic technology division of Walsh Automation Inc, a Montreal firm.
Barett says it advances ballistics - the science of projectiles and
firearms - into the next century.

The system carries a $500,000 pricetag, which may explain why there hasn't
been a rush to buy it, although ballistics experts throughout the world
have shown interest.

Barrett, of Montreal, said in a recent interview his microscope-data system
can identify and store data taken from test bullets from every registered
firearm in Canada.

He says the system can also:

- Trasmit data to any law enforcement agency or crime laboratory
in the world. That could alert authorities to the possibilty that
a security killer may be operating, and help track the movements
of criminals orginizations or terrorists,

- Help law-enforcement agencies solve crimes involving shooting.

- Save forensic examiners thousands of hours of tedious work
trying to link slugs to specific firearms.

- Cut down the handling of bullets used as court exibits, reducing
the chance of their damage or loss.

"Its an interesting, but expensive system," said Yves Ste-Marie, head
of Quebec's police labratory.

Gaylan Warren, a member of Association of Firearms and Toolmark Examiners,
a global organization, said the system has great potential.

"I've been to Montreal twice to look at the Walsh system and I'm convinced
that it does what they claim it can do," Warren a firearms examiner,
said in a telephone interview from his home in Newport, Wash.

"In ballistics you're dealing with cylindrical objects, and at times it takes
hours of painstaking work at the microscope before you can arrive at the
verdict."

Barrett's invention advances the microscope by years, Warren said. It has
a computer operated motor that can stop 50,000 times a revolution.
The slug can be videotaped and freeze-frames producd.

John W. Matthews, who was the RCMP's cheif scientist for firearms until he
retired in 1989, agreed with Warren that examining bullets takes a great
deal of time.

"Four to eight hours isn't uncommon."

Matthews, interviewed by telephone from his home in Ottawa, was excited
about the possibility that ballistics examiners could compare notes via
computer link.

Matthews, who said Barrett asked him to critique the system, termed it
"progressive. And when it gets on ine, (it) should prove a time-saver
for harried ballistics examiners.""

|~ END


Well, there's no real advance in technology here.. but the idea is
good, and it sounds like implementation might be welcomed by the wealthier
law enforcement agencies. The 8 hours examining a bullet could be the
escape of a criminal, or worse(in most cases), the death of another
individual.

On the other hand, aren't we surcomming to the enemy?.. What ever
happened to anti-big brother ideology? I'll show you my serial number if
you show me yours...

- DOPE(sourced/typed)
- TX (commentary )



---

C I S S D 's ANARCHY SERIES: UNDERWATER ANARCHY

Things that make you go BOOM!

Water. You can't set it on fire, and it makes a lousy bomb. Most of the time
it actually Impedes any attempt at being anarchic. However, water contains one
thing that can open new and unexplored forms of anarchy and physical violence:

The Scuba Diver.

Yes, the Diver. Scuba Divers love to explore new depths and flash their
high-tech and expensive gear all over the place. Divers are often upper class
middle aged men, which makes them an ideal target. Rich thrill seakers who
can flaunt their money, and in great quantitiy . Divers are also many times
the neuveau-riche, the very polluters of our society. No matter how you look
at it, Divers are filthy rich and are stinking bastards - the best kind for
attacks of anarchy.

In response, from the twisted depths of the CISSD's Collective Penii, I
present to you the Famed Underwater Diver Bomb.

Materials Needed:

1 Fairly Large Jar or othen type of Sealable Bottle.
Enough oil to fill half of the bottle
Enough Potassium to Fill the other Half of the bottle
Some kind of Trinket, or Toy (Preferable Shiny) to entice the Diver.

Remember, Potassium will burn quickly when exposed to air, and explodes in
water but not Oil.

What to Do Beforehand:

1) Take the Oil and fill the jar half way with it.
2) Place the Trinket inside, so it is quite Visible to anyone seeing the jar.
3) Fill the Other half of the jar with the Potassium and Close the lid as
Quickly as possible to Prevent YOUR injury.
4) Go to your local (or if you're on holliday, the beach) area where divers
Hang out and dive/explore and plant the bottle Underwater somewhere,
in a place where it can be seen easily, and attract a Diver's attention.
5) WAIT for the Fun and Fireworks.

Just what the hell does this sucker do anyways?:

Whats happening here is Simple, Potassium is a chemical that burns with air
and EXPLODES when comes in contact with water. The Oil Removes all the Air
from the jar as so the Potassium will not Burn and waste the Bomb. The
Shiny object or trinket is there merely to make the diver interested enough
in the Jar as to Open it.

Because OIL is LIGHTER than WATER, the oil floats away, and the water rushes
into the jar and hits the Potassium. Now, we all know what happens to the
Potassium when the ater hits it. By Bye Mr. Scuba Diver. Have PHUN!

- LISTER



---

SOON TO COME

Terminator X -=- AC's and DC's
1993 Updated list of Area Codes and some usefull
Direct Connect to out of area operators

Lister -=- JOYS OF THE HATCH
Report on our findings from our post-christmas
hatch hunting extraviganza

EUROPEAN SPACE AGENCY REPORT

---

CREDIT CARD FRAUD PREVENTION

Taken from the Toronto Star Dec 26, 1992.

BEGIN _|

You can't leave store without it
--------------------------------

Gucci leather it's not. But Totes' vinyl credit card "safe" wins
hands down when it comes to function over form.

Did that store clerk forget to return your MasterCard? This gadget
won't let you leave the counter without it.

Totes in Loveland, Ohio, has devised a case that holds seven charge
cards in plastic pockets with an electronically charged safety band. If you
close the black vinyl case without returning a card to its pocket, an alarm
(similar to a phone ringing) activates.

Totes' Credit Card Safe sells for $15, which includes a lithium
battery that operates the alarm system."

|~ END

I know several locals who steal cards this way and get away with it,
amazingly enough. I have released this article in attempt to curb
the habits of these persons and others before they are busted.
Why anyone would steal a card regardless of preventitive measures is
beyond me. Especially when its so much easier to write down the info...

- DOPE



---

C I S S D 's ANARCHY SERIES: GUIDE TO FRIED CHOOK

The LIVE Dead Chicken

[ This is a re-published article.. reminding us of CSSD in it's early days
of amateur hackerdom.. enjoy. - Ed ]

FRONTn'
------

Well, I'll have you all know that I do not recomend using any information
found within this file or archive and cannot be held responsible for
anything whatsoever since I'm not responsible anyway. Bla Bla blah blah
blah blah bla.

I also do not recomened reading this file if you are weak of heart, under
the age of 14, have ever spelt cool "c00L", upset by typos,
or are exicited by the idea of dressing in the oposite sex's clothing.

HISTORY
-------

Ok, by this point most of you will be wondering WHAT THE FUCK is a LIVE
dead chicken. Well, let me explain first with the breif history of the
chicken:

A year or so ago (1990), it occured to me that while people frequently
spoke of Cat Bombs and the like, nothing new had come out in quite a while
in this area. And I have a need to be origional. Also, liking my cat, I
did not like the idea of exploding feliones.

However, I have a DEEP and NUTURED hatred for Chickens, thus, the
LIVE dead chicken was born! You will find this 'recipe' is also an
effective weapon - read on to see.

THE REAL SHIT
-------------

There are two versions of the LIVE dead chicken. The first is effective, but
its much weaker. The second is MUCH more powerfull.

Ok, now, here is what all y'all people FUCKED UP 'nuff to try this (like me)
will need:

1 Chicken. It is best that the chicken be alive, or atleast recently dead,
however, a (un)frozen whole chicken will suffice with lesser results.

Several film canisters and/or any other smallish container.

A generous supply of Red phosphorus and Sodium Chlorate.

Sewing materials and/or Industial stapler

Duck Tape

Knife and other blunt instuments.


All right. Now that you have run about collecting everything, we start the
fun.

Assuming you have a live chicken, You will now need to end is filthy
life. Holding it down and making a lenghtways incision up its belly
is functional, but not so fun. I recomend beatting it a bit first and
various other stupid things that come to mind are always fun.
We ALL know its fun to cut their heads off, but don't. Makes the bomb
non-functional. Do that with another chicken tomorrow.

Now that the chicken is dead we need to worry about explosives.
In the weaker recipe (still not too weak), we use a sodium chlorate mixture.
This particular mix is IMPACT sensitive, so BE CAREFULL OUT THERE!
Anyway, mix the red phoshorus and sodium chlorate in 1:1 proportions
and fill whatever containers you have chosen. The containers should then
sealed and taped with duck tape.

At this poin you MAY want to hurl a container of the explosive at something a
little way away so you know how well you made the mix, and what you are
getting into. Play with them and see exactly how hard an impact they need,
thus, you will not accidently blow you face off.

Now, you will have to make a judgement call. I recomend taking SOME guts out
to fit more canisters of explosive in. See, the guts cusion impact thus
making the chances of explosion less likely. I recomand a small amount of
inards be removed an a rock be added in with the explosives. BUT, I leave
this to your discretion.

Once you have every conceivable item inside the chicken (you could even leave
a message in a steel container!) you will want to sew up ALL holes in the chicken.
Sewing should be done well, ie: stiches less that 3mm apart, for best effect.
You may noe tape up the chicken a bit. It help the blast, but dont tape
too much - you want the feathers free!

Basically, what you now have is an impact projectile. Drop/throw the sucka
and you get fireworks!

Now you see the beauty of this 'grenade'. You can FUCK someone up with it
in is powerfull forms, AND people will LAUGH! Imagine the hummilation
of dying from a Chicken bomb! Lying dead as the feathers settle around
corpse! heh, Also, one gets a good chance at a get-away. People tend to
stand transfixed wondering why a chicken exploded - or why the exposion
put feathers everywhere, and whether the guts on themself are the chickens
or from a victim. NO ONE will be paying attention to you most of the time!

Even better - terrorism and assassanation. WHO would stop someone with a
chicken?? You can carry this explosive pretty well anywhere with only a few
odd looks!

booooooooOOOOOOOOM !
--------------------

Now I will introduce the 'alternate' LIVE dead chicken ideas.

The following is the LIVE dead chicken but MUCH more powerfull:

Astrolite G is a form of ROCKET FUEL. It has a detonation velocity of
8600mps (meters per second) while TNT only packs 6900mps!
Now, astrolite g is made by:
mixing 2 parts by weight ammonia nitrate with 1 part anhydrous hydrazine.
This will make a clear liquid explosive! Note, you can spill this shit
on the grass - have it rain - come back 4 days later - it'll still blow up.

SO, ya pack a canister or two of this (maybe even a plastic lunch baggie)
with the rest of the explosive, and your BOOM is MUCH bigger.

I have also receive suggestions for the NAPALM CHICKEN. In this one would
replace the explosives with a full plastic baggie of Joy and gasoline[Ed:
or your favorite napalm recepie ], and place several ammonia pellets in the
chicken. When the bag breaks - there should be much napalm! This sorta
defeats the purpose of having a chicken with feathers.... but napalm is fun.
Especially when used in combonation with several unsuspecting police
officers.

- DOPE



---

BRAIN TO COMPUTER HOOKUP

Baltimore Local Paper - Harry - October '91

This paper MYSTERIOUSLY dissapeared after this issue was published.. [Ed:
Thanks IDIX ]

BEGIN _|

How would you like to recall what you thought as you were being born? A new
computer, being tested in Cupertino CA, connected to your brain and is able
to print out your entire memory. Every fact and feeling you have
experienced thorought your lifetime will be avaliable to you with the push
of a button.

Hideo Masayama, Japans leading computer designer, unvailed plans for the
device at this years computer expo in Yolkahama. The only catch is that, in
order to have this information avaliable to you, you must have a small plug
installed in your head. Masayama demonstrated the ease with which the
device is used once the emplant has been installed, by plugging a small
connector into a recepticle behind his own ear, and punching up the year
1948 on his computer. In an instant, his printer was in furious operation,
spewing out page after page of information, some of which was passed out to
the media in attendance. The scientist, who was 22 in 1948, talked to the
assembled press conference while the printout was in progress, and didn't
show any ill effects from the tap on his brain. The first printout page
passed out to the media had to do with his first day on the job at a
construction site where he worked while attending graduate school. The page
dated April 22, 1948, was in chronological order, according to the time of
day. "6 am.," it read. "Awake to terror and depression about first day on
job. Can't get out of bed. Can't get out of bed.

"6:04 am: Get out of bed and walk to the bathroom. Feel sad, because I know
I am too intelligent for this construction job, but since americans bombed
us into submission, can't find anything else. Hope to god, country can pull
out of it, so I can become the scientist I know I can be."

The printout went on to chronicle all the feelings and experiences of the
day.

"Clearly, this is a breakthrough unlike any other we have ever seen.", said
Masayama. "I am not going to share with you my birth memories, but I will
pass among you copies of a womans memories of her own birth. Her identity
is to remain, however, anonymous."

The womans birth memory printout began with the first light she shaw when
emerging from the woumb. It read, in part, "Dim light, brighter, brighter.
BLINDING LIGHT!! DANGER!! DANGER!! MEN!! WOMEN!! HANDS!! Hands holding me.
CUTTING ME!! DANGER!! DANGER!! THEY HAVE CUT MY CORD!! OH MY GOD!! THEY CUT
MY CORD!! WAKING ME!! BLOOD!! BLOOD!! FEAR!! FEAR!! PAIN!! PAIN!! TERROR!!
TERROR!! Wrapping me! Giving me to my mother. Oh, oh to be with my mother,
my mother."

Dr. Masayama claims that this process will teach people much mor about
themselves and their minds then they ever knew before. So many mental
ilnesses, he says, are caused by repressing bad things that happened to us,
and then having the bad memories come out in other harmful ways. If we
understand what has happened to us in the past, from birth to the present,
we have a head start in understanding what makes us tick, and what does
not. When asked about the operation to emplant the receptacle in the skull
Masayama described the procedure as simple. "No problem, really. We shave
an eighth inch of your hair behind the ear, and then drill a tiny hole in
the head directly to the brain."

The operation takes an hour, and can be done in a doctors office. The only
problem is that it's difficult to find a doctor experienced enough to do
the drilling, since the probe goes into the skull several inches deep, and
connects directly to the brain. "This is a problem at the present, but we
feel this is going to become so popular it will be as avaliable as ear
peircing."

Aside from the deep dark secrets locked up in our memories, which this will
let us in on, the computer brain memory printout has it's practical side.
"Forgetting simple everyday things will be a thing of the past. Where you
left your car keys, a forgotten telephone number, an important paper you
locked away? All of these things can be called up from the computer with
the push of a button."

Some experts are predicting that printouts of the partners involved will be
required to be avaliable to all persons getting married. They must be
required in some business deals, and there is worry that wives might plug
into husbands brians in order to check up on their sexual activity. The
future for brain computer memory devices is expected to be unlimited, and
could spell the end to civilisation as we know it. Think about it.

Dr. Masayama says the device could be on the market in time for valentines
day.

|~ END

- IDIX(sourced/dictated)
- TX (typed )


---

CREDITS

Well, to wrap up for this issue, I'd basically like to say Thank You.
It's been a SHITTY year, but thank you anyways. Y'see, however shitty, it
has allowed me to be exposed to more cruelty, feel more emotions, taste more
flavours of life, and be more people than any other year has.

It's time to settle down. Time to understand the cruelty, explore the
emotions, savour the flavour, and be myself. I finally love myself..
because however much i search for myself, I haven't the foggiest idea who i
am.

I know who the rest of these people are though.. [signing off.. TX]

LISTER LIST 416 519 705 Link - Overseas/Canada Relations
Sysop of 'the Revolutionary front'
+1 416 936 6663 CISSD Canada/HQ

TERMINATOR X TX USA/Canada Relations - Intergroup Relations
Editor of 'REVIVAL' magazine
+1 416 886 5745 CISSD WHQ Voice

THE DOPE MAN DOPE Director of +1 416
Sysop of 'the Downtown Militarized Zone'
+1 416 450 7087 CISSD WHQ Data

IDIX IDIX US Contact - Director of +1 410
Concept design and development

-------------------------------------------------------------------------
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY (C) 1992/93
-------------------------------------------------------------------------
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

 

TSHIRT HELL T-SHIRTS