Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: "Mark L. Neidengard" <mneideng@****.CALTECH.EDU>
Subject: Calling Lynch
Date: Sat, 4 Jan 1997 15:55:04 -0800
*****PRIVATE: Lynch
>>>>>[Greetings. I believe we are both working on a common problem by the
assumed handle of "Thunda", and I suspect that we might both benefit by
a little collaboration. Are you interested in a small joining of forces to
see this person (and his backers) smacked on the wrist? ]<<<<<
-- AlexandriaN <15:52:24 / 01-04-58>
Message no. 2
From: "Paul J. Adam" <shadowtk@********.DEMON.CO.UK>
Subject: Re: Calling Lynch
Date: Sun, 5 Jan 1997 02:38:04 +0000
*****PRIVATE: AlexandriaN
>>>>>[C'mon, Alex. I'm not going to slap his wrist, I'm going to either
throw him into a Federal penitentiary or blow his brains out, and his
backers... well, I won't make rash promises until I have some idea who
they might be.

But yes, I would be glad to work with you again to resolve this shared
problem.]<<<<<
-- Lynch <02:40:31/01-05-58>
Message no. 3
From: "Mark L. Neidengard" <mneideng@****.CALTECH.EDU>
Subject: Re: Calling Lynch
Date: Sun, 5 Jan 1997 12:59:49 -0800
*****PRIVATE: Lynch
>>>>>[ It all depends on what you slap his wrist with, doesn't it? I was
thinking of something highly explosive or toxic, myself.

At present, I have an assortment of Matrix consultants hard at work trying to
ascertain the exact whereabouts of the Matrix transmissions; I am currently
awaiting the results of some "physical" inquires my employers are making,
but I can say right now that this character appears to have some _serious_
corporate backing. It appears that someone within Fuchi has been helping him
directly, as your people may learn from some of the information to follow.
But be warned: I have reason to suspect some factionism within the Fuchi
research bureaucracy and I am not sure whom I would trust there at present.

I (and my employers) have also caught wind of the heist from Lonestar. This
has increased their anxiety enough to authorize some heavy artillery. Meaning
V-12 and his team (which has gotten larger than the last time) are en route
to the area, loaded for some serious trouble. In any event, here are some
Matrix traces extracted by some of my associates:

+++++include zzzzzzzzzzzzzzzzz

Use "Antimony Melon" to decrypt and read it; don't ask how I have access to the
system. Best I could do for secure commo to you on short notice.

If you feel like sharing anything relevant, I'd certainly be appreciative.
I expect to see some of my other inquiries bear fruit within 48 hours, and I
hope to be able to share some of their results with you as well.

Personally, I have an ugly suspicion that this is someone's idea of a "field
test". If so, the "support personell" could be every bit as annoying as
the
primary target himself...
]<<<<<
-- AlexandriaN <12:30:58 / 01-05-58>
Message no. 4
From: "Paul J. Adam" <shadowtk@********.DEMON.CO.UK>
Subject: Re: Calling Lynch
Date: Sun, 5 Jan 1997 23:42:47 +0000
*****PRIVATE: AlexandriaN
>>>>>[Be wary on Matrix games. He's playing games there, we've found
nothing but a series of routers.

Confirm Fuchi as a possibility for his backer, or at least for the
employer of one of his backers, merely because someone is in corporate
employ doesn't mean they make policy (a fact much abused, but it has its
uses).

As for further information... we trust each other, I'd expect you to
filter this appropriately before passing this on to avoid embarrasing
the Agency or the UCAS.

+++++include casefile.txt

While I've grossly overstated his flaws while trying to bait him, some
are quite fundamental: he's a very dangerous tool to hire. It's
frightening: Lilith still has problems with the Ladder she was hit with
when she worked for the Agency, it might even be that Thunda is still
using it, or being given it without his knowledge. It would explain a
great deal.

And it's official, Thunda is now what Drake would call a "live bullet
arrest". InterPol are involved (Montoya's the case officer) and Serenity
Security are showing interest. Plus, the aggregate reward on Thunda is
up to 4.5 million, which means unless we're careful we'll be knee-deep
in wannabees and wilsons with dollar signs in their eyes and cheap guns
in their hands.

I have to say, the guy's almost a textbook of "how to have a one-month
shadow career": his backing and his not inconsiderable personal skill
(don't mistake my posts, he's _dangerous_) have kept him alive but his
overconfidence and ego is such that I guess he must have been carefully
picked for the role.

Which begs the question, while all eyes are on Thunda, what's happening
elsewhere?]<<<<<
-- Lynch <23:40:43/01-05-58>
Message no. 5
From: "Mark L. Neidengard" <mneideng@****.CALTECH.EDU>
Subject: Calling Lynch
Date: Sun, 1 Mar 1998 11:50:43 -0800
*****PRIVATE: Lynch
>>>>>[
+++++reroute: JFECS-4
+++++reverse route...unusable

+++++engage FederalInformationExchangeStandard(Red)
+++++recipient: Jason Running-Wolf Lynch (EYES ONLY)

Yeah, I know this system is supposed to only be for official government
traffic...chalk it up to NSA (deliberately?) making the code a little to easy
to "export". It's the easiest (reasonably) secure protocol I can be sure that
only you'll be able to decrypt. You see, lots of people are up in arms over
the whole thing (Fuchi has deckers out in force, for example) and I don't
know who in the government may be tangled up in all this. At the very least
I don't want Haze or his backers getting wind of this. Paranoia saves lives.

Anyway, I'm passing this information along as a "concerned citizen". It'd
probably be a lot more profitable to use this in your investigations than to
try to figure out exactly where it all came from. I trust you to get the
right facts to the right people.

+++++include binary.data

Speaking personally: make sure the bastard gets nailed to the wall. Good
hunting.

(Oh, and it'd be nice if you didn't report that FIES(R) is being used by the
proletariat - having a secure channel to one's federal representatives can be
handy at times)

+++++disengage FederalInformationExchangeStandard(Red)
]<<<<<
-- Azrael <17:31:56 / 03-01-59>
Message no. 6
From: "Paul J. Adam" <shadowtk@********.DEMON.CO.UK>
Subject: Re: Calling Lynch
Date: Mon, 2 Mar 1998 22:23:24 +0000
*****PRIVATE: Azrael
>>>>>[Thanks for the information, Azrael, it's appreciated. And no, I
won't dig for the sources, I know it wouldn't do that any good.

There's no point telling everyone this system's not totally secure, if
the NSA and Chrome Berets change it you'll only hack that too, and it's
damn useful having the better shadow assets being able to drop us a
discreet line from time to time.

And yeah, you're right, we _do_ suspect Government involvement. Several
someones, very corrupt, very high. (So what else is new, right? If the
Government was honest, I'd be mostly out of one of my jobs...)

Owe you one for this. If I thought you'd meet me, I'd buy you a
beer...]<<<<<
-- Lynch <19:16:43/03-02-59>

*****INTERNAL: SIGANet
>>>>>[TO: Alex Monroe

Azrael just cracked FIES and dropped this in my headware. Damn
showboating deckers <g>

Don't think we need to panic about the cracking, just flag a "suspicion"
to NSA. They'll ante up the security a little so that the amateurs can't
follow the pros in, that should be enough for now.

+++++include binary.data

If I ever meet the man I'll buy him a beer. Anyway, it might give us
some leads on Haze, you want to see what you can do with it?]<<<<<
-- 1Lt J R W Lynch <19:20:45/03-02-59>
Strategic Intelligence Gathering Agency
Message no. 7
From: Mark Imbriaco <perlhacker@*********.NET>
Subject: Re: Calling Lynch
Date: Tue, 3 Mar 1998 00:13:52 -0500
>>>>>[ TO: 1Lt J R W Lynch

I'll check out that information tonight. I'm going to provoke Combine some
more and see if I can force him to make another stupid mistake. He's
already sent a
message to Farmer once while I've been watching him, but I wasn't able to
get a
full trace out of it. I'm hoping for better luck next time -- and even if we
don't get the information this way it's fun to watch him squirm. I'm going to
recommend that we bring him in if he doesn't make a mistake by the end of the
week.

As far as the message you got via FIES, I have to say that I'm not terribly
surprised. NSA has some fine talent, but it's hard to insulate against those
with legitimate access to the network -- such as contractors. Once any degree
of access is allowed you've opened a big hole that is nearly impossible to
plug effectively. I'll talk to my contact at NSA and pass it on though.

Take it easy, and watch your back. Looks like Haze is still plenty pissed,
and while he's a crackpot, he's not without ability. Keep your head down
and you'll keep it in one piece. ]<<<<<
-- Alexander Monroe <00:10:31/03-03-59>

***** PRIVATE: Combine
>>>>>[ What's the matter, cat got your tongue? Don't worry, I won't tell
anyone who you really are. Scout's honor. ]<<<<<
-- Anonymous @ Shadowland (Finland) <00:13:42/03-03-59>
Message no. 8
From: mneideng@****.caltech.edu (Mark L. Neidengard)
Subject: Calling Lynch
Date: Tue, 9 Apr 1996 14:20:00 -0700 (PDT)
*****PRIVATE: Lynch
>>>>>[I have been contacted by a business associate who wishes to discuss
certain recent events with you, preferably not in person. I have been
directed to give you this authenticatable document as a gesture of good faith:

+++++include BTL.warehouse.site.map.auth.anon

My associate is interested in some of the deeper workings of this problem,
and is prepared to exchange sources of information should you be amenable.
I am informed that speed may be of the essence in resolving the issue.
Please contact me as soon as is convenient as to your willingness to
establish lines of communication.]<<<<<
-- Sapphire <14:11:50 / 04-09-57>
Message no. 9
From: shadowtk@********.demon.co.uk (Paul J. Adam)
Subject: Re: Calling Lynch
Date: Wed, 10 Apr 1996 00:41:18 GMT
*****PRIVATE: Sapphire
>>>>>[I'm willing, as long as you can cope with me being rather paranoid,
jumpy as hell, and bringing some backup with me: and having considerable
control over the terms of the meet.

My apologies for the rudeness, but - bluntly - I don't know you from Adam.
If you're genuine, you'll understand that my actions are in good faith,
because I have no wish to harm a potential ally: but we must accept that we
are strangers to each other, and there are as many reasons for you to
harm me as to help me - your patron's particular circumstances notwithstanding.

That explanation aside, how does your employer wish to deal? By intermediary,
by telephone, via the Matrix? I am, provided my paranoia is indulged,
amenable to any of these and open to other suggestions.]<<<<<
-- Lynch <00:45:31/04-10-57>
Message no. 10
From: mneideng@****.caltech.edu (Mark L. Neidengard)
Subject: Re: Calling Lynch
Date: Tue, 9 Apr 1996 17:31:52 -0700 (PDT)
*****PRIVATE: Lynch
>>>>>[You needn't worry about offending my sensibilities with paranoia. As
the saying goes: "You're not paranoid if they really _are_ out to get you".
My employer prefers to confine communication to the Matrix as much as possible,
unless realtime communications should become necessary during the course of
your activities. Due to the nature of the work involved, my employer believes
that using special encryption will be in order. If you agree to this means of
communication, I will forward you the cypher using the same authenticatable
hash as before, which my employer will authenticate in his first encyphered
message to you. I can also convey to you that considerable financial reward
will accompany success in your cooperative venture, should you so choose. I
await your convenience for a response.]<<<<<
-- Sapphire <17:17:27 / 04-09-57>
Message no. 11
From: shadowtk@********.demon.co.uk (Paul J. Adam)
Subject: Re: Calling Lynch
Date: Wed, 10 Apr 1996 02:01:45 GMT
*****PRIVATE: Sapphire
>>>>>[Go for it.]<<<<<
-- Lynch <02:02:04/04-10-57>
Message no. 12
From: shadowtk@********.demon.co.uk (Paul J. Adam)
Subject: Re: Calling Lynch
Date: Thu, 11 Apr 1996 23:38:50 GMT
*****PRIVATE: Sapphire
>>>>>[Send me the cypher and let's get to work, then. Thank
you.]<<<<<
-- Lynch <23:40:03/04-11-57>

Further Reading

If you enjoyed reading about Calling Lynch, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.