2445 lines
118 KiB
Plaintext
2445 lines
118 KiB
Plaintext
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #1 of 12
|
|
|
|
Index
|
|
~~~~~
|
|
2/17/87
|
|
|
|
Welcome to Issue Eleven of the Phrack Inc. electronic newsletter.
|
|
This issue, I was a bit more reliable about getting the issue out (yes, only 3
|
|
days late!). This issue did not come together as easily as I would have hoped
|
|
due to a number of people being difficult to get a hold of or getting their
|
|
files, but I filled their places in with other files, so if you had been told
|
|
you would have a file in this issue, get in contact with me so that it will be
|
|
featured in Issue Twelve. The following files are featured in this edition of
|
|
Phrack Inc.:
|
|
|
|
#1 Index to Phrack Eleven by Taran King (1.7K)
|
|
#2 Phrack Pro-Phile VIII on Wizard of Arpanet by Taran King (6.8K)
|
|
#3 PACT: Prefix Access Code Translator by The Executioner (7.6K)
|
|
#4 Hacking Voice Mail Systems by Black Knight from 713 (6.0K)
|
|
#5 Simple Data Encryption or Digital Electronics 101 by The Leftist (4.1K)
|
|
#6 AIS - Automatic Intercept System by Taran King (15.9K)
|
|
#7 Hacking Primos I, II, III by Evil Jay (6.7K)
|
|
#8 Telephone Signalling Methods by Doom Prophet (7.3K)
|
|
#9 Cellular Spoofing By Electronic Serial Numbers donated by Amadeus (15.2K)
|
|
#10 Busy Line Verification by Phantom Phreaker (10.0K)
|
|
#11 Phrack World News X by Knight Lightning
|
|
#12 Phrack World News XI by knight Lightning
|
|
|
|
Taran King
|
|
Sysop of Metal Shop Private
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #2 of 12
|
|
|
|
==Phrack Pro-Phile VIII==
|
|
|
|
Written and Created by Taran King
|
|
|
|
2/17/87
|
|
|
|
Welcome to Phrack Pro-Phile VIII. Phrack Pro-Phile is created to
|
|
bring info to you, the users, about old or highly important/controversial
|
|
people. This month, I bring to you one of the older and high profile phreaks
|
|
of the past...
|
|
|
|
Wizard of Arpanet
|
|
~~~~~~~~~~~~~~~~~
|
|
|
|
Wizard of Arpanet is one of the older of the phreak/hack generation.
|
|
His main accomplishments include running Inner Circle and Secret Service BBS.
|
|
|
|
Handle: Wizard of Arpanet
|
|
Call him: Eric
|
|
Past handles: The Hacker and The Priest
|
|
Handle Origin: A real programmer on Arpanet was called The
|
|
Wizard and Eric took his handle from him.
|
|
Date of Birth: 02/26/69
|
|
Age in 9 days of this writing: 18 years old
|
|
Height: 6'1"
|
|
Weight: 150 lbs
|
|
Eye color: Blue
|
|
Hair color: Dishwaterish blond
|
|
Computers: Atari 400, Commodore 64
|
|
Sysop/Co-sysop of: Secret Service
|
|
|
|
------------------------------------------------------------------------------
|
|
Wizard of Arpanet started as your average BBS caller. He eventually
|
|
called Central Processing Unit (a local board to him), and there were these
|
|
funny numbers on the board. He called and tried to connect with his modem,
|
|
but they turned out to be Sprint dial-ups. The CPU Sysop informed him of what
|
|
to do and he started calling national BBSs. Boards that helped him to advance
|
|
include the Twilight Zone (the sysop was the guy that wrote T-Net), OSUNY,
|
|
Dragon's Lair, and Delta BBS. Wizard organized various groups which included
|
|
(from earliest to most recent): PHA (Phreakers and Hackers of America) -
|
|
(included Deep Throat, Phreak King, and Psycho Killer), The Inner Circle (1st
|
|
one) (included Shockwave Rider, and Satan Knight aka Redrum), and The 2nd
|
|
Inner Circle (included The Cracker, Mr. America, Napoleon Bonapart, Stainless
|
|
Steal Rat, Big Brother, Mr. Xerox, Bootleg, Maxwell Wilke, Mandrake The
|
|
Magician, and Zaphod Beeblebrox).
|
|
|
|
Eric got the number to Arpanet from Dark Dante, and got on the MIT
|
|
Research System from looking through TAC News. One night he got like 50-60
|
|
accounts on the Unix and changed all of the passwords to WIZARD.
|
|
|
|
Stainless Steal Rat, the Sysop of Delta BBS, and The Myth were all up
|
|
from NJ one weekend, and they were staying the weekend at John Maxfield's
|
|
house. They went to John's office. Wizard asked Maxfield if he could use his
|
|
computer to print out some things he had with him and he printed out some
|
|
stuff from the Stanford Artificial Intelligence address list for Arpanet.
|
|
John was amazed. "Wow," he said, "I have prime evidence on you." (TK: This
|
|
may not for sure be an exact quote). He then proceeded to bust our friend,
|
|
Eric, the next week. He also had a lot of stuff from AUTOVON from some fellow
|
|
in Washington and started playing with the FTS lines (Federal Telephone
|
|
System) which he found from, none other than, John Maxfield. They had found
|
|
the default passwords for TeleMail too, and got the administrator accounts and
|
|
set up their own BBS on Nassau and Coca-Cola systems plus anywhere else
|
|
possible. And all of a sudden, it all came down when Mandrake decided to
|
|
crash parts of TeleMail. Enter, Federal Bureau of Investigations. They had
|
|
been monitoring Eric for 6 months looking for some evidence to get him on.
|
|
And thus, they got it. Nothing really happened, but he had to get a lawyer
|
|
and he got some publicity in the paper. After 90 days, everything they had
|
|
taken, with the exception of a few documents, was sent back. During those 90
|
|
days, Eric worked as a computer security consultant at a bank making $200 an
|
|
hour (2 hours...).
|
|
|
|
The only "phreaks" he's met are Stainless Steal Rat and Cable Pair.
|
|
|
|
Eric has been mentioned on local TV/News, in newspapers, USA Today,
|
|
NY Times, Washington Post, Books, and Britannica Encyclopedia (look under
|
|
Hacker).
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Interests: Music (preferably jazz, reggae, new wave), Eastern
|
|
philosophy (Zen Buddhism), reading Jack Kerouac books (a
|
|
great beatnik writer), driving aimlessly, slowly becoming
|
|
a social recluse, physics, and Greek mathematicians.
|
|
|
|
Eric's Favorite Things
|
|
----------------------
|
|
|
|
Women: The pursuit thereof (Karen Wilder).
|
|
Foods: Chinese.
|
|
Cars: BMW 320-I.
|
|
Artist: Salvador Dali.
|
|
Plans for next few months: Next year and a half - travelling to Montreal in
|
|
April for a week of leisure, then jetting back to
|
|
beautiful Detroit and continuing his studies at
|
|
Eisenhower High School.
|
|
|
|
Most Memorable Experiences
|
|
--------------------------
|
|
|
|
Realizing all at once that everything you did 3 years ago was stupid.
|
|
Growing into a new person.
|
|
Gaining morals and new ideas and a new outlook.
|
|
|
|
Some People to Mention
|
|
----------------------
|
|
|
|
Tuc (For telling him about boxing).
|
|
Tom Tone (For calling him on his first conference).
|
|
Magnetic Surfer (Talking to him for the first time after Sherwood Forest went
|
|
down voice).
|
|
John Maxfield (Meeting him).
|
|
Stainless Steal Rat (Meeting him...with John Maxfield).
|
|
Dark Dante (One of the legends phreakdom).
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Always follow your instinct and not your desire for you will be
|
|
sorry because you will be lying to yourself.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
I hope you enjoyed this file. Look forward to more Phrack Pro-Philes coming
|
|
in the near future. ...And now for the regularly taken poll from all
|
|
interviewees.
|
|
|
|
Of the general population of phreaks you have met, would you consider most
|
|
phreaks, if any, to be computer geeks? No, says Eric, he considers them a new
|
|
breed of intellect. Thanks for your time, Eric.
|
|
|
|
Taran King
|
|
Sysop of Metal Shop Private
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #3 of 12
|
|
|
|
.___. .___.
|
|
|___| |___|
|
|
| |
|
|
/^\ /^\
|
|
[+]PLP[+]------------------------------------------[+]PLP[+]
|
|
\^/ ^ ^ \^/
|
|
|S| P ^[+]The Executioner[+]^ P |S|
|
|
|e| PLP ^[+]PhoneLine Phantoms![+]^ PLP |e|
|
|
|x| P _____[+]The Network Technicians[+]______ P |x|
|
|
|y| ^ ------------------------ ^ |y|
|
|
|-| [+] PACT: Prefix Access Code Translator [+] |-|
|
|
|T| ^ ==================================== ^ |T|
|
|
|N| [+]Written for PHRACK Inc. Issue Eleven.[+] |N|
|
|
|T| |T|
|
|
|-|_______. Call Phreak Klass, Room 2600 ._______|-|
|
|
|PHRACK XI| [806][799][0016] Login:EDUCATE |PHRACK XI|
|
|
--------| |________________________________| |--------
|
|
|____________________________________|
|
|
|
|
|
|
The PACT (Prefix Access Code Translator) feature provides preliminary
|
|
translation data for features using access codes that are prefixed by a
|
|
special code. A standard numbering and dialing plan requires that individual
|
|
line and small business customers' (custom) calling use prefixed access code
|
|
dialing for feature access. PACT is offered on a per office basis. The PACT
|
|
is NOT used for the interpretation of Centrex dialing customers.
|
|
When a call is originated by the customer, a call register is used to
|
|
store the data about the call. The customer dials a prefix and a 2 digit
|
|
access code (table a). The PACT then looks at the digits to determine what
|
|
action should take place. Reorder or special service error messages will be
|
|
heard if you enter an unassigned code. If the code is accepted, then that
|
|
particular action will be performed. The PACT consists of the PACT head table
|
|
and the prefixed access code translator. The PACT feature allows the dialing
|
|
of a special code for a prefix. These are the '*' and '#'. If you have rotary,
|
|
then '11' and '12' are used respectively. To use PACT, the prefix must be
|
|
followed by a 2-digit code. This combination is then defined in terms of type
|
|
and subtype (table b).
|
|
|
|
TABLE A
|
|
____________________________________________________________
|
|
| Access Code | Description of function |
|
|
|________________________|_________________________________|
|
|
| *2X - *3X (x= 0-9) | Growth to 2 or 3 digit codes |
|
|
| | (Future may call for these) |
|
|
| | |
|
|
| *4X - *5X - *7X | Local Area Signalling Services |
|
|
| | |
|
|
| *72 | Call Forwarding Activation |
|
|
| | |
|
|
| *73 | Call Forwarding Deactivation |
|
|
| | |
|
|
| *74 | 1-digit speed dialing |
|
|
| | |
|
|
| *75 | 2-digit speed dialing |
|
|
| | |
|
|
| #56 | Circuit Switched Digital |
|
|
| | Capability |
|
|
|________________________|_________________________________|
|
|
|
|
The subtranslator is always built 100 words long. A word is a binary code
|
|
which, when sent as a whole, act as a command. One word is equal to a 2-digit
|
|
access code. This subtranslator contains the PTW (Primary Translation Word).
|
|
The PTW contains the feature type subtype and feature subtype index to
|
|
determine the function of the dialed code. The feature subtype allows four
|
|
subtype tables to exist for feature type 31 (LASS). Index 0 is for LASS. Index
|
|
1 is used for LASS on a pay per usage basis. Index 2 and 3 are currently not
|
|
used.
|
|
|
|
TABLE B (written in report form)
|
|
================================
|
|
|
|
Feature Type: 0 (Unassigned)
|
|
|
|
Feature Type: 1 (1-digit abbr. dialing)
|
|
|
|
Subtypes: 0 (Speed Call)
|
|
1 (Change the Speed Call List)
|
|
2 (Invalid)
|
|
|
|
Feature Type: 2 (2-digit dialing.)
|
|
|
|
Subtypes: (Same as Feature 1)
|
|
|
|
Feature Type: 3 (Circuit Switch Digital Capability)
|
|
|
|
Subtype: 1 (CSDC 56 kilo bit service)
|
|
|
|
Feature Type: 4 (Usage Sensitive 3-way)
|
|
|
|
Feature Type: 5 (Cancel Call Waiting)
|
|
|
|
Feature Type: 20 (Call Forwarding Activate)
|
|
|
|
Feature Type: 21 (Call Forwarding deactivate)
|
|
|
|
Feature Type: 22 (Project Acct. Service (Autoplex))
|
|
|
|
Feature Type: 26 (Customer changeable Inter LATA carrier)
|
|
|
|
Feature Type: 27 (Voice/Data Protection)
|
|
|
|
Feature Type: 28 (MDS-Message Desk Service)
|
|
|
|
Subtypes: 0 (MDS activation)
|
|
1 (MDS deactivation)
|
|
|
|
Feature Type: 30 (Residence Data Facility Pooling)
|
|
|
|
Feature Type: 31 (Local Area Signalling Services-LASS)
|
|
[index 0]
|
|
|
|
Subtypes: 0 (AR-Automatic Recall {Incoming Calls})
|
|
1 (AR-Outgoing calls)
|
|
2 (AR activation incoming/outgoing)
|
|
3 (AR deactivation)
|
|
4 (Customer Originated Trace Activation)
|
|
5 (Distinctive Alert Activation)
|
|
6 (ICLID activation)
|
|
7 (Selective Call Rejection Activation)
|
|
8 (Selective Call Forwarding activation)
|
|
9 (Private Call Activation)
|
|
10 (Distinctive Alert -OFF)
|
|
11 (ICLID-OFF)
|
|
12 (SCR-OFF)
|
|
13 (SCF-OFF)
|
|
14 (Private Call-OFF)
|
|
15 (Distinctive Alert ON/OFF) toggle for opposite
|
|
16 ICLID toggle on/off
|
|
17 SCR toggle on/off
|
|
18 SCF toggle on/off
|
|
19 Private Call on/off
|
|
20 Selective Call Acceptance-ON
|
|
21 SCA OFF
|
|
22 SCA toggle on/off
|
|
23 (Computer Access Restriction) on
|
|
24 CAR off
|
|
25 CAR on/off
|
|
26-31 (reserved for future LASS functions)
|
|
|
|
Index 1 Pay Per View
|
|
|
|
subtype: 0 (Order placement)
|
|
1 (Order Cancel)
|
|
|
|
The PACT function is extremely important for LASS functions. PACT is what
|
|
lets you tell your switch what you want done. Without the PACT, communication
|
|
between you and your CO would not exist. PACT is the base foundation for the
|
|
use access codes.
|
|
============================================================
|
|
= If you have any questions or comments, please leave mail =
|
|
= either on Phreak Klass Room 2600 or at 214-733-5283. =
|
|
============================================================
|
|
= (c) The Executioner/PLP/TNT =
|
|
============================================================
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #4 of 12
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
+=+ Hacking Voice Mail Systems +=+
|
|
+=+ Written for Phrack XI +=+
|
|
+=+ by:-> Black Knight from 713 +=+
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
|
|
Voice Mail is a relatively new concept and not much has been said about it.
|
|
It is a very useful tool for the business person and the phreak. The way it
|
|
works is that somebody wishing to get in touch with you calls a number,
|
|
usually a 1-800, and punches in on his touch-pad your mailbox number and then
|
|
he is able to leave a message for you. Business experts report that this
|
|
almost totally eliminates telephone tag. When a person wishes to pick up his
|
|
message all he needs to do is call the number enter a certain code and he can
|
|
hear his messages, transfer them, and do other misc. mailbox utilities.
|
|
|
|
Most VMSs are similar in the way they work. There are a few different ways
|
|
the VMSs store the voice. One way is that the voice is recorded digitally and
|
|
compressed and when heard it is reproduced back into the voice that recorded
|
|
it. Another method that is slower and uses more space, but costs less, stores
|
|
the voice on magnetic tape, the same type that is used to store data on a
|
|
computer, and then runs the tape at a slow speed. Using this method the voice
|
|
does not need to be reproduced in any way and will sound normal as long as the
|
|
tape is running at a constant speed. On some of the newer VMSs the voice is
|
|
digitally recorded and is transformed from the magnetic tape at about 2400
|
|
bits per second.
|
|
|
|
There are many different types and versions of voice mail systems. Some of
|
|
the best and easiest to get on will be discussed.
|
|
|
|
Centagram
|
|
---------
|
|
These are direct dial (you don't have to enter a box number). To get on one
|
|
of these, first have a number to any box on the system. All of the other
|
|
boxes will be on the same prefix; just start scanning them until you find one
|
|
that has a message saying that person you are calling is not available. This
|
|
usually means that the box has not been assigned to anybody yet. Before the
|
|
nice lady's voice tells you to leave the message, hit #. You will then be
|
|
prompted for your password. The password will usually be the same as the last
|
|
four digits of the box's number or a simple number like 1000, 2000, etc. Once
|
|
you get on, they are very user friendly and will prompt you with a menu of
|
|
options. If you can't find any empty boxes or want to do more, you can hack
|
|
but the system administrators box, which will usually be 9999 on the same
|
|
prefix as the other boxes, will allow you to hear anybody's messages and
|
|
create and delete boxes.
|
|
|
|
Sperry Link
|
|
-----------
|
|
These systems are very nice. They will usually be found on an 800 number.
|
|
These are one of the hardest to get a box on because you must hack out a user
|
|
ID (different from the person's box number) and a password. When it answers,
|
|
if it says, "This is a Sperry Link voice station. Please enter your user ID,"
|
|
you will have to start trying to find a valid user ID. On most Sperrys it
|
|
will be a five digit number. If it answers and says, "This is an X answering
|
|
service," you first have to hit *# to get the user number prompt. Once you
|
|
get a valid user number will have to guess the password on most systems, it
|
|
will be 4 digits. Once you get in, these are also very user friendly and have
|
|
many different options available.
|
|
|
|
RSVP
|
|
----
|
|
This is probably one of the worst VMSs but it is by far the easiest to get
|
|
yourself a box. When it answers you can hit * for a directory of the boxes on
|
|
it (it will only hold 23). If you hit # you will be given a menu of options
|
|
and when you choose an option you will then be prompted for your ID number.
|
|
The ID number on an RSVP system will just about always be the same as the
|
|
mailbox number, which are always only 2 digits.
|
|
|
|
A.S.P.E.N.
|
|
----------
|
|
The Aspen voice message systems made by Octel Telecommunications is in my
|
|
opinion the BEST VMS made. To get a box on an Aspen, you need to find an
|
|
empty box. To find an empty box, scan the box numbers and if one says, "You
|
|
entered XXXX. Please leave a message at the tone," then this is an empty box.
|
|
You next just press # and when prompted for your box number enter the number
|
|
of the empty box and friendly voice of the nice lady will guide you through
|
|
all of the steps of setting up your box. She first tells you what you can do
|
|
with the box and then will prompt you with, "Please enter the temporary
|
|
password assigned to you by your system manager." This password will usually
|
|
be 4 digits long and the same as the box number like 1000, etc. Once you get
|
|
on their are many things you can do. You can make a distribution list where
|
|
if you want to leave a certain message to more than one person, you can enter
|
|
the list number and all of the boxes on the list will get the message. You can
|
|
also have the system call you and notify you that you have new messages. These
|
|
systems also have what they call "Information center mailboxes" that are
|
|
listen only and can also have a password on them so the person calling has to
|
|
enter the password before he hears the greeting message. Aspen VMSs have a
|
|
system managers mailbox that will just about give you total control of the
|
|
whole system and let you listen to people's mail, create and delete boxes, and
|
|
many other things.
|
|
|
|
Thank you for reading this file and if you would like to get in touch with me
|
|
VIA VOICE MAIL call 1-800-222-0311 and hit *2155.
|
|
|
|
//--Black Knight from 713--\\
|
|
| for PHRACK XI (1987) |
|
|
\\--++--++--++--++--++--++-//
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #5 of 12
|
|
|
|
{Simple Data Encryption}
|
|
<or digital electronics 101>
|
|
By:{The Leftist}
|
|
|
|
Prologue:
|
|
|
|
Well, it's been awhile since I've done one of my activities files. This time
|
|
I've switched from chemistry to electronics. Hopefully, I will be writing
|
|
more files similar to this one. Also, I have devised a more sophisticated
|
|
encryption device, which I may release in the future
|
|
|
|
Do you run a BBS, living in fear that the "feds" are gonna log on, and fool
|
|
you into giving them a password? Do you wish that you could limit exactly WHO
|
|
logs onto your board? Well, this file is just for you..
|
|
|
|
Parts:
|
|
|
|
1:9 volt battery
|
|
|
|
1: 74hc/hct04 cmos hex inverter <about .50 cents>
|
|
|
|
Some basic knowledge of electronics might help, and some wire would be helpful
|
|
too. If you want to be fancy you can even splurge and get a 9 volt connector.
|
|
|
|
Note: Although it is not required that you put this on an etched PC board, you
|
|
can do this quite easily, and it makes for a much cleaner job.
|
|
|
|
Ok, the basic idea behind this scheme is this:
|
|
|
|
Data coming to and going from your modem is translated as 1's and 0's. This
|
|
represents highs and lows, which translate out to code which your computer
|
|
recognizes as valid data. Now, if you could switch all those 1's to 0's, and
|
|
0's to 1's, then you would have a simple way of encrypting your data. That's
|
|
exactly what the hex inverter does. If it sees a 0, it makes it a 1. If it
|
|
sees a 1, it makes it a 0. So, what you want to do is have an inverter on your
|
|
send line, and an inverter on your receive line. The computer you are
|
|
connected to must also have inverters on its send and receive, or all you will
|
|
see will be garbage! I tried to be as non-technical as possible in this for
|
|
all you non-technical types out there.
|
|
|
|
|
|
Connections:
|
|
|
|
Hold the chip, and look at it. There should be a little notch in one end. Hold
|
|
it as illustrated in the schematic:
|
|
|
|
(80 columns)
|
|
|
|
|
|
______________________________
|
|
| |
|
|
14 13 11 12 10 9 8 |
|
|
| | | | | | | |
|
|
__________________ |
|
|
| | |_ to positive on battery
|
|
\ 74hc/hct04 |
|
|
/ |
|
|
|__________________| to negative on battery
|
|
| | | | | | | |
|
|
1 2 3 4 5 6 7______________|
|
|
| | | |
|
|
| | | |_________________________________to computer port
|
|
| | |_______________________________from modem
|
|
| |________________________________________________to modem conn.
|
|
|________________________________________________ from computer port
|
|
|
|
|
|
<all other pins are not connected>
|
|
|
|
|
|
Ok, hook the + 9volts up to pin 14, and the negative up to pin 7.
|
|
There are 6 inverters on this chip. For this, we will be using only 2 of them.
|
|
|
|
Find the wire coming from your computer to the send data line on your modem.
|
|
Sever this wire, and hook one side of it to pin 1. Hook the other end of it to
|
|
pin 2. Next, find the receive data line, and sever it. Hook one end of it to
|
|
pin 3, the other end to pin 4. That's about it.. if you want to use the other
|
|
inverters on the chip, here's the complete pinouts.
|
|
|
|
Pin# Name and function
|
|
---- -----------------
|
|
1,3,5,9,11,13 Data inputs
|
|
---------------------------------
|
|
2,4,6,8,10,12 Data outputs
|
|
---------------------------------
|
|
7 Ground
|
|
---------------------------------
|
|
14 VCC
|
|
---------------------------------
|
|
|
|
Remember, that your BBS modem must have one of these devices on it, as well as
|
|
the user calling. I have tested this on Smartmodems, and it does work. If you
|
|
have an internal modem, this may be a little difficult for you.
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #6 of 12
|
|
|
|
Taran King Presents...
|
|
|
|
AIS - Automatic Intercept System
|
|
|
|
The DAIS II System by Computer Consoles Incorporated
|
|
|
|
INTRODUCTION...
|
|
~~~~~~~~~~~~~~~
|
|
Computer Consoles Incorporated (CCI) manufactures various hardware
|
|
appliances to be used in conjunction with phone companies switches as well as
|
|
other aspects of the companies' uses, plus computer systems such as their own
|
|
Unix-supporting systems.
|
|
DAIS II is the Distributed Automatic Intercept System, which is the
|
|
system used to announce if the subscriber has dialed a non-working number.
|
|
This is what you hear, in action, when you dial a wrong number and get the 3
|
|
tones plus the announcement or the ONI (Operator Number Identification)
|
|
intercept operator ("What number did you dial?").
|
|
The information from this file comes mostly from an instructional
|
|
manual sent to me by CCI, who can be reached at 800-833-7477 or 716-482-5000
|
|
directly, or may be written to at 97 Humbolt Street, Rochester, NY, 14609.
|
|
|
|
INTERCEPTION
|
|
~~~~~~~~~~~~
|
|
Most definitely any person who has used a telephone in his life has,
|
|
by some means or another, come across the dreaded 3 tones, leading up to the
|
|
ever-so-cumbersome announcement telling of the disconnected or non-working
|
|
number. This file will go into how the whole system works.
|
|
After dialing the non-working number, the telco's Class 5 End Office
|
|
routes the call to DAIS II.
|
|
|
|
ANI Calls
|
|
~~~~~~~~~
|
|
Provided that the End Office has Automatic Number Identification
|
|
(ANI) equipment, the equipment then identifies the digits of the called number
|
|
and sends them to the intercept system.
|
|
The system receives the called number from the end office, retrieves
|
|
information for that number from the intercept database, formulates the
|
|
message, and delivers it to the customer in an automated announcement. These
|
|
announcements can either be standardized or tailored to the independent
|
|
telephone companies' needs. If further assistance is required, the caller can
|
|
then stay on the line and wait for an operator to come onto the line.
|
|
|
|
ONI Calls
|
|
~~~~~~~~~
|
|
When the End Office is primitive, and they don't have the ANI
|
|
equipment to do the above ritual, operators are directly involved. These
|
|
operators are also called into action when there is an ANI or DAIS II failure.
|
|
When the ONI (Operator Number Identification) call comes in, DAIS II
|
|
routes the call to the operator. The operator asks for the number that the
|
|
customer called and then keys it into her KDT (Keyboard Display Terminal).
|
|
After she hits the command key, the number's information is searched for in
|
|
the intercept database, the message is formulated, and the automated response
|
|
is announced. Once again, if the caller needs further assistance, an operator
|
|
will return to the line to help the subscriber.
|
|
|
|
Operators will return to the line for any number of reasons. They
|
|
include the following:
|
|
|
|
Unsuccessful Searches - After DAIS II receives the called number from ANI
|
|
equipment or from an operator, it searches the
|
|
database to find the intercept message associated with
|
|
the telephone number. The database contains all
|
|
10,000 line numbers for each exchange in the calling
|
|
area. If the system cannot complete the search, the
|
|
number was either keyed in incorrectly or there is a
|
|
problem in the system. The call is then routed to an
|
|
operator and displays the intercepted number
|
|
(including NPA) on the KDT screen along with a message
|
|
indicating why the search could not be completed. If
|
|
the number was keyed in wrong, the operator will
|
|
correct the number, or else she will ask the
|
|
subscriber to re-dial the number.
|
|
Aborted Announcements - If a search is given successful but for one reason or
|
|
another the automated announcement cannot be given,
|
|
the call is routed to an operator. The KDT display
|
|
shows the intercepted number, the appropriate
|
|
information for a verbal response, and the message,
|
|
"VERBAL REPORT." In this case, the operator quotes
|
|
the message to the caller rather than activating the
|
|
automated response.
|
|
Reconnects - If a customer remains on the line for more information
|
|
after receiving the automated announcement, the system
|
|
routes the call to an operator. The operator's KDT
|
|
display shows the called number plus other pertinent
|
|
information given to the caller in the previous
|
|
announcement. From here, the operator can respond
|
|
verbally to the customer's needs, or activate the
|
|
automated system again. The DAIS II system allows up
|
|
to 4 reconnects per call, but the possible number of
|
|
reconnects available ranges from 0-3. With 1
|
|
reconnect, the operator must report verbally.
|
|
Split Referrals - If a number has been changed but replaced with two
|
|
numbers, this is called a "split referral." When the
|
|
database finds 2 or more numbers, the DAIS II system
|
|
routes the customer to an operator, displaying the old
|
|
number and new listings on the KDT screen. The
|
|
operator then asks which number they are looking for
|
|
and keys in the command key to activate the
|
|
announcement, or else they do the announcement
|
|
verbally.
|
|
|
|
Operator Searches
|
|
~~~~~~~~~~~~~~~~~
|
|
Situations may arise where the subscriber needs more information
|
|
than was given by the automated announcement, or believes the information to
|
|
be invalid. DAIS II provides for operators to have access to both the
|
|
intercept and the DA databases at all times as long as the system
|
|
administrator, who judges the extent to which operators can use the
|
|
cross-search capability, allows it.
|
|
|
|
Components Of The System
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The telco's Class 5 End Offices contain switching equipment that
|
|
routes calls to DAIS II. If the office has ANI equipment, the switch routes
|
|
the called digits to the intercept system in the form of multi-frequency
|
|
tones. The end offices route calls to DAIS II on dedicated (direct) trunks.
|
|
These direct trunks can carry ANI traffic or ONI traffic, but not both.
|
|
|
|
If trunk concentrators are used, the concentrator trunks to DAIS II
|
|
may carry ANI calls, ONI calls, or both, depending on the types of trunks
|
|
coming into the concentrators from the end offices. The call is identified as
|
|
ANI or ONI through MF tones transmitted by the concentrators.
|
|
|
|
If an operator must be involved (due to ONI or further assistance),
|
|
DAIS II routes the call to the telco's ACD (Automatic Call Distributor), which
|
|
is a switching device that routes calls to any available operator.
|
|
|
|
The intercept data base resides on disk in the ARS (Audio Response
|
|
System). ARS processors known as Audio Response Controllers (ARCs) search the
|
|
intercept database. If a call requires an operator's services, the Marker
|
|
Decoder Unit (MDU) provides ACD routing information to the ARC.
|
|
|
|
The DAIS II Automatic Intercept Communications Controllers (AICCs)
|
|
route messages between the ARCs and the DAIS II subsystems. An intercept
|
|
subsystem that is housed at the same location as the database is called a
|
|
Colocated Automated Intercept System (CAIS). A subsystem located at a
|
|
distance from the database is known as a Local Automated Intercept System
|
|
(LAIS). Each subsystem can provide automated announcements without using
|
|
expensive trunking to route ANI calls to a centralized intercept office. Only
|
|
calls that require operator assistance are routed on trunks to the ARS site.
|
|
Because those trunks are only held white the operator identifies the number
|
|
and are released before the announcement begins, trunk requirements are
|
|
reduced. The automated announcement is always given by the intercept
|
|
subsystem.
|
|
|
|
Each CAIS or LAIS site contains a Trunk Time Switch (TTS) and DAIS II
|
|
Audio Response Units (DARUs). Intercept trunks from the concentrators and the
|
|
Class 5 End Offices terminate at the TTS. When an ONI call comes in on one of
|
|
these trunks, the TTS routes it to the ACD. When an ANI call comes in, the
|
|
TTS routes the called number to the ARC. After the ARC retrieves the
|
|
appropriate message from the database, it sends that information back to the
|
|
TTS, which connects a DARU port to the trunk on which the call came in. Then,
|
|
the DARU produces an automated announcement of the message and delivers it to
|
|
the caller. ARS hardware generates only DA announcements whereas DAIS II
|
|
hardware generates only intercept announcements.
|
|
|
|
Automatic Intercept Communications Controller (AICC)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The AICC routes messages between the ARC and the TTS. Two units are
|
|
required to enhance system reliability. Each pair of AICCs can communicate
|
|
with up to 4 CAIS or LAIS subsystems.
|
|
|
|
The AICCs are similar to the Audio Communications Controllers (ACCs)
|
|
in the ARS system, but AICCs use a Bisynchronous Communications Module (BSCM)
|
|
instead of a LACIM.
|
|
|
|
An AICC can be equipped with up to 8 BSCMs, each of which handles one
|
|
synchronous communication line to the TTS. The BSCM models selected depend on
|
|
the location of the AICC with respect to the CAIS/LAIS sites. Standard SLIMs
|
|
(Subscriber Line Interface Modules) are required for communication with the
|
|
ARC.
|
|
|
|
Trunk Time Switch (TTS)
|
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|
The TTS has two types of components: the Peripheral Modules (PMs) and
|
|
the Common Controls (CCs).
|
|
|
|
The PM contains the printed circuit boards that provide the link
|
|
between the end office's ANI trunks and the ARC and between the ONI trunks and
|
|
the ACD. The activity of the PM is under direction of the CC
|
|
|
|
A PM rack contains five types of circuit boards: Multi-frequency
|
|
Receivers (MFRs), Analog Line Front Ends (ALFEs), T1 Front Ends (T1FEs),
|
|
Peripheral Module Access Controllers (PMACs), and Multi-purpose Peripheral
|
|
Devices (MPPDs).
|
|
|
|
The MFRs translate the intercepted number from multi-frequency tones
|
|
to ASCII digits for ANI calls; for ONI calls that come through a trunk
|
|
concentrator, the MFRs translate the tones sent by the concentrator to
|
|
indicate an ONI call. Based on the tones, the MFR determines the type of
|
|
call: regular, trouble, etc.
|
|
|
|
ALFEs convert incoming analog data to digital form so that it can be
|
|
switched on the digital network. They also convert outgoing digital data back
|
|
to analog. Incoming ALFEs provide the link between the TTS and the analog
|
|
trunks from the Class 5 End Offices. Outgoing ALFEs provide the link between
|
|
the TTS and the analog trunks to the ACD.
|
|
ALFE is subdivided into two types for both incoming and outgoing:
|
|
ALFE-A (contains the control logic, PCM bus termination, and ports for 8
|
|
trunks) and ALFE-B (contains ports for 16 trunks, but must be paired with an
|
|
ALFE-A in order to use the control logic and PCM bus on the backplane).
|
|
ALFE-As can be used without ALFE-Bs, but not vice versa.
|
|
Incoming ALFEs support E&M 2-wire, E&M 4-wire, reverse battery, and
|
|
3-way signalling trunks. Outgoing ALFEs support E&M 2-wire, reverse battery,
|
|
and high-low trunking.
|
|
|
|
T1FEs provide the links between the TTS and the D3-type T1 spans from
|
|
the end offices. They also link the DARU VOCAL board ports and the TTS. Each
|
|
board has 24 ports in order to handle a single T1 span which carries 24 voice
|
|
channels.
|
|
|
|
PMAC is based on a Motorola 68000 microprocessor that directs and
|
|
coordinates data flow within the PM.
|
|
|
|
MPPD boards provide bus termination and the system clocks for the
|
|
digital network. The MPPD contains a master and a secondary clock, which are
|
|
synchronized with the frequency of an incoming T-1 span. The module also
|
|
contains its own clock for use when T-1 synchronization is not available or
|
|
lost.
|
|
The MPPD also generates the ringing tones, busy signals, and reorder
|
|
tones heard by the customer and sends the zip (alert) tone to the operator.
|
|
|
|
The CC controls the interaction between the PM components and the
|
|
DARU. It contains the Office Dependent Data Base (ODDB), which is a system
|
|
table that describes the configuration of the TTS. The CC uses the ODDB to
|
|
determine whether an incoming call is an ANI or ONI trunk.
|
|
The CC sets up paths through the digital network in order to
|
|
coordinate the resources of the CAIS/LAIS. It receives messages from the
|
|
PMAC, stores information necessary for returning a response to the appropriate
|
|
trunk, and controls message routing to and from the ARC or the operator. It
|
|
also synchronizes the TTS and the Directory Assistance System (DAS) for
|
|
operator-caller communications.
|
|
The CC is a Power-series standalone processor that contains a central
|
|
processing unit (CPU-2), based on the Motorola 68000 microprocessor. The
|
|
processor also contains distributed intelligence for controlling the memory
|
|
subsystem, the IO (input/output) subsystem, and the disk/tape subsystem. Each
|
|
CC includes a Winchester disk drive, a quarter-inch tape drive, and additional
|
|
miscellaneous hardware.
|
|
|
|
DAIS II Audio Response Unit (DARU)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The DARU contains the VOCAL boards that produce automated
|
|
announcements, which are compiled from a vocabulary stored in RAM. A
|
|
CAIS/LAIS contains 1 to 3 DARUs, each with 48 ports.
|
|
If a CAIS/LAIS houses more than one DARU, the units are multi-dropped
|
|
together. One DARU is always linked to the ARCs (either directly or by modems
|
|
and telephone lines) so that the announcement vocabulary can be downloaded
|
|
from the ARCs if necessary.
|
|
|
|
:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:
|
|
|
|
Much of the information in this file is copied verbatim from the
|
|
instructional booklet sent to me by CCI. Their documentation is extremely
|
|
in-depth and well written, and, with some looking over, is easy to
|
|
understand. Much of the information in here is confusing with all of the
|
|
acronyms used as well as technical terms, but if you cross-reference acronyms
|
|
throughout the file, you should be able to see what it stands for. Also, if
|
|
you don't understand what something does, just think of it in terms of use by
|
|
the telephone company in the context used and you can generally get an idea
|
|
of what it does or is used for. I hope you enjoyed this file and continue to
|
|
read Phrack Inc. files to learn more about the system we use and experience.
|
|
Any constructive suggestions are welcomed directly or indirectly.
|
|
|
|
Taran King
|
|
|
|
:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:=:
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #7 of 12
|
|
|
|
-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-
|
|
! !
|
|
# Hacking Primos I, II, III #
|
|
! !
|
|
# (I&II Revised) #
|
|
! !
|
|
# By Evil Jay #
|
|
! !
|
|
-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-
|
|
|
|
|
|
Author Note:
|
|
|
|
Ugg! I looked at my first file after it was released and saw a lot of
|
|
misspellings, errors and other screw-ups and was completely embarrassed. I
|
|
did not have time to edit the file and I was also writing the second file
|
|
which dealt with gaining privileges. I threw these two files at Taran King
|
|
who in turn merged them together. So I humbly apologize for all of the
|
|
errors in the last file. In this file I will revise the old file and
|
|
continue with some more methods of gaining access and also list out some
|
|
very basic commands for beginners. As I said before, if you have any
|
|
questions you can reach me on any board I am currently inhabiting. Hope to
|
|
hear from you...
|
|
|
|
|
|
*** Gaining Access From Scratch ***
|
|
|
|
I made a mistake in my last file and stated that FAM was not a default. FAM
|
|
is a default, but it can be taken out by the system administrators.
|
|
|
|
|
|
To get a listing of every possible account on a system, it is really quite
|
|
easy. They are located in the MFD directories. Type:
|
|
|
|
A MFD <MFD #> (Without the "<" and ">" signs)
|
|
|
|
Or just:
|
|
|
|
A MFD
|
|
|
|
Then type LD and hit return. Now, you will see a listing of files and
|
|
underneath should be a listing of directories appropriately named
|
|
Directories. These directories are valid User IDs. However, I believe that
|
|
directories that have an "*" character in them cannot be logged in to.
|
|
|
|
|
|
*** Getting Higher Access Revised ***
|
|
|
|
SYS1 is the highest system level there is. Meaning unless commands have to
|
|
be entered from the supervisors terminal, you can usually do anything with an
|
|
account that has SYS1 access. Also, I should clarify that SYS1 will not
|
|
always be the name of the highest access available. It could be named SYSTEM
|
|
or anything for that matter.
|
|
|
|
You are looking for a file with the extension .CPL - look for this file
|
|
under any of the SYS1 directories. When you find one, SLIST it. You are
|
|
looking for a line similar to:
|
|
|
|
A <DIRECTORY NAME> <PASSWORD>
|
|
|
|
It could look like:
|
|
|
|
A LIB XXX
|
|
|
|
LIB is the directory (user id) name.
|
|
|
|
XXX is the password to that directory (user id).
|
|
|
|
|
|
When you have this, log into that account with the directory name and
|
|
password. If your lucky you'll gain access to that account. I have noticed
|
|
that a lot of high access accounts sometimes have the password XXXXXX or X.
|
|
Try these, I am unsure as to whether they are actual defaults or not.
|
|
|
|
|
|
Ah, the revision is done! Now some more ways to gain access...
|
|
|
|
|
|
*** The Trojan Horse ***
|
|
|
|
Providing you have access, you may or may not be able to edit a file in a
|
|
high access directory. If you can't then try the above technique and try to
|
|
hack a higher level account.
|
|
|
|
|
|
You will first want to learn the Command Processing Language (CPL). Type
|
|
HELP CPL for a list of commands and then play around and try to write your
|
|
own programs. If you don't have a manual handy, look at other CPL programs in
|
|
other directories you can access. Once you know CPL, all you have to do is
|
|
edit a CPL file in a high access dir. Add your own high level commands to the
|
|
program. Then replace the old file, logoff and wait until the operator(s)
|
|
decide to run your program. Hopefully, if everything goes well your routines
|
|
will help you with whatever you wanted. However it would be a good idea to
|
|
have your TH write a file to your directory telling you whether it has been
|
|
ran or not. I will discuss different Trojan Horses in later issues of Phrack.
|
|
|
|
|
|
Once on a Prime it is pretty easy to get other accounts so don't worry about
|
|
it. Just worry about getting on in the first place. Patience is definitely
|
|
required since many systems (particularly versions 19 up) tend to hang up
|
|
after the first invalid id/password combo.
|
|
|
|
|
|
|
|
*** Basic Commands For Beginners ***
|
|
|
|
|
|
This is a list of basic commands you can use once on a Prime system. I will
|
|
not go in-depth on a command, because you can do that for yourself by
|
|
typing:
|
|
|
|
HELP <COMMAND NAME>
|
|
|
|
|
|
|
|
SLIST <FILENAME>
|
|
|
|
This will list out the contents of a file on a directory. Type in the full
|
|
file name (plus extension).
|
|
|
|
|
|
ATTACH <DIRECTORY NAME>
|
|
|
|
This will attach you to another directory. For a full explanation type HELP
|
|
ATTACH.
|
|
|
|
|
|
LD
|
|
|
|
This will list all the files and subdirectories in a directory.
|
|
|
|
|
|
RLS -ALL
|
|
|
|
Commands add up on the stack, and eventually after a pre-determined amount of
|
|
commands you will get a message telling you that you are "now at command level
|
|
XX". This command will release all those pent up commands in the stack.
|
|
|
|
|
|
CPL <FILENAME>
|
|
|
|
This will run a file with the extension ".CPL".
|
|
|
|
|
|
COMINPUT <FILENAME>
|
|
|
|
This will run a file with the extension ".COM"
|
|
|
|
|
|
SEG <FILENAME>
|
|
|
|
This will run a file with the extension ".SEG"
|
|
|
|
|
|
STATUS USERS
|
|
|
|
This will give you a listing of users and other information currently on the
|
|
system.
|
|
|
|
|
|
STATUS
|
|
|
|
This will give you the status of the system and other information.
|
|
|
|
|
|
EDIT (Or ED)
|
|
|
|
This is a text editor.
|
|
|
|
|
|
CHANGE_PASSWORD <OLD PASSWORD>
|
|
|
|
Does just what it says it does.
|
|
|
|
|
|
DELETE <FILENAME>
|
|
|
|
Deletes a file.
|
|
|
|
|
|
LOGOFF
|
|
|
|
I think this is pretty obvious.
|
|
|
|
|
|
LOGIN
|
|
|
|
This will log you out and take you back to the login process, providing there
|
|
is no logins-over-logins set by the administrators.
|
|
|
|
|
|
This is a very small list, but will probably help the beginner greatly when
|
|
he/she first logs on. Hope you enjoyed this issue...Look for Hacking Primos
|
|
Part IV in Phrack, 12. Mebbe'.
|
|
|
|
|
|
|
|
-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-
|
|
! !
|
|
# A Phrack,Inc #
|
|
! !
|
|
# Presentation #
|
|
! !
|
|
-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-
|
|
=========================================================================
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #8 of 12
|
|
|
|
|
|
Telephone Signalling Methods
|
|
----------------------------
|
|
|
|
|
|
Written by Doom Prophet
|
|
|
|
|
|
This file explains the basic signalling methods in use by the telephone
|
|
system and is intended for general understanding. The text that follows is not
|
|
highly technical since this file is for basic understanding and aimed at less
|
|
experienced phreaks. Still, the more experienced readers may want to read it
|
|
as a review on the information.
|
|
|
|
|
|
Analog--Analog signals are those that have continuously and smoothly
|
|
varying amplitude or frequency. Speech signals are of this type when you
|
|
consider tone, pitch and volume levels that vary according to the person
|
|
speaking. When a person speaks into the transmitter on a telephone, the voice
|
|
signals are made up of acoustical energy, which are then converted into
|
|
electrical energy for transmission along a transmission medium.
|
|
|
|
Analog carrier facilities may operate over different media, such as wire
|
|
lines, multi-wire cable, coaxial cable, or fiber optic cable. Copper wire is
|
|
the most commonly used for subscriber loops.
|
|
|
|
|
|
A technique that allows for many signals to be sent along the same
|
|
transmission path is called Multiplexing. Analog signals use Frequency
|
|
Division Multiplexing or FDM.
|
|
|
|
|
|
Digital--Instead of the voice signal being processed as an analog signal,
|
|
it is converted into a digital signal and handled with digital circuits
|
|
throughout the transmission process. When it arrives at the CO that serves the
|
|
called telephone, it is converted back to analog to reproduce the original
|
|
voice transmission.
|
|
|
|
|
|
Pulse Code Modulation or PCM is when the binary signal is transmitted in
|
|
serial form. Binary coding represents bits or binary digits at 0 and 1 levels.
|
|
These levels have a definite time relationship with one another. Time Division
|
|
Multiplexing or TDM is the type of multiplexing, sometimes abbreviated as MUX,
|
|
done for digital transmission.
|
|
|
|
|
|
Metallic--Metallic facilities carry only one Voice Frequency (VF) channel.
|
|
Typically, a metallic facility is used to connect business or residential
|
|
lines to a CO. Coaxial cable can be used to transmit both Analog and Digital
|
|
signals as well as Metallic signals.
|
|
|
|
|
|
VF channels have a 4000 Hz bandwidth, from 0 to 4000 Hz. However, the
|
|
in-band range of the voice frequency is between 200 and 3400 Hz. Signals that
|
|
are out of this frequency range but still within the VF channel are out of
|
|
band signals. A supervisory equivalent to 2600 for out of band is 3700 Hz. The
|
|
amount of VF channels vary according to the transmission facilities that are
|
|
being used.
|
|
|
|
|
|
CCIS (Common Channel Interoffice Signalling) is where control or
|
|
supervisory signals are sent on a separate data link between switching
|
|
offices. CCIS links operate at 4800 bps, or baud. Signal Transfer Points in
|
|
the switch send the supervisory information over the dedicated link. This
|
|
prevents supervisory tones from subscriber stations to register with the
|
|
telephone network as a change in trunk status.
|
|
|
|
|
|
Reverse Battery Signalling- When the called end answers, the polarity and
|
|
condition of the Ring and Tip leads is reversed to indicate the status of the
|
|
connection. Conditions for a call being placed, but not yet answered, is
|
|
ground on the Tip and battery (the CO battery current is flowing through) on
|
|
the Ring. When the called party answers, by the action of relays in the
|
|
switching equipment, current is reversed in the calling subscriber loop and
|
|
battery is placed on the Tip and ground on the Ring, which remains during the
|
|
talking.
|
|
|
|
|
|
E and M- Leads connecting switching equipment to trunk circuits are termed
|
|
the E and M leads, for receive and transmit. The E lead reflects the far-end
|
|
or terminating end condition of the trunk. Ground on the E lead indicates that
|
|
a signal has been received from the other end. The E lead is open when the
|
|
trunk is idle. The M lead reflects the the near end condition of the trunk. It
|
|
is grounded when the trunk is idle, and goes to battery condition when the
|
|
called party goes off hook. Long interoffice and short haul toll trunks use
|
|
this signalling method.
|
|
|
|
|
|
It should be noted that AC signalling is Alternating Current, and is used
|
|
on the intertoll network, and interoffice and short haul toll trunks. DC, or
|
|
direct current, is used on two wire or intraoffice connections, and local
|
|
interoffice trunks.
|
|
|
|
Single Frequency (SF)- Single Frequency is an in-band 2600 Hz signalling
|
|
system. When a four wire trunk is idle, and is equipped for SF in band
|
|
signalling, a 2600 Hz tone is being transmitted in both directions. When the
|
|
trunk is seized at an originating position, the M lead is changed from ground
|
|
to battery state. This removes the 2600 Hz supervisory tone from the outgoing
|
|
trunk pair. The loss of the 2600 Hz will be detected at the far end by the SF
|
|
signalling unit, changing the far end E lead condition from open to ground,
|
|
causing switching equipment to function. When ground is restored to the M
|
|
lead, replacing 2600 on the near end trunk, the pulsing of address information
|
|
begins.
|
|
|
|
|
|
Multi-Frequency (MF)- The MF pulsing method uses AC signals in the voice
|
|
frequency range, and transmits address information between COs by combinations
|
|
of only 2 of 5 frequencies. MF is used for the sending of address information,
|
|
as mentioned before. Other signalling methods are still required for trunk
|
|
control and supervision. There are six MFs comprising MF codes. These are 200
|
|
Hz apart in the 700-1700 range. Two frequencies are sent at once, thus
|
|
explaining the term 'Multi frequency.'
|
|
|
|
|
|
MF pulsing is initiated by manual keysets and the TSPS switchboard, or by
|
|
MF outpulsing senders in ESS and Xbar. MF pulsing is very rapid and only
|
|
occurs when a connection is being established. KPs, or Key Pulses, are used as
|
|
a signal to start MF pulsing. STs, or STart tones are used as a signal to
|
|
indicate the end of MF pulsing.
|
|
|
|
|
|
As an example of MF signalling, take a toll switchboard trunk connected to
|
|
a Xbar Central Office. The operator selects an idle trunk, and presses the KP
|
|
button on the keyset to signal the distant sender or register link equipment
|
|
to connect to a MF receiver. The S lamp on the keyset will light when the far
|
|
end is ready to receive MF pulses. After keypulsing the digits of the called
|
|
number, the operator presses the ST button, which indicates the end of pulsing
|
|
and disconnects the keyset from the operator's cord circuit and extinguishes
|
|
the KP and S lamps.
|
|
|
|
|
|
At the terminating CO, the two MF tones of each digit are amplified and
|
|
limited in the MF receiver unit associated with the incoming sender and
|
|
register circuit. The frequencies are selected by channel filters in the MF
|
|
receiver and then detected. The DC voltage that results will operate the
|
|
proper channel relays to continue with the process of placing the call.
|
|
|
|
|
|
|
|
Written in July of 1986
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #9 of 12
|
|
|
|
--------------------------------------------------------------------------
|
|
The following is reprinted from the November 1985 issue of Personal
|
|
Communications Technology magazine by permission of the authors and
|
|
the publisher, FutureComm Publications Inc., 4005 Williamsburg Ct.,
|
|
Fairfax, VA 22032, 703/352-1200.
|
|
|
|
Copyright 1985 by FutureComm Publications Inc. All rights reserved.
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
THE ELECTRONIC SERIAL NUMBER: A CELLULAR 'SIEVE'?
|
|
'SPOOFERS' CAN DEFRAUD USERS AND CARRIERS
|
|
|
|
by Geoffrey S. Goodfellow, Robert N. Jesse, and Andrew H. Lamothe, Jr.
|
|
|
|
|
|
What's the greatest security problem with cellular phones? Is it privacy of
|
|
communications? No.
|
|
|
|
Although privacy is a concern, it will pale beside an even greater problem:
|
|
spoofing.
|
|
|
|
'Spoofing' is the process through which an agent (the 'spoofer') pretends to
|
|
be somebody he isn't by proffering false identification, usually with intent
|
|
to defraud. This deception, which cannot be protected against using the
|
|
current U.S. cellular standards, has the potential to create a serious
|
|
problem--unless the industry takes steps to correct some loopholes in the
|
|
present cellular standards.
|
|
|
|
Compared to spoofing, the common security concern of privacy is not so severe.
|
|
Most cellular subscribers would, at worst, be irked by having their
|
|
conversational privacy violated. A smaller number of users might actually
|
|
suffer business or personal harm if their confidential exchanges were
|
|
compromised. For them, voice encryption equipment is becoming increasingly
|
|
available if they are willing to pay the price for it.
|
|
|
|
Thus, even though technology is available now to prevent an interloper from
|
|
overhearing sensitive conversations, cellular systems cannot--at any
|
|
cost--prevent pirates from charging calls to any account. This predicament is
|
|
not new to the industry. Even though cellular provides a modern,
|
|
sophisticated quality mobile communications service, it is not fundamentally
|
|
much safer than older forms of mobile telephony.
|
|
|
|
History of Spoofing Vulnerability
|
|
|
|
The earliest form of mobile telephony, unsquelched manual Mobile Telephone
|
|
Service (MTS), was vulnerable to interception and eavesdropping. To place a
|
|
call, the user listened for a free channel. When he found one, he would key
|
|
his microphone to ask for service: 'Operator, this is Mobile 1234; may I
|
|
please have 555-7890.' The operator knew to submit a billing ticket for
|
|
account number 1234 to pay for the call. So did anybody else listening to the
|
|
channel--hence the potential for spoofing and fraud.
|
|
|
|
Squelched channel MTS hid the problem only slightly because users ordinarily
|
|
didn't overhear channels being used by other parties. Fraud was still easy
|
|
for those who turned off the squelch long enough to overhear account numbers.
|
|
|
|
Direct-dial mobile telephone services such as Improved Mobile Telephone
|
|
Service (IMTS) obscured the problem a bit more because subscriber
|
|
identification was made automatically rather than by spoken exchange between
|
|
caller and operator. Each time a user originated a call, the mobile telephone
|
|
transmitted its identification number to the serving base station using some
|
|
form of Audio Frequency Shift Keying (AFSK), which was not so easy for
|
|
eavesdroppers to understand.
|
|
|
|
Committing fraud under IMTS required modification of the mobile--restrapping
|
|
of jumpers in the radio unit, or operating magic keyboard combinations in
|
|
later units--to reprogram the unit to transmit an unauthorized identification
|
|
number. Some mobile control heads even had convenient thumb wheel switches
|
|
installed on them to facilitate easy and frequent ANI (Automatic Number
|
|
Identification) changes.
|
|
|
|
Cellular Evolution
|
|
|
|
Cellular has evolved considerably from these previous systems. Signaling
|
|
between mobile and base stations uses high-speed digital techniques and
|
|
involves many different types of digital messages. As before, the cellular
|
|
phone contains its own Mobile Identification Number (MIN), which is programmed
|
|
by the seller or service shop and can be changed when, for example, the phones
|
|
sold to a new user. In addition, the U.S. cellular standard incorporates a
|
|
second number, the 'Electronic Serial Number' (ESN), which is intended to
|
|
uniquely and permanently identify the mobile unit.
|
|
|
|
According to the Electronic Industries Association (EIA) Interim Standard
|
|
IS-3-B, Cellular System Mobile Station--Land Station Compatibility
|
|
Specification (July 1984), 'The serial number is a 32-bit binary number that
|
|
uniquely identifies a mobile station to any cellular system. It must be
|
|
factory-set and not readily alterable in the field. The circuitry that
|
|
provides the serial number must be isolated from fraudulent contact and
|
|
tampering. Attempts to change the serial number circuitry should render the
|
|
mobile station inoperative.'
|
|
|
|
The ESN was intended to solve two problems the industry observed with its
|
|
older systems.
|
|
|
|
First, the number of subscribers that older systems could support fell far
|
|
short of the demand in some areas, leading groups of users to share a single
|
|
mobile number (fraudulently) by setting several phones to send the same
|
|
identification. Carriers lost individual user accountability and their means
|
|
of predicting and controlling traffic on their systems.
|
|
|
|
Second, systems had no way of automatically detecting use of stolen equipment
|
|
because thieves could easily change the transmitted identification.
|
|
|
|
In theory, the required properties of the ESN allow cellular systems to check
|
|
to ensure that only the correctly registered unit uses a particular MIN, and
|
|
the ESNs of stolen units can be permanently denied service ('hot-listed').
|
|
This measure is an improvement over the older systems, but vulnerabilities
|
|
remain.
|
|
|
|
Ease of ESN Tampering
|
|
|
|
Although the concept of the unalterable ESN is laudable in theory, weaknesses
|
|
are apparent in practice. Many cellular phones are not constructed so that
|
|
'attempts to change the serial number circuitry renders the mobile station
|
|
inoperative.' We have personally witnessed the trivial swapping of one ESN
|
|
chip for another in a unit that functioned flawlessly after the switch was
|
|
made.
|
|
|
|
Where can ESN chips be obtained to perform such a swap? We know of one recent
|
|
case in the Washington, D.C. area in which an ESN was 'bought' from a local
|
|
service shop employee in exchange for one-half gram of cocaine. Making the
|
|
matter simpler, most manufacturers are using industry standard Read-Only
|
|
Memory (ROM) chips for their ESNs, which are easily bought and programmed or
|
|
copied.
|
|
|
|
Similarly, in the spirit of research, a west coast cellular carrier copied the
|
|
ESN from one manufacturer's unit to another one of the same type and
|
|
model--thus creating two units with the exact same identity.
|
|
|
|
The ESN Bulletin Board
|
|
|
|
For many phones, ESN chips are easy to obtain, program, and install. How does
|
|
a potential bootlegger know which numbers to use? Remember that to obtain
|
|
service from a system, a cellular unit must transmit a valid MIN (telephone
|
|
number) and (usually) the corresponding serial number stored in the cellular
|
|
switch's database.
|
|
|
|
With the right equipment, the ESN/MIN pair can be read right off the air
|
|
because the mobile transmits it each time it originates a call. Service shops
|
|
can capture this information using test gear that automatically receives and
|
|
decodes the reverse, or mobile-to-base, channels.
|
|
|
|
Service shops keep ESN/MIN records on file for units they have sold or
|
|
serviced, and the carriers also have these data on all of their subscribers.
|
|
Unscrupulous employees could compromise the security of their customers'
|
|
telephones.
|
|
|
|
In many ways, we predict that 'trade' in compromised ESN/MIN pairs will
|
|
resemble what currently transpires in the long distance telephone business
|
|
with AT&T credit card numbers and alternate long-distance carrier (such as
|
|
MCI, Sprint and Alltel) account codes. Code numbers are swapped among
|
|
friends, published on computer 'bulletin boards' and trafficked by career
|
|
criminal enterprises.
|
|
|
|
Users whose accounts are being defrauded might--or might not--eventually
|
|
notice higher-than-expected bills and be reassigned new numbers when they
|
|
complain to the carrier. Just as in the long distance business, however, this
|
|
number 'turnover' (deactivation) won't happen quickly enough to make abuse
|
|
unprofitable. Catching pirates in the act will be even tougher than it is in
|
|
the wireline telephone industry because of the inherent mobility of mobile
|
|
radio.
|
|
|
|
Automating Fraud
|
|
|
|
Computer hobbyists and electronics enthusiasts are clever people. Why should
|
|
a cellular service thief 'burn ROMs' and muck with hardware just to install
|
|
new IDs in his radio? No Herculean technology is required to 'hack' a phone
|
|
to allow ESN/MIN programming from a keyboard, much like the IMTS phone thumb
|
|
wheel switches described above.
|
|
|
|
Those not so technically inclined may be able to turn to mail-order
|
|
entrepreneurs who will offer modification kits for cellular fraud, much as
|
|
some now sell telephone toll fraud equipment and pay-TV decoders.
|
|
|
|
At least one manufacturer is already offering units with keyboard-programmable
|
|
MINs. While intended only for the convenience of dealers and service shops,
|
|
and thus not described in customer documentation, knowledgeable and/or
|
|
determined end users will likely learn the incantations required to operate
|
|
the feature. Of course this does not permit ESN modification, but easy MIN
|
|
reprogrammability alone creates a tremendous liability in today's roaming
|
|
environment.
|
|
|
|
The Rolls Royce of this iniquitous pastime might be a 'Cellular Cache-Box.' It
|
|
would monitor reverse setup channels and snarf ESN/MIN pairs off the air,
|
|
keeping a list in memory. Its owner could place calls as on any other
|
|
cellphone. The Cache-Box would automatically select an ESN/MIN pair from its
|
|
catalog, use it once and then discard it, thus distributing its fraud over
|
|
many accounts. Neither customer nor service provider is likely to detect the
|
|
abuse, much less catch the perpetrator.
|
|
|
|
As the history of the computer industry shows, it is not far-fetched to
|
|
predict explosive growth in telecommunications and cellular that will bring
|
|
equipment prices within reach of many experimenters. Already we have seen the
|
|
appearance of first-generation cellular phones on the used market, and new
|
|
units can be purchased for well under $1000 in many markets.
|
|
|
|
How High The Loss?
|
|
|
|
Subscribers who incur fraudulent charges on their bills certainly can't be
|
|
expected to pay them. How much will fraud cost the carrier? If the charge is
|
|
for home-system airtime only, the marginal cost to the carrier of providing
|
|
that service is not as high as if toll charges are involved. In the case of
|
|
toll charges, the carrier suffers a direct cash loss. The situation is at its
|
|
worst when the spoofer pretends to be a roaming user. Most inter-carrier
|
|
roaming agreements to date make the user's home carrier (real or spoofed)
|
|
responsible for charges, who would then be out hard cash for toll and airtime
|
|
charges.
|
|
|
|
We have not attempted to predict the dollar losses this chicanery might
|
|
generate because there isn't enough factual information information for anyone
|
|
to guess responsibly. Examination of current estimates of long-distance-toll
|
|
fraud should convince the skeptic.
|
|
|
|
Solutions
|
|
|
|
The problems we have described are basically of two types. First, the ESN
|
|
circuitry in most current mobiles is not tamper-resistant, much less
|
|
tamper-proof. Second and more importantly, the determined perpetrator has
|
|
complete access to all information necessary for spoofing by listening to the
|
|
radio emissions from valid mobiles because the identification information
|
|
(ESN/MIN) is not encrypted and remains the same with each transmission.
|
|
|
|
Manufacturers can mitigate the first problem by constructing mobiles that more
|
|
realistically conform to the EIA requirements quoted above. The second
|
|
problem is not beyond solution with current technology, either. Well-known
|
|
encryption techniques would allow mobiles to identify themselves to the
|
|
serving cellular system without transmitting the same digital bit stream each
|
|
time. Under this arrangement, an interloper receiving one transmission could
|
|
not just retransmit the same pattern and have it work a second time.
|
|
|
|
An ancillary benefit of encryption is that it would reasonably protect
|
|
communications intelligence--the digital portion of each transaction that
|
|
identifies who is calling whom when.
|
|
|
|
The drawback to any such solution is that it requires some re-engineering in
|
|
the Mobile-Land Station Compatibility Specification, and thus new software or
|
|
hardware for both mobiles and base stations. The complex logistics of
|
|
establishing a new standard, implementing it, and retrofitting as much of the
|
|
current hardware as possible certainly presents a tough obstacle, complicated
|
|
by the need to continue supporting the non-encrypted protocol during a
|
|
transition period, possibly forever.
|
|
|
|
The necessity of solving the problem will, however, become apparent. While we
|
|
presently know of no documented cases of cellular fraud, the vulnerability of
|
|
the current standards and experience with similar technologies lead us to
|
|
conclude that it is inevitable. Failure to take decisive steps promptly will
|
|
expose the industry to a far more expensive dilemma. XXX
|
|
|
|
|
|
Geoffrey S. Goodfellow is a member of the senior research staff in the
|
|
Computer Science Laboratory at SRI International, 333 Ravenswood Ave., Menlo
|
|
Park, CA 94025, 415/859-3098. He is a specialist in computer security and
|
|
networking technology and is an active participant in cellular industry
|
|
standardization activities. He has provided Congressional testimony on
|
|
telecommunications security and privacy issues and has co-authored a book on
|
|
the computer 'hacking' culture.
|
|
|
|
Robert N. Jesse (2221 Saint Paul St., Baltimore, MD 21218, 301/243-8133) is an
|
|
independent consultant with expertise in security and privacy, computer
|
|
operating systems, telecommunications and technology management. He is an
|
|
active participant in cellular standardization efforts. He was previously a
|
|
member of the senior staff at The Johns Hopkins University, after he obtained
|
|
his BES/EE from Johns Hopkins.
|
|
|
|
Andrew H. Lamothe, Jr. is executive vice-president of engineering at Cellular
|
|
Radio Corporation, 8619 Westwood Center Dr., Vienna, VA 22180, 703/893-2680.
|
|
He has played a leading role internationally in cellular technology
|
|
development. He was with Motorola for 10 years prior to joining American
|
|
TeleServices, where he designed and engineered the Baltimore/Washington market
|
|
trial system now operated by Cellular One.
|
|
--------
|
|
|
|
|
|
A later note indicates that one carrier may be losing something like $180K per
|
|
month....
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #10 of 12
|
|
|
|
BUSY LINE VERIFICATION
|
|
|
|
WRITTEN BY PHANTOM PHREAKER
|
|
|
|
|
|
This file describes how a TSPS operator does a BLV (Busy Line
|
|
Verification) and an EMER INT (Emergency Interrupt) upon a busy line that a
|
|
customer has requested to be 'broken' into. I have written this file to
|
|
hopefully clear up all the misconceptions about Busy Line Verification and
|
|
Emergency Interrupts.
|
|
|
|
BLV is 'Busy Line Verification'. That is, discovering if a line is
|
|
busy/not busy. BLV is the telco term, but it has been called Verification,
|
|
Autoverify, Emergency Interrupt, break into a line, REMOB, and others. BLV is
|
|
the result of a TSPS that uses a Stored Program Control System (SPCS) called
|
|
the Generic 9 program. Before the rise of TSPS in 1969, cordboard operators
|
|
did the verification process. The introduction of BLV via TSPS brought about
|
|
more operator security features. The Generic 9 SPCS and hardware was first
|
|
installed in Tucson, Daytona, and Columbus, Ohio, in 1979. By now virtually
|
|
every TSPS has the Generic 9 program.
|
|
|
|
A TSPS operator does the actual verification. If caller A was in the 815
|
|
Area code, and caller B was in the 314 Area code, A would dial 0 to reach a
|
|
TSPS in his area code, 815. Now, A, the customer, would tell the operator he
|
|
wished an emergency interrupt on B's number, 314+555+1000. The 815 TSPS op who
|
|
answered A's call cannot do the interrupt outside of her own area code, (her
|
|
service area), so she would call an Inward Operator for B's area code, 314,
|
|
with KP+314+TTC+121+ST, where the TTC is a Terminating Toll Center code that
|
|
is needed in some areas. Now a TSPS operator in the 314 area code would be
|
|
reached by the 815 TSPS, but a lamp on the particular operators console would
|
|
tell her she was being reached with an Inward routing. The 815 operator then
|
|
would say something along the lines of she needed an interrupt on
|
|
314+555+1000, and her customers name was J. Smith. Now, the 314 Inward (which
|
|
is really a TSPS) would dial B's number, in a normal Operator Direct Distance
|
|
Dialing (ODDD) fashion. If the line wasn't busy, then the 314 Inward would
|
|
report this to the 815 TSPS, who would then report to the customer (caller A)
|
|
that 314+555+1000 wasn't busy and he could call as normal. However if the
|
|
given number (in this case, 314+555+1000) was busy, then several things would
|
|
happen and the process of BLV and EMER INT would begin. The 314 Inward would
|
|
seize a Verification trunk (or BLV trunk) to the toll office that served the
|
|
local loop of the requested number (555+1000). Now another feature of TSPS
|
|
checks the line asked to be verified against a list of lines that can't be
|
|
verified, such as radio stations, police, etc. If the line number a customer
|
|
gives is on the list then the verification cannot be done, and the operator
|
|
tells the customer.
|
|
|
|
Now the TSPS operator would press her VFY (VeriFY) key on the TSPS
|
|
console, and the equipment would outpulse (onto the BLV trunk)
|
|
KP+0XX+PRE+SUFF+ST. The KP being Key Pulse, the 0XX being a 'screening code'
|
|
that protects against trunk mismatching, the PRE being the Prefix of the
|
|
requested number (555), the SUFF being the Suffix of the requested number
|
|
(1000), and the ST being STart, which tells the Verification trunk that no
|
|
more MF digits follow. The screening code is there to keep a normal Toll
|
|
Network (used in regular calls) trunk from accidentally connecting to a
|
|
Verification trunk. If this screening code wasn't present, and a trunk
|
|
mismatch did occur, someone calling a friend in the same area code might just
|
|
happen to be connected to his friends line, and find himself in the middle of
|
|
a conversation. But, the Verification trunk is waiting for an 0XX sequence,
|
|
and a normal call on a Toll Network trunk does not outpulse an 0XX first.
|
|
(Example: You live at 914+555+1000, and wish to call 914+666+0000. The routing
|
|
for your call would be KP+666+0000+ST. The BLV trunk cannot accept a 666 in
|
|
place of the proper 0XX routing, and thus would give the caller a re-order
|
|
tone.) Also, note that the outpulsing sequence onto a BLV trunk can't contain
|
|
an Area Code. This is the reason why if a customer requests an interrupt
|
|
outside of his own NPA, the TSPS operator must call an Inward for the area
|
|
code that can outpulse onto the proper trunk. If a TSPS in 815 tried to do an
|
|
interrupt on a trunk in 314, it would not work. This proves that there is a
|
|
BLV network for each NPA, and if you somehow gain access to a BLV trunk, you
|
|
could only use it for interrupts within the NPA that the trunk was located in.
|
|
|
|
BLV trunks 'hunt' to find the right trunks to the right Class 5 End Office
|
|
that serves the given local loop. The same outpulsing sequence is passed along
|
|
BLV trunks until the BLV trunk serving the Toll Office that serves the given
|
|
End Office is found.
|
|
|
|
There is usually one BLV trunk per 10,000 lines (exchange). So, if a Toll
|
|
Office served ten End Offices, that Toll Office would have 100,000 local loops
|
|
that it served, and have 10 BLV trunks running from TSPS to that Toll Office.
|
|
|
|
Now, the operator (in using the VFY key) can hear what is going on on the
|
|
line, (modem, voice, or a permanent signal, indicating a phone off-hook) and
|
|
take appropriate action. She can't hear what's taking place on the line
|
|
clearly, however. A speech scrambler circuit within the operator console
|
|
generates a scramble on the line while the operator is doing a VFY. The
|
|
scramble is there to keep operators from listening in on people, but it is not
|
|
enough to keep an op from being able to tell if a conversation, modem signal,
|
|
or a dial tone is present upon the line. If the operator hears a permanent
|
|
signal, she can only report back to the customer that either the phone is
|
|
off-hook, or there is a problem with the line, and she can't do anything about
|
|
it. In the case of caller A and B, the 314 Inward would tell the 815 TSPS, and
|
|
the 815 TSPS would tell the customer. If there is a conversation on line, the
|
|
operator presses a key marked EMER INT (EMERgency INTerrupt) on her console.
|
|
This causes the operator to be added into a three way port on the busy line.
|
|
The EMER INT key also deactivates the speech scrambling circuit and activates
|
|
an alerting tone that can be heard by the called customer. The alerting tone
|
|
that is played every 10 seconds tells the customer that an operator is on the
|
|
line. Some areas don't have the alerting tone, however. Now, the operator
|
|
would say 'Is this XXX-XXXX?' where XXX-XXXX would be the Prefix and Suffix of
|
|
the number that the original customer requesting the interrupt gave the
|
|
original TSPS. The customer would confirm the operator had the correct line.
|
|
Then the Op says 'You have a call waiting from (customers name). Will you
|
|
accept?'. This gives the customer the chance to say 'Yes' and let the calling
|
|
party be connected to him, while the previous party would be disconnected. If
|
|
the customer says 'No', then the operator tells the person who requested the
|
|
interrupt that the called customer would not accept. The operator can just
|
|
inform the busy party that someone needed to contact him or her, and have the
|
|
people hang up, and then notify the requesting customer that the line is free.
|
|
Or, the operator can connect the calling party and the interrupted party
|
|
without loss of connection.
|
|
|
|
The charges for this service (in my area at least) run 1.00 for asking the
|
|
operator to interrupt a phone call so you can get through. There is an .80
|
|
charge if you ask the operator to verify whether the phone you're trying to
|
|
reach is busy because of a service problem or because of a conversation. If
|
|
the line has no conversation on it, there will be no charge for the
|
|
verification.
|
|
|
|
When the customer who initiated the emergency interrupt gets his telephone
|
|
bill, the charges for the interrupt call will look similar to this:
|
|
|
|
12-1 530P INTERRUPT CL 314 555 1000 OD 1 1.00
|
|
|
|
The 12-1 is December first of the current year; 530P is the time the call
|
|
was made to the operator requesting an interrupt; INTERRUPT CL is what took
|
|
place, that is, an interrupt call; 314 555 1000 is the number requested; OD
|
|
stands for Operator Dialed; the 1 is the length of the call (in minutes); and
|
|
the 1.00 is the charge for the interrupt. The format may be different,
|
|
depending upon your area and telephone company.
|
|
|
|
One thing I forgot to mention about TSPS operators. In places where a
|
|
Remote Trunking Arrangement is being used, and even places where they aren't
|
|
in use, you may be connected to a TSPS operator in a totally different area
|
|
code. In such a case, the TSPS that you reach in a Foreign NPA will call up an
|
|
inward operator for your Home NPA, if the line you requested an EMER INT on
|
|
was in your HNPA. If the line you requested EMER INT on was in the same NPA of
|
|
the TSPS that you had reached, then no inward operator would be needed and the
|
|
answering operator could do the entire process.
|
|
|
|
Verification trunks seem to be only accessible by a TSPS/Inward operator.
|
|
However, there have been claims to people doing Emergency Interrupts with blue
|
|
boxes. I don't know how to accomplish an EMER INT without the assistance of an
|
|
operator, and I don't know if it can be done. If you really wish to
|
|
participate in a BLV/EMER INT, call up an Inward Operator and play the part of
|
|
a TSPS operator who needs an EMER INT upon a pre-designated busy line. Billing
|
|
is handled at the local TSPS so you will not have to supply a billing number
|
|
if you decide to do this.
|
|
|
|
|
|
If you find any errors in this file, please try to let me know about it,
|
|
and if you find out any other information that I haven't included, feel free
|
|
to comment.
|
|
|
|
-End of file-
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #11 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN *>=-{ Phrack World News }-=<* PWN
|
|
PWN PWN
|
|
PWN Issue X PWN
|
|
PWN PWN
|
|
PWN Written, Compiled, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
Scan Man Revisited January 19, 1987
|
|
------------------
|
|
The following is a reprint from TeleComputist Newsletter Issue Two;
|
|
|
|
SCAN MAN - FED OR PHREAK? (The Other Side)
|
|
|
|
TeleComputist is printing the statement Scan Man has made to us
|
|
[TeleComputist] in rebuttal to Phrack World News, whom previously printed an
|
|
article concerning Scan Man in Phrack Issue VIII. Those of you who have seen
|
|
or read the article in Phrack VIII know that it basically covered information
|
|
and an intercepted memo alleging Scan Man of going after hackers and turning
|
|
in codes off his BBS (P-80 Systems, Charleston, West Virginia 304/744-2253) as
|
|
a TMC employee. Please note that this statement should be read with the
|
|
article concerning Scan Man in Phrack Issue VIII to get the full
|
|
understanding.
|
|
|
|
Scan Man started off his statement claiming not to work for TMC, but
|
|
instead for a New York branch office of Telecom Management (a Miami based
|
|
firm). He was flown in from Charleston, West Virginia to New York every week
|
|
for a four to five day duration. Once in New York, Telecom Management made
|
|
available a leased executive apartment where Scan Man stayed as he worked.
|
|
His position in Telecom Management was that of a systems analyst, "...and that
|
|
was it!" Scan Man stated. Scan Man also stated that he had never made it a
|
|
secret that he was working in New York and had even left messages on his BBS
|
|
saying this.
|
|
|
|
He also went on to say that he had no part in the arrest of Shawn [of
|
|
Phreaker's Quest] (previously known as Captain Caveman) by TMC in Las Vegas.
|
|
Scan Man claimed to have no ties with TMC in Las Vegas and that they would not
|
|
even know him. Scan Man then went on to say that Shawn had never replied to
|
|
previous messages Scan man had left asking for TMC codes. Scan Man also said
|
|
that the messages about TMC were in no way related to him. He claimed to have
|
|
no ties to TMC, which is a franchised operation which makes even TMC unrelated
|
|
except by name.
|
|
|
|
Scan Man stated that he called Pauline Frazier and asked her about the
|
|
inquiry by Sally Ride [:::Space Cadet] who acted as an insider to obtain the
|
|
information in Phrack VIII. He said that Pauline said nothing to the imposter
|
|
(Sally Ride) and merely directed him to a TMC employee named Kevin Griffo.
|
|
Scan Man then went on to say that the same day Sally Ride called Pauline
|
|
Frazier was the same day he received his notice. And to that Scan Man made
|
|
the comment, "If I find out this is so heads will roll!"
|
|
|
|
After that comment, Scan Man came up with arguments of his own, starting
|
|
off with the dates printed in Phrack VIII. He claimed that the dates were off
|
|
and backed this up by saying Ben Graves had been fired six months previously
|
|
to the conversation with Sally Ride. Scan Man then went on to ask why it had
|
|
taken Sally Ride so long to come forward with his information. Scan Man made
|
|
one last comment, "It's a fucking shame that there is a social structure in
|
|
the phreak world!" Meaning Sally Ride merely presented his information to
|
|
give himself a boost socially in the phreak world.
|
|
|
|
This is how it ended. We would like to say that TeleComputist printed the
|
|
statement by Scan Man to offer both sides of the story. We make no judgements
|
|
here and take no sides.
|
|
|
|
Reprinted with permission from TeleComputist Newsletter Issue 2
|
|
|
|
Copyright (C) 1986 by J. Thomas. All Rights Reserved
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Ok, that was Scan Man's side to the story, now that he had a few months to
|
|
come up with one. Lets do a critical breakdown;
|
|
|
|
-*- "He was flown in from Charleston, West Virginia to New York every week for
|
|
a four to five day duration."
|
|
|
|
Gee, wouldn't that get awfully expensive? Every week...and "made
|
|
available a leased executive apartment..." He must have been quite an
|
|
asset to "Telecom Management" for them to spend such large amounts on him.
|
|
Kinda interesting that he lived in Charleston, West Virginia (where
|
|
surprisingly enough there is a branch of TMC) and flew to New York every
|
|
week.
|
|
|
|
-*- "Scan Man claimed to have no ties with TMC in Las Vegas..." Ok, I'll buy
|
|
that. Notice how he didn't say that he had no ties with TMC in
|
|
Charleston. Furthermore if he had no ties with TMC in Charleston why
|
|
would they have his name in their company records? Why would all those
|
|
employees know him or dislike him for that matter?
|
|
|
|
-*- "Scan Man then went on to say that the same day Sally Ride called Pauline
|
|
Frazier was the day he received his notice." Well now, how can there be a
|
|
connection between the two events at all when Scan Man works for Telecom
|
|
Management and has "no ties with TMC" and claimed "not to work for TMC"?
|
|
If TMC and Telecom Management are truly independent of each other then
|
|
nothing Sally Ride said to Pauline Frazier could have affected him in ANY
|
|
way. That is unless he did work for TMC in the first place.
|
|
|
|
-*- "...and back this up by saying that Ben Graves had been fired six months
|
|
previously to the conversation with Sally Ride." Well first of all, PWN
|
|
did not give a date as to when Ben Graves was fired from TMC. Second of
|
|
all and more important, how does Scan Man know so much about TMC when he
|
|
works for "Telecom Management" and has "...no ties with TMC..."?
|
|
|
|
The rest of his statements were highly debatable and he showed no proof as to
|
|
their validity. As for why Sally Ride waited so long to come forward, well he
|
|
didn't wait that long at all, he came forward to myself in late May/early June
|
|
of 1986. My decision was to do nothing because there wasn't enough proof.
|
|
After three months of research we had enough proof and the article was
|
|
released.
|
|
|
|
With this attempt to cover up the truth, Scan Man has only given more
|
|
ammunition to the idea that he isn't what he claims to be.
|
|
|
|
Special Thanks to TeleComputist Newsletter
|
|
______________________________________________________________________________
|
|
|
|
The Cracker Cracks Up? December 21, 1986
|
|
----------------------
|
|
"Computer 'Cracker' Is Missing -- Is He Dead Or Is He Alive"
|
|
|
|
By Tom Gorman of The Los Angeles Times
|
|
|
|
ESCONDIDO, Calif. -- Early one morning in late September, computer hacker Bill
|
|
Landreth pushed himself away from his IBM-PC computer -- its screen glowing
|
|
with an uncompleted sentence -- and walked out the front door of a friend's
|
|
home here.
|
|
|
|
He has not been seen or heard from since.
|
|
|
|
The authorities want him because he is the "Cracker", convicted in 1984 of
|
|
breaking into some of the most secure computer systems in the United States,
|
|
including GTE Telemail's electronic mail network, where he peeped at NASA
|
|
Department of Defense computer correspondence.
|
|
|
|
He was placed on three years' probation. Now his probation officer is
|
|
wondering where he is.
|
|
|
|
His literary agent wants him because he is Bill Landreth the author, who
|
|
already has cashed in on the successful publication of one book on computer
|
|
hacking and who is overdue with the manuscript of a second computer book.
|
|
|
|
The Institute of Internal Auditors wants him because he is Bill Landreth the
|
|
public speaker who was going to tell the group in a few months how to make
|
|
their computer systems safer from people like him.
|
|
|
|
Susan and Gulliver Fourmyle want him because he is the eldest of their eight
|
|
children. They have not seen him since May 1985, when they moved away from
|
|
Poway in northern San Diego county, first to Alaska then to Maui where they
|
|
now live.
|
|
|
|
His friends want him because he is crazy Bill Landreth, IQ 163, who has pulled
|
|
stunts like this before and "disappeared" into the night air -- but never for
|
|
more than a couple of weeks and surely not for 3 months. They are worried.
|
|
|
|
Some people think Landreth, 21, has committed suicide. There is clear
|
|
evidence that he considered it -- most notably in a rambling eight-page
|
|
discourse that Landreth wrote during the summer.
|
|
|
|
The letter, typed into his computer, then printed out and left in his room for
|
|
someone to discover, touched on the evolution of mankind, prospects for man's
|
|
immortality and the defeat of the aging process, nuclear war, communism versus
|
|
capitalism, society's greed, the purpose of life, computers becoming more
|
|
creative than man and finally -- suicide.
|
|
|
|
The last page reads:
|
|
|
|
"As I am writing this as of the moment, I am obviously not dead. I do,
|
|
however, plan on being dead before any other humans read this. The idea is
|
|
that I will commit suicide sometime around my 22nd birthday..."
|
|
|
|
The note explained:
|
|
|
|
"I was bored in school, bored traveling around the country, bored getting
|
|
raided by the FBI, bored in prison, bored writing books, bored being bored. I
|
|
will probably be bored dead, but this is my risk to take."
|
|
|
|
But then the note said:
|
|
|
|
"Since writing the above, my plans have changed slightly.... But the point is,
|
|
that I am going to take the money I have left in the bank (my liquid assets)
|
|
and make a final attempt at making life worthy. It will be a short attempt,
|
|
and I do suspect that if it works out that none of my current friends will
|
|
know me then. If it doesn't work out, the news of my death will probably get
|
|
around. (I won't try to hide it.)"
|
|
|
|
Landreth's birthday is December 26 and his best friend is not counting on
|
|
seeing him again.
|
|
|
|
"We used to joke about what you could learn about life, especially since if
|
|
you don't believe in a God, then there's not much point to life," said Tom
|
|
Anderson, 16, a senior at San Pasqual High School in Escondido, about 30 miles
|
|
north of San Diego. Anderson also has been convicted of computer hacking and
|
|
placed on probation.
|
|
|
|
Anderson was the last person to see Landreth. It was around September 25 --
|
|
he does not remember exactly. Landreth had spent a week living in Anderson's
|
|
home so the two could share Landreth's computer. Anderson's IBM-PC had been
|
|
confiscated by authorities, and he wanted to complete his own book.
|
|
|
|
Anderson said he and Landreth were also working on a proposal for a movie
|
|
about their exploits.
|
|
|
|
"He started to write the proposal for it on the computer, and I went to take a
|
|
shower," Anderson said. "When I came out, he was gone. The proposal was in
|
|
mid-sentence. And I haven't seen him since."
|
|
|
|
Apparently Landreth took only his house key, a passport, and the clothes on
|
|
his back.
|
|
|
|
Anderson said he initially was not concerned about Landreth's absence. After
|
|
all this was the same Landreth who, during the summer, took off for Mexico
|
|
without telling anyone -- including friends he had seen just the night before
|
|
-- of his departure.
|
|
|
|
But concern grew by October 1, when Landreth failed to keep a speaking
|
|
engagement with a group of auditors in Ohio, for which he would have received
|
|
$1,000 plus expenses. Landreth may have kept a messy room and poor financial
|
|
records, but he was reliable enough to keep a speaking engagement, said his
|
|
friends and literary agent, Bill Gladstone, noting that Landreth's second
|
|
manuscript was due in August and had not yet been delivered.
|
|
|
|
But, the manuscript never came and Landreth has not reappeared.
|
|
|
|
Steve Burnap, another close friend, said that during the summer Landreth had
|
|
grown lackadaisical toward life. "He just didn't seem to care much about
|
|
anything anymore."
|
|
Typed for PWN by Druidic Death
|
|
From The Dallas Times Herald
|
|
______________________________________________________________________________
|
|
|
|
Beware The Hacker Tracker December, 1986
|
|
-------------------------
|
|
By Lamont Wood of Texas Computer Market Magazines
|
|
|
|
If you want to live like a spy in your own country, you don't have to join the
|
|
CIA or the M15 or the KGB. You can track hackers, like John Maxfield of
|
|
Detroit.
|
|
|
|
Maxfield is a computer security consultant running a business called
|
|
BoardScan, which tracks hackers for business clients. He gets occasional
|
|
death threats and taunting calls from his prey, among whom he is known as the
|
|
"hacker tracker," and answers the phone warily.
|
|
|
|
And although he has received no personal harassment, William Tener, head of
|
|
data security for the information services division of TRW, Inc., has found it
|
|
necessary to call in experts in artificial intelligence from the aerospace
|
|
industry in an effort to protect his company's computer files. TRW is a juicy
|
|
target for hackers because the firm stores personal credit information on
|
|
about 130 million Americans and 11 million businesses -- data many people
|
|
would love to get hold of.
|
|
|
|
Maxfield estimates that the hacker problem has increased by a factor of 10 in
|
|
the last four years, and now seems to be doubling every year. "Nearly every
|
|
system can be penetrated by a 14-year old with $200 worth of equipment," he
|
|
complains. "I have found kids as young as nine years old involved in hacking.
|
|
If such young children can do it, think of what an adult can do."
|
|
|
|
Tener estimates that there are as many as 5,000 private computer bulletin
|
|
boards in the country, and that as many as 2,000 are hacker boards. The rest
|
|
are as for uses as varied as club news, customer relations, or just as a hobby.
|
|
Of the 2,000 about two dozen are used by "elite" hackers, and some have
|
|
security features as good as anything used by the pentagon, says Maxfield.
|
|
|
|
The number of hackers themselves defies estimation, if only because the users
|
|
of the boards overlap. They also pass along information from board to board.
|
|
Maxfield says he has seen access codes posted on an east coast bulletin board
|
|
that appeared on a west coast board less than an hour later, having passed
|
|
through about ten boards in the meantime. And within hours of the posting of
|
|
a new number anywhere, hundreds of hackers will try it.
|
|
|
|
"Nowadays, every twerp with a Commodore 64 and a modem can do it, all for the
|
|
ego trip of being the nexus for forbidden knowledge," sighs a man in New York
|
|
City, known either as "Richard Cheshire" or "Chesire Catalyst" -- neither is
|
|
his real name. Cheshire was one of the earliest computer hackers, from the
|
|
days when the Telex network was the main target, and was the editor of TAP, a
|
|
newsletter for hackers and phone "phreaks". Oddly enough, TAP itself was an
|
|
early victim of the hacker upsurge. "The hacker kids had their bulletin
|
|
boards and didn't need TAP -- we were technologically obsolete," he recalls.
|
|
|
|
So who are these hackers and what are they doing? Tener says most of the ones
|
|
he has encountered have been 14 to 18 year old boys, with good computer
|
|
systems, often bright, middle class, and good students. They often have a
|
|
reputation for being loners, if only because they spend hours by themselves at
|
|
a terminal, but he's found out-going hacker athletes.
|
|
|
|
But Maxfield is disturbed by the sight of more adults and criminals getting
|
|
involved. Most of what the hackers do involves "theft of services" -- free
|
|
access to Compuserve, The Source, or other on-line services or corporate
|
|
systems. But, increasingly, the hackers are getting more and more into credit
|
|
card fraud.
|
|
|
|
Maxfield and Cheshire describe the same process -- the hackers go through
|
|
trash bins outside businesses whose computer they want to break into looking
|
|
for manuals or anything that might have access codes on it. They may find it,
|
|
but they also often find carbon copies of credit card sales slips, from which
|
|
they can read credit card numbers. They use these numbers to order
|
|
merchandise -- usually computer hardware -- over the phone and have it
|
|
delivered to an empty house in their neighborhood, or to a house where nobody
|
|
is home during the day. Then all they have to do is be there when the delivery
|
|
truck arrives.
|
|
|
|
"We've only been seeing this in the last year," Maxfield complains. "But now
|
|
we find adults running gangs of kids who steal card numbers for them. The
|
|
adults resell the merchandise and give the kids a percentage of the money."
|
|
|
|
It's best to steal the card number of someone rich and famous, but since
|
|
that's usually not possible it's a good idea to be able to check the victim's
|
|
credit, because the merchant will check before approving a large credit card
|
|
sale. And that's what makes TRW such a big target -- TRW has the credit
|
|
files. And the files often contain the number of any other credit cards the
|
|
victim owns, Maxfield notes.
|
|
|
|
The parents of the hackers, meanwhile, usually have no idea what their boy is
|
|
up to -- he's in his room playing, so what could be wrong? Tener recalls a
|
|
case where the parents complained to the boy about the high phone bill one
|
|
month. And the next month the bill was back to normal. And so the parents
|
|
were happy. But the boy had been billing the calls to a stolen telephone
|
|
company credit card.
|
|
|
|
"When it happens the boy is caught and taken to jail, you usually see that the
|
|
parents are disgruntled at the authorities -- they still think that Johnny was
|
|
just playing in his bedroom. Until, of course, they see the cost of Johnny's
|
|
play time, which can run $50,000 to $100,000. But outside the cost, I have
|
|
never yet seen a parent who was really concerned that somebody's privacy has
|
|
been invaded -- they just think Johnny's really smart," Tener says.
|
|
|
|
TRW will usually move against hackers when they see a TRW file or access
|
|
information on a bulletin board. Tener says they usually demand payment for
|
|
their investigation costs, which average about $15,000.
|
|
|
|
Tales of the damage hackers have caused often get exaggerated. Tener tells of
|
|
highly publicized cases of hackers who, when caught, bragged about breaking
|
|
into TRW, when no break-ins had occurred. But Maxfield tells of two 14-year
|
|
old hackers who were both breaking into and using the same corporate system.
|
|
They had an argument and set out to erase each other's files, and in the
|
|
process erased other files that cost about a million dollars to replace.
|
|
Being juveniles, they got off free.
|
|
|
|
After being caught, Tener says most hackers find some other hobby. Some,
|
|
after turning 18, are hired by the firms they previously raided. Tener says
|
|
it rare to see repeat offenders, but Maxfield tells of one 14-year-old repeat
|
|
offender who was first caught at age 13.
|
|
|
|
Maxfield and Tener both make efforts to follow the bulletin boards, and
|
|
Maxfield even has a network of double agents and spies within the hacker
|
|
community. Tener uses artificial intelligence software to examine the day's
|
|
traffic to look for suspicious patterns. TRW gets about 40,000 inquiries an
|
|
hour and has about 25,000 subscribers. But that does not address the
|
|
underlying problem.
|
|
|
|
"The real problem is that these systems are not well protected, and some can't
|
|
be protected at all," Maxfield says.
|
|
|
|
Cheshire agrees. "A lot of companies have no idea what these kids can do to
|
|
them," he says. "If they would make access even a little difficult the kids
|
|
will go on to some other system." As for what else can be done, he notes that
|
|
at MIT the first thing computer students are taught is how to crash the
|
|
system. Consequently, nobody bothers to do it.
|
|
|
|
But the thing that annoys old-timer Cheshire (and Maxfield as well) is that
|
|
the whole hacker-intruder-vandal-thief phenomenon goes against the ideology of
|
|
the original hackers, who wanted to explore systems, not vandalize them.
|
|
Cheshire defines the original "hacker ethic" as the belief that information is
|
|
a value-free resource that should be shared. In practice, it means users
|
|
should add items to files, not destroy them, or add features to programs,
|
|
rather than pirate them.
|
|
|
|
"These kids want to make a name for themselves, and they think that they need
|
|
to do something dirty to do that. But they do it just as well by doing
|
|
something clever, such as leaving a software bug report on a system," he
|
|
notes.
|
|
|
|
Meanwhile, Maxfield says we are probably stuck with the problem at least until
|
|
the phone systems converts to digital technology, which should strip hackers
|
|
of anonymity by making their calls easy to trace.
|
|
|
|
Until someone figures out how to hack digital phone networks, of course. -TCM
|
|
|
|
Typed for PWN by Druidic Death
|
|
______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Two, Issue Eleven, Phile #12 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN *>=-{ Phrack World News }-=<* PWN
|
|
PWN PWN
|
|
PWN Issue XI PWN
|
|
PWN PWN
|
|
PWN Written, Compiled, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
Computer Bulletin Boards January 8, 1986
|
|
------------------------
|
|
By The KTVI Channel 2 News Staff in St. Louis
|
|
|
|
Please keep in mind that Karen and Russ are anchor persons at KTVI.
|
|
All comments in []s are by me.-KL
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Karen: If Santa Claus brought you a computer for Christmas, beware of seeing
|
|
a few things you may not have bargained for. Computer bulletin boards
|
|
have spread by the thousands over the past few years and now some
|
|
people are concerned that the electronic messages may have gotten a
|
|
bit out of hand.
|
|
|
|
Russ: In its simplest definition, a computer bulletin board is a program or
|
|
message that can be accessed by other computers via telephone lines.
|
|
Anyone who has a home computer and a modem can receive and transmit to
|
|
computer bulletin boards. There are thousands of them nationwide, but
|
|
some are causing quite a stink [What a profound statement Russ].
|
|
|
|
[Flash to a picture of a geeky looking teenager]
|
|
|
|
Meet Jason Rebbe, he is a 16 year old computer whiz who a few months
|
|
ago accidentally tapped into a bulletin board called Dr. Doom's Castle.
|
|
[Sorry to break in here Russ, but why is this guy a computer whiz?
|
|
Just because he has a computer? Hey Russ, look a little closer, isn't
|
|
Jason sitting in front of a Commodore-64? I thought so. Oh yeah one
|
|
other thing, this BBS Dr. Doom's Castle has no known relation to Dr.
|
|
Doom (512) or Danger Zone Private.] Dr. Doom gives instructions on how
|
|
to build bombs and guns [Lions and Tigers and Bears, oh my!]. Jason
|
|
found the recipe for smoke bombs and tried to make one in his kitchen,
|
|
it didn't work. [Ba ha ha].
|
|
|
|
Jason: I heard an explosion in the basement first and that's when I knew
|
|
something was wrong. I thought it would be really neat to just set it
|
|
off someday when there was a lot of people around, just as a joke or a
|
|
prank. [Yeah, that would be K-Rad d00d!]. I didn't expect it to blow
|
|
up my house.
|
|
|
|
Russ: Jason wasn't hurt, but it cost about 2 grand [that's $2,000 to you and
|
|
me] to repair the kitchen. Jason's dad didn't take it well.
|
|
|
|
Bob Holloway: Mad wasn't the word for it. I, I was, I was past mad.
|
|
|
|
Russ: Mr. Holloway called Southwestern Bell and AT&T to see what could be
|
|
done about bulletin boards like Dr. Doom's Castle. The answer was
|
|
nothing. The Bureau of Alcohol, Tobacco, and Firearms said the same
|
|
thing.
|
|
|
|
Daniel Hoggart (Bureau of Alcohol, Tobacco, and Firearms): There is no
|
|
violation in publishing the information. The violation only
|
|
occurs when someone actually follows through on the
|
|
instructions and actually constructs a bomb.
|
|
|
|
Russ: Another bulletin board that is becoming more and more prevalent these
|
|
days is the Aryian Nation. This one [bulletin board] in Chicago says,
|
|
"If you are an anti-Communist you have made the right connection...on
|
|
the other hand, if you are consumed with such myths as
|
|
Judeo-Christianity, you most definitely dialed the wrong number."
|
|
|
|
Stan Anderman (Anti-Defamation League): Some of this really extreme hatred
|
|
is an attempt to create an environment where violence becomes
|
|
acceptable.
|
|
|
|
Russ: Like most computer bulletin boards the Aryian Nation message is legal
|
|
and falls under free speech laws. However, a bill is scheduled to go
|
|
to congress this session outlawing the kinds of bulletin boards we saw
|
|
here tonight.
|
|
|
|
But, for the moment, hackers should not be too surprised if something
|
|
unusual pops up on their computer terminal. [Ahem, Russ, you did it
|
|
again. All computer users are *NOT* hackers.]
|
|
|
|
Typed For PWN's Usage by Knight Lightning
|
|
______________________________________________________________________________
|
|
|
|
MIT Unix: Victim or Aggressor? January 23 - February 2, 1987
|
|
-------------------------------
|
|
Is the MIT system an innocent victim of hacker oppression or simply another
|
|
trap to capture unsuspecting hackers in the act?
|
|
|
|
It all started like this...
|
|
|
|
[Some posts have been slightly edited to be relevant to the topic]
|
|
|
|
------------------------------------------------------------------------------
|
|
MIT
|
|
Name: Druidic Death
|
|
Date: 12:49 am Mon Jan 20, 1986
|
|
|
|
Lately I've been messing around on MIT's VAX in there Physics Department.
|
|
|
|
Recently some one else got on there and did some damage to files. However MIT
|
|
told me that they'll still trust us to call them. The number is:
|
|
|
|
617-253-XXXX
|
|
|
|
We have to agree to the following or we will be kicked off, they will create a
|
|
"hacker" account for us.
|
|
|
|
<1> Use only GUEST, RODNEY, and GAMES. No other accounts until the
|
|
hacker one is made. There are no passwords on these accounts.
|
|
|
|
<2> Make sure we log off properly. Control-D. This is a UNIX system.
|
|
|
|
<3> Not to call between 9 AM and 5 PM Eastern Standard Time. This
|
|
is to avoid tying up the system.
|
|
|
|
<4> Leave mail to GEORGE only with UNIX questions (or C). And leave our
|
|
handles so he'll know who we are.
|
|
|
|
------------------------------------------------------------------------------
|
|
Unix
|
|
Name: Celtic Phrost
|
|
Date: 4:16 pm Mon Jan 20, 1986
|
|
|
|
Thanks Death for the MIT computer, I've been working on getting into them for
|
|
weeks. Here's another you can play around with:
|
|
|
|
617/258-XXXX
|
|
login:GUEST
|
|
|
|
Or use a WHO command at the logon to see other accounts, it has been a long
|
|
time since I played with that system, so I am unsure if the GUEST account
|
|
still works, but if you use the WHO command you should see the GUEST account
|
|
needed for applying for your own account.
|
|
|
|
-Phrost
|
|
------------------------------------------------------------------------------
|
|
Unix
|
|
Name: Celtic Phrost
|
|
Date: 5:35 pm Mon Jan 20, 1986
|
|
|
|
Ok, sorry, but I just remembered the application account, its: OPEN
|
|
Gawd, I am glad I got that off my chest!
|
|
|
|
-(A relieved)Celtic Phrost.
|
|
|
|
Also on that MIT computer Death listed, some other default accounts are:
|
|
|
|
LONG MIKE GREG NEIL DAN
|
|
|
|
Get the rest yourself, and please people, LEAVE THEM UNPASSWORDED!
|
|
|
|
------------------------------------------------------------------------------
|
|
MIT
|
|
Name: Druidic Death #12
|
|
Date: 1:16 am Fri Jan 23, 1987
|
|
|
|
MIT is pretty cool. If you haven't called yet, try it out. Just PLEASE make
|
|
sure you follow the little rules they asked us about! If someone doesn't do
|
|
something right the sysop leaves the gripe mail to me. Check out my directory
|
|
under the guest account just type "cd Dru". Read the first file.
|
|
|
|
------------------------------------------------------------------------------
|
|
MIT
|
|
Name: Ctrl C
|
|
Date: 12:56 pm Sat Jan 24, 1987
|
|
|
|
MIT Un-Passworded Unix Accounts: 617-253-XXXX
|
|
|
|
ALEX BILL GAMES DAVE GUEST DAN GREG MIKE LONG NEIL TOM TED
|
|
BRIAN RODNEY VRET GENTILE ROCKY SPIKE KEVIN KRIS TIM
|
|
|
|
And PLEASE don't change the Passwords....
|
|
|
|
-=>Ctrl C<=-
|
|
------------------------------------------------------------------------------
|
|
MIT Again
|
|
Name: Druidic Death
|
|
Date: 1:00 pm Wed Jan 28, 1987
|
|
|
|
Ok people, MIT is pissed, someone hasn't been keeping the bargain and they
|
|
aren't too thrilled about it. There were only three things they asked us to
|
|
do, and they were reasonable too. All they wanted was for us to not
|
|
compromise the security much more than we had already, logoff properly, not
|
|
leave any processes going, and call only during non-business hours, and we
|
|
would be able to use the GUEST accounts as much as we like.
|
|
|
|
Someone got real nice and added themselves to the "daemon" group which is
|
|
superusers only, the name was "celtic". Gee, I wonder who that could have
|
|
been? I'm not pissed at anyone, but I'd like to keep on using MIT's
|
|
computers, and they'd love for us to be on, but they're getting paranoid.
|
|
Whoever is calling besides me, be cool ok? They even gave me a voice phone to
|
|
chat with their sysops with. How often do you see this happen?
|
|
|
|
a little perturbed but not pissed...
|
|
|
|
DRU'
|
|
------------------------------------------------------------------------------
|
|
Tsk, Celtic.
|
|
Name: Evil Jay
|
|
Date: 9:39 am Thu Jan 29, 1987
|
|
|
|
Well, personally I don't know why anyone would want to be a superuser on the
|
|
system in question. Once you've been on once, there is really nothing that
|
|
interesting to look at...but anyway.
|
|
|
|
-EJ
|
|
------------------------------------------------------------------------------
|
|
In trouble again...
|
|
Name: Celtic Phrost
|
|
Date: 2:35 pm Fri Jan 30, 1987
|
|
|
|
...I was framed!! I did not add myself to any "daemon" group on any MIT UNIX.
|
|
I did call once, and I must admit I did hang up without logging off, but this
|
|
was due to a faulty program that would NOT allow me to break out of it, no
|
|
matter what I tried. I am sure that I didn't cause any damage by that.
|
|
|
|
-Phrost
|
|
------------------------------------------------------------------------------
|
|
Major Problems
|
|
Name: Druidic Death
|
|
Date: 12:20 pm Sat Jan 31, 1987
|
|
|
|
OK, major stuff going down. Some unidentified individual logged into the
|
|
Physics Dept's PDP11/34 at 617-253-XXXX and was drastically violating the
|
|
"agreement" we had reached. I was the one that made the "deal" with them.
|
|
And they even gave me a voice line to talk to them with.
|
|
|
|
Well, one day I called the other Physics computer, the office AT and
|
|
discovered that someone created an account in the superuser DAEMON group
|
|
called "celtic". Well, I was contacted by Brian through a chat and he told me
|
|
to call him. Then he proceeded to nicely inform me that "due to unauthorized
|
|
abuse of the system, the deal is off".
|
|
|
|
He was cool about it and said he wished he didn't have to do that. Then I
|
|
called George, the guy that made the deal and he said that someone who said he
|
|
was "Celtic Phrost" went on to the system and deleted nearly a year's worth of
|
|
artificial intelligence data from the nuclear fission research base.
|
|
|
|
Needless to say I was shocked. I said that he can't believe that it was one
|
|
of us, that as far as I knew everyone was keeping the deal. Then he (quite
|
|
pissed off) said that he wanted all of our names so he can report us to the
|
|
FBI. He called us fags, and all sorts of stuff, he was VERY!! [underline
|
|
twice] PISSED! I don't blame him. Actually I'm not blaming Celtic Phrost, it
|
|
very easily could have been a frame up.
|
|
|
|
But another thing is George thinks that Celtic Phrost and Druidic Death are
|
|
one and the same, in other words, he thinks that *I* stabbed him in the back.
|
|
Basically he just doesn't understand the way the hacker community operates.
|
|
|
|
Well, the deal is off, they plan to prosecute whoever they can catch. Since
|
|
George is my best friend's brother I have not only lost a friend, but I'm
|
|
likely to see some legal problems soon. Also, I can forget about doing my
|
|
graduate work at MIT. Whoever did this damage to them, I hope you're happy.
|
|
You really messed things up real nice for a lot of people.
|
|
|
|
Celtic, I don't have any reason to believe you messed with them. I also have
|
|
no reason to think you didn't. I'm not making an accusation against you, but
|
|
WHOEVER did this, deserves to be shot as far as I'm concerned. Until this
|
|
data was lost, they were on the verge of harnessing a laser-lithium produced
|
|
form of nuclear fission that would have been more efficient than using the
|
|
standard hydrogen. Well, back to the drawing board now.
|
|
|
|
I realize that it's hard to believe that they would have data like this on
|
|
this system. But they were quite stupid in many other areas too. Leaving the
|
|
superuser account with no password?? Think about it.
|
|
|
|
It's also possible that they were exaggerating. But regardless, damage seems
|
|
to have been done.
|
|
|
|
------------------------------------------------------------------------------
|
|
MIT
|
|
Name: Phreakenstein
|
|
Date: 1:31 am Sun Feb 01, 1987
|
|
|
|
Heck! I dunno, but whoever it was, I think, should let himself (the s00per
|
|
K-rad elyte d00d he is) be known.
|
|
|
|
I wasn't on MIT, but it was pretty dumb of MIT to even let Hackers on. I
|
|
wouldn't really worry though, they did let you on, and all you have to prove
|
|
is that you had no reason to do it.
|
|
|
|
----Phreak
|
|
------------------------------------------------------------------------------
|
|
I wonder...
|
|
Name: Ax Murderer #15
|
|
Date: 6:43 pm Sun Feb 01, 1987
|
|
|
|
I highly doubt that is was someone on this system. Since this is an elite
|
|
board, I think all the users are pretty decent and know right and wrong things
|
|
to do. Could be that one of the users on this system called another system
|
|
and gave it out!?? Nahh...shooting the asshole is not enough, let's think of
|
|
something better.
|
|
|
|
Ax Murderer
|
|
------------------------------------------------------------------------------
|
|
It was stupid
|
|
Name: Druidic Death #12
|
|
Date: 9:21 pm Sun Feb 01, 1987
|
|
|
|
It seems to me, or, what I gathered, they felt that there were going to be
|
|
hackers on the system to begin with and that this way they could keep
|
|
themselves basically safe.
|
|
|
|
I doubt that it was Celtic Phrost, I don't think he'd be an asshole like that.
|
|
But I can't say. When I posted, I was pretty pissed about the whole deal.
|
|
I've calmed down now. Psychic Warlord said something to me voice the other
|
|
day that made me stop and think. What if this was a set up right from the
|
|
start? I mean, MIT won't give me specifics on just what supposedly happened,
|
|
Celtic Phrost denies everything, and the biggest part of it is what George
|
|
said to me.
|
|
|
|
"We can forgive you for what you did to us if you'll promise to go straight
|
|
and never do this again and just tell us who all of your friends are that are
|
|
on the system".
|
|
|
|
I didn't pay much attention to that remark at first, now I'm beginning to
|
|
wonder...
|
|
|
|
I, of course, didn't narc on anyone. (Who do I know??? hehe)
|
|
|
|
DRU'
|
|
------------------------------------------------------------------------------
|
|
Well
|
|
Name: Solid State
|
|
Date: 11:40 pm Sun Feb 01, 1987
|
|
|
|
Well if they were serious about the FBI, I wouldn't take this too lightly.
|
|
Lately at Stanford there has been a lot of investigators that I've pinpointed
|
|
running around. This is mainly due to the number of break-ins this summer.
|
|
|
|
Anyways, if a large college like MIT says they may call in the FBI, be wary,
|
|
but don't over-react.
|
|
|
|
SOLID STATE
|
|
------------------------------------------------------------------------------
|
|
Comments...
|
|
Name: Delta-Master
|
|
Date: 7:15 am Mon Feb 02, 1987
|
|
|
|
It wouldn't surprise me if it was some kind of setup, it's been done before.
|
|
|
|
Delta-Master
|
|
------------------------------------------------------------------------------
|
|
Oh well...
|
|
Name: Evil Jay
|
|
Date: 8:56 am Mon Feb 02, 1987
|
|
|
|
I think your all wrong. The MIT lines have been around for a long time and
|
|
are widely known among the rodents. Anyone with a g-file could hack out a
|
|
password on the system so it looks to me like someone just messed around and
|
|
just happened to use Phrost as a flunkie. Oh well...
|
|
|
|
-EJ
|
|
------------------------------------------------------------------------------
|
|
All posts taken from:
|
|
___
|
|
/ )
|
|
\___ | | __
|
|
\ |_ _ _| _ (_ _ _ _
|
|
(___/ | ) ( \ ( | (_) \/\/ __) | ) ( \ \/\/ | )
|
|
|
|
|
\_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_/
|
|
|
|
"We're not ELITE... we're just cool as hell."
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Information Provided indirectly/directly by
|
|
|
|
Ax Murderer/Celtic Phrost/Ctrl C/Delta-Master/Druidic Death
|
|
Evil Jay/Phreakenstein/Solid State
|
|
______________________________________________________________________________
|
|
|
|
Phortune 500: Phreakdom's Newest Organization February 16, 1987
|
|
----------------------------------------------
|
|
For those of you who are in the least bit interested, Phortune 500 is a group
|
|
of telecommunication hobbyists who's goal is to spread information as well as
|
|
further their own knowledge in the world of telecommunications. This new
|
|
group was formed by:
|
|
|
|
Brew Associates/Handsomest One/Lord Lawless/The Renegade Chemist
|
|
Quinton J. Miranda/Striker/The Mad Hacker/The Spiker
|
|
|
|
These eight members are also known as Board Of Directors (BOD). They don't
|
|
claim to be *Elite* in the sense that they are they world's greatest hackers,
|
|
but they ARE somewhat picky about their members. They prefer someone who
|
|
knows a bit about everything and has talents exclusive to him/herself.
|
|
|
|
One of the projects that Phortune 500 has completed is an individual password
|
|
AE type system. It's called TransPhor. It was written and created by Brew
|
|
Associates. It has been Beta tested on The Undergraduate Lounge (Sysoped by
|
|
Quinton J. Miranda). It is due to be released to the public throughout the
|
|
next few months.
|
|
|
|
Phortune 500 has been in operation for about 4 months, and has released two
|
|
newsletters of their own. The Phortune 500 Newsletter is quite like the
|
|
"People" of contemporary magazines. While some magazines cover the deep
|
|
technical aspects of the world in which we communicate, their newsletter tries
|
|
to cover the lighter side while throwing in information that they feel is "of
|
|
technical nature." The third issue is due to be released by the end of this
|
|
month.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
*>=-> The Phortune 500 Membership Questionnaire <-=<*
|
|
|
|
Note: The following information is of a totally confidential nature. The
|
|
reason you may find this so lengthy and in depth is for our knowledge
|
|
of you. We, with Phortune 500, feel as though we should know
|
|
prospective members well before we allow them into our organization.
|
|
Pending the answers you supply us, you will be admitted to Phortune 500
|
|
as a charter member. Please answer the following completely...
|
|
..............................................................................
|
|
|
|
Handle :
|
|
First Name :
|
|
Voice Phone Number :
|
|
Data Phone Number :
|
|
City & State :
|
|
Age :
|
|
Occupation (If Applicable) :
|
|
Place of Employment (Optional) :
|
|
Work Phone Number (Optional) :
|
|
Computer Type :
|
|
Modem Type :
|
|
Interests :
|
|
Areas Of Expertise :
|
|
References (No More Than Three) :
|
|
Major Accomplishments (If Any) :
|
|
..............................................................................
|
|
Answer In 50 Words Or Less;
|
|
|
|
^*^ What Is Phortune 500 in Your Opinion?
|
|
|
|
^*^ Why Do You Want To Be Involved With Phortune 500?
|
|
|
|
^*^ How Can You Contribute to Phortune 500?
|
|
..............................................................................
|
|
|
|
Please answer each question to the best of your ability and then return to any
|
|
Phortune 500 Board of Directors Member Or a Phortune 500 BBS:
|
|
|
|
The Private Connection (Limited Membership) 219-322-7266
|
|
The Undergraduate AE (Private Files Only) 602-990-1573
|
|
|
|
Information provided by
|
|
|
|
Quinton J. Miranda & Phortune 500 Board Of Directors
|
|
______________________________________________________________________________
|
|
|
|
PWN Quicknote
|
|
-------------
|
|
At the University of Rhode Island there is supposed to be some undercover
|
|
agent for Bay Bell. Supposedly he hangs out at the library and watches for
|
|
people checking out the Bell Technical Journals. Then he asks questions like,
|
|
'What do you want those for?' 'Do you know what 2600Hz is?' and other similar
|
|
questions. He isn't registered at the school and of course has no classes.
|
|
[Sounds bogus to me...oh well-KL]. Information by Asmodeus Rex (1/21/87)
|
|
______________________________________________________________________________
|
|
|