textfiles/bbs/bob-2.man

3884 lines
187 KiB
Groff
Raw Permalink Normal View History

2021-04-15 11:31:59 -07:00
Private Sector Bust: By - Shooting Shark :
The following article appeared in the August, 1985
On July 12, 1985, law enforcement officials seized the Private
Sector BBS, the official computer bulletin board of 2600 magazine,
for "complicity in computer theft," under the newly passed, and yet
untested, New Jersey Statute 2C:20-25. Police had uncovered in
April a credit carding ring operated around a Middlesex County
electronic bulletin board, and from there investigated other North
Jersey bulletin boards. Not understanding subject matter of the
Private Sector BBS, police assumed that the sysop was involved in
illegal activities. Six other computers were also seized in this
investigation, including those of Store Manager [perhaps they mean
Swap Shop Manager? - Shark] who ran a BBS of his own, Beowolf, Red
Barchetta, the Vampire, NJ Hack Shack, sysop of the NJ Hack Shack
BBS, and that of the sysop of the Treasure Chest BBS. Immediately
after this action, members of 2600 contacted the media, who were
completely unaware of any of the raids. They began to bombard the
Middlesex County Prosecutor's Office with questions and a press
conference was announced for July 16. The system operator of the
Private Sector BBS attempted to attend along with reporters from
2600. They were effectively thrown off the premises. Threats
were made to charge them with trespassing and other crimes. An
officer who had at first received them civilly was threatened with
the loss of his job if he didn't get them removed promptly. Then
the car was chased out of the parking lot. Perhaps prosecutor Alan
Rockoff was afraid that he presence of some technically literate
reporters would ruin the effect of his press release on the public.
As it happens, he didn't need our help. The next day the details of
the press conference were reported to the public by the press. As
Rockoff intended, paranoia about hackers ran rampant. Headlines got
as ridiculous as hackers ordering tank parts by telephone from TRW
and moving satellites with their home computers in order to make
free phone calls. These and even more exotic stories were reported
by otherwise respectable media sources. The news conference
understandably made the front page of most of the major newspapers
in the US, and was a major news item as far away as Australia and in
the United Kingdom due to the sensationalism of the claims. We will
try to explain why these claims may have been made in this issue. On
July 18 the operator of The Private Sector was formally charged with
"computer conspiracy" under the above law, and released in the
custody of his parents. The next day the American Civil Liberties
Union took over his defense. The ACLU commented that it would be
very hard for Rockoff to prove a conspiracy just "because the same
information, construed by the prosecutor to be illegal, appears on
two bulletin boards." especially as Rockoff admitted that "he did
not believe any of the defendants knew each other." The ACLU believes
that the system operator's rights were violated, as he was assumed
to be involved in an illegal activity just because of other people
- 70 -
under investigation who happened to have posted messages on his
board. In another statement which seems to confirm Rockoff's belief
in guilt by association, he announced the next day that "630
people were being investigated to determine if any used their
computer equipment fraudulently." We believe this is only the user
list of the NJ Hack Shack, so the actual list of those to be
investigated may turn out to be almost 5 times that. The sheer
overwhelming difficulty of this task may kill this investigation,
especially as they find that many hackers simply leave false
information. Computer hobbyists all across the country have
already been called by the Bound Brook, New Jersey office of the
FBI. They reported that the FBI agents used scare tactics in order
to force confessions or to provoke them into turning in others. We
would like to remind those who get called that there is nothing
inherently wrong or illegal in calling any ANY BBS, nor in talking
about ANY activity. The FBI would not comment on the case as it is
an "ongoing investigation" and in the hands of the local prosecutor.
They will soon find that many on the Private Sector BBS's user list
are data processing managers, telecommunications security people,
and others who are interested in the subject of the BBS, hardly the
underground community of computer criminals depicted at the news
conference. The Private Sector BBS was a completely open BBS, and
police and security people were even invited on in order to participate.
The BBS was far from the "elite" type of underground telecom boards
that Rockoff attempted to portray. Within two days, Rockoff took
back almost all of the statements he had made at the news
conference, as AT&T and the DoD [Department of Defense - Shark]
discounted the claims he had made. He was understandably unable to
find real proof of Private Sector's alleged illegal activity, and
was faced with having to return the computer equipment with nothing
to show for his effort. Rockoff panicked, and on July 31, the
system operator had a new charge against him, "wiring up his
computer as a blue box." Apparently this was referring to his
Novation Applecat modem which is capable of generating any hertz
tone over the phone line. By this stretch of imagination an
Applecat could produce a 2600 hertz tone as well as the MF which is
necessary for "blue boxing." However, each and every other owner of
an Applecat or any other modem that can generate its own tones
therefore has also "wired up his computer as a blue box" by merely
installing the modem. This charge is so ridiculous that Rockoff
probably will never bother to press it. However, the wording of
WIRING UP THE COMPUTER gives rockoff an excuse to continue to hold
onto the computer longer in his futile search for illegal activity.
"We have requested that the prosecutors give us more specific
information," said Arthur Miller, the lawyer for The Private
Sector. "The charges are so vague that we can't really present a
case at this point." Miller will appear in court on August 16 to
obtain this information. He is also issuing a demand for the
return of the equipment and, if the prosecutors don't cooperate,
will commence court proceedings against them. "They haven't
been particularly cooperative," he said.
- 71 -
Rockoff probably will soon reconsider taking Private Sector's
case to court, as he will have to admit he just didn't know what he
was doing when he seized the BBS. The arrest warrant listed only
"computer conspiracy" against Private Sector, which is much more
difficult to prosecute than the multitude of charges against some
of the other defendants, which include credit card fraud, toll
fraud, the unauthorized entry into computers, and numerous others.
Both Rockoff and the ACLU mentioned the Supreme Court in their
press releases, but he will assuredly take one of his stronger
cases to test the new New Jersey computer crime law. by seizing
the BBS just because of supposed activities discussed on it,
Rockoff raises constitutional questions. Darrell Paster, a
lawyer who centers much of his work on computer crime, says
the New Jersey case is "just another example of local law
enforcement getting on the bandwagon of crime that has come into
vogue to prosecute, and they have proceeded with very little
technical understanding, and in the process they have abused many
people's constitutional rights. What we have developing is a mini
witch hunt which is analogous to some of the arrests at day care
centers, where they sweep in and arrest everybody, ruin reputations,
and then find that there is only one or two guilty parties." We feel
that law enforcement, not understanding the information on the BBS,
decided to strike first and ask questions later. 2600 magazine and
the sysops of the Private Sector BBS stand fully behind the system
operator. As soon as the equipment is returned, the BBS will go
back up. We ask all our readers to do their utmost to support us
in our efforts, and to educate as many of the public as possible
that a hacker is not a computer criminal. We are all
convinced of our sysop's innocence, and await Rockoff's dropping of
the charges.
NOTE: Readers will notice that our reporting of the events are
quite different than those presented in the media and by the
Middlesex County Prosecutor. We can only remind you that we are
much closer to the events at hand than the media is, and that we
are much more technologically literate than the Middlesex County
Prosecutor's Office. The Middlesex County Prosecutor has already
taken back many of his statements, after the contentions were
disproven by AT&T and the DoD. One problem is that the media and
the police tend to treat the seven cases as one case, thus the
charges against and activities of some of the hackers has been
- 72 -
Phreaking AT&T Cards: By - Net Runner
My topic will deal with using an AT&T calling card for
automated calls. Ok to place a call with an AT&T card, lift the
handset (PAY PHONE) hit (0) and the desired area code and the
number to call. Also when calling the same number that the card is
being billed to you enter the phone number and at the tone only
enter the last four digits on the card. But we don't want to do
that now, do we. If additional calls are wanted all you do is hit
the (#) and you will get a new dial tone! After you hit (#) you do
not have to re-enter the calling card number simply enter your
desired number and it will connect you. If the number you called is
busy just keep hitting (#) and the number to be called until you
connect! Ok to calL the U.S. of a from another country, you use the
exact same format as described above! Ok now I will describe the
procedure for placing calls to a foreign country, such as
CANADA,RUSSIA,SOUTH AMERICA, etc.. Ok first lift the handset then
enter (01) + the country code + the city code + the local telephone
number. Ok after you get the tone enter the AT&T calling card
number. Ok if you can not dial operator assisted calls from your
area don't worry just jingle the operator and she will handle your
call, don't worry she can't see you! The international number on
the AT&T calling card is used for calling the US of A from places
like RUSSIA, CHINA you never know when you might get stuck in a
country like those and you have no money to make a call! The
international operator will be able to tell you if they honor the
AT&T calling card. Well I hope that this has straightened out some
of your problems on the use of an AT&T calling card! All you have
to remember is that weather you are placing the call or the
operator, be careful and never use the calling card from your home
phone!! That is a BIG NO NO.. Also AT&T has came out with a new
thing called (NEW CARD CALLER SERVICE) they say that it was
designed to meet the public's needs! These phones will be popping
up in many place such as airport terminals, hotels, etc... What the
new card caller service is, is a new type of phone that has a
(CRT) screen that will talk to you in a language of your choice.
The service works something like this, when you find a (NEW CARD
CALLER PHONE), all you do is follow the instructions on the (CRT)
screen, then you insert the (NEW CARD CALLER CARD) and there is a
strip of magnetic tape on the card which reads the number, thus no
one can hear you saying your number or if there were a bug in the
phone,no touch tones will be heard!! You can also bill the call to
a third party. that is one that I am not totally clear on yet! The
phone is supposed to tell you how it can be done. That is after you
have inserted your card and lifted the receiver!
- 73 -
BASIC TELECOMMUNICATIONS: By - < Net Runner >
CN/A:
CN/A, WHICH STANDS FOR CUSTOMER NAME AND ADDRESS, ARE BUREAUS
THAT EXIST SO THAT AUTHORIZED BELL EMPLOYEES CAN FIND OUT THE NAME
AND ADDRESS OF ANY CUSTOMER IN THE BELL SYSTEM. ALL #'S ARE
MAINTAINED ON FILE INCLUDING UNLISTED #'S.
HERE'S HOW IT WORKS:
1) YOU HAVE A # AND YOU WANT TO FIND OUT WHO OWNS IT, E.G. (914)
555-1234.
2) YOU LOOK UP THE CN/A # FOR THAT NPA IN THE LIST BELOW. IN THE
EXAMPLE, THE NPA IS 914 AND THE CN/A# IS 518-471-8111.
3) YOU THEN CALL UP THE CN/A # (DURING BUSINESS HOURS) AND SAY
SOMETHING LIKE, "HI, THIS IS JOHN JONES FROM THE RESIDENTIAL
SERVICE CENTER IN MIAMI. CAN I HAVE THE CUSTOMER'S NAME AT
914-555-1234. THAT # IS 914-555-1234." MAKE UP YOUR OWN REAL
SOUNDING NAME, THOUGH.
4) IF YOU SOUND NATURAL & CHEERY, THE OPERATOR WILL ASK NO
QUESTIONS.
HERE'S THE LIST:
NPA CN/A # NPA CN/A #
--- ------------ --- ------------
201 201-676-7070 517 313-232-8690
202 202-384-9620 518 518-471-8111
203 203-789-6800 519 416-487-3641
204 ****N/A***** 601 601-961-0877
205 205-988-7000 602 303-232-2300
206 206-382-8000 603 617-787-2750
207 617-787-2750 604 604-432-2996
208 303-232-2300 605 402-345-0600
209 415-546-1341 606 502-583-2861
212 518-471-8111 607 518-471-8111
213 213-501-4144 608 414-424-5690
214 214-948-5731 609 201-676-7070
215 412-633-5600 612 402-345-0600
216 614-464-2345 613 416-487-3641
217 217-525-7000 614 614-464-2345
218 402-345-0600 615 615-373-5791
219 317-265-7027 616 313-223-8690
301 301-534-11?? 617 617-787-2750
302 412-633-5600 618 217-525-7000
303 303-232-2300 701 402-345-0600
- 74 -
304 304-344-8041 702 415-546-1341
305 912-784-9111 703 804-747-1411
306 ****N/A***** 704 912-784-9111
307 303-232-2300 705 416-487-3641
308 402-345-0600 707 415-546-1341
309 217-525-7000 709 ****N/A*****
312 312-769-9600 712 402-345-0600
313 313-223-8690 713 713-658-1793
314 314-436-3321 714 213-995-0221
315 518-471-8111 715 414-424-5690
316 816-275-2782 716 518-471-8111
317 317-265-7027 717 412-633-5600
318 318-227-1551 801 303-232-2300
319 402-345-0600 802 617-787-2750
401 617-787-2750 803 912-784-9111
402 402-345-0600 804 804-747-1411
403 403-425-2652 805 415-546-1341
404 912-784-9111 806 512-828-2502
405 405-236-6121 807 416-487-3641
406 303-232-2300 808 212-226-5487
408 415-546-1341 BERMUDA ONLY
412 412-633-5600 809 212-334-4336
413 617-787-2750 812 317-265-7027
414 414-424-5690 813 813-228-7871
415 415-546-1132 814 412-633-5600
416 416-487-3641 815 217-525-7000
417 314-436-3321 816 816-275-2782
418 514-861-6391 817 214-948-5731
419 614-464-2345 819 514-861-6391
501 405-236-6121 901 615-373-5791
502 502-583-2861 902 902-421-4110
503 503-241-3440 903 ****N/A*****
504 504-245-5330 904 912-784-9111
505 303-232-2300 906 313-223-8690
506 506-657-3855 907 ****N/A*****
507 402-345-0600 912 912-784-9111
509 206-382-8000 913 816-275-2782
512 512-828-2501 914 518-471-8111
513 614-464-2345 915 512-828-2501
514 514-861-6391 916 415-546-1341
515 402-345-0600 918 405-236-6121
516 518-471-8111 919 912-784-9111
- 75 -
A little something about Your phone company: By Col. Hogan
Ever get an operator who gave you a hard time, and you didn't
know what to do? Well if the operator hears you use a little Bell
jargon, she might wise up. Here is a little diagram (excuse the
artwork) of the structure of operators
/--------\ /------\ /-----\ /-------------\
!Operator!-- > ! S.A. ! --->! BOS ! ! Group Cheif !
\--------/ \------/ \-----/ \-------------/
Now most of the operators are not bugged, so they can curse at
you, if they do ask INSTANTLY for the "S.A." or the Service
Assistant. The operator does not report to her (95% of them are
hers) but they will solve most of your problems. She MUST give you
her name as she connects & all of these calls are bugged. If the SA
gives you a rough time get her BOS (Business Office Supervisor) on
the line. S/He will almost always back her girls up, but sometimes
the SA will get tarred and feathered. The operator reports to the
Group Chief, and S/He will solve 100% of your problems, but the
chances of getting S/He on the line are nill. If a lineman (the guy
who works out on the poles) or an Installation man gives you the
works ask to speak to the Instal- lation Foreman, that works
wonders. Here is some other bell Jar- gon, that might come in handy
if you are having trouble with the line. Or they can be used to lie
your way out of situations. An Erling is a line busy for 1 hour,
used mostly in traffic studies A Permanent Signal is that terrible
howling you get if you disc- connect, but don't hang up. Everyone
knows what a busy signal is, but some idiots think that is the
*Actual* ringing of the phone, when it just is a tone "beeps" when
the phone is ringing, woul- ldn't bet on this though, it can (and
does) get out of sync. When you get a busy signal that is 2 times
as fast as the normal one, the person you are trying to reach isn't
really on the phone, (he might be), it is actually the signal that
a trunk line somewhere is busy and they haven't or can't reroute
your call. Sometimes you will get a Recording, or if you get
nothing at all (Left High & Dry in fone terms) all the recordings
are being used and the system is really overused, will probably go
down in a little while. This happened when Kennedy was shot, the
system just couldn't handle the calls. By the way this is called
the "reorder signal" and the trunk line is "blocked". One more
thing, if an overseas call isn't completed and doesn't generate any
money for AT&T, is is called an "Air & Water Call".
- 76 -
Files By Al.P.H.A
<20>Ŀ ڿ <20><><EFBFBD><EFBFBD>¿ ڿ ڿ <20>Ŀ
ڳ <20><> <20><> <20><> <20><><EFBFBD> <20><> <20><> ڳ <20><>
ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>Ĵ<EFBFBD> ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD>
ڳ<> <20><><EFBFBD> <20><>ڿ <20><>ڿ <20><> <20><>ڿڳ<DABF> <20><><EFBFBD>
<20><> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Jesters Guide to.... -
- -
- {- 950-0266's for the new Phreaker -} -
- -
- {- 11\6\89 -} -
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
This is a file I just decided to write, right after a guy that
lives near me, who runs a bbs complained about his outrageously
high phone bill, and being that I use 0266's I decided that I would
TRY to write a text file on how to use the 0266's as a simple way
of phreaking. I am not an expert on the subject and I don't claim
to be, I am just writing this file to try to help out others that
are in the same experiance level as the guy that I was talking
about previouly in the file.
There are many different types of 950's, but the type I use is
the 950-0266 and I use these because that is what I was taught with
and they seem like a fairly good, and easy way to phreak. 950-0266s
are known to have VERY clean lines, so they are perfect to use with
modems.
The basic format for these codes are:
(1) Dial 950-0266
(2) Wait for tone then dial your 7 digit Code
(3) Right after dialing your Code dial your ACN (Area Code
Number)
I.E. if I were to call my friend Joe in Utah, I would do
this... 950-0266 (tone) XXXXXXX8015551234 The X's stand for
the 7 digit code
950's have known to be dangerouse, they are on ESS (electronic
switching service) which is a phreaks nightmare. Being that 950's
are on the ESS they can, and have been known to trace. The type of
tracing service on 950's can trace in a heart beat, so there is
somewhat a great risk in using these. Some precautions about using
950s - Do NOT use the same code for more then 3 days. Try to use
different codes if you have them i.e. call one board with a code
like 2314211 , and then call the next board with a totally
different code. Use these codes during prime time, to cut the risk
of getting caught down. And use these in moderation, do not get
crazy with them.
- 77 -
I hope this file hasnt been to much of a waste of time, I hope
it has offered some help to you in using 950-0266's. I would like
to have suggestions and comments on what you think of my file. If
you have valid Input, please let me know your opinion on
Al.P.H.A.'s home Board (801)!!!
Copyright (C) 1989 by -NecroiDaemon
- 78 -
Files By Al.P.H.A
<20>Ŀ ڿ <20><><EFBFBD><EFBFBD>¿ ڿ ڿ <20>Ŀ
ڳ <20><> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD> <20><> ڳ <20><>
ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ٳ<EFBFBD><D9B3><EFBFBD>Ĵ<EFBFBD> ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD>
ڳ<> <20><><EFBFBD><EFBFBD><EFBFBD>ڿ<EFBFBD><DABF>ڿ <20><> <20><>ڿڳ<DABF> <20><><EFBFBD>
<20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-= Code Hacking - Done Right 7/17-90 =-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Code Hacking falls into both the hacking and phreaking category.
Think about it. You have to HACK in order to get codez and then you
PHREAK when you get the codez. I'm not going to go into great
detail on code phreaking, this text file is going to deal mainly
with "CODE HACKING". I get asked all the time where and how to get
codez. I'm hoping this file will clear up this question for a lot
of people. This is not my first text file, but I don't make a
habbit out of them yet!
Code Hacking, What is it:
-=-=-=-=-=-=-=-=-=-=-=-=-
Simply enough it's where you get a dial up (IE. 1-800's or
950's) and set up a code hacking program and config it to the code
you're about to hack and let it run. Now there are hundrends of
dial ups for us pkreakers/hackers to play with (I will list a few
at the end of this phile), and the code lenght and formats also
very a great deal. Now you can get your hacker set up and let it
run all night and if Gh0d's willing you might get lucky
and get a code by the next day.
Ok the best way to go about Code hacking is to get a format or
template if you perfer to call it that. Now they look like this.
801XX, where you know the first 3 digits of the code is 801, but
the last 2 digits are unknown and you have to hack out the last 2
digits. If you know all but 2 digits then you have a 1 in 100 shot
in getting a code each time your hacker trys to hack a code, of
course the longer the code or the less digits you know the less
chance you have in hacking a code. But belive me
it's never a lost cause. You can have zero digits and still get
codez.
A Lesson in Formats #1:
-=-=-=-=-=-=-=-=-=-=-=-
Ok say your going to hack 1-800-635-9135, Code lenght is 5
digits, and already have the following codez!
22199
22723
22857
22832
21099
- 79 -
Ok, think about it for a second, we have 5 codez all staring with
the # 2 and all but the last one has a 2 as the 2nd number, and the
3rd and 4th both have a 8 as the 3rd number and the 1st and 5th end
with a 99, so you could user some different formats for this code
and here the are:
22XXX
2XX99
228XX
Ok now there are a few formats for a 5 digit code. I think you
can apply this same system to 6,7 or even 8 digit codez.
Well, I hope you can understand formats or templates a little
better. Code hacking can be a long drug out process, but the way I
look at it if you spend a night letting your hacker run and get a
code and spend 5 hours or so of FREE ld calling then it's worth it.
A lesson in Formats #2:
-=-=-=-=-=-=-=-=-=-=-=-
Another probelem with code hacking is figure out or know what comes
first the CODE or ACN (Area Code Number). On 950-0488's it's ACN +
code, but on most 800's it's ACN + Code. There is really no way to
know for sure. Just make sure when you get your starter codez (The
ones you'll get your formats from) you know how to use them. If you
know this it'll save you a lot of time. The Codes I gave above are
CODE + ACN, but most 800's are ACN + Code. BTW as of the release
date of this file the 800 number listed above works, but the codez
are dead. Well thats the end of the FORMAT LESSONS.
What Code Hacker to Use:
-=-=-=-=-=-=-=-=-=-=-=-=
Well there are several hackers on the market, but your best
bet is on one of two. Code Thief Deluxe by Phortune 500 and Brew
Associates or Fucking Hacker by 2AF and Hypnacosm. I myself have
played with both but Code Thief Deluxe v 4.0 is the best on the
market. It's very user friendly and even the beginner can figure it
out, but if you have a different hacker then fell free to use it.
The Hacker you use should be the one you fell the best about. I
like Theif 4.0 and I would recommend this to any and all hackers.
The way I look at it, you can't go wrong with Phortune 500.
Dial up's and Code Lenths:
-=-=-=-=-=-=-=-=-=-=-=-=-=
1-800-222-4333 Code 6 Digits (Code + ACN)
1-800-657-9600 Code 7 Digits (Code + ACN)
1-800-327-9488 Code 13 Digits (Code + ACN)
1-800-476-4646 Code 6 Digits (Code + ACN)
1-800-234-5095 Code 6 Digits (Code + ACN)
- 80 -
950-0266 Code 7 Digits (ACN + Code)
950-0488 Code 13 Digits (ACN + Code)
Closing Notes.
-=-=-=-=-=-=-=
Well I hope the first text file from Al.P.H.A helps a few of
you out. I was sitting arond (at work of all places) when it dawned
on me I have never seen a file on code hacking, so I decided to do
one up. This file is for the beginner not the Expert, but I have
read a number of text files for beginners and have learned
something from them. So enjoy.
Speical Thanks go out to:
-=-=-=-=-=-=-=-=-=-=-=-=-
Doc Silicon - (My Partiner in Crime) for talking me into
starting this Awesome H&P group.
The Oxidizer - If it wasn't for your board, I'd of had to
spent a lot more time Code Hacking.
__________________
|Brew Associates | - For the Awesome programming work that went
into Theif
|<<<< P500 >>>>> | 3.5 and 4.0.
|Professor Falken| - For the Awesome work you did on your Phreak Tools
------------------
A Little About Al.P.H.A!
-=-=-=-=-=-=-=-=-=-=-=-=
We are a small group that plans on Hacking/Passing and Using codez.
We started Al.P.H.A because we were tired of all the want-a-be
groups we were a part of. I'm not going to state names of the
Groups, I don't want a fucking war with any of them.
Al.P.H.A is:
-=-=-=-=-=-=
Captain Kidd - Doc Silicon - Techno Cyberdaeemon - Black Beard
Cristifer Columbus - Jester - Falcon
- 81 -
Files By Al.P.H.A
Surviving at Night: By Falcon
I am writing this file with the knowledge that night survival
is a lot of common sense. I do however feel I can share some added
information that can help make the anarchists favorite time of the
day (night) a little safer and easier to work with. **note some of
the information I am writing I have taken from a article from
Combat Tactics magazine were as the rest is common sense and stuff
I've picked up though personal night missions.
The first part of surviving at night is to dress accordingly.
Common sense tell us a person in black clothing with a black mask
is harder to spot then a person in white clothing. This of course
is true, but one must also consider the fact that black is a
stereotype for burglars, the devil and trouble its self. Not to
mention a mask or painted face. That is why for most situations I
recommend wearing modern, casual clothing that does not even need
to be black. Dark blue or green etc. can accomplish the same over
all effect at night. For summer try and have shorts, and dress
accordingly to the season. Were black or dark socks and shoes. If
you are running white shoes REALLY stand out. Also as I said
before try to get around wearing a mask or face paint until the
last minute possible.
You then need your equipment. I personally have a nice black
pouch and belt I got from army navy surplus stores. I use the belt
and pouch to hold all of my equipment, so if I have to I can drop
the belt in a shadow, and look like a causal modern dressed dude
walking to a friends house. We are talking innocent!!! In my ouch
and belt I include: wire cutters, gloves black of, course to hide
my little white hands and their fingerprints. A mask so I can hide
my identity, a flashlight for seeing and destroying people's night
vision- be careful not to shine it around windows etc. The same
goes for matches, lighters because at night it is very obvious. A
few bombs (CO2 etc.) to act as diversions and blow up stuff like
mailboxes... A scope off a rifle. You would be surprise at how
well you can see using on of them in the night, especially if you
are looking toward light and your night vision is good. I do not
recommend binoculars due to they take up both eyes and if you look
into light you loose both eyes night vision.....
Also I take what ever else The situation requires. I try to
not over-do-it. For example if you are only going on a scouting
mission why danger yourself with a full load up. It is just more
trouble you can get in, if caught. But also don't be under
equipped or you could miss out on some killer opportunities. A
favorite saying of mine (a quote from my hero the legendary
assassin Jason Bourne: "opportunities will present themselves.
When they do you better be ready to use them."
- 82 -
Night vision is important. To explain how it works one can
compare the eye to a camera. The lens of an eye is like the lens
of a camera focusing light as it enters. The iris of an eye is
like the diaphragm of a camera opening and closing to allow the
correct amount of light in for the situation. The retina is like
film, light image is recorded and sent to the brain as light images
thus producing pictures. We use two kinds of cells in seeing: Cone
and Rod cells. (named due to their size).
Day vision comes from the cone cells. They enable you to see
color, sharp contrast, and shape. The cone cells cannot function
in low light levels, thus why we cannot see color at night.
The rod cells produce a substance called visual purple. This
substance allows us to see at night. If we stare at something to
long (a few seconds) all the visual purple in that spot of the eye
is used up. This cause blank outs in what we're are starting at.
To get around this problem scanning is used. Scanning is basically
moving ones eyes back and forth never focusing on one spot. This
allows the visual purple to evenly resupply itself so no black outs
occur. When scanning never move your head back and forth (I will
explain later) just your eyes.
The reason you should not move your whole head while scanning
is because the human eye is very good at detecting movement. If
you are being followed from a distance, or someone is looking for
you just freeze. If you can lay prone, or get in a nice shadow,
but in most situations you can be lost by anyone trying to find
you. However if they have already located you, or they are very
close you need to get away from them, then hide. If you are dressed
correctly and freeze you can really be hard to spot. Also keep
scanning so you don't get surprised by someone. If you must move do
it slowly (including your head to scan behind you).
A very important fact in night vision is letting your eyes
adjust to the dark. 30 minutes in the dark are required to
completely adjust and get the best night vision. (you can spend 20
of the 30 minutes in red light and get the same effect, this can
save time but who has a red lighted room?) Be careful with your
night vision. It can be lost by looking into lights, a fire, etc.
If you must go into light or look into it using a scope only use one
eye. Cover the other eye so you at least have one good night eye at
all times.
Practice these night sight tactics and become confident with
the night. It is your friend!!
At night, our sound and movement become more trustworthy.
That is why it is important to stay silent and well hidden. If you
must talk do it in whispers and try to have a sign language
- 83 -
you can use to keep from having to talk. Certain areas are very
dangerous at night. Areas like fences, rivers, roads, yards with
dogs, open areas etc. If you must cross them make sure to stake
the area out so you know it is secure, then cross the danger area
as fast as you can (don't become reckless but go fast.) Certain
danger areas like dogs can be fixed. For example you could kill
the dogs if give them meat to keep quiet.
Weapons of the night should try and be silent so they don't
give away your position. Darts, air-guns, knives, silenced weapons
etc. are best. However noise can be a great diversion. A timed
fuse on a bomb can be used to attract attention to the wrong place
allowing you to escape. Also say you are in a house and the owners
come home and you are trapped in a room. Without killing them to
get away unidentified you could beat them up with a mask on, but
what if they were bigger then you? That's when a flashlight burst
in a un-expecting face followed by a slam with your shoulders and
your quick escape come in handy. Also you could buy a tear gas gun.
I got mine for like 10-15 bucks and they are handy! You could pop
some poor sucker in the face from a few feet away, slam him then run.
The poor dude would be wondering if he had died and gone to hell as
you ran for a safe place.
An important thing at night is to know your territory. Know
were you can run and hide or get away. If you are in a new place
scout it out. Also be good about keeping plans and sticking to
them. Work in the buddy system so you aren't responsible for
looking everyplace, and lugging all the supplies etc.
Well That is all I can think of at the time, I'm sure to
remember more later.... I hope this file helps.....
- 84 -
Files By Al.P.H.A
BASIC CARDING (BY Al.P.H.A)
---------------------------
I would like to emphasize two facts:
Fact Number 1 ] Carding is dangerous, by reading this file, you
are subjecting yourself to highly illegal information
Fact Number 2 ] Due to the fact of the illegality, I take NO
responsibility for what actions might take place due to this file.
(Phew! now that that's over with...)
In this file we will discuss:
Chapter --> 1 Obtaining Cards
There are MANY ways to obtain cards, through Trashing (the art of
scrounging through Garbage cans, and dumpsters and any other places
that would be a good source of cut cards or carbons from receipts.)
But that will be discussed in Trashing files available anywhere on
your Average Phreak/Hack/Anarchy BBS/AE. You may also obtain them
off a bbs with a Carding section, but to ensure best validity, get
them yourself, as the motto goes,"If you want it done right the
first time, do it yourself."
Chapter --> 2 Identifying/Checking the card
Checking the card is very simple, and even the novice carder can do
it the first time. First, there are two ways (As far as i'm
concerned) to check the card.
1] Using Tymnet, call your local dialup, and enter "TSDCOMPSUPP"
for login. Then for the password, "HARRYHINES" will get you in.
After your in, hit "?" for help, most likely you'll be using the
option "B", remember using UPPERCASE. Where "B" is Mastercard /
Visa transaction, but if you stumble across a Carta Blanche card,
call me (Just kidding), then enter the letter for the transaction
and you're off. It'll ask you for your card number, w/o the
hyphens, then the experiation date, and amount you want to check
the card for, a reasonable amount is 500.00, but you can experiment
once you get more acquainted w/ it.
2] Using a computer voice driven checker, pevhaps a little faster,
but a little more tricky. In order to use it, you must do the
following:
Dial up the 800 watts, which is 1-800-554-2265, after you dial
- 85 -
it, it should ring and pick up, then a computer voice will say
"Enter type" and then you respond with either:
10 for Mastercard
20 for Visa
Followed by a number sign will then ask for identification, hit
"1067" preceeded by a number sign (always follow an entry w/ a
number sign). It will say some bullshit and then ask you for your
Merchant number in which you type 24 or 52 (whatever makes you
happy) and then enter the card, after done it will ask for exp.
date , then amount. Now, this is the tricky part, cuz if you fuck
up here, it's gonna Decline you and you have to start
ALL over. If your code is infact Valid, it will be followed by a
Please Wait for 30-60 seconds and a Approved and a long number,
don't worry about writing it down, just make sure to keep what you
card to the limit the card can hold, or some calls might be made.
Chapter --> 3 Using the card for purchasing
You might think everything is pretty much a snap from here, but
really this is where it gets difficult. Always order from a
Mail-Order warehouse (OF course) If you're going to order from a
Watts line, make sure you go through adleast Blue Boxing or
Diverters before connecting w/ the company, for protection on Watts
tracing.
After that, you must select an address (preferrably empty or
abandoned) to ship the cargo to. And A) you also must make an
awesomely authentic note with the card bearer's name on it saying
you are out of town, and to leave it on the doorstep or B) be bold
and face the UPS man and sign for it, but I suggest the note would
be safer in more than one way. Then, order the merchandise, and if
you don't sound old enough, get a friend or whoever to do the
talking. Another warning is that evidence has proved that
purchasing relatively small priced items takes alot of worry from
the company, thus, not resorting to do various checks on the card
and the bearer's address.
Chapter --> 4 After the order, then what...
Well, after the package has arrived, casually pick it up
(preferrably at night) and brisk it to your house. After that, I
recommend that you don't just "HAPPEN" to pass by the house and
stare it, that attracts attention, and believe me, that's the least
thing you want. Try and stay far from the location, and NEVER use
the same house twice.
I hope this file has helped you understand the BASIC principles of
Carding, there is a lot more to learn, and there are a LOT more
files like this to learn from. Stay cool... Take NOTE: The Watts
dialups for the Credit Card verification # are in effect as
- 86 -
of this date, disonnections or changes in numbers I will try to
handle. Same goes for the Tymnet verification ID & PASSWORD.
Carding:
~~~~~~~~~~
This is one that you can get in some major shit over. Well,
although it is a major crime, it is really cool!!!! This is the
process in which you find the card number of someone and use it to
purchase things. In order to card, there are a few things that
you must have or it will not work. You will need to
have........
1. The Card Number
2. The Experation date
3. Card type (Master Card, Visa, etc...)
Those are main things tha you will need. Having the name of the
owner is very helpfull but it is not a must. You can get by
without it. You have to order everything you want by mail. A
couple of "Beginner" carder that I talked to didn't understand how
you would do it, but thats when they had the misconception that you
actually go to the store and purchase things. That is a complete
No, no. You do everything from a phone ordering service. When you
call make sure that you are at a pay phone. Don't do it your house
or anywhere where it can come back to you. When you order the
merchandice, once again do send it to anywhere that it can come
back to you like your home, work, etc. Find a vacant house or
building or anywhere else that you can send it to. Also, don't
send it to a P.O. box that you have, just as dangerous. When you
do order it and you think its around the time that you will be
reciving it, check the mailbox frequently. But do it during odd
hours. I mean, hows it going to look you taking a package from a
vacant house?
Most bills are sent at the end of the month or at the biginning, so
try to time it to where the bill won't come to the person untill a
couple of days after you have recived the package. Ok heres how to
figure it. I have found out that the bills are sent out up around
the 26-30th of the month, so they will actually recive the bill
around the 31-4th. Have it sent right after you think the bill has
been sent. Find what you want, but try to order it from the place
that guarentees the fastest delivery. When you order the item,
make sure they have it in stock and don't have to get the item in
first. Order the highest class of delivery but not COD or next day
service. Thats cutting it too close. It should take around 2-4
weeks before you get it and if you timed it right, then it sound
get there right before the person gets the bill. You need to have
it in your possesion before the bill gets to the person because if
they complain, they can keep it from being sent, or watch who
actually gets it even while its going throught the mail process.
Don't order more than a couple of things or overcharge the card,
- 87 -
if the people at the Credit card office, see irregular charging on
the card, they will follow up on it.
To actually order the item you will call up the place that you will
be ordering from, and when the operator answers let her know what
you need to as far as what you are purchasing, etc. When she ask
how you will be paying just tell her "Charge" and the the type of
card like Master Card, Visa, ect. Then Tell them your name, if you
don't know the name of the actuall owner of the card, Make up a
false name that has NO relation to your name, not the same first,
last middle what ever, nothing relating to your real name. Then
continue answering all the operators questions, address (Not your
own remember!) state, area code etc. They will also ask for your
phone number. Make one up, not your own. If something happens to
go wrong as far as delivery or if they are checking if you are who
you say, then your screwed, unless of course, hehehe, the number is
ALWAYS busy. Find the busiest number there is and leave them that.
When they ask for the card number and experation, just tell them and
do what all else you need. Wish them a good day, and hope you get
it.
Ok heres how you check if the card is good, and how much money can
be charged on the card....... 1. Dail 1-800-554-2265 2. it will
ask for the type of the card. you must put in 10 for Master Card
and 20 for Visa, I am not sure about the others. 3. Next it will
ask for the Identification. You will need to enter 1067 4. After
all that you will have to enter the Mecrchant number, which you
will either need to put in 24 or 52. One of them should work. 5.
You will then have to enter (When Prompted) the card number itself.
6. Next, the experation date of the card. 7. Last but not least the
amount you want to try to get on the card. The procedure for this is
enter dollars, astricks, then cents.
(Example:)
100*30 = One hundred dollars and thirty cents.
One thing I do need to mention, after you type in everything
you must press pound (#). Like when it asks you for the type of
card, if you had a Master Card you would put: 10#. when it asked
for identification you would enter 1067#. If it says invalid, that
either means that the card is no good or you can't charge that
amount on the card. Try it again, but try a lower amount. If you
get down to $1 and it still doesn't work, hehehe,
you can probably guess that the card is no good.
You might not be ordering just merchandice you might be
ordering accounts and things like that and if you are, fine, but
you have to remember, the accounts do not stay good for very long,
the owner of the card gets the bill, complains and its no longer
any good. And when you card and account, Nine out of ten times,
they won't kill the account, they will trace in and that is when
- 88 -
you butts really in a sling. So carding accounts and
hins, isn't the safest way to go, of course. nothing we have
alked about it, right?
Introduction
carding is, in layman's terms, the use of someone elses credit card
umber to obtain free merchandise. It can be used for things that
re valuable to the BBS world like a USRobotics HST modem, or a
rand new SCSI hard drive. The reason I am writing this article is
because I, and the other notorious members of P/HARM have a
multitude of wealth that some may deem useful. When I was a wee
little mite, there was nothing to help me on my way..... So here
goes....
Obtaining #s
There are many ways to obtain a credit card number. But the thing
to remember is that there are three essentials that you need in
order to use your number. 1) The name as it appears on the card, 2)
The Card number, and 3) The actual date of expiration. These three
things are not only essential, but if you get one of them wrong, it
could send the FEDS huntin'. Okay, with that out of the way, now
comes places to find the numbers. My most favorite, but the most
time tested method is Trash bin hunting.... Nowadays with the
invention of carbonless receipts and carbons that tear in half, the
carder is less likely to find a good number in a trash can (you can
bet on getting dirty). But some stores make the fatal mistake of
not ripping up their fuck ups. A fuck up is when they run the card
number thru with the wrong amount or the lady (it's always a lady)
decides to pay cash. The clerk throws the credit voucher into the
trash, and that makes its way out to the bin where we find a
plethora of "fuck ups". The best way to get a number is off of
an actual card. If you are at a store where they take credit cards,
watch someone pay, and copy his/her number down on a business card
you just happen to have. This may seem risky, but trust me, IT'S
NOT!! A third way that is not always as effective is to hunt
mailboxes at night, Sometimes people forget to get their mail, and
inside there will be a bill from Visa or Bank of America (don't
forget that banks offer credit cards now). If you're real lucky,
you'll get an actual card. Okay, now you've got your card:
CARDING!!!!
Find a little shit mail order company that has put out a small add
in crumby production like Nuts & Volts magazine. Call this number
up and say "I'd like some information on XXXXXXXXXX", where
XXXXXXXXXX is the item you wish to get for free. Continue to ask
questions and TRY TO BARGAIN. This is important because people who
are spending their own money try to get the best deal POSSIBLE.
- 89 -
Finish the conversation by saying "Okay, let me look around and try
to find the best price." The salesperson will give you their name
and ask you to call back. Call back the next day, and continue to
BS before ordering. Once you have ordered, they will ask you for:
The card number, the name, the expiration, the mailing address
(always use a drop site, and when they say "Is this the address as
it appears on the card?" Say yes even if it isn't), and a phone
number. The best phone number to give is one that is always busy or
that of a hacked VMB. Ask for next day delivery on all packages.
Now you need to send it somewhere.
DROP SITES
A drop site is the address you want your package sent to. The best
type of drop site is that of a vacant house, or where your neighbor
is outta town. Some say to leave a note on the doorstep asking the
UPS dude to leave the package, but some companies require a
signature. Here's my plan: Stay close to the house you pick for a
drop. When you see the van pull up, walk non-chalantly over to the
delivery man and say "My neighbor asked me to pick this up for
him". Sign a fake name and walk away. Now you have your package!!!!
P/HARM Conquests:
Dual Standard HST
661 megabyte hard drive (SCSI)
330 megabyte hard drive (SCSI)
Laptop computer (Pending)
330 megger SCSI (Pending)
*********************************
* DISCLAIMER!!!!!!!! *
*********************************
This file is written as a means of information interchange only. If
you choose to try the methods described above, well that is by your
own choice, and I nor P/HARM will be held responsible for any
trouble you get yourself into. **REMEMBER carding is ILLEGAL!!!
*********************************
* DISCLAIMER!!!!!!!! *
*********************************
Information on how to card!
First of all, you need a good drop site. A drop site is a place
where you are going to have the package shipped to. The best
- 90 -
places are usally private homes where people work during the day.
A easy to way to get one, walk out your house and look around. Find
any house,write down the street address. Open up a yellow
pages,look for the fone #. Then call up the house, usally during
morning time. If there is no answer,well you got a drop site.
Next,you need a card. Humm, usally the best way to get cards is
trough CBI or TRW. I used to use a program called checksum. Its a
program that makes CC's. Then I would call 800 # card checker. Put
a $150 ammount on the card,if it was aproved then you got a real
card. I am not going to tell ya how to get cards. Next, open up any
computer realated magazine. Look for small ads, preferbly in the
west coast. Call 'em up, see if you sound like chinks, if they do
then you may have found a good place. Once you have the neccesery
items you are ready to CARD.
The following things are needed to get away with carding.
1. A good unused card.
2. Drop site.
3. Cheap copmany to order from.
4. A code to call them with.
5. A loop for reciving fone calls.
Ok. you call up the fuckers. And you talk to some rep.
I am going to help ya all get 14.4's. When you talk to the rep. use
the following lines to why you need a 14.4
1. My modem was fried by lighting,and I am in need of very
importent docs. 2. I am looking to upgrade the modem at the
office,I only have a 1200 baud.
3. Its a holiday,birthday whatever. You want to get a gift for you
son.
Ok. Next, make sure you ask for the price,any discounts on it,what
does it come with. Also make sure you tell them that you want to
know what you can do incase the modem doesnt work. Ok,Then say "Ok,
I will order this now". Then she starts asking questions. Usally
they ask for the name first. Now, I never ONCE had a real name for
all my cards. Thats why I told you to order from small companies.
Make up any name in the fuckin world. But write it down to remember
it later on. Then they will ask you for a shipping address. Give
them the address of the drop site. Say thats were you live and you
are sending it to your house. Next, they will ask for the card #.
Geeeeee, Give them the card #. Now, they will want an experation
date. People tell me that need a experation date. BULLSHIT!!. You
do not need an exp. date at all. Give them, any thing. But make
sure its with in a year or two. Not 1/96. use like 1/91 1/92 etc..
OH yeah. When they ask for the card #. I allwayes say "Hold on,
lemme get my wallet out". That makes it look like you are getting
the card out from your wallet, GEEE. Humm,Now they want a phone #
- 91 -
This is a bitch. Up untill a few months ago, I used to give them
a BBS thats allwayes busy. That works sometimes , but the best is
to use the following methood. Get a LOOP.
And say you are currently at a hotel in the loops area code. Then
say you want to go out and play raquetball or something at the
hotel. So you are not going to be around. Then ask them when are
they going to call back and shit. Sometimes if you are sure the
card is going to work, you can say if everything is ok, then ship
it. I sometimes use this; I say "My wife got a hold of my card and
went shopping, so I am not sure if the limit on the card can hold
it." then I say "Can you check to see if it gets approved
while I'll wait online". Most of the time they will "OK, hold on".
Sometimes they can say it takes a while. Who cares, just say "I am
stepping out to lunch now, can I give you a call back to check if
every-thing is ok". And they say thats fine. Make sure you dont
fuck up. And dont try to card if you have the voice of a 13 year
old. My friend has the voice of a kid and he got caught HIS FIRST
TIME CARDING BY THE FEDZ!!!!. So do not card if you are a little
kid. After you are done giving the bitch all the info. Ask to have
it shipped NEXT DAY SERVICE (RED LABEL). That way you dont have to
wait a week or so. And then you have more time hidding and shit.
Its a little bit more,but who gives a fuck. Make sure you ask how
much is for everything!!!. And when you are about to hang up. Make
sure you say thank you, Have a good day. it makes a good impresion
of them. And remember try NOT to order from 800's. Allwayes CALL
WITH A CODE. That way if you get fucked, they cant prove you called
the place and shit. Well, I am done for now. I think, I dunno.
Remember if you use this file and get shit, lemme know. I want to
know if I helped people card shit. Hehehehehhe. Me personaly have
carded more shit then your parents make in a year and shit. And
still do. I dident get caught yet. But I am going to be 18 so,
and then I will be of probation (Not for carding). So , if you
are under 16 card card card! they cant do shit to you....
Advanced Carding Techniques
CARBONS:
-------
Remember trash-picking the department store to find those little
black pieces of paper that "told all" for the CC number? Well, kiss
that old technique goodbye, the newest thing on the market that
will soon be widespread is SELF CARBONING RECIEPTS. Those do just
what they say. The "carbon" is part of the paper itself. You then
have the customer copy, and the store copy, and thats it, nothing
else. The best way to get numbers anymore is to get them from the
place you work at.
- 92 -
DROPS:
-----
Drops are as easy as they ever were, but with a few changes.
Remember how the place you call would ask you "What number can we
reach you at?" You would just give them the phone number of a
payphone that you were at, and maybe they would call you in a few
minutes to verify the order. Now they always ask this "What is your
home telephone number?" To have a successful shipment, you *MUST*
give them the correct phone number to the house that you are having
the stuff sent to. This *MUST* corrispond! What they do is this,
lets say that you give them this info:
Jim R. Jnes
132 S. Alexander
Arlington Hts, IL 60002
Home: 312-962-3342
Work: 312-564-1233 (Don't worry about this, give 'em a carrier #)
Visa: 4432-432-223-032 6/86
Bank: Second National Bank
They will then call the 312 Directory Assistance (312/555-1212) and
say something like this: "I would like the number for the JONES
residence on South Alexander-" and then the operator would either
say the number, or that she can't give it out. If the operator says
something to the effect of "I'm sorry, but I have no listing of a
JONES at this number, then your fucked, cause the store will figure
that its a fraud order, and sometimes will call VISA. Make sure
that the phone corrisponds with the drop!
CHECKING CC'S:
-------------
Go to about any store that uses credit cards, and look at the thing
that they run the credit cards through to make the carbons. On
that thing there will be an 800 number and some special numbers.
Write all these down! Ever have it where you use a card number and
it doesn't work out, and you want to check to see if the card
number is still good? Well, this is how you use those beloved
numbers you have!
Call th 800 number, a lot use this numbers:
800-221-1122 and along with those numbers you sould have found a 4
digit number and one that is long as all hell, sometimes over 10
digits long. The first number (the short one) is the BANK number,
and the other long one is the MERCHANT NUMBER. Call the 800 number
and they will usually answer with something like:
"National Data"
Say: "Bank number 1122" <==or whatever # it was
(pause, let the bitch type)
- 93 -
Say: "erchant # 541837265355" <==whatever #
(pause)
Say: "Crd number 44312-223-433-221 exp 6/86"
(pause)
Say: "Amount is $12.31"
Note: Always try to keep this number low, for
credit sake!
If the card number is still good she will say something like: "ok,
that is authorization #4423B" (or something like that) Don't worry
about this number, all you need to know is that the number is still
valid. Sometimes is the number is bad, you'll hear: "Let me repeat
that number" (and she does) then she says: "That card is a pick up"
This means that they know it is a stolen card number and if you can
get ahold of the original card, a storeowner can get $50. All this
means to you is that you can cross that number off your list.
THINGS TO CARD-THINGS *NOT* TO CARD:
-----------------------------------
I have carded at great number of things on my life, and I have
found that computer equipment is one of the hardest things to card,
'cause think about it, almost everyone who cards, will card a new
Apple Cat, or something like that. Stay away from the computer
stuff as much as possible, these are checked *VERY* well! Jewrey is
also hard to get because its so easy to resell! I once orderd a
Rolex watch on my own American Express Gold Card, and it took a
WEEK for them just to preform the credit check to make sure it was
really my card! They laughed when I said that I wanted to pay for
it by credit card, they only had 1 CC order in the past 8 months!
This was a high volume store, too! Anyways, hold of on the
diamonds, Gucci or Saks stuff, they check too much!
Airlinetickets are the easiest to card by far, and stereo equipment
too! I not to long ago got a Nakamichi Dragon cassete deck, which
is one of the best cassete decks in the world, and cost in excess
of $1000! I ordered it on a Monday, and it came on Thursday! Try to
make friends with the guys your order from, say bullshit like:
"I'll cll you when I get it and tell you how it works out!!!"
I have been really successful with this, and these tips should help
you!
- 94 -
Airlines:
--------
Everybody travels, and flying is the only way to go, but lets face
it, nobody ever has enough money to fly quite as often as we would
like. This is where carding can save you money and let you do the
things that you really want to do!
Getting Tickets:
---------------
I am assuming that you already know how to get carbons, etc. OK,
you have this stack of carbons w/ good card numbers. Next grab the
phone (and phone book). Look up AIRLINES. Call your favopite
airline and schedual yourself (under a John Doe name, of course.)
You could do this actually long in advance, to "save" Visa some
money, and maybe make it look a little more ordinary. Fdw people
take off to Rio, Brazil without planning ahead! A few days (I'm
talking 2 or 3 days AT THE MOST) before your flight is going to
leave, call up a local travel agency, but CALL THEM THROUGH AN 800
EXTENDER! Find one with the WORST connections possible, a PBX might
work great. You want the agency to think that you are not calling
local, but from across the country. Tell the lady at the agency
that your son goes to college (or something) is flying down, and
that you have made reservations for him to fly back. ONLY BUY
ONE-WAY TI CKETS! Tell them that you already have reservations. The
agency will be cool about it all, and will take your card number
and all the usual info. Tell them that your son is supposed to call
you a little later, and that you will tell him to go down and pick
up his ticket.
The key to the whole deal is that 800 extender. This makes the
agency think that there really is a father in New Jersey that wants
his son to be flown from Bakersfield to Chicago to see his brother.
It really is that easy to do, but as I said, do not get round trip
tickets. Let's say that you do and fly to wherever, and while you
are there, the guy's Visa bill comes. The airport may have some
people waiting for you when you get on! The best bet is to take a
stack of carbons and extenders with you and do the same thing to
get back.
This is the way I have flown and I have never had any problems,
whatsoever.
Basic Information About Credit Cards
There are at least three types of security devices on credit cards
that you aren't supposed to know about. They are the account
number, the signature panel, and the magnetic strip.
- 95 -
The Account Number
------------------
A Social Security card has nine digits. So do two-part Zip
codes. A domestic phone number, including area code, has ten
digits. Yet a complete MasterCard number has twenty digits. Why
so many? It is not mathematically necessary for any credit-card
account number to have more than eight digits. Each cardholder
must, of course, have a unique number. Visa and MasterCard are
estimated to have about sixty-five million cardholders each. Thus
their numbering systems must have at least sixty-five million
available numbers. There are one hundred million possible
conbinations of eight digits-- 00000000, 00000001, 00000002,
00000003, all the way up to 99999999. So eight digits would be
enough. To allow for future growth, an issuer the size of Visa
of MaserCard could opt for nine digits---enough for a billion
differnt numbers. In fact, a Visa card has thirteen digits and
sometimes more. An American Express card has fifteen digits.
Diners Club cards have fourteen. Carte Blanche has ten. Obviously,
the card issuers are not projecting that they will have billions
and billions of cardholders and need those digits to ensure a
different number for each. The extra digits are actually a
security device. Say your Visa number is 4211 503 417 268. Each
purchase must be entered into a computer from a sales slip. The
account number tags the purchase to your account. The persons who
enter account numbers into computers get bored and sometimes make
mistakes. They might enter 4211 503 471 268 or 4211 703 417 268
instead. The advantage of the thirteen-digit numbering system is
that it is unlikely any Visa cardholder has 4211 503 471 268 or
4211 703 417 268 for an account number. There are 10 trillion
possible thirteen-digit Visa numbers (0000 000 000 000;0000 000 000
0001;... 9999 999 999 999). Only about sixty-five million of those
numbers are numbers of actual active accounts. The odds that an
incorrectly entered number would correspond to a real number are
something like sixty-five million in ten trillion, or about one in
one hundred and fifty thousand. Those are slim odds. You could
fill up a book the size of this one {note, book is 228 pgs long}
with random thirteen-digit numbers such as these:
3901 160 943 791
1090 734 231 410
1783 205 995 561
9542 425 195 969
2358 862 307 845
9940 880 814 778
8421 456 150 662
9910 441 036 483
3167 186 869 267
6081 132 670 781
1228 190 300 350
4563 351 105 207
- 96 -
Still you would not duplicate a Visa account number. Whenever an
account number is entered incorrectly, iw will almose certainly
fail to match up with any of the other account nubmers in the
computer's memory. The computer can then request that the number
be entered again. Other card-numbering systems are even more
secure. Of the quadrillion possible fifteen-digit American Express
card numbers, only about 11 million are assigned. The chance of a
random number happening to correspond to an existing account number
is about one in ninety million. Taking into account all twenty
digits on a MasterCard, there are one hundred quintillion
(100,000,000,000,000,000,000) possible numvers for sixy-five
million card-holders. The chance of a random string of
digits matching a real MasterCard number is about one in one and a
half trillion. Among other things, this makes possible those
television ads inviting holders of credit cards to phone in to
order merchandise. The operators who take the calls never see the
callers' cards nor their signatures. How can they be sure the
callers even have credit cards? They base their confidence on the
security of the credit-card numbering systems. If someone calls in
and makes up a creditcard number--even being careful to get the
right number of digits--the number surely will not be an existing
real credit-card number. The deception can be spotted instantly by
plugging into the credit-card company's computers. For all
practical purposes, the only way to come up with a genuine
credit-card number is to read it off a credit card. The
number, not the piece of plastic, is enough.
Neiman-Marcus' Garbage Can
--------------------------
The converse of this is the fact that anyone who knows someone
else's card number can charge to that person's account. Police
sources say this is a major problem, but card issuers, by and
large, do their best to keep these crimes a secret. The fear is
that publicizing the crimes may tempt more people to commit them.
Worse yet, there is alomost nothing the average person can do to
prevent being victimized {muhaha} -- short of giving up credit
cards entirely. Lots of strangers know your credit-card numbers.
Everyone you hand a card to--waiters, sales clerks, ticket agents,
hairdressers, gas station attendants, hotel cashiers--sees the
account number. Every time a card is put in an imprinter, three
copies are made, and two are left with the clerk. If you charge
anything by phone or mail order, someone somewhere sees the number.
Crooks don't have to be in a job with normal access to creditcard
numbers. Occasional operations have discovered that the garbage
cans outside prestige department or specialty stores are sources
of high-credit-limit account numbers. The crooks look for the
discarded carbon paper from sales slips. The account number is
usually legible--as are the expiration date, name, and signature.
(A 1981 operation used carbons from Koontz Hardware, a West Hollywood,
California, store frequented by many celebrities.) Converting a number
into cash is less risky than using a stolen credit card. The crook
- 97 -
need only call an airline, posing as the cardholder, and make a
reservation on a heavily traveled flight. He usually requests that
tickets be issued in someone else's name for pickup at the airport
(airlines don't always ask for ID on ticket pickups, but the crook
has it if needed) and is set. The tickets can be sold at a
discount on the hot-ticket market operating in every major
airport. There are other methods as well. Anyone with a Visa or
MasterCard merchant account can fill out invoices for nonexistent
sales and submit them to the bank. As long as the account numbers
and names are genuine, the bank will pay the merchant immediately.
For an investment of about a thousand dollars, an organized
criminal operation can get the pressing machines needed to make
counterfeit credit cards. Counterfeiting credit cards in
relatively simple. There are no fancy scrolls and filigree work,
just blocky logos in primary colors. From the criminal's
standpoint, the main advantage of a counterfeit card is that it
allows him to get cash advances. For maximum plundering of a line
of credit, the crook must know the credit limit as well as the
account number. To learn both, he often calls an intended victim,
posing as the victim's bank:
CROOK: This is Bank of America. We're calling to tell you
that the credit limit on your Visa card has been
raised to twelve hundred dollars.
VICTIM: But my limit has always been ten thousand dollars.
CROOK: There must be some problem with the computers. Do
you have your card handy? Could you read off the
embossed number?
On a smaller scale, many struggling rock groups have
discovered the knack of using someone else's telephone company
credit card. When a cardholder wants to make a long-distance call
from a hotel or pay phone, he or she reads the card number to the
operator. The call is then billed to the cardholder's home phone.
Musicians on tour sometimes wait by the special credit-card-and-
collect-calls-only booths at airports and jot down a few credit
card numbers. In this way, unsuspecting businesspeople finance
a touring act's calls to friends at home. If the musicians call
from public phones, use a given card number only once, and don't
stay in one city long, the phone company seems helpless to stop
them. What makes all of these scams so hard to combat is the lead
time afforded the criminal. Theft of a credit card--a crime that
card issuers will talk about--is generally reported immediately.
Within twenty-four hours, a stolen card's number is on the issuer's
"hot list" and can no longer be used. But when only a card number
is being used illicitly, the crime is not discovered until the
cardholder recieves his first inflated bill. That's at least two
weeks later; it could be as much as six weeks later. As long as
the illicit user isn't too greedy, he has at least two weeks to
tap into a credit line with little risk.
- 98 -
The Signature Panel
-------------------
You're now supposed to erase the signature panel, of course. Card
issuers fear that crooks might erase the signature on a stolen
credit card and replace it with their own. To make alteration more
difficult, many card signature panels have a background design that
rubs off if anyone tries to erase. There's the "fingerprint"
design on the American Express panel, repeated Visa or MasterCard
logos on some bank cards, and the "Safesig" desgn on others. The
principle is the same as with the security paper used for checks.
If you try to earse a check on security paper, the wavy-line
pattern erases, leaving a white area-- and it is obvious that
the check has been altered. Rumors hint of a more elaborate
gimmick in credit-card panels. It is said that if you erase the
panel, a secret word--VOID--appears to prevent use of the card.
To test this rumor, fifteen common credit cards were sacrificed.
An ordinary pen eraser will erase credit-card signature panels,
if slowly. The panels are more easily removed with a cloth and a
dry-cleaning fluid such as Energine. This method dissolves the
panels cleanly. Of the fifteen cards tested, six had nothing under
the panel(other than a continuation of the card back design, where
there was one). Nine cards tested had the word "VOID" under the panel.
In all cases, the VOIDs were printeed small and repeated many times
under the panel. The breakdown:
Void Device Nothing
--------------------------------------
Bloomingdale's American Express Gold Card
Bonwit Teller Broadway
Bullock's MasterCard(Citibank)
Chase Convenience B.C. Neiman-Marcus
I. Magnin Robinson's
Joseph Magnin Saks Fifth Avenue
First Interstate B.C.
Montgomery Ward
Visa (Chase Manhattan)
When held to a strond light, the VOIDs were visible through the
Blooming-dales's card even without removing the panel. The VOID
device isn't foolproof. Any crimianl who learns the secret will
simply refrain from trying to earse the signature. Most
salesclerks don't bother to check signatures anyway. Moreover, it
is possible to paint the signature panel back in, over the
VOIDs--at least on those cards that do not have a design on the
panel. (Saks' panel is a greenish-tan khaki coler that would be
difficult to match with paint.) The panel is first removed with
dry-cleaning fluid. The back of the card is covered with masking
tape, leaving a window where the replacement panel is to go. A
thin coat of flat white spray paint simulates the original panel.
- 99 -
The Magnetic Strip
------------------
The other security device on the back of the card, the brown
magnetic strip, is more difficult to analyze. Some people think
there are sundry personal details about the cardholder stored in
the strip. But the strip has no more information capacitythan a
similar snippet of recording tape. For the most part banks are
reticent about the strip. The strip need not contain any
information other than the account number or similar
indentification. Any futher information needed to complete an
automatic-teller transaction-- such as current account
balances--can be called up from bank computers and need not be
encoded in the strip. Evidently, the card expiration date is in
the strip. Expired cards are "eaten" by automatic-teller machines
even when the expired card has the same account number and name as
its valid replacement card. Credit limit, address, phone number,
employer, etc, must not be indicated in this strip, for banks do
not issue new cards just because this info changes. It is not clear
if the personal identification number is in the strip or called up
from the bank computer. Many automatic-teller machines have a secret
limit of three attempts for provideing the correct personal
identification nubmer. After three wround attempts, the "customer"
is assumed to be a crook with a stolen card, going through all
possible permutations--and the card is eaten. It is possible to
scramble the information in the strip by rubbing a pocket magnet
over it. Workers in hspitals or research facilites with large
electromagnets sometimes find that their cards no longer work in
automatic-teller machines. (If you try to use a magnetically doctored
card, you usually get a message to the effect, "Your card may be
inserted incorrectly. Please remove and insert according to the
diagram.")
The Bloomingdale's Color Code
-----------------------------
Only in a few cases does the color of a credit card mean anything.
There are, of course, the American Express, Visa, and MasterCard
gold cards for preferred customers. The Air Travel Card comes in
red and green, of which green is better. (With red, you can charge
tickets for travel within North America only.) The most elaborate
color scheme, and a source of some confusion to status-conscious
queues, is that of Bloomingdale's credit department, here is how
it works: Low color in the pecking order is blue, issued to
Bloomingdale employees as a perk in their compensation packages.
The basic Bloomingdale card is yellow. Like most department store
cards, it can be used to spread payments over several months with
the payment of a finance charge. The red card gives holders three
months' free interest and is issued to customers who regularly make
large purchases. The silver card is good for unlimited spending,
but as with a travel and entertainment card, all charges must be paid
in thirty days. The gold card offers the same payment options as the
yellow card but is reserved for the store's biggest spenders.
- 100 -
Card Formats and Bank Numbers
I. PREFACE
This is my first infofile as a N.A.R.C. member. For those of you
who have read "Getting Serious about Carding by Optical Illusion",
this is a somewhat a con-tinuation of things you need to know about
carding which Optical Illusion did not cover. In this file, we'll
try to cover the aspects of the use (or shall we say misuse) of a
credit card, strategies mail order companies keep us from getting
away with carding, and a list of bank id numbers with their banks.
II. CREDIT CARDS versus CHARGE CARDS
Many people have the misconception that all cards are credit cards.
This is of course not true. For example, American Express is a
charge card and not a credit card. American Express is a charge
card since the owner of the card must pay off the whole amount when
his bill comes. If the owner doesn't, he or she is in serious shit.
One thing good about the American Express is that it has no limit
on how much the person can spend as long as the person can pay off
the bill when it comes. Basically, the card is based on the person's
good judgement on how much money the person have. Why is there
American Express Gold and regular American Express cards then? It
still has a hidden limit which you cannot buy a Corvette ZR-1 with
a regular American Express. You could however do it with a American
Express Platinum (if you can find one to abuse). This means you can
buy more expensive things at one time with a Gold or Platinum card.
Credit cards have a set limit after you you apply for the card.
Usually a Classic Visa has about $700 plus or minus $100. Mastercard
on the other hand has about $1000 limit on it.
III. TYPES OF CARDS
Credit Cards Charge Cards
VISA American Express
Mastercard American Express
Optima
Discover
Here's a couple type of cards I do not know what category they fall
into since they are never accepted by mail order companies. One of
them is Diner's Club International and the other is Carte Blanche.
- 101 -
Bank name Bank name
_______________________________--------------------------------
| | || | |
| BANK of N A R C | V I S A||BANK of N A R C | V I S A||
|________|| |________|
| | | | |
| 4000 123 456 789 |hologram| | 4000 0123 4567 8910
|hologram|
| |________| |
|________|
| 00/00 00/00 CV | ___ | | 00/00/00 00/00/00 PV|
___ |
| | // | | |
// |
| John Doe | \\__ | | John Doe Jr. |
\\__ |
--------------------------------- --------------------------
|
VISAs are grouped either |
in 4XXX XXX XXX XXX or |
4XXX XXXX XXXX XXXX. This is either a C or a P.
The 2 groupings used are different for C for Classic
(regular) each bank. There are banks' P for
Preferred (better, much better)
preferred cards that are group in 4 3 3 3.
_______________________________
| |
| |
| B A N K of N. A. R. C.| All Mastercards are 12
digits grouped
|_______________________________| in blocks of four digits each.
| ___ |
| 5000 1234 4567 8910 / \|
| |M C||
| 1234 00/00 00/00 BN | ||  Hologram
| |M C||
| Joe Card Alot \___/|
---------------------------------
BN is the Bank initials
|
1234 is the bank id number.
The bank may have more than one id number for
their 5000 XXXX XXXX XXXX series cards.
- 102 -
IV. MAIL ORDER COMPANIES
Most of the mail order companies will accept Visa or Mastercard.
Some will also accept American Express and Discover. These mail
order companies check the card by either calling into a TRW center
to check if the amount of the order will exceed the limit. In
either case of a approval or declining, the mail order companies
will call you back to check with you the order you have placed.
Anyways, a way of finding a valid card is to call a credit approval
system yourself. Here's some ways of checking:
(1) 1-800-554-2265 for check Mastercard or Visa
for Visa 20#1067#24#CARD#EXP#XX*XX#
- 10 and 20 are for the type of cards
- 1067 is the bank id number
- 24 is the merchant number (52 will also work)
- EXPiration must be in the form of 0291 for feb
of 1991
- XX*XX is the amount. Use a small number like
11*04 for $11.04.
Another way mail order companies verifying cards is to call the
bank of the card and verify the name of the person and the billing
address versus the name you gave the mail order companies and the
address (drop site). So the only way of getting pass this is to
have the stuff sent to the person's address or getting the waybill
number from the mail order houses and intercept the package at the
UPS or Federal Express office before the package arrive's at the
card owner's address.
V. VISA BANK Numbers
4428 Bank of Hoven
4128 Citibank CV
4271 Citibank PV
4929 Barclay Card CV (from England)
4040 Wells Fargo CV
4019 Bank of America CV
4024 Bank of America PV
4019 Bank of America Gold (This card looks like a CV but
without a CV afterthe expiration date)
4678 Home Federal
4726 Wells Fargo CV
4036 4561 4443 4833 4070 4735 4673 4044 4050 4226 4605 4923 4820
4048 CV 4121
- 103 -
VI. Mastercard
A. BANK NUMBERS
5419 Bank of Hoven
5410 Wells Fargo
5412 Wells Fargo
5273 Bank of America Gold
5273 Bank of America
5254 Bank of America
5286 Home Federal
5031 Maryland of North America
5326 5424 5250 5417 5215 5204 5411 5421 5329 5308 5217 5415
B. BANK ID NUMBERS
5410 Wells Fargo -- 1037
5410 Wells Fargo -- 6785
5419 Bank of Hoven -- 1933
5410 Wells Fargo -- 6037
5204 -- 1006
5250 -- 1260
5215 -- 6207
5424 -- 1065
5411 -- 1169
5421 -- 2143
5417 -- 1786
5417 -- 1711
5415 -- 1530
VII. AMERICAN EXPRESS
3728 GOLD
3713 Regular
3732 Regular
3737 3782 3731 3724 3742 3727 3787 3726 3766 3734 3749 3763 3710
3718 3720 3739
Carding For Benfit And Profit
First off, there are many types of credit cards. But the main ones
we will be discussing are American Express, Discover, Mastercard,
and Visa. These four are the largest and most widely used types. My
personal favorite is the Discover card, since the company is a real
loser. It is best for the beginner to start out with Discover, then
move to American Express, then to Mastercard, and finally visa,
- 104 -
The first thing you have to do is to find a credit card number
(we will be refering to them as CCNs). There are several different
ways of going about this, which will be discussed later in this file.
The way you can tell the cards apart are the first digit of the CCN.
Digit Type of Card
------- ------------
3 American Express
4 Visa
5 Mastercard
6 Discover
Now that you know the first digit of the card you want you need the
different CCN formats. They are listed below.
American Express
3xxx-xxxxxx-xxxxx
Visa
4xxx-xxxx-xxxx-xxxx
or
4xxx-xxx-xxx-xxx
Citibank Visa, which is by far the most popular is
4128-xxx-xxx-xxx
Mastercard
5xxx-xxxx-xxxx-xxxx
The type of Mastercard I use is Citibank which is
5424-xxxx-xxxx-xxxx
Discover
6xxx-xxxx-xxxx-xxxx
There are a number of ways through which you can get CCNs. They are
listed below in order of easiest method to hardest method.
1) Go for a little swim. That is, in a big dumpster. This is called
trashing. Go in back of department store or anywhere that accepts
credit cards and jump in. But make sure it's not at a mall, or
- 105 -
someone might see you and contact the police. When you've
found the perfect dumpster, just dive right in. Just look around
for carbons. You know, the things that the salesperson throws away
after a credit card purchase. If anyone sees you, just pretend
you're a bum. Or if that won't work, pretend you're looking for
your baseball that flew in. Once you find these, (and making sure
you don't rip them) put them in your cap, or somewhere where they
won't fall out, and just calmly go home. Now comes the easy part.
You just copy down everything important. The CCN, Expiration date,
and Name. Then you rip it up into shreds and burn them. Now there is
no way you can get caught unless you're a REAL idiot. 2) If you have
a friend (it's better if it's a fellow pirate) that works in a store
which performs credit card transactions, you might save yourself the
trouble of trashing and ask him if he doesn't mind slipping some
carbons into a bag after they ring up a sale. If he won't, bribe
by saying you'll get him something too.
Carbons
______________________________________
| (1) (2) |
| (3) (4) |
| (5) |
| |
|____________________________________|
(1) The Account Number. This is the most important thing on a
Credit Card. (2) The Expiration date for Visa or Mastercard (3) The
Expiration date for Visa or Mastercard (4) The Expiration date for
American Express (5) The Card Holder's name. The name is not very
important but it is good to have. 3) If are really advanced, you
can use a credit card formula, several do exist. If you're good at
math and patterns, you should be able to figure out at least one
formula. Once you have a newly formulated or newly found Credit
Card, you have to first check to see if it is still valid before
you try to use it. The easiest way I know of, is 1-800-554-2265.
But after you enter something you must enter a pound. Just look at
the example if you're confused. You must first, of course, dial
1-800-554-2265. Then it should say "Enter type".
Number Card Type
------ ---------
10# Mastercard
20# Visa
30# American Express
Then it will ask you for "Bank identification". Just enter 1067#.
Now it will request a Merchant Number. Enter either 24# or 52#.
Either one should work. Now it will ask you for the card number.
Enter it in with a # sign following it. Then it will ask for the
expiration date. Enter it with a # sign following it. And last,
- 106 -
but not least, it will ask for the amount. This is a little
rickier. Look at the examples. If you still don't understand it,
hen you're dumb, and you shouldn't be trying to card. For $100.25
ou enter 100*25#. For $1,532.67 you enter 1532*67#. Got it? Good.
ow the moment of truth comes. In the next few seconds the computer
will say Approved or Declined. Yes or No. Light or Dark. If it's
approved, pat yourself on the back. If not, too bad. Go look for
another one.
* SPECIAL NOTE *
In Canada dial 416-785-3222 for Visa credit checks or dial
1-800-268-2439 for Mastercard credit checks. For a Visa credit
check in Canada, you first dial the authorization center and a
operator will answer. Then you will be ask for the card number,
amount of purchase, merchant # and expiry date. If the card is good
then she'll tell you the authorization number. If the card is
invalid then she'll say that the number was invalid. For a
Mastercard credit check in Canada, you first dial the authorization
center and a automated computer will answer. It will ask you if you
want it in French or English, so if you want English punch in 1, or
if you want French punch in 2. Next it will ask you for the "Credit
Card Number". Just punch in the Mastercard number and the press the
# sign following the number. Next it will ask you for the "Amount In
Dollars Only", so press in the amount and then the # sign following
it. Next it will ask for a "Merchant #", this can be skipped by
just pressing the # sign. After that it will ask for a "Expiry
Number". Punch the expiry number in and press a # sign following it,
if you made a mistake punching in the amount, then from here you press
2 and change the amount of the purachse. After all that it will come
back and if it's valid, it will tell you an authorization number,
otherwise it will say that the number was invalid. If the amount is
too high, then it will tell you to hold on for an operator. And
then the operator will verify the card for you.
*****************************************************************
ONE NOTE: IF A CARD HAS $5000 AND YOU VERIFY IT FOR $3000 DOLLARS,
YOU CAN ONLY VERIFY IT FOR $2000 MORE. ANOTHER EXAMPLE IS IF THE
CARD HAS $3000 AND YOU VERIFY IT FOR $1250, THE CARD CAN BE
VERIFIED $1750 MORE BEFORE IT WILL SAY DECLINED.
*****************************************************************
Now for the hardest part of all, purchasing merchandise with your
newly verified CCN. You will probably want some computer equipment,
knowing that that's what most people want. And be sure to read this
entire file before attempting to card something. If you don't, you
might get caught and spend ten years in jail and never be able to
get another decent job again, just because you didn't listen to me
and read this entire file. Now that I have your attention, we must
lay down some rules for ordering merchandise to insure your safety.
1) Always go to a pay phone.
- 107 -
2) Never give out your real name. 3) Or your address and telephone
number. 4) Plan out the drop site and the fake number. I use the
busiest PD board there is. 5) Sound calm. Remember, they can't do
anything to you. 6) If they get suspicious, just keep sticking to
the same story. A consistent lie is better than a inconsistent
truth. Where should I ask them to ship it to? This is a common
question. The best place to have the merchandise shipped to is an
abandoned house. The sites where you want them shipped are called
drop sites. Jot down this address. Now that we have set those rules,
we now have to call a store. Make sure it is a small store, for they
don't have the card checking techniques the bigger ones do. Now when
they ask you your name and stuff like that, just give them the fake
ones, without hesitation!! If you hesitate then they might get
suspicious. Even spell it out for them. And try to be friendly. Don't
sound nervous or anything. Now if they are online to credit bureaus
suck as CBI or TRW then make up an excuse, like have your friend
threaten you in the background (or something). If they are online
with CBI or TRW they can verify everything in just a couple of
minutes. Now if they aren't then you're in luck. Now when they ask
for a number, give them the number you have ready. Bullshit your
way through. If they aren't online, they can't verify really
anything but that the CCN is valid and there is enough credit to
pay for the merchandise. I wouldn't suggest making a business out
of this, either. Sure, if you want to get a few dollars for things
you order (and that you don't want anymore) sell it and keep the
money. It wouldn't be all that great to go to jail for ten years
and never get another decent job in your whole entire stinking life,
just because someone you don't even know, wanted a bigger hard drive
for $100? Yeah, you know I have a good point there. Well, the truth
is that the only people that should really even make deals are the
people with lots of experience.
And now how to card Travelers Checks. These are alot easier
than what I just talked about. All you gotta do is call
1-800-777-7337 and use an American Express card and ship it to your
drop site. Now just go to another country and spend away. Have fun.
Now for the most dangerous way of carding, by far. In person
carding. But you get the stuff really quick. Now you need a fake
name again. This time you need two. Your dad and a son. Lets say
your name is Robert Armstrong. Look at the example.
"Hello, Computers for less, how may I help you?"
"Yes, this is Robert Armstrong calling from California (or
somewhere across the country). My son, Mike, needs an Apple II. It
says here in your ad that you sell them for such and such. I would
like to place an order for one."
"OK. And how will you be paying for this?"
"Visa."
- 108 -
"OK. Number?"
"4xxx-xxxx-xxxx-xxxx."
"OK, thank you. Now how do you want this shipped?"
"Well, since my son is going to college right next to you, I
thought I could send him to go pick it up."
"Oh, OK. Sure. Do you want us to call your son to notify him?"
"No, that's ok. He's supposed to call in a couple of minutes. He
always calls me at 5:00PM every Friday. I can't wait to hear what
he says when he hears what I got him. When can he go pick it up?"
"Anytime."
"Ok, thank you.
"Thank you for ordering from Computers for Less."
<CLICK>
Now comes the most dangerous part. Go to the store, park your
car where none of the employees can see it. Now go in and state
your fake name and what you are there to pick up. In Mike's case...
"Hello. I'm here to pick up an Apple II my dad bought for me."
"OK, sure. Mike Armstrong?"
"Yes, that's me."
"Ok, wait. We'll bring it up right now."
"Thank you."
"Well, here you are."
<TAKE>
"OK, Thank you."
"No problem. Thank you for ordering from Computers for Less."
Now just walk over to your car and drive off. I wouldn't really
recommend this method, but if you're desperate, try it. Now if they
get suspisious, don't get nervous. Just start complaining. Say like
"My dad paid good money for this system and now you won't give it
to me?" If they still won't give it to you, then say, "Ok, I'll
come tommorrow. But if it isn't ready tommorow I'm going to tell
- 109 -
my dad to get a refund." Then walk out really pissed looking
and never go back. They were probably setting up a trap for
you. Better safe than sorry. Now I'll explain what happens to the
unlucky guy. The guy's CCN you used of course. Now let's pretend
this unfortunate soul's name is John Doe. At the end of the month,
John Doe gets his Visa bill from the bank's credit card department.
Among the things on his bill he notices a VGA card and monitor.
John Doe then calls his bank and starts cussing them out and
asking where the fuck did they get the VGA card and monitor from.
Then the bank should send him a xerox copy of the original reciept,
showing when it was bought and where it was sent to, and the second
is an affidiate. This is a formal document saying that you did not
make the purchase, you do not know who did, and did not authorize
this purchase. It must be signed by him and then brought to the bank
and signed by a notary public and have the bank's stamp on it. From
there the bank can either go to their insurance agent or Visa,
depending on who they have a deal with, and be paid for the carded
stuff. Then John Doe must cut his cards in half and send them to the
bank. After he has done that, he is re-issued new cards with a new CCN.
How to Find Credit Cards: carbons or other methods
II. Trash Digging
Although not the most fun method of getting CCs it is the safest by
far. It does not take much intelligence to go through a dumpster
and look for credit card carbons... But I assure you even the most
experienced carders use this method. The way this is done is to
find a store that people always or almost always use credit cards.
It must also have a dumpster or trashcan where its garbage is
dumped that is out of plain sight. Wait for the store to close or
go when few people are around and search for ripped up carbons.
Then piece them together and you should get full or partial
information.
III. Slight of Hand
Another method which I myself often use is this trick on
ususpecting customers...If you work as a cashier at a store that
accepts credit cards you have an excellent opportunity to get card
numbers and full info. What you need to do is when someone comes in
and buys something via credit card, you wait for him/her to rip up
the carbon and throw it out, if he/she throws it out in the stores
trashcan, pick up the cardbon right away. Or sometimes the person
will not even ask for his/her carbon, although this is somewhat rare.
But I have even had someone leave their actuall credit card behind,
then I just copy the name and number down, and give it back.
- 110 -
IV. Mailbox Searching
This is basically a very lame way to get credit cards due to the
danger and in order to get CCs this way you get the actuall card.
What you do is have a bunch of pointless flyers made up, and goto
a decent neighborhood away from your area of residence that has
homes with accesable mail boxes. Wear sunglasses and a baseball
hat if possible, although don't wear the shades on a cloudy day.
Do this during school time if possible so you are not seen. What
you do is go by each persons mail box and put a flyer in it (Which
in itself is illegal, but few people know this) and while you are
doing so search the mail for envelope from banks. If you happen
to find one from a bank slip it into your pile of flyers and sneak
off to open it. If it has a CC in it then you are in luck. Go
home and prepare to card, because you don't have much time until
the card will go bad probably. This method is not a very good one,
use only if you are desperate.
V. TRW
I will keep this short because this uses more hacking than
carding... But one method is to hack the local TRW system and you
can get full info on a card with name and number. What you do is
find a carbon with partial info some other way (Must be name and
number) and check TRW for it, then you will get full info.
Personnally, I never hacked TRW on my own although it can be done.
Also, you may know some big time hacker through bbsing,
have him hack TRW for you and get the info in exchange for carding
him something.
VI. Trading info
Another way to get credit card numbers is to just trade information
of some sort to someone who has a steady supply of credit cards.
Maybe this would be phreaking codes, or dialups, or maybe some
bank numbers, or even money I suppose(This would make you a lamer
in my book) . There are many people out there who have connections
you don't, and some may even give you the numbers and such for free.
VII. VMB's and Carding Subs
This is basically self explanitory. There are many Voice Mail
Boxes or VMBs that have cards with full info on them, and they are
not that hard to get the number to, just e-mail some people you
know, maybe they know of one. Just, once in a while put in a
valid card and then all will go well. Also many elite systems have
their own carding sub, there will be valid cards on these subs for
the taking. Don't be shy, although if the card number is really
old don't bother, you are just asking to get caught.
- 111 -
VIII. Connections
Maybe you know someone who can do one of the above methods. Don't
be afraid to ask for his help. Maybe this person is a cashier that
can get you a steady supply of credit card numbers with names.
Then get those to someone who hacks TRW and then you will get the
full info on several cards and be able to take you pick and return
the favor to some VMBs you leeched card numbers off of...It all
works out very nicely...
- 112 -
THE BAUDY WORLD OF THE BYTE BANDIT: A POSTMODERNIST INTERPRETATION
OF THE COMPUTER UNDERGROUND
An earlier version of this paper was presented at the American
Society of Criminology annual meetings, Reno (November 9, 1989).
Authors are listed in alphabetical order. Address correspondence
to Jim Thomas. We are indebted to the numerous anonymous computer
underground participants who provided information. Special
acknowledgement goes to Hatchet Molly, Jedi, The Mentor,
Knight Lightning, and tran King.
ABSTRACT
The criminalization of "deviant acts" transforms social meanings
into legal ones. Yet, legal meanings are not necessarily social
meanings. The legitimacy of statutory social control generally
requires that one accept the realist textual readings of those
with the power to interpret and stigmatize behaviors as
inappropriate. "Moral crusades" that lead to definitions of
criminalized deviance tend to reduce the meanings of polysemic
acts to unidimensional ones that limit understanding of both the
nature of the acts and their broader relationship to the culture
in which they occur. This has occured with the criminalization of
computer phreaking and hacking. In this paper, we examine the
computer underground as a cultural, rather than a deviant,
phenomenon. Our data reveal the computer underground as an
invisible community with a complex and interconnected culture,
dependent for survival on information sharing, norms of
reciprocity, sophisticated socialization rituals, and an explicit
value system. We suggest that the dominant image of the computer
underground as one of criminal deviance results in a failure to
appreciate cultural meaning. We conclude by arguing that there
are characteristics of underground activity that embrace a
postmodernist rejection of conventional culture. Hackers are
"nothing more than high-tech street gangs" (Federal Prosecutor,
Chicago). Transgression is not immoral. Quite to the contrary, it
reconciles the law with what it forbids; it is the dialectical game
of good and evil (Baudrillard, 1987: 81). There ain't no sin
and there ain't no virtue. There's just stuff people do. It's
all part of the nice, but that's as far as any man got a right to
say (Steinbeck, 1939:31-32).
The criminalization of "deviant acts" transforms and reduces social
meanings to legal ones. Legal meanings are not necessarily social
meanings. Most deviancy research tends to reproduce conventional
social ideology and operative definitions of normality within its
concepts and theories. On occasion, these meanings represent a
form of "class politics" that protect the power and privilege of
one group from the challenge of another: Divorcing moral crusades
from status group competition while denying that cultures are
linked to social classes has undermined attempts to link lifestyle
- 113 -
politics to group struggles (Beisel, 1990: 45). Once a category of
behaviors has become defined by statute as sanctionably deviant,
the behaviors so-defined assume a new set of meanings that may obscure
ones possessed by those who engage in such behaviors. "Computer
deviants" provide one example of a criminalized type of "lifestyle
politics."
The proliferation of computer technology has been a accompanied by
the growth of a computer underground (CU), often mistakenly
labeled "hackers," that is perceived as criminally deviant by the
media, law enforcement officials, and researchers. Drawing from
ethnographic data, we offer a cultural rather than a
criminological analysis of the underground by suggesting that it
reflects an attempt to recast, re-appropriate, and reconstruct
the power-knowledge relationship that increasingly dominates the
ideology and actions of modern society. Our data reveal the
computer underground as an invisible community with a complex and
interconnected cultural lifestyle, an inchoate anti-authoritarian
political consciousness, and dependent on norms of reciprocity,
sophisticated socialization rituals, networks of information
shaand an explicit value system. We interpret the CU culture as
a challenge to and parody of conventional culture, as a playful
attempt to reject the seriousness of technocracy, and as an ironic
substitution of rational technological control of the present for
an anarchic and playful future. Stigmatizing the Computer Underground
The computer underground refers to persons engaged in one or more of
several activities, including pirating, anarchy, hacking, and
phreaking[1]. Because computer underground participants freely
share information and often are involved collectively in a single
incident, media definitions invoke the generalized metaphors of
"conspiracies" and "criminal rings," (e.g., Camper, 1989; Zablit,
1989), "modem macho" evil-doers (Bloombecker, 1988), moral bankruptcy
(Schwartz, 1988), "electronic trespassers" (Parker: 1983), "crazy
kids dedicated to making mischief" (Sandza, 1984: 17), "electronic
vandals" (Bequai: 1987), a new "threat" (Van, 1989), saboteurs
("Computer Sabateur," 1988), secret societies of criminals (WMAQ,
1990), and "high-tech street gangs" ("Hacker, 18," 1989). These
images have prompted calls for community and law enforcement vigilance
(Conly and McEwen, 1990: 2) and for application of the Racketeer
Influenced and Corrupt Organizations (RICO) Act to prosecute and
control the "criminals" (Cooley, 1984). These images fail to
distinguish underground "hobbyists," who may infringe on legal norms
but have no intention of pillaging, from felonious predators, who
use technology to loot[2]. Such terminology provides a common stock
ofknowledge that formats interpretations of CU activity in ways
pre-patterned as requiring social control to protect the common
weal (e.g., Altheide, 1985). As Hollinger and Lanza-Kaduce (1988:
119), Kane (1989), and Pfuhl (1987) observed, the stigmatization
of hackers has emerged primarily through value-laden nedia
- 114 -
depictions. When in 1990 a Cornell University graduate student
inadvertently infected an in ternational computer network by
planting a self-reproducing "virus," or "rogue program," the news
media followed the story with considerable detail about the dangers
of computer abuse (e.g., Allman, 1990; Winter, 1988). Five years
earlier, in May of 1983, a group of hackers known as "The 414's"
received equal media attention when they broke into the computer
system of the Sloan Kettering Cancer research center. Between
these dramatic and a typical events, the media have dramatized the
dangers of computer renegades, and media anecdotes presented
during Congressional legislative debates to curtail "computer
abuse" dramatized the "computer hacking problem" (Hollinger
and Lanza-Kaduce, 1988: 107). Although the accuracy and
objectivity of the evidence has since been challenged (Hollinger
and lnza-Kaduce 1988: 105), the media continue to format CU activity
by suggesting that any computer-related felony can be attributed to
hacking. Additionally, media stories are taken from the accounts of
police blotters, security personnel, and apprehended hackers, each of
whom have different perspectives and definitions. This creates a
self-rein-forcing imagery in which extreme examples and cursively
circulated data are discretely adduced to substantiate the claim of
criminality by those with a vested interest in creating and
maintaining such definitions. For example, Conly and McEwen (1990)
list examples of law enforcement jurisdictions in which special units
to fight "computer crime," very broadly defined, have been created.
These broad definitions serve to expand the scope of authority and
resources of the units. Nonetheless, despite criminalization, there
is little evidence to support the contention that computer hacking
has been sufficiently abusive or pervasive to warrant prosecution
(Michalowski and Pfuhl, forth-coming). As an antidote to the
conventional meanings of CU activity as simply one of deviance,
we shift the social meaning of CU behavior from one of stigma to
one of culture creation and meaning. Our work is tentative, in
part because of the lack of previous substantive literature and in
part because of the complexity of the data, which indicate a
multiplicity of subcultures within the CU. This paper examines
of two distinct CU subcultures, phreaks and hackers, and
challenges the Manichean view that hackers can be understood simply
as profaners of a sacred moral and economic order. The Computer
Underground and Postmodernism: The computer underground is a culture
of persons who call computer bulletin board systems (BBSs, or just
"boards"), and share the interests fostered by the BBS. In
conceptualizing the computer underground as a distinct culture,
we draw from Geertz's (1973: 5) definition of culture as a system
of meanings that give significance to shared behaviors that must
be interpreted from the perspective of those engaged in them. A
culture provides not only the "systems of standards for perceiving,
believing, evaluating, and acting" (Goodenough, 1981: 110), but
includes the rules and symbols of interpretation and discourse for
- 115 -
partici-pants: Incrude relief, culture can be understood as a set
of solutions devised by a group of people to meet specific problems
posed by situations they face in common. . . This notion of culture
as a living, historical product of group problem solving allows an
approach to cultural study that is applicable to any group, be it
a society, a neighborhood, a family, a dance band, or an
organization and its segments (Van Maanen and Barley, 1985: 33).
Creating and maintaining a culture requires continuous individual
or group processes of sustaining an identity through the coherence
gained by a consistent aesthetic point of view, a moral conception
of self, and a lifestyle that expresses those conceptions in one's
immediate existence and tastes (Bell, 1976: 36). These behavioral
expressions signify a variety of meanings, and as signifiers they
reflect a type of code that can be interpreted semiotically, or as
a sign system amenable to readings independent of either
participants or of those imposed by the super-or-dinate culture:
All aspects of culture possess a semiotic value, and the most
taken-for-granted phenomena can function as signs: as elements
in communication systems governed by semantic rules and codes
which are not themselves directly apprehended in experience.
These signs are, then, as opaque as the social relations which
produce them and which they re-present (Hebdige, 1982: 13). It is
this symbolic cultural ethos, by which we mean the style, world
view, and mood (Hebdige, 1979), that reflects the postmodernist
elements of the CU and separates it from modernism. Modernist
culture is characterized especially by rationality, technological
enhancement, deference to centralized control, and mass
communication. The emergence of computer technology has created
dramatic changes in social communication, economic transactions,
and information processing and sharing, while simultaneously
introducing new forms of surveillance, social control, and
intrusions on privacy (Marx, 1988a: 208-211; Marx and
Reichman, 1985). This has contributed to a: richly confused
and hugely verbal age, energized by a multitude of competing
discourses, the very proliferation and plasticity of which
increasingly deter mine what we defensively refer to as our
reality (New- man, 1985: 15). By Postmodernism we mean a reaction
against "cultural moder- nity" and a destruction of the constraints
of the present "maximum security society" (Marx, 1988b) that reflect
an attempt to gain control of an alternative future. In the CU world,
this constitutes a conscious resistance to the domination of but not
the fact of technological encroachment into all realms of our social
existence. The CU represents a reaction against modernism by
offering an ironic response to the primacy of a master technocratic
language, the incursion of computers into realms once considered
private, the politics of techno-society, and the sanctity of
established civil and state authority. Postmodernism is
characterized not so much by a single definition as by a number of
interrelated characteristics, including, but not limited to:
- 116 -
1. Dissent for dissent's sake (Lyotard, 1988).
2. The collapse of the hierarchical distinction
between mass and popular culture (Featherstone,
1988: 203).
3. A stylistic promiscuity favoring eclecticism and
the mixing of codes (Featherstone, 1988: 203).
4. Parody, pastiche, irony, playfulness and the
celebration of the surface "depthlessness" of
culture (Featherstone, 1988: 203).
5. The decline of the originality/genius of the
artistic producer and the assumption that art
can only be repetitious (Featherstone 1988: 203).
6. The stripping away of social and perceptual
coordinates that let one "know where one is"
(Latimer, 1984: 121).
7. A search for new ways to make the unpresentable
presentable, and break down the barriers that
keep the profane out of everyday life (Denzin,
1988: 471).
8. The introduction of new moves into old games or
inventing new games that are evaluated
pragmatically rather than from some uniform
stand point of "truth" or philosophical
discourse (Callinicos, 1985: 86).
9. Emphasis on the visual over the literary
(Lash, 1988: 314).
10. Devaluation of formalism and juxtaposition of
signifiers taken from the banalities of everyday
life (Lash, 1988: 314).
11. Contesting of rationalist and/or didactive views
of culture (Lash, 1988: 314).
12. Asking not what a cultural text means, but what
it does (Lash, 1988: 314).
13. Operation through the spectator's immersion, the
relatively unmediated investment of his/her
desire in the cultural object (Lash, 1988: 314).
14. Acknowledgement of the decenteredness of modern
life and "plays with the apparent emptiness of
modern life as well as the lack of coherence in
modern symbol systems" (Manning, 1989: 8).
"Post-Modernism" in its positive form constitutes an intellectual
attack upon the atomized, passive and indifferent mass culture
which, through the saturation of electronic technology, has
reached its zenith in Post-War American (Newman, 1985: 5). It is
this style of playful rebellion, irreverent subversion, and
juxtaposition of fantasy with high-tech reality that impels us to
interpret the computer underground as a postmodernist culture.
Data and Method: Obtaining data from any underground culture
requires tact. BBS operators protect the privacy of users and
access to elite boards, or at least to their relevant security
- 117 -
levels, virtually always requires completion of a preliminary
questionnaire, a screening process, and occasional voice
verification. Researchers generally do not themselves violate laws
or dominant norms, so they depend on their informants for
potentially "dirty information" (Thomas and Marquart, 1988). Our
own data are no exception and derive from several sources. First,
the bulk of our data come from computer bulletin board systems.
BBSs are personal computers (PCs) that have been equipped with a
telephone modem and special software that connects users to other
PCs by telephone. After "logging in" by supplying a valid user
name and password, the user can receive and leave messages to
other users of the system. These messages are rarely private and
anyone calling the BBS can freely read and respond to them. There
is usually the capacity to receive (download) or send (upload) text
files ("G-philes") or software programs between the caller and
host system. We logged the message section of CU BBSs to compile
documentary evidence of the issues deemed important for
discussion by participants. Logs are "captured" (recorded using
the computer buffer) messages left on the board by users.
Calculating the quantity of logged data is difficult because of
formatting variance, but we estimate that our logs exceed 10,000
printed pages. The logs cited here are verbatim with the
exception of minor editing changes in format and extreme
typographical errors. Identifying underground BBSs can be
difficult, and to the uninitiated they may appear to be licit
chat or shareware boards. For callers with sufficient access,
however, there exist back-stage realms in which "cracking"
information is exchanged and private text or software files
made available. With current technology, establishing a BBS
requires little initial skill. Most boards are short-lived and
serve only local or regional callers. Because of the generally
poor quality and amateur nature of these systems, we focused on
national elite boards. We considered a board "elite" if it met
all of the following characteristics: At least one quarter of the
users were registered out side the state of the board called; the
phone line were exclusively for BBS use and available 24 hours a
day; and the information and files, warez were current "state of
the field." Elite CU members argue that there are less than ten
"truly elite" p/hacker boards nationally. We obtained the names
and numbers of BBSs from the first boards we called, and used a
snowball technique to supplement the list. We obtained additional
numbers from CU periodicals,and, as we became more familiar with t
he culture, users also added to the list. Our aggregate data
include no less than 300 Bulletin board systems, of which at least
50 attract phreaks and hackers, and voice or on-line interviews with
no less than 45 sysops (operators of BBS systems) and other active
CU participants. A second data source included open-ended voice and
on-line interviews with hackers, phreaks and pirates. The data
include no less than 25 face-to-face, 25 telephone, and 60 on-line
interviews obtained as we became familiar with our informants. Third,
data acquisition included as much participation as legally possible in
- 118 -
CU activities[3]. This served to justify our presence in the culture
and provided information about the mundane activity of the CU.
Finally, we obtained back and current issues of the primary
underground computerized magazines, which are distributed on national
BBSs as text files. These contain information relevant to the
particular subculture, and included PHRACK, Activist Times
Incorporated (ATI), P/Hun, 2600 Magazine, PIRATE, TAP, Al.P.H.A
and Legion of Doom (LoD/H). We also draw data from national and
international electronic mail (e-mail) systems on which an active
information-sharing CU network has developed and spread. Assessing
the validity and reliability of data obtained in this manner
creates special problems. One is that of sampling. The number of
boards, their often ephemeral existence, and the problem of
obtaining access makes conventional sampling impossible. We
focused on national boards and engaged in theoretical sampling
(Glaser and Strauss, 1967: 45-77). We consider our sample
representative, and accept Bordieu's observation that: If,
following the canon dictated by orthodox methodology, you take a
random sample, you mutilate the very object you have set out to
construct. If, in a study of the field of lawyers, for instance,
you do not draw the President of the Supreme Court, or if, in an
inquiry into the French intellectual field of the 1950s, you
leave out Jean-Paul Sartre, or Princeton University in a study of
American academics, your field is destroyed, insofar as these
personas or institutions alone mark a crucial position--there are
positions in a field which command the whole structure (Bordieu,
interviewed in Wacquant, 1989: 38). We judge our sample of
participants adequate for several reasons. First, we presume
that the members with whom we have had contact comprise the elite
members of the culture, as determined by the nature of the boards
they were on, references to them on national boards, the level of
expertise displayed in their messages, and their appearance in the
"user lists" of elite boards. We consider the BBSs to be "typical
exemplars" because of their status in the
culture, because of the level of sophistication both of users and
of message content, and because of references to these boards as
"elite" in CU periodicals.
The computer underground is both a life style and a social
network. As a lifestyle, it provides identity and roles, an
operational ideology, and guides daily routine. As a social
net-work, it functions as a communications channel between
persons engaged in one of three basic activities: Hacking,
phreaking, and pirating[4]. Each subgroup possesses an explicit
style that includes an ethic and "code of honor," cohesive norms,
career paths, and other characteristics that typify a culture
(Meyer, 1989a, 1989b;; Meyer and Thomas, 1989). Hebdige (1982:
113-117) used the concept of homology to describe the structural
unity that binds participants and provides the "symbolic fit
between the values and life-styles of a group" and
- 119 -
how it expresses or reinforces its focal concerns. Homology refers
to the affinity and similarities members of a group share that
give it the particular cultural identity. These shared
alternative values and actions connect CU members to each other
and their culture, and create a celebration of "otherness" from
the broader culture. Hackers (Tune: "Put Another Nickel in")
Put another password in, Bomb it out, and try again, Try to get
past logging in, Were hacking, hacking, hacking. Try his first
wife's maiden name, This is more than just a game, It's real fun,
but just the same It's hacking, hacking, hacking. Sys-call, let's
try sys-call. Remember, that great bug from Version 3, Of R S X,
It's here! Whoopee! Put another sys-call in, Run those passwords
out and then, Dial back up, we're logging on, We're hacking,
hacking, hacking. (The Hacker Anthem, by Chesire Catalyst)
Hacking broadly refers to attempts to gain access to computers to
which one does not possess authorization. The term "hackers" first
came into use in the early 1960's when it was applied to a group
of pioneering computer aficionados at MIT (Levy, 1984). Through
the 1970s, a hacker was viewed as someone obsessed with
understanding and mastering computer systems (Levy 1984). But, in
the early 1980's, stimulated by the release of the movie
"War Games" and the much publicized arrest of a "hacker gang"
known as "The 414s", hackers were seen as young whiz-kids capable
of breaking into corporate and government computer systems
(Landreth 1985:34). The imprecise media definition and the lack
of any clear understanding of what it means to be a
hacker results in the mis-application of the label to all forms of
computer malfeasance. Despite the inter-relationship between
phreaks and hackers, the label of "hacker" is generally reserved
for those engaged in computer system trespassing. For CU
participants, hacking can mean either attempting to gain access
to a computer system, or the more refined goals of exploring in,
experimenting with, or testing a computer system. In the first
connotation, hacking re quires skills to obtain valid user
accounts on computer systems that would otherwise be unavailable,
and the term connotes the repetitive nature of break-in attempts.
Once successful entry is made, the illicit accounts are often
shared among associates and described as being "freshly (or
newly) hacked." The second connotation refers to someone
possessing the knowledge, ability, and desire to fully explore a
computer system. The elite hackers, the mere act of gaining entry
is not enough to warrant the "hacker" label; there must be a
desire to master and skill to use the system after access has
been achieved: It's Sunday night, and I'm in my room, deep into
a hack. My eyes are on the monitor, and my hands are on the
keyboard, but my mind is really on the operating system of a
super-minicomputer a thousand miles away - a super-mini with an
operating systems that does a good job of tracking users, and that
will show my activities in its user logs, unless I can outwit it
in the few hours before the Monday morning staff arrives for
work.....Eighteen hours ago, I managed to hack a pass-word for the
- 120 -
PDP 11/44. Now, I have only an hour or so left to alter the user
logs. If I don't the logs will lead the system operators to my
secret account, and the hours of work it took me to get this
account will be wasted (Landreth, 1985: 57-58). An elite hacker
must experiment with command structures and explore the many
files available in order to understand and effectively use the
system. This is sometimes called "hacking around" or simply
"hacking a system". This distinction is necessary because
not all trespassers are necessarily skilled at hacking out
passwords, and not all hackers retain interest in a system once
the challenge of gaining entry has been surmounted. Further,
passwords and accounts are often traded, allowing even an
unskilled intruder to erroneously claim the title of "hacker." Our
data indicate that, contrary to their media image, hackers avoid
deliberately destroying data or otherwise damaging the
system. Doing so would conflict with their instrumental goal of
blending in with the average user to conceal their presence and
prevent the deletion of the account. After spending what may be
a substantial amount of time obtaining a high access account,
the hacker places a high priority on not being discovered using
it, and hackers share considerable contempt for media stories
that portray them as "criminals." The leading CU periodicals
(e.g., PHRACK, PIRATE) and several CU "home boards" reprint and
disseminate media stories, adding ironic commentary. The
perception of media distortion also provides grist for message
sections: A1: I myself hate newspaper reporters who do stories on
hackers, piraters, phreaks, etc...because they always make us
sound like these incred. %sic% smart people (which isn't too
bad) who are the biggest threat to to-days community. Shit...the
BEST hackers/phreaks/etc will tell you that they only do it to
gain information on those systems, etc...(Freedom - That's what
they call it...right?) (grin) A2: Good point...never met a "real
p/h type yet who was into ripping off. To rip of a line from the
Steve Good-man song (loosely), the game's the thing. Even those
who allegedly fly the jolly rodger %pirates%, the true ones, don't
do it for the rip-off, but, like monopoly, to see if they can get
Boardwalk and Park Place without losing any railroads. Fun of the
latter is to start on a board with a single good game or util
%software utility% and see what it can be turned into, so I'm
told. Fuck the press (DS message log, 1989). One elite hacker,
a member of a loose-knit organization recently in the national
news when some participants were indicted for hacking, responded
to media distortions of the group by issueing an underground press
release: My name is %deleted%, but to the computer world, I am
%deleted%. I have been a member of the group known as Legion of
Doom since its creation, and admittedly I have not been the most
legitimate computer user around, but when people start hinting at
my supposed Communist-backed actions, and say that I am involved
in a world- wide conspiracy to destroy the nation's computer and/or
911 network, I have to speak up and hope that people will take
what I have to say seriously. . . . People just can't seem to grasp
- 121 -
the fact that a group of 20 year old kids just might know a little
more than they do, and rather than make good use of us, they
would rather just lock us away and keep on letting things pass
by them. I've said this before, you can't stop burglars
from robbing you when you leave the doors unlocked and merely bash
them in the head with baseball bats when they walk in. You need
to lock the door. But when you leave the doors open, but lock up
the people who can close them for you another burglar will just
walk right in ("EB," 1990). Although skirting the law, hackers
possess an explicit ethic and their primary goal is knowledge
acquisition. Levy (1984: 26-36) identifies six "planks" of the
original hacker ethic, and these continue to guide modern hackers:
1. First, access to computers should be unlimited and total:
"Always yield to the Hands-On Imperative!" 2. Second, all
information should be free. 3. Third, mistrust authority
and promote decentralization. 4. Fourth, hackers should be
judged by their prowess as hackers rather than by formal
organizational or other irrelevant criteria. 5. Fifth, one can
create art and beauty on a computer. 6. Finally, computers can
change lives for the better. PHRACK, recognized as the
"official" p/hacker newsletter, expanded on this creed with a
rationale that can be summarized in three principles ("Doctor
Crash," 1986). First, hackers reject the notion that "businesses"
are the only groups entitled to access and use of modern
technology. Second, hacking is a major Weapon in the fight
against encroaching computer technology. Finally, the high cost
of equipment is beyond the means of most hackers, which results in
the perception that hacking and phreaking are the only recourse to
spreading computer literacy to the masses: Hacking. It is a full
time hobby, taking countless hours per week to learn, experiment,
and execute the art of penetrating multi-user computers: Why do
hackers spend a good portion of their time hacking? Some might
say it is scientific curiosity, others that it is for mental
stimulation. But the true roots of hacker motives run much
deeper than that. In this file I will describe the underlying
motives of the aware hackers, make known the connections
between Hacking, Phreaking, Carding, & Anarchy, and make known
the "techno-revolution" which is laying seeds in the mind of
every hacker. . . .If you need a tutorial on how to perform any
of the above stated methods %of hacking%, please read a %PHRACK%
file on it. And whatever you do, continue the fight. Whether you
know it or not, if you are a hacker, you are a revolutionary.
Don't worry, you're on the right side ("Doctor Crash," 1986).
Computer software, such as auto-dialers popularized in the film
War Games, provides a means for inexperienced hackers to search
out other computers. Auto-dialers randomly dial numbers and save
the "hits" for manual testing later. Some users self-i-dentify has
hackers simply on the basis of successfully collecting computer
numbers or passwords, but these users are considered lamerz,"
because they do not possess sufficient knowledge to obtain access
or move about in the system once access is obtained. Lamerz are
- 122 -
readily identified by their message content: Sub ->numbers From ->
(#538) To ->all Date ->02/21/xx 06:10:00 PM: Does anyone know any
numbers for hotels, schools, businesses, etc..and passwords if you
do please leave a bulletin with the number and the password and/or
logon id. Sub ->phun From -> (#138) To ->all Date ->02/22/xx
12:21:00 AM Anyone out there got some good 800 dial up that are
fairly safe to hack? If so could ya leave me em in e-mail or post
em with the formats.....any help would%be apreciated......
thanx
Although hackers freely acknowledge that their activities may be
occasionally illegal, considerable emphasis is placed on limiting
violations only to those required to obtain access and learn a
system, and they display hostility toward those who transgress
beyond beyond these limits. Most experienced CU members are
suspicious of young novices who are often entranced with what they
perceive to be the "romance" of hacking. Elite hackers complain
continuously that novices are at an increased risk of apprehension
and also can "trash" accounts on which experienced hackers have gained
and hidden their access. Nonetheless, experienced hackers take pride
in their ethic of mentoring promising newcomers, both through their
BBSs and newsletters: As %my% reputation grew, answering such requests
[from novice hackers wanting help] became a matter of pride. No
matter how difficult the question happened to be, I would sit at
the terminal for five, ten, twenty hours at a time, until I had
the answer (Landreth, 1985: 16). The nation's top elite p/hacker
board was particularly nurturing of promising novices before it
voluntarily closed in early 1990, and its sysop's handle means
"teacher." PHRACK, begun in 1985, normally contained 10-12
educational articles (or "philes"), most of which provided
explicit sophisticated technical information about computer
networks and telecommunications systems[5]. Boundary
socialization occurs in message bases and newsletters that either
discourage such activity or provide guidelines for concealing
access once obtained: Welcome to the world of hacking! We, the
people who live outside of the normal rules, and have been scorned
and even arrested by those from the 'civilized world', are
becoming scarcer every day. This is due to the greater fear of
what a good hacker (skill wise, no moral judgements here) can do
nowadays, thus causing anti-hacker sentiment in the masses. Also,
few hackers seem to actually know about the computer systems they
hack, or what equipment they will run into on the front end, or
what they could do wrong on a system to alert the 'higher'
authorities who monitor the system. This article is intended to
tell you about some things not to do, even before you get on the
system. We will tell you about the new wave of front end security
devices that are beginning to be used on computers. We will attempt
to instill in you a second identity, to be brought up at time of
great need, to pull you out of trouble. (p/hacker newsletter, 1987).
Elite hacking requires highly sophisticated technical skills to enter
- 123 -
the maze of protective barriers, recognize the computer type, and move
about at the highest system levels. As a consequence, information
sharing becomes the sine qua non of the hacker culture. "Main
message" sections are generally open to all users, but only
general information, gossip, and casual commentary is posted.
Elite users, those with higher security privileges and access to
the "backstage" regions, share technical information and problems,
of which the following is typical:
89Mar11
From ***** ** * ***>
Help! Anyone familiar with a system that responds:
A2: SELECT : DISPLAY:
1=TRUNK,2=SXS;INPUT:3=TRUNK,4=SXS,5=DELETE;7=MSG <and
then it gives you a prompt> If you chose 1... ENTER
OLD#,(R=RETURN)
At this point I know you can enter 7 digits, the 8th
ill give you an INVALID ENTRY type message. Some num-
bers don't work however. (1,2,7,8 I know will) Anybody?
89Mar10
From *********>
I was hacking around on telenet (415 area code) and got
a few things that I am stuck-o on if ya can help, I'd
be greatly happy. First of all, I got one that is
called RCC PALO ALTO and I can't figure it out. Second
(and this looks pretty fun) is the ESPRIT COMMAIL and
I know that a user name is SYSTEM because it asked for
a password on ONLY that account (pretty obvious eh?) a
few primnet and geonet nodes and a bunch of TELENET
ASYYNC to 3270 SERVICE. It asks for TERMINAL TYPE, my
LU NUMBER and on numbers higher than 0 and lower that
22 it asks for a password. Is it an outdial? What are
some common passwords? then I got a sushi-primnet
system. And a dELUT system. And at 206174 there is
JUST a : prompt. help! (P/h message log, 1988).
Rebelliousness also permeates the hacker culture and is reflected
in actions, messages, and symbolic identities. Like other CU
participants, hackers employ handles (aliases) intended to display
an aspect of one's personality and interests, and a handle can
often reveal whether its owner is a "lamer" (an incompetent) or
sophisticated. Hackers take pride in their assumed names, and
one of the greatest taboos is to use the handle of an other or to
use multiple handles. Handles are borrowed liberally from the
anti-heros of science fiction, adventure fantasy, and heavy metal
rock lyrics, particularly among younger users, and from word plays
on technology, nihilism, and violence. The CU handle reflects a
stylistic identity heavily influenced by metaphors reflecting color
(especially red and black), supernatural power (e.g., "Ultimate
- 124 -
Warrior, "Dragon Lord"), and chaos ("Death Stalker," "Black
Avenger"), or ironic twists on technology, fantasy, or symbols of
mass culture (e.g., Epeios, Phelix the Hack, Ellis Dea, Rambo
Pacifist, Hitch Hacker).
This anti-establishment ethos also provides an ideological unity
for collective action. Hackers have been known to use their
collective skills in retaliation for acts against the culture that
the perceive as unfair by, for example, changing credit data or
"revoking" driver's licenses (Sandza, 1984; "Yes, you Sound very
Sexy," 1989). Following a bust of a national hacker group, the
message section of the "home board" contained a lively
debate on the desireability of a retaliatory response, and the
moderates prevailed. Influenced especially by such science
fantasy as William Gibson's Neuromancer (1984), John Brunner's The
Shockwave Rider (1975), and cyber-punk, which is a fusion of
elements of electronic communication technology and the "punk"
subculture, the hacker ethic promotes resistance to the very forms
that create it. Suggestive of Frazer's (1922) The Golden Bough,
power is challenged and supplanted by rituals combining both
destruction and rejuvenation. From this emerges a shared ethos of
opposition against perceived Orwellian domination by an
information-controlling elite:(Hackers will) always be necessary,
especially in the technological oppression of the future. Just
imagine an information system that systematically filters out
certain obscene words. Then it will move on to phrases, and then
entire ideas will be replaced by computers! Anyway, there will
always be people tripping out on paper and trying to keep it to
themselves, and it's up to us to at least loosen their grasp (P.A.
Message Log 1988).
Another hacker summarized the near-anarchist ethic characterized
the CU style: Lookit, we're here as criminal hobbyists, peeping
toms, and looters. I am in it for the fun. Not providing the
public what it has a right to know, or keeping big brother in
check. I couldn't care less. I am sick of the old journalistic
hackers nonsense about or (oops! OUR) computerized ego...I make
no attempt to justify what I am doing. Because it doesn't matter.
As long as we live in this goddamn welfare state I might as well
have some fun taking what isn't mine, and I am better off than
those welfare-assholes who justify their stealing. At least I
am smart enough to know that the free lunch can't go on forever
(U.U. message log 1988).
In sum, the hacker style reflects well-defined goals, communication
networks, values, and an ethos of resistance to authority. Because
hacking requires a broader range of knowledge than does phreaking,
and because such knowledge can be acquired only through experience,
hackers tend to be both older and more knowledgeable than phreaks.
In addition, despite some overlap, the goals of the two are somewhat
dissimilar. As a consequence, each group constitutes a separate analytic
- 125 -
category. Phreaks. Running numbers is not only fun; it's a moral
imperative! (Phreak credo). Phreaking broadly refers to the
practice of using either technology or telephone credit card
numbers (called "codez") to avoid long distance charges.
Phreaking attained public visibilily with the revelation of the
exploits of John "Cap'n Crunch" Draper, the "father of phreaking"
(Rosenbaum, 1971). Although phreaking and hacking each require
different skills, phreaks and hackers tend to associate on same
boards. Unlike hackers, who attempt to master a computer system
and its command and security structure, phreaks struggle to
master telecom (tele-communications) technology: The phone system
is the most interesting, fascinating thing that I know of. There is
so much to know. Even phreaks have their own areas of knowledge.
There is so much to know that one phreak could know something
fairly important and the next phreak not. The next phreak might
know 10 things that the first phreak doesn't though. It all
depends upon where and how they get their info. I myself would
like to work for the telco, doing something interesting, like
programming a switch. Something that isn't slave labor bullshit.
Something that you enjoy, but have to take risks in order to
participate unless you are lucky enough to work for Bell/AT&T/any
telco. To have legal access to telco things, manuals, etc. would be
great (message log, 1988). Early phreaking methods involved
electro-mechanical devices that generated key tones or altered phone
line voltages to trick the mechanical switches of the phone company
into connecting calls without charging, but the advent of computerized
telephone-switching systems largely made these devices obsolete.
In order to continue their practice, phreaks have had to learn
hacking skills in order to obtain access to telephone company
computers and software.
Access to telecom information takes several forms, and the
possesion of numbers for "loops" and "bridges," while lying in a
grey area of law, further enhances the reputation and status of a
phreak. P/hackers can utilize "loop lines" to limit the number of
eavesdroppers on their conversations. Unlike bridges, which
connect an unlimited number of callers simultaneously, loops
are limited to just two people at a time[6]. A "bridge" is a
technical name for what is commonly known as a "chat line" or
"conference system." Bridges are familiar to the public as the
pay-per-minute group conversation systems advertised on late
night television. Many bridge systems are owned by large
corporations that maintain them for business use during the day.
While the numbers to these systems are not public knowledge, many
of them have been discovered by phreaks who then utilize the
systems at night. Phreaks are skilled at arranging for a
temporary, private bridge to be created via ATT's conference
calling facilities. This provides a helpful information sharing
technique among a self-selected group of phreak/hackers: Bridges
can be extremely useful means of distributing information as long
as the %phone% number is not known, and you don't have a
- 126 -
bunch of children online testing out their DTMF. The last great
discussion I participated with over a bridge occurred about 2
months ago on an AT&T Quorum where all we did was engineer
3/way %calls% and restrict ourselves to purely technical
information. We could have convinced the Quorum operators that we
were AT&T technicians had the need occurred. Don't let the kids
ruin all the fun and convenience of bridges. Lameness is one
thing, practicality is an other (DC, message log, 1988). Phreaks
recognize their precarious legal position, but see no other way to
"play the game:" Phreaking involves having the dedication to
commit yourself to learning as much about the phone system/
network as possible. Since most of this information is not made
public, phreaks have to resort to legally questionable means to
obtain the knowledge they want (TP2, message log, 1988). Little
sympathy exists among experienced phreaks for "teleco ripoff."
"Carding," or the use of fraudulent credit cards, is anathema to
phreaks, and not only violates the phreaking ethic, but is simply
not the goal of phreaking: Credit card fraud truly gives hacking
a bad name. Snooping around a VAX is just electronic voyeurism.
carding a new modem is just flat out blue-collar-crime. It's
just as bad as breaking into a house or kicking a puppy! %This
phreak% does everything he can (even up to turning off a number)
to get credit information taken off a BBS. %This phreak% also tries
to remove codes from BBSes. He doesn't see code abuse in the same
light as credit card fraud, (although the law does), but posted
codes are the quickest way to get your board busted, and your
computer confiscated. People should just find a local outdial to
wherever they want to call and use that. If you only make local
calls from an outdial, it will never die, you will keep out of
trouble, and everyone will be happy (PHRACK, 3(28): Phile 2).
Experienced phreaks become easily angered at novices and "lamerz"
who engage in fraud or are interested only in "leeching" (obtaining
something for nothing):
Sub ->Carding
From ->JB (#208)
To ->ALL
Date ->02/10/xx 02:22:00 PM
what do you people think about using a parents card number for
carding? For instance, if I had a friend order and receive via
next day air on my parents card, and receive it at my parents
house while we were on vacation. Do you think that would work?
Cuz then, all that we have to do is to leave the note, and have
the bud pick up the packages, and when the bill came for over
$1500, then we just say... 'Fuck you! We were on vacation! Look
at our airline tickets!' I hope it does... Its such a great plan!
Sub ->Reply to: Carding
From -> (xxx)
To -> X
Date ->02/11xx 03: 16:00 AM
- 127 -
NO IT'S NOT A GREAT IDEA! WHERE'S YOUR SENSE OF RESPONSIBILITY TO
YOUR FAMILY? ARE THEY ALL IN AGREEMENT WITH YOU? WOULD YOU WANT
ANYONE TO USE YOUR PRIVATE STUFF IN ILLEGAL (AND IMMORAL)
ACTIVITIES WITHOUT YOUR KNOWLEDGE? DIDJA EVER HEAR ABOUT TRUST
BETWEEN FAMILY MEMBERS? IF YOU'RE GOING TO BE A THIEF (AND THAT'S
NOT NEAT LIKE JAMES BOND IN THE MOVIES), TAKE THE RISKS ONLY UPON
YOURSELF!
Sub ->Carding
From -> (#208)
To -> (#47)
Date ->02/12/xx 11: 18:00 AM
Why not? We have a law that says that we have the right to refuse
payment to credit cards if there are fraudulent charges. All we
do and it is settled.... what is so bad about it? I'm going for
it!
Sub ->Reply to: Carding
From -> (xxx)
To ->J.B.
Date ->02/13/xx 02:08:00 AM
APPARENTLY YOU MISSED THE MAIN POINTS I TRIED TO MAKE TO YOU . .
YOU'RE A THIEF AND A LIAR, AND ARE BETRAYING THE TRUST OF YOUR
FAMILY AS WELL AS INVOLVING THEM IN YOUR RISK WITHOUT THEIR
KNOWLEDGE. THAT MEANS YOU ARE A FAIRLY SCUMMY INDIVIDUAL IF YOU
GO THROUGH WITH IT! NOW AS TO YOUR "DEFENCE" ABOUT $50 MAXIMUMS
AND ERRONEOUS BILLINGS.. LAW MAKES A CLEAR DISTINCTION
ABOUT THEFT BY FRAUD (OF WHICH YOU WOULD BE GUILTY). AND IN A
LARGER SENSE, YOUR THEFT JUST MAKES IT MORE COSTLY FOR YOU YOU
AND EVERYBODY ELSE TO GET CREDIT, AND DO BUSINESS WITH CREDIT
CARDS. YOU'RE GOING TO DO WHATEVER YOU DO ANYWAY.....DON'T LOOK
FOR ANY APPROVAL IN THIS DIRECTION.
Ironically, experienced phreaks are not only offended by such
disregard of law, but also feel that "rip-off artists" have no
information to share and only increase the risk for the
"tech-no-junkies." Message boards reflect hostility toward
apprehended "lamerz" with such comments as "I hope they burn
him," or "the lamer probably narked %turned informant% to the
pheds %law enforcement agents%." Experienced phreaks also post
continual reminders that some actions, because of their illegality,
are simply unacceptable: It should be pointed out however, that
should any of you crack any WATS EXTENDER access codes and attempt
to use them, you are guilty of Theft of communications services
from the company who owns it, and Bell is very willing and able to
help nail you! WATS EXTENDERS can get you in every bit as much
trouble as a Blue Box should you be caught. Ex-phreaks,
especially those who are no longer defined by law as juveniles,
often attempt to caution younger phreaks from pursuing phreaking:
ZA1: One thing to consider, also, is that the phone co. knows where
the junction box is for all of the lines that you are messing with
- 128 -
and if they get enough complaints about the bills, they may start to
check things out (I hope your work is neat). I would guess that the
odds are probably against this from happening though, because when
each of the people call to complain, they'll probably get a different
person from the others. This means that someone at Ma Bell has to
notice that all of the complaints are coming from the same area...I
don't think anybody there really cares that much about their job
to really start noticing things like that. anyway, enjoy!!! My
guess is that you're under-age. Anyway, so if they catch you, they
won't do anything to you anyway. ZB1: Yeah I am a minor (17 years
old) I just hope that they don't cause I would like to not have a
criminal or juvenile record when I apply to college. Also if they
do come as I said in the other message if there are no wires they
can't prove shit. Also as I said I only hook up after 6 p.m. The
phone company doesn't service people after 6 p.m. Just recently
(today) I hooked up to an empty line. No wires were leading from
the two plugs to somebody house but I got a dial tone. How great.
Don't have to worry about billing somebody else. But I still have to
disconnect cause the phone bills should be coming to the other
people pretty soon. HEHEHEHE ZX1: Be cool on that, especially if
you're calling other boards. Easiest way for telecom security to
catch you is match the number called to the time called, call the
board, look at users log or messages for hints of identity,
then work from there. If you do it too much to a pirate board,
they can (and have successfully) pressured the sysop to reveal the
identity under threat of prosecution. They may or may not be able
to always trace it back, but remember: Yesterday's phreaks are
today's telecom security folk. AND: IT'S NOT COOL TO PHREAK TO
A PIRATE BOARD...draws attention to that board and
screws it up for everybody. So, be cool phreaking....there's
safer ways. ZC2: Be cool, Wormburger. They can use all sorts of
stuff for evidence. Here's what they'd do in Ill. If they
suspected you, they'd flag the phone lines, send somebody out
during the time you're on (or they suspect you're on) and nail you.
Don't want to squelch a budding phreak, but you're really
taking an unnecessary chance. Most of us have been doing stuff
for some time, and just don't want to see you get nailed for
something. There's some good boards with tips on how to phreak, and
if you want the numbers, let me know. We've survived to warn you
because we know the dangers. If you don't know what ESS is, best
do some quick research (P/h message log, 1988).
In sum, the attraction of phreaking and its attendant life-style
appear to center on three fundamental characteristics: The quest
for knowledge, the belief in a higher ideological purpose of
opposition to potentially dangerous technological control, and the
enjoyment of risk-taking. In a sense, CU participants consciously
create dissonance as a means of creating social meaning in what is
perceived as an increasingly meaningless world (Milo-vanovic and
Thomas, 1989). Together, phreaks and hackers have created an
- 129 -
overlapping culture that, whatever the legality, is seen by
participants as a legitimate enterprise in the new "tech-no-society."
Conclusion: The transition to an information-oriented society
dependent on computer technology brings with it new symbolic
metaphors and behaviors. Baudrillard (1987: 15) observed that our
private sphere now ceases to be the stage where the drama of
subjects at odds with their objects and with their image is played
out, and we no longer exist as playwrites or actors, but as
terminals of multiple networks. The public space of the social
arena is reduced to the private space of the computer desk,
which in turn creates a new semi-public, but restricted, public
realm to which dissonance seekers retreat. To participate in the
computer underground is to engage in what Baudrillard (1987: 15)
describes as private telematics, in which individuals, to extend
Baudrillard's fantasy metaphor, are transported from their mundane
computer system to the controls of a hypothetical machine, isolated
in a position of perfect sovereignty, at an infinite distance from
the original universe. There, identity is created through symbolic
strategies and collective beliefs (Bordieu, cited in Wacquant,
1989: 35). We have argued that the symbolic identity of the computer
underground creates a rich and diverse culture comprised of
justifications, highly specialized skills, information-sharing
net-works, norms, status hierarchies, language, and unifying
symbolic meanings. The stylistic elements of CU identity and
activity serve what Denzin (1988: 471) sees as the primary
characteristic of postmodern behavior, which is to make fun of
the past while keeping it alive and the search for new ways to
present the unpresentable in order to break down the barriers
that keep theprofane out of the everyday.
The risks entailed by acting on the fringes of legality and
substituting definitions of acceptable behavior with their own,
the playful parodying of mass culture, and the challenge to
authority constitute an exploration of the limits of techno-culture
hile resisting the legal meanings that would control such
actions. The celebration of anti-heros, re-enacted through forays
into the world of computer programs and software, reflects the
stylistic promiscuity, eclecticism and code-mixing that typifies
the postmodern experience (Featherstone, 1988: 202). Rather than
attempt to fit within modern culture and adapt to values and
definitions imposed on them, CU participants mediate it by mixing
art, science, and resistance to create a culture with an
alternative meaning both to the dominant one and to those that
observers would impose on them and on their enterprise. Pfuhl
(1987) cogently argued that criminalization of computer abuse tends
to polarize definitions of behavior. As a conseuence, To view the
CU as simply another form of deviance, or as little more than
"high-tech street gangs" obscures the ironic, mythic, and
subversive element, the Nieztschean "will to power," refleccted in
- 130 -
the attempt to master technology while challenging those forces
that control it. The "new society" spawned by computer technology
is in its infancy, and, as Sennet (1970: xvii) observed, the passage
of societies through adolescence to maturity requires acceptance of
disorder and painful dislocation.
Instead of embracing the dominant culture, the CU has created an
irreducible cultural alternative, one that cannot be understood
without locating its place within the dialectic of social change.
Especially in counter-cultures, as Hebdige (1983: 3) observes,
"objects are made to mean and mean again," often
ending: in the construction of a style, in a gesture of defiance or
contempt, in a smile or a sneer. It signals a Refusal. I would
like to think that this Reusal is worth making, that these
gestures have a meaning, that the smiles and the sneers have some
subversive value. . . (Hebdige, 1982: 3).
Footnotes
[1] Participants in the computer underground engage in considerable
word play that includes juxtaposition of letters. For example,
commonly used words beginning with "f" are customarily spelled
with a "ph." The CU spelling conventions are retained
throughout this paper.
[2] Conly and McEwen (1990: 3) classify "software piracy" in the
same category as theft of computers and trade secrets, and
grossly confuse both the concept and definition of computer
crime by conflating any illicit activity involving computers
under a definition so broad that embezzlement and bulletin
boards all fall within it. However, the label of "computer
criminal" should be reserved for those who manipulate
computerized records in order to defraud or damage, a point
implied by Bequai (1978: 4) and Parker (1983: 106).
[3] One author has been active in the computer underground
since 1984 and participated in Summercon-88 in St. Louis, a
national conference of elite hackers. The other began
researching p/hackers and pirates in 1988. Both authors
have had sysop experience with national CU boards. As do
virtually all CU participants, we used pseudonyms but, as we
became more fully immersed in the culture, our true identities
were sometimes revealed.
[4] Although we consider software pirates an integral part of the
computer underground, we have excluded them from this analysis
both for parsimony and because their actions are sufficiently
different to warrant separate analysis (Thomas and Meyer,
1990). We also have excluded anarchist boards, which tend to be
utilized by teenagers who use BBSs to exchange information
relating to social disruption, such as making homemade explosives,
sabotaging equipment, and other less dramatic pranks.
- 131 -
These boards are largely symbolic, and despite the name, are
devoid of political intent. However, our data suggest that many
hackers began their careers because of the anarchist influence.
[5] In January, 1990, the co-editor of the magazine was indicted
for allegedly "transporting" stolen property across state lines.
According to the Secret Service agent in charge of the case in
Atlanta (personal communication), theoffender was apprehended
for receiving copies of E911 ("enhanced" 911 emergency system)
documents by electronic mail, but added that there was no
evidence that those involved were motivated by, or received,
material gain.
[6] "Loop lines" are
telephone company test lines installed for two separate
telephone numbers that connect only to each other. Each end
has a separate phone number, and when each person calls one end,
they are connected to each other automatically. A loop consists
of "Dual Tone Multi-Frequency," which is the touch tone sounds
used to dial phone numbers. These test lines are discovered by
phreaks and hackers by programming their home computer to dial
numbers at random and "listen" for the distinctive tone that an
answering loop makes, by asking sympathetic telephone company
employees, or through inormation contained on internal company
computers.
- 132 -
Introduction to PBXs by < Grim Reaper >
his file is a personal continuation of the PBX entry in the MCI
telecommunications Glossary. A telephone exchange serving an
individual organization and having connections to a public
telephone exchange is called a Private Branch Exchange (PBX). The
PBX performs a switching function by connecting any extension in
the private organization to an outside line. A PBX is actually a
private switch that connects a group of telephones within an
individual organization. Calls placed outside this individual group
are connected to a telephone company's central office switch
through trunks. A PBX may be operated by an attendant from the
private organization or the switching system may be done
automatically. Other terms that are commonly used
interchangeably with PBX are: Private Automatic Branch Exchange
(PABX), Private Automatic Exchange (PAX), and Computerized Branch
Exchange (CBX). Although these terms were originally used to
identify specific switch structures, today they are often used as
synonyms.
PBXs can use any of three basic switching methods: step-by-step
(SxS), Cross-bar (X-bar), and computer controlled, to perform the
basic function of switching. However, in addition to detecting
calls and establishing a transmission link between two telephones,
PBXs can do much more.
The common control, often called a central processing unit (CPU),
controls the switching matrix that connects the stat ons and
trunks. The switching matrix of a PBX performs the same job as
does an operator at a manual switchboard or a common control
central office switch. The CPU, however, gets its instructions
from the "stored program", which contains directions for
activities, such as detecting calls, sending them over the best
available route, and recording billing information. These
computerized electronic switches are used to perform routine, as
well as unique, functions that simply weren't practical or even
possible with electromechanical switches.
Just as in the public switched network, PBX switches make
connection between instruments, or "key telephone sets". We're all
familiar with key telephone sets, whether we know them by name or
not. They're the business telephones that have six push-button
keys lined up below the dial--a red button marked "hold" and five
buttons or lines with flashing lights.
Systems with PBXs and key sets have a great deal of flexability
in planning for their needs because they can set up their codes to
accomplish the functions needed in their particular situations. In
fact, the PBX can be programmed so that each individual extension
within a system can take advantage of features applicable to its
own business needs.
- 133 -
Some of the features that are availiable with PBXs and key
systems are: call transfer, which allows internal or external
calls to be transferred from one telephone to any other phone in
the system; automatic push-button signaling, which indicates the
status of all phones in the system with display lights and buttons;
one-way voice paging, which can be answered by dialing the operator
from the nearest telephone in the system; camp-on, in which a call
made to a busy phone automatically waits until the line is idle;
and internal and external conference capabilities, which enables
outside callers to conference with several inside users.
Some features automatically handle incoming telephone calls.
Automatic call waiting not only holds calls made to a busy
extension until the extension is free, but also signals the person
being called that a call is waiting and informs the caller that he
is on hold. Automatic call forwarding will send calls to employees
who are temporarily in locations other than their offices, provided
they "inform" the PBX where they can be found. Automatic call
distribution automatically send an incoming call to the first
extension that's not busy--a useful feature for situations in which
any one of a group of persons in the organization can adequately
respond to incoming calls. Another example is automatic call back,
which allows a caller who reaches a busy line to ask the PBX to return
his or her call when the line is free.
Still other features provide services such as night telelphone
answering, telephone traffic monitoring, and network or hot-line
connection. These examples are but a sample from the features
possible with computerized PBXs. This is a very brief description
of how to use and what to expect on a PBX.
Basically, you call the PBX and you will have to enter a code that
can be anywhere from 4 to 6 digits (Note: some PBXs do not require
codes). Then you will hear a dial tone. From here you would under
normal circumstances dial: 9 + 1 (or 0) + NPA-PRE-SUFF, for long
distance dialing or dial 8 for local
dialing.
The most common use of the PBX is to call Alliance Teleconferencing,
a teleconference service offered by AT&T. To do this dial:
0700-456-1000,1002,1003,2000,2001,2002.
Note: PBX codes are usually very simple and usually 4 digits.
EX: 0000, 1111, 1234, etc
- 134 -
Introduction To Phreaking by Cat-Trax
[ Definitions ]
Phreak ["free"k] Verb-1. The act of "Phreaking" 2. The act of
making telephone calls without paying money [Slang]
Phreaker ["free"-k-er] Noun-1. One who engages in the act of
"Phreaking"
2. One who makes telephone calls without paying money
[Slang]
--------------------------------------------------------------
[ Introduction ]
Phreaking is a method used by most intelligent people {most
often those who use a computer and a Modulator-Demodulator
(MoDem)}. If you happen to resemble the major mass of people who
do not have the income to afford large phone bills then phreaking
is for you. If you live in an area with an Electronic Switching
System [ESS] then phreaking is something which should be done in
moderate amounts.
-----------------------------------------------------------------
[Switching Systems ]
Three types of switching systems are present in the United States
today:
[1] Step by Step
[2] Crossbar
[3] ESS {Electronic Switching System}
<] Step by Step [>
First switching system used in America, adopted in 1918 and until
1978 Bell had over 53% of all exchanges using Step by Step [SxS].
A long, and confusing train of switches is used for SxS switching.
[> Disadvantages <]
[A] The switch train may become jammed : Blocking call.
[B] No DTMF [Dual-Tone Multi-Frequency]["Touch-tone"].
[C] Much maintanance and much electricity.
[D] Everything is hardwired
+> Identification <+
[A] No pulsing digits ater dialing or DTMF.
[B] Phone Company sounds like many typewriters.
[C] No: Speed calling, Call forwarding, and other services.
[D] Pay-phone wants money first before dial-tone.
- 135 -
<] Crossbar [>
Crossbar has been Bell's primary switcher after 1960. Three types
of Crossbar switching exist: Number 1 Crossbar [1XB], Number 4
Crossbar [4XB], and Number 5 Crossbar [5XB]. A switching matrix is
used for all the phones in an area. When someone calls, the route is
determined and is met up with the othr phone. The matrix is set-up
in horizontal and vertical paths. There are no definite
distinguishing features of Crossbar switching.
<] ESS [>
You probably were hoping I wouldn't talk about this nightmare,
if you did you will know why everyone doesn't want to be reminded
about Bell's holocaust on America. With ESS Bell knows: every
digwho make excessive calls to WATS numbers [Wide Area Telephone
Service][1-800 numbers] or directory assistance. This deadly trap
is called "800 Exceptional Calling Report." ESS can be programmed
to print logs of who called certain numbers. Electronic Switching
System makes the job of the FBI, Bell Security {The Gestapo in
phreakin' tongue}, NSA, and other organizations which like to
invade our privacy, extremely easy! Tracing is done in
microseconds, and the results are printed out on the monitor of a
Gestapo officer. ESS can also pick up
foreign tones on the line, like 2600 Hz. {used in blue boxes,
discussed later}. Bell claims that the entire country will be
plagued by ESS by the 1990's!
+> Identification <+
[A] Dialing 911 for emergencies.
[B] Dial-tone first for pay-phones.
[C] Calling services, like: Call forwarding, Speed dialing,
Call waiting.
[D] ANI [Automatic Number Identification] for long-distance
calls.
[[[Note]]] Of the above identifications of the three switching
systems, do not solely rely on these descriptions, the best way to
find out is to [no!] call your local telephone company.
-----------------------------------------------------------------
[Long-Distance Services ]
To attempt to help the community {and for private business}
companies developed ways to lessen the costs of long-distance
calling charges. The companies own their own switching systems and
use extenders for callers to call. The way extenders operate:
- 136 -
1] Customer calls service
2] He/she hears a low tone which sounds like a dial-tone
3] She/He either dials the access code then the phone number, or
dials the phone number then the access code
4] Is connected to whatever he/she calls.
Aside from Ma Bells collection, the customer recieves a bill for
calls made with his/her long-distance company {a supposedly cheaper
bill than Ma Bell's}. Thought: Hey, I could randomly pick access
codes and use them to call whatever area the company services!
Righto, that's what basic phreaking is! A wise idea, though, is to
have many access codes and many service numbers to rotate
throughout your average life as a phreaker. To aid in your quest
to beat the system I have provided many 1-800 numbers which anyone
can call, aside from local numbers, such as Sprint, or MCI. The
reason for providing you with WATS numbers is because all of us
aren't in a big city where Sprint or MCI even exist, this way
everyone can pheak! A way to find more access codes is by using
your old modem. Yes, your modem can imitate
DTMF tones!
{>Procedure: 1) dial 1-800 + service number
2) dial access code->area code->phone number, or
3) dial area code->phone number->access code
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\/
-=+>Cat-Trax' list of WATS [1-800] numbers:<+=-
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Number---Code Length : Number---Code Length : Number---Code
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
127-6754 6 245-4890 4 327-6713 4
243-7650 6 328-7112 4 654-8494 6
327-9895 7 327-9136 4 227-3414 4
682-4000 6 343-1844 4 858-9000 3
462-6471 5 322-1415 6 521-1674 4
527-3511 8 321-0327 4 321-0845 6
843-0698 9 221-8190 4 543-7168 8
521-8400 8 327-2731 6 252-5879 8
345-0008 7 245-7508 5 526-5305 8
323-3027 6 242-1122 ? 621-1506 ?
621-4611 ? 325-3075 ? 336-6000 ?
221-1950 ? 323-8126 ? 325-7222 6
[[[Note]]] remember to dial 1-800-above number, also remember to
rotate numbers and access codes.
-----------------------------------------------------------------
- 137 -
[ Colored Boxes ]
A more shrewd, technological, safer {without ESS} way to phreak is
with a piece of hardware known as a ________ Box. Boxes are many
different colors {I don't know ALL the colors because it seems like
every time I turn around there's some new color out!}. Colors I
have heard of: Blue, Black, Red, White, Silver, Clear, and MANY,
MANY more... Plans for making these boxes can be obtained by
calling different boards [BBS's], AE lines, or whatever. But!, if
you have an Apple Cat modem then do I have good news for ->you<-!!
The Apple Cat modem can emulate the frequencies {usually 2600 Hz.}
made by ________ Boxes with the help of a handy little program
called "Cat's Meow!"
-----------------------------------------------------------------
::Warning!:: Phreak at your own risk! Stiff laws are starting to
pop-up now days. But, if you're careful then don't worry! I
haven't been busted yet! Heck [Hack!], what would life be without
risks?
-----------------------------------------------------------------
- 138 -
SOME NOTES ON LINE NOISE by Captain KIdd
=================================================================
Well since that's my field let me elucidate abit.... Most of what
you refer to as line noise isn't really noise per-se on the line,
but uneven response to tones (and that's what we use in our
modems). This can be caused by any number of factors. If you call
up good old NONEX and tell them that you have "line noise" your
asking for a service bill and no remedy. You will find that the
average lineman they send out, has the IQ of his shoe size. Case in
point-the old number I used to run my bbs at. I had phantom rings
on the line, so did my neighbor across the street. When it was very
damp or had rained for a while (several days) the "line noise"
would appear, and cause me grief. Well,with the similar problem and
a moisture related one at that across the street, it seems like the
problem is out around the pole in front of my place. Well,after
three visits, and three phantom excuses for repairing it needless
to say I was pissed.(The CO will often blast the phone line with
what it calls cable test voltage. Its around 600 volts and will
vaporize the MOV surge protector in your modem or answering
machine) MOV= Metal Oxide Varistor for you non-techies. But it will
clear many of their "bad lines". Now one fine day, they finally send
out a guy from the "Cable department" and I talk to him, I explain
the past problems and suggest he check past my place and for some
reason during wet times, we have inter-cable leakage. He found a
spot down the street that had been zapped by lightning some time
before, and all the wire ends were charred and black. He showed me
a ball of burnt wire that could very well been the cause. Well it was,
as the problem is lessened about 95%. I say 95% because I still have
a bit of the same problem, possibly due to another charred spot or a
more recent lightning strike. But this problem seems to respond to
my calling my number and letting it ring for say a half hour, this
drys out the line enough that it stops acting screwy. Well on to the
noises that can be heard over the line that really do have influence
over transmission quality. The most prevalent is a crackling or a
dial tone drawn intermittently. (Listen to the line with a hi-z butset)
Ringing voltage is usually about 90 volts and20-30 hz, so there's
usually no problem in ringing the phone, but when you pick up, the
phone voltage drops to 30-50 volts and the smallest problem will
surface. The phone company has this habit of checking the line to
ground (it should never be connected in a regular home phone line)
and they will clear off water, insects, and other crap with a 600
volt blast as mentioned earlier. This applied across the line to
ground sure does away with the water, but in caes where spike
protection or impulse protection from lightning is present, WATCH
OUT! the MOV's are typically manufactured to short at around 130-
150 volts, and are connected to the third pin (Ground) of a three
wire plug on your answering machine, your cordless phone, and some
modems. The MOV will explode as it shorts itself to ground to do
its job of surge protection, leaving a short on the line which is
readily detectable by the CO. IF THIS HAPPENS, inform
- 139 -
them immediately that you have a problem, and they will make
restitution for repairs in CASH! I got $75 for repairing a $1.98
MOV (available at Radio Slack)
Now more on the noises....
==========================
After the infamous popping, the next most bothersome to the modemer
is a low level whine, muchlike some of the shitty MCI ports,sounding
like a jet engine varying in rpm, it is particularly evident behind
dialtone, and if you drop the dialtone, its still evident. This is
digital whine caused by some circuit in the path not exactly in phase.
This is particularly annoying because the digital equipment tries to
compensate by stuffing or removing bits from the digital path to attempt
phase lock, and thus, data is occasionally lost or garbled. I have two
lines at home that are heavily used and have this problem, its not
apparent to modem traffic until you hit 2400 baud, then the time
frame of the modem kinda gets jitters from the digital whine.
Lastly, of importance, is signal level. In analog, as the signal
goes down, the signal tends to corrupt on the lowest levels while
some will pass fine during peaks. If this is the problem, you see
multiple errors on x-modem, then good blocks.. this problem can have
numerous causes, fading of a microwave path, followed by a switching
of diversity receivers, bringing the signal backup to par temporarily.
Also in this category are bad amps at either the CO or in your own
equipment, that won't limit gain till noise actually takes the
place of the signal, This is a "slow attack" increase of noise
followed by a quick quieting as the redundant amp takes over (In
your CO).
Crosstalk:
----------
If you have ever picked up the phone and swore you could hear
someone else talking or in some cases, actually been able to talk
to the other party, you have been exposed to crosstalk. This
obviously will knock the shit outa a modem conversation due to the
fact the voice is mixing non-linearly with the data or in some
cases, overpowering the data signal itself. This is a fairly common
problem, common to analog FDM multiplex equipment. This equipment
tries to keep the conversations apart using SSB channels arranged
throughout a radio's baseband (IF) frequency. Because the channels
are without carrier which would enable the equipment to check
signal level, frequencies called "pilots" are inserted into the
clusters of channels allowing their levels to be monitored and
controlled.If there is a "Hot" pilot or a "Hot" channel in the group,
it will bleed over into the other channel's passband and crosstalk
will be heard. In the cases of two-way communications via crosstalk,
the group pilot is usually so hot, everybody in both directions is
splashing over and both directions are being heard. Basically the
solution to line noise problems is to know about them, and being
able to pinpoint the exact type of problem will make it easier for
the Telco to service it quickly.
- 140 -