1844 lines
71 KiB
Plaintext
1844 lines
71 KiB
Plaintext
![]() |
Area Code List: By Net Runner
|
|||
|
|
|||
|
FOLLOWING IS A LIST OF TELEPHONE AREA CODES IN NUMERICAL ORDER. I
|
|||
|
TRIED TO PUT A CAPSULE DESCRIPTION OF THE AREAS WITHIN THE STATES
|
|||
|
AND PROVINCES. THE CITY NAMES INCLUDE THE AREA SURROUNDING THE CITY
|
|||
|
EXCEPT THAT NEW YORK CITY HAS TWO AREA CODES. THE STATES AND
|
|||
|
PROVINCES WITHOUT ANYTHING AFTER THEM HAVE JUST ONE AREA CODE, I.E.
|
|||
|
CONNECTICUT, MANITOBA. (BY PHRINGEWARE)
|
|||
|
|
|||
|
201 NEW JERSEY, NORTHEAST 202 DISTRICT OF COLUMBIA
|
|||
|
203 CONNECTICUT 204 MANITOBA
|
|||
|
205 ALABAMA 206 WASHINGTON, WEST
|
|||
|
207 MAINE 208 IDAHO
|
|||
|
209 CALIFORNIA, FRESNO 212 NEW YORK
|
|||
|
213 CALIFORNIA, LOS ANGELES 214 TEXAS, DALLAS
|
|||
|
215 PENNSYLVANIA, PHILADELPHIA 216 OHIO, CLEVELAND
|
|||
|
217 ILLINOIS, MIDDLE 218 MINNESOTA, DULUTH
|
|||
|
219 INDIANA, NORTH 301 MARYLAND
|
|||
|
302 DELAWARE 303 COLORADO
|
|||
|
304 WEST VIRGINIA 305 FLORIDA, MIAMI
|
|||
|
306 SASKATCHEWAN 307 WYOMING
|
|||
|
308 NEBRASKA, WEST 309 ILLINOIS, PEORIA
|
|||
|
312 ILLINOIS, CHICAGO 313 MICHIGAN
|
|||
|
314 MISSOURI, ST. LOUIS 315 NEW YORK, SYRACUSE
|
|||
|
316 KANSAS, SOUTH 317 INDIANA, CENTRAL
|
|||
|
318 LOUISIANA, WEST 319 IOWA, EAST
|
|||
|
401 RHODE ISLAND 402 NEBRASKA, EAST
|
|||
|
403 ALBERTA 404 GEORGIA, NORTH
|
|||
|
405 OKLAHOMA, OKLAHOMA CITY 406 MONTANA
|
|||
|
408 CALIFORNIA, SAN JOSE 409 TEXAS, GALVESTON
|
|||
|
412 PENNSYLVANIA, PITTSBURGH 413 MASSACHUSETTS, SPRINGFIELD
|
|||
|
414 WISCONSIN, MILWAUKEE 415 CALIFORNIA, BAY AREA
|
|||
|
416 ONTARIO, TORONTO 417 MISSOURI, SPRINGFIELD
|
|||
|
418 QUEBEC, QUEBEC 419 OHIO, TOLEDO
|
|||
|
501 ARKANSAS 502 KENTUCKY, WEST
|
|||
|
503 OREGON 504 LOUISIANA, NEW ORLEANS
|
|||
|
505 NEW MEXICO 506 NEW BRUNSWICK
|
|||
|
507 MINNESOTA, ROCHESTER 509 WASHINGTON, EAST
|
|||
|
512 TEXAS, AUSTIN 513 OHIO, CINCINNATI
|
|||
|
514 QUEBEC, MONTREAL 515 IOWA, CENTRAL
|
|||
|
516 NEW YORK, LONG ISLAND 517 MICHIGAN, CENTRAL LP
|
|||
|
518 NEW YORK, ALBANY 519 ONTARIO, LONDON
|
|||
|
601 MISSISSIPPI 602 ARIZONA
|
|||
|
603 NEW HAMPSHIRE 604 BRITISH COLUMBIA
|
|||
|
605 SOUTH DAKOTA 606 KENTUCKY, EAST
|
|||
|
607 NEW YORK, BINGHAMTON 608 WISCONSIN, MADISON
|
|||
|
609 NEW JERSEY, SOUTHWEST 612 MINNESOTA, TWIN CITIES
|
|||
|
613 ONTARIO, OTTAWA 614 OHIO, COLUMBUS
|
|||
|
615 TENNESSEE, NASHVILLE 616 MICHIGAN, WEST LP
|
|||
|
617 MASSACHUSETTS, BOSTON 618 ILLINOIS, SOUTH
|
|||
|
619 CALIFORNIA, SAN DIEGO 701 NORTH DAKOTA
|
|||
|
702 NEVADA 703 VIRGINIA, NORTH & WEST
|
|||
|
|
|||
|
- 210 -
|
|||
|
|
|||
|
|
|||
|
704 NORTH CAROLINA, 705 ONTARIO, NORTHEAST
|
|||
|
707 CALIFORNIA, EUREKA 709 NEWFOUNDLAND
|
|||
|
712 IOWA, WEST 713 TEXAS, HOUSTON
|
|||
|
714 CALIFORNIA, ORANGE 715 WISCONSIN, EAU CLAIRE
|
|||
|
716 NEW YORK, BUFFALO 717 PENNSYLVANIA, HARRISBURG
|
|||
|
718 NEW YORK, 801 UTAH
|
|||
|
802 VERMONT 803 SOUTH CAROLINA
|
|||
|
804 VIRGINIA, SOUTH & EAST 805 CALIFORNIA, BAKERSFIELD
|
|||
|
806 TEXAS, AMARILLO 807 ONTARIO, NORTHWEST
|
|||
|
808 HAWAII 812 INDIANA, SOUTH
|
|||
|
813 FLORIDA, FT.MYERS 814 PENNSYLVANIA, ALTOONA
|
|||
|
815 ILLINOIS, NORTH 816 MISSOURI, KANSAS CITY
|
|||
|
817 TEXAS, FORT WORTH 818 CALIFORNIA, ENCINO
|
|||
|
819 QUEBEC, RURAL 901 TENNESSEE, MEMPHIS
|
|||
|
902 NOVA SCOTIA & P E I 904 FLORIDA, NORTH
|
|||
|
906 MICHIGAN, UPPER PENINSULA 907 ALASKA
|
|||
|
912 GEORGIA, SOUTH 913 KANSAS, NORTH
|
|||
|
914 NEW YORK, WHITE PLAINS 915 TEXAS, WEST
|
|||
|
916 CALIFORNIA, SACRAMENTO 918 OKLAHOMA, TULSA
|
|||
|
919 NORTH CAROLINA, NORTH & EAST
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 211 -
|
|||
|
|
|||
|
|
|||
|
The Bible of Fraud: By: Sneak Thief
|
|||
|
|
|||
|
What A Fool I Was!
|
|||
|
------------------
|
|||
|
|
|||
|
Looking back on my old file, The Bible of Fraud, I'm almost
|
|||
|
sickened at how lame I was back then (then again, some people will
|
|||
|
argue about how lame I am NOW), so this file will attempt to
|
|||
|
rectify some of the earlier flaws in The Bible of Fraud.
|
|||
|
|
|||
|
CBI/TRW
|
|||
|
-------
|
|||
|
|
|||
|
CBI and TRW are huge credit verification systems which contain
|
|||
|
credit information on 125 or so million Americans. If you simply
|
|||
|
know the name, address, and first letter of someone's street, you
|
|||
|
can find out their credit card number, and other essential
|
|||
|
informations. You can see how useful this can be for carders. But
|
|||
|
TRW and CBI's usefullness does have it's price, however...
|
|||
|
CBI and TRW passwords are much harder to find than they were way
|
|||
|
back when. CBI passwords are echoed back to screen when entered,
|
|||
|
hence they are not echoed to the business' printer which is usually
|
|||
|
on during during the procedure. Although many will argue with me,
|
|||
|
I believe that TRW passwords are. This is as of three months ago,
|
|||
|
when I shocked myself and friends by finding a print-out with a
|
|||
|
valid TRW code on it. Shocked, I most definately was. But, TRW is
|
|||
|
getting greatly worried due to complains from people with their
|
|||
|
records violated, so it most definately unlikely that they will
|
|||
|
keep up the practice. As I mentioned in my earlier file, CBI is
|
|||
|
generally prefered to TRW by any carder with enough sense to tie
|
|||
|
his shoes without help from Mommy. The reason for this is simple:
|
|||
|
TRW is VERY nasty towards anyone in their system! They trace.
|
|||
|
They prosecute. If someone breaks in while you're on one of these
|
|||
|
systems and says, "What the HELL are you doing!?" Don't bother
|
|||
|
hanging up. They've already got you. You could try and BS your way
|
|||
|
out of it, but I doubt that (by the way, however, it is unlikely
|
|||
|
that TRW is paying very close attention to most of the ports of
|
|||
|
their system due to the sheer number of them, but if you dial your
|
|||
|
local TRW dial-up direct [Never, NEVER do that!] and they break in,
|
|||
|
your career is over. CBI, according to many people I've talked to,
|
|||
|
is much less dangerous than TRW, but I doubt that they wouldn't
|
|||
|
enjoy hauling your ass into court if they caught you. The only
|
|||
|
really easy way I envision getting a CBI code (other than leeching
|
|||
|
off of someone else), is to look in the trash for CBI print-outs
|
|||
|
with the users code written on them (so the idiot using the machine
|
|||
|
won't forget). This is unlikely, but Metro ever waking up to the
|
|||
|
fact that they we're being robbed blind was unlikely, also. So, in
|
|||
|
conclusion, I would just get my hands dirty by trashing, as TRW and
|
|||
|
CBI codes go dead so fast, they usually aren't worth the trouble
|
|||
|
you took to get them. On to trashing techniques!
|
|||
|
|
|||
|
- 212 -
|
|||
|
|
|||
|
|
|||
|
Trashing
|
|||
|
--------
|
|||
|
|
|||
|
If you do not know what trashing is, I recommend that you scavenge
|
|||
|
up a copy of the Bible of Fraud, as it gives a more complete
|
|||
|
explanation of trashing techniques.
|
|||
|
|
|||
|
Some hints...
|
|||
|
|
|||
|
o Good places to trash are Flower Shops. They do a lot of
|
|||
|
phone orders, and instead of reaching your hand into
|
|||
|
chicken guts or the bag where they empty the ashtrays
|
|||
|
into, you can just root around in wilted flowers.
|
|||
|
|
|||
|
o Malls are not great places to trash. This is because
|
|||
|
of an increasing number of nosy security cops, and the
|
|||
|
fact that tenents at the mall have usually been lectured
|
|||
|
on security and shred their carbons.
|
|||
|
|
|||
|
|
|||
|
The Bible of Fraud:
|
|||
|
|
|||
|
o Try and get all the information from a carbon that you
|
|||
|
can. If you find a business that requires all kinds
|
|||
|
of information (driver's license number, home address,
|
|||
|
etc), as my local Video World does, your in luck. Many
|
|||
|
places require all of this information.
|
|||
|
|
|||
|
o Trash around the beginning or end of the month. This
|
|||
|
is when many companies throw away their old files filled
|
|||
|
with carbons. You can also try the end of the week, as
|
|||
|
some stores clear out the weeks files then.
|
|||
|
|
|||
|
o FIND OUT WHEN TRASH DAY IS! Then come the evening
|
|||
|
before. If your going to find anything, find it then.
|
|||
|
On to the next section, Ordering.
|
|||
|
|
|||
|
Ordering
|
|||
|
--------
|
|||
|
|
|||
|
The key to ordering is the voice. That's all there is too it. If
|
|||
|
you sound like Mickey Mouse, better find someone else to order for
|
|||
|
you. Here are some tips on ordering...
|
|||
|
|
|||
|
o Do not be playing any music in the background.
|
|||
|
|
|||
|
o Keep the door closed in the room your ordering from, and
|
|||
|
whenever possible, order when your parents aren't home.
|
|||
|
This way, they won't hear your mother screaming at you
|
|||
|
to do chores, or some other stupid thing, and your mother
|
|||
|
won't hear you ordering (we wouldn't want her to do that,
|
|||
|
would we?
|
|||
|
|
|||
|
- 213 -
|
|||
|
|
|||
|
|
|||
|
o If something goes wrong with the order (suspicious clerk,
|
|||
|
etc), or your asked for a piece of info you can't give,
|
|||
|
DO NOT HANG UP INSTANTLY. This instills great suspicion,
|
|||
|
suspicion of you. Far better it is to BS out of it
|
|||
|
and then hang up more polietly.
|
|||
|
|
|||
|
o If you give them the credit card number, and then
|
|||
|
something goes wrong (ie: you panic and hang up),
|
|||
|
throw away the number you gave them. It may
|
|||
|
be overly cautious, but you never know!
|
|||
|
|
|||
|
o Call (800) verification numbers from a pay-phone.
|
|||
|
|
|||
|
o Order from a payphone [One of my favorite techniques
|
|||
|
is to find a remote pay phone in which there is two
|
|||
|
or more phones, and order from one and leave the other
|
|||
|
off-hook. Then I give the guy the phone number of the
|
|||
|
off-hook phone. This is good because I have had
|
|||
|
instances in which I had a number that rang forever,
|
|||
|
and they called it while I was on! ("Sir, your phone
|
|||
|
is ringing...")]
|
|||
|
|
|||
|
o Never, ever, allow your voice to squeak.
|
|||
|
|
|||
|
Ok, I think that is about all that is really needed on ordering, so
|
|||
|
on to the next section: The Drop
|
|||
|
|
|||
|
The Drop Site
|
|||
|
-------------
|
|||
|
After you find the perfect card, and order perfectly, you've still
|
|||
|
got to pick it up. This is the most dangerous part, so it might be
|
|||
|
a good idea to find someone else to do it for you, but I doubt
|
|||
|
anyone would do it. Wear normal clothes and look normal. If you
|
|||
|
pull a cap over your eyes, wear dark sunglasses, etc they will
|
|||
|
probably remember you, and on the off chance that the Feds come
|
|||
|
interview these people they can give a MUCH better description. By
|
|||
|
far the best way to fraud is to find an isolated house that is
|
|||
|
vacant. Make sure that it is far enough away from your house that
|
|||
|
it won't cause suspicion, but close enough that when you come to
|
|||
|
check on your order every day you won't be too tired. If you drive
|
|||
|
your car to the drop site, use a little sense and park it a couple
|
|||
|
blocks away. Unfortunately, vacant houses are rare, and they do
|
|||
|
not stay vacant for long. Thus, another good way is to find a
|
|||
|
house in which no one is home in the daytime (this isn't so hot
|
|||
|
when you order special UPS [It's always a good idea to wait for
|
|||
|
regular UPS!], since they can't sign for it. If you cannot find a
|
|||
|
family that works, then you will just have to send it to any old
|
|||
|
house. Leave these people a note saying "Due to an error, some of
|
|||
|
the goods I ordered are coming to your house. I would appreciate
|
|||
|
you holding them for me." Then just come and pick them up (when
|
|||
|
doing this, wait for a week after your sure it'll be there. Coming
|
|||
|
back more than once would stick your face in their memory.
|
|||
|
|
|||
|
- 214 -
|
|||
|
|
|||
|
|
|||
|
The only rule of the drop is: NEVER USE A PO BOX! Not only if
|
|||
|
you are caught will you get in more trouble, you are much more
|
|||
|
likely to get caught. I cannot count how many times I've seen
|
|||
|
people get busted from a PO box because they keep on reusing the
|
|||
|
same one. Save yourself the trouble and expense, and the risk, and
|
|||
|
forget a PO Box. I'd hate to read about you in the paper.
|
|||
|
|
|||
|
On to the final section, Random Hints.
|
|||
|
|
|||
|
Random Hints
|
|||
|
------------
|
|||
|
|
|||
|
o Get rid of your carbons. Copy them on to a disk file,
|
|||
|
so they are easier to destroy (in case of emergency),
|
|||
|
and your parents won't chance upon them.
|
|||
|
|
|||
|
o Decide what you want to get before you get before you
|
|||
|
get it. If you need an Apple Cat 212 and and a ten
|
|||
|
meg for your board, get them and don't add a Hayes
|
|||
|
Mach /// joystick for Bill, a 212 upgrade for Sam,
|
|||
|
a...
|
|||
|
|
|||
|
o Lay low after a fraud. After you fraud something, wait
|
|||
|
a couple of weeks before you try anything else.
|
|||
|
|
|||
|
o Never keep any of the stuff that comes with the
|
|||
|
merchandise. Such as the invoice slip, etc. Destroy it
|
|||
|
immediately.
|
|||
|
|
|||
|
o Do not get greedy. That will only cause trouble. Fraud
|
|||
|
what YOU need, and only the essentials. If your friends
|
|||
|
want something, it's up to them to take the risk of
|
|||
|
getting it!
|
|||
|
|
|||
|
o Never use the same address, PO Box, etc., twice. In
|
|||
|
fact, only send something to a general area once.
|
|||
|
|
|||
|
o Sell whatever you can. Use the profits from that to
|
|||
|
buy the same stuff legally. (It makes things easier
|
|||
|
than destroying serial numbers, etc)
|
|||
|
|
|||
|
|
|||
|
The Bible of Fraud:
|
|||
|
|
|||
|
o Computer stuff is the hardest to fraud. If you find
|
|||
|
yourself getting frustrated, fraud something easy but
|
|||
|
something that you can sell for a decent profit (Tennis
|
|||
|
rackets are great for this!)
|
|||
|
|
|||
|
o Don't flaunt what you get. Parents are VERY suspicious.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 215 -
|
|||
|
|
|||
|
|
|||
|
Hot Areas
|
|||
|
---------
|
|||
|
|
|||
|
You won't get busted. Rather, you won't get busted if the feds
|
|||
|
don't come into your area. If they start getting interested, and
|
|||
|
investigate your area, and then you attempt a fraud, you are
|
|||
|
busted. So wise up. If you see strange men in dark business suits
|
|||
|
and aviator sunglasses lounging around in front of your
|
|||
|
drop, or cars in government license plates are driving around your
|
|||
|
city, cool it. If you live in say, Los Angeles, you can get away
|
|||
|
with more than if you live in Crow's Neck, Montana. The reason is
|
|||
|
once they get interested in Crow's Neck, they can stake out the
|
|||
|
entire town, wheras in Los Angeles that is slightly difficult even
|
|||
|
for your friends and mine, the FBI. So, take the obvious
|
|||
|
course--let your area stay cool. Small frauds, spaced far apart
|
|||
|
will keep you safe. 5 ten megs to the same address in a week
|
|||
|
won't.
|
|||
|
|
|||
|
The Media
|
|||
|
---------
|
|||
|
|
|||
|
You see the media constantly crowing about "Teenage 'HACKERS' in
|
|||
|
New Jersey Arrested", or "Irvine Youths Convicted of Five Counts of
|
|||
|
Mail and Wire Fraud", but the truth is that they don't make many
|
|||
|
busts, that's why they keep on blabbing about the ones they do
|
|||
|
make. But, if you read in the paper about your friend Bez Man
|
|||
|
being busted, and he lives five miles away, take it as a hint to
|
|||
|
start destroying documents, etc, etc... In other words, use the
|
|||
|
media as some sort of 'heat detector'. When they start crowing
|
|||
|
about law and order and computer crime, it's time to pack things up
|
|||
|
for a while. Likewise after a MAJOR bust, as the local cops will
|
|||
|
always be looking to get in on the glory.
|
|||
|
|
|||
|
The End
|
|||
|
-------
|
|||
|
|
|||
|
I hope that this file has been educational, and I wish you luck on
|
|||
|
any career of frauding. Don't get busted, and don't get greedy,
|
|||
|
and enjoy a long career of getting what you want--for free.
|
|||
|
|
|||
|
I would REALLY appreciate any feedback, and I'll give credit where
|
|||
|
credit is due, so leave me a message on any of the below listed
|
|||
|
boards.
|
|||
|
|
|||
|
If you didn't like this file. . .I don't really care (I've got
|
|||
|
enough things to worry about!)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 216 -
|
|||
|
|
|||
|
HACKING/PHREAKING--THE DO'S AND DON'TS,THE WHY'S AND HOW'S BY:THE JESTER
|
|||
|
=---=---=--=---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=
|
|||
|
*NOTE*--ALL OF THE LAW'S AND DEFINTIONS CITED HEREIN ARE FOR THE
|
|||
|
STATE OF ILLINOIS.IF YOU LIVE IN ANOTHER STATE,I SUGGEST
|
|||
|
YOU GO TO YOUR LIBARY AND LOOK UP YOUR STATE LAW'S.
|
|||
|
|
|||
|
PREFACE:Firstly I will decribe the ways hackers go about hacking
|
|||
|
a system,then the current telephone law's and lastly the
|
|||
|
defintions of computers and other miscellaneous
|
|||
|
definions.
|
|||
|
|
|||
|
|
|||
|
First off I would like to disspell a few myths.
|
|||
|
1--You are a minor untill you are 19,emancipated or living without
|
|||
|
parant(s) or guardan.
|
|||
|
2--Computer data and programs are property and therefore if taken
|
|||
|
without consent of the owner is grounds for prosecution.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
THE WAY HACKERS HACK:
|
|||
|
--- --- ------- ----
|
|||
|
|
|||
|
SABOTAGE.
|
|||
|
-Physicaly-abusing computers,data or magnetic medea.
|
|||
|
|
|||
|
-logicly-this includes removing of labels and titles
|
|||
|
from the storeage container or from the data itself.
|
|||
|
|
|||
|
-accidental-using a sititution wherein the computer
|
|||
|
or data would be destroyed or damaged. ( ie. setting
|
|||
|
fire to a pile of papers causing the sprinklers to go
|
|||
|
off ect.)
|
|||
|
|
|||
|
IMPERSINATION.
|
|||
|
-impersinating a leagle user to gain access to the
|
|||
|
computer,data ect.
|
|||
|
|
|||
|
DATA DIDDLING.
|
|||
|
-This method is done via phone-modem line and nessatates
|
|||
|
a knowlage of programing.The essance of this method is
|
|||
|
changeing the output to ones needs. ( ie. You send your
|
|||
|
boss a note asking for a coffee break,he oks it and
|
|||
|
sends it back.Then you take advantage of the time it
|
|||
|
takes to get to you back and change the note to say
|
|||
|
that you can take 2 weeks off with pay.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 217 -
|
|||
|
|
|||
|
|
|||
|
SUPERZAPPING.
|
|||
|
-Superzapping is the use of a master program to bypass
|
|||
|
the safeguards.Many banks have superzap programs if
|
|||
|
the system freezes and they need to get into the
|
|||
|
accounts.
|
|||
|
|
|||
|
SCAVENGING.
|
|||
|
-This is just like a undelete program.If a programer
|
|||
|
had a legal account all he would have to do is read
|
|||
|
the old info from the current disk or tape.
|
|||
|
-Also scavenging is accomplished by looking through
|
|||
|
a companys garbage.Companys are alway throwing out
|
|||
|
old codes and information wich may be useful to a
|
|||
|
hacker.
|
|||
|
|
|||
|
WIRETAPPING.
|
|||
|
-This is the gathering of information through a wire
|
|||
|
tap.
|
|||
|
|
|||
|
TRAPDOORS.
|
|||
|
-These are master passes wich a programer put into the
|
|||
|
system so that if the company added more safeguards
|
|||
|
onto the system he would be able to enter the system
|
|||
|
later.
|
|||
|
|
|||
|
TROJAN HORSE.
|
|||
|
-This is a program wich has been modified to suit
|
|||
|
the hackers needs.The hacker often adds a hidden
|
|||
|
subrutine wich will make his account bigger or
|
|||
|
make a file adding passwords to his access level
|
|||
|
everytime an action is executed(like logging on
|
|||
|
or accessing help files.)
|
|||
|
|
|||
|
ASYNCHRONOUS ATTACK.
|
|||
|
-This method is made only by the most experanced
|
|||
|
hacker.It involves attacking the operating system
|
|||
|
by trying things that the operating system wasn't
|
|||
|
ready for(like lots of control charters to name
|
|||
|
one).The out come is usualy a crash but sometimes
|
|||
|
the system may allow the hacker to enter th system.
|
|||
|
|
|||
|
LOGIC BOMBS.
|
|||
|
-This is nothing more than an order to delete files
|
|||
|
or data when a condition is met.These bombs can
|
|||
|
be set for days or even years later.
|
|||
|
|
|||
|
IT'S THE LAW:
|
|||
|
---- --- ---
|
|||
|
This will examin the current phone and computer law's for Illinois.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 218 -
|
|||
|
|
|||
|
|
|||
|
Unlawful use of a computer ocurrors when:
|
|||
|
1--A person gains access to the use of a computer system
|
|||
|
without consent of the owner.
|
|||
|
2--Knowingly alters or destroys programs or data without
|
|||
|
comsent of the owner.
|
|||
|
3--Obtains use of,damages,or alters a computer system or
|
|||
|
any part there of.
|
|||
|
4--Accesses any computer or computer system for the purpose
|
|||
|
of (1)-devising any scheme to defraud or (2)-obtains
|
|||
|
money,property or services by means of fraudulent
|
|||
|
pretances.
|
|||
|
|
|||
|
|
|||
|
Sentance:
|
|||
|
1-If convicted of part 1 or 2 sentance is,for less than
|
|||
|
$1,000 in damage,gulty of a petty offense.For damage of
|
|||
|
more than $1,000 in damage,is gulty of a class A
|
|||
|
misdemeanor.
|
|||
|
|
|||
|
2-If convicted of part 3 or 4 sentance is,for less than
|
|||
|
$1,000 in damage,is gulty of a class a misdemeanor.For
|
|||
|
more than $1,000 in damage,is gulty of a class 4 felony.
|
|||
|
|
|||
|
3-Also if you are found gulty and convicted the aggrieved
|
|||
|
person may have your equpment liquidated for $5,000 or
|
|||
|
the actual cost,wichever is greater and have you pay for
|
|||
|
their attorney.
|
|||
|
|
|||
|
Unlawful use of phone lines: Includes,swearing,calling and
|
|||
|
hanging up and other harasment whom- ever is convicted of said
|
|||
|
offence is gulity of a class b misdemeanor. Puting sluggs and
|
|||
|
tampering with a pay phone is also a class B misdemeanor.
|
|||
|
|
|||
|
Tapping lines,interfearing with phone messages and obtaing
|
|||
|
phone searvice with intent to defraud is a class A misdemeanor.
|
|||
|
|
|||
|
|
|||
|
With intent to defraud:
|
|||
|
Definition--
|
|||
|
[A]-Charging phone service to a existing telephone number
|
|||
|
or credit card number without consent of the owner.
|
|||
|
[B]-Charging said service to a false or nonexistent phone
|
|||
|
or credit card number.
|
|||
|
[C]-Using a code or scheme to send or receive information.
|
|||
|
[D]-Installing,rearanging or tampering with any equpment
|
|||
|
physicaly,acousticaly or electronicly.
|
|||
|
[E]-Publishing the number or code of an existing,cancled
|
|||
|
or revoked credit device wich may be used to avoid
|
|||
|
payment of any lawful telephone charge.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 219 -
|
|||
|
|
|||
|
|
|||
|
[F]-Publishing plans,diagrams or methods for the
|
|||
|
construction of any device wich may be used to avoid
|
|||
|
payment of a lawful telephone charge.
|
|||
|
|
|||
|
If convicted of any of the above the punishmet is as a
|
|||
|
class A misdemeanor.
|
|||
|
|
|||
|
Felons,Misdemeanors:
|
|||
|
Class A misdemeanor-punshable with up to 1 year in prison
|
|||
|
Class b misdemeanor-punishable with up to 6 months in
|
|||
|
prison and/or a $300 fine.
|
|||
|
Class 4 felon-punishable with 6 to 30 years in prison.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NEW LAWS:
|
|||
|
--- ----
|
|||
|
At this wrighting a new bill is being proposed in the
|
|||
|
House of representives wich if passed as a law will restrict bbs'
|
|||
|
by making the sysop responsable for all of the messages and
|
|||
|
information and having the sysop keep a written log of users and
|
|||
|
messages.
|
|||
|
|
|||
|
RELAX:
|
|||
|
-----
|
|||
|
A law pased before July 1 takes effect January 1 of the
|
|||
|
next year. A law passed afer July 1 take effect July first of next
|
|||
|
year. In both cases the General Assembly,by vote of 3/4 of the
|
|||
|
members, may elect to have the said law take effect earlyer or
|
|||
|
later.
|
|||
|
|
|||
|
|
|||
|
I hope to have enlightened some of the users and board the
|
|||
|
rest.My advice is not to get cought.So be careful and don't do
|
|||
|
anything i wouldn't do.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 220 -
|
|||
|
|
|||
|
|
|||
|
Field Freak by Home boy
|
|||
|
|
|||
|
Field Phreaking
|
|||
|
-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Introduction: The purpose of this manuscript is to introduce
|
|||
|
useful phreaking techniques. These techniques have been developed
|
|||
|
by the Third Cartel and have proved to be convenient and reliable.
|
|||
|
|
|||
|
Field Phreaking Kit:
|
|||
|
====================
|
|||
|
|
|||
|
The Field Phreaking Kit is a neccessity for the serious phreaker.
|
|||
|
Some so-called phreaks get all of their information including codes
|
|||
|
from BBSs and have an ego big enough to call themselves phreaks.
|
|||
|
The real phreak acquires knowledge on his own through perseverence
|
|||
|
and ingenuity. Following is a list of useful items for your
|
|||
|
Phreaking Kit:
|
|||
|
|
|||
|
o Backpack: Get a nice one to hold all of your materials.
|
|||
|
o Test Phone: Very Handy. We'll tell you how to get one or
|
|||
|
make one.
|
|||
|
o Ratchet Set: Usually, you'll only need 7/16 and 3/8" size
|
|||
|
ratchets.
|
|||
|
o Screwdrivers: Get medium and large screwdrivers, and a
|
|||
|
phillips head.
|
|||
|
o Wire Cutters: Just in case you want to wipe out some lines.
|
|||
|
o Pliers: For misc. stuff.
|
|||
|
o Xacto or Pocket Knife: To strip or cut wires.
|
|||
|
o Penlight: Nice and small; very useful for night work.
|
|||
|
o Flashlight: If you need lots of light and have enough room in
|
|||
|
your pack.
|
|||
|
o Gloves: Make sure you don't get shocked or leave your
|
|||
|
fingerprints around.
|
|||
|
o Pencil and Paper: Write down locations, notes, numbers, etc.
|
|||
|
-----------------------------------------------------------------
|
|||
|
The Third Cartel carries the following optional materials in their
|
|||
|
Field Kit:
|
|||
|
-----------------------------------------------------------------o
|
|||
|
Walki-Talkies: For communications when yelling isn't possible
|
|||
|
or smart.
|
|||
|
o Battery Operated Camara Flash: Good for flashing in someone's
|
|||
|
eyes at night Will blind a telco guy for a few seconds.
|
|||
|
o Mace/Dog Repellant: Spray in someone's eyes if they give you
|
|||
|
trouble.
|
|||
|
o Smoke Bomb: Helpful to divert attention or scare. [drop in
|
|||
|
telco car] [Mix 3 parts potassium nitrate with 2 parts sugar
|
|||
|
and melt]
|
|||
|
o Matches: For smoke bomb or anything that is flammable.
|
|||
|
o Bandana/Surgical Mask: Manholes are dusty; Wear these for
|
|||
|
easier breathing.
|
|||
|
|
|||
|
- 221 -
|
|||
|
|
|||
|
|
|||
|
o Marker: Mark your "territory" on phone boxes.
|
|||
|
o Fake Telco ID Card: Will make some people think that you work
|
|||
|
for telco.
|
|||
|
|
|||
|
Organize your kit so you know where everything is and can get
|
|||
|
something quickly when needed. You don't want to be fumbling for
|
|||
|
your mace when the gestapo is about to get you.
|
|||
|
|
|||
|
|
|||
|
Test Phone:
|
|||
|
===========
|
|||
|
|
|||
|
The Test Phone is the most useful piece of equipment for Field
|
|||
|
Phreaking. You can try to sneak into a telco Plant Department
|
|||
|
[truckyard] and get a real test phone out of a truck like we did.
|
|||
|
If you'd rather not do this, don't worry; making your own test
|
|||
|
phone is ultra-easy.
|
|||
|
|
|||
|
First, get a telephone for your own purposes. Find the wire coming
|
|||
|
out of the phone that is supposed to go to the wall's modular jack.
|
|||
|
It should be at least three feet long for convienience. Cut off
|
|||
|
the modular jack at the end of the wire. Strip the wire, and
|
|||
|
there should be two or four small wires inside. Hook the two
|
|||
|
middle wires to alligator clips [preferably insulated]. You now
|
|||
|
have a test phone! Very easy, indeed. Now let's see if you
|
|||
|
hooked everything up ok. First find your phone box. It'll
|
|||
|
probably be on the outside of your house. It's farly small, and
|
|||
|
you might need the ratchet to open it up. Once you get it open,
|
|||
|
you should see some screws. These are the terminals for your phone
|
|||
|
line. Hook the alligator clips to the two top terminals. If your
|
|||
|
phone is ok, you should get a dial tone. Once you know that your
|
|||
|
phone is working, a whole new world opens up to you! You can hook
|
|||
|
the phone up to your neighbor's terminal and call long distance or
|
|||
|
yell at the operator on their line. Be careful, though. You don't
|
|||
|
want to be talking to Sue in L.A. when your neighbors are home and
|
|||
|
awake. If they pick up the phone when you're already on, you could
|
|||
|
get into serious trouble. Of course, you could always listen in on
|
|||
|
them! If you want, you can hook wires up to your neighbor's terminal
|
|||
|
and lead them to your house. In case you didn't know, this is called
|
|||
|
Beige Boxing. You can then hack computers on their line, call
|
|||
|
Dial-A-Prayer, etc. Make sure to hide the wire well so that it
|
|||
|
won't be traced to your house!
|
|||
|
|
|||
|
Manholes:
|
|||
|
=========
|
|||
|
|
|||
|
One way to get access to an abundance of phone lines is by getting
|
|||
|
into telco manholes. You don't want to accidentally get in a sewer
|
|||
|
manhole, so the first thing to do is find the differences between
|
|||
|
sewer and telephone manholes. If you have trouble with this,
|
|||
|
here's a few tips that might help:
|
|||
|
|
|||
|
- 222 -
|
|||
|
|
|||
|
|
|||
|
o Telco manhole covers are usually larger and heavier than other
|
|||
|
covers.
|
|||
|
o Telco manholes are scarce compared to sewer manholes. So if
|
|||
|
there are a lot of checkered manhole covers in your area,
|
|||
|
those are probably sewer manholes. If there are only a
|
|||
|
handful of unmarked manhole covers in your area, those
|
|||
|
probably contain phone lines.
|
|||
|
o Go to your local telco Central Office [CO] and find out what
|
|||
|
the manhole covers look like there. Find manhole covers that
|
|||
|
look the same in other areas, and pick a convenient/safe
|
|||
|
manhole to explore.
|
|||
|
|
|||
|
Getting into a manhole is a different story. Here in the Denver
|
|||
|
area, it takes at least three people to get a manhole cover off.
|
|||
|
Hopefully it'll be easier to do in your area. To open the manhole,
|
|||
|
you'll probably need at least two crowbars [You could try using a
|
|||
|
pickaxe]. Get a group together to open the manhole, using 2 or
|
|||
|
more people with crowbars to slide the cover off. You
|
|||
|
might want to get a strong guy to push the manhole cover while the
|
|||
|
other people with crowbars support it. If you know of a tool that
|
|||
|
was made specifically for opening manholes, we'd appreciate it if
|
|||
|
you contacted us on some local Denver boards and told us about it.
|
|||
|
Likewise, if you have a better system for opening manholes, we'd be
|
|||
|
grateful for the information.
|
|||
|
|
|||
|
Once you get the manhole cover off, shine a flahlight down to see
|
|||
|
if there's a ladder going to the bottom. Try a different manhole
|
|||
|
if there's no ladder. If you want to go down a manhole, don't
|
|||
|
forget to wear a bandana or surgical mask over your mouth so that
|
|||
|
you don't choke on dust. Also bring a flashlight so you can see
|
|||
|
what you're doing. Many times, there'll be a few inches of water
|
|||
|
at the bottom, so you might also want to wear boots.
|
|||
|
|
|||
|
Down in the manhole, you might find some equipment or manuals. Go
|
|||
|
ahead and take them if you want; you deserve it! There should be
|
|||
|
some very large ABS plastic tubes going across the "room" you're
|
|||
|
in. The phone lines are inside these tubes. Attached to this
|
|||
|
tubing there will be some short, wide plastic cylinders. There'll
|
|||
|
be screws holding these cylinders on to the tubing. You'll need
|
|||
|
either a screwdriver or a ratchet to open a cylinder. If you happen
|
|||
|
to get a cylinder open, congratulations! You now have access to
|
|||
|
countless phone lines! We'll leave it to you to figure out what to
|
|||
|
do with all of those wires. Surely you'll figure something out!
|
|||
|
[snip, snip!]
|
|||
|
|
|||
|
Exploring Telco Building Sites:
|
|||
|
===============================
|
|||
|
One of the best ways to get information about telco is by going to
|
|||
|
a Central Office near you, exploring the trucks in a Plant
|
|||
|
Department, or "visiting" other telco buildings. The phone company
|
|||
|
is careless in many ways. They leave important, yet unshredded
|
|||
|
documents and computer printouts in their open DUMPSTERS.
|
|||
|
|
|||
|
- 223 -
|
|||
|
|
|||
|
|
|||
|
Their cars, vans, and repair vehicles are almost always left
|
|||
|
unlocked. Inside their vehicles one can usually find manuals,
|
|||
|
test phones, computer cards [usually for mainframes, almost never
|
|||
|
for personal comuters], nice tool sets, etc.! It's almost as if
|
|||
|
they *want* to be ripped off! They deserve bad treatment just for
|
|||
|
their negligence. If possible, we like to be courteous to
|
|||
|
individual employees of telco. Most employees are fairly amiable
|
|||
|
and don't deserve trouble. It's the beuracracy of telco that
|
|||
|
deserves to be manhandled. Cheap practices such as monopolizing
|
|||
|
and the overpricing of services is the general reason why we phreaks
|
|||
|
do what we do with such determination. On with the show.
|
|||
|
|
|||
|
Exploring Dumpters: Looking inside telco dumpters is probably the
|
|||
|
easiest way to acquire useful information. Typycally, dumpters
|
|||
|
will be found outside a Central Office. They are usually left open
|
|||
|
for the world to see. It's a good idea to check a dumpster near
|
|||
|
you every day or two. You want to get your printouts and such
|
|||
|
before they go to the garbage dump. Make sure that you aren't
|
|||
|
pulling stuff out of the dumpster when the employees get out for
|
|||
|
the day! If possible, check the dumpster after closing hours just
|
|||
|
to be safe. But it's usually ok to get stuff out of it during
|
|||
|
working hours. You should find a lot of useful information,
|
|||
|
including computer numbers, if you consistently check the dumpsters.
|
|||
|
|
|||
|
Exploring Plant Departments: Plant Department is just a strange
|
|||
|
name telco made for a truckyard. You might need your 'ol wire
|
|||
|
cutters for this job. Plan to stay up late for this mission, too.
|
|||
|
Around here, at least, the Plant Department doesn't close until
|
|||
|
11:30 to 11:45 p.m. If your local Plant Department isn't bound by
|
|||
|
barbed-wire fences, you're lucky. If, unfortunately, it's like
|
|||
|
ours, you'll have to find a way to get in. First, try to find
|
|||
|
breaks in the fence where you might be able to slip through. If
|
|||
|
this isn't possible, and you can't climb over the fence because
|
|||
|
there's barbed-wire at the top, get out the [gasp!] wire cutters.
|
|||
|
Cut the barbed-wire and climb over the fence. Quietly move around
|
|||
|
the truck yard, opening various trucks, taking whatever you want.
|
|||
|
Although it might be hard, try to control yourself. Only take one
|
|||
|
item per truck so that the fools don't get suspicious. You don't
|
|||
|
ever want them to get suspicious, or you'll never be able to go
|
|||
|
back without fearing that they might be watching the truckyard for
|
|||
|
intruders. Just take a testphone and a few handy manuals. The
|
|||
|
testphone is usually in the back behind the passenger's seat.
|
|||
|
Manuals should be in the glove compartment or between the two front
|
|||
|
seats. The rest of the gadgets in the trucks have little or no
|
|||
|
practical uses for phreaks. Too bad. Be cool and don't take
|
|||
|
anything you don't need. Correction: Don't take anything you don't
|
|||
|
*really* want. Have phun with this, and please let us know if you
|
|||
|
find any useful gadgets in a telco truck. We'd like to hear from
|
|||
|
you! Look for a Field Phreaking II file soon. It should be
|
|||
|
Manuscript III.
|
|||
|
|
|||
|
- 224 -
|
|||
|
|
|||
|
|
|||
|
The Telephone Works: by Egghead Dude
|
|||
|
|
|||
|
Welcome to CHiNA Educational InfoFile Series II, # 3.
|
|||
|
Once again, be looking for new files weekly for the next few weeks
|
|||
|
until school starts again. And contrary to Megaton Man's belief,
|
|||
|
we are still very much alive and in production. If he tells you
|
|||
|
otherwise, kindly call him a peasant and tell him to fuck
|
|||
|
himself...if you want. Enjoy!
|
|||
|
|
|||
|
|
|||
|
Here are the standards in Telephone Color Coding:
|
|||
|
|
|||
|
Telephone circuits are paired as 'tip' and 'ring' wires. On POTS
|
|||
|
(plain old telephone service) tip is 0 volts and ring is -48 volts
|
|||
|
(tip is not 'ground' though as it is a blanced line). The pairs
|
|||
|
must be distinguishable from one another easily so they are colour
|
|||
|
coded. The colour of the wire indicates whether it is tip or ring.
|
|||
|
In a quad wire green and black are tip while red and yellow are
|
|||
|
ring.
|
|||
|
|
|||
|
pair# tip colour ring colour
|
|||
|
_____ __________ ___________
|
|||
|
|
|||
|
1 white blue
|
|||
|
2 white orange
|
|||
|
3 white green
|
|||
|
4 white brown
|
|||
|
5 white slate (silver)
|
|||
|
6 red blue
|
|||
|
7 red orange
|
|||
|
8 red green
|
|||
|
9 red brown
|
|||
|
10 red slate
|
|||
|
11 black blue
|
|||
|
12 black orange
|
|||
|
13 black green
|
|||
|
14 black brown
|
|||
|
15 black slate
|
|||
|
16 yellow blue
|
|||
|
17 yellow orange
|
|||
|
18 yellow green
|
|||
|
19 yellow brown
|
|||
|
20 yellow slate
|
|||
|
21 violet (purple) blue
|
|||
|
22 violet orange
|
|||
|
23 violet green
|
|||
|
24 violet brown
|
|||
|
25 violet slate
|
|||
|
|
|||
|
An individual wire is identified by it's colour and the
|
|||
|
colour of it's stripe. The main colour determines whether it is
|
|||
|
tip or ring while the stripe identifies it's pair (i.e. a black
|
|||
|
|
|||
|
- 225 -
|
|||
|
|
|||
|
|
|||
|
wire with a blue stripe is tip of pair 11). In many cables the
|
|||
|
stripe is missing in which case the pairs are distinguished by the
|
|||
|
way they are twisted, by pulling back the sheath pairs are more
|
|||
|
obvious.
|
|||
|
|
|||
|
As you can see there are only 5 tip colors and 5 ring
|
|||
|
colours (5 x 5 = 25). a 100 pair cable is made up of four of these
|
|||
|
25 pair bundles. The first bundle is wrapped by a white/blue binder
|
|||
|
string, the second by a white/orange binder, the third by a
|
|||
|
white/green and the fourth by a white/brown. This scheme can be
|
|||
|
extended infinitum.
|
|||
|
|
|||
|
Some folks think that the order is:
|
|||
|
Pair Tip Ring
|
|||
|
1 RED GRN
|
|||
|
2 YEL BLK
|
|||
|
3 BLU WHT,
|
|||
|
and that the 1st pair was backwards in a modular connector
|
|||
|
compared to the rest.
|
|||
|
|
|||
|
Wrong. The polarity is off. Modular connectors reverse
|
|||
|
the polarity so they make the issue pretty confusing. A modular
|
|||
|
line cord (that is a properly made _telephone_ line cord) has a
|
|||
|
flat topology such that when laid on a table the top of both
|
|||
|
connectors is up. This means that a reversal (polarity wise) takes
|
|||
|
place. Tip becomes ring on all pairs (the wire is a ribbon in
|
|||
|
theory). the top of both connectors is up. A 'set' jack (the one
|
|||
|
inside the telephone) is wired backwards to compensate.
|
|||
|
|
|||
|
In addition, the system employed throughout the
|
|||
|
(used-to-be) Bell System was actually very simple. There wer five
|
|||
|
colors assigned to "tip" and five colors assigned to "ring". This
|
|||
|
gives a total combination of twenty-five pairs (very convenient!).
|
|||
|
|
|||
|
The colors assigned to the "tip" are;
|
|||
|
|
|||
|
white wt
|
|||
|
red rd
|
|||
|
black bk
|
|||
|
yellow yl
|
|||
|
violet vi
|
|||
|
|
|||
|
The colors assigned to the "ring" are;
|
|||
|
|
|||
|
blue bl
|
|||
|
orange or
|
|||
|
green gr
|
|||
|
brown br
|
|||
|
slate sl (sometimes mistakenly called gray)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 226 -
|
|||
|
|
|||
|
|
|||
|
Standard phone convention is to identify the "tip" first and
|
|||
|
then the "ring" when referring to a pair. Thus, the first five
|
|||
|
pairs of a telephone cable are the "white" pairs;
|
|||
|
|
|||
|
white/blue wt/bl
|
|||
|
white/orange wt/or
|
|||
|
white/green wt/gr
|
|||
|
white/brown wt/bn
|
|||
|
white/slate wt/sl
|
|||
|
|
|||
|
The next five are the "red" pairs:
|
|||
|
|
|||
|
red/blue rd/bl
|
|||
|
red/orange rd/or
|
|||
|
red/green rd/gr
|
|||
|
red/brown rd/bn
|
|||
|
red/slate rd/sl
|
|||
|
|
|||
|
And so on, until all twenty five pairs are identified.
|
|||
|
What happens when there are more than twenty-five pairs in a cable?
|
|||
|
Simple, enclose each twenty-five pair group in a color coded
|
|||
|
binder. And guess what the color coding is for the binder. Yep, the
|
|||
|
same as the wires in the binder. The first binder group is the
|
|||
|
"white/blue" binder the second is the "white/orange" binder, and so
|
|||
|
on. If it is necessary to refer to the twenty-sixth pair of a
|
|||
|
fifty pair cable it is referred to as "two white/blue" or 2-wt/bl.
|
|||
|
The seventy-ninth pair in a one-hundred pair cable is called "four
|
|||
|
white/brown" or 4-wt/bn. This all holds true for the first twenty-four
|
|||
|
binders in a cable. The twenty-fifth binder is a little different,
|
|||
|
and my recollection is a little hazy but I believe the binder colors
|
|||
|
are white-white-blue. Yes that's two whites and a blue. It might be
|
|||
|
two blues and a white. It's been a long time since I was in a
|
|||
|
cable over six hundred pairs. One thing I know for sure is that
|
|||
|
they double up on one of the binder colors after the twenty-fourth
|
|||
|
binder group.
|
|||
|
|
|||
|
There is also a convention for the positioning the pairs
|
|||
|
on connecting blocks. The Ring is usually on the Right and the Tip
|
|||
|
is usually on the Top. As you can see there is a pattern here,
|
|||
|
Ring-Red-Right and Tip-Top. I guess this was done to make it
|
|||
|
easier for us dumbinstallers to remember! |-)
|
|||
|
|
|||
|
The only difference in the color coding between telephone
|
|||
|
cable (the stuff used outside and strung along poles or underground
|
|||
|
in conduit) and telephone inside wiring (the gray colored stuff in
|
|||
|
the walls and up in the ceiling) is that the inside wire has each
|
|||
|
pair traced with the color of its mate. That is, the first pair is
|
|||
|
a white wire with a blue tracer and its mate is blue with a white
|
|||
|
tracer. This is done to avoid "splitting" a pair. Splitting is
|
|||
|
getting the ring of one pair and the tip of another. In outside
|
|||
|
phone cable each pair is twisted with its mate and the chances
|
|||
|
|
|||
|
- 227 -
|
|||
|
|
|||
|
|
|||
|
of splitting a pair are not as great (although it's been known to
|
|||
|
happen ;-)).
|
|||
|
|
|||
|
With wiring done inside a house, a little history is in
|
|||
|
order. Back when we had party-lines,(I know, we still do, but very
|
|||
|
few still in service and none available for new service) three
|
|||
|
wires were necessary because a ground was required to make the bell
|
|||
|
ring. So, the original phone wiring had three conductors, red,
|
|||
|
green and yellow. Red and green were ring and tip respectively and
|
|||
|
yellow was the ground. Then people started getting away from party
|
|||
|
lines and into princess and trimline phones with lights in the
|
|||
|
dial. The yellow was no longer the ground and a black wire was
|
|||
|
added and the yellow and black were used to supply power for the
|
|||
|
lamps from a small transformer. Time marches on, and now people
|
|||
|
are getting second lines installed in their homes. Since the new
|
|||
|
phones get the power for their lamps from the phone line directly,
|
|||
|
the yellow and black are now "spare". The yellow is usually the
|
|||
|
ring and black is the tip. Of course, houses that have been
|
|||
|
pre-wired with six-pair inside wire would normally have line 1 on
|
|||
|
the white/blue pair and line 2 on the white/orange pair. In many
|
|||
|
pre-wire installations I have found that the sixth pair (red/blue)
|
|||
|
was used for transformer power, although I don't believe that was
|
|||
|
ever an official practice.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 228 -
|
|||
|
|
|||
|
|
|||
|
<20>Ŀ ڿ <20><><EFBFBD><EFBFBD>¿ ڿ ڿ <20>Ŀ
|
|||
|
ڳ <20><> <20><> <20><> <20><><EFBFBD> <20><> <20><> ڳ <20><>
|
|||
|
ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>Ĵ<EFBFBD> ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
ڳ<> <20><><EFBFBD> <20><>ڿ <20><>ڿ <20><> <20><>ڿڳ<DABF> <20><><EFBFBD>
|
|||
|
<20><> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
|||
|
-----------------------------------------
|
|||
|
= The End Was Bound To Come! =
|
|||
|
-----------------------------------------
|
|||
|
= By Captain Kidd February 02, 1992 =
|
|||
|
-----------------------------------------
|
|||
|
|
|||
|
After several months of thinking about the group I have
|
|||
|
|
|||
|
decided to let Al.P.H.A total die out! Al.P.H.A started in late
|
|||
|
|
|||
|
90 and was a very small group of people that wanted to make Utah
|
|||
|
|
|||
|
a better place.. The group was started by Doc Silicon and
|
|||
|
|
|||
|
myself.. We were known as Utah most elite hackers and phreakers..
|
|||
|
|
|||
|
The glory was nice and you couldn't beat the fame.. Well we added
|
|||
|
|
|||
|
a few members to our ranks such as Christopher Columbus, Black
|
|||
|
|
|||
|
Beard, Jester (AKA Cyberdeamon) and Falcon not to even talk about
|
|||
|
|
|||
|
our LD contacts, which will remain nameless to protect them..
|
|||
|
|
|||
|
Well back in late 90, early 1991 Black Beard as well as Chris
|
|||
|
|
|||
|
left the modem world as well as the group. Then in early 1991
|
|||
|
|
|||
|
Falcon got busted for Anarchy, so he also left the group.. Well
|
|||
|
|
|||
|
this left Doc, Jester and myself, then jester got involved with
|
|||
|
|
|||
|
women and cars and also bailed out of the group.. Well now we
|
|||
|
|
|||
|
were back to the two founding members of Al.P.H.A.. We were still
|
|||
|
|
|||
|
passing codez and systems left and right, then back in march of
|
|||
|
|
|||
|
1991 I got busted for phreaking, I couldn't believe that Captain
|
|||
|
|
|||
|
Kidd went down for phreaking.. I should of never trusted a system
|
|||
|
|
|||
|
I got from a beginner (Dr. L0GiX).. I got fined and a slap on the
|
|||
|
|
|||
|
hand and a lot of bull shit threats, but that was about it..
|
|||
|
|
|||
|
Still the fines were enough for me to stop phreaking for life..
|
|||
|
|
|||
|
- 229 -
|
|||
|
|
|||
|
|
|||
|
Then came to Doc Silicon leaving for School and that would
|
|||
|
|
|||
|
cut the members by 50%, so we decided to let in 2 Utah users, and
|
|||
|
|
|||
|
I'm sure you all remember them as Quicksilver and Raven.. Well
|
|||
|
|
|||
|
after Doc left for school the group came to a stand still.. We
|
|||
|
|
|||
|
were still hacking but that was about it.. Now Quicksilver is in
|
|||
|
|
|||
|
Boot Camp and I don't talk to Raven much anymore so It's time for
|
|||
|
|
|||
|
the Al.P.H.A to lay down and rest..
|
|||
|
|
|||
|
I just want to take a few and thank some of the people that
|
|||
|
|
|||
|
made Al.P.H.A and Utah what it is today..
|
|||
|
|
|||
|
Doc Silicon: My Partner in Crime and co founder of Al.P.H.A.
|
|||
|
|
|||
|
Clint, we did have a lot of fun and made some
|
|||
|
|
|||
|
killer free call's as well as everything else we
|
|||
|
|
|||
|
did.. Dude, keep the spirit and be careful.. Getting
|
|||
|
|
|||
|
busted was what made me wake up and smell the
|
|||
|
|
|||
|
coffee. Maybe when you get home we can try another
|
|||
|
|
|||
|
FBI call aye?
|
|||
|
|
|||
|
|
|||
|
Space Ace: Dude I'm sure you'll never see this, but it was you
|
|||
|
|
|||
|
that got me into this game we played.. You also got
|
|||
|
|
|||
|
popped for phreaking and I should of listened then
|
|||
|
|
|||
|
and stopped while I was ahead..
|
|||
|
|
|||
|
Black Beard: Geoff, we did have a lot of fun with the warz
|
|||
|
|
|||
|
between our boards aye? Hope to see you back in the
|
|||
|
|
|||
|
pirating world soon..
|
|||
|
|
|||
|
Jester: Billy, you came and went so often no one could keep track
|
|||
|
|
|||
|
of you.. I hope to see you and meet your ass someday..
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 230 -
|
|||
|
|
|||
|
|
|||
|
The Doctor: J. I remember when you first started pirating, man
|
|||
|
|
|||
|
you were such a lamer and all the fucking warz we
|
|||
|
|
|||
|
had were great.. I'm glad we got our shit together
|
|||
|
|
|||
|
and became friends.. Take care and I'll see you in
|
|||
|
|
|||
|
the pirate world..
|
|||
|
|
|||
|
Well I'm sure I missed several people.. I just wanted to
|
|||
|
|
|||
|
touch on a few of Utah greater modemers...
|
|||
|
|
|||
|
This is not my goodbye, but I must wake up and finely grow
|
|||
|
|
|||
|
up.. I will no longer be phreaking and hacking... I've giving it
|
|||
|
|
|||
|
up for good... I'll still be in the pirate world, but I just
|
|||
|
|
|||
|
wanted to let the world know that Al.P.H.A has tuned in there
|
|||
|
|
|||
|
keyboard and is no longer around.. Take care all and keep in
|
|||
|
|
|||
|
touch...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 231 -
|
|||
|
|
|||
|
|
|||
|
<20>Ŀ ڿ <20><><EFBFBD><EFBFBD>¿ ڿ ڿ <20>Ŀ
|
|||
|
ڳ <20><> <20><> <20><> <20><><EFBFBD> <20><> <20><> ڳ <20><>
|
|||
|
ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>Ĵ<EFBFBD> ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
ڳ<> <20><><EFBFBD> <20><>ڿ <20><>ڿ <20><> <20><>ڿڳ<DABF> <20><><EFBFBD>
|
|||
|
<20><> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
|||
|
-----------------------------------------
|
|||
|
= Computer Crimes Past and Present =
|
|||
|
-----------------------------------------
|
|||
|
= By Captain Kidd November 27, 1990 =
|
|||
|
-----------------------------------------
|
|||
|
|
|||
|
|
|||
|
There is a great deal of Computer Crimes going on in the world
|
|||
|
today. We have had several groups taking down, as well as several
|
|||
|
boards. Maybe evenyou had a friend that was busted. This file will
|
|||
|
deal with Computer crimes in it's fullest. Some of the information
|
|||
|
will be current and some past.
|
|||
|
|
|||
|
PIRATING
|
|||
|
--------
|
|||
|
The Cracking, Passing, Coping of Copy Righted Software must be
|
|||
|
one of the major computer crimes in the world. We have several
|
|||
|
groups know as CRACKERS that will get a game when it first comes
|
|||
|
out and crack it (Break the Copy Protection) and have the Slave or
|
|||
|
Couriers, The Person that Distribute the software to the major
|
|||
|
boards across the nation and then other users will download and
|
|||
|
upload this software to a number of BBS's (Bulletin Boards
|
|||
|
Systems). The art of pirating software cost the manufactures
|
|||
|
millions of dollars in sales each and every year.
|
|||
|
|
|||
|
A few Quoits.
|
|||
|
-------------
|
|||
|
|
|||
|
Mary Jan Saunders (Source of SPA (Software Publishers Association)
|
|||
|
in Washington)
|
|||
|
"Trading or Reselling Software without authorization from The
|
|||
|
Developer (A Copy Right Validation) results in $1.2 Billion to $2.0
|
|||
|
Billion in lost sales."
|
|||
|
|
|||
|
David Bradford (Senior Counsel at Novel Inc. Prove Utah)
|
|||
|
"It's fair to say we lose Millions of Dollars each year because
|
|||
|
of Piracy.
|
|||
|
|
|||
|
Some may ask what the fine for pirating is. Well according to
|
|||
|
Mrs Saunders it could result in a $50,000 fine and or 5 year in
|
|||
|
Jail. This is a high price to pay for the newest version of Turbo
|
|||
|
C++ or the newest release from Data-East. I'm not putting Piracy
|
|||
|
down nor am I building it up. I just thought I few people might
|
|||
|
like to know a little more about the penalties of Pirating Copy
|
|||
|
Righted Software.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 232 -
|
|||
|
|
|||
|
|
|||
|
A System Operator (SysOp) has the most to lose. He/She in the
|
|||
|
source in this crime. I have seen a few good boards go down due to
|
|||
|
computer related crimes. The SysOp is kind of like the Drug Dealer,
|
|||
|
with out him the major part of Pirating would be history. My source
|
|||
|
tell me 90% of the bust on the pirates are due to the fact they
|
|||
|
have high Price Business Software on Line, or high price
|
|||
|
Programming Languages. You hardly ever hear of a strictly wares
|
|||
|
board going down due to a bust, if the SysOp get busted with Copy
|
|||
|
Righted files on there board, thay can have there computer taking
|
|||
|
away and also may be cheaged fines and or a Jail term. Running a
|
|||
|
Pirated board is a very dangerious thing to do. Even if a few
|
|||
|
boards drop someone else will take there place. You can never stop
|
|||
|
Pirating, it's here to stay.
|
|||
|
|
|||
|
The next section of this file will talk about Hacking, Phreaking
|
|||
|
and Carding.
|
|||
|
|
|||
|
Hacking, Phreaking, Carding.
|
|||
|
----------------------------
|
|||
|
First off I'm not going to go into detail on any of the above
|
|||
|
subjects. This file is written to enplane the crimes involved with
|
|||
|
these subjects.
|
|||
|
|
|||
|
I remember when the term hacking was meant as software hacking,
|
|||
|
now it's a whole other ledge. Hacking is where you break into other
|
|||
|
systems and change or delete information. Or even add a virus to
|
|||
|
there system.
|
|||
|
|
|||
|
TWR is one of the largest targerts for hackers. They like to
|
|||
|
play with others info and change it, or just get the Credit Card
|
|||
|
Numbers and use them for there own use, Hacking TRW is Hacking and
|
|||
|
Carding combine, for the most part. When you are hacking something
|
|||
|
like TRW, you have a very short time to be on lime, befor they
|
|||
|
start tracing.
|
|||
|
|
|||
|
Phreaking is where you still other peoples LD operating Codes
|
|||
|
(or Phone Cards is you prefer) and make FREE ld calls. This is very
|
|||
|
dangerous and you can get caught very easy. I personal know 2
|
|||
|
people that get BUSTED phreaking. Both had there computer seized.
|
|||
|
One was a local user and the other was a major LD user. I'm going
|
|||
|
to leave both users nameless.
|
|||
|
|
|||
|
People obtain thess illegal access codez via VMBs (Voice Message
|
|||
|
Boxes) or via BBSs. A large number of boards have a Phreaking
|
|||
|
section and will have Codez and Cardz on line for the users to
|
|||
|
play with.
|
|||
|
|
|||
|
This is the main reason I ran Hacking, Phreaking and Carding
|
|||
|
together, in a small way they are all one in the same. Meny text
|
|||
|
files have been done on all the above crimes, saome are how to's
|
|||
|
and others are like this one, just totaly information.
|
|||
|
|
|||
|
|
|||
|
- 233 -
|
|||
|
|
|||
|
|
|||
|
Operation Sun-Devil
|
|||
|
-------------------
|
|||
|
On May 9th and 10th of 1990, 30 Search warrants were enforced
|
|||
|
in 13 cities. Some say this is not the END of it. I fell we will
|
|||
|
have some more bust of the same in the near future. The 13 city
|
|||
|
were. Chicago, Cincinnati, Detroit, Newark, New York, Phoenix,
|
|||
|
Pittsburgh, Plano, Richmond, San Diego and San Jose.
|
|||
|
|
|||
|
Several boards got busted and a lot of others went down, most
|
|||
|
of them to return a few months later, but taking on a whole new
|
|||
|
look. I will leave all the boards that got busted as well as he
|
|||
|
ones that went down and back up nameless. I fell you can research
|
|||
|
this info for your self. I don't want any SysOp or user for that
|
|||
|
fact getting pissed at me for this Information file,
|
|||
|
due to the fact I mentioned there name.
|
|||
|
|
|||
|
All of the above boards that got busted, were involved in
|
|||
|
Pirating, Phreaking and Hacking. It was a day to remember when all
|
|||
|
this happended, 100's of people were scard shitless thats why so
|
|||
|
meny boards droped. It make the National News as well of the Local
|
|||
|
News and the papers. Operation Sun-Devel will go down as one of the
|
|||
|
biggest computers crime busts in history. It's to my understanding
|
|||
|
they are still working to take down several others
|
|||
|
that are involved in thess Crimes.
|
|||
|
|
|||
|
Now I guess it's time to talk about the lowest form of
|
|||
|
computer crime there is, and that's Carding (Users stolen Credit
|
|||
|
Cards to buy stuff for your self). This is not just a computer
|
|||
|
crime, but several boards have Credit Cards on there system. If not
|
|||
|
posted, a few users will be willing to trade several items for
|
|||
|
Cards. I have never had any dealing with CC's other than a
|
|||
|
Utah user/lamer by the name of Matt Goldsberry aka Lord Dread aka
|
|||
|
Sid Viscous. The one and only reason I mention this ASS HOLE, is
|
|||
|
due to the fact he's a fucking lamer and we all should rag on his
|
|||
|
ass. Operation Sun Devil also dealt with Credit Card Fraud. As well
|
|||
|
as the LoD bust back in 1988. LoD stood for Legion of Doom, a 150
|
|||
|
Member group that ran strong for 6 years, back in 1988 several
|
|||
|
members were busted, for tampering with 911, phreaking and Carding.
|
|||
|
To date as far as I can tell LoD is no longer. Carding is the one
|
|||
|
computer crime, that I fell no one should every play with.
|
|||
|
|
|||
|
Carding is one of thoss subjects you can talk about for hours,
|
|||
|
the person mention above got busted for carding. He never served a
|
|||
|
day in jail, just probation, he was a minor, so he got off pretty
|
|||
|
easy.
|
|||
|
|
|||
|
Closing Note
|
|||
|
-------------
|
|||
|
I've taking about Pirating, Phreaking, Hacking, and Carding.
|
|||
|
Some people fell they are one in the same. In a way I suppose they
|
|||
|
are right. Swiping Software via Pirating, is just as bad as
|
|||
|
|
|||
|
- 234 -
|
|||
|
|
|||
|
|
|||
|
Calling LD for free, and hacking in TRW and chancing data is just
|
|||
|
as bad a carding a HST. This file was done to let all users now a
|
|||
|
little more about the computer crimes that go on today. I'm not
|
|||
|
praising or putting down, any or all of these crimes. It's up to
|
|||
|
the people if they want to deal with either one of this crimes.
|
|||
|
It's a free world, do as you please, but my advice to all would be
|
|||
|
stay out of carding, because when you play with fire your gonna get
|
|||
|
bured.
|
|||
|
|
|||
|
|
|||
|
Special Thanks.
|
|||
|
---------------
|
|||
|
Doc Sillions - My Painter in Crime - Keep up the good work
|
|||
|
Doc.
|
|||
|
Phrack World News - Operation Sun Devil - Now one does it like
|
|||
|
Phrack
|
|||
|
The Shattered Image - LoD Bust Phile - Lost of good Info about
|
|||
|
the LoD Bust.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 235 -
|
|||
|
|
|||
|
|
|||
|
HOW TO GET $30 A DAY FROM AT&T - By: Tesla
|
|||
|
-------------------------------------------
|
|||
|
|
|||
|
You can earn $30 per day from the local BELL payphone and AT&T will
|
|||
|
be the ones paying it. AND even if you get caught, which you
|
|||
|
won't, there is nothing that can be done, thanks to the FCC and
|
|||
|
AT&T's current ILLEGAL monopoly on DIAL-1 calls from BELL PAY
|
|||
|
TELEPHONES
|
|||
|
-----------------------------------------------------------------
|
|||
|
This article was written in retaliation for FEDERAL CRIMINAL COURT
|
|||
|
CASE #93-133 in the US DISTRICT COURT of WESTERN PENNSYLVANIA
|
|||
|
titled, "USA vs KEITH MAYDAK ET AL" This case is based on
|
|||
|
fraudulent and false claims by AT&T. We will not tolerate this.
|
|||
|
Be advised, Keith Maydak does not condone stealing from AT&T nor
|
|||
|
has he authorized this notation. We have taken it upon ourselves to
|
|||
|
spread the word that AT&T is a giant rip-off.
|
|||
|
|
|||
|
It's all part of the I-SCAM! The AT&T I-SCAM. I is for IDIOT.
|
|||
|
Idiot=anyone who has AT&T for dial-1 long distance.
|
|||
|
====================================================
|
|||
|
Okay, I don't know if you know this, but AT&T is the long-distance
|
|||
|
carrier at all GTE, BELL, and ALLTEL pay telephones when it comes
|
|||
|
to DIAL-1 CALLS. Even if you dial 10222(MCI)+1+ACN, AT&T gets paid
|
|||
|
for the call. EVEN IF THE PHONE SAYS MCI, IT'S STILL AT&T. This
|
|||
|
is due to, "technical limitations on coin telephones"
|
|||
|
|
|||
|
HELLO!!!!!!! AT&T BUILT THE GODDAM SYSTEM, WHY CAN'T THEY CHANGE
|
|||
|
IT?
|
|||
|
|
|||
|
They could, they won't, why should they? They build the ESS
|
|||
|
SWITCH! WHY SHOULD THEY MAKE IT SO DIAL 1 CAN BE ACCESSED BY ALL.
|
|||
|
ENOUGH, let's learn how to get money.
|
|||
|
-------------------------
|
|||
|
Okay, dial this from your local pay station: 011-871-1101101# The
|
|||
|
Operator will come on confused and say something like, "$32.70
|
|||
|
please" or "what are you calling" If she doesn't tell you the
|
|||
|
rate, ask her.
|
|||
|
|
|||
|
It's usually anywhere from $28.50 to $33.00 depending on where you
|
|||
|
are. Why so much? It's a boat. And this is the rate.
|
|||
|
|
|||
|
NOW HANG UP!
|
|||
|
|
|||
|
Now, call 10288-0 wait for the operator. Ask for a supervisor.
|
|||
|
(NOTE: YOU DON'T HAVE TO, BUT the regular operator will just
|
|||
|
listen to your story and put her supervisor on, so just do it this
|
|||
|
way.)
|
|||
|
|
|||
|
AT&T: Service assistant, may I help you?
|
|||
|
|
|||
|
|
|||
|
- 236 -
|
|||
|
|
|||
|
|
|||
|
YOU: Yes, this is absurd. I called this number and the AT&T
|
|||
|
operator said it was $32.00 (or whatever the rate is).
|
|||
|
She made me put $3.00 in at a time and then connected the
|
|||
|
call. Right after the call answered the party was
|
|||
|
disconnected. I didn't get my money back.
|
|||
|
AT&T: Umm, yeah, right. What number did you dial
|
|||
|
YOU: 011-871-1101-101 Check the rate.
|
|||
|
AT&T: <<Shocked>> Okay sir, we'll mail you a refund, what is your
|
|||
|
name and address?
|
|||
|
YOU: NAME & ADDRESS (go ahead, don't be shy, they'll mail your
|
|||
|
money, they have to, FCC RULES SECTION 47 of US CODE)
|
|||
|
|
|||
|
Do this daily from different pay stations.
|
|||
|
|
|||
|
PROBLEMS:
|
|||
|
Okay, AT&T operators are all mean and will give you shit. You
|
|||
|
need to be prepared to answer some questions.
|
|||
|
|
|||
|
AT&T: We don't have a call that much, are you sure it was AT&T?
|
|||
|
YOU: Yes, it says, "AT&T" they operator said, "AT&T may I help
|
|||
|
you."
|
|||
|
|
|||
|
AT&T: I can't make a check that high. (she's right)
|
|||
|
YOU: Can you send two checks for $15 each (that she can do)
|
|||
|
|
|||
|
AT&T: Where did you get all the change?
|
|||
|
YOU: I don't like being called a liar, what was your name again?
|
|||
|
The store here had no problem giving it to me! This is
|
|||
|
absurd.
|
|||
|
|
|||
|
AT&T: I talked to you yesterday.
|
|||
|
YOU: Yes, it happened yesterday too.
|
|||
|
|
|||
|
AT&T: We'll send a man out to check the payphone.
|
|||
|
YOU: Good. That's a good idea. In the mean time, can you put
|
|||
|
in for my refund? (they can't send a man, it ain't there
|
|||
|
phone)
|
|||
|
|
|||
|
AT&T: I requested a refund, but they will look into it.
|
|||
|
YOU: I hope they do. (they won't)
|
|||
|
|
|||
|
NOTES: ALWAYS GET HER OPERATOR NUMBER
|
|||
|
If you don't get your $30.00 bitch. Even go to the FCC.
|
|||
|
Some operators just don't put in for it. We have done
|
|||
|
this over 300 times for a profit of $10,000. Nearly 90%
|
|||
|
send your money especially if you are pissed.
|
|||
|
|
|||
|
AT&T issues over 10,000 refunds per week and it's all
|
|||
|
automatic. Do not worry about them adding this all up.
|
|||
|
There's nothing they can do. They can't accuse you of
|
|||
|
lying, they could be sued. IT's never happened, but if
|
|||
|
it does, remember:
|
|||
|
|
|||
|
- 237 -
|
|||
|
|
|||
|
|
|||
|
1. They have no clue how much money is in the payphone
|
|||
|
2. It ain't there phone
|
|||
|
3. They are required to send the refund by law
|
|||
|
4. The only people who ever get busted are those who
|
|||
|
admit shit; why do you think Feds and cops always
|
|||
|
tell you they have evidence you better talk. If they
|
|||
|
had enough to convict you, they wouldn't want you to
|
|||
|
talk.
|
|||
|
|
|||
|
HOWEVER, THIS WORKS FINE EVERYTIME
|
|||
|
|
|||
|
And, don't feel bad. AT&T does not deserve to profit from
|
|||
|
payphones. They are theives. Scamming crooks. THEY HAVE AN
|
|||
|
ILLEGAL MONOPOLY ON PAY TELEPHONES!
|
|||
|
|
|||
|
Give this to all your phriends as it's just another part of AT&T's
|
|||
|
way to rip off the world: THE I SCAM. I FOR IDIOT.
|
|||
|
|
|||
|
--------------------
|
|||
|
ATTN: AT&T EMPLOYEES: GO AHEAD GIVE THIS TO CORPORATE SECURITY.
|
|||
|
BETTER YET, WE'LL FAX IT TO THEM FOR YOU! I HATE TO TELL YOU
|
|||
|
PEOPLE, BUT CORPORATE SECURITY GESTAPO ARE NOT POLICE THEY HAVE NO
|
|||
|
AUTHORITY. NO-ONE IS AFRAID OF THEM. ALSO, REMEMBER, OUR GOOD
|
|||
|
ARTICLES AREN'T OUT YET. THEY WILL BE. COMING SOON FROM TESLA,
|
|||
|
THANKS TO AT&T. WE'LL SEE YOU IN BANKRUPTCY COURT. BASTARDS.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 238 -
|
|||
|
|
|||
|
|
|||
|
Pirates Bust. By Time Bandit
|
|||
|
-------------
|
|||
|
|
|||
|
Let me start off by introduce myself. My name is Time Bandit.
|
|||
|
I'm part of the BOM (Brotherhood of Modemers). We founded ourself
|
|||
|
in the early part of 93. We Have a lot of connections, both in
|
|||
|
Canada, The US, a few in Switzerland and The Netherlands. Our gaol
|
|||
|
is to look out for all out fellow Modemers. When we hear of a major
|
|||
|
bust that is going to take place Myself as well as Net Runner will
|
|||
|
try and call a few boards and pass the info along.
|
|||
|
|
|||
|
The main problem is. 90% of the sysops will not take us
|
|||
|
serious. I know of a few boards that got busted because the sysop
|
|||
|
would not listen to us. I also know of several that are still
|
|||
|
striving due to a good tip from us.
|
|||
|
|
|||
|
In the next 2 weeks we will try and contact one or two boards
|
|||
|
in each of the states listen and pass this info along. If you are
|
|||
|
one of the boards we call please take the time to read this letter
|
|||
|
and pass the information along to your fellow sysops.
|
|||
|
|
|||
|
The Targeted States.
|
|||
|
-------------------
|
|||
|
|
|||
|
Several Boards around the world have been getting busted. I
|
|||
|
know for a fact that the FBI as well as SPA are on the look out for
|
|||
|
several boards. Here is a list of some of the States that they are
|
|||
|
going to be targeting.
|
|||
|
|
|||
|
Arizona
|
|||
|
Georgia
|
|||
|
Kentucky
|
|||
|
New Jersey
|
|||
|
New York
|
|||
|
Missouri
|
|||
|
Ohio
|
|||
|
Ontario (Canada)
|
|||
|
Pennsylvania
|
|||
|
Quebec (Canada)
|
|||
|
San Francisco
|
|||
|
Utah
|
|||
|
|
|||
|
What you should look out for.
|
|||
|
-----------------------------
|
|||
|
|
|||
|
Now sit down, shut up and listen. Our Informant with the SPA
|
|||
|
(I doubt you'll believe me, but we do have one), Tells us the
|
|||
|
people that will try to get access to your boards will used the
|
|||
|
Handel Blue, Black or Green something (IE: Blue Diamond, Black
|
|||
|
Hawk, Green Hornet) He'll say he is calling from Kentucky, New York
|
|||
|
or Utah, doubtful he'll use the state he is calling, but you never
|
|||
|
know. His name will be Fred, Bill, Jeff, something (IE:
|
|||
|
|
|||
|
- 239 -
|
|||
|
|
|||
|
|
|||
|
Fred Williams, Bill Tucker, Jeff Smith), and his phone number will
|
|||
|
be AC-968-XXXX (IE: 606-968-1111, 212-968-1111, 801-968-1111).
|
|||
|
|
|||
|
Now if I were any of you sysops I'd be keeping an eye out for
|
|||
|
this person or persons. To our understanding they want to make 1993
|
|||
|
the best year for boards getting busted. They are looking for
|
|||
|
boards that support HPCA as well as pirating software. Word Perfect
|
|||
|
and Microsoft are really getting pissed that they software is being
|
|||
|
spread. I know Word Perfect is paying rewards for any information
|
|||
|
leading to a bust of a board with there software on it. Now listen
|
|||
|
Utah People, don't go and get greedy and turn in your local pirate
|
|||
|
board for a quick cash fix.
|
|||
|
|
|||
|
The Code
|
|||
|
--------
|
|||
|
|
|||
|
When I first starting pirating almost 5 years ago, there was
|
|||
|
a code among pirates. You never turned in your brother no mater if
|
|||
|
your ass was on the line or not. You would never trash talk another
|
|||
|
board, you would always be there to lend a helping hand if your
|
|||
|
bother went down. We here at BOM still fell the same way. We get
|
|||
|
very pissed off at all the so called cracking groups. I know PHUCK
|
|||
|
was a well know crashing group as well as SWAT. Now there were
|
|||
|
others groups that got off by uploading V&T's to your board. No
|
|||
|
mater how pissed off a sysop or user makes you it makes little to
|
|||
|
no sense to crash his board.
|
|||
|
|
|||
|
The Brotherhood
|
|||
|
---------------
|
|||
|
|
|||
|
We are a small group of pirates. There are 4 of us right now.
|
|||
|
Time Bandit, Net Runner, Star Rider and XTC. We are always on the
|
|||
|
lookout for fellow Modemers that are willing to live up to our
|
|||
|
code. We don't want Fame and Glory, we just want the warez to stay
|
|||
|
alive. We do not phreak, well 3 of us don't. We spend out hard
|
|||
|
earned cash to call boards and pass this info along. You may thing
|
|||
|
this is just a bunch of shit. Most people have never heard of us,
|
|||
|
but I'd be at least one or two people from each and ever state has
|
|||
|
heard of the brother hood. If you think you have what it takes to
|
|||
|
belong to the Brotherhood, contact one of us.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
12/15/93
|
|||
|
Time Bandit
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 240 -
|
|||
|
|
|||
|
|
|||
|
==========================================
|
|||
|
>>>>>>>>>>>>>>HOPEFULLY KIMBLES' LAST TRY!
|
|||
|
HE WILL TRY TO BUST THE WHOLE AMIGA SCENE!
|
|||
|
DONT LAUGH BUT BETTER READ THIS DAMN FAST!
|
|||
|
READ THIS AND GET THE INFORMATIONS YERSELF
|
|||
|
==========================================
|
|||
|
|
|||
|
>>>>>>> BUSTS WILL FOLLOW <<<<<<<<<
|
|||
|
|
|||
|
READ THIS!
|
|||
|
|
|||
|
TWO MESSAGES FROM KIMBLES BOARD HOUSE OF COOLNESS:
|
|||
|
|
|||
|
Date : Fri Nov 19 21:52:16 1993 Number: 3106
|
|||
|
To : Cxnsorxd (ALL) Recv'd: No
|
|||
|
From : BITBUG Status: Public Message
|
|||
|
Subject: NUPS AND NUMBERS!
|
|||
|
|
|||
|
hello, i need the newuserpasswords and numbers of following boards,
|
|||
|
every working number and pw will be homored with a working cc.....
|
|||
|
|
|||
|
|
|||
|
the ghetto
|
|||
|
nirvana
|
|||
|
house of pain
|
|||
|
danse macabre
|
|||
|
pirate haven
|
|||
|
skull buggery
|
|||
|
the edge
|
|||
|
end of the world
|
|||
|
sanctuary
|
|||
|
mirage
|
|||
|
gates of assgard
|
|||
|
sanctuary
|
|||
|
lithium
|
|||
|
ice station
|
|||
|
road to nowhere
|
|||
|
|
|||
|
the first who gives me working nup and number will be honored!!!
|
|||
|
it must look like this:
|
|||
|
|
|||
|
THE GHETTO...........510-682-2342......NUP: ?????
|
|||
|
|
|||
|
and make 100% sure that the stuff you post me works, otherwise
|
|||
|
forget it!
|
|||
|
|
|||
|
|
|||
|
Date : Sat Nov 20 13:21:02 1993 Number: 3140
|
|||
|
To : Cxnsorxd (ALL) Recv'd: No
|
|||
|
From : BITBUG Status: Public Message
|
|||
|
Subject: the megaoffer!!
|
|||
|
|
|||
|
|
|||
|
- 241 -
|
|||
|
|
|||
|
|
|||
|
i am in a big need of all kinds of accounts in the usa!!!
|
|||
|
if you have an account on any usa bbs that is still working but you
|
|||
|
never use it ,then give it to me....for every valid account you get
|
|||
|
3 virgin at&t make accounts, get me accounts, accounts accounts
|
|||
|
accounts...... write the accounts like this:
|
|||
|
|
|||
|
BBSNAME..........NUMBER............ACCOUNT........PASSWORD
|
|||
|
|
|||
|
not important how good the bbs is, gimme your accounts for valid
|
|||
|
cards!
|
|||
|
|
|||
|
!IMPORTANT! READ THIS!
|
|||
|
|
|||
|
KIMBLE (ALIAS TOAYAX/BITBUG/ETC.) IS WORKING ON A BIG THING WITH
|
|||
|
SOME DUDES FROM THE GRAVENREUTH TEAM AND SOME SOFTWAREFIRMS.. (AND
|
|||
|
ALSO THE POLICE I THINK) I DONT KNOW MUCH ABOUT THIS BUT I KNOW
|
|||
|
THAT THEY WILL TRY TO BUST THE WHOLE PIRATE SCENE IN A BIG MOVE!
|
|||
|
|
|||
|
THEY WANT TO CLOSE ALL BOADS WHICH THEY CAN GET! THEY ARE TIRED OF
|
|||
|
JUST GETTING ONE BOARD OF HUNDRETS TO BUST.. >>>>>THEY WANT THE
|
|||
|
WHOLE AMIGA PIRATE SCENE DOWN! AS YOU READ ABOVE KIMBLE (KIM
|
|||
|
SCHMITZ) IS SEARCHIN' FOR ACCOUNTS ON PIRATE BBS TO GET ALL
|
|||
|
INFORMATIONS OUT OF THAT BBS AND TO HAVE THE POSSIBILITIES TO
|
|||
|
CLOSE IT THEN!!!!
|
|||
|
|
|||
|
....
|
|||
|
|
|||
|
I CAN JUST WARN YOU ALL OUT THERE! BE SURE THAT YOU DONT LET
|
|||
|
EVERYONE ON YER BBS WHO CLAIMS TO BE SOMEONE HE ISNT.. AND BETTER
|
|||
|
C-H-A-N-G-E THE NUPS NOW OR EVEN DONT LET ANY NEW USERS ON.. AND
|
|||
|
CHECK THE OLD ONES!
|
|||
|
|
|||
|
AND AS YOU HAVE A BRAIN YOURSELF MAKE THE RIGHT DECISION FOR YOU!
|
|||
|
I AM NOT THE ONE TO DO THIS FOR YOU..
|
|||
|
|
|||
|
.....JUST HERE FOR A BETTER FUTURE......
|
|||
|
|
|||
|
|
|||
|
AMIGA #1 --- PIRATES NEVER GIVE UP ---
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 242 -
|
|||
|
|
|||
|
Wrap Up - Time Bandit
|
|||
|
|
|||
|
Well you'll have to say this is one of the biggest H/P/C/A mags
|
|||
|
|
|||
|
you have ever seen. I have put a lot of time and effort into this
|
|||
|
|
|||
|
very large file. As you know I made four parts to this awesome
|
|||
|
|
|||
|
file. We were going to add more to the end of this, but it's getting
|
|||
|
|
|||
|
so damn hugh, we thought we'd ednd it here.
|
|||
|
|
|||
|
Well anyways, I have some of you people will enjoy the hell out
|
|||
|
|
|||
|
of this, I know you'll never see one this good again.
|
|||
|
|
|||
|
Happy reading.......!......
|