1290 lines
69 KiB
Plaintext
1290 lines
69 KiB
Plaintext
@@@@@@@@@@ xxxxxxxxxxxxxxxxxxxxxxxxx
|
||
@@@@@@@@@@ xxxxxxxxxxxxxxxxxxxxxxxx
|
||
$$$$$$@@@@@@@@@@$$$$$$$ xxxxxx
|
||
$$$$$$$$$@@@@@@@@@@$$$$$$$$$ xxxxxx
|
||
$$$$$$$$$$$@@@@@@@@@@$$$$$$$$$$$$$ xxxxxxxxxxxxxxxxxxxxxxxx
|
||
$$$$$$$$$$ @@@@@@@@@@ $$$$$$$$$$$$ xxxxxxxxxxxxxxxxxxxxxxxxx
|
||
$$$$$$$$$$$$ @@@@@@@@@@ $$$$$$$$$$$$ FROM NEW YORK STATE, U. S. A.
|
||
$$$$$$$$$$$$$$ @@@@@@@@@@ $$$$$$$$$$$$ - July, 1993 -
|
||
$$$$$$$$$$$$$$$$@@@@@@@@@@ xxxxxxxxxxxxxx
|
||
$$$$$$$$$$$$$@@@@@@@@@@$ SCAM! MAGAZINE xxxxxxxxxxxxxxxxxxxx
|
||
$$$$$$$$$$@@@@@@@@@@$$$$$$ VOL 1 * NO 2 xxxxxxxx xxxxxxx
|
||
$$$$$$@@@@@@@@@@$$$$$$$$ xxxxxxxxxxxxxxxxxxxxxxxxxx
|
||
$$$$@@@@@@@@@@$$$$$$$$$$ xxxxxxxxxxxxxxxxxxxxxxxxxx
|
||
@@@@@@@@@@ $$$$$$$$$$ xxxxxxxx xxxxxxx
|
||
$$$$$$$$$$$ @@@@@@@@@@ $$$$$$$$$$$ xxxxxxxx xxxxxxx
|
||
$$$$$$$$$$$ @@@@@@@@@@ $$$$$$$$$$$ YOUR TRUE ON-LINE SCAM SOURCE!
|
||
$$$$$$$$$$$$ @@@@@@@@@@ $$$$$$$$$$$ xxxxxxxx xxxxxxxxx
|
||
$$$$$$$$$$$$$@@@@@@@@@@$$$$$$$$$$$$ xxxxxxxxx xxxxxxxxxx
|
||
$$$$$$$$$$@@@@@@@@@@$$$$$$$$$ xxxxxxxxxx xxxxxxxxxxx
|
||
$$$$$@@@@@@@@@@$$$$$$ SCAM! is xxxxxxxxxxx xxxxxxxxxxxx
|
||
@@@@@@@@@@ published by xxxxxxxx xxxxxxxx xxxxxxx
|
||
@@@@@@@@@@ THE PRODUCER xxxxxxxx xxxxxx xxxxxxx
|
||
----------------------------------------------------------------------------
|
||
VOL 1 NO 2 SCAM! MAGAZINE July 1993 FREE ONLINE!
|
||
----------------------------------------------------------------------------
|
||
|
||
LEGALITIES AND DISCLAIMER
|
||
|
||
"SCAM!" MAGAZINE is published solely for informational and entertainment
|
||
purposes. The publishers and authors in no way wish to encourage or promote
|
||
unlawful and/or criminal activities of any nature or sort, but merely wish to
|
||
furnish the materials contained herein in accordance with the practices and
|
||
policies established by the IIRG and pursuant to the Freedom of Information
|
||
Act. Local, State and Federal laws provide severe civil and criminal
|
||
penalties for unlawful and/or criminal activity which may include fines and/
|
||
or imprisonment. The publisher and authors absolve themselves from any and
|
||
all actions, direct or indirect, consequential or inconsequential, resulting
|
||
from the readers of this publication. The publisher and authors are not and
|
||
at no time have been affiliated in any manner with any law enforcement agency
|
||
in any State or Territory of the United States of America. This magazine and
|
||
its contents may be reproduced and uploaded without the permission of the
|
||
publisher and authors, but may not be modified in any manner. The publisher
|
||
and authors assume no responsibility or liability for such unauthorized
|
||
modifications, and shall seek appropriate restitution. SEE, READ AND
|
||
UNDERSTAND ANY AND ALL WARNINGS CONTAINED HEREIN. THIS MAGAZINE IS AVAILABLE
|
||
FOR AND ONLY TO BE READ BY PERSONS OVER THE AGE OF 18 YEARS.
|
||
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
|
||
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
|
||
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
|
||
|
||
ARTICLES IN THIS ISSUE
|
||
|
||
1. Transferring Sensitive Materials BBS-to-BBS Without Liability
|
||
by The Producer
|
||
|
||
2. CBI Social Security Guide
|
||
by CBI (who else!)
|
||
reprinted without permission by The Producer
|
||
|
||
3. The Social Security Number
|
||
by Barbara Bennett (whoever the hell she is)
|
||
reprinted without permission by The Producer
|
||
|
||
4. Using Daniel J. Karnes' "Credit Card Verifier"
|
||
article by The Producer
|
||
executable program by Daniel J. Karnes
|
||
[COMPLETE EXECUTABLE PROGRAM ANNEXED!]
|
||
|
||
5. The Right to Privacy
|
||
by The Producer
|
||
|
||
6. Police Interrogation Techniques
|
||
by ???
|
||
|
||
7. "SCAM!" CLASSIFIED ADS
|
||
|
||
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
|
||
SCAM!
|
||
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
|
||
|
||
EDITOR'S NOTE: Just before getting this edition ready for press, THE
|
||
PRODUCER received a particular phone call which, for reasons that cannot now
|
||
be disclosed, has essentially required omitting the article which originally
|
||
was scheduled to appear as No. 6 in this issue; "Police Interrogation
|
||
Techniques", not scheduled to appear yet, will now be No. 6. Hopefully the
|
||
original No. 6 article will appear in some later issue, however it can't now.
|
||
Such is life in the democratic paradise we live in.
|
||
_____________________________________________________________________________
|
||
|
||
|
||
"TRANSFERRING SENSITIVE MATERIALS BBS-TO-BBS WITHOUT LIABILITY"
|
||
by The Producer
|
||
|
||
July, 1993. -- Hey, dudes, it's July! ... the '4th, fireworks,
|
||
beaches, naked women, etc. ENJOY! Meanwhile, here's what I hope is a great
|
||
new idea on how to get certain files where you want them when you want them,
|
||
without stepping on anyone's toes. Permit me to elaborate, will you? ...
|
||
|
||
Let's say you just hacked a valid account number and password code on
|
||
a particular system, and want to trade it for something your confidant in
|
||
Seattle has available. What are your choices? (1) hop the earliest flight to
|
||
Seattle, meet him and exchange the info (cost: about $750; with coffee and
|
||
donuts at the airport, add $50); OR, (2) use the "SCAM!" in this article --
|
||
it's SURE to work every time!! Here's how it goes:
|
||
|
||
|
||
Encrypting the Sensitive Data
|
||
|
||
Say your "meeting place", or favorite "e-mail" sending-and-receiving
|
||
zone, is a BBS that won't permit stuff like passwords, codes, etc. to be posted
|
||
or uploaded -- yet, you have to get the exchange made! So what to do? First,
|
||
place the data in a file of your choice, and then "zip" the file USING PKZIP
|
||
ENCRYPTION. Here is an example of how to zip all the files in your directory
|
||
c:\work into an encrypted zip file called "TEST.ZIP":
|
||
|
||
pkzip -s test.zip c:\work\*.*
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
Personally, I always prefer to also use PKZip's
|
||
"extra compression" feature. Simply put, it takes
|
||
just a BIT longer, but produces a zip file that is
|
||
CONSIDERABLY smaller. To make a regular, unencrypted
|
||
(traditional) zip file, you would use the command:
|
||
|
||
pkzip -ex test.zip c:\work\*.*
|
||
|
||
Now to make an ENCRYPTED file with extra compression,
|
||
just add the "s", as follows:
|
||
|
||
pkzip -exs test.zip c:\work\*.*
|
||
|
||
You don't HAVE to use the extra compression feature,
|
||
but it's there for the taking and it CERTAINLY would
|
||
be appreciated by those who download your file. (By
|
||
the way, you unzip regular and extra-compressed zip
|
||
files in precisely the same manner.)
|
||
|
||
|
||
Sysops on "fine-line" BBS's, which do not permit posting of passwords
|
||
and/or codes, will blatantly not allow unencrypted zip files containing such
|
||
data to be uploaded and, as it IS their board, their requests must be
|
||
respected. Clearly these Sysops do not wish to become entangled with the law
|
||
and, simply put, they would be indirectly liable for having such files uploaded
|
||
and available for download on their BBS. However, here is the whole catch:
|
||
were an ENCRYPTED zip file to be uploaded, would the Sysop be responsible for
|
||
knowing its contents? NO WAY!
|
||
|
||
|
||
Get Sysop's Permission!
|
||
|
||
Be sure to get on a PRIVATE chat with the Sysop and tell him what you
|
||
plan on doing; it's not nice to do it without asking permission first, plus
|
||
chances are you won't be able to get any further without his permission anyway.
|
||
The Sysop will generally allow you to upload encrypted files because, as said
|
||
above, he is not legally liable for the contents. Additionally, it is
|
||
IMPOSSIBLE to decipher the contents of an encrypted zip file without knowing
|
||
the "key" (more on that later, be patient!) Since the Sysop will NOT have the
|
||
key (just the file), he would have no way of knowing what the contents of the
|
||
encrypted zip file was; thus, he is legally AND morally FREE AND CLEAR. But,
|
||
again ... you must STILL get his permission first. So, do so.
|
||
|
||
Once you have obtained the Sysop's consent, upload the encrypted file
|
||
onto his BBS. You're half-way home since the data is now available for modem
|
||
download, even if it is in encrypted form. Now, all that's left is figuring
|
||
out how only YOU and YOUR SEATTLE FRIEND can decrypt that file, without ANYONE
|
||
else being able to. Relax, that's a piece of cake, my fellow "SCAM!"mers ...
|
||
|
||
|
||
Making the Key
|
||
|
||
When you encrypt the file using the command line set forth above, the
|
||
PKZip program will prompt you for a key ("Password"). This key can be anything
|
||
you want it to be; any combination of letters, numbers, symbols, etc. Note
|
||
that the key IS case sensitive; thus, 161abb and 161aBb are NOT the same keys.
|
||
When encrypting a file using PKZIP encryption techniques, I strongly suggest
|
||
using ONLY keys that are TEN CHARACTERS LONG, composed of one or more of a
|
||
combination of any of the following:
|
||
|
||
abcdefghijklmnopqrstuvwxyz
|
||
ABCDEFGHIJKLMNOPQRSTUVWXYZ
|
||
1234567890!@#$%^&*()-+=\/?<>.,:;"[]{}
|
||
|
||
Such encryption is HACK-PROOF. Decrypting a PKZIP file with a case-sensitive,
|
||
10-character encryption key of the type set forth above, where the key is not
|
||
known, would require over 2,000,000 CENTURIES on a 486 (this estimate was given
|
||
by PKWare, the makers of PKZIP, so I really don't think you have much to worry
|
||
about!) Note that the fewer characters in your key, the less time it will take
|
||
for the key to be hacked; so, use TEN-CHARACTER KEYS! Note also that you MAY
|
||
use keys that contain ANSI symbols not found on the ordinary keyboard, but WHY
|
||
DO THIS? It's generally a pain in the ass, and it is MUCH easier to unlock
|
||
encrypted files when keys are composed of the traditional choices set forth
|
||
above. Again, with TEN-CHARACTER KEYS, do NOT worry about anyone hacking it;
|
||
it WON'T HAPPEN!
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
Please do NOT use keys that form words; e.g. the key
|
||
"UNZIP123" is TERRIBLE to use; rather, the key 5tY@@pxA\
|
||
would be EXCELLENT!
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
Keep a hidden written copy of the key for yourself
|
||
because, if you lose it, believe me you'll NEVER gain access
|
||
to the file again for as long as you live ... and neither
|
||
will your great-grandchildren!
|
||
|
||
|
||
Depositing the Key
|
||
|
||
Since the only way to decrypt the file is with the key, and since up
|
||
to this point the only one with the key is you, it is now necessary to get this
|
||
key to your friend in Seattle so that he can call the BBS on which you uploaded
|
||
the encrypted file, download the file, and decrypt it with the key. To get the
|
||
key to your friend, do the following:
|
||
|
||
While in chat mode with your friend in Seattle, arbitrarily choose a
|
||
SECOND BBS that both of you call. The beauty here is that this second BBS may
|
||
be a conservative BBS that only has shareware stuff, games, etc. -- a BBS that
|
||
would NEVER be suspected for transmitting illegal data! Be sure that this
|
||
second BBS, however, has a PRIVATE message base. Merely tell your friend in
|
||
Seattle that you will leave him a private message on this second BBS; the only
|
||
thing is, the message IS the key!!! What could be easier?
|
||
|
||
|
||
Telling the Sysop of the Second BBS
|
||
|
||
It's up to you whether you want to let the Sysop of the second BBS
|
||
know what you're up to. Personally, I would not suggest it. Firstly, Sysops
|
||
of BBS's that have shareware and games generally don't want ANYTHING to do with
|
||
such activities, and would not permit such messages to be posted even if they
|
||
were private messages. Secondly, here is a way to post the "key" message
|
||
without it looking like a key:
|
||
|
||
For example, say the key to the decrypted file was:
|
||
|
||
Idtr2t@tst
|
||
|
||
Instead of posting a private message stating merely "Idtr2t@tst", which would
|
||
really look VERY conspicuous (!!), why not try the following instead:
|
||
|
||
"It's difficult to read 2 things @ the same time."
|
||
|
||
Have you caught on yet? The FIRST letter in each word of the message is a
|
||
character in the key!:
|
||
|
||
"It's difficult to read 2 things @ the same time."
|
||
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ = Idtr2t@tst
|
||
|
||
|
||
Thus, the message LOOKS legit; the Sysop of the second BBS will THINK it's
|
||
legit; but in reality, IT'S THE KEY!! Who would ever dream it?!!
|
||
|
||
|
||
Summary
|
||
|
||
The Sysop of the BBS on which you uploaded the encrypted file will not
|
||
be legally liable for anything because he has no possible way of knowing what
|
||
the contents of the encrypted file could be, because he does not have the key
|
||
to decrypt it. Other people can download the file, but it will be useless to
|
||
them without the key. Hacking the key, if it is 10 characters long, is futile.
|
||
|
||
The Sysop of the second BBS, on which the key is posted in a private
|
||
message base, will not be legally liable for anything because the key itself,
|
||
even if written directly, has no meaning. It is clearly not unlawful for
|
||
anyone to post any combination of characters, lacking meaning, onto a message
|
||
base. Especially if the message were to be transferred into a simple sentence,
|
||
as in the technique described above, the Sysop would suffer no legal
|
||
consequence.
|
||
|
||
Thus you have now seen the procedure for transferring sensitive data
|
||
from your modem to another's modem, without permitting anyone else to access
|
||
the file.
|
||
|
||
*** SCAM! SUGGESTION ***
|
||
|
||
This technique works great when transferring
|
||
registered software, too. Use the exact same
|
||
methodology described above; however, instead of the
|
||
encrypted zip file containing passwords, codes or
|
||
other data, it will actually contain an encrypted
|
||
version of the program.
|
||
|
||
*** SCAM! SUGGESTION ***
|
||
|
||
For ARJ die-hards, it IS possible to use this
|
||
same methodology using ARJ encryption (it's "G" on
|
||
the command line for "<G>arble With Password").
|
||
However, note that I have no stats on how long it
|
||
takes to hack an ARJ key and so, if you really
|
||
want to use ARJ instead of ZIP, you're on your own!
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
|
||
"CBI SOCIAL SECURITY GUIDE"
|
||
by CBI and The Producer
|
||
|
||
July, 1993. -- CBI, as you probably know, is one of the country's
|
||
largest credit reporting bureaus with nationwide dial-in capability just like
|
||
TRW, Trans Union, etc. Providing the name, address, date of birth etc. is
|
||
generally sufficient to get information on the individual's credit history.
|
||
Many articles have been published regarding techniques to obtain accounts and
|
||
passwords to this system, and I will not comment on their validity here.
|
||
However, this article will merely focus on something called "DTEC", which I
|
||
believe most readers are not aware of.
|
||
|
||
"DTEC" is an extremely powerful social security number search tool
|
||
which resides on CBI systems. When properly accessed, it can provide a wealth
|
||
of information on any individual solely based upon his or her social security
|
||
number alone. The number is merely entered, and the information is spewed out.
|
||
"DTEC" is only available to those CBI'ers who qualify and subscribe for the
|
||
service. If you are fortunate enough to be able to access CBI -- and I'll
|
||
discuss that next -- you may also gain "DTEC" capability too.
|
||
|
||
|
||
Obtaining a CBI Account from CBI
|
||
|
||
CBI has its New England base located in Connecticut. If you call
|
||
about obtaining an account from them, you will be happy to learn that the
|
||
charge is minimal (about $50 per month); however, there are two catches:
|
||
|
||
|
||
First, you must have a legitimate reason for running credit reports.
|
||
This is easily solved: just tell them you are a mortgage broker and, if they
|
||
ask for a copy of your license, do the following: (1) go to some real mortgage
|
||
broker's office, say you're interested in a loan and ask for a copy of their
|
||
license; then (2) go to your nearest copy store, use the necessary White-Out
|
||
and do the necessary other things to alter this document to fit your fictitious
|
||
company. CBI will accept a COPY of your broker's license, so don't worry if
|
||
you wind up printing your pseudo-license on regular 8 1/2 x 11, it won't
|
||
matter.
|
||
|
||
As I said, this first part is easily solved. However, CBI's second
|
||
requirement isn't so easy: they require an ON-SITE INSPECTION of your
|
||
"office"!! Whoa! Many mortgage brokers DO operate out of their home, but of
|
||
course you don't want to give your real name or address EVER! I guess the only
|
||
way to get around this is to use one of those "office-for-a-day" places that
|
||
rent office space, an imitation secretary, etc. This can, of course, be quite
|
||
costly ($100's).
|
||
|
||
*** SCAM! SUGGESTION ***
|
||
|
||
Should you actually wind up seeking a direct account
|
||
from CBI (can't imagine why you'd want to, $-wise), and
|
||
should CBI ask to see an ORIGINAL copy of your mortgage
|
||
broker's license, just tell them your attorney told you
|
||
it's on file with the Secretary of State. They'll buy it.
|
||
|
||
You most likely won't want to get a direct account from CBI and will,
|
||
instead, find yourself perusing amongst the potpourri of offerings on how to
|
||
hack such accounts and passwords. Sorry, my friends, but so it goes.
|
||
|
||
|
||
More on "DTEC"
|
||
|
||
Anyway, once you've obtained an account and password somehow, you will
|
||
want to know how to use "DTEC", which CBI won't tell you about! What I will
|
||
now include are the complete, unedited texts of two (2) actual CBI user guides
|
||
on "DTEC". NOTE: These guides were designed for CBI users in South Florida,
|
||
however the principles are just as applicable here up north. As to references
|
||
to "Dade" and "Broward" within the text, Dade and Broward are county names in
|
||
South Florida; for example, Miami is in Dade County and Ft. Lauderdale is in
|
||
Broward, if you didn't know. Now, here are the unedited "DTEC" texts, pieced
|
||
together:
|
||
|
||
DTEC
|
||
|
||
* Sign on as usual
|
||
* After "PROCEED" appears, enter: DTEC-Social Security Number
|
||
|
||
Example: DTEC-123-45-6789
|
||
|
||
* Output appears: either up 4 ID-only multiples
|
||
or a NO RECORD message.
|
||
|
||
EXAMPLES:
|
||
|
||
----------------------------------------------------------------------
|
||
A. DTEC-123-45-6789
|
||
M1 of 2 NM-SMITH,DAN CA-123,MAIN,ST,ATL,GA
|
||
FA-321, N1AM, ST, ATL, GA SS-123-45-6789 AGE 40
|
||
M2 of 2 NM-BRYANT,JIM CA-789,GRAD,ST,MIA,FL
|
||
ES-TIRE MAN, TIRE CO. SS-123-45-6789 AGE 50
|
||
END OF REPORT CBI AND AFFILIATES - 2/2/87
|
||
----------------------------------------------------------------------
|
||
B. DTEC-123-45-6789
|
||
******************************************************************
|
||
IS SOCIAL SECURITY NUMBER A TYPO ERROR? IF NOT SOCIAL SECURITY
|
||
NUMBER OUT OF RANGE
|
||
******************************************************************
|
||
M1 of 1 NM-RANGE,SOCIAL CA-111,NORTH,RD,ATL,GA
|
||
SS-123-45-6789
|
||
END OF REPORT CBI AND AFFILIATES - 2/2/87
|
||
----------------------------------------------------------------------
|
||
C. DTEC-123-45-6789
|
||
******************************************************************
|
||
IS SOCIAL SECURITY NUMBER A TYPO ERROR? IF NOT SOCIAL SECURITY
|
||
NUMBER REPORTED MISUSED
|
||
******************************************************************
|
||
M1 of 1 NM-SOCIAL,DON CA-2355,SINGLE,RD,ATL,GA
|
||
SS-123-45-6789&
|
||
M2 of 2 NM-SOCIAL,ALICE CA-166,PINES,DR,ATL,GA
|
||
SS-123-45-6789&
|
||
M3 of 3 NM-SOCIAL,DON CA-534,VALLEYS,RD,ATL,GA
|
||
SS-123-45-6789&
|
||
END OF REPORT CBI AND AFFILIATES - 2/2/87
|
||
----------------------------------------------------------------------
|
||
MESSAGE MEANING
|
||
|
||
IS SOCIAL SECURITY NUMBER A TYPO Social security number invalid
|
||
ERROR? SOCIAL SECURITY NUMBER because number in question has
|
||
OUT OF RANGE never been issued.
|
||
|
||
IS SOCIAL SECURITY NUMBER A TYPO Social security number invalid
|
||
ERROR? SOCIAL SECURITY NUMBER because it was assigned to a
|
||
NUMBER REPORTED RETIRED person who is now deceased.
|
||
|
||
IS SOCIAL SECURITY NUMBER A TYPO The social security number in
|
||
ERROR? SOCIAL SECURITY NUMBER question has been reported
|
||
REPORTED MISUSED misused.
|
||
----------------------------------------------------------------------
|
||
|
||
DTEC MB 2000 DIRECT OR COUPLER
|
||
|
||
1. HIT THE CREATE BUTTON
|
||
2. HIT "C" FOR CBI
|
||
3. TYPE IN 1 FOR ACCESS CODE - IF YOUR TERMINAL DOES NOT HAVE THIS
|
||
GO ON TO NEXT STEP
|
||
4. TERMINAL WILL RESPOND REPORT TYPE
|
||
5. HIT "X" AND HIT RETURN
|
||
6. TERMINAL WILL RESPOND OTHER INFO-
|
||
|
||
7. TYPE DTEC-000-00-0000 (MAKE SURE TO PUT DASHES IN - DO NOT PUT
|
||
A PERIOD AT THE END OF THE LINE)
|
||
8. HIT RETURN - TERMINAL WILL RESPOND TRANSACTION 2 - IF YOU HAVE
|
||
MORE SOCIAL SECURITY NUMBERS TO RUN - GO AHEAD AND DO SO - IF
|
||
YOU ARE FINISHED
|
||
*9. HIT HELP/QUIT BUTTON - TERMINAL WILL RESPOND ?
|
||
*10. HIT XMIT BUTTON - TERMINAL WILL RESPOND - TRANSMIT ALL REQUESTS
|
||
*11. HIT "N" FOR NO - TERMINAL WILL RESPOND (C)BI (T)RW ETC. ...
|
||
12. HIT "C" FOR CBI - TERMINAL WILL RESPOND WITH USERS INITIALS
|
||
**13. TYPE IN YOUR INITIALS AND HIT RETURN - TERMINAL WILL RESPOND
|
||
TRANSMITTING CBI PHONE NUMBER
|
||
14. TYPE IN PHONE NUMBER FOR CBI 937-0232 OR 739-7600 BROWARD (IF
|
||
YOU ARE USING AN OUTSIDE LINE YOU MAY NEED TO TYPE IN 9D BEFORE
|
||
THE NUMBER)
|
||
15. HIT RETURN
|
||
16. TERMINAL WILL RESPOND CONNECTED AND AUTOMATICALLY SIGN YOU ON AND
|
||
GIVE YOU THE NAME, ADDRESS AND SOCIAL SECURITY NUMBER OF YOUR
|
||
SUBJECT
|
||
**********************************************************************
|
||
*OMIT STEP 9, STEP 10 AND STEP 11 IF YOU HAVE A CBI ONLY MB 2000
|
||
**IF YOU ARE USING A COUPLER AT THIS TIME YOU WILL DIAL CBI - 937-0232
|
||
DADE OR 736-7600 BROWARD PUT PHONE ON THE COUPLER AFTER COMPUTER TONE
|
||
IS HEARD - WHEN GREEN CARRIER LIGHT COMES ON - HIT RETURN ONCE -
|
||
TERMINAL WILL SAY CONNECTED AND AUTOMATICALLY SIGN YOU ON AND GIVE
|
||
YOU THE NAME, ADDRESS AND SOCIAL SECURITY NUMBER OF YOUR SUBJECT.
|
||
|
||
UP TO 4 RECORDS MAY BE DELIVERED. FORMER ADDRESS, EMPLOYMENT AND
|
||
AGE INFORMATION PROVIDED WHEN AVAILABLE.
|
||
|
||
IF NO RECORD FOUND OUTPUT WILL BE:
|
||
51 NO RECORD FOUND
|
||
|
||
|
||
CBI/EQUIFAX
|
||
CONFIDENTIAL
|
||
_____________________________________________________________________________
|
||
|
||
|
||
"THE SOCIAL SECURITY NUMBER"
|
||
by Barbara Bennett and The Producer
|
||
|
||
|
||
July, 1993. -- I have NO idea where the hell I downloaded this one
|
||
from, but it's an EXTREMELY useful text, by some whore named Barbara Bennett,
|
||
which discusses the significance of the Social Security Number. This, as I
|
||
said, is VERY useful information to have -- especially when engaging in scams
|
||
which require that you reside, have resided or were born in a particular part
|
||
of the United States. Please refer to this text for all applicable future
|
||
SCAM!s. Her unedited words follow:
|
||
|
||
*
|
||
|
||
"The Social Security Number"
|
||
|
||
SSA has continually emphasized the fact that the SSN identifies a
|
||
particular record only and the Social Security Card indicates the person whose
|
||
record is identified by that number. In no way can the Social Security Card
|
||
identify the bearer. From 1946 to 1972 the legend "Not for Identification" was
|
||
printed on the face of the card. However, many people ignored the message and
|
||
the legend was eventually dropped. The social security number is the most
|
||
widely used and carefully controlled number in the country, which makes it an
|
||
attractive identifier.
|
||
|
||
With the exception of the restrictions imposed on Federal and some
|
||
State and local organizations by the Privacy Act of 1974, organizations
|
||
requiring a unique identifier for purposes of controlling their records are not
|
||
prohibited from using (with the consent of the holder) the SSN. SSA records are
|
||
confidential and knowledge of a person's SSN does not give the user access to
|
||
information in SSA files which is confidential by law.
|
||
|
||
Many commercial enterprises have used the SSN in various promotional
|
||
efforts. These uses are not authorized by SSA, but SSA has no authority to
|
||
prohibit such activities as most are not illegal. Some of these unauthorized
|
||
uses are: SSN contests; skip-tracers; sale or distribution of plastic or metal
|
||
cards; pocketbook numbers (the numbers used on sample social security cards in
|
||
wallets); misleading advertising, commercial enterprises charging fees for SSN
|
||
services; identification of personal property.
|
||
|
||
The Social Security Number (SSN) is composed of 3 parts, XXX-XX-XXXX,
|
||
called the Area, Group, and Serial. For the most part, (there are exceptions),
|
||
the Area is determined by where the individual APPLIED for the SSN (before
|
||
1972) or RESIDED at time of application (after 1972). The areas are assigned as
|
||
follows:
|
||
|
||
/----------------------------------------------------------------------------\
|
||
| 000 unused 387-399 WI 528-529 UT |
|
||
| 001-003 NH 400-407 KY 530 NV |
|
||
| 004-007 ME 408-415 TN 531-539 WA |
|
||
| 008-009 VT 416-424 AL 540-544 OR |
|
||
| 010-034 MA 425-428 MS 545-573 CA |
|
||
| 035-039 RI 429-432 AR 574 AK |
|
||
| 040-049 CT 433-439 LA 575-576 HI |
|
||
| 050-134 NY 440-448 OK 577-579 DC |
|
||
| 135-158 NJ 449-467 TX 580 VI Virgin Islands |
|
||
| 159-211 PA 468-477 MN 581-584 PR Puerto Rico |
|
||
| 212-220 MD 478-485 IA 585 NM |
|
||
| 221-222 DE 486-500 MO 586 PI Pacific Islands* |
|
||
| 223-231 VA 501-502 ND 587-588 MS |
|
||
| 232-236 WV 503-504 SD 589-595 FL |
|
||
| 237-246 NC 505-508 NE 596-599 PR Puerto Rico |
|
||
| 247-251 SC 509-515 KS 600-601 AZ |
|
||
| 252-260 GA 516-517 MT 602-626 CA |
|
||
| 261-267 FL 518-519 ID *Guam, American Samoa, |
|
||
| 268-302 OH 520 WY Northern Mariana Islands, |
|
||
| 303-317 IN 521-524 CO Philippine Islands |
|
||
| 318-361 IL 525 NM |
|
||
| 362-386 MI 526-527 AZ |
|
||
| |
|
||
| 627-699 unassigned, for future use |
|
||
| |
|
||
| 700-728 Railroad workers through 1963, then discontinued |
|
||
| |
|
||
| 729-899 unassigned, for future use |
|
||
| |
|
||
| 900-999 not valid SSNs, but were used for program purposes when State |
|
||
| aid to the aged, blind and disabled was converted to a Federal |
|
||
| program administered by SSA. |
|
||
\----------------------------------------------------------------------------/
|
||
|
||
As the Areas assigned to a locality are exhausted, new areas from the
|
||
pool are assigned. This is why some states have non-contiguous groups of Areas.
|
||
|
||
The Group portion of the SSN has no meaning other than to determine
|
||
whether or not a number has been assigned. SSA publishes a list every month of
|
||
the highest group assigned for each SSN Area. The order of assignment for the
|
||
Groups is: odd numbers under 10, even numbers over 9, even numbers under 9
|
||
except for 00 which is never used, and odd numbers over 10. For example, if the
|
||
highest group assigned for area 999 is 72, then we know that the number 999-04-
|
||
1234 is an invalid number because even Groups under 9 have not yet been
|
||
assigned.
|
||
|
||
The Serial portion of the SSN has no meaning. The Serial is not
|
||
assigned in strictly numerical order. The Serial 0000 is never assigned.
|
||
|
||
Before 1973, Social Security Cards with pre-printed numbers were
|
||
issued to each local SSA office. The numbers were assigned by the local office.
|
||
In 1973, SSN assignment was automated and outstanding stocks of pre-printed
|
||
cards were destroyed. All SSNs are now assigned by computer from headquarters.
|
||
There are rare cases in which the computer system can be forced to accept a
|
||
manual assignment such as a person refusing a number with 666 in it.
|
||
|
||
A pamphlet entitled "The Social Security Number" (Pub. No. 05-10633)
|
||
provides an explanation of the SSN's structure and the method of assigning and
|
||
validating Social Security numbers.
|
||
_____________________________________________________________________________
|
||
|
||
|
||
"USING DANIEL J. KARNES' CREDIT CARD VERIFIER"
|
||
by Daniel J. Karnes and The Producer
|
||
|
||
July, 1993. -- Have you ever had a time when you needed a credit card
|
||
number quickly? Well, my fellow SCAM!mers, there are of course numerous ways
|
||
to get REAL credit card numbers, along with their expiration dates, but I'll
|
||
leave that topic for a future edition of "SCAM!" (sorry, but, as you know, I
|
||
just LOVE leaving these little teasers so you'll download my next issue!)
|
||
|
||
In this article, however, I'm going to discuss something that, for its
|
||
usefulness, it equally important: the method of obtaining credit card numbers
|
||
that an UNSOPHISTICATED user (e.g. a BBS or other organization which either has
|
||
no need or means to verify), will deem as mathematically VALID credit card
|
||
numbers.
|
||
|
||
|
||
The Importance of Numerical Progression
|
||
|
||
Visa, American Express, Discover and MasterCard all have specific
|
||
arrangements of numbers. You seem them in their "groups" of three and four, of
|
||
course, but you probably don't know the significance of the numbers within each
|
||
group. To make life simple, let me just state that the numbers that appear in
|
||
each group -- and the ORDER they appear -- will mathematically define valid
|
||
credit cards. If you knew what numbers were mathematically valid, you would be
|
||
in a more powerful position because, if such a number were to be needed, it
|
||
could be readily and easily supplied without the necessity of enduring the
|
||
procedures of obtaining actual credit card numbers. Take heart: as of today,
|
||
you can do this! Why? The program for doing this has been enclosed, right
|
||
here and right now, with this edition of "SCAM!" and it is available for you,
|
||
my loyal "SCAM!" friends, to use immediately!
|
||
|
||
|
||
Daniel J. Karnes' Credit Card Verifier
|
||
|
||
If you downloaded this edition of "SCAM!" properly, you have already
|
||
seen an additional file in SCAM2.ZIP called VC.EXE. This is a very small and
|
||
very handy little program by a man named Daniel J. Karnes who, for the life of
|
||
me, I have no idea who he is. Anyway, my fellow SCAM!mers, this little gem can
|
||
be of great value to you.
|
||
|
||
Using this utility is as easy as jerking off to a photo of Cindy
|
||
Crawford ... First, just move the file into the directory where you want the
|
||
program to reside. There's no self-extracting garbage, no nothing; the only
|
||
file in the program is VC.EXE, nothing more. It's so small, it'll take up NO
|
||
space really, and it's well worth having. Simply type VC at the prompt, then
|
||
RETURN. The utility will prompt you to enter a credit card number. Do so.
|
||
Then, hit RETURN. The program will then tell you whether the number you
|
||
entered is a mathematically valid Visa, American Express, Discover or
|
||
MasterCard number. If the number you entered is mathematically incorrect for
|
||
any of these four types of cards, the program will also tell you so.
|
||
|
||
Have you figured out the value of this yet? Here's a scenario:
|
||
|
||
You need a credit card number for some local BBS that wants to have it
|
||
for their records. But, if you just give them an arbitrary number, their
|
||
computer might have a program to recognize that it's "a fake, a phony and a
|
||
fraud" (quoting one of my favorite radio personalities, WABC's Bob Grant!) So,
|
||
merely play with this utility by entering different credit card numbers until
|
||
you hit. Then, when you get a valid number, write it down and start all over
|
||
again. Eventually you will get hundreds of valid credit card numbers of all
|
||
types; keep these altogether on one sheet of paper and, if the need ever arises
|
||
for you to furnish a credit card number, you've got one! What could be easier?
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
You'll have an easier time of getting valid credit
|
||
card numbers on this utility if you enter variations of
|
||
known real credit card numbers. For example:
|
||
|
||
Suppose you wanted to try to get a valid VISA
|
||
number. You open your wallet, take out your VISA card,
|
||
and note that it's number is 4408 9104 0001 1234. So,
|
||
in the utility you might want to try 4408 9205 0001 1237
|
||
-- a slight variation on a known REAL number. This way,
|
||
your likelihood of achieving success is GREATLY increased*.
|
||
|
||
(*Yes, those #'s were just EXAMPLES!!)
|
||
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
It is unknown to the author whether you need to
|
||
put spaces in between when entering a credit card number
|
||
on this utility. I can only tell you that I have always
|
||
put spaces in, and it works. So, put spaces in!
|
||
|
||
The author has personally tried this utility many times with known
|
||
credit card numbers and, surprisingly enough, it works every time! Similarly,
|
||
it knows when bogus numbers are entered. So fear not ... if this program can
|
||
deem your credit card number valid, then so will the user's program.
|
||
|
||
|
||
*** "SCAM!" WARNING: ***
|
||
|
||
DON'T rely on this program as a substitute for
|
||
REAL credit card numbers! There are times when you
|
||
must absolutely need to enter a real, actual credit
|
||
card number. If you're presented with such an occasion,
|
||
this program will NOT suffice! If you don't know when
|
||
you need actual credit card numbers and when numbers
|
||
supplied by this program will suffice, then BE PATIENT
|
||
and wait for an upcoming edition of "SCAM!" to tell
|
||
you when to use what!
|
||
|
||
A final note on this: You can get the mathematically correct credit
|
||
card numbers using this utility, as I said above. But what about expiration
|
||
dates? Simple: Just choose a month and year at random, and you're set!
|
||
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
When choosing an expiration date, choose one
|
||
that's about 18 to 22 months from now. Why? Most
|
||
credit cards have maximum terms of TWO YEARS. If
|
||
you choose an expiration over 24 months, it will
|
||
look suspicious and may not even be accepted. If
|
||
you choose an expiration of, say 1 month, you may
|
||
be faced with the possibility of re-entering your
|
||
credit card number and supplying a new expiration
|
||
date when that month is up. When the month is up,
|
||
you may very well have forgotten the credit card
|
||
number or expiration date you supplied! Wouldn't
|
||
that be a shame??!!! So, if you choose an expiration
|
||
of 18, 19 months, etc. (but NOT more than 24!), you
|
||
know you'll have the freedom of usage of that number
|
||
for at least that period of time.
|
||
_____________________________________________________________________________
|
||
|
||
|
||
|
||
"THE RIGHT TO PRIVACY"
|
||
by The Producer
|
||
|
||
July, 1993. -- I intend to demonstrate the absolute continuing need
|
||
for a new callers' right to privacy, and how this privilege is being taken
|
||
away.
|
||
|
||
|
||
Newuser Guidelines on "Mr.X"'s BBS
|
||
|
||
Upon recently logging on as a newuser on the BBS of "Mr. X", as I'll
|
||
call him here, I was confronted with the usual stuff about the terms and
|
||
conditions of the BBS, etc. Then, I was asked to give my name, address and
|
||
telephone number --to which I responded "CONFIDENTIAL". Then, I was brought to
|
||
the "questionnaire" area, where I was asked the usual droll fare like, "What is
|
||
'2600'?", "What does IIRG stand for?", "Do you phreak?", etc. The appropriate
|
||
responses were supplied. Finally, I was brought into the message area to
|
||
leave a message to the Sysop stating specifically why I want access.
|
||
Subsequently, I was told that if after 24 hours I call back and find that my
|
||
handle is not recognized, "Don't call back again" (how rude!) The BBS states
|
||
that the message must meet with the satisfaction of "Mr. X", and I presumed
|
||
this was to weed out nerds and Secret Service agents. Quite understandable, I
|
||
thought ... and so I proceeded to leave my message.
|
||
|
||
|
||
Privacy Invasion Attempted from Response to Message
|
||
|
||
[Excerpt of THE PRODUCER's original message to obtain access]:
|
||
|
||
THE PRODUCER: "You guys protect yourselves by using handles only and
|
||
keeping your numbers private because of the fine-line of what you have online;
|
||
I also wish to remain private, to protect myself just in case. If I'm
|
||
paranoid, sorry, but as I said, I'm new. I can't learn anything unless others
|
||
help me."
|
||
|
||
[Excerpt of "MR. X"'s response]:
|
||
|
||
"MR. X": "Well, we all go by handles and such, but, we still need
|
||
real info. Why? Otherwise our records get all cluttered. You won't see any
|
||
of us using this info at all. But, it is very essential. Everything here IS
|
||
legal, so there is NOTHING to worry about. Nevertheless, we do require
|
||
things such as this. So, before you can be granted access, you will need to
|
||
give us [your] real name, address, city/state, zip, and phone number. If you
|
||
don't wish to do this, please tell me so I can delete your account."
|
||
|
||
*
|
||
|
||
|
||
Gimme a break! Do you really believe he wants my real name, etc. just
|
||
to make sure his "records" don't get "cluttered"? Come on, jack!
|
||
|
||
Phellow readers, take note that in my opening message I told this
|
||
gentleman about "SCAM!" and, if he had any questions about The Producer's
|
||
intentions or integrity, suggested he call The Rune Stone BBS, download
|
||
SCAM1.ZIP, and see what I'm all about. I even offered to regularly download
|
||
the latest issues of "SCAM!" on HIS board, too! But this was The Producer's
|
||
reward for courtesy and generousity, my friends.
|
||
|
||
Well, you know I just had to call back and leave a reply ...
|
||
|
||
[Excerpt of reply]:
|
||
|
||
THE PRODUCER: "As to anonymity, I take offense at someone who INSISTS
|
||
that I reveal my true name, address and phone number -- from which you very
|
||
well know you could learn everything else about me -- when you yourself
|
||
BLATANTLY refuse to reveal who you are and where you are. For all I know, your
|
||
BBS's number could be call-forwarded to Peru! If everything is SO legal and
|
||
there's NOTHING to worry about, as you say, then WHY DON'T YOU COME FORWARD
|
||
FIRST??!"
|
||
|
||
Not bad, if I do say so myself! What do you think? I was unimpressed
|
||
by the tiresome reiterations of how "legal" the BBS is; my feeling is, alright,
|
||
you said it once and I got the message, you're legit, OK. Sure. But, another
|
||
very important point is this: For what purpose should one's identity,
|
||
especially on a "fine-line" BBS of this type, be revealed?
|
||
|
||
|
||
Pitfalls of Revealing True Identity
|
||
|
||
Clearly, "Mr. X" wishes to have the one-way power; however, The
|
||
Producer stands firm and refuses to yield. My suggestion to fellow readers is
|
||
to steadfastly do the same. Think about it -- we have no idea who these Sysops
|
||
are. For all we know, they could be 12-year-olds who havn't a clue what
|
||
they're getting themselves into. Would you want to have your name, address,
|
||
phone number, etc. amongst a group of others and written on a list somewhere
|
||
that was taken as part of an undercover RAID some acne-faced teenager
|
||
inadvertently got himself targeted for? I WOULDN'T! Privacy in the U. S. is a
|
||
RIGHT, not a privilege. Granted, it's being slowly taken away from us by the
|
||
government, but let's at least try to keep what little we have left, without
|
||
letting unknown Sysops take it away!
|
||
|
||
|
||
Weeding Out The Undercover Guys
|
||
|
||
Something else to remember here: it seems this man was either really
|
||
on a power trip, in a really cruddy mood, or was otherwise suspect of The
|
||
Producer. Let's clearly, unquestionably, unequivocally, fully and completely
|
||
eliminate the latter: The Producer is not a member of ANY law enforcement
|
||
agency, and never was! Do you get the gist? Do you know what that means, and
|
||
what it implies? Simple (and remember this, in case you don't know): If
|
||
anyone, anywhere at anytime is a member of any law enforcement agency of any
|
||
kind, and if this person is operating in an "undercover" fashion, he or she
|
||
MUST, when asked, confirm the fact that he or she is a member of a law
|
||
enforcement agency. If a policeman or Secret Service man were to deny his
|
||
involvement, that's called "entrapment". It doesn't matter if you're charged
|
||
with jaywalking or murder, the fact remains that if you were entrapped in any
|
||
way, shape or form, you will NEVER be convicted; this is why law enforcement
|
||
personnel MUST reveal their true selves when asked. Thus, The Producer cannot
|
||
understand why, if the simple question is asked and answered "No", should this
|
||
not be sufficient to gain access onto "Mr. X"'s BBS, or any other BBS for that
|
||
matter?
|
||
|
||
Why should a person's real name be required? Everyone knows what the
|
||
Sysop is looking for -- unwanted outsiders. The Producer says: Weed them out
|
||
with the simple question, "Are you now or have you ever been a member of any
|
||
law enforcement agency in any State or Territory of The United States of
|
||
America?" If they answer "No", then, as Paul McCartney & Wings said (I think
|
||
around 1976?), "LET HIM IN, OH YEAH!"
|
||
|
||
|
||
What Can We Do?
|
||
|
||
I respectfully suggest the following to all "SCAM!" readers: if you
|
||
find yourself logging on to a "fine-line" BBS, and if this BBS requires
|
||
verifiable personal ID as discussed above, simply disconnect and don't call
|
||
again! True, you might be missing out on some files, but you might also be
|
||
saving yourself from some unnecessary detention at the local police station
|
||
(and remember, even if the police let you go, once your name is on record it's
|
||
ALWAYS on record -- REGARDLESS of what they tell you!) Don't just say, "Oh
|
||
yeah, sure," and take this helpful tip lightly! -- ONLY logon to BBS's with
|
||
your handle and NOTHING more, and reveal NO verifiable personals about yourself
|
||
or your whereabouts. If everyone with a modem were to follow these rules, you
|
||
can be certain that no BBS in America would ever again require real names and
|
||
addresses -- or else they'd find themselves with no callers! So, let's start a
|
||
trend!
|
||
|
||
|
||
Epilogue
|
||
|
||
One final note to this: The Producer wishes to make NO unnecessary
|
||
enemies in the BBS world. "Mr. X" gave his opinion and, right or wrong, it's
|
||
his board and he's entitled to it ... that's a principle our country was
|
||
founded on, which too many of us seem to be forgetting nowadays. This article
|
||
was written not to dissuade future callers to "Mr. X"'s BBS, which may very
|
||
well contain valuable files. It is merely offered as an illustration of the
|
||
need for continued privacy for all -- both Sysops AND callers. And may I also
|
||
note that the ad for his BBS, which is downloadable, is quite cool!
|
||
|
||
And for those of you who are probably saying, "The Producer accused
|
||
"Mr. X" of being on a power trip, but The Producer has used the power of his
|
||
OWN magazine, "SCAM!", to publish this article AGAINST "Mr. X"! Doesn't that
|
||
put The Producer on a power trip, too?"
|
||
|
||
To this I respond, well, maybe, but hell ... what the fuck!
|
||
|
||
______________________________________________________________________________
|
||
|
||
|
||
"POLICE INTERROGATION TECHNIQUES"
|
||
by ???
|
||
|
||
July, 1993. -- EDITOR'S NOTE: This article was obtained by an
|
||
anonymous donor and represents some of the tools used by the police in
|
||
obtaining statements of confession during interrogation. Upon information and
|
||
belief, the materials contained in this article are fully accurate as of the
|
||
date of this publication. My thanx to the donor for his contrib'! The
|
||
unedited text follows:
|
||
|
||
*
|
||
|
||
Why Suspects Confess
|
||
|
||
Many criminal cases, even when investigated by the most experienced
|
||
and best qualified investigators, are ultimately solved by an admission or
|
||
confession from the person responsible for committing the crime. Oftentimes,
|
||
investigators are able to secure only a minimal amount of evidence, be it
|
||
physical or circumstantial, that points directly to a suspect, and in many
|
||
instances, this evidence is not considered strong enough by prosecutors to
|
||
obtain a conviction. In such cases, the interrogation of the suspects and
|
||
their subsequent confessions are of prime importance.
|
||
|
||
This article addresses the question of why suspects speak freely to
|
||
investigators, and ultimately, sign full confessions. The physical and
|
||
psychological aspects of confession and how they relate to successful
|
||
interrogations of suspects are also discussed, as is the "breakthrough," the
|
||
point in the interrogation when suspects make an admission, no matter how
|
||
minuscule, that begins the process of obtaining a full confession.
|
||
|
||
|
||
Defining "Interrogation"
|
||
|
||
Interrogation is the questioning of a person suspected of having
|
||
committed a crime. It is designed to match acquired information to a
|
||
particular suspect in order to secure a confession. The goals of interrogation
|
||
include:
|
||
|
||
* To learn the truth of the crime and how it happened
|
||
* To obtain an admission of guilt from the suspect
|
||
* To obtain all the facts to determine the method of operation and
|
||
the circumstances of the crime in question
|
||
* To gather information that enables investigators to arrive at
|
||
logical conclusions
|
||
* To provide information for use by the prosecutor in possible court
|
||
action.
|
||
|
||
Knowing the definition and objectives of the interrogation, the
|
||
question then asked is, "Why do suspects confess?" Self-condemnation and self-
|
||
destruction are not normal human behavioral characteristics. Human beings
|
||
ordinarily do not utter unsolicited, spontaneous confessions. It is logical to
|
||
conclude, therefore, that when suspects are taken to police stations to be
|
||
questioned concerning their involvement in a particular crime, their immediate
|
||
reaction will be a refusal to answer any questions. With the deluge of
|
||
television programs that present a clear picture of the Miranda warning and its
|
||
application to suspects, one would conclude that no one questioned about a
|
||
crime would surrender incriminating information, much less supply investigators
|
||
with a signed, full confession. It would also seem that once suspects sense
|
||
the direction in which the investigators are heading, the conversation would
|
||
immediately end. However, for various psychological reasons, suspects continue
|
||
to speak with investigators.
|
||
|
||
|
||
Suspect Paranoia
|
||
|
||
Suspects are never quite sure of exactly what information
|
||
investigators possess. They know that the police are investigating the crime,
|
||
and in all likelihood, suspects have followed media accounts of their crimes to
|
||
determine what leads the police have. Uppermost in their minds, however, is
|
||
how to escape detection and obtain firsthand information about the
|
||
investigation and where it is heading.
|
||
|
||
Such "paranoia" motivates suspects to accompany the police voluntarily
|
||
for questioning. Coupled with curiosity, this paranoia motivates suspects to
|
||
appear at police headquarters as "concerned citizens" who have information
|
||
pertinent to the case. By doing this, suspects may attempt to supply false or
|
||
noncorroborative information in order to lead investigators astray, gain inside
|
||
information concerning the case from investigators, and remove suspicion from
|
||
themselves by offering information on the case so investigators will not
|
||
suspect their involvement.
|
||
|
||
For example, in one case, a 22-year-old woman was discovered in a
|
||
stairwell outside of a public building. The woman had been raped and was found
|
||
naked and bludgeoned. Investigators interviewed numerous people during the
|
||
next several days but were unable to identify any suspects. Media coverage on
|
||
the case was extremely high.
|
||
|
||
Several days into the investigation, a 23-year-old man appeared at
|
||
police headquarters with two infants in tow and informed investigators that he
|
||
believed he may have some information regarding the woman's death. The man
|
||
revealed that when he was walking home late one evening, he passed the area
|
||
where the woman was found and observed a "strange individual" lurking near an
|
||
adjacent phone booth. The man said that because he was frightened of the
|
||
stranger, he ran back to his home. After reading the media accounts of the
|
||
girl's death, he believed that he should tell the police what he had observed.
|
||
|
||
The man gave police a physical description of the "stranger" and then
|
||
helped an artist to compose a sketch of the individual. After he left,
|
||
investigators discovered that the sketch bore a strong resemblance to the
|
||
"witness" who provided the information.
|
||
|
||
After further investigation, the witness was asked to return to the
|
||
police station to answer more questions, which he did gladly. Some 15 hours
|
||
into the interrogation, he confessed to one of his "multiple personalities"
|
||
having killed the woman, who was unknown to him, simply because the victim was
|
||
a woman, which is what the suspect had always wanted to be.
|
||
|
||
This case clearly illustrates the need for some suspects to know
|
||
exactly what is happening in an investigation. In their minds, they honestly
|
||
believe that by hiding behind the guise of "trying to help," they will, without
|
||
incriminating themselves, learn more about the case from the investigators.
|
||
|
||
|
||
The Interrogation Setting
|
||
|
||
In any discussion concerning interrogation, it is necessary to include
|
||
a review of the surroundings where a suspect is to be interrogated. Because
|
||
there is a general desire to maintain personal integrity before family members
|
||
and peer groups, suspects should be removed from familiar surroundings and
|
||
taken to a location that has an atmosphere more conducive to cooperativeness
|
||
and truthfulness. The primary psychological factor contributing to successful
|
||
interrogations is privacy -- being totally alone with suspects. This privacy
|
||
prompts suspects to feel willing to unload the burden of guilt. The
|
||
interrogation site should isolate the suspect so that only the interrogator is
|
||
present. The suspect's thoughts and responses should be free from all outside
|
||
distractions or stimuli.
|
||
|
||
The interrogation setting also plays an important part in obtaining
|
||
confessions. The surroundings should reduce suspect fears and contribute to
|
||
the inclination to discuss the crime. Because fear is a direct reinforcement
|
||
for defensive mechanisms (resistance), it is important to erase as many fears
|
||
as possible. Therefore, the interrogation room should establish a business
|
||
atmosphere as opposed to a police-like atmosphere. While drab, barren
|
||
interrogation rooms increase fear in suspects, a location that displays an
|
||
open, you-have-nothing-to fear quality about it can do much to break
|
||
down interrogation defensiveness, thereby eliminating a major barrier. The
|
||
interrogators tend to disarm the suspects psychologically by placing them in
|
||
surroundings that are free from any fear-inducing distractions.
|
||
|
||
|
||
Psychological Factors
|
||
|
||
More than likely, suspects voluntarily accompany investigators, either
|
||
in response to a police request to answer questions or in an attempt to learn
|
||
information about the investigation. Once settled in the interrogation room,
|
||
the interrogators should treat suspects in a civilized manner, no matter how
|
||
vicious or serious the crime might have been. While they may have feelings of
|
||
disgust for the suspects, the goal is to obtain a confession, and it is
|
||
important that personal emotions not be revealed.
|
||
|
||
Investigators should also adopt a compassionate attitude and attempt to
|
||
establish a rapport with suspects. In most cases, suspects commit crimes
|
||
because they believe that it offers the best solution to their needs at the
|
||
moment. Two rules of thumb to remember are: (1) "There but for the grace of
|
||
God go I"; and (2) it is important to establish a common level of understanding
|
||
with the suspects. These rules are critical to persuading suspects to be open,
|
||
forthright, and honest. Suspects should be persuaded to look beyond the
|
||
investigators' badges and see, instead, officers who listen without judging.
|
||
If investigators are able to convince suspects that the key issue is not the
|
||
crime itself, but what motivated them to commit the crime, they will begin to
|
||
rationalize or explain their motivating factors.
|
||
|
||
At this stage of the interrogation, investigators are on the brink of
|
||
having suspects break through remaining defensive barriers to admit involvement
|
||
in the crime. This is the critical stage of the interrogation process known as
|
||
the "breakthrough".
|
||
|
||
|
||
The "Breakthrough"
|
||
|
||
The "breakthrough" is the point in the interrogation when suspects
|
||
make an admission, no matter how small. In spite of having been advised of
|
||
certain protections guaranteed by the Constitution, most suspects feel a need
|
||
to confess. Both hardcore criminals and first-time offenders suffer from the
|
||
same pangs of conscience. This is an indication that their defense mechanisms
|
||
are diminished, and at this point, the investigators may push through to elicit
|
||
the remaining elements of confession.
|
||
|
||
In order for interrogators to pursue a successful breakthrough, they
|
||
must recognize and understand certain background factors that are unique to a
|
||
particular suspect. Many times, criminals exhibit psychological problems that
|
||
are the result of having come from homes torn by conflict and dissension. Also
|
||
frequently found in the backgrounds of criminals are parental rejection and
|
||
inconsistent and severe punishment. It is important that investigators see
|
||
beyond the person sitting before them and realize that past experiences can
|
||
impact on current behavior. Once interrogators realize that the fear of
|
||
possible punishment, coupled with the loss of pride in having to admit to
|
||
committing mistakes, is the basic inhibitor they must overcome in suspects,
|
||
they will quickly be able to formulate questions and analyze responses that
|
||
will break through the inhibitors.
|
||
|
||
|
||
Successful Interrogations
|
||
|
||
Investigators must conduct every interrogation with the belief that
|
||
suspects, when presented with the proper avenue, will use it to confess their
|
||
crimes. Research indicates that most guilty persons who confess are, from the
|
||
outset, looking for the proper opening during the interrogation to communicate
|
||
their guilt to the interrogators.
|
||
|
||
Suspects confess when the internal anxiety caused by their deception
|
||
outweighs their perceptions of the crime's consequences. In most instances,
|
||
suspects have magnified, in their minds, both the severity of the crime and the
|
||
possible repercussions. Interrogators should allay suspect anxiety by putting
|
||
these fears into perspective.
|
||
|
||
Suspects also make admissions or confessions when they believe that
|
||
cooperation is the best course of action. If they are convinced that officers
|
||
are prepared to listen to all of the circumstances surrounding the crimes, they
|
||
will begin to talk. The psychological and physiological pressures that build
|
||
in a person who has committed a crime are best alleviated by communicating.
|
||
In order to relieve these suppressed pressures, suspects explain the
|
||
circumstances of their crimes they confess.
|
||
|
||
And, finally, suspects confess when interrogators are able to
|
||
speculate correctly on why the crimes were committed. Suspects want to know
|
||
ahead of time that interrogators will believe what they have to say and will
|
||
understand what motivated them to commit the crime.
|
||
|
||
|
||
Conclusion
|
||
|
||
It is natural for suspects to want to preserve their privacy, civil
|
||
rights, and liberties. It is also natural for suspects to resist discussing
|
||
their criminal acts. For these very reasons, however, investigators must
|
||
develop the skills that enable them to disarm defensive resistors established
|
||
by suspects during interrogation. Before suspects will confess, they must feel
|
||
comfortable in their surroundings, and they must have confidence in the
|
||
interrogators, who should attempt to gain this confidence by listening intently
|
||
to them and by allowing them to verbalize their accounts of the crimes.
|
||
|
||
Interrogators who understand what motivates suspects to confess will
|
||
be better able to formulate effective questions and analyze suspect responses.
|
||
Obviously, more goes into gaining a confession than is contained in this
|
||
article. However, if the interrogator fails to understand the motivations of
|
||
the suspect, other factors impacting on obtaining the confession will be less
|
||
effective.
|
||
|
||
*
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
qpqpqpqpqpqpqpqpqpqpqpqpqpqpq THE pqpqpqpqpqpqpqpqpqpqpqpqpqpqpq
|
||
*********************************|**********************************
|
||
SCAM!/---/--------///-----////----////---///----////---///---/////--////
|
||
oooo/ @ ooo/ oooo oooo ooo oooo ooo oooo oooo
|
||
@/ @/ @/ /@/ @/ // @/ // @/ @ / @/ @ // / @/ @
|
||
@/ @/ @ooo@/ @oooo/ @oooo/ @/ @oo/ @/ @oooo @/ @
|
||
@ / // @ / // @/ @/ /// @/ /// @/ /@/ @/ /@/ @ / // @//@
|
||
_oooo/ _oooo /_@/ @/ _oooo/ _oooo/ _ooo/ _@/ _ooo/ _oooo _oooo/
|
||
------------------------------------------------------------------ SCAM!
|
||
*********************************|**********************************
|
||
dbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdb
|
||
|
||
"THE RUNE STONE BBS" is open and is available to ALL inquisitive modemers!
|
||
This is an IIRG-oriented, Connecticut-based BBS which features a VERY
|
||
knowledgeable, helpful and friendly Sysop; NO ratios(!); and a WEALTH of
|
||
informational philes to explore. This BBS is also the place to find the
|
||
latest editions of "SCAM!" magazine! Even if you're an out-of-state caller,
|
||
this BBS is well worth the extra dime. So why not call today? The fone
|
||
number is (203) 832-8441. Logon with newuser password "CONSPIRACY", and say
|
||
you heard about 'em from "SCAM!"
|
||
_________________________________________________________________________
|
||
|
||
WANTED: VALID CBI, TRW, EQUIFAX AND TRANS UNION ACCOUNTS, PASSWORDS AND
|
||
|
||
LOGON HELP. If you have enjoyed reading "SCAM!" magazine and have found it
|
||
of any value to you, which hopefully you have, please be advised that NO
|
||
idiotic money contributions are requested. Rather, I seek the above. If
|
||
you have any of the above, or would like to refer a BBS number and newuser
|
||
logon password where the above information can be obtained, please leave a
|
||
PRIVATE message for THE PRODUCER on The Rune Stone BBS (see above). NOTE:
|
||
The Rune Stone BBS is a legitimate BBS and does NOT wish information of
|
||
this type publicly posted. Therefore, please obey the wishes and respect
|
||
the rules of the Sysops on this BBS and do NOT post this info publicly.
|
||
Each message will be treated with the UTMOST in confidentiality and will be
|
||
sincerely appreciated.
|
||
|
||
_________________________________________________________________________
|
||
|
||
ARE YOU SICK AND TIRED OF CALLING "611" to get repair service, only to find
|
||
out that the line is busy or you're being put on hold for about an hour??
|
||
Fret no more ... if you're a New York Telephone customer, try 890-0091. This
|
||
is an UNLISTED New York Telephone trunk number that will automatically connect
|
||
you to the first available operator for repair. The repair centers, by the
|
||
way, are in White Plains and Garden City, and there's another in Queens
|
||
somewhere. You won't find yourself calling back or left on hold again!
|
||
|
||
SIDE NOTE: This number works in MOST area codes serviced
|
||
by New York Telephone, but it might not work in yours. Try
|
||
it anyway, you have nothing to lose!
|
||
|
||
THIS HELPFUL HINT FURNISHED COURTESY OF THE PRODUCER ON "SCAM!" MAGAZINE
|
||
_________________________________________________________________________
|
||
|
||
FOR SALE: VALID SOCIAL SECURITY NUMBERS, together with (1) the name of the
|
||
person the number belongs to; (2) his or her most current address; and (3)
|
||
his or her most current telephone number. HUNDREDS OF NUMBERS AVAILABLE,
|
||
most also including the person's date of birth! Many also include the
|
||
person's current occupation, place of employment AND salary. These numbers,
|
||
which are available for REAL, LIVING persons, can in many cases be tailored to
|
||
your needs for specific age, race and/or nationality. NO MONEY DESIRED FOR
|
||
THIS INFORMATION; USE YOUR BRAIN TO FIGURE OUT WHAT'S WANTED IN RETURN!
|
||
DISCLAIMER: The authors and publishers of this magazine shall act merely as
|
||
liaison to any parties responding to this advertisement, for informational and
|
||
entertainment purposes only. RESPOND, PLEASE, IN THE APPROPRIATE FASHION.
|
||
_________________________________________________________________________
|
||
|
||
FIND OUT INFO ON THAT AMEX CARD! If you know the number of an American Express
|
||
|
||
Card AND the social security number of the cardholder, just dial the following
|
||
number: 1-800-292-2639. A computer-generated program will permit you to find
|
||
out lots of valuable information on the card such as last payment, available
|
||
limits, etc. You do NOT need to know the expiration date of the card! Works
|
||
for greens, golds and platinums. CALL (from a payphone) TODAY!
|
||
|
||
*** SCAM! SUGGESTION ***
|
||
|
||
If the computer attempts to transfer you to a
|
||
live operator, this means some of the information you
|
||
gave them didn't jive. DISCONNECT IMMEDIATELY!
|
||
|
||
*** SCAM! SUGGESTION ***
|
||
|
||
Have more AMEX inquiries? Call 1-800-528-4800
|
||
for a live person ... but know what you're doing!!
|
||
Calls are answered M-F 9:30-5:30 EST.
|
||
_________________________________________________________________________
|
||
|
||
WANTED: VALID WDIA ACCOUNTS, PASSWORDS AND LOGON HELP. WDIA is (or was)
|
||
one of the nation's largest electronic databases that acts (or did act) as
|
||
a gateway to DMV, credit card bureaus and courthouse records nationwide. Its
|
||
function is (or was) to provide private investigators with the necessary tools
|
||
for tracing, tracking, etc. private individuals and/or businesses and, upon
|
||
entering the proper search requests, can offer credit card histories, criminal
|
||
background checks, business investigations etc. nationwide, if not worldwide.
|
||
If you have enjoyed reading "SCAM!" magazine and have found it of any value to
|
||
you, please leave a PRIVATE message for THE PRODUCER on The Rune Stone BBS
|
||
(see above), or furnish a BBS number where the above information can be
|
||
obtained. Again, please respect the rules of The Rune Stone and do NOT post
|
||
public ANY info of this type. Each message will be treated with the UTMOST
|
||
confidentiality and will be sincerely appreciated.
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
For total anonymity, use the PKZIP encryption technique
|
||
described above. Especially when dealing with WDIA, I would
|
||
suggest it.
|
||
_____________________________________________________________________________
|
||
|
||
IF YOU WOULD LIKE TO PLACE A CLASSIFIED AD IN "SCAM!" MAGAZINE: Leave a
|
||
PRIVATE message for THE PRODUCER on The Rune Stone BBS (see above). Your real
|
||
name, address, etc. are NOT needed to place classified ads. You may leave
|
||
your handle, e-mail address and/or BBS message area where others can respond
|
||
to your ad. NO FEE IS REQUIRED! Classified ads MUST conform to the general
|
||
content of "SCAM!" magazine. Classified ads for "conservative" BBS's (e.g.
|
||
BBS's containing shareware programs, games, etc.) will NOT be posted, so
|
||
please don't waste my time! Classified ads containing actual credit card
|
||
numbers, passwords, etc. will NOT be posted, simply because the posting of
|
||
such information would be clearly illegal; however, classified ads that
|
||
contain SOURCES to obtain this information are acceptable and, in fact, are
|
||
encouraged. Classified ads will be posted based upon their content and at the
|
||
sole and exclusive discretion of THE PRODUCER. In your request, please don't
|
||
forget to specifically state that you wish a classified ad, or else your info
|
||
will simply be treated confidentially and I will not know to post it. Please
|
||
help make "SCAM!" magazine grow by submitting your classified ad today!
|
||
_____________________________________________________________________________
|
||
|
||
IF YOU WOULD LIKE YOUR ARTICLE PUBLISHED IN "SCAM!" MAGAZINE: "SCAM!"
|
||
magazine is searching for new "Field Researchers"! If you have something you
|
||
feel is valuable to the readers of "SCAM!" and would like to submit it for
|
||
consideration, please do so! Here's how: Leave a PRIVATE message for THE
|
||
PRODUCER on The Rune Stone BBS (see above). In this message, state the
|
||
following: (1) your handle; (2) a brief (please!) description of your
|
||
offering; (3) about how many pages is it?; (4) a BBS that you belong to, other
|
||
than The Rune Stone BBS; and (5) newuser password and logon info for that
|
||
other BBS. Generally only articles, in ASCII form, will be accepted;
|
||
executable programs, unless VERY useful and VERY small, cannot be considered
|
||
simply due to the forum. Please post your proposed article in ZIP, ARJ or LHA
|
||
on that other BBS (not the Rune Stone!) If your article seems really
|
||
worthwhile, it will be downloaded, reviewed and ultimately published. In your
|
||
request, please don't forget to specifically state that you wish an article
|
||
published, or else your info will simply be treated confidentially and I will
|
||
not know to consider it. Please help make "SCAM!" magazine grow by submitting
|
||
your articles for consideration today!
|
||
|
||
*** "SCAM!" SUGGESTION: ***
|
||
|
||
If you would like to keep your article confidential
|
||
prior to its appearance in "SCAM!", do the following: Place
|
||
the article in "ZIP" form on the other BBS, but add PKZIP
|
||
encryption to the file. In your private message, leave the
|
||
key. That way, no one else can read the article.
|
||
_____________________________________________________________________________
|
||
|
||
EDITORIALS AND SUGGESTION BOX. All articles in "SCAM!" magazine are subject to
|
||
EDITORIAL REPLY by my readers. This is a free country and you're entitled to
|
||
respond, so PLEASE DO SO! I welcome your thoughts and ideas. Do you have any
|
||
suggestions on how to make "SCAM!" better, or what you'd like to see in
|
||
"SCAM!"?? Was there something in "SCAM!" you disagree with, or would like to
|
||
have clarified?? Is there a particular scam you'd like to pull off, but don't
|
||
know how?? Leave a PRIVATE message for THE PRODUCER on The Rune Stone BBS and
|
||
let your editorial replies be heard for future publications of this magazine!
|
||
_____________________________________________________________________________
|
||
|
||
|
||
UNTIL NEXT TIME, HAPPY "SCAM!"S & BE WELL!
|
||
|
||
|
||
--- -- T H E P R O D U C E R -- ---
|
||
|
||
SNEEZING, COUGHING, CHOKING and GASPING FOR UNPOLLUTED AIR IN GOD'S COUNTRY...
|
||
|
||
NEW YORK STATE, U. S. A.!
|
||
_____________________________________________________________________________
|
||
|
||
|
||
The End
|
||
|