3793 lines
172 KiB
Plaintext
3793 lines
172 KiB
Plaintext
Guide to: Hacking, Carding Phreaking By: The Dark Lord
|
||
|
||
Introduction:
|
||
~~~~~~~~~~~~~~
|
||
This is a text file is Made By The Mickey Mouse Club and
|
||
would ask that it would be distibuted to others for there use.
|
||
This file is going to go into depth on how to Hack, Phreak, and
|
||
card. There will be information that should help everyone,
|
||
Hopefully!!
|
||
|
||
Hacking:
|
||
~~~~~~~~~~
|
||
Hacking is a long hard process, unless you get lucky. There are
|
||
many programs and aids out to make the job a lot easier, but the
|
||
concept is the same no matter how you use it. First, at least on
|
||
most things that you hack, you need to get some type of account or
|
||
vacancy, etc... This is done by randomly entering numbers and or
|
||
letters until you come up with the proper combination to find the
|
||
account. Knowing the size of the account number makes this job
|
||
one-hundred times easier. Thats why I suggest you find out from
|
||
someone who allready has one or card one. By carding the account,
|
||
it will die quickly but at least it will give you the length of the
|
||
account numbers (More on that topic will be expained in the carding
|
||
section). The accound numbers, do not always just contain numbers
|
||
or have numbers at all in it. If it has a mix, it makes it a hell
|
||
of a lot harder to get. You will just have to experiment to find
|
||
out what charactors are contained in the account. Some Examples of
|
||
ones that do have mixes of numbers and letters would be Pc Persuit
|
||
accounts. The forms of them are usuall as such:
|
||
|
||
Account: Pgp014764g
|
||
Password: 23632k
|
||
|
||
It looks from these that you are pretty much screw because of
|
||
the way letters are mixed with numbers, thats what makes having a
|
||
program so much easier. In a lot of circumstances, getting the
|
||
account is the hardest part that is why having a good background of
|
||
the system is a major plus in your favor. Once you have got the
|
||
account, it is time to get the password for this account. Once
|
||
again having the length and such makes this process not only
|
||
easier, but faster. just keep entering random passwords of the
|
||
length or the thought length in until you get a stoke of luck and
|
||
get it. You MUST remember that 99.5 out of 100 times, this is a
|
||
long process, and you have to have patience. If you don't you
|
||
might as well forget ever getting on to the system or have someone
|
||
else do it for you. Once you have gotten the password, look it
|
||
over long and hard. Write it down and keep it, examine it. 99% of
|
||
the time there is a pattern to all the account passwords. Things
|
||
to look at is the password in reference to the account number.
|
||
check to see if things have been added to the end or beginning like
|
||
00 or 01 or 99 of 0010 thing like that. If you see no relations,
|
||
|
||
|
||
- 141 -
|
||
|
||
|
||
the only other way to really find out the pattern in to get another
|
||
one. Look at both of them together, see if there the same or it
|
||
account 400's password is 3456 and 402's password is 3458 (they go
|
||
in order) then just those as a reference to other passwords, take
|
||
away so much from accounts with a lower number and add the required
|
||
amounts to accounts with a higher number, etc.... But bassicly,
|
||
LOOK FOR A PATTERN! Once you have got the password and the account,
|
||
you have got yourself a passage way in.
|
||
|
||
Although this is what you do to succeed, you have to take many
|
||
precautions. They do NOT like us messing with the system and they
|
||
obviously want you to pay just like the others, so they will take
|
||
necessary means to nail you. They trace like you wouldn't belive.
|
||
They will trace right as you get on, if you happen to be unlucky,
|
||
you will never know when they are doing it either, you must ALWAYS
|
||
be aware of the dangers and take precautions! Even on things that
|
||
you wouldn't think that they would trace you but, be carfull.
|
||
Whether they trace depends on a couple of things, here are a few
|
||
major ones:
|
||
|
||
1. There bank balance
|
||
2. There desire to catch you
|
||
3. The amount of infestation in there system
|
||
|
||
There are things that you can do to protect yourself, these are not
|
||
all of them and none of them are sure fire ways, but hey, cutting
|
||
down your chances of getting caught makes a world of difference,
|
||
because remember, All the fun is taken away if you caught. Some
|
||
things to do to protect yourself is:
|
||
|
||
1. Use a diverter
|
||
2. Use false information about you
|
||
3. Never stay On-line too long
|
||
4. Call during late or early hours, were there is most likely
|
||
no one monitoring the system
|
||
5. Don't call frequently or during the same hours, regulate it
|
||
|
||
Once again these are not all of them but these are some of the
|
||
"More" helpfull things. If you follow all the step, you can reduce
|
||
the change of getting caught by about 40%. f you do get caught
|
||
there is not a whole lot that you can do, but some tips are, first,
|
||
don't reveal any information on what you have done. Deny all
|
||
charges. Sencond, plea bargin with knowladge of things, like
|
||
hacked sytems etc.. But never admit that you did it. Three, and
|
||
most important, get a GOOD LAWYER!!!!!!!
|
||
|
||
DIFFERENT TYPES OF SYSTEMS:
|
||
|
||
Pc Persuit Cp\m, Trw, Unix, Vmb, Vms
|
||
|
||
|
||
|
||
- 142 -
|
||
|
||
|
||
These are just a few systems, if I made a complete list There would
|
||
be pratically no end to it, there are millions.
|
||
|
||
Phreaking:
|
||
~~~~~~~~~~
|
||
Phreaking, Ahhhwwww, the wonderfull world of phreaking. Well to
|
||
start with Phreaking is "The use of Telecommunications to others
|
||
besides people of the Phone Company". Well thats my version of the
|
||
definition at least. Using codes is wuit easy, there are different
|
||
parts to it, the Dial-up, the code, and the number. First you will
|
||
have to dial in the dial-up and on most dial ups you will get a
|
||
tone or a buzz or click or something to that effect. Once you hear
|
||
this, and you will know when you hear it you dial in the code.
|
||
Sometime you will get another tone or beep etc. and when you do
|
||
that is when you dial in the number. If you do not get another
|
||
tone or whatever you just dial in the number right after you
|
||
enter the code. You might have to have a test dial up to see how
|
||
the tones go. In dialing the number once agian the nubers differ.
|
||
You must enter the area code and then the nuber. Some require that
|
||
you have a one before the area code but most that I have used do not.
|
||
You can tell if the code worked right after the number has been put
|
||
in not just by the error recording that you get but if right off the
|
||
bat the phone begins to ring, it doesn't work. A code can also be busy.
|
||
If it is busy it could mean that the code is dead or that too many
|
||
people are using it at once. You might experiance this often. There
|
||
are numbers that make phreaking much safer, they are called diverters.
|
||
What the do is when the number that you have dial is being traced it
|
||
diverts it to that number. Unless this is virgin or nobody else uses
|
||
it, you will find that with in a couple of days after it is out, it
|
||
will be busy, that is the annoyance about diverters, and they are
|
||
also hard to get. Hacking is also put into play in phreaking by
|
||
using programs to get dial ups and the codes. Getting these are done
|
||
in the same way you hack anything else. Just get a program like code
|
||
thief or code hacker, or make one yourself, it is quite easy. There
|
||
is a danger with useing the codes. If you hack a code yourself, not
|
||
just the code but the dial up amd no one else has it you can pretty
|
||
well bet that it is safe. A newly hacked dial-up/code is considered
|
||
"Virgin". those Ma bell is not having the problem with people
|
||
phreaking off of it so they don't bother doing anything with it.
|
||
But after a while, it will either Die (No Longer work) or they will
|
||
start tracing off of it. The whole pain about it is, is you will
|
||
never positively no when they started doing traces or things like
|
||
that. The codes might be being traced but you are getting the luck
|
||
of the draw. On most codes they don't trace on every call, they
|
||
just file it away and watch for like the 50th or 100th caller and
|
||
then that person gets nailed. You might think if they do trace every
|
||
100 calls, that means you have a 1 in 100 chance of getting caught and
|
||
those are really good odds. Well the odd is 100 to 1 but the is a lot
|
||
of people that live in areas that they can call with that code. If you
|
||
figure about 10 million people could use it then about 100,000
|
||
|
||
- 143 -
|
||
|
||
|
||
of them are. 100,000, hummmmmmm, how odes your odds look now.
|
||
In a couple minute time spand 99 peoplecould have used it, and
|
||
lucky you might be the 100th caller. A lot of times the take like
|
||
every hundered calls and then when they get the 100th caller, that
|
||
don't just trace one, they trace 100, 101, 102, 103, 104 200, 201,
|
||
202 etc. So you chances of getting caught when the heat is on the
|
||
code is pretty good. There are a couple different types of codes
|
||
and the two major ones are 1-800's and 950's. 800's can pretty much
|
||
be dialed from anywhere in the states, but 950's stay in certain
|
||
areas. Some 950 dial ups are:
|
||
|
||
9501001
|
||
9500266
|
||
9500355
|
||
9501388
|
||
|
||
And there are others, but like take me for example, where I live
|
||
you cannot use 9500266. It will tell you that you cannot use that
|
||
number from your dialing range or it just won't work. You might
|
||
get to the point where the dial-up works but not the code. If this
|
||
is the case it will say: "Invalid authorization Code" Some examples
|
||
of 1-800's are as follows:
|
||
|
||
1-800-255-2255
|
||
1-800-759-2345
|
||
1-800-959-8255
|
||
|
||
There are many others but those are just a few, very few. There
|
||
are also 1-800's and others that will send you directly to the
|
||
operator, you must tell her the code and the number you are
|
||
dialing. These are NEVER safe to use. but in one case they are
|
||
alot better. I am out of town a lot so I have to use pay phones
|
||
right? Well, you are safe with anything with pay phones, so that
|
||
is a good way to call people. The real good thing them though, is
|
||
since you must go throught th operator, the codes stay valid for up
|
||
to 10 times as long as the others. But thenm again another draw
|
||
back is it is not a line that you want to give real names or
|
||
numbers over. Because these are often tapped, since the
|
||
operator know that you used the code, they will listen in quite
|
||
often, and you will never even notice. Another problem experianced
|
||
with them is if you are what MMC calls
|
||
|
||
"Petite Flowers", our home made word for , someone that sounds like
|
||
a little kid, then they really give you a hastle about using the
|
||
code. I have had a lot of people ask me if the person you are
|
||
calling with the codes can get busted. The answer is "No". They
|
||
cannot do anything to the person, just ask him who is calling him
|
||
with the codes, and they rarely do that. Just let the person you
|
||
are talking to, if they don't already know, not to tell anyone that
|
||
you are calling with the codes. The phone companies do have to option
|
||
of setting up a trace on that persons line and bust you when you do call
|
||
|
||
- 144 -
|
||
|
||
|
||
|
||
him with a code. I have never seen this done but do be aware that
|
||
the phone companies are made up of intellegent adults and they are
|
||
very smart and can and will nail you in many ways. I am a firm beliver
|
||
that you should share a the information that you other phreakers and
|
||
hackers as they should do the same with you. I also see an execption,
|
||
inexperianced people. They can run it for everyone be not have the
|
||
knowladge and screwing up. I realize that they need someway to build
|
||
themselves up to a good phreaker but be cautions in what you give to
|
||
them. Codes die really often and you really have to keep up with the
|
||
phone company. Its kinda of a pain to keep up with it on your own as
|
||
quickly as they work but thats why there is phreaking communities and
|
||
groups such as Fhp and MMC, the gives the edge to the phreakers in the
|
||
way that, you have help in keeping up with the phone companies, and in
|
||
most cases if the groups or communities are working well together,
|
||
you can eve stay one step ahead of good 'ole Ma bell and others.
|
||
You really need to find ways of getting codes either from getting
|
||
acess to the phreaking sections on the pirate boards you call or
|
||
throught friends, Vmb's Loops, Confrences, etc., just try to find a
|
||
good connection to people that are into phreaking too.
|
||
|
||
Carding:
|
||
~~~~~~~~~
|
||
Although everything talked about in the text file to this point is
|
||
illegal, and you will get busted if you get caught, this is one one
|
||
the one that you can get in some major shit over. About the only
|
||
thing I have talked about that this falls short of is hacking a
|
||
government compter, and thats one of the Grand daddies of them all.
|
||
Well, although it is a major crime, it is really cool!!!! This is
|
||
the process in which you find the card number of someone and use it
|
||
to purchase things. In order to card, there are a few things that
|
||
you must have or it will not work. You will need to have........
|
||
|
||
1. The Card Number
|
||
2. The Experation date
|
||
3. Card type (Master Card, Visa, etc...)
|
||
|
||
Those are the main things tha you will need. Having the name of
|
||
the owner is very helpfull but it is not a must. You can get by
|
||
without it. You have to order everything you want by mail. A
|
||
couple of "Beginner" carder that I talked to didn't understand how
|
||
you would do it, but thats when they had the misconception that you
|
||
actually go to the store and purchase things. That is a complete No,
|
||
no. You do everything from a phone ordering service. When you call make
|
||
sure that you are a t a pay phone. Don't do it your house or anywhere
|
||
where it can come back to you. When you order the merchandice, once
|
||
again do send it to anywhere that it can come back to you like your
|
||
home, work, etc. Find a vacant house or building or anywhere else
|
||
that you can send it to. Also, don't send it to a P.O. box that you
|
||
have, just as dangerous.
|
||
|
||
- 145 -
|
||
|
||
|
||
When you do order it and you think its around the time that you
|
||
will be reciving it, check the mailbox frequently. But do it
|
||
during odd hours. I mean, hows it going to look you taking a
|
||
package from a vacant house? Most bills are sent at the end of the
|
||
month or at the biginning, so try to time it to where the bill
|
||
won't come to the person untill a couple of days after you have
|
||
recived the package. Ok heres how to figure it. I have found out
|
||
that the bills are sent out up around the 26-30th of the month, so
|
||
they will actually recive the bill around the 31-4th. Have it sent
|
||
right after you think the bill has been sent. Find what you want,
|
||
but try to order it from the place that guarentees the fastest
|
||
delivery. When you order the item, make sure they have it in stock
|
||
and don't have to get the item in first. Order the highest class
|
||
of delivery but not COD or next day service. Thats cutting it too
|
||
close. It should take around 2-4 weeks before you get it and if
|
||
you timed it right, then it sound get there right before the person
|
||
gets the bill. You need to have it in your possesion before the
|
||
bill gets to the person because if they complain, they can keep it
|
||
from being sent, or watch who actually gets it even while its going
|
||
throught the mail process. Don't order more than a couple of things
|
||
or overcharge the card, if the people at the Credit card office,
|
||
see irregular charging on the card, they will follow up on it. To
|
||
actually order the item you will call up the place that you will be
|
||
ordering from, and when the operator answers let her know what you
|
||
need to as far as what you are purchasing, etc. When she ask how you
|
||
will be paying just tell her "Charge" and the the type of card like
|
||
Master Card, Visa, ect. Then Tell them your name, if you don't know
|
||
the name of the actuall owner of the card, Make up a false name that
|
||
has NO relation to your name, not the same first, last middle what
|
||
ever, nothing relating to your real name. Then continue answering all
|
||
the operators questions, address (Not your own remember!) state, area
|
||
code etc. They will also ask for your phone number. Make one up, not
|
||
your own. If something happens to go wrong as far as delivery or if
|
||
they are checking if you are who you say, then your screwed, unless of
|
||
course, hehehe, the number is ALWAYS busy. Find the busiest number
|
||
there is and leave them that. When they ask for the card number and
|
||
experation, just tell them and do what all else you need. Wish them a
|
||
good day, and hope you get it. Ok heres how you check if the card is
|
||
good, and how much money can be charged on the card.......
|
||
|
||
1. Dail 1-800-554-2265
|
||
2. it will ask for the type of the card. you must put in 10 for
|
||
Master Card and 20 for Visa, I am not sure about the others.
|
||
3. Next it will ask for the Identification. You will need to enter
|
||
1067
|
||
4. After all that you will have to enter the Mecrchant number,
|
||
which you will either need to put in 24 or 52. One of them
|
||
should work.
|
||
|
||
|
||
- 146 -
|
||
|
||
5. You will then have to enter (When Prompted) the card number
|
||
itself.
|
||
6. Next, the experation date of the card.
|
||
7. Last but not least the amount you want to try to get on the
|
||
card. The procedure for this is enter dollars, astricks, then
|
||
cents. (Example:) 100*30 = One hundred dollars and thirty cents.
|
||
One thing I do need to mention, after you type in everything you
|
||
must press pound (#). Like when it asks you for the type of card,
|
||
if you had a Master Card you would put: 10#. when it asked for
|
||
identification you would enter 1067#. If it says invalid, that
|
||
either means that the card is no good or you can't charge that
|
||
amount on the card. Try it again, but try a lower amount. If
|
||
you get down to $1 and it still doesn't work, hehehe, you can
|
||
probably guess that the card is no good. You might not be ordering
|
||
just merchandice you might be ordering accounts and things like that
|
||
and if you are, fine, but you have to remember, the accounts do not
|
||
stay good for very long, the owner of the card gets the bill,
|
||
complains and its no longer any good. And when you card and
|
||
account, Nine out of ten times, they won't kill the account, they
|
||
will trace in and that is when you butts really in a sling. So
|
||
carding accounts and things, isn't the safest way to go, of course.
|
||
nothing we have talked about it, right?
|
||
|
||
Conclusion:
|
||
~~~~~~~~~~~~~~
|
||
|
||
Well thats about it for now, there should be a BIG newsletter by
|
||
The mickey Mouse Club comming out soon that you have to be sure NOT
|
||
to miss. I sincerely hope that you have gotten alot out of this
|
||
newsletter and I would like to ask for suggestions and Ideas to
|
||
make MMC a better orginazation. At this time myself and Cardiac
|
||
Arresst have a Vmb at: 1-800-444-7207 [Ext] 4001. All ideas and
|
||
suggestions, please bring there. Also, since your making the trip
|
||
anyways, bring along some phreaking codes and all and any types of
|
||
accounts. I would be greatly appreciated by: The Mickey Mouse
|
||
Club.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
- 147 -
|
||
|
||
|
||
LOD/H BUST By Pizza Man
|
||
|
||
" U.S. computer investigation targets Austinites "
|
||
------------------------------------------------------
|
||
[ The above caption high-lighted the Saturday March 17, 1990
|
||
edition of the Austin American-Statesman [ Austin, Texas ]. The
|
||
article has been copied in its entirety, and the main point for
|
||
typing this up was because of the involvement of the LOD/H
|
||
throughout the article. ]
|
||
|
||
The U.S. Secret Service has seized computer equipment from two
|
||
Austin homes and a local business in the past month as part of a
|
||
federal investigation into electronic tampering with the nation's
|
||
911 emergency network. Armed Secret Service agents, accompanied by
|
||
officers from the Austin Police Department, took the equipment in
|
||
three March 1 raids that sources say are linked to a nationwide
|
||
federal inquiry coordinated by the Secret Service and the U.S.
|
||
attorney's office in Chicago. While federal officials have declined
|
||
to comment on the investigation - which focuses on a bizarre mix of
|
||
science fiction and allegations of high-tech thievery - the Austin
|
||
American-Statesman has learned that the raids targeted Steve
|
||
Jackson Games, a South Austin publisher of role-playing games, and
|
||
the home of Loyd Blankenship, managing editor at the company. A
|
||
second Austin home, whose resident was acquainted with Jackson
|
||
officials, also was raided. Jackson said there is no reason for the
|
||
company to be investigated Steve Jackson Games is a book and game
|
||
publisher of fiction, he said, and it is not involved in any
|
||
computer-related thefts. The agents, executing search warrants now
|
||
sealed by a judge from public view, took computer equipment,
|
||
including modems, printers, and monitors, as well as manuals,
|
||
instruction books and other documents. The equipment has been
|
||
forwarded to federal officials in Chicago. The Secret Service,
|
||
best-known for protecting the president, has jurisdiction in the
|
||
case, government officials say, because damage to the nation's
|
||
telephone system could harm the public's welfare. In addition,
|
||
the system is run by American Telephone & Telegraph Co., a
|
||
company involved in the nation's defense. The 911 investigation
|
||
already has resulted in the indictment of two computer "hackers"
|
||
in Illinois and sources say federal authorities now are focusing
|
||
on Austin's ties to a shadowy underground computer user's group
|
||
known as the Legion of Doom.
|
||
|
||
The hackers, who live in Georgia and Missouri, where indicted in
|
||
Chicago. they are believed to be members of the Legion of Doom and
|
||
are charged with seven counts, including interstate transportation
|
||
of stolen property, wire fraud, and violations of the Computer
|
||
Fraud and Abuse Act of 1986.
|
||
|
||
The government alleges that the defendants stole a computerized
|
||
copy of Bell South's system that controls 911 emergency calls in
|
||
nine states. The information was then transferred to a computer
|
||
|
||
- 148 -
|
||
|
||
|
||
bulletin board and published in a hacker publication known as
|
||
Phrack! A trial in the case is scheduled to begin in June. U.S.
|
||
agents also have seized the final drafts of a science fiction
|
||
game written by the Austin-based game company. Sources say the
|
||
agents are trying to determine whether the game - a dark,
|
||
futuristic account of a world where technology has gone awry - is
|
||
being used as a handbook for computer crime. Steve Jackson, the
|
||
owner of the local company and a well-known figure in the
|
||
role-playing game industry, said neither he nor his company has
|
||
been involved in tampering with the 911 system.
|
||
|
||
No one in Austin has been indicted or arrested as a result of the
|
||
investigation. "It is an on-going investigation. That is all I
|
||
can say," said Steve Beauchamp, special agent-in-charge of the
|
||
Secret Service Austin field office. "Until we can put it all
|
||
together, we just do not comment," he said.
|
||
|
||
Bob Rogers, Jackson's Dallas attorney, said federal officials have
|
||
assured him that neither Jackson nor Jackson Games is the target of
|
||
the probe. The authorities would not tell Rogers whether the
|
||
inquiry focused on other company employees. As for the science
|
||
fiction game, called Cyberpunk, Jackson said federal authorities
|
||
have mistaken a fictional work for a technical manual [E.N. Why
|
||
does this sound all too familiar?] . "It's not a manual for
|
||
computer crime any more than a Reader's Digest story on how to
|
||
burglar-proof your house is a manual for burglars," said Jackson,
|
||
36. "It's kind of like the hints you get on safe-cracking from a
|
||
James Bond movie."
|
||
|
||
Blankenship, the author of the book, said his attorney has advised
|
||
him not to comment on the book or the Secret Service investigation.
|
||
Jackson said he guesses his company was linked to the 911 probe by
|
||
its use of a computer bulletin board system, called Usenet. The
|
||
board, one of hundreds throughout the country, is a sort of
|
||
electronic Town Square, where personal computer users from
|
||
throughout the world can tap into the system via phone lines and a
|
||
modem.
|
||
|
||
The network, free and relatively unregulated, is an information
|
||
exchange where users can post information, exchange electronic
|
||
messages and debate with keyboards everything from poetry and
|
||
politics to nuclear war. One of the world's largest networks -
|
||
boasting more than 600,000 users - Usenet was tapped by Chinese
|
||
students in North America to organize support for students during
|
||
the pro-democracy demonstrations last year. The network also was
|
||
infected in 1988 by a now-famous computer "virus" unleashed by
|
||
college student Robert Morris. Jackson said his company has
|
||
maintained a bulletin board on the Usenet network on which it posts
|
||
advanced copies of its role-playing games. The firm posts the games
|
||
and requests that the users of the network comment on the text and
|
||
propose improvements. The Jackson bulletin board, called Illuminati,
|
||
greets users with the
|
||
|
||
- 149 -
|
||
|
||
|
||
company's logo and a message that states: "Welcome to the
|
||
World's Oldest and Largest Secret Conspiracy." Over the past
|
||
several months, the company has been posting drafts of Cyberpunk
|
||
for review. The resident of the second Austin home raided by the
|
||
Secret Service was acquainted with Jackson and had made comments
|
||
about the game on Usenet. He asked to remain anonymous. Typical
|
||
of Cyberpunk literature, the game is set in a bleak future, much
|
||
like the world portrayed in Max Headroom, formerly a network
|
||
television program. Computers and technology control people's
|
||
thoughts and actions and are viewed both as a means of oppression
|
||
and as a method of escape. Portions of Jackson's Cyberpunk viewed
|
||
by the Austin American Statesman include a detailed discussion on
|
||
penetrating government computer networks and a list of fictitious
|
||
programs used to break into closed networks. Bruce Sterling, an
|
||
Austin science fiction writer and one of the world's best-known
|
||
Cyberpunk writers, said Jackson's game and its computer-related
|
||
discussions are hardly unusual for the genre. "Cyberpunk is
|
||
thriller fiction." Sterling said. "It deals to a great extent
|
||
with the romance of crime in the same way that mysteries or
|
||
techno-thrillers do." He said the detailed technical discussions
|
||
in the Jackson games are what draws people to them. "That's the charm
|
||
of simulating something that's supposed to be accurate. If it's
|
||
cooked up out of thin air, the people who play these games are going
|
||
to lose interest."
|
||
|
||
Jackson, though, said he has been told by Secret Service agents
|
||
that they view the game as a user's guide to computer mischief. He
|
||
said they made the comments where he went to the agency's Austin
|
||
office in an unsuccessful attempt to reclaim some of his seized
|
||
equipment. "As they were reading over it, they kept making
|
||
outraged comments," Jackson said. "When they read it, they became
|
||
very, very upset. "I said, 'This is science fiction.' They said,
|
||
'No. This is real.'" The text of the Cyberpunk games, as well as
|
||
other computer equipment taken from Jackson's office, still has not
|
||
been returned. The company now is working to rewrite portions of
|
||
the book and is hoping to have it printed next month. In addition
|
||
to reviewing Cyberpunk, sources say federal authorities currently
|
||
are investigating any links between local computer hackers and the
|
||
Legion of Doom. The sources say some of the 911 information that
|
||
is the subject of Chicago indictments has been traced to Austin
|
||
computers. Jackson's attorney said federal officials have told him
|
||
that the 911 information pilfered from Bell South has surfaced on
|
||
a computer bulletin board used at Steve Jackson games. But the
|
||
information apparently has not been traced to a user. Jackson
|
||
said that neither he nor any of his employees is a member of
|
||
the Legion of Doom. Blankenship, however, did consult with the
|
||
group in the course of researching the writing the Cyberpunk game,
|
||
Jackson said. Further, the group is listed in the game's
|
||
acknowledgments for its aid in providing technical information used
|
||
in Cyberpunk. For these reasons he believes Blankenship is
|
||
|
||
- 150 -
|
||
|
||
|
||
a local target of the federal probe, though none of the
|
||
investigators has yet confirmed his suspicion. "My opinion is that
|
||
he is (being investigated)," Jackson said, "If that's the case,
|
||
that's gross. he had been doing research for what he hoped would be
|
||
a mass-market book on the computer underground," Jackson said. The
|
||
other Austin resident raided by the authorities, who asked to
|
||
remain anonymous, acknowledged that he is the founding member of
|
||
the Legion of Doom and that copies of the 911 system had surfaced
|
||
on the group's local bulletin board. The 20-year-old college
|
||
student said the information hardly posed any threat to the 911
|
||
system. "It was nothing," he said. "It was garbage, and it was
|
||
boring." In the Chicago indictment accuses the group of a litany of
|
||
electronic abuses, including: disrupting telephone service by
|
||
changing the routing of telephone calls; stealing and modifying
|
||
individual credit histories; stealing money and property from
|
||
companies by altering computer information; and disseminating
|
||
information about attacking computers to other computer hackers.
|
||
The Austin Legion of Doom member said his group's worst crime is
|
||
snooping through other people's computers. "For the most part,
|
||
that's all we do," he said. "No one's out ripping off people's
|
||
credit cards. No one's out to make any money. "We're just out to
|
||
have fun." The group member said the fact that the legion is shrouded
|
||
in mystery adds to its mystique - and to the interest law enforcement
|
||
agents have in cracking the ring. "It's an entirely different
|
||
world," the student said. "It's a very strange little
|
||
counter-culture. "Everybody who exists in that world is familiar
|
||
with the Legion of Doom," he said. "Most people are in awe or are
|
||
intimidated by it."
|
||
|
||
A shadowy gang of computer hackers with ties to Austin has become
|
||
the target of a massive federal probe into the nation's high-tech
|
||
underground. Federal and local authorities involved in the inquiry
|
||
seized evidence from three Austin homes and a business in March.
|
||
They say some action on the local cases, possibly including
|
||
indictments or arrests, is expected in the next month.
|
||
|
||
The computer crime crackdown - the largest ever launched by the
|
||
U.S. government - has resulted in the temporary disbanding of the
|
||
Legion of Doom, a notorious national group of young computer
|
||
hobbyists with at least two Austin members. State and federal
|
||
investigators say the 6-year-old group, which once boasted more
|
||
than 150 members in nearly every U.S. state, has been connected
|
||
to a string of computer crimes in Texas, Georgia, Arizona,
|
||
Illinois, California and New Jersey. Officials say group members
|
||
have electronically stolen money and long-distance telephone access
|
||
numbers, changed credit reports, planted datadestroying computer
|
||
viruses in government networks, attempted to tamper with hospital
|
||
patient records, and distributed information that, if used, could
|
||
have debilitated the nation's 911 emergency response network. So
|
||
far, only four Legion of Doom members have been indicted for the
|
||
crimes, and none has gone to trial. However, an investigation team
|
||
|
||
- 151 -
|
||
|
||
|
||
coordinated by Assistant U.S. Attorney William Cook in Chicago and
|
||
including the secret Service, the U.S. Department of Justice, the
|
||
FBI and a handful of state attorney generals, has in the past six
|
||
months raided the homes and businesses of about a dozen suspected
|
||
legion members across the country. In Austin, Secret Service agents,
|
||
local police and officers from the University of Texas Police
|
||
Department seized computer equipment and documents from three homes
|
||
as part of the probe. One local business, a role-playing game-
|
||
publishing company called Steve Jackson Games, also was raided in
|
||
the March crackdown, but officials say the firm is not a primary
|
||
target of the hacker investigation. The firm is believed to have
|
||
been raided because investigators wanted to examine equipment used
|
||
by an employee. The search warrants used in the raids remain sealed
|
||
from public view, and Secret Service and UTPD officials declined to
|
||
comment on the case. Law enforcement sources say one of the targets
|
||
of the Austin investigation is a juvenile who is not believed to be
|
||
a member of the hacker group. The two other Austinites under
|
||
investigation are legion members, authorities say, and have been
|
||
linked to the 911 probe centered in Chicago. According to law
|
||
enforcement sources, the two men helped circulate information about
|
||
the 911 system's software through a national bulletin board network
|
||
that hackers could call by using a telephone, a computer and a modem.
|
||
In addition, details about ways to tamper with the emergency system
|
||
were published in Phrack, a legion newsletter. While no one in Austin
|
||
has been indicted or arrested, officials said they expect some action
|
||
on the local cases in the next month. And state and federal authorities
|
||
involved in the national investigation say they are preparing dozens of
|
||
additional indictments aimed at the entire membership roster of the
|
||
Legion of Doom. "It doesn't matter whether you commit a burglary by
|
||
telephone or by breaking into a building," said Gail Thackeray, an
|
||
assistant attorney general in Arizona, one of a handful of state
|
||
investigators working solely on computer crime. "Did they expect that
|
||
the rest of us would sit by and let every idiot kid in America break
|
||
into our 911 system?" she said. "I do not respect the right of hackers
|
||
to learn what they want to learn at the expense of the rest of us."
|
||
Thackeray, who helped investigate a hacker's attempt to break into
|
||
the computer system at the Barrow Neurological Institute in Phoenix,
|
||
said the recent legion crackdown is a result of improved coordination
|
||
among law enforcement agencies with jurisdiction over computer crime.
|
||
In addition, she said, the effort has been boosted by a new breed of
|
||
investigators with computing expertise. Because of the potential
|
||
for widespread damage to both government and business computer
|
||
systems, officials say the hacker probe has caught the eye of the
|
||
Justice Department, which is pushing U.S. attorneys throughout the
|
||
country to beef up their computer crime-fighting capacity. "There
|
||
is a push on Capitol Hill to shore up our activity in this area,"
|
||
said an assistant U.S. attorney who asked not to be named. "I
|
||
think this is the beginning of a boom." Said Thackeray: "There's
|
||
more computer crime going on out there than any one agency can
|
||
|
||
- 152 -
|
||
|
||
|
||
handle. We're totally flooded." For members of the Legion of Doom,
|
||
the unwanted law enforcement attention is nothing new. Formed in 84
|
||
and named for a gang at took on Superman and other heroes in the
|
||
television cartoon Superfriends, the group has survived two other
|
||
waves of criminal investigations. The first, in 1985, resulted in
|
||
the Arrrest and conviction of five of the legion's founders for credit
|
||
card fraud and theft by wire. After a brief resurgence, group
|
||
members again were arrested en masse in 1987, only to revive again
|
||
in 88. But according to investigators familiar with the group,
|
||
pressure form the recent legion crackdown is the most intense to
|
||
date. Several of the investigators said the legion has shut down,
|
||
at least for now. A history of the group written by one of its
|
||
founders and obtained by the Austin American- Statesman seems to
|
||
bear out investigators' suspicions. The 10- page document recounts
|
||
significant developments in the group's history, from its founding
|
||
in 1984 (an event "that would ulti- mately change the face of the
|
||
computer underground forever," the brochure states), to its
|
||
current, besieged status. The pamphlet acknowledges that "there is
|
||
no indication that points to a resurgence in the future" and ends
|
||
with the words "Legion of Doom (84-90)." The brochure also takes
|
||
potshots at federal investiga- tors and the media, often accused by
|
||
legion members of exaggera- ting their crimes and sensationalizing
|
||
the group. "The Legion of Doom has been called everything from
|
||
'organized crime' to a 'communist threat to national security' to
|
||
an 'international conspiracy of computer terrorists bent on
|
||
destroying the nation's 911 service,'" the brochure states.
|
||
"Nothing comes closer to the actual truth than 'bored adolescents
|
||
with too much spare time.'" Finally, the legion history includes an
|
||
"alumni" list that conttains the code names of 38 current and former
|
||
members. According to the legion's own accounting, 14 of the 38 people
|
||
on the list have either been convicted of computer crimes or are under
|
||
investigation. Officials familiar with the group say the legion's
|
||
characterization of itself as a clique of bored whiz kids is
|
||
inaccurate. Instead, they portray group members as sophisticated
|
||
and organized malcontents who do not accept conventional concepts
|
||
of respect and trust. "These are not just wacky kids," Thackeray
|
||
said. "They have absolute contempt for the rest of us." "They are
|
||
constantly in a high-level skill kind of game, part of a thrill.
|
||
They've totally lost touch with reality." William Murray, a systems
|
||
security fellow for the Ernst & Young accounting firm, said even
|
||
though hackers take advantage of the tremendous power of personal
|
||
computers, they still view their crimes as an electronic game of
|
||
cat and mouse. "This whole sense of excitement and joy is not
|
||
tempered," Murray said. "Nobody has told them that they have a
|
||
responsibility for polite behavior." Some states, including
|
||
Arizona, are developing treatment programs for hackers. Patterned
|
||
after Alcoholics Anonymous and drug-treatment centers, the programs
|
||
are aimed at rehabilitating hackers who have grown dependent on
|
||
their craft. "It is absolutely addictive behavior," Thackeray said.
|
||
"When they get their hands on tools as powerful as these computers,
|
||
they lost all judgement."
|
||
|
||
- 153 -
|
||
|
||
|
||
Operation "Sun-Devil" by Phreak_Accident
|
||
=====================
|
||
May 9th and 10th brought on two day thats would be marked in
|
||
every hackers history book. The reason we assume these days will
|
||
be important to many, is that maybe it's time we opened are eyes
|
||
and saw the witch hunt currently in progress. In less than 48
|
||
hours, 150 Secret Service men and other law officials served 30
|
||
search warrents in 14 cities around the nation (This thing was
|
||
hudge). Operation "Sun-Devil" (As the Attorney General in Phoenix
|
||
called it), was a success on their part. "The investigation though
|
||
is not over, and there are more warrents to be executed.", said
|
||
Jim Folwer of L.A's Secret Service. Any details of the
|
||
investigation are not being given out at this time. The Asst.
|
||
Attorney General of Pheonix told Phrack Inc. that there were
|
||
other problems involving the investigation and that it was an
|
||
ongoing investigation for the last TWO years. It is my
|
||
understanding that Gail Thackeray and the Secret Service are not,
|
||
taking this lightly. She told Phrack inc. that they are not
|
||
distinquishing pirates, hackers, or phreakers. Basically, it's any
|
||
kid with a modem that calls a BBS with an alias. Yes, we are the
|
||
witches, and we are being hunted.
|
||
|
||
The following are Two news releases obtianed via fax through the
|
||
U.S. Secret Service for Phrack Inc.
|
||
|
||
N E W S R E L E A S E
|
||
FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray
|
||
------------------------ Assitant Attorney General
|
||
May 9, 1990 @ 11:00 A.M. (602) 542-4266
|
||
|
||
|
||
|
||
Attorney General Bob Corbin announced today that in connection with
|
||
an eighteen-month joint investigation into computer crime conducted
|
||
with the United States Secret Service and the United States
|
||
Attorney's office, the Arizona Attorney General's office has
|
||
executed seven search warrants in which computers, electronic
|
||
bulletin boards, telephone test equipment and records have been
|
||
seized. The Organized Crime and Racketeering Division investigation
|
||
involved complaints by Arizona and out of state victims of
|
||
substantial financial losses resulting from credit card fraud and
|
||
theft of long distance telephone and data communications services,
|
||
and by victims of attacks on computer systems operated by
|
||
government agencies, private corporations, telephone companies,
|
||
financial institutions, credit bureaus, and a hospital. The Arizona
|
||
Attorney General's office received information and technical
|
||
assistance from the Glendale, Arizona Police Department's Computer
|
||
Crime Unit, and from many private sector sources, including Bellcore
|
||
(Bell Communications Research), American Express, Communications
|
||
carriers U.S. Sprint, AT&T, MCI,Com Systems, MidAmerican
|
||
Communications, LDL Communications, and Shared Use Network. Without
|
||
the cooperation of these companies and of numerous federal,
|
||
|
||
- 154 -
|
||
|
||
|
||
state and local law enforcement agencies around the country, this
|
||
investigation would have been impossible. The privacy of our citizens
|
||
and the health of our economy depend upon secure, reliable computer
|
||
systems. Computer fraud and attempts to compromise senstitive public
|
||
and private computer systems will not be tolerated. Individuals who
|
||
commit these offenses in Arizona can expect to be prosecuted.
|
||
|
||
.end.
|
||
P R E S S R E L E A S E
|
||
|
||
|
||
FOR IMMEDIATE RELEASE Contact: Wendy Harnagel
|
||
Wednesday, May 9, 1990 United States Attorney's Office
|
||
---------------------- (602) 379-3011
|
||
|
||
|
||
PHOENIX -- Stephen M. McNamee, United States Attorney District of
|
||
Arizona,
|
||
Robert K. Corbin, Attorney General for the State of Arizona, and
|
||
Henry R. Potosky, Acting Special Agent in Charge of the United
|
||
States Secret Service Office in Phoenix, today announced that
|
||
approximately twenty-seven search warrants were executed on Monday
|
||
and Tuesday, May 7 and 8, 1990, in various cities across the nation
|
||
by 150 Secret Service agents along with state and local law
|
||
enforcement officials. The warrants were issued as a part of
|
||
Operation Sundevil, which was a two year investigation into alleged
|
||
illegal computer hacking activities. The United States Secret
|
||
Service, in cooperation with the United States Attorney's Office,
|
||
and the Attorney General for the State of Arizona, established an
|
||
operation utilizing sophisticated investigative techniques,
|
||
targeting computer hackers who were alleged to have trafficked in
|
||
and abuse stolen credit card numbers, unauthorized long distance
|
||
dialing codes, and who conduct unauthorized access and damage to
|
||
computers. While the total amount of losses cannot be calculated at
|
||
this time, it is estimated that the losses may run into the millions
|
||
of dollars. For example, the unauthorized accessing of long distance
|
||
telephone credit cards have resulted in uncollectible charges. The
|
||
same is true of the use of stolen credit card numbers. Individuals are
|
||
able to utilize the charge accounts to purchase items for which no
|
||
payment is made. Federal search warrants were executed in the following
|
||
cities: Chicago, IL - Cincinatti, OH - Detroit, MI - Los Angeles, CA
|
||
Miami, FL - Newark, NJ - New York, NY - Phoenix, AZ - Pittsburgh, PA -
|
||
Plano, TX - Richmond, VA - San Diego, CA San Jose, CA
|
||
|
||
Unlawful computer hacking imperils the health and welfare of
|
||
individuals, corporations and government agencies in the United
|
||
States who rely on computers and telephones to communicate.
|
||
Technical and expert assistance was provided to the United States
|
||
|
||
- 155 -
|
||
|
||
|
||
Secret Service by telecommunication companies including Pac Bel,
|
||
T&T, Bellcore, Bell South, MCI, U.S. Sprint, Mid-American,
|
||
Southwestern Bell, NYNEX, U.S. West, and by the many corporate
|
||
victims. All are to be commended for their efforts for their
|
||
efforts in researching intrusions and documenting losses. McNamee
|
||
and Corbin expressed concern that the improper and alleged illegal
|
||
use of computers may become the White Collar crime of the
|
||
1990's. McNamee and Corbin reiterated that the state and federal
|
||
government will vigorously pursue criminal violations of statutes
|
||
under their jurisdiction. Three individuals were arrested yesterday
|
||
in other jurisdictions on collateral or independent state charges.
|
||
The investigations surrounding the activities of Operation Sundevil
|
||
are continuing. The investigations are being conducted by agents of
|
||
the United States Secret Service and Assistant United States
|
||
Attoryney Tim Holtzen, District of Arizona, and Assistant Arizona
|
||
Attorney General Gail Thackery.
|
||
|
||
.end.
|
||
_________________________________________________________________
|
||
RIPCO May 8th, 1990
|
||
----- -------------
|
||
Operation Sun-Devil claimed more than just a few "Codelords" around
|
||
the states, it claimed one of the oldest and more popular boards.
|
||
Nobody knows when or if RIPCO shall return. Reportedly, Dr. Ripco
|
||
was charge on a hand-gun violation after his house was searched.
|
||
Phrack inc. can't comment on this. The following is the exact
|
||
transcript of the message left on RIPCO's answering
|
||
maching after Operation Sun-Devil.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
This is 528-5020. As you are probably aware, on May 8, the Secret
|
||
Service conducted a series of raids across the country. Early news
|
||
reports indicate these raids involved people and computers that
|
||
could be connected with credit card and long distance toll fraud.
|
||
Although no arrests or charges were made, Ripco BBS was confiscated
|
||
on that morning. It's involvement at this time is unknown. Since
|
||
it is unlikely that the system will ever return, I'd just l say
|
||
goodbye, and thanks for your support for the last six and a half
|
||
years. It's been interesting, to say the least.
|
||
|
||
Talk to ya later.
|
||
{Dr. Ricpo}
|
||
|
||
*** END OF VOICE MESSAGE ***
|
||
|
||
_________________________________________________________________
|
||
{C}omputer {E}mergency {R}esponse {T}eam
|
||
----------------------------------------
|
||
|
||
Some call it "Internet Police" -- Others call it "just stupid."
|
||
CERT however is a mix. But I do give them credit -- After all,
|
||
have your number one goal being 'making the Internet more secure'
|
||
has to be a tough task. Therefore, we give them credit. However,
|
||
|
||
- 156 -
|
||
|
||
CERT is funded by DARPA, which is a government agency. And
|
||
anything in my book that the government runs is bad news. Yes,
|
||
the government pays the 6 man salary and keep their hot-line active
|
||
24 hours a day. Ahh.. What do you know about CERT? "Nothing" you
|
||
say? Well, the following is the press release and other reprints
|
||
of information about CERT.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
Richard Pethia <rdp@SEI.CMU.EDU>
|
||
|
||
DEAR XXXXXXXXX,
|
||
I have been reviewing our correspondence files and have discovered
|
||
that your request for information may not have been filled. I
|
||
apologize for the delay and hope that the information is still
|
||
useful to you. If, after reading the following, you have
|
||
additional questions or would like to subscribe to one of
|
||
our information lists, please send email with your
|
||
question/request.
|
||
|
||
The Computer Emergency Response Team (CERT) was established by the
|
||
Defense Advanced Research Projects Agency in November of 1988 to
|
||
serve members of the Internet Research community. The press
|
||
release below describes the general role of the CERT. More
|
||
specifically, the CERT supports individual Internet sites by:
|
||
-Working with site personnel to help resolve individual computer
|
||
security incidents. Contact potentially affected sites to warn
|
||
them of possible security breaches. Work with sites to change the
|
||
conditions that allowed incidents to occur. -Issuing advisories
|
||
that alert the community to specific system vulnerabilities or
|
||
intrusion techniques, as well as the methods to protect against
|
||
them. -Working with the community and system (primarily Unix) vendors
|
||
to reslove specific system vulnerabilities. -Maintaining and
|
||
operating moderated mailing lists that: (1) provide a discussion
|
||
forum for tools and techniques to improve the security of Unix
|
||
systems, and (2) provide a discussion forum and alert mechanism for
|
||
PC viruses, trojan horses, etc. Over the past year we have developed
|
||
hundreds of working relationships with members of the Internet and
|
||
other communities and have established an extensive information
|
||
collection and dissemination network. Because of this network of
|
||
cooperating individuals and organizations, we are often able to
|
||
advise the community of problems allowing them to take corrective
|
||
action before being affeceted by those problems.
|
||
|
||
No. 597-88
|
||
(202) 695-0192 (Info.)
|
||
(202) 697-3189 (Copies)
|
||
IMMEDIATE RELEASE 12 6, 1988 (202) 697-5737 (Public/Industry)
|
||
|
||
DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM
|
||
|
||
The Defense Advanced Research Projects Agency (DARPA) announced
|
||
|
||
- 157 -
|
||
|
||
|
||
today that it has established a Computer Emergency Response Team
|
||
(CERT) to address computer security concerns of research users of
|
||
the Internet, which includes ARPANET. The Coordination Center for
|
||
the CERT is located at the Software Engineering Institute (SEI),
|
||
Carnegie Mellon University, Pittsburgh, PA. In providing direct
|
||
service to the Internet community, the CERT will focus on the
|
||
special needs of the research community and serve as a prototype
|
||
for similar operations in other computer communities. The National
|
||
Computer Security Center and the National Institute of Standards
|
||
and Technology will have a leading role in coordinating the
|
||
creation of these emergency response activities. The CERT is
|
||
intended to respond to computer security threats such as the recent
|
||
self-replicating computer program ("computer virus") that invaded
|
||
many defense and research computers. The CERT will assist the
|
||
research network communities in responding to emergency situations.
|
||
It will have the capability to rapidly establish communications
|
||
with experts working to solve the problems, with the affected
|
||
computer users and with government authorities as appropriate.
|
||
Specific responses will be taken in accordance with DARPA policies.
|
||
|
||
|
||
It will also serve as a focal point for the research community for
|
||
identification and repair of security vulnerabilities, informal
|
||
assessment of existing systems in the research community,
|
||
improvement to emergency response capability, and user security
|
||
awareness. An important element of this function is the development
|
||
of a network of key points of contact, including technical experts,
|
||
site managers, government action officers, industry contacts,
|
||
executive level decision-makers and investigative agencies, where
|
||
appropriate. Because of the many network, computer, and systems
|
||
architectures and their associated vulnerabilities, no single
|
||
organization can be expected to maintain an in-house expertise to
|
||
respond on its own to computer security threats, particularly
|
||
those that arise in the research community. As with biological
|
||
viruses, the solutions must come from an organized community
|
||
response of experts. The role of the CERT Coordination Center at
|
||
the SEI is to provide the supporting mechanisms and to coordinate
|
||
the activities of experts in DARPA and associated communities. The
|
||
SEI has close ties to the Department of Defense, to defense and
|
||
commercial industry, and to the research community. These ties
|
||
place the SEI in a unique position to provide coordination support
|
||
to the software experts in research laboratories and in industry
|
||
who will be responding in emergencies and to the communities of
|
||
potentially affected users.
|
||
|
||
The SEI is a federally-funded research and development center,
|
||
operating under DARPA sponsorship with the Air Force Systems
|
||
Command (Electronic Systems Division) serving as executive agent.
|
||
Its goal is to accelerate the transition of software technology to
|
||
defense systems. Computer security is primarily a software
|
||
|
||
|
||
- 158 -
|
||
|
||
|
||
problem, and the presence of CERT at the SEI will enhance the
|
||
technology transfer mission of the SEI in security-related areas.
|
||
|
||
-END-
|
||
|
||
QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88
|
||
Q: Can you provide background on earlier break-ins?
|
||
A: On November 2, 1988, thousands of computers connected to
|
||
unclassified DoD computer networks were attacked by a virus.
|
||
Although the virus did not damage or compromise data, it did
|
||
have the effect of denying service to thousands of computer
|
||
users. The computer science research community associated
|
||
with the Defense Advanced Research Projects Agency (DARPA),
|
||
along with many other research laboratories and military sites
|
||
that use these networks, quickly responded to this threat.
|
||
They developed mechanisms to eliminate the infection, to block
|
||
the spread of the self-replicating program, and to immunize
|
||
against further attack by similar viruses. Software experts
|
||
from the University of California at Berkeley, with important
|
||
contributions from the Massachusetts Institute of Technology
|
||
and other network sites, rapidly analyzed the virus and
|
||
developed immunization techniques. These same software
|
||
experts also provided important assistance in the more recent
|
||
Internet intrusion of 27-28 November. As the events unfolded,
|
||
DARPA established an ad hoc operation center to help
|
||
coordinate the activities of software experts working around
|
||
the clock and to provide information to appropriate government
|
||
officials. The operations center had three main tasks. It
|
||
facilitated communications among the many groups affected, it
|
||
ensured that government organizations were promptly informed
|
||
of developments, and it provided initial technical analysis in
|
||
DoD. Although the threat was contained quickly, a more
|
||
maliciously designed virus could have done serious damage. The
|
||
recent events serve as a warning that our necessarily
|
||
increasing reliance on computers and networks, while providing
|
||
important new capabilities, also creates new kinds of
|
||
vulnerabilities. The Department of Defense considers this an
|
||
important national issue that is of major concern in both the
|
||
defense and commercial sectors. The DoD is developing a
|
||
technology and policy response that will help reduce risk and
|
||
provide an emergency reaction response.
|
||
|
||
Q: Who will be on the CERT?
|
||
|
||
A: The CERT will be a team of over 100 experts located throughout
|
||
the U.S. whose expertise and knowledge will be called upon
|
||
when needed. When not being called upon, they will continue
|
||
their normal daily work. As noted in the release, these
|
||
experts will include: technical experts, site managers,
|
||
government action officers, industry contacts, executive-level
|
||
decision-makers and representatives from investigative
|
||
agencies. recommendations that will be acted upon by DoD
|
||
authorities.
|
||
- 159 -
|
||
|
||
|
||
Q: Is the CERT fully operational now?
|
||
|
||
A: We are in the very early stages of gathering people for the
|
||
CERT. We are first concentrating on collecting technical
|
||
experts. A staff is in place at SEI, but details are still
|
||
being worked out.
|
||
|
||
Q: Will there just be one CERT?
|
||
|
||
A: The intent is that each major computer community may decide to
|
||
establish its own CERT. Each CERT will therefore serve only a
|
||
particular community and have a particular technical
|
||
expertise. (The DARPA/SEI CERT will serve, for example, the
|
||
research community and have expertise in Berkeley-derived UNIX
|
||
systems and other systems as appropriate.) The National
|
||
Computer Security Center and the National Institute of
|
||
Standards and Technology will support the establishment of the
|
||
CERTs and coordinate among them.
|
||
|
||
Q: What are the special needs of the research community that
|
||
their CERT will serve?
|
||
|
||
A: The special challenge of the research community is improving
|
||
the level of computer security without inhibiting the
|
||
innovation of computer technology. In addition, as is often
|
||
DARPA's role, their CERT will serve as a prototype to explore
|
||
the CERT concept so that other groups can learn and establish
|
||
their own.
|
||
|
||
Q: Does the CERT Coordination Center have a press point of
|
||
contact?
|
||
|
||
A: No. Their function is to serve as a nerve center for the user
|
||
community.
|
||
|
||
.end
|
||
_________________________________________________________________
|
||
USA Today and the devil
|
||
-----------------------
|
||
|
||
Many controversies have been made of the article printed in USA
|
||
Today after Operation Sun-Devil took it's toll.
|
||
|
||
Phrack inc. tried to contact the author, and with no luck she wast
|
||
accepting phone calls. Please remember, this is only a USA Today
|
||
article -- C'mon, get real USAT.
|
||
|
||
|
||
byline 'Debbie Howlett, USA Today' reads:
|
||
|
||
A network of computer hackers operating in 14 cities -- which
|
||
bilked phone companies of $50 million -- has been unplugged, police
|
||
say.
|
||
|
||
- 160 -
|
||
|
||
|
||
"We're not talking about somebody who played Space Invaders too
|
||
many times," says Tim Holtzen, spokesman for the U.S. attorney in
|
||
Phoenix.
|
||
|
||
The hackers -- the largest such ring discovered in the USA --broke
|
||
into phone company and bank computer systems to obtain account
|
||
numbers and run up an unknown total in debts, police say.
|
||
|
||
"The main thing is the life-threatening information these computer
|
||
hackers were trying to get into," says Richard Adams of the Secret
|
||
Service. "It goes beyond being monetary to totally mischievous."
|
||
|
||
The ring was uncovered 18 months ago, when members tried and failed
|
||
to infiltrate computers at Barrows Neurological Institute in
|
||
Phoenix.
|
||
|
||
They later tried to block incoming calls to the 911 emergency
|
||
service in Chicago. The motivation? "The primary reason is as
|
||
kind of a malicious hobby." says Gary Chapman of Computer
|
||
Professionals for Social Responsibility. "People are interested in
|
||
testing their skills against security measures." But, Adams says,
|
||
"I hate to minimize it by saying it was just for kicks."
|
||
|
||
Police seized 40 computers and 23,000 disks during searches Tuesday
|
||
in 14 cities, officials said Wednesday. Five men, between the ages
|
||
of 19 and 24, have been arrested.
|
||
|
||
What's been uncovered so far, says Holtzen, may be "just the tip of
|
||
the iceberg."
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
- 161 -
|
||
|
||
|
||
THE ART OF INVESTIGATION By The Butler
|
||
|
||
There are many ways to obtain information about individuals. I am
|
||
going to cover some of the investigative means of getting the low
|
||
down on people whom you wish to know more about.
|
||
|
||
Some of the areas I will cover are:
|
||
|
||
Social Security Checks
|
||
Driving/Vehicular Records
|
||
Police Reports
|
||
FBI Records
|
||
Insurance Records
|
||
Legal Records
|
||
Credit Bureau Checks
|
||
Probate Records
|
||
Real Estate Records
|
||
Corporate Records
|
||
Freedom Of Information Act
|
||
Governmental Agency Records
|
||
Maps
|
||
Tax Records
|
||
|
||
To obtain information from some organizations or some individuals
|
||
one must be able to "BULLSHIT"!!! Not only by voice but in writing.
|
||
Many times you must write certain governmental bodies requesting
|
||
info and it can only be done in writing. I can't stress enough the
|
||
need for proper grammer and spelling.
|
||
|
||
For you to obtain certain information about another person you must
|
||
first get a few KEY pieces of info to make your investigation
|
||
easier. The persons Full Name, Social Security Number, Date &
|
||
Place of Birth will all make your search easier and more complete.
|
||
|
||
First of all in most cases you will know the persons name you want
|
||
to investigate. If not you must obtain it any way you can. First
|
||
you could follow them to their home and get their address. Then
|
||
some other time when they are gone you could look at their mail or
|
||
dig through their trash to get their Full Name. While in their
|
||
trash you might even be able to dig up more interesting info like:
|
||
Bank Accout Numbers, Credit Card Numbers, Social Security Number,
|
||
Birth Day, Relatives Names, Long Distance Calls Made, etc.
|
||
|
||
If you can't get to their trash for some reason take their address
|
||
to your local library and check it against the POLKS and COLES
|
||
Directories. This should provide you with their Full Name, Phone
|
||
Number, Address, and how long they have lived at the current
|
||
location.
|
||
|
||
You can also check the Local Phone Book, Directory Assistance,
|
||
|
||
|
||
- 162 -
|
||
|
||
|
||
City Directories, Post Office, Voter Registration, Former
|
||
Neighbors, Former Utilities (water, gas, electric, phone, cable,
|
||
etc.)
|
||
|
||
If you know someone who works at a bank or car dealer you could
|
||
have them run a credit check which will reveal all of their credit
|
||
cards and if they have ever had any late payments or applied for
|
||
any loans. If you are brave enough you could even apply for a loan
|
||
impersonating the individual under investigation The Credit Bureau
|
||
also has Sentry Services that can provide deceased social security
|
||
numbers, postal drop box address and known fraudulent information.
|
||
|
||
You can get an individuals driving record by sending a letter to
|
||
your states Department of Revenue, Division of Vehicles. You can
|
||
also get the following:
|
||
|
||
Driver Control Bureau For Driving Record send Name, Address, Date
|
||
of Birth and usually a $1 processing fee for a 5 year record.
|
||
|
||
Titles & Registration Bureau For ownership information (current and
|
||
past).
|
||
|
||
Driver License Examination Bureau To see what vision was rated.
|
||
|
||
Motor Carrier Inspection & Registration Bureau To check on
|
||
licensing and registration of trucks/trucking companies.
|
||
|
||
Revocation Dept Can verify if someone's driver's license has ever
|
||
been suspended or revoked.
|
||
|
||
You can even obtain a complete vehicle history by sending the
|
||
vehicle description, identification # for the last registered
|
||
owner, and a small fee. Send this info to your states Dept of
|
||
Vehicles. It is best to contact them first to get their exact
|
||
address and fees. I would advise using a money orders and a P.O.
|
||
Box so they cannot trace it to you without a hassle.
|
||
|
||
Police Records
|
||
|
||
All Police and Fire Records are Public record unless the city is
|
||
involved. You can usually get everything available from the police
|
||
dept including: Interviews, maps, diagrams, misc reports, etc.
|
||
|
||
|
||
FBI Records
|
||
|
||
If the individual you are inquiring about is deceased the FBI will
|
||
provide some info if you give them Full Name, SSN, Date & Place of
|
||
Birth. Contact you local FBI office to get the details.
|
||
|
||
|
||
- 163 -
|
||
|
||
|
||
Real Estate Records
|
||
|
||
Recorder of Deeds offices in each county maintain land ownership
|
||
records. Most are not computerized and you have to manually search.
|
||
Then you must review microfilm/fiche for actual deeds of trust,
|
||
quit claim deeds, assignments, mortgage, liens, etc.
|
||
|
||
A title company can run an Ownership & Equity (O&E) search for a
|
||
fee ($80-$100) which will show ownership, mortgage info,
|
||
easements, taxes owned, taxes assessed, etc.
|
||
|
||
Most county assessors will provide an address and value of any real
|
||
property if you request a search by name.
|
||
|
||
|
||
Social Security Records
|
||
|
||
Social Security Administrator
|
||
Office of Central Records Operations
|
||
300 North Greene Street
|
||
Baltimore, Maryland 21201
|
||
301-965-8882
|
||
|
||
Title II and Title XVI disability claims records, info regarding
|
||
total earnings for each year, detailed earnings information show
|
||
employer, total earnings, and social security paid for each quarter
|
||
by employer.
|
||
|
||
Prices are approximately as follows:
|
||
|
||
1st year of records $15.00
|
||
2nd-5th year of records $ 2.50 per person
|
||
6th-10th year of records $ 2.00 per person
|
||
11th-15th year of records $ 1.50 per person
|
||
16th-on year of records $ 1.00 per person
|
||
|
||
** Call for verification of these prices. **
|
||
|
||
Social Security records are a great source of information when
|
||
someone has been relatively transient in their work, or if they are
|
||
employed out of a union hall.
|
||
|
||
If you want to review a claim file, direct your request to the
|
||
Baltimore office. They will send the file to the social security
|
||
office in your city for you to review and decide what you want
|
||
copies of.
|
||
|
||
The first three digits of a social security number indicate the
|
||
state of application.
|
||
|
||
|
||
|
||
|
||
- 164 -
|
||
|
||
|
||
The Social Security Number
|
||
|
||
SSA has continually emphasized the fact that the SSN identifies a
|
||
particular record only and the Social Security Card indicates the
|
||
person whose record is identified by that number. In no way can the
|
||
Social Security Card identify the bearer. From 1946 to 1972 the
|
||
legend "Not for Identification" was printed on the face of the
|
||
card. However, many people ignored the message and the legend was
|
||
eventually dropped. The social security number is the most widely
|
||
used and carefully controlled number in the country, which makes it
|
||
an attractive identifier.
|
||
|
||
With the exception of the restrictions imposed on Federal and some
|
||
State and local organizations by the Privacy Act of 1974,
|
||
organizations requiring a unique identifier for purposes of
|
||
controlling their records are not prohibited from using (with the
|
||
consent of the holder) the SSN. SSA records are confidential and
|
||
knowledge of a person's SSN does not give the user access to
|
||
information in SSA files which is confidential by law.
|
||
|
||
Many commercial enterprises have used the SSN in various
|
||
promotional efforts. These uses are not authorized by SSA, but SSA
|
||
has no authority to prohibit such activities as most are not
|
||
illegal. Some of these unauthorized uses are: SSN contests;
|
||
skip-tracers; sale or distribution of plastic or metal cards;
|
||
pocketbook numbers (the numbers used on sample social security
|
||
cards in wallets); misleading advertising, commercial enterprises
|
||
charging fees for SSN services; identification of personal
|
||
property.
|
||
|
||
The Social Security Number (SSN) is composed of 3 parts,
|
||
XXX-XX-XXXX, called the Area, Group, and Serial. For the most
|
||
part, (there are exceptions), the Area is determined by where the
|
||
individual APPLIED for the SSN (before 1972) or RESIDED at time of
|
||
application (after 1972). The areas are assigned as follows:
|
||
|
||
000 unused 387-399 WI 528-529 UT
|
||
001-003 NH 400-407 KY 530 NV
|
||
004-007 ME 408-415 TN 531-539 WA
|
||
008-009 VT 416-424 AL 540-544 OR
|
||
010-034 MA 425-428 MS 545-573 CA
|
||
035-039 RI 429-432 AR 574 AK
|
||
040-049 CT 433-439 LA 575-576 HI
|
||
050-134 NY 440-448 OK 577-579 DC
|
||
135-158 NJ 449-467 TX 580 VI Virgin Islands
|
||
159-211 PA 468-477 MN 581-584 PR Puerto Rico
|
||
212-220 MD 478-485 IA 585 NM
|
||
221-222 DE 486-500 MO 586 PI Pacific Islands*
|
||
223-231 VA 501-502 ND 587-588 MS
|
||
232-236 WV 503-504 SD 589-595 FL
|
||
237-246 NC 505-508 NE 596-599 PR Puerto Rico
|
||
247-251 SC 509-515 KS 600-601 AZ
|
||
|
||
- 165 -
|
||
|
||
|
||
252-260 GA 516-517 MT 602-626 CA
|
||
261-267 FL 518-519 ID *Guam, American Samoa,
|
||
268-302 OH 520 WY Northern Mariana Islands,
|
||
303-317 IN 521-524 CO Philippine Islands
|
||
318-361 IL 525 NM
|
||
362-386 MI 526-527 AZ
|
||
627-699 unassigned, for future use
|
||
700-728 Railroad workers through 1963, then discontinued
|
||
729-899 unassigned, for future use
|
||
900-999 not valid SSNs, but were used for program purposes
|
||
when state aid to the aged, blind and disabled was
|
||
converted to a federal program administered by SSA.
|
||
|
||
As the Areas assigned to a locality are exhausted, new areas from
|
||
the pool are assigned. This is why some states have non-contiguous
|
||
groups of Areas. The Group portion of the SSN has no meaning other
|
||
than to determine whether or not a number has been assigned. SSA
|
||
publishes a list every month of the highest group assigned for each
|
||
SSN Area. The order of assignment for the Groups is: odd numbers
|
||
under 10, even numbers over 9, even numbers under 9 except for 00
|
||
which is never used, and odd numbers over 10. For example, if the
|
||
highest group assigned for area 999 is 72, then we know that the
|
||
number 999-04-1234 is an invalid number because even Groups under
|
||
9 have not yet been assigned.
|
||
|
||
The Serial portion of the SSN has no meaning. The Serial is not
|
||
assigned in strictly numerical order. The Serial 0000 is never
|
||
assigned.
|
||
|
||
Before 1973, Social Security Cards with pre-printed numbers were
|
||
issued to each local SSA office. The numbers were assigned by the
|
||
local office. In 1973, SSN assignment was automated and
|
||
outstanding stocks of pre-printed cards were destroyed. All SSNs
|
||
are now assigned by computer from head-quarters. There are rare
|
||
cases in which the computer system can be forced to accept a manual
|
||
assignment such as a person refusing a number with 666 in
|
||
it.
|
||
|
||
A pamphlet entitled "The Social Security Number" (Pub. No.05-10633)
|
||
provides an explanation of the SSN's structure and the method of
|
||
assigning and validating Social Security numbers.
|
||
|
||
|
||
Tax Records
|
||
|
||
If you can find out who does the individuals taxes you might be
|
||
able to get copies from them with the use of creative social
|
||
engineering. If you want to run a tax lien search there is a
|
||
service called Infoquest. 1-800-777-8567 for a fee. Call with a
|
||
specific request.
|
||
|
||
|
||
- 166 -
|
||
|
||
|
||
Post Office Records
|
||
|
||
If you have an address for someone that is not current, always
|
||
consider writing a letter to the postmaster of whatever post
|
||
office branch services the zip code of the missing person. Provide
|
||
them the name and the last known address and simply ask for the
|
||
current address. There might be a $1 fee for this so it would be
|
||
wise to call first. City Directory, Polk's, Cole's, etc.
|
||
Information in these directories is contained alphabetically by
|
||
name, geographically by street address, and numerically by
|
||
telephone number, so if you have any of those three pieces of info,
|
||
a check can be done. The Polk's directory also shows whether the
|
||
person owns their home or rents, their marital status, place of
|
||
employment, and a myriad of other tidbits of information. However,
|
||
these books are not the be-all and end-all of the information as
|
||
they are subject to public and corporate response to surveys. These
|
||
directories are published on a nationwide basis so if you are looking
|
||
for someone outside of your area, simply call the public library in
|
||
the area you have an interest and they also can perform a crisscross
|
||
check for you.
|
||
|
||
You can also call a service owned by Cole's called the National
|
||
Look up Library at 402-473-9717 and either give a phone number and
|
||
get the name & address or give the address and get the name and
|
||
phone number. This is only available to subscribers, which costs
|
||
$183.00 dollars for 1991. A subscriber gets two free lookups per
|
||
day and everyone after that costs $1.25. A subscriber can also
|
||
mail in a request for a lookup to:
|
||
|
||
National Look Up Library
|
||
901 W. Bond Street
|
||
Lincoln, NE 68521-3694
|
||
|
||
A company called Cheshunoff & Company can, for a $75 fee, obtain a
|
||
5-year detailed financial analysis of any bank.
|
||
|
||
505 Barton Springs Road
|
||
Austin, Texas 78704
|
||
512-472-2244
|
||
|
||
Professional Credit Checker & Nationwide SSN-locate.
|
||
|
||
!Solutions! Publishing Co.
|
||
8016 Plainfield Road
|
||
Cincinnati, Ohio 45236
|
||
513-891-6145
|
||
1-800-255-6643
|
||
|
||
Top Secret Manuals
|
||
|
||
|
||
|
||
- 167 -
|
||
|
||
|
||
Consumertronics
|
||
2011 Crescent Drive
|
||
P.O. Drawer 537-X
|
||
Alamogordo, New Mexico 88310
|
||
505-434-0234
|
||
|
||
|
||
Federal Government Information Center is located at
|
||
|
||
1520 Market Street
|
||
St. Louis, Missouri
|
||
1-800-392-7711
|
||
|
||
|
||
U.S. Dept of Agriculture has located aerial photos of every inch of
|
||
the United States.
|
||
|
||
2222 West 2300 S.
|
||
P.O. Box 36010
|
||
Salt Lake City, Utah 84130
|
||
801-524-5856
|
||
|
||
To obtain general information regarding registered agent,
|
||
principals, and good standing status, simply call the Corporate
|
||
Division of the Secretary of State and they will provide that
|
||
information over the phone. Some corporate divisions are here:
|
||
|
||
Arkansas Corporate Division 501-371-5151
|
||
Deleware Corporate Division 302-736-3073
|
||
Georgia Corporate Division 404-656-2817
|
||
Indiana Corporate Division 317-232-6576
|
||
Kansas Corporate Division 913-296-2236
|
||
Louisiana Corporate Division 504-925-4716
|
||
Missouri Corporate Division 314-751-4936
|
||
New York Corporate Division 518-474-6200
|
||
Texas Corporate Division 512-475-3551
|
||
|
||
|
||
Freedom Of Information
|
||
The Freedom of Information Act allows the public to request
|
||
information submitted to, or generated by, all executive
|
||
departments, military departments, government or government
|
||
controlled corporations, and regulatory agencies. Each agency, as
|
||
described above, publishes in the Federal Register, descriptions
|
||
of its central and field organizations and places where and how
|
||
requests are to be directed. Direct a letter to the appropriate
|
||
person designated in the Federal Register requesting reasonably
|
||
described records be released to you pursuant to the Freedom of
|
||
Information Act. Be sure to follow each agency's individually
|
||
published rules which state the time, place, fees, and procedures
|
||
for the provisions of information. The agency should promptly respond.
|
||
|
||
|
||
- 168 -
|
||
|
||
|
||
How to Find Information About Companies, Ed. II, 1981, suggests,
|
||
"Government personnel you deal with sometimes become less helpful
|
||
if you approach the subject by threatening the Freedom of
|
||
Information Act action - it's best to ask for the material
|
||
informally first." While this will probably enable you to find
|
||
the correct person to send your request to, be prepared to spend
|
||
at least half an hour on the phone talking to several people before
|
||
you find the person who can help you. The book also has a brief
|
||
description of what each governmental agency handles.
|
||
|
||
If you want to see if someone you are trying to locate is a
|
||
veteran, has a federal VA loan, or receives some sort of disability
|
||
benefit, use Freedom of Information and provide the person's SSN.
|
||
|
||
You will get a bill but you can ask for a fee waiver if this
|
||
contributes to a public understanding of the operation of the
|
||
government. You can also request an opportunity to go through the
|
||
files yourself and then decide what you want copied.
|
||
|
||
|
||
Insurance Records
|
||
|
||
PIP carrier records (may contain statements, medical records, new
|
||
doctors/hospital names, records of disability payments, adjuster's
|
||
opinions, applications for insurance coverage, other claim info,
|
||
etc.)
|
||
|
||
Health insurance records (may contain medical records, record of
|
||
bills, new doctors/hospital names, pre-existing conditions
|
||
information, info regarding other accidetns/injuries, etc.)
|
||
|
||
Often you will have to go through the claims office, the
|
||
underwriting dept, and the business office to get complete records
|
||
as each individual dept maintains its own seperate files.
|
||
|
||
Workers Compensation
|
||
|
||
Some states will let you simply request records. Just submit your
|
||
request including the SSN and Birthdate, to the Department of Human
|
||
Resources, Division of Worker's Compensation. They will photocopy
|
||
the records and send you the copies. Other states require an
|
||
authorization to obtain these records.
|
||
|
||
You can always call your local Private Investigator pretending you
|
||
are a student doing a research paper on the methods of getting
|
||
personal information about people or even trash his place to find
|
||
tips on tracking down people.
|
||
|
||
|
||
|
||
|
||
|
||
- 169 -
|
||
|
||
|
||
Frankie's Fireside Phreak Primer
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
A few words of advice that apply to phreaks every-where. Whether
|
||
a telecom veteran, or a K0dez Kid, the following guidelines may
|
||
keep you out of trouble and make life in the Computer Underground
|
||
a little more pleasant. Brought to you by the CULT, o'course.
|
||
|
||
|
||
>> A CULT Publication by High Priest and Scribe, Franken Gibe <<
|
||
-cDc- Cult of the Dead Cow Dissemination Council -cDc-
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=I
|
||
think we could all use a little refresher on Phreak Safety and
|
||
Hygiene. It seems that phreaks are getting more and more
|
||
careless...and it's when you think you can't get caught
|
||
that...yeah: You do. Most of you know these, or think about them
|
||
occasionally, but try to put the following stuff into practice. A
|
||
Safe Phreak is an Informed Phreak; A Safe Phreak is a Phreak who
|
||
Respects the Telecom Medium. Those are trite epigrams, but very
|
||
true.
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
1) Due to the proliferation of Traffic Pattern Monitoring software
|
||
among independent carriers, it is DEADLY to scan. If you must
|
||
scan, NEVER use big name IC's (notably MCI [Real Time Toll Fraud
|
||
Detection System], U.S. Sprint [those 950's are NOT fun-and-games],
|
||
etc). If you MUST scan, remember these few commandments:
|
||
|
||
A) Thou shalt never scan sequencially.
|
||
B) Thou shalt never scan in predictable or detectable patterns.
|
||
C) Thou shalt never scan a single access port all night, in
|
||
closely-spaced increments. Best not to scan. Best to have
|
||
some little kid who doesn't know you scan.
|
||
|
||
2) Alternate codes as MUCH as you can. Using a code-a-call isn't
|
||
a bad idea if you have those kinds of resources. Coupled with
|
||
the no-scanning doctrine, though, notebooks full of codes will
|
||
not be so common.
|
||
|
||
3) This is the important corollary to number 2...NEVER EVER EVER
|
||
overuse codes, nor use codes that you've abused earlier in a
|
||
given month later on in the same month (generally, after the
|
||
20th, when d'bills start to roll out).
|
||
|
||
4) Do as MUCH remote phreaking as is humanly possible. If you can
|
||
roll your computer out to some fortress fone, and hook up an
|
||
acoustic coupler, AND not attract attention...Go for it.
|
||
(Heck, I'd do it!)
|
||
|
||
5) Local access ports and AT&T WATS access ports are generally
|
||
safer than 950's. WATS #'s owned by Ind. Carriers are DEADLY.
|
||
Here's a little list of advantages and disadvantages of all
|
||
the above...
|
||
- 170 -
|
||
|
||
|
||
A) Local Access Ports: Depending on the size of the LDS, these
|
||
ports can be more or less safe. Almost NEVER have any sort
|
||
of ANI hooked up, but if abuse becomes notable, they CAN
|
||
install an incoming trap, discover a phreak's Central Office
|
||
Code, and then put an outgoing trap in his CO. After that,
|
||
it's only a matter of time. Traffic Pattern software can
|
||
give an LDS a good idea of what action it needs to take.
|
||
|
||
B) AT&T WATS numbers: Not a free ride by ANY means, but
|
||
generally pretty safe. According to No Severance, AT&T WATS
|
||
lines receive no ANI information. Like the local ports, the
|
||
area from which a phreak is calling can be determined, but
|
||
abuse would have to be pretty dramatic. Between local and
|
||
AT&T WATS, I'd take WATS ("But what about the 800 Excessive
|
||
Calling List?" Well, if it exists, then it's best not to use
|
||
WATS too much...i.e. Do NOT Scan).
|
||
|
||
C) Most 950's are safe, contrary to popular belief. There are a
|
||
number of Feature Groups into which these numbers fall. I
|
||
don't really remember what they are, and it doesn't really
|
||
matter. I just wouldn't be too anxious to use these 'cause
|
||
they're sorta bizarre, and they're VERY abused (never a good
|
||
thing). But if you must, it's better than...
|
||
|
||
D) Independent Carrier-Owned WATS numbers: God, DO NOT use
|
||
these. When an IC owns its own carrier, it receives KP + II
|
||
+ 10Dig (YOUR phone number) + ST. In other words, these guys
|
||
are generally ANI equipped. How can you tell? Well, if
|
||
you've got an 800 access port, and the exchange is NXX
|
||
(i.e., you've got a number :1-800-NXX-XXXX), then FIRST dial
|
||
1-800-NXX-0000. If you get the "You have reached the AT&T
|
||
Long Distance Network" recording, the # is AT&T. If you get
|
||
a "Your call cannot be completed " recording, DO NOT use
|
||
that WATS number. Simple.
|
||
|
||
6) [or whatever number...sigh] PLEASE...for your own good, and
|
||
that of Phreakdom, DO NOT advertise what you do. Yeah, some
|
||
kids at school might think it's pretty k-radical. Those same
|
||
kids are the ones to nark, or to mention stuff to the friendly
|
||
administrators should they ask around. The less non-phreaks
|
||
know the better. Keep your MOUTH SHUT.
|
||
|
||
That reminds me of poor Disk Demon [of 915]. The kid really wasn't
|
||
expecting trouble, but he made the fatal mistake of talking:
|
||
probably to someone he trusted, and probably he didn't say much.
|
||
All he mentioned was bringing a pirated disk to school the next day
|
||
over the phone which was all the cops needed to search his house,
|
||
and bam...they have him with telecom fraud evidence. The cops don't
|
||
need much to get a warrant to monitor your telfo. It's a scary
|
||
reality in a nation that takes less and less seriously the Bill of
|
||
Rights.
|
||
|
||
|
||
- 171 -
|
||
|
||
|
||
8) NEVER phreak voice calls. Sigh. I know, I'm sure there are a
|
||
thousand screams of "Oh, COME ON, that's going too far". Okay,
|
||
let me qualify that, then. Voice-phreak only if you're 1) sure
|
||
you're not monitored (and who is ever sure?) and 2) know that
|
||
the recipient can handle possible threats and unpleasantness
|
||
from the friendly operator who may give him a buzz. Feds and
|
||
investigators ain't stupid...or at least, not THAT stupid. As
|
||
long as no one admits anything, it's okay. But the minute you
|
||
start voice-phreaking, you open a lot of loose ends. Some
|
||
suggestions, then, for voice phreaking:
|
||
|
||
A) Try to remain anonymous. Not too hard.
|
||
B) IF you're talking to strangers, don't mention where you're
|
||
calling from, much less leave a number. Yeah, just common
|
||
sense.
|
||
C) Don't talk about phreaking over the line if you don't think
|
||
the line is secure. Duh!
|
||
D) If you trust the kid you're calling, tell him you've
|
||
phreaked a call to him. Ask him if it's "cool". Make sure he
|
||
can handle possible (and usually improbable) inquiries. Make
|
||
sure his 'rents know NOTHING.
|
||
|
||
9) That's another thing. This doesn't have to do with safe
|
||
phreaking, but with keeping phreaks safe. Know what you'll say
|
||
if you ever get called by an operator or investigator type. If
|
||
you have a bbs or data line, great. If not, have a story ready
|
||
and rehearsed. When you think about it, it IS kinda hard for
|
||
these people to believe that you don't know WHO called you for
|
||
5 hours last Sunday night...be prepared. (Ee! Boy scouts
|
||
rule.)
|
||
|
||
|
||
This file was just to be a short set of definitions for those of
|
||
you who don't know all the phreaking terms. This was requested by
|
||
a few people on a small 312 board called The Magnetic Field Elite
|
||
(312-966-0708, call, board has potential) like The Don. But I have
|
||
decided against making this small file that is common in many
|
||
places but instead to make something that I have never
|
||
seen before. Not just a common file but one of high technical use.
|
||
With a printout of this you will never need to missout on a
|
||
definition again. But that's not all. The file will discuss,
|
||
indepth, the working of each of these operations below. If you are
|
||
viewing this file simply for the sake of finding one meaning I
|
||
suggest that you get the entire thing and then never need to call
|
||
and view phreak files again.
|
||
|
||
Topic 1: The Phone/Modem
|
||
|
||
Scince phreaking is impossible without a phone or modem you I will
|
||
start with the most important and most complex part of phreaking.
|
||
The Phone. Now, the phone is a device that transfer sounds as
|
||
sound enters a receiver, is transfered to an amount of
|
||
|
||
- 172 -
|
||
|
||
|
||
voltage, sent through the telephone lines and decode back to sound.
|
||
A modem is based on a universal language of sounds transfered
|
||
through the modem. Modem stands for the work
|
||
Modulator/Demodulator. This is like receiveing and sending. Now,
|
||
with most modems, before connecting, tones just are just the same
|
||
as the tones that a common phone can make. But the phone can make
|
||
many tones and some have purposes that are very useful, tones that
|
||
are reserved for At&t, and thus dangerous. To go through all the
|
||
tone would be senseless and a book on tones alone could be written
|
||
(Hmm...maybe I could...) so I will not go into that. But, assuming
|
||
that you know what a box is I will explain what the odd types of
|
||
modems can do. If you own an Apple Cat modem you may use it to
|
||
generate any tone. This is very useful. Some people are against
|
||
the Cat for various. I will remain neutral on the topic but if you
|
||
have no understand then phreak the way you see easiest and safest.
|
||
The ther way is by using an acoustic modem. You may modify a phone
|
||
to make certain tones and you may make then send these tones through
|
||
the acoustic modem by placing the headset of the phone on the
|
||
acoustic's couplers. You may also attempt to make the box
|
||
modfications directly to the modem but if you error and damage the
|
||
modem alot of money is wasted while you could have used an acoustic
|
||
and messed up a twenty dollar phone. Basicaly the common phone can
|
||
make 18 tones. For example, when you press a number on the phone two
|
||
tones are made together and make the signal for the number or charater
|
||
you hit. This is the entire phone to line explantion of the phone.
|
||
Now the actual internal working of the phone is very complex and can be
|
||
best under stood by getting a book from the library on it.
|
||
|
||
Topic 2: The Calling of Numbers
|
||
|
||
When you call a local number as soon as you hit a number other
|
||
than one you the phone knows that you are calling localy. Once
|
||
seven digits are entered the numbers are sent to the nearest
|
||
switching station and you call goes out. The station deter mines
|
||
the units per minute and start billing as soon as the called phone
|
||
answers. All calls are automaticaly one minute long. If you hit
|
||
a one as the first digit you dial the phone recignizes this as a
|
||
long distance call and sends you to either the At&t switching
|
||
station or to another long distance service if you have chose to
|
||
use other than At&t. If you are using a At&t the call goes through
|
||
the long distance switching station where unit per minute is
|
||
determined and then it is refured to the number you called. The
|
||
call may be slowed down depending on how many times the switching
|
||
station changes between you and the place you are calling. If it
|
||
changes between ESS and X-Bar (described below) one it would go through
|
||
fast. If it changed between them 50 times it would be a very slow
|
||
call going through. Plus the sound quality may decrease but that is
|
||
not a fact, just an understanding I have come to when callign long
|
||
distance with At&t. If you are calling through any other service,
|
||
such as MCI, Alnet, Teleco, US Sprint or any of the other endless
|
||
companies,
|
||
|
||
|
||
- 173 -
|
||
|
||
|
||
then things are not the same for long distance calls. You call
|
||
first goes to the company you call through and price of call is
|
||
determined by any of the ways a company determines price. The call
|
||
then goes out through the lines to the long distance companie's
|
||
station nearest to the number you dialed and tres to
|
||
go though. If the number is too far away from a station you may
|
||
get a "The number you have dialed cannot be reached from your
|
||
calling area." Thus, you have the basic information of how call
|
||
goes out. Now to get to phreaking and the real reson you read this
|
||
file.
|
||
|
||
Topic 3: The Long Distance Company and Codes.
|
||
|
||
The way of using a different long distance company or not paying a
|
||
quarter when calling from a payphone. Using the phone card or the
|
||
code.Names for these numbers: 950's, 800's, Extenders, PBX's, 950
|
||
ports, Port, Code port, (Company name) port
|
||
|
||
The above mentioned names are the phreaks lifeline. They are
|
||
places where you call and enter a code, then the area code of the
|
||
place you want to call and finally the number for the place you
|
||
want to call. When the code is entered it is checked if it is
|
||
valid and then the person how owns the code pays for the call. If
|
||
the code is not valid you normaly get a message saying that the
|
||
code you entered is not valid. When a call goes through it is the
|
||
same as a normal long distance call except that it is charged to
|
||
the owner of the card. Some places may require that you enter a
|
||
nine or a one before you enter the code. Now, the phreak uses these
|
||
places by calling them over and over again until they get a code.
|
||
But they do this with a computer and a program such as
|
||
Hack-a-Matic, Hacking Construction Set (often called HCS), Hack
|
||
This Buddy, Intellihacker (Old), C at-(and then a name, for the
|
||
Apple Cat. Has to many names to list), and some others. These are
|
||
all Apple programs but there are also code hackers for the Commodor
|
||
64, 128, Amiga, IBM (of course) and so on. Most computers have
|
||
them. One thing I have found useful is to use a Radio Shack
|
||
portable computer with a built in modem and hack from other houses,
|
||
this is much safer. Secrity in these companies run from really
|
||
tough (MCI) to sad (like the places that tryo to scare off hackers
|
||
with tape recordings). 950 ports in the ESS area are set up to
|
||
trace and could do so very easily but for some reson they are against
|
||
it. Possibly the time and modey to cheack the calls and pay for
|
||
tracing. Places have gotton tougher though, if three people get
|
||
busted off a number in one week and this has never happened before
|
||
then you can almost be sure that they have stepped up security and
|
||
that it is time to use a new port.
|
||
|
||
Now I will discuss some of the things used by the Phreak.
|
||
|
||
Topic 4: The Loop
|
||
|
||
|
||
|
||
- 174 -
|
||
|
||
|
||
Loops, although they may seem fun they are really rather useless.
|
||
They work as follows. Two numbers are looped together. Usually
|
||
they are almost the same just a digit different from one another.
|
||
If you call the lower number you will wait a few secounds and then
|
||
hear a 1000mhz. tone. If you call the higher number you will hear
|
||
nothing. If you can one number (dosen't matter which) and someone
|
||
else calls the other number you will be able to talk to each other.
|
||
The purpose of these is to test trunk lines. This way they could
|
||
make sure there was no break in each trunk. Now the old purpose
|
||
for loops was that they where free to call so one person would call
|
||
one and another would call the other and they would get to talk for
|
||
free. Also, one person might call one number and just wait and talk
|
||
to whoever called the other number. Like a two line bridge. Today you
|
||
cannot call these without being charged because the phone company
|
||
caught on. But you can split a phone call with these so if there
|
||
is a loop between you and a person you want to talk to you can only
|
||
pay for half by calling the loop. And the phone company dosen't care
|
||
because either way they get their money. The billing service for a
|
||
loop is one all by itself, not like normal local calling and for this
|
||
reson I might almost belive the rumor that Blue Box tones can be used
|
||
to call loops. The loops billing service didn't exist awhile back so a
|
||
call to one was free. Now, if you call this new billing system picks
|
||
it up. But the loops billing system is just something that At&t
|
||
scraped together and there are most likly some holes in the system
|
||
(like not recording blue box tone generation numbers).
|
||
|
||
Topic 5: The Diverter
|
||
|
||
The diverter has been a very simple, yet incredibly usefulthing
|
||
through the years. To use one you must call, after hours and let
|
||
someone answer the phone, don't answer them, let them hang up and
|
||
get a faint dialtone. Then you dial again and call from the
|
||
diverter. Before, you could use a diverter and call through it.
|
||
The you would only be charged for the call to the diverter, not the
|
||
one after it. That bill went to the diverter itself. But they fix
|
||
this problem easily and now you still get charged if you are in the
|
||
ESS area. Also before, you could use a diverter to call a number
|
||
that traces and instead of being traced to your number it is traced
|
||
to the diverter. But ESS eliminated that too. But you can still
|
||
use a diverter to call hard to reach numbers. Like if you called
|
||
a place and it gave you a "The number you have dial cannot be reach
|
||
from your calling area" then if you knew of a diverter in the area
|
||
of the number you could call through it to the unreachable number
|
||
and get through. The way a diverter works is after hours when you
|
||
call a place the call is forwarded to another place. Then, when
|
||
you don't answer the person at the other place hangs up and your
|
||
call tries to disconnect from the forwared number and you end up
|
||
at the diverter with it's dialtone.
|
||
|
||
|
||
|
||
- 175 -
|
||
|
||
|
||
HACKING TYMNET
|
||
|
||
AS MOST OF YOU ALREADY KNOW, TYMNET IS AN INFORMATION SYSTEM
|
||
ACCESSABLE BY COMPUTERS WITH MODEMS FROM ALMOST ANYWHERE IN THE
|
||
COUNTRY. TYMNET INCLUDES MANY SUB-SYSTEMS OF INFORMATION WHICH CAN
|
||
BE USEFUL FOR BUSINESSES OR JUST PHUN. ONE SUB-SYSTEM WHICH I WILL
|
||
WRITE A SEPARATE ARTICLE ON IS THE ATPCO'S ELECTRONIC TARIFF
|
||
SYSTEM. BUT FOR NOW, I'LL MAKE ALL OF YOU EXPERTS IN TYMNET SO YOU
|
||
CAN HAVE AS MUCH PHUN AS YOURS TRUELY.
|
||
|
||
ACCESS NUMBERS
|
||
--------------
|
||
FOR YOUR LOCAL ACCESS NUMBER YOU COULD CALL THE NICE PERSON AT
|
||
800-336-0149 AND REQUEST IT FOR YOUR AREA. IF YOU LIVE NEAR A
|
||
METROPOLITAN AREA ASK FOR THAT AREA CODE SINCE THEY RARELY HAVE
|
||
ACCESS NUMBERS FOR OUT-OF-CITY AREAS. FOR THOSE OF YOU IN THE 914
|
||
AREA YOU CAN USE: POUGHKEEPSIE : 914-473-0401 WHITE PLAINS :
|
||
914-684-6075
|
||
|
||
LOGGING IN TO TYMNET
|
||
--------------------
|
||
1. WHEN YOU HAVE CONNECTED WITH THE NETWORK, THE FOLLOWING REQUEST
|
||
WILL BE DISPLAYED: PLEASE TYPE YOUR TERMINAL IDENTIFIER ENTER YOUR
|
||
TERM.IDENTIFIER ACCORDING TO THE FOLLOWING CHART:
|
||
|
||
KEY: IDENT = IDENTIFIER
|
||
ASC = ASCII
|
||
EBCD = EBCD CORRESPONDENCE
|
||
<R> = CARRIAGE RETURN
|
||
|
||
SPEEDS ARE GIVEN IN CPS (CHARACTERS PER SECOND). TO TRANSLATE TO
|
||
BAUD RATE JUST MULTIPLY BY 10.
|
||
|
||
IDENT CODE SPEED TERMINAL TYPE
|
||
----- ---- ----- -------------
|
||
A ASC 30,120 PERSONAL COMP.
|
||
WITH CRT
|
||
|
||
[ MOST EVERYBODY AT HOME WILL USE THIS OPTION SO IF YOU AREN'T SURE
|
||
USE A ]
|
||
|
||
B ASC 15 ALL TERMINALS
|
||
C ASC 30 IMPACT PRINTMRS
|
||
D ASC 10 ALL TERMINALS
|
||
E ASC 30 THERMAL PRINTERS
|
||
F ASC 15 IN BETA TERMINALS
|
||
30 OUT
|
||
G ASC 30,120 BELT PRINTERS
|
||
G.E. TERMINET
|
||
I ASC 120 MATRIX PRINTERS
|
||
P<R> EBCD 14.8 SELECTRIC-TYPE
|
||
TERMINALS (E.G., 2741)
|
||
|
||
- 176 -
|
||
|
||
|
||
IF THE MESSAGE DOES NOT APPEAR JUST WAIT A FEW SECONDS THEN ENTER
|
||
IT. NOTE THAT ONLY P IDENTIFIERS NEED A <R> THEM BUT SINCE MOST
|
||
OF YOU WON'T BE USING P FORGET IT.
|
||
|
||
2. TYMNET WILL THEN DISPLAY THE NUMBER OF THE REMOTE ACCESS NODE TO
|
||
WHICH YOU ARE CONNECTED, FOLLOWED BY THE NUMBER OF YOUR PORT ON THE
|
||
NODE, AND WILL DISPLAY THIS REQUEST:
|
||
|
||
-NNNN-PPP-
|
||
PLEASE LOG IN:
|
||
|
||
3. TYPE YOUR USER NAME AND <R> THIS USER NAME SEEMS TO BE THE
|
||
ABBREVIATION FOR THE COMPANY WHO OWNS THE SUB-SYSTEM. FOR EXAMPLE,
|
||
FOR ELECTRONIC TARIFF THE USER NAME
|
||
IS ATP WHICH STANDS FOR AIRLINE TARIFF PUBLISHING, THE COMPANY THAT
|
||
RUNS THE ELECTRONIC TARIFF.
|
||
|
||
4. TYMNET WILL THEN REQUEST:
|
||
|
||
PASSWORD:
|
||
|
||
TYPE YOUR PASSWORD AND <R>. THE PASSWORD MAY NOT BE DISPLAYED ON
|
||
YOUR SCREEN.
|
||
|
||
5. TYMNET WILL THEN DISPLAY SOME CHARACTER OR MESSAGE INDICATING
|
||
THAT YOU HAVE LOGGED ON. SINCE BUSINESSES DON'T REALLY GET
|
||
COMPLICATED WITH PASSWORDS AND THE SUCH, JUST ENTER VALID USER
|
||
NAMES AND FOR PASSWORDS YOU CAN FORGET CTRL-CHARACTERS... PASSWORDS
|
||
HAVE A LENGTH OF 8 CHARACTERS (AS FAR AS I KNOW).
|
||
|
||
TYMNET CONTROL CHARACTERS
|
||
-------------------------
|
||
|
||
CTRL-CHAR OPERATION
|
||
-------- ---------
|
||
H HALF-DUPLEX
|
||
P EVEN PARITY
|
||
R ALLOWS THE TERMINAL TO
|
||
CONTROL THE INCOMING FLOW
|
||
OF DATA WITH X-ON/OFF
|
||
CHARACTERS (SEE BELOW)
|
||
S X-OFF CHARACTER
|
||
Q X-ON CHARACTER
|
||
|
||
ACCESSING DATAPAC
|
||
-----------------
|
||
THE STANDCRD PROCEDURE FOR ACCESSING A HOST ON THE DATAPAC NETWORK
|
||
IS DESCRIBED BELOW. TYMNET'S INFORMATION DIRECTORY INCLUDES FILES
|
||
OF MATERIAL ABOUT DATAPAC AND TYMNET'S INTERNATIONAL SERVICES.
|
||
|
||
|
||
|
||
- 177 -
|
||
|
||
|
||
LOGGKNG IN TO DATAPAC
|
||
---------------------
|
||
1. DIAL-UP TYMNET (SEE ABOVE)
|
||
|
||
2. ENTER YOUR TERMINAL IDENTIFIER
|
||
|
||
3. AT THE "PLEASE LOG IN:" PROMPT, ENTER THE LOG-IN COMMAND,
|
||
SPECIFYING: THE DATAPAC NETWORK (DPAC), A SEMICOLON (A SECOND
|
||
SEMICOLON WILL ECHO AT YOUR END) , THE DATAPAC NETWORK
|
||
IDENTIFICATION CODE (3020), THE 8-DIGIT HOST ADDRESS AND <R>.
|
||
|
||
E.G., DPAC;;3020HOST ADDRESS <R>
|
||
|
||
IF YOU NEED TO ENTER FUTHER USER DATA ENTER A COLON AFTER THE HOST
|
||
ADDRESS THEN A <R>.
|
||
|
||
E.G., DPAC;;3020HOST ADDRESS:USER DATA <R>
|
||
|
||
5. DATAPAC WILL THEN DISPLAY A MESSAGE OR CHARACTER TO SHOW THAT
|
||
YOU ARE ON-LINE.
|
||
|
||
THIS LITTLE BIT OF INFORMATION SHOULD GET SOME OF YOU GOING. MY
|
||
EXPERIENCES WITH TYMNET HAVE BEEN MAINLY RESTRICTED TO THE ATPCO
|
||
SYSTEM SO COMMANDS MAY DIFFER.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
- 178 -
|
||
|
||
|
||
THE PHREAKER'S HANDBOOK #1 by Phortune 500
|
||
----------------------------------------------
|
||
a useful source for the phreaker covering both the basics and
|
||
advances of phreaking
|
||
|
||
GENERAL NOTE
|
||
------------
|
||
The purpose of this newsletter is purely educational. It has been
|
||
released in order to teach and advance the knowledge of today's
|
||
declining phreaks. However, the author does not take any
|
||
responsibility over the misuse of the herein contained
|
||
information, and the newsletter itself does not encourage or
|
||
support the above type of activity. Also, any wrong or old
|
||
information in this document is not to the responsibility of the
|
||
author, and the reader accepts any consequences due to information
|
||
that may be mistaken in this manner.
|
||
|
||
|
||
NOTE TO ABUSERS
|
||
---------------
|
||
All information contained within this document was intended towards
|
||
educational purposes. Any misuse or illegal use of the information
|
||
contained in this document is strictly at the misuser's risk. The
|
||
author assumes NO responsibility of the reader's actions following
|
||
the release this document (in otherwords, you're on your own if you
|
||
get nailed!)
|
||
|
||
TPH Issue #1, Volume 1 Release Date::July 3, 1989
|
||
|
||
Introduction To TPH #1
|
||
======================
|
||
This phile was written for beginning as well as those
|
||
uninformed "advanced" phreaks who need something as a
|
||
reference when reading or writing philes concerning phreaking or
|
||
fone phraud. Of course, you could be a beginning phreak and use
|
||
this phile to B.S. your way into a big group by acting like you
|
||
know a lot, or something, but that is up to you. Anyway, I
|
||
compiled this listing phrom various sources, the majority is
|
||
listed as references at the end of this phile.
|
||
|
||
This phile's only goal is to educate and inform. Any
|
||
illegal or fraudulent activity is neither encouraged nor
|
||
supported by the author of this phile, not by the majority of
|
||
the >TRUE< phreaking community. The author assumes NO
|
||
responsibility for the actions of the reader.
|
||
|
||
Also, I know that some of the stuff covered in this release of
|
||
TPH will be old and outdated; however, I will try to clean that up
|
||
by the next release of TPH, and will notify you, the reader,
|
||
of the changes due to these revisions.
|
||
|
||
|
||
|
||
- 179 -
|
||
|
||
|
||
The Phreak's Vitals:
|
||
====================
|
||
|
||
True Definition Of The Phreaker
|
||
-------------------------------
|
||
"Many people think of phone phreaks as slime, out to rip off Bell
|
||
for all she is worth. Nothing could be further from the truth!
|
||
Granted, there are some who get their kicks by making free
|
||
calls; however, they are not true phone phreaks. Real phone
|
||
phreaks are 'telecommunications hobbyists'who experiment, play
|
||
with, and learn from the phone system. Occasionally, this
|
||
experimenting and a need to communicate with other phreaks,
|
||
without going broke, leads to free calls. The free calls are but
|
||
a small subset of a >TRUE< phone phreak's activities."
|
||
- Wise Words Of The Magician
|
||
|
||
|
||
The Phone Phreak's Ten Commandments
|
||
-----------------------------------
|
||
I. Box thou not over thine home telephone wires, for those
|
||
who doest will surely bring the wrath of the Chief
|
||
Specialent down upon thy head.
|
||
II. Speakest thou not of important matters over thine home
|
||
telephone wires, for to do so is to risk thine right of
|
||
freedom.
|
||
III. Use not thine own name when speaking to other phreaks,
|
||
for that every third phreak is an FBI agent is well known.
|
||
IV. Let not overly many people know that thy be a phreak, as to
|
||
do so is to use thine own self as a sacrificial lamb.
|
||
V. If thou be in school, strive to get thine self good grades,
|
||
for the authorities well know that scholars never break the
|
||
law.
|
||
VI. If thou workest, try to be an employee and impressest thine
|
||
boss with thine enthusiasm, for important employees are
|
||
often saved by their own bosses.
|
||
VII. Storest thou not thine stolen goodes in thine own home, for
|
||
those who do are surely non-believers in the Bell System
|
||
Security Forces, and are not long for this world.
|
||
VIII.Attractest thou not the attention of the authorities, as
|
||
the less noticeable thou art, the better.
|
||
IX. Makest sure thine friends are instant amnesiacs and
|
||
willst not remember thou hast called illegally, for
|
||
their cooperation with the authorities willst surely
|
||
lessen thine time for freedom on this earth.
|
||
X. Supportest thou TAP, as it is thine newsletter, and without
|
||
it, thy work would be far more limited.
|
||
|
||
The Phreaker's Glossary
|
||
=======================
|
||
1XB - No.1 Crossbar system. See XBAR for more information.
|
||
|
||
|
||
- 180 -
|
||
|
||
|
||
2600 - A hack/phreak oriented newsletter that periodically
|
||
was released and still is being released. See Phile 1.6 for more
|
||
information on the magazine and ordering.
|
||
|
||
4XB - No.4 Crossbar system. See XBAR for more information.
|
||
|
||
5XB - No.5 Crossbar system. The primary end office switch of
|
||
Bell since the 60's and still in wide use. See XBAR for more
|
||
detail.
|
||
|
||
700 Services - These services are reserved as an advanced
|
||
forwarding system, where the forwarding is advanced to a
|
||
user-programed location which could be changed by the user.
|
||
|
||
800 Exceptional Calling Report - System set up by ESS that will
|
||
log any caller that excessively dials 800 numbers or directory
|
||
assistance. See ESS for more information.
|
||
|
||
800 Services - Also known as WATS. These services often contain
|
||
WATS extenders which, when used with a code, may be used to
|
||
call LD. Many LD companies use these services because they are
|
||
toll-free to customers. Most 800 extenders are considered
|
||
dangerous because most have the ability to trace.
|
||
|
||
900 Services - Numbers in the 900 SAC usually are used as
|
||
special services, such as TV polls and such. These usually are
|
||
$.50 for the first minute and $.35 for each additional minute.
|
||
Dial (900)555-1212 to find out what the 900 services currently have
|
||
to offer.
|
||
|
||
950 - A nationwide access exchange in most areas. Many LD
|
||
companies have extenders located somewhere on this exchange;
|
||
however, all services on this exchange are considered dangerous
|
||
due to the fact that they ALL have the ability to trace. Most 950
|
||
services have crystal clear connections.
|
||
|
||
ACCS - Automated Calling Card Service. The typical
|
||
0+NPA+Nxx+xxxx method of inputting calling cards and then you
|
||
input the calling card via touch tones. This would not be possible
|
||
without ACTS.
|
||
|
||
ACD - Automatic Call Distributor.
|
||
|
||
ACD Testing Mode - Automatic Call Distributor Test Mode. This
|
||
level of phreaking can be obtained by pressing the "D" key down
|
||
after calling DA. This can only be done in areas that have the
|
||
ACD. The ACD Testing Mode is characterized by a pulsing dial
|
||
tone. From here, you can get one side of a loop by dialing 6,
|
||
the other side is 7. You may also be able to REMOB a line. All
|
||
possibilities of the ACD Test have not been experimented with.
|
||
See silver box for more details.
|
||
|
||
|
||
- 181 -
|
||
|
||
|
||
ACTS - Automated Coin Toll Service. This is a computer system
|
||
that automates phortress fone service by listening for red box
|
||
tones and takes appropriate action. It is this service that is
|
||
commonly heard saying, "Two dollars please. Please deposit two
|
||
dollars for the next three minutes." Also, if you talk for more
|
||
than three minutes and then hang up, ACTS will call back and demand
|
||
your money. ACTS is also responsible for ACCS.
|
||
|
||
Alliance - A teleconferencing system that is apart from AT&T
|
||
which allows the general public to access and use its conferencing
|
||
equipment. The equipment allows group conversations with
|
||
members participating from throughout the United States. The
|
||
fone number to Alliance generally follows the format of
|
||
0-700-456-x00x depending on the location the call originates from
|
||
and is not accessible direct by all cities/states.
|
||
|
||
AMA - Automated Message Accounting. Similar to the CAMA system;
|
||
see CAMA for more info.
|
||
|
||
analog - As used for a word or data transmission, a
|
||
continuously varying electrical signal in the shape of a wave.
|
||
|
||
ANI - Automatic Number Identification - This is the system you
|
||
can call, usually a three digit number or one in the 99xx's of
|
||
your exchange, and have the originating number you are
|
||
calling from read to you by a computer. This is useful if you
|
||
don't know the number you are calling from, for finding
|
||
diverters, and when you are playing around with other fone
|
||
equipment like cans or beige boxes. The ANI system is often
|
||
incorporated into other fone companies such as Sprint and MCI
|
||
in order to trace those big bad phreaks that abuze codez.
|
||
|
||
ANIF - Automatic Number Identification Failure. When the ANI
|
||
system of a particular office fails.
|
||
|
||
APF - All PINs Fail. This is a security measure which is
|
||
designed to frustrate attempts at discovering valid PINs by a
|
||
hacking method.
|
||
|
||
aqua box - A box designed to drain the voltage of the FBI
|
||
lock-in- trace/trap-trace so you can hang up your fone in
|
||
an emergency and phrustrate the Pheds some more. The apparatus
|
||
is simple, just connect the two middle wires of a phone wire and
|
||
plug, which would be the red and green wires if in the jack, to
|
||
the cord of some electrical appliance; ie, light bulb or radio.
|
||
KEEP THE APPLIANCE OFF. Then, get one of those line splitters
|
||
that will let you hook two phone plugs into one jack. Plug the end
|
||
of the modified cord into one jack and your fone into the other. THE
|
||
APPLIANCE MUST BE OFF! Then, when the Pheds turn their lame tracer
|
||
on and you find that you can't hang up, remove your fone from the
|
||
- 182 -
|
||
|
||
|
||
jack and turn the appliance ON and keep it ON until you feel safe; it
|
||
may be awhile. Then turn it off, plug your fone back in, and start
|
||
phreaking again. Invented by: Captain Xerox and The Traveler.
|
||
|
||
BAUDOT - 45.5 baud. Also known as the Apple Cat Can.
|
||
|
||
BEF - Band Elimination Filter. A muting system that will mute the
|
||
2600 Hz tone which signals hang-up when you hang up.
|
||
|
||
beige box - An apparatus that is a home-made lineman's handset.
|
||
It is a regular fone that has clips where the red and green
|
||
wires normally connect to in a fone jack. These clips will
|
||
attach to the rings and tips found in many of MA's output
|
||
devices. These are highly portable and VERY useful when messing
|
||
around with cans and other output devices the fone company has
|
||
around. Invented by: The Exterminator and The Terminal Man.
|
||
|
||
BITNET - Nationwide system for colleges and schools which
|
||
accesses a large base of education-oriented information. Access
|
||
ports are always via mainframe.
|
||
|
||
bit stream - Refers to a continuous series of bits, binary
|
||
digits, being transmitted on a transmission line.
|
||
|
||
black box - The infamous box that allows the calling party to
|
||
not be billed for the call placed. We won't go in depth right
|
||
now, most plans can be found on many phreak oriented BBS's. The
|
||
telco can detect black boxes if they suspect one on the line. Also,
|
||
these will not work under ESS.
|
||
|
||
bleeper boxes - The United Kingdom's own version of the blue
|
||
box, modified to work with the UK's fone system. Based on the
|
||
same principles. However, they use two sets of frequencies,
|
||
foreword and backwards.
|
||
|
||
Blotto box - This box supposedly shorts every fone out in
|
||
the immediate area, and I don't doubt it. It should kill
|
||
every fone in the immediate area, until the voltage reaches the
|
||
fone company, and the fone company filters it. I won't cover
|
||
this one in this issue, cuz it is dangerous, and phreaks
|
||
shouldn't destroy MA's equipment, just phuck it up. Look for this
|
||
on your phavorite BBS or ask your phavorite phreak for info if you
|
||
really are serious about seriously phucking some fones in some area.
|
||
|
||
blue box - An old piece of equipment that emulated a true
|
||
operator placing calls, and operators get calls for free. The
|
||
blue box seizes an open trunk by blasting a 2600 Hz tone
|
||
through the line after dialing a party that is local or in the
|
||
800 NPA so calls will be local or free for the blue
|
||
|
||
|
||
- 183 -
|
||
|
||
|
||
boxer. Then, when the blue boxer has seized a trunk, the boxer may
|
||
then, within the next 10-15 seconds, dial another fone number via
|
||
MF tones. These MF tones must be preceded by a KP tone and
|
||
followed with a ST tone. All of these tones are standardized by
|
||
Bell. The tones as well as the inter-digit intervals are around
|
||
75ms. It may vary with the equipment used since ESS can handle
|
||
higher speeds and doesn't need inter-digit intervals. There are
|
||
many uses to a blue box, and we will not cover any more here. See
|
||
your local phreak or phreak oriented BBS for in depth info
|
||
concerning blue boxes and blue boxing. Incidentally, blue boxes
|
||
are not considered safe anymore because ESS detects "foreign"
|
||
tones, such as the 2600 Hz tone, but this detection may be
|
||
delayed by mixing pink noise of above 3000 Hz with the 2600 Hz
|
||
tone. To hang up, the 2600 Hz tone is played again. Also, all blue
|
||
boxes are green boxes because MF "2" corresponds to the Coin
|
||
Collect tone on the green box, and the "KP" tone corresponds to
|
||
the Coin Return tone on the green box. See green box for
|
||
more information. Blue boxing is IMPOSSIBLE under the new
|
||
CCIS system slowly being integrated into the Bell system.
|
||
|
||
blue box tones - The MF tones generated by the blue box in
|
||
order to place calls, emulating a true operator. These dual
|
||
tones must be entered during the 10-15 second period after you
|
||
have seized a trunk with the 2600 Hz tone.
|
||
|
||
|
||
|
||
700: 1 : 2 : 4 : 7 : 11 : KP= Key
|
||
Pulse
|
||
parallel Frequencies 900: ** : 3 : 5 : 8 : 12 : ST= STop
|
||
2= Coin Collect 1100: ** : ** : 6 : 9 : KP : KP2= Key
|
||
Pulse 2
|
||
KP= Coin Return 1300: ** : ** : ** : 10 :KP2 : **= None
|
||
(green box tones) 1500: ** : ** : ** : ** : ST :
|
||
: 900:1100:1300:1500:1700: 75ms
|
||
pulse/pause
|
||
|
||
BLV - Busy Line Verification. Allows a TSPS operator to
|
||
process a customer's request for a confirmation of a
|
||
repeatedly busy line. This service is used in conjunction with
|
||
emergency break-ins.
|
||
|
||
BNS - Billed Number Screening. break period - Time when the
|
||
circuit during pulse dialing is left pen. In the US, this
|
||
period is 40ms; foreign nations may use 33ms break periods.
|
||
|
||
break ratio - The interval pulse dialing breaks and makes the
|
||
loop when dialing. The US standard is 10 pulses per second.
|
||
|
||
|
||
- 184 -
|
||
|
||
|
||
When the circuit is opened, it is called the break interval. When
|
||
the circuit is closed, it is called the make interval. In the US,
|
||
there is a 60ms make period and a 40ms break period. This is
|
||
often referred to as a 60% make interval. Many
|
||
foreign nations have a 67% make interval.
|
||
|
||
bridge - I don't really understand this one, but these are
|
||
important phreak toys. I'll cover them more in the next issue of
|
||
TPH.
|
||
|
||
British Post Office - The United Kingdom's equivalent to Ma Bell.
|
||
|
||
busy box - Box that will cause the fone to be busy, without
|
||
taking it OFF-HOOK. Just get a piece of fone wire with a plug on
|
||
the end, cut it off so there is a plug and about two inches of
|
||
fone line. Then, strip the wire so the two middle wires, the tip
|
||
and the ring, are exposed. Then, wrap the ring and the tip
|
||
together, tape with electrical tape, and plug into the fone jack.
|
||
The fone will be busy until the box is removed.
|
||
|
||
cans - Cans are those big silver boxes on top of or around
|
||
the telephone poles. When opened, the lines can be manipulated
|
||
with a beige box or whatever phun you have in mind.
|
||
|
||
calling card - Another form of the LD service used by many
|
||
major LD companies that composes of the customers fone number and
|
||
a PIN number. The most important thing to know when questioned
|
||
about calling cards are the area code and the city where the
|
||
calling card customer originated from.
|
||
|
||
CAMA - Centralized Automatic Message Accounting. System that
|
||
records the numbers called by fones and other LD systems. The
|
||
recording can be used as evidence in court.
|
||
|
||
CC - Calling Card.
|
||
|
||
CC - Credit Card.
|
||
|
||
CCIS - Common Channel Inter-office Signaling. New method
|
||
being incorporated under Bell that will send all the signaling
|
||
information over separate data lines. Blue boxing is IMPOSSIBLE
|
||
under this system.
|
||
|
||
CCITT - The initials of the name in French of the
|
||
International Telegraph and Telephone Consultative Committee. At
|
||
CCITT representatives of telecommunications authorities,
|
||
operators of public networks and other interested bodies meet
|
||
to agree on standards needed for international intermarrying of
|
||
telecommunications services.
|
||
|
||
CCS - Calling Card Service.
|
||
|
||
|
||
- 185 -
|
||
|
||
|
||
CCSS - Common Channel Signalling System. A system whereby
|
||
all signalling for a number of voice paths are carried over one
|
||
common channel, instead of within each individual channel.
|
||
|
||
CDA - Coin Detection and Announcement.
|
||
|
||
CF - Coin First. A type of fortress fone that wants your money
|
||
before you receive a dial tone.
|
||
|
||
Channel - A means of one-way transmission or a UCA path for
|
||
electrical transmission between two or more points without
|
||
common carrier, provided terminal equipment. Also called a circuit,
|
||
line, link, path, or facility.
|
||
|
||
cheese box - Another type of box which, when coupled with
|
||
call forwarding services, will allow one to place free fone calls.
|
||
The safety of this box is unknown. See references for information
|
||
concerning text philes on this box.
|
||
|
||
clear box - Piece of equipment that compromises of a telephone
|
||
pickup coil and a small amp. This works on the principal that
|
||
all receivers are also weak transmitters. So, you amplify your
|
||
signal on PP fortress fones and spare yourself some change.
|
||
|
||
CN/A - Customer Name And Address. Systems where authorized
|
||
Bell employees can find out the name and address of any
|
||
customer in the Bell System. All fone numbers are listed on
|
||
file, including unlisted numbers. Some CN/A services ask for
|
||
ID#'s when you make a request. To use, call the CN/A office
|
||
during normal business hours, and say that you are so and so from
|
||
a certain business or office, related to customers or something
|
||
like that, and you need the customer's name and address at
|
||
(NPA)Nxx-xxxx. That should work. The operators to these
|
||
services usually know more than DA operators do and are also
|
||
susceptible to "social engineering." It is possible to
|
||
bullshit a CN/A operator for the NON PUB DA number and policy
|
||
changes in the CN/A system.
|
||
|
||
CO Code - Central Office code which is also the Nxx code. See Nxx
|
||
for more details. Sometimes known as the local end office.
|
||
|
||
conference calls - To have multiple lines inter-connected in
|
||
order to have many people talking in the same conversation on the
|
||
fone at once. See Alliance and switch crashing for more
|
||
information.
|
||
|
||
credit operator - Same as TSPS operator. The operator you get when
|
||
you dial "0" on your fone and phortress fones. See TSPS for more
|
||
information.
|
||
|
||
|
||
|
||
- 186 -
|
||
|
||
|
||
CSDC - Circuit Switched Digital Capability. Another USDN service
|
||
that has no ISDN counterpart.
|
||
|
||
DA - Directory Assistance. See directory assistance.
|
||
|
||
DAO - Directory Assistance Operator. See directory assistance.
|
||
|
||
data communications - In telefone company terminology,
|
||
data communications refers to an end-to-end transmission of
|
||
any kind of information other than sound, including voice, or
|
||
video. Data sources may be either digital or analog.
|
||
|
||
data rate - The rate at which a channel carries data, measured in
|
||
bits per second, bit/s, also known as "data signalling rate."
|
||
data signalling rate - Same as "data rate." See data rate.
|
||
|
||
DCO-CS - Digital Central Office-Carrier Switch.
|
||
|
||
DDD - Direct Distance Dialed.
|
||
|
||
Dial-It Services - See 900 Services.
|
||
|
||
digital - A method to represent information to be discrete
|
||
or individually distinct signals, such as bits, as opposed to a
|
||
continuously variable analog signal.
|
||
|
||
digital transmission - A mode of transmission in which all
|
||
information to be transmitted is first converted to digital form
|
||
and then transmitted as a serial stream of pulses. Any signal,
|
||
voice, data, television, can be converted to digital form.
|
||
|
||
Dimension 2000 - Another LD service located at (800)848-9000.
|
||
|
||
directory assistance - Operator that you get when you call
|
||
411 or NPA-555-1212. This call will cost $.50 per call. These
|
||
won't know where you are calling from, unless you annoy them, and
|
||
do not have access to unlisted numbers. There are also
|
||
directory assistance operators for the deaf that transfer BAUDOT.
|
||
You can call these and have interesting conversations. The fone
|
||
number is 800-855-1155, are free, and use standard Telex
|
||
abbreviations such as GA for Go Ahead. These are nicer than
|
||
normal operators, and are often subject to "social
|
||
engineering" skills (bullshitting). Other operators also
|
||
have access to their own directory assistance at
|
||
KP+NPA+131+ST.
|
||
|
||
diverter - This is a nice phreak tool. What a diverter is is a
|
||
type of call forwarding system done externally, apart from the
|
||
fone company, which is a piece of hardware that will foreword the
|
||
call to somewhere else. These can be found on many 24 hour
|
||
plumbers, doctors, etc. When you call, you will often hear
|
||
|
||
- 187 -
|
||
|
||
|
||
a click and then ringing, or a ring, then a click, then another
|
||
ring, the second ring often sounds different from the first. Then,
|
||
the other side picks the fone up and you ask about their
|
||
company or something stupid, but DO NOT ANNOY them. Then
|
||
eventually, let them hang up, DO NOT HANG UP YOURSELF. Wait
|
||
for the dial tone, then dial ANI. If the number ANI reads is
|
||
different from the one you are calling from, then you have a
|
||
diverter. Call anywhere you want, for all calls will be billed to
|
||
the diverter. Also, if someone uses a tracer on you, then they
|
||
trace the diverter and you are safe. Diverters can, however,
|
||
hang up on you after a period of time; some companies make
|
||
diverters that can be set to clear the line after a set period
|
||
of time, or click every once in a while, which is super annoying,
|
||
but it will still work. Diverters are usually safer than LD
|
||
extenders, but there are no guarantees. Diverters can also be
|
||
accessed via phortress fones. Dial the credit operator and
|
||
ask for the AT&T CREDIT OPERATOR. They will put on some lame
|
||
recording that is pretty long. Don't say anything and the
|
||
recording will hang up. LET IT HANG UP, DO NOT HANG UP. Then
|
||
the line will clear and you will get a dial tone. Place any call
|
||
you want with the following format: 9+1+NPA+Nxx+xxxx, or for local
|
||
calls, just 9+Nxx+xxxx. I'd advise that you call ANI first as a local
|
||
call to make sure you have a diverter.
|
||
|
||
DLS - Dial Line Service.
|
||
|
||
DNR - Also known as pen register. See pen register.
|
||
|
||
DOV - Data-Over-Voice.
|
||
|
||
DSI - Data Subscriber Interface. Unit in the LADT system that
|
||
will concentrate data from 123 subscribers to a 56k or a 9.6k
|
||
bit-per-second trunk to a packet network.
|
||
|
||
DT - Dial tone.
|
||
|
||
DTF - Dial Tone First. This is a type of fortress fone that gives
|
||
you a dial tone first.
|
||
|
||
DTI - Digital Trunk Interface.
|
||
|
||
DTMF - Dual-Tone-Multi-Frequency, the generic term for the touch
|
||
tone. These include 0,1,2,3,4,5,6,7,8,9 as well as A,B,C,D. See
|
||
silver box for more details.
|
||
|
||
DVM - Data Voice Multiplexor. A system that squeezes more out
|
||
of a transmission medium and allows a customer to transmit
|
||
voice and data simultaneously to more than one receiver over the
|
||
existing telefone line.
|
||
|
||
|
||
|
||
- 188 -
|
||
|
||
|
||
emergency break-in - Name given to the art of "breaking" into a
|
||
busy number which will usually result in becoming a third
|
||
party in the call taking place.
|
||
|
||
end office - Any class 5 switching office in North America.
|
||
|
||
end-to-end signalling - A mode of network operation in which
|
||
the originating central office, or station, retains control
|
||
and signals directly to each successive central office, or PBX,
|
||
as trunks are added to the connection.
|
||
|
||
ESS - Electronic Switching System. "The phreak's nightmare come
|
||
true." With ESS, EVERY SINGLE digit you dial is recorded,
|
||
even mistakes. The system records who you call, when you call,
|
||
how long you talked, and, in some cases, what you talked
|
||
about. ESS is programed to make a list of people who make
|
||
excessive 800 calls or directory assistance. This is called
|
||
the "800 Exceptional Calling Report." ESS can be programed to
|
||
print out logs of who called certain numbers, such as a bookie,
|
||
a known communist, a BBS, etc. ESS is a series of programs
|
||
working together; these programs can be very easily changed to
|
||
do whatever the fone company wants ESS to do. With ESS, tracing
|
||
is done in MILLISECONDS and will pick up any "foreign" tones on
|
||
the line, such as 2600 Hz. Bell predicts the whole country will be
|
||
on ESS by 1990! You can identify an ESS office by the
|
||
functions, such as dialing 911 for help, fortress fones with DT
|
||
first, special services such as call forwarding, speed dialing,
|
||
call waiting, etc., and ANI on LD calls. Also, black boxes and
|
||
Infinity transmitters will NOT work under ESS.
|
||
|
||
extender - A fone line that serves as a middleman for a fone
|
||
call, such as the 800 or 950 extenders. These systems usually
|
||
require a multi- digit code and have some sort of ANI to trace
|
||
suspicious calls with.
|
||
|
||
facsimile - A system for the transmission of images. The
|
||
image is scanned at the transmitter, reconstructed at the
|
||
receiving station, and duplicated on some form of paper. Also known
|
||
as a FAX.
|
||
|
||
FAX - See facsimile for details.
|
||
|
||
FiRM - A large cracking group who is slowly taking the place of PTL
|
||
and the endangered cracking groups at the time of this writing.
|
||
|
||
fortress phone - Today's modern, armor plated, pay fone. These
|
||
may be the older, 3 coin/coin first fones or the newer, 1
|
||
coin/DT first fones. There are also others, see CF, DTF, and PP.
|
||
Most phortresses can be found in the 9xxx or 98xx series of your
|
||
local Nxx.
|
||
|
||
- 189 -
|
||
|
||
|
||
gateway city - See ISC.
|
||
|
||
Gestapo - The telefone company's security force. These nasties are
|
||
the ones that stake out misused phortresses as well as go
|
||
after those bad phreaks that might be phucking with the fone
|
||
system.
|
||
|
||
green base - A type of output device used by the fone company.
|
||
Usually light green in color and stick up a few feet from the
|
||
ground. See output device for more information.
|
||
|
||
green box - Equipment that will emulate the Coin Collect, Coin
|
||
Return, and Ringback tones. This means that if you call
|
||
someone with a fortress fone and they have a green box, by
|
||
activating it, your money will be returned. The tones are,
|
||
in hertz, Coin Collect=700+1100, Coin Return=1100+1700, and
|
||
Ringback=700+1700. However, before these tones are sent, the MF
|
||
detectors at the CO must be alerted, this can be done by
|
||
sending a 900+1500 Hz or single 2600 Hz wink of 90ms followed
|
||
by a 60ms gap, and then the appropriate signal for at least 900ms.
|
||
|
||
gold box - This box will trace calls, tell if the call is
|
||
being traced, and can change a trace.
|
||
|
||
grey box - Also known as a silver box. See silver box.
|
||
|
||
group chief - The name of the highest ranking official in any
|
||
fone office. Ask to speak to these if an operator is giving you
|
||
trouble. high-speed data - A rate of data transfer ranging upward
|
||
from 10,000 bits per second.
|
||
|
||
H/M - Hotel/Motel.
|
||
|
||
ICH - International Call Handling. Used for overseas calls.
|
||
|
||
ICVT - InComing Verification Trunk.
|
||
|
||
IDA - Integrated Digital Access. The United Kingdom's
|
||
equivalent of ISDN.
|
||
|
||
IDDD - International Direct Distance Dialing - The ability to
|
||
place international calls direct without processing through a
|
||
station. Usually, one would have to place the call through a 011,
|
||
station, or a 01, operator assisted, type of setup.
|
||
|
||
IDN - Integrated Digital Networks. Networks which provide
|
||
digital access and transmission, in both circuit switched and
|
||
packet modes.
|
||
|
||
|
||
|
||
|
||
|
||
- 190 -
|
||
|
||
|
||
in-band - The method of sending signaling information along with
|
||
the conversion using tones to represent digits.
|
||
|
||
INS - Information Network System. Japan's equivalent of ISDN.
|
||
|
||
Intercept - The intercept operator is the one you get
|
||
connected to when there are not enough recordings available to
|
||
tell you that the number has been disconnected or changed.
|
||
These usually ask what number you are calling and are the lowest
|
||
form of the operator.
|
||
|
||
intermediate point - Any class 4X switching office in North
|
||
America. Also known as an RSU.
|
||
|
||
international dialing - In order to call across country borders,
|
||
one must use the format PREFIX + COUNTRY CODE + NATION #. The
|
||
prefix in North America is usually 011 for station-to-station
|
||
calls or 01 for operator-assisted calls. If you have IDDD, you
|
||
don't need to place this prefix in.
|
||
|
||
INTT - Incoming No Test Trunks.
|
||
|
||
INWARD - An operator that assists your local TSPS '0'
|
||
operator in connecting calls. These won't question you as long
|
||
as the call is within their service area. The operator can ONLY
|
||
be reached by other operators or a blue box. The blue box
|
||
number is KP+NPA+121+ST for the INWARD operator that will help you
|
||
connect to any calls in that area ONLY.
|
||
|
||
INWATS - Inward Wide Area Telecommunications Service. These are
|
||
the 800 numbers we are all familiar with. These are set up in
|
||
bands; 6 total. Band 6 is the largest, and you can call band 6
|
||
INWATS from anywhere in the US except the state where the call
|
||
is terminated. This is also why some companies have a separate
|
||
800 number for their state. Band 5 includes the 48 contiguous
|
||
states. All the way down to band 1, which only includes the states
|
||
contiguous to that one. Understand? That means more people can
|
||
reach a band 6 INWATS as compared to the people that can access a
|
||
band 1 INWATS.
|
||
|
||
IOCC - International Overseas Completion Centre. A system which
|
||
must be dialed in order to re-route fone calls to countries
|
||
inaccessible via dialing direct. To route a call via IOCC with
|
||
a blue box, pad the country code to the RIGHT with zeroes until
|
||
it is 3 digits. Then KP+160 is dialed, plus the padded country
|
||
code, plus ST.
|
||
|
||
IPM - Interruptions Per Minute. The number of times a certain
|
||
tone sounds during a minute.
|
||
|
||
|
||
|
||
|
||
- 191 -
|
||
|
||
|
||
ISC - Inter-Nation Switching Centers. Most outgoing calls
|
||
from a certain numbering system will be routed through these
|
||
gateway cities" in order to reach a foreign country.
|
||
|
||
SDN - Integrated Services Digital Network. ISDN is a
|
||
lanned hierarchy of digital switching and transmission
|
||
ystems. Synchronized so that all digital elements speak the same
|
||
language" at the same speed, the ISDN would provide voice, data,
|
||
nd video in a unified manner.
|
||
|
||
TT - This is another large LD service. The extenders owned by
|
||
his company are usually considered dangerous. The format is
|
||
CC-ESS#,(NPA)Nxx-xxxx,1234567.
|
||
|
||
kpk - Key Pulse. Tone that must be generated before inputting a
|
||
one number using a blue box. This tone is, in hertz, 1100+1700.
|
||
|
||
P2 - Key Pulse 2. Tone that is used by the CCITT SYSTEM 5 for
|
||
pecial international calling. This tone is, in hertz, 1300+1700.
|
||
|
||
ADT - Local Area Data Transport. LADT is a method by which
|
||
ustomers will send and receive digital data over existing customer
|
||
oop wiring. Dial-Up LADT will let customers use their lines
|
||
or occasional data services; direct access LADT will transmit
|
||
imultaneous voice and data traffic on the same line.
|
||
|
||
LAN - Local Area Network.
|
||
|
||
LAPB - Link Access Protocol Balanced.
|
||
|
||
LD - Long Distance
|
||
|
||
leave Word And Call Back - Another new type of operator.
|
||
|
||
local loop - When a loop is connected between you and your CO.
|
||
his occurs when you pick the fone up or have a fone OFF-HOOK.
|
||
|
||
Loop - A pair or group of fone lines. When people call these
|
||
lines, they can talk to each other. Loops consist of two or
|
||
more numbers, they usually are grouped close together somewhere
|
||
in the Nxx-99xx portions of your exchange. The lower number in a
|
||
loop is the tone side of the loop, or the singing switch. The
|
||
higher number is always silent. The tone disappears on the lower
|
||
# when someone dials the other side of the loop. If you are the
|
||
higher #, you will have to listen to the clicks to see if
|
||
someone dialed into the loop. There also are such things as Non-
|
||
Supervised loops, where the call is toll-free to the caller. Most
|
||
loops will be muted or have annoying clicks at connection, but
|
||
otherwise, you might find these useful
|
||
|
||
- 192 -
|
||
|
||
|
||
goodies scanning the 99xx's in your exchange. Some loops allow
|
||
multi-user capability; thus, many people can talk to each other
|
||
at the same time, a conference of sorts. Since loops are genuine
|
||
test functions for the telco during the day, most phreaks scan and
|
||
use them at night.
|
||
|
||
MA - Ma Bell, the Bell Telesys Company. Telco, etc. See Ma Bell
|
||
for more information.
|
||
|
||
Ma Bell - The telephone company. The Bell Telesys Phone Company.
|
||
The company you phreak and hack with. The company that doesn't
|
||
like you too much. The company you often phuck with, and sometimes
|
||
phuck up. The company that can phuck u up if u aren't careful.
|
||
|
||
make period - The time when, during pulse dialing, the
|
||
circuit is closed. In the US, this period is 60ms; however,
|
||
foreign nations may use a 67ms make period. Make periods are
|
||
also referred to in percentages, so a 60ms make period would be
|
||
60%, a 67ms as 67%.
|
||
|
||
marine verify - Another type of operator.
|
||
|
||
MCI - Yet another LD service that owns many dial-ups in most
|
||
areas. However, the codes from various areas may not be
|
||
interchangeable. Not much is known about MCI; however, MCI
|
||
probably has some sophisticated anti-phreak equipment. The format
|
||
is ACC-ESS#,12345,(NPA)Nxx-xxxx.
|
||
|
||
MCI Execunet - The calling card equivalent of the regular
|
||
MCI LD service, but the codes are longer and interchangeable. For
|
||
the local access port near you, call (800)555-1212. The
|
||
format for the port will be ACC-ESS#,1234567,(NPA)Nxx-xxxx.
|
||
|
||
Metrofone - Owned by Western Union. A very popular system among
|
||
fone phreaks. Call Metrofone's operator and ask for the local
|
||
access number at (800)325-1403. The format is
|
||
ACC-ESS#,CODE,(NPA)Nxx-xxxx. Metrofone is alleged to place trap
|
||
codes on phreak BBS's.
|
||
|
||
MF - Multi-Frequency. These are the operator and blue box tones.
|
||
An MF tone consists of two tones from a set of six master
|
||
tones which are combined to produce 12 separate tones. These
|
||
are NOT the same as touch tones. See blue box tones for
|
||
frequencies.
|
||
|
||
mobile - A type of operator.
|
||
|
||
NAP/PA - North American Pirate/Phreak Association. A large group of
|
||
bbs boards which include a lot of pirates/phreakers. I'm not quite
|
||
sure where the group will go from here.
|
||
|
||
|
||
- 193 -
|
||
|
||
|
||
NON PUB DA - A reverse type of CN/A bureau. You tell the service
|
||
the name and the locality, they will supply the fone number.
|
||
However, they will ask for you name, supervisor's name, etc.
|
||
Use your social engineering skills here (aka, bullshitting
|
||
skills). You also can get detailed billing
|
||
information from these bureaus.
|
||
|
||
NPA - Numbering Plan Area. The area code of a certain city/state.
|
||
For example, on the number (111)222-3333, the NPA would be
|
||
111. Area codes never cross state boundaries sans the 800, 700,
|
||
900, and special exchanges.
|
||
|
||
Nxx - The exchange or prefix of the area to be dialed. For
|
||
example of the number (111)222-3333, the Nxx would be 222.
|
||
|
||
OGVT - OutGoing Verification Trunk.
|
||
|
||
OFF-HOOK - To be on-line, to have the switchhook down. To have a
|
||
closed connection. At this point, you also have a local loop.
|
||
|
||
ON-HOOK - To be off-line, to have the switchhook up. To have an
|
||
open connection.
|
||
|
||
ONI - Operator Number Identification. Identifies calling numbers
|
||
when an office is not equipped with CAMA, the calling number is
|
||
not automatically recorded by CAMA, or has equipment failures, such
|
||
as ANIF.
|
||
|
||
OPCR - Operator Actions Program. Standard TBOC or equivalent
|
||
"0" operator.
|
||
|
||
OPEN - Northern Telecom's Open Protocol Enhanced Networks
|
||
World Program.
|
||
|
||
OSI - Open System Interconnection. Form of telecommunication
|
||
architechture which will probobly fail to SNA.
|
||
|
||
OST - Originating Station Treatment.
|
||
|
||
OTC - Operating Telefone Company.
|
||
|
||
out-of-band - Type of signaling which sends all of the signaling
|
||
and supervisory informations, such as ON and OFF HOOK, over
|
||
separate data links.
|
||
|
||
output device - Any type of interface such as cans, terminal
|
||
sets, remote switching centers, bridging heads, etc., where the
|
||
fone lines of the immediate area are relayed to before going to
|
||
the fone company. These often are those cases painted light
|
||
green and stand up from the ground. Most of these can be opened
|
||
with a 7/16 hex driver, turning the security bolt(s)
|
||
1/8 of an inch counter-clockwise, and opening. Terminals on
|
||
|
||
- 194 -
|
||
|
||
|
||
the inside might be labeled "T" for tip and "R" for ring.
|
||
Otherwise, the ring side is usually on the right and the tip side
|
||
is on the left.
|
||
|
||
OUTWATS - Outward Wide Area Telecommunications Service. These are
|
||
WATS that are used to make outgoing calls ONLY.
|
||
|
||
Paper Clip Method - This method of phreaking was illustrated in
|
||
the movie War Games. What a phortress fone does to make sure money
|
||
is in a fone is send an electrical pulse to notify the fone
|
||
that a coin has been deposited, for the first coin only.
|
||
However, by simply grounding the positive end of the
|
||
microphone, enough current and voltage is deferred to the ground
|
||
to simulate the first quarter in the coin box. An easy way to
|
||
accomplish this is to connect the center of the mouthpiece to the
|
||
coin box, touch tone pad, or anything that looks like metal with
|
||
a piece of wire. A most convenient piece of wire is a bend out
|
||
of a paper clip. Then you can send red box tones through the
|
||
line and get free fone calls! Also, telco modified fones may
|
||
require you to push the clip harder against the mouthpiece,
|
||
or connect the mouthpiece to the earpiece. If pressing harder
|
||
against the mouthpiece becomes a problem, pins may be an easier
|
||
solution.
|
||
|
||
PBX - Private Branch eXchange. A private switchboard used by some
|
||
big companies that allow access to the OUTWATS line by
|
||
dialing a 8 or a 9 after inputting a code.
|
||
|
||
PCM - Pulse Code-Modulated trunks.
|
||
|
||
PC Pursuit - A computer oriented LD system, comparable to
|
||
Telenet, which offers low access rates to 2400 baud users. Hacking
|
||
on this system is virtually impossible due to the new password
|
||
format.
|
||
|
||
pen register - A device that the fone company puts on your
|
||
line if they suspect you are fraudulently using your fone. This
|
||
will record EVERY SINGLE digit/rotary pulse you enter into
|
||
the fone as well as other pertinent information, which may
|
||
include a bit of tapping. Also known as DNR.
|
||
|
||
Phortune 500 - An elite group of users currently paving the way
|
||
for better quality in their trade.
|
||
|
||
PHRACK - Another phreak/hack oriented newsletter. See
|
||
reference section, phile 1.6 for more information.
|
||
|
||
PHUN - Phreakers and Hackers Underground Network. They also
|
||
release a newsletter that is up to #4 at the time of this writing.
|
||
See phile 1.6 for more information on finding this phile.
|
||
|
||
|
||
- 195 -
|
||
|
||
|
||
PIN - Personal Identification Number - The last four digits
|
||
on a calling card that adds to the security of calling cards.
|
||
|
||
plant tests - test numbers which include ANI, ringback, touch
|
||
tone tests, and other tests the telco uses.
|
||
|
||
Post Office Engineers - The United Kingdom's fone workers.
|
||
|
||
PP - Dial Post-Pay Service. On phortress fones, you are
|
||
prompted to pay for the call after the called party answers. You
|
||
can use a clear box to get around this.
|
||
|
||
PPS - Pulses Per Second.
|
||
|
||
printmeter - The United Kingdom's equivalent of a pen register.
|
||
See pen register for more info.
|
||
|
||
PTE - Packet Transport Equipment.
|
||
|
||
PTL - One of the bigger cracking groups of all time. However, the
|
||
group has been dying off and only has a few nodes as of this
|
||
writing.
|
||
|
||
PTS - Position and Trunk Scanner.
|
||
|
||
PTT - Postal Telephone Telegraph.
|
||
|
||
pulse - See rotary phones.
|
||
|
||
purple box - This one would be nice. Free calls to anywhere via
|
||
blue boxing, become an operator via blue box, conference
|
||
calling, disconnect fone line(s), tap fones, detect traces,
|
||
intercept directory assistance calls. Has all red box tones. This
|
||
one may not be available under ESS.
|
||
|
||
rainbow box - An ultimate box. You can become an operator. You
|
||
get free calls, blue box. You can set up conference calls. You
|
||
can forcefully disconnect lines. You can tap lines. You can
|
||
detect traces, change traces, and trace as well. All incoming
|
||
calls are free. You can intercept directory assistance. You have
|
||
a generator for all MF tones. You can mute and redial. You have
|
||
all the red-box tones. This is an awesome box. However, it does
|
||
not exist under ESS.
|
||
|
||
RAO - Revenue Accounting Office. The three digit code that
|
||
sometimes replaces the NPA of some calling cards.
|
||
|
||
RBOC - Regional Bell Operating Company.
|
||
|
||
red box - Equipment that will emulate the red box tone generated
|
||
for coin recognition in all phortress fones.
|
||
|
||
- 196 -
|
||
|
||
|
||
red box tones - Tones that tell the phortress fone how much money
|
||
was inserted in the fone to make the required call. In one slot
|
||
fones, these are beeps in pulses; the pulse is a 2200+1700 Hz
|
||
tone. For quarters, 5 beep tones at 12-17 PPS, for dimes it is 2
|
||
beep tones at 5-8.5 PPS, and a nickel causes 1 beep tone at
|
||
5-8.5 PPS. For three slot fones, the tones are
|
||
different. Instead of beeps, they are straight dual tones. For a
|
||
nickel, it is one bell at 1050-1100 Hz, two bells for a dime,
|
||
and one gong at 800 Hz for a quarter. When using red box
|
||
tones, you must insert at least one nickel before playing the
|
||
tones, cuz a ground test takes place to make sure some money has
|
||
been inserted. The ground test may be fooled by the Paper
|
||
Clip Method. Also, it has been known that TSPS can detect
|
||
certain red box tones, and will record all data on AMA or CAMA of
|
||
fraudulent activity.
|
||
|
||
regional center - Any class 1 switching office in North America.
|
||
|
||
REMOB - Method of tapping into lines by entering a code and
|
||
the 7 digit number you want to monitor, from ACD Test Mode. A
|
||
possibility of this may be mass conferencing.
|
||
|
||
ring - The red wire found in fone jacks and most fone equipment.
|
||
The ring also is less positive than the tip. When looking at a
|
||
fone plug on the end of typical 4 wire fone line from the top,
|
||
let's say the top is the side with the hook, the ring will be
|
||
the middle-right wire. Remember, the ring is red, and to the right.
|
||
The three "R's" revived!
|
||
|
||
ring-around-the-rosy - 9 connections in tandem which would
|
||
cause an endless loop connection and has never occurred in fone
|
||
history.
|
||
|
||
ringback - A testing number that the fone company uses to have
|
||
your fone ring back after you hang up. You usually input
|
||
the three digit ringback number and then the last four digits
|
||
to the fone number you are calling from.
|
||
|
||
ring trip - The CO process involved with stopping the AC
|
||
ringing signal when a fone goes OFF-HOOK.
|
||
|
||
rotary phone - The dial or pulse phone that works by hooking and
|
||
un-hooking the fone rapidly in secession that is directly
|
||
related to the number you dialed. These will not work if
|
||
another phone with the same number is off-hook at the time of
|
||
dialing.
|
||
|
||
Rout & Rate - Yet another type of operator; assists your TSPS
|
||
operator with rates and routings. This once can be reached at
|
||
KP+800+141+1212+ST.
|
||
|
||
RPE - Remote Peripheral Equipment.
|
||
|
||
- 197 -
|
||
|
||
|
||
RQS - The Rate Quote System. This is the TSPS operator's
|
||
rate/quote system. This is a method your '0' operator gets info
|
||
without dialing the rate and route operator. The number is
|
||
KP+009+ST.
|
||
|
||
RSU - Remote Switching Unit. The class 4X office that can
|
||
have an unattended exchange attached to it.
|
||
|
||
RTA - Remote Trunk Arrangement.
|
||
|
||
SAC - Special Area Code. Separate listing of area codes, usually
|
||
for special services such as TWX's, WATS, or DIAL-IT services.
|
||
|
||
SCC - Specialized Common Carriers. Common Nxx numbers that
|
||
are specialized for a certain purpose. An example is the 950
|
||
exchange. sectional center - Any class 2 switching office in North
|
||
America. service monitoring - This is the technical name of phone
|
||
tapping.
|
||
|
||
SF - Supervision Control Frequency. The 2600 Hz tone which seizes
|
||
any open trunk, which can be blue boxed off of.
|
||
|
||
short-haul - Also known as a local call.
|
||
|
||
signalling - The process by which a caller or equipment on
|
||
the transmitting end of a line in: forms a particular party or
|
||
equipment at the receiving end that a message is to be
|
||
communicated. Signalling is also the supervisory information
|
||
which lets the caller know the called know the called party
|
||
is ready to talk, the line is busy, or the called party has
|
||
hung up.
|
||
|
||
silver box - Equipment that will allow you to emulate the DTMF
|
||
tones A,B,C,D. The MF tones are, in hertz, A=697+1633,
|
||
B=770+1633, C=852+1633, D=941+1633. These allow special
|
||
functions from regular fones, such as ACD Testing Mode.
|
||
|
||
Skyline - Service owned by IBM, Comsat, and AEtna. It has a
|
||
local access number in the 950 exchange. The fone number is
|
||
950-1088. The code is either a 6 or 8 digit number. This company is
|
||
alleged to be VERY dangerous.
|
||
|
||
SNA - System Network Architechture, by IBM. A possible future
|
||
standard of architechture only competed by OSI.
|
||
|
||
SOST - Special Operator Service Treatment. These include calls
|
||
which must be transferred to a SOST switchboard before they
|
||
can be processed; services such as conferences, appointments,
|
||
mobile, etc.
|
||
|
||
|
||
|
||
- 198 -
|
||
|
||
|
||
SPC - Stored Program Control. Form of switching the US has
|
||
heavily invested in.
|
||
|
||
Sprint - One of the first LD services, also known as SPC. Sprint
|
||
owns many extender services and is not considered safe. It is
|
||
common knowledge that Sprint has declared war on fone phreakers.
|
||
|
||
SSAS - Station Signaling and Announcement System. System on
|
||
most fortress fones that will prompt caller for money after the
|
||
number, usually LD numbers, has been dialed, or the balance
|
||
due before the call will be allowed to connect.
|
||
|
||
stacking tandems - The art of busying out all trunks between
|
||
two points. This one is very amusing.
|
||
|
||
STart - Pulse that is transmitted after the KP+NPA+Nxx+xxxx
|
||
through operator or blue boxed calls. This pulse is, in hertz,
|
||
1500+1700.
|
||
|
||
station # - The last four digits in any seven digit fone number.
|
||
|
||
STD - Subscriber Trunk Dialing. Mechanism in the United Kingdom
|
||
which takes a call from the local lines and legimately elevates
|
||
it to a trunk or international level.
|
||
|
||
step crashing - Method of using a rotary fone to break into a
|
||
busy line. Example, you use a rotary fone to dial Nxx-xxx8 and
|
||
you get a busy signal. Hang up and dial Nxx-xxx7 and in
|
||
between the last pulse of your rotary dial and before the fone
|
||
would begin to ring, you can flash your switchhook extremely
|
||
fast. If you do it right, you will hear an enormous
|
||
"CLICK" and all of a sudden, you will cut into your party's
|
||
conversation.
|
||
|
||
STPS - Signal Transfer PointS. Associated with various
|
||
switching machines and the new CCIS system.
|
||
|
||
switchhook - The button on your fone that, when depressed, hangs
|
||
the fone up. These can be used to emulate rotary dial fones if used
|
||
correctly.
|
||
|
||
SxS - Step-By-Step. Also known as the Strowger Switch or the
|
||
two-motion switch. This is the switching equipment Bell began
|
||
using in 1918. However, because of its limitations, such as
|
||
no direct use of DTMF and maintenance problems, the fone
|
||
company has been upgrading since. You can identify SxS switching
|
||
offices by lack of DTMF or pulsing digits after dialing DTMF,
|
||
if you go near the CO it will sound like a typewriter testing factory,
|
||
lack of speed calling, lack of special services like call
|
||
forwarding and call waiting, and fortress fones want your money
|
||
first, before the dial tone.
|
||
|
||
- 199 -
|
||
|
||
|
||
TAP - The "official" phone phreak's newsletter. Previously YIPL.
|
||
|
||
T&C - Time and Charge.
|
||
|
||
tapping - To listen in to a phone call taking place. The fone
|
||
company calls this "service monitoring."
|
||
|
||
TASI - Time Assignment Speech Interpolation. This is used on
|
||
satellite trunks, and basically allows more than one person to use
|
||
a trunk by putting them on while the other person isn't talking.
|
||
|
||
Telenet - A computer-oriented system of relay stations which
|
||
relay computer calls to LD numbers. Telenet has a vast array
|
||
of access ports accessible at certain baud rates.
|
||
|
||
Tel-Tec - Another LD company that usually give out a weak
|
||
connection. The format is (800)323-3026,123456,(NPA)Nxx-xxxx.
|
||
|
||
Tel-Tex - A subsidiary of Tel-Tec, but is only used in Texas.
|
||
The number is *800)432-2071 and the format is the same as above.
|
||
|
||
terminal - A point where information may enter or
|
||
leave a communication network. Also, any device that is capable
|
||
of sending and/or receiving data over a communication channel.
|
||
|
||
tip - The green wire found in fone jacks and most fone equipment.
|
||
The tip is the more positive wire compared to the ring. When
|
||
looking at a fone plug from the top, lets say the hook side is
|
||
the top, the tip will be the middle wire on the left.
|
||
|
||
toll center - Any class 4 switching office located in North
|
||
America.
|
||
|
||
toll point - Any class 4P switching office in North America.
|
||
|
||
Toll LIB - Reverse CN/A bureau. See NON PUB DA for more info.
|
||
|
||
touch tone phone - A phone that uses the DTMF system to place
|
||
calls.
|
||
|
||
touch tone test - This is another test number the fone company
|
||
uses. You dial the ringback number and have the fone ring back.
|
||
Then, when you pick it up, you will hear a tone. Press your
|
||
touch-tone digits 1-0. If they are correct, the fone will beep
|
||
twice.
|
||
|
||
trace - Something you don't want any fone company to do to you.
|
||
This is when the fone company you are phucking with flips a
|
||
|
||
- 200 -
|
||
|
||
|
||
switch and they find the number you are calling from. Sometimes
|
||
the fone company will use ANI or trap and trace methods to
|
||
locate you. Then the local Gestapo home in and terminate the caller
|
||
if discovered.
|
||
|
||
trap and trace - A method used by the FBI and some step offices
|
||
that forces a voltage through the line and traces
|
||
simultaneously, which mean that you can't hang up unless the
|
||
Pheds do, and pray you aren't calling from your own house. Trap and
|
||
trace is also known as the lock-in-trace.
|
||
|
||
trap codes - Working codes owned by the LD company, not a
|
||
customer, that, when used, will send a "trouble card" to Ma
|
||
Bell, no matter what company the card is coming from, and ESS
|
||
will immediately trace the call. Trap codes have been in use for
|
||
some time now, and it is considered safer to self-hack codes
|
||
opposed to leeching them off of BBS's, since some LD
|
||
companies post these codes on phreak oriented BBS's.
|
||
|
||
Travelnet - Service owned by GM that uses WATS as well as local
|
||
access numbers. Travelnet also accepts voice validation for its LD
|
||
codes.
|
||
|
||
TSPS - Traffic Service Position System. Operator that usually is
|
||
the one that obtains billing information for Calling Card or 3rd
|
||
number calls, identifies called customer on person-to-person
|
||
calls, obtains acceptance of charges on collect calls, or
|
||
identifies calling numbers. These operators have an ANI board and
|
||
are the most dangerous type of operator.
|
||
|
||
TWX - Telex II consisting of 5 teletypewriter area codes. These
|
||
are owned by Western Union. These may be reached via
|
||
another TWX machine running at 110 baud. You can send TWX messages
|
||
via Easylink (800)325-4122.
|
||
|
||
USDN - United States Digital Network. The US's version of the
|
||
ISDN network.
|
||
|
||
videotext - Generic term for a class of two-way, interactive
|
||
data distribution systems with output typically handled as in
|
||
teletext systems and input typically accepted through the telephone
|
||
or public data network.
|
||
|
||
WATS - Wide Area Telecommunications Service. These can be IN or
|
||
OUT, see the appropriate sections.
|
||
|
||
WATS Extender - These are the LD companies everyone hacks and
|
||
phreaks off of in the 800 NPA. Remember, INWATS + OUTWATS = WATS
|
||
Extender.
|
||
|
||
white box - This is a portable DTMF keypad.
|
||
|
||
|
||
- 201 -
|
||
|
||
|
||
XBAR - Crossbar. Crossbar is another type of switching equipment
|
||
the fone company uses in some areas. There are three major
|
||
types of Crossbar systems called No.1 Crossbar (1XB), No.4
|
||
Crossbar (4XB), and No.5 Crossbar (5XB). 5XB has been the primary
|
||
end office switch of MA since the 60's and
|
||
is still in wide use. There is also Crossbar Tandem (XBT) used
|
||
for toll-switching.
|
||
|
||
XBT - Crossbar Tandem. Used for toll-switching. See XBAR.
|
||
|
||
YIPL - The classic "official" phreak's magazine. Now TAP.
|
||
|
||
|
||
Other Fone Information
|
||
======================
|
||
|
||
Voltages & Technical Stuff
|
||
--------------------------
|
||
When your telephone is ON-HOOK, there is 48 volts of DC
|
||
across the tip and the ring. When the handset of a fone is
|
||
lifted a few switches close which cause a loop to become
|
||
connected between you and the fone company, or OFF-HOOK. This is
|
||
also known as the local loop. Once this happens, the DC current is
|
||
able to flow through your fone with less resistance. This causes
|
||
a relay to energize which causes other CO equipment to realize
|
||
that you want service. Eventually, you will end up with a
|
||
dial tone. This also causes the 48 VDC to drop down to around 12
|
||
VDC. The resistance of the loop also drops below the 2500 ohm
|
||
level; FCC licensed telephone equipment must have an OFF-HOOK
|
||
impedance of 600 ohms.
|
||
When your fone rings, the telco sends 90 volts of pulsing
|
||
AC down the line at around 15-60 Hz, usually 20 Hz. In most
|
||
cases, this causes a metal armature to be attracted alternately
|
||
between two electromagnets; thus, the armature often ends up
|
||
striking two bells of some sort, the ring you often hear when
|
||
non-electronic fones receive a call. Today, these mechanical
|
||
ringers can be replaced with more modern electronic bells
|
||
and other annoying signaling devices, which also explains why
|
||
deaf people can have lights and other equipment attached to their
|
||
fones instead of ringers.
|
||
When you dial on a fone, there are two common types of
|
||
dialing, pulse and DTMF. If you are like me, you probably
|
||
don't like either and thought about using MF or blue box
|
||
tones. Dialing rotary breaks and makes connections in the
|
||
fone loop, and the telco uses this to signal to their equipment
|
||
that you are placing a call. Since it is one fone that is
|
||
disconnecting and reconnecting the fone line, if someone
|
||
else picks up another fone on the same extension, both cannot
|
||
make pulse fone calls until one hangs up. DTMF, on the other
|
||
hand, is a more modern piece of equipment and relies on tones
|
||
generated by a keypad, which can be characterized by a
|
||
0,1,2,3,4,5,6,7,8,9/A,B,C,D keypad. Most fones don't have
|
||
- 202 -
|
||
|
||
|
||
an A,B,C,D keypad, for these frequencies are used by the
|
||
telco for test and other purposes.
|
||
|
||
Scanning Phun Fone Stuff
|
||
------------------------
|
||
Scanning is the act of either randomly or sequentially
|
||
dialing fone numbers in a certain exchange when you are
|
||
looking for several different things. These things could be
|
||
carriers, extenders, ANI, "bug tracers," loops, as well as
|
||
many other interesting "goodies" the fone company uses for test
|
||
purposes.
|
||
When scanning for carriers, your local BBS probably has
|
||
some scanning programs, as these became popular after the movie
|
||
WARGAMES, but what these do are to call every fone in an
|
||
exchange, or a specified range of fone numbers in certain
|
||
exchanges to look for possible carriers and other
|
||
interesting computer equipment. So, if your computer finds a
|
||
carrier, or what seems like a carrier, it will either print it
|
||
out or save it in some file for later reference. With these
|
||
carriers one finds, one can either call them and find out what
|
||
each is or, if one of them is interesting, one can hack or
|
||
attempt to break into some interesting systems available, not to
|
||
the general public, of course.
|
||
Scanning telephone "goodies" requires time and patience.
|
||
These goodies usually cannot be traced by most unmodified
|
||
modems, as the frequencies and voice transmissions cannot be
|
||
differentiated from other disturbances, such as the annoying
|
||
operator saying, "We're sorry... blah blah..". Anyway, to scan
|
||
these, you usually get a regular carrier scanner and, with the
|
||
modem speaker on, sit by your wonderful computer and listen in
|
||
on the scanning for any interesting tones, voices, or silences,
|
||
which could be telco fone phun numbers, for us of course!
|
||
Then write these down, and spread them around, use, abuze, etc.
|
||
if you dare. Anyway, most telefone goodies are
|
||
located in the 99xx suffixes of any fone exchange. If you found
|
||
everything you think in the exchanges you have scanned, try the
|
||
0xxx and 1xxx suffixes in that order. You might even find loops,
|
||
ANI, and other phun things if you mess around enough.
|
||
|
||
|
||
References & Suggested Reading
|
||
==============================
|
||
The following is a list of references and suggested
|
||
reading for the beginning, as well as advanced phreak. See you
|
||
local fone phreak for these, or call your local phreak
|
||
oriented BBS for information regarding these publications.
|
||
|
||
2600 Magazine
|
||
|
||
Aqua Box, The By Captain Xerox & The Traveler
|
||
|
||
|
||
- 203 -
|
||
|
||
|
||
Basic Alliance Teleconferencing By The Trooper
|
||
|
||
Bell Hell By The Dutchman & The Neon Knights
|
||
|
||
Better Homes And Blue Boxing By Mark Tabas
|
||
|
||
BIOC Agent 003's Course In Basic Telecommunications
|
||
By BIOC Agent 003
|
||
|
||
History Of British Phreaking, By Lex Luthor & The Legion Of Doom
|
||
|
||
Home Phone Tips By 13th Floor Enterprises
|
||
|
||
How To Build A Blotto Box By The Traveler
|
||
|
||
How To Build A Cheese Box By Mother Phucker
|
||
|
||
Introducing The Beige Box - Construction & Use
|
||
By The Exterminator and The Terminal Man
|
||
|
||
Integrated Services Digital Network [ISDN]
|
||
By Zander Zan
|
||
|
||
LOD/H Technical Journal
|
||
|
||
Loops I've Known And Loved By Phred Phreak
|
||
|
||
PHRACK Magazine
|
||
Edited By Taran King and Knight Lightning UMCVMB
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
- 204 -
|
||
|
||
950's: The Real Story: by Jester
|
||
|
||
Ever heard (actually, seen) people on various hacking boards
|
||
around the country telling you how you are going to get caught for
|
||
sure if you use the in state-WATS (950) telephone numbers to make
|
||
your phreaks off of? This file is to tell you what the story is
|
||
with 950's and how to SAFELY use them. The 950 prefix was created
|
||
by the old Bell System for all the SSC's (Specialized Common
|
||
Carrier), or Extenders as they are called, to place their services
|
||
upon. This was done for the long distance company's benefit so
|
||
they could have the same dialup in all cities across the USA. For
|
||
some reason, the Long Distance companies rejected the 950 prefix in
|
||
favor of local lines and 1-800 numbers.
|
||
|
||
Disadvantages to 950's are that they are run on a special ESS
|
||
of their own that can trace you call before you can say 'shit!'.
|
||
But tracing only occurs on special occasions. The companies on
|
||
950's will only trace when the computer controlling the calls sees
|
||
that there is an unusually high number of calls to the extender on
|
||
that particular day. The computer then will auto-trace every
|
||
100th call or so. Which means that, if used in moderation, 950's
|
||
are fantastic!
|
||
|
||
Advantages: By having the same dialup in all cities, you can
|
||
go on vacation and just hack codez to use for while you are there
|
||
on your favorite 950 extender. Being a free call (in most cases,
|
||
some phones not) from a pay phone, this is very advantageous.
|
||
Also, and anyone who has used a 950 knows this, the connections on
|
||
950 extenders are VERY clear usually, making for excellent
|
||
error-free data transfer on AE lines, etc.
|
||
|
||
With the breakup of the Bell System in January of 1984, the
|
||
950 prefix was supposed to be dragged down with it and the
|
||
companies were supposed to have switched over to either local or
|
||
1-800 numbers, but as is very typical of the phone company, they
|
||
never got around to it.
|
||
|
||
Here is the list of the 950's that are currently in use in
|
||
the U.S. :
|
||
|
||
950-1000..........Southern Pacific Communications
|
||
950-1022..........MCI Exec-U-Net
|
||
950-1033..........U.S. Telephone
|
||
950-1044..........AllNet
|
||
950-1066..........Lexitel
|
||
950-1088..........SBS Skyline
|
||
|
||
Personally, I favor the use of 950-1088, because it has many
|
||
users and the codez (which, by the way are 6 digits, but they are
|
||
switching over to 8 igits) are easy to hack out from a
|
||
pay phone. You may want to try the other services so you can have
|
||
a few codez from each available for use.
|
||
|
||
- 205 -
|
||
|
||
|
||
Automatic Number Identifier: By Jester
|
||
|
||
Automatic Number Identification
|
||
|
||
|
||
Automatic Number Identification (ANI) is nothing more than
|
||
automatic means for immediately identifying the Directory Number of
|
||
a calling subscriber. This process made it possible to utilize
|
||
CAMA* (Centralized Automatic Message Accounting) systems in SxS,
|
||
Panel, and Xbar #1 offices. The identity of the calling line is
|
||
determined by ANI circuits installed in the types of CO's mentioned
|
||
above. Xbar#5 offices have their own AMA (Automatic Message
|
||
Accounting) equipment and utilize an AMA translator for
|
||
automatically identifying the calling line.
|
||
|
||
Before ANI was developed, each subscriber line (also called a
|
||
local loop) had a mechanical marking device that kept track of toll
|
||
charges. These devices were manually photographed at the end of the
|
||
billing period and the amount of the subscribers bill was
|
||
determined from that. This process was time consuming, so a new
|
||
system (ANI) was developed.
|
||
|
||
The major components of the ANI system used in SxS and Crossbar #1
|
||
are: Directory number network and bus arrangement* for connecting
|
||
the sleeve (the lead that is added to the R(ing) and T(ip) wires of
|
||
a cable pair at the MDF* (Main Distribution Frame)); A lead of each
|
||
line number through an identifier connector to the identifier
|
||
circuit; Outpulser and Identifier connector circuit to seize an
|
||
idle Identifier; Identifier circuit to ascertain the calling
|
||
party's number and send it to the outpulser for subsequent
|
||
transmission through the outpulser link to the ANI outgoing trunk;
|
||
An ANI outgoing trunk to a Tandem office equipped with a CAMA system.
|
||
|
||
The following is a synopsis of the ANI operations with respect
|
||
to a toll call through a #1Xbar office. The call is handled in the
|
||
normal manner by the CO equipment and is routed through an ANI
|
||
outgoing trunk to a Tandem office. The identification process
|
||
starts as soon as all digits of the called number are received by
|
||
the CAMA sender in the Tandem office and when the district juncture
|
||
in the Xbar office advances to its cut-through position (a position
|
||
of the connecting circuits or paths between the line-link and
|
||
trunk-link frames in the CO).
|
||
|
||
Upon receiving the start identification signal from the CAMA
|
||
equipment, the ANI outgoing trunk (OGT) establishes a connection
|
||
through an outpulser link to an idle outpulser circuit. An idle
|
||
identifier is then seized by the outpulser circuit through an
|
||
internal Identifier connector unit. Then the identifier through
|
||
the connector unit connects to the directory number network and
|
||
bus system.
|
||
|
||
|
||
|
||
- 206 -
|
||
|
||
|
||
At the same time, the identifier will signal the ANI trunk to
|
||
apply a 5800Hz identification tone to the sleeve lead of the ANI
|
||
trunk. The tone is transmitted at a two-volt level over the S lead
|
||
paths through the directory number network and bus system. It will
|
||
be attenuated or decreased to the microvolt range by the time the
|
||
identifier circuit is reached, necessitating a 120dB voltage
|
||
amplification by the amplifier detector equipment in the
|
||
identifier to insure proper digit identification and registration
|
||
operations.
|
||
|
||
A single ANI installation can serve as many as six CO's in a
|
||
multi-office building. The identifier starts its search for the
|
||
calling line number by testing or scanning successively the
|
||
thousands secondary buses of each CO. When the 5800Hz signal is
|
||
detected, the identifier grounds corresponding leads to the
|
||
outpulser, to first register the digit of the calling office and
|
||
then the thousands digit of the calling subscriber's number. The
|
||
outpulser immediately translates the digit representing the calling
|
||
office code into its own corresponding three digit office code. The
|
||
identifier continues its scanning process successively on the
|
||
groups of hundreds, tens, and units secondary buses in the calling
|
||
office, and the identified digits of the calling number are also
|
||
registered and translated in the outpulser's relay equipment for
|
||
transmission to the tandem office. The outpulser is equipped with
|
||
checking and timing features to promptly detect and record troubles
|
||
encountered (This process may be responsible for some of the cards
|
||
found while trashing). Upon completion of the scanning process, it
|
||
releases the identifier and proceeds to outpulse in MF tones the
|
||
complete calling subscriber's number to the CAMA equipment in the
|
||
tandem office in the format of KP+X+PRE+SUFF+ST where the X is an
|
||
information digit. The information digits are as follows:
|
||
0-Automatic Identification (normal)
|
||
1-Operator Identification (ONI)*
|
||
2-Identification Failure (ANIF)*
|
||
|
||
(There is also other types of outpulsing of ANI information if the
|
||
calling line has some sort of restriction on it).
|
||
|
||
When all digits have been transmitted and the ANI trunk is
|
||
cut-through for talking, the outpulser releases.
|
||
|
||
In the tandem office, the calling party's number is recorded on
|
||
tape in the CAMA equipment together with other data required for
|
||
billing purposes. This information, including the time of when the
|
||
called station answered and the time of disconnect, goes on AMA
|
||
tapes. The tapes themselves are usually standard reel to reel
|
||
magnetic tape, and are sent to the Revenue Accounting Office or RAO
|
||
at the end of the billing period.
|
||
|
||
|
||
|
||
|
||
- 207 -
|
||
|
||
|
||
So, to sum the entire ANI process up:
|
||
|
||
The toll call is made. The CO routes the call through ANI trunks
|
||
where an idle identifier is seized which then connects to the
|
||
directory number network and bus system while signalling the ANI
|
||
trunk to apply the needed 5800Hz tone to the Sleeve. The identifier
|
||
begins a scanning process and determines the calling office number
|
||
and the digits of the calling subscriber's number, which is sent by
|
||
way of the outpulser in MF tones to the CAMA equipment in the
|
||
tandem office. The call information is recorded onto AMA tapes and
|
||
used to determine billing.
|
||
|
||
Note that your number does show up on the AMA tape, if the
|
||
circumstances are correct, (any toll call, whether it is from a
|
||
message-rate line or from a flat-rate line). However, the AMA tapes
|
||
do not record the calling line number in any separated format. They
|
||
are recorded on a first-come, first-serve basis.
|
||
|
||
|
||
Misc. Footnotes (denoted by an asterisk in the main article)
|
||
---------------
|
||
|
||
* ANIF-Automatic Number Identification Failure. This is when the
|
||
ANI equipment does not work properly, and could occur due to a wide
|
||
variety of technicalities. When ANIF occurs, something called ONI
|
||
(Operator Number Identification) is used. The call is forwarded to
|
||
a TSPS operator who requests the calling line number by saying
|
||
something similar to 'What number are you calling from?'
|
||
|
||
* CAMA-Centralized Automatic Message Accounting. CAMA is a system
|
||
that records call details for billing purposes. CAMA is used from
|
||
a centralized location, usually a Tandem office. CAMA is usually
|
||
used to serve class 5 End Offices in a rural area near a large city
|
||
which contains a Tandem or Toll Office. CAMA is similar to LAMA,
|
||
except LAMA is localized in a specific CO and CAMA is not.
|
||
|
||
* The Directory Number Network and bus system is a network involved
|
||
with the ANI process. It is a grid of vertical and horizontal
|
||
buses, grouped and classified as Primary or Secondary. There are
|
||
100 vertical and 100 horizontal buses in the Primary system. In the
|
||
Secondary system, there are two sub-groups: Bus system #1 and Bus
|
||
system #2, both of which have ten horizontal and vertical buses.
|
||
These buses as a whole are linked to the Identifier in the ANI
|
||
trunk and are responsible for identifying tens, hundreds, thousands
|
||
and units digits of the calling number (After the Identifier begins
|
||
its scanning process).
|
||
|
||
* MDF-Main Distribution Frame. This is the area where all cable
|
||
pairs of a certain office meet, and a third wire, the Sleeve wire,
|
||
is added. The Sleeve wire is what is used in gathering ANI
|
||
|
||
- 208 -
|
||
|
||
|
||
information, as well as determining a called lines status (off/on
|
||
hook) in certain switching systems by presence of voltage. (voltage
|
||
present on Sleeve, line is busy, no voltage, line is idle.)
|
||
|
||
* ONI-Operator Number Identification. See ANIF footnote.
|
||
|
||
NOTE: There are also other forms of Automatic Message Accounting,
|
||
such as LAMA (Local Automatic Message Accounting). LAMA is used in
|
||
the class 5 End Office as opposed to CAMA in a Toll Office. If your
|
||
End Office had LAMA, then the ANI information would be recorded at
|
||
the local level and sent from there. The LAMA arrangement may be
|
||
computerized, in which it would denoted with a C included (LAMA-C
|
||
or C-LAMA).
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
- 209 - |