textfiles/phreak/PHREAKING/bob-4.phk
2021-04-15 13:31:59 -05:00

1844 lines
71 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Area Code List: By Net Runner
FOLLOWING IS A LIST OF TELEPHONE AREA CODES IN NUMERICAL ORDER. I
TRIED TO PUT A CAPSULE DESCRIPTION OF THE AREAS WITHIN THE STATES
AND PROVINCES. THE CITY NAMES INCLUDE THE AREA SURROUNDING THE CITY
EXCEPT THAT NEW YORK CITY HAS TWO AREA CODES. THE STATES AND
PROVINCES WITHOUT ANYTHING AFTER THEM HAVE JUST ONE AREA CODE, I.E.
CONNECTICUT, MANITOBA. (BY PHRINGEWARE)
201 NEW JERSEY, NORTHEAST 202 DISTRICT OF COLUMBIA
203 CONNECTICUT 204 MANITOBA
205 ALABAMA 206 WASHINGTON, WEST
207 MAINE 208 IDAHO
209 CALIFORNIA, FRESNO 212 NEW YORK
213 CALIFORNIA, LOS ANGELES 214 TEXAS, DALLAS
215 PENNSYLVANIA, PHILADELPHIA 216 OHIO, CLEVELAND
217 ILLINOIS, MIDDLE 218 MINNESOTA, DULUTH
219 INDIANA, NORTH 301 MARYLAND
302 DELAWARE 303 COLORADO
304 WEST VIRGINIA 305 FLORIDA, MIAMI
306 SASKATCHEWAN 307 WYOMING
308 NEBRASKA, WEST 309 ILLINOIS, PEORIA
312 ILLINOIS, CHICAGO 313 MICHIGAN
314 MISSOURI, ST. LOUIS 315 NEW YORK, SYRACUSE
316 KANSAS, SOUTH 317 INDIANA, CENTRAL
318 LOUISIANA, WEST 319 IOWA, EAST
401 RHODE ISLAND 402 NEBRASKA, EAST
403 ALBERTA 404 GEORGIA, NORTH
405 OKLAHOMA, OKLAHOMA CITY 406 MONTANA
408 CALIFORNIA, SAN JOSE 409 TEXAS, GALVESTON
412 PENNSYLVANIA, PITTSBURGH 413 MASSACHUSETTS, SPRINGFIELD
414 WISCONSIN, MILWAUKEE 415 CALIFORNIA, BAY AREA
416 ONTARIO, TORONTO 417 MISSOURI, SPRINGFIELD
418 QUEBEC, QUEBEC 419 OHIO, TOLEDO
501 ARKANSAS 502 KENTUCKY, WEST
503 OREGON 504 LOUISIANA, NEW ORLEANS
505 NEW MEXICO 506 NEW BRUNSWICK
507 MINNESOTA, ROCHESTER 509 WASHINGTON, EAST
512 TEXAS, AUSTIN 513 OHIO, CINCINNATI
514 QUEBEC, MONTREAL 515 IOWA, CENTRAL
516 NEW YORK, LONG ISLAND 517 MICHIGAN, CENTRAL LP
518 NEW YORK, ALBANY 519 ONTARIO, LONDON
601 MISSISSIPPI 602 ARIZONA
603 NEW HAMPSHIRE 604 BRITISH COLUMBIA
605 SOUTH DAKOTA 606 KENTUCKY, EAST
607 NEW YORK, BINGHAMTON 608 WISCONSIN, MADISON
609 NEW JERSEY, SOUTHWEST 612 MINNESOTA, TWIN CITIES
613 ONTARIO, OTTAWA 614 OHIO, COLUMBUS
615 TENNESSEE, NASHVILLE 616 MICHIGAN, WEST LP
617 MASSACHUSETTS, BOSTON 618 ILLINOIS, SOUTH
619 CALIFORNIA, SAN DIEGO 701 NORTH DAKOTA
702 NEVADA 703 VIRGINIA, NORTH & WEST
- 210 -
704 NORTH CAROLINA, 705 ONTARIO, NORTHEAST
707 CALIFORNIA, EUREKA 709 NEWFOUNDLAND
712 IOWA, WEST 713 TEXAS, HOUSTON
714 CALIFORNIA, ORANGE 715 WISCONSIN, EAU CLAIRE
716 NEW YORK, BUFFALO 717 PENNSYLVANIA, HARRISBURG
718 NEW YORK, 801 UTAH
802 VERMONT 803 SOUTH CAROLINA
804 VIRGINIA, SOUTH & EAST 805 CALIFORNIA, BAKERSFIELD
806 TEXAS, AMARILLO 807 ONTARIO, NORTHWEST
808 HAWAII 812 INDIANA, SOUTH
813 FLORIDA, FT.MYERS 814 PENNSYLVANIA, ALTOONA
815 ILLINOIS, NORTH 816 MISSOURI, KANSAS CITY
817 TEXAS, FORT WORTH 818 CALIFORNIA, ENCINO
819 QUEBEC, RURAL 901 TENNESSEE, MEMPHIS
902 NOVA SCOTIA & P E I 904 FLORIDA, NORTH
906 MICHIGAN, UPPER PENINSULA 907 ALASKA
912 GEORGIA, SOUTH 913 KANSAS, NORTH
914 NEW YORK, WHITE PLAINS 915 TEXAS, WEST
916 CALIFORNIA, SACRAMENTO 918 OKLAHOMA, TULSA
919 NORTH CAROLINA, NORTH & EAST
- 211 -
The Bible of Fraud: By: Sneak Thief
What A Fool I Was!
------------------
Looking back on my old file, The Bible of Fraud, I'm almost
sickened at how lame I was back then (then again, some people will
argue about how lame I am NOW), so this file will attempt to
rectify some of the earlier flaws in The Bible of Fraud.
CBI/TRW
-------
CBI and TRW are huge credit verification systems which contain
credit information on 125 or so million Americans. If you simply
know the name, address, and first letter of someone's street, you
can find out their credit card number, and other essential
informations. You can see how useful this can be for carders. But
TRW and CBI's usefullness does have it's price, however...
CBI and TRW passwords are much harder to find than they were way
back when. CBI passwords are echoed back to screen when entered,
hence they are not echoed to the business' printer which is usually
on during during the procedure. Although many will argue with me,
I believe that TRW passwords are. This is as of three months ago,
when I shocked myself and friends by finding a print-out with a
valid TRW code on it. Shocked, I most definately was. But, TRW is
getting greatly worried due to complains from people with their
records violated, so it most definately unlikely that they will
keep up the practice. As I mentioned in my earlier file, CBI is
generally prefered to TRW by any carder with enough sense to tie
his shoes without help from Mommy. The reason for this is simple:
TRW is VERY nasty towards anyone in their system! They trace.
They prosecute. If someone breaks in while you're on one of these
systems and says, "What the HELL are you doing!?" Don't bother
hanging up. They've already got you. You could try and BS your way
out of it, but I doubt that (by the way, however, it is unlikely
that TRW is paying very close attention to most of the ports of
their system due to the sheer number of them, but if you dial your
local TRW dial-up direct [Never, NEVER do that!] and they break in,
your career is over. CBI, according to many people I've talked to,
is much less dangerous than TRW, but I doubt that they wouldn't
enjoy hauling your ass into court if they caught you. The only
really easy way I envision getting a CBI code (other than leeching
off of someone else), is to look in the trash for CBI print-outs
with the users code written on them (so the idiot using the machine
won't forget). This is unlikely, but Metro ever waking up to the
fact that they we're being robbed blind was unlikely, also. So, in
conclusion, I would just get my hands dirty by trashing, as TRW and
CBI codes go dead so fast, they usually aren't worth the trouble
you took to get them. On to trashing techniques!
- 212 -
Trashing
--------
If you do not know what trashing is, I recommend that you scavenge
up a copy of the Bible of Fraud, as it gives a more complete
explanation of trashing techniques.
Some hints...
o Good places to trash are Flower Shops. They do a lot of
phone orders, and instead of reaching your hand into
chicken guts or the bag where they empty the ashtrays
into, you can just root around in wilted flowers.
o Malls are not great places to trash. This is because
of an increasing number of nosy security cops, and the
fact that tenents at the mall have usually been lectured
on security and shred their carbons.
The Bible of Fraud:
o Try and get all the information from a carbon that you
can. If you find a business that requires all kinds
of information (driver's license number, home address,
etc), as my local Video World does, your in luck. Many
places require all of this information.
o Trash around the beginning or end of the month. This
is when many companies throw away their old files filled
with carbons. You can also try the end of the week, as
some stores clear out the weeks files then.
o FIND OUT WHEN TRASH DAY IS! Then come the evening
before. If your going to find anything, find it then.
On to the next section, Ordering.
Ordering
--------
The key to ordering is the voice. That's all there is too it. If
you sound like Mickey Mouse, better find someone else to order for
you. Here are some tips on ordering...
o Do not be playing any music in the background.
o Keep the door closed in the room your ordering from, and
whenever possible, order when your parents aren't home.
This way, they won't hear your mother screaming at you
to do chores, or some other stupid thing, and your mother
won't hear you ordering (we wouldn't want her to do that,
would we?
- 213 -
o If something goes wrong with the order (suspicious clerk,
etc), or your asked for a piece of info you can't give,
DO NOT HANG UP INSTANTLY. This instills great suspicion,
suspicion of you. Far better it is to BS out of it
and then hang up more polietly.
o If you give them the credit card number, and then
something goes wrong (ie: you panic and hang up),
throw away the number you gave them. It may
be overly cautious, but you never know!
o Call (800) verification numbers from a pay-phone.
o Order from a payphone [One of my favorite techniques
is to find a remote pay phone in which there is two
or more phones, and order from one and leave the other
off-hook. Then I give the guy the phone number of the
off-hook phone. This is good because I have had
instances in which I had a number that rang forever,
and they called it while I was on! ("Sir, your phone
is ringing...")]
o Never, ever, allow your voice to squeak.
Ok, I think that is about all that is really needed on ordering, so
on to the next section: The Drop
The Drop Site
-------------
After you find the perfect card, and order perfectly, you've still
got to pick it up. This is the most dangerous part, so it might be
a good idea to find someone else to do it for you, but I doubt
anyone would do it. Wear normal clothes and look normal. If you
pull a cap over your eyes, wear dark sunglasses, etc they will
probably remember you, and on the off chance that the Feds come
interview these people they can give a MUCH better description. By
far the best way to fraud is to find an isolated house that is
vacant. Make sure that it is far enough away from your house that
it won't cause suspicion, but close enough that when you come to
check on your order every day you won't be too tired. If you drive
your car to the drop site, use a little sense and park it a couple
blocks away. Unfortunately, vacant houses are rare, and they do
not stay vacant for long. Thus, another good way is to find a
house in which no one is home in the daytime (this isn't so hot
when you order special UPS [It's always a good idea to wait for
regular UPS!], since they can't sign for it. If you cannot find a
family that works, then you will just have to send it to any old
house. Leave these people a note saying "Due to an error, some of
the goods I ordered are coming to your house. I would appreciate
you holding them for me." Then just come and pick them up (when
doing this, wait for a week after your sure it'll be there. Coming
back more than once would stick your face in their memory.
- 214 -
The only rule of the drop is: NEVER USE A PO BOX! Not only if
you are caught will you get in more trouble, you are much more
likely to get caught. I cannot count how many times I've seen
people get busted from a PO box because they keep on reusing the
same one. Save yourself the trouble and expense, and the risk, and
forget a PO Box. I'd hate to read about you in the paper.
On to the final section, Random Hints.
Random Hints
------------
o Get rid of your carbons. Copy them on to a disk file,
so they are easier to destroy (in case of emergency),
and your parents won't chance upon them.
o Decide what you want to get before you get before you
get it. If you need an Apple Cat 212 and and a ten
meg for your board, get them and don't add a Hayes
Mach /// joystick for Bill, a 212 upgrade for Sam,
a...
o Lay low after a fraud. After you fraud something, wait
a couple of weeks before you try anything else.
o Never keep any of the stuff that comes with the
merchandise. Such as the invoice slip, etc. Destroy it
immediately.
o Do not get greedy. That will only cause trouble. Fraud
what YOU need, and only the essentials. If your friends
want something, it's up to them to take the risk of
getting it!
o Never use the same address, PO Box, etc., twice. In
fact, only send something to a general area once.
o Sell whatever you can. Use the profits from that to
buy the same stuff legally. (It makes things easier
than destroying serial numbers, etc)
The Bible of Fraud:
o Computer stuff is the hardest to fraud. If you find
yourself getting frustrated, fraud something easy but
something that you can sell for a decent profit (Tennis
rackets are great for this!)
o Don't flaunt what you get. Parents are VERY suspicious.
- 215 -
Hot Areas
---------
You won't get busted. Rather, you won't get busted if the feds
don't come into your area. If they start getting interested, and
investigate your area, and then you attempt a fraud, you are
busted. So wise up. If you see strange men in dark business suits
and aviator sunglasses lounging around in front of your
drop, or cars in government license plates are driving around your
city, cool it. If you live in say, Los Angeles, you can get away
with more than if you live in Crow's Neck, Montana. The reason is
once they get interested in Crow's Neck, they can stake out the
entire town, wheras in Los Angeles that is slightly difficult even
for your friends and mine, the FBI. So, take the obvious
course--let your area stay cool. Small frauds, spaced far apart
will keep you safe. 5 ten megs to the same address in a week
won't.
The Media
---------
You see the media constantly crowing about "Teenage 'HACKERS' in
New Jersey Arrested", or "Irvine Youths Convicted of Five Counts of
Mail and Wire Fraud", but the truth is that they don't make many
busts, that's why they keep on blabbing about the ones they do
make. But, if you read in the paper about your friend Bez Man
being busted, and he lives five miles away, take it as a hint to
start destroying documents, etc, etc... In other words, use the
media as some sort of 'heat detector'. When they start crowing
about law and order and computer crime, it's time to pack things up
for a while. Likewise after a MAJOR bust, as the local cops will
always be looking to get in on the glory.
The End
-------
I hope that this file has been educational, and I wish you luck on
any career of frauding. Don't get busted, and don't get greedy,
and enjoy a long career of getting what you want--for free.
I would REALLY appreciate any feedback, and I'll give credit where
credit is due, so leave me a message on any of the below listed
boards.
If you didn't like this file. . .I don't really care (I've got
enough things to worry about!)
- 216 -
HACKING/PHREAKING--THE DO'S AND DON'TS,THE WHY'S AND HOW'S BY:THE JESTER
=---=---=--=---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=
*NOTE*--ALL OF THE LAW'S AND DEFINTIONS CITED HEREIN ARE FOR THE
STATE OF ILLINOIS.IF YOU LIVE IN ANOTHER STATE,I SUGGEST
YOU GO TO YOUR LIBARY AND LOOK UP YOUR STATE LAW'S.
PREFACE:Firstly I will decribe the ways hackers go about hacking
a system,then the current telephone law's and lastly the
defintions of computers and other miscellaneous
definions.
First off I would like to disspell a few myths.
1--You are a minor untill you are 19,emancipated or living without
parant(s) or guardan.
2--Computer data and programs are property and therefore if taken
without consent of the owner is grounds for prosecution.
THE WAY HACKERS HACK:
--- --- ------- ----
SABOTAGE.
-Physicaly-abusing computers,data or magnetic medea.
-logicly-this includes removing of labels and titles
from the storeage container or from the data itself.
-accidental-using a sititution wherein the computer
or data would be destroyed or damaged. ( ie. setting
fire to a pile of papers causing the sprinklers to go
off ect.)
IMPERSINATION.
-impersinating a leagle user to gain access to the
computer,data ect.
DATA DIDDLING.
-This method is done via phone-modem line and nessatates
a knowlage of programing.The essance of this method is
changeing the output to ones needs. ( ie. You send your
boss a note asking for a coffee break,he oks it and
sends it back.Then you take advantage of the time it
takes to get to you back and change the note to say
that you can take 2 weeks off with pay.)
- 217 -
SUPERZAPPING.
-Superzapping is the use of a master program to bypass
the safeguards.Many banks have superzap programs if
the system freezes and they need to get into the
accounts.
SCAVENGING.
-This is just like a undelete program.If a programer
had a legal account all he would have to do is read
the old info from the current disk or tape.
-Also scavenging is accomplished by looking through
a companys garbage.Companys are alway throwing out
old codes and information wich may be useful to a
hacker.
WIRETAPPING.
-This is the gathering of information through a wire
tap.
TRAPDOORS.
-These are master passes wich a programer put into the
system so that if the company added more safeguards
onto the system he would be able to enter the system
later.
TROJAN HORSE.
-This is a program wich has been modified to suit
the hackers needs.The hacker often adds a hidden
subrutine wich will make his account bigger or
make a file adding passwords to his access level
everytime an action is executed(like logging on
or accessing help files.)
ASYNCHRONOUS ATTACK.
-This method is made only by the most experanced
hacker.It involves attacking the operating system
by trying things that the operating system wasn't
ready for(like lots of control charters to name
one).The out come is usualy a crash but sometimes
the system may allow the hacker to enter th system.
LOGIC BOMBS.
-This is nothing more than an order to delete files
or data when a condition is met.These bombs can
be set for days or even years later.
IT'S THE LAW:
---- --- ---
This will examin the current phone and computer law's for Illinois.
- 218 -
Unlawful use of a computer ocurrors when:
1--A person gains access to the use of a computer system
without consent of the owner.
2--Knowingly alters or destroys programs or data without
comsent of the owner.
3--Obtains use of,damages,or alters a computer system or
any part there of.
4--Accesses any computer or computer system for the purpose
of (1)-devising any scheme to defraud or (2)-obtains
money,property or services by means of fraudulent
pretances.
Sentance:
1-If convicted of part 1 or 2 sentance is,for less than
$1,000 in damage,gulty of a petty offense.For damage of
more than $1,000 in damage,is gulty of a class A
misdemeanor.
2-If convicted of part 3 or 4 sentance is,for less than
$1,000 in damage,is gulty of a class a misdemeanor.For
more than $1,000 in damage,is gulty of a class 4 felony.
3-Also if you are found gulty and convicted the aggrieved
person may have your equpment liquidated for $5,000 or
the actual cost,wichever is greater and have you pay for
their attorney.
Unlawful use of phone lines: Includes,swearing,calling and
hanging up and other harasment whom- ever is convicted of said
offence is gulity of a class b misdemeanor. Puting sluggs and
tampering with a pay phone is also a class B misdemeanor.
Tapping lines,interfearing with phone messages and obtaing
phone searvice with intent to defraud is a class A misdemeanor.
With intent to defraud:
Definition--
[A]-Charging phone service to a existing telephone number
or credit card number without consent of the owner.
[B]-Charging said service to a false or nonexistent phone
or credit card number.
[C]-Using a code or scheme to send or receive information.
[D]-Installing,rearanging or tampering with any equpment
physicaly,acousticaly or electronicly.
[E]-Publishing the number or code of an existing,cancled
or revoked credit device wich may be used to avoid
payment of any lawful telephone charge.
- 219 -
[F]-Publishing plans,diagrams or methods for the
construction of any device wich may be used to avoid
payment of a lawful telephone charge.
If convicted of any of the above the punishmet is as a
class A misdemeanor.
Felons,Misdemeanors:
Class A misdemeanor-punshable with up to 1 year in prison
Class b misdemeanor-punishable with up to 6 months in
prison and/or a $300 fine.
Class 4 felon-punishable with 6 to 30 years in prison.
NEW LAWS:
--- ----
At this wrighting a new bill is being proposed in the
House of representives wich if passed as a law will restrict bbs'
by making the sysop responsable for all of the messages and
information and having the sysop keep a written log of users and
messages.
RELAX:
-----
A law pased before July 1 takes effect January 1 of the
next year. A law passed afer July 1 take effect July first of next
year. In both cases the General Assembly,by vote of 3/4 of the
members, may elect to have the said law take effect earlyer or
later.
I hope to have enlightened some of the users and board the
rest.My advice is not to get cought.So be careful and don't do
anything i wouldn't do.
- 220 -
Field Freak by Home boy
Field Phreaking
-=-=-=-=-=-=-=-=-=-
Introduction: The purpose of this manuscript is to introduce
useful phreaking techniques. These techniques have been developed
by the Third Cartel and have proved to be convenient and reliable.
Field Phreaking Kit:
====================
The Field Phreaking Kit is a neccessity for the serious phreaker.
Some so-called phreaks get all of their information including codes
from BBSs and have an ego big enough to call themselves phreaks.
The real phreak acquires knowledge on his own through perseverence
and ingenuity. Following is a list of useful items for your
Phreaking Kit:
o Backpack: Get a nice one to hold all of your materials.
o Test Phone: Very Handy. We'll tell you how to get one or
make one.
o Ratchet Set: Usually, you'll only need 7/16 and 3/8" size
ratchets.
o Screwdrivers: Get medium and large screwdrivers, and a
phillips head.
o Wire Cutters: Just in case you want to wipe out some lines.
o Pliers: For misc. stuff.
o Xacto or Pocket Knife: To strip or cut wires.
o Penlight: Nice and small; very useful for night work.
o Flashlight: If you need lots of light and have enough room in
your pack.
o Gloves: Make sure you don't get shocked or leave your
fingerprints around.
o Pencil and Paper: Write down locations, notes, numbers, etc.
-----------------------------------------------------------------
The Third Cartel carries the following optional materials in their
Field Kit:
-----------------------------------------------------------------o
Walki-Talkies: For communications when yelling isn't possible
or smart.
o Battery Operated Camara Flash: Good for flashing in someone's
eyes at night Will blind a telco guy for a few seconds.
o Mace/Dog Repellant: Spray in someone's eyes if they give you
trouble.
o Smoke Bomb: Helpful to divert attention or scare. [drop in
telco car] [Mix 3 parts potassium nitrate with 2 parts sugar
and melt]
o Matches: For smoke bomb or anything that is flammable.
o Bandana/Surgical Mask: Manholes are dusty; Wear these for
easier breathing.
- 221 -
o Marker: Mark your "territory" on phone boxes.
o Fake Telco ID Card: Will make some people think that you work
for telco.
Organize your kit so you know where everything is and can get
something quickly when needed. You don't want to be fumbling for
your mace when the gestapo is about to get you.
Test Phone:
===========
The Test Phone is the most useful piece of equipment for Field
Phreaking. You can try to sneak into a telco Plant Department
[truckyard] and get a real test phone out of a truck like we did.
If you'd rather not do this, don't worry; making your own test
phone is ultra-easy.
First, get a telephone for your own purposes. Find the wire coming
out of the phone that is supposed to go to the wall's modular jack.
It should be at least three feet long for convienience. Cut off
the modular jack at the end of the wire. Strip the wire, and
there should be two or four small wires inside. Hook the two
middle wires to alligator clips [preferably insulated]. You now
have a test phone! Very easy, indeed. Now let's see if you
hooked everything up ok. First find your phone box. It'll
probably be on the outside of your house. It's farly small, and
you might need the ratchet to open it up. Once you get it open,
you should see some screws. These are the terminals for your phone
line. Hook the alligator clips to the two top terminals. If your
phone is ok, you should get a dial tone. Once you know that your
phone is working, a whole new world opens up to you! You can hook
the phone up to your neighbor's terminal and call long distance or
yell at the operator on their line. Be careful, though. You don't
want to be talking to Sue in L.A. when your neighbors are home and
awake. If they pick up the phone when you're already on, you could
get into serious trouble. Of course, you could always listen in on
them! If you want, you can hook wires up to your neighbor's terminal
and lead them to your house. In case you didn't know, this is called
Beige Boxing. You can then hack computers on their line, call
Dial-A-Prayer, etc. Make sure to hide the wire well so that it
won't be traced to your house!
Manholes:
=========
One way to get access to an abundance of phone lines is by getting
into telco manholes. You don't want to accidentally get in a sewer
manhole, so the first thing to do is find the differences between
sewer and telephone manholes. If you have trouble with this,
here's a few tips that might help:
- 222 -
o Telco manhole covers are usually larger and heavier than other
covers.
o Telco manholes are scarce compared to sewer manholes. So if
there are a lot of checkered manhole covers in your area,
those are probably sewer manholes. If there are only a
handful of unmarked manhole covers in your area, those
probably contain phone lines.
o Go to your local telco Central Office [CO] and find out what
the manhole covers look like there. Find manhole covers that
look the same in other areas, and pick a convenient/safe
manhole to explore.
Getting into a manhole is a different story. Here in the Denver
area, it takes at least three people to get a manhole cover off.
Hopefully it'll be easier to do in your area. To open the manhole,
you'll probably need at least two crowbars [You could try using a
pickaxe]. Get a group together to open the manhole, using 2 or
more people with crowbars to slide the cover off. You
might want to get a strong guy to push the manhole cover while the
other people with crowbars support it. If you know of a tool that
was made specifically for opening manholes, we'd appreciate it if
you contacted us on some local Denver boards and told us about it.
Likewise, if you have a better system for opening manholes, we'd be
grateful for the information.
Once you get the manhole cover off, shine a flahlight down to see
if there's a ladder going to the bottom. Try a different manhole
if there's no ladder. If you want to go down a manhole, don't
forget to wear a bandana or surgical mask over your mouth so that
you don't choke on dust. Also bring a flashlight so you can see
what you're doing. Many times, there'll be a few inches of water
at the bottom, so you might also want to wear boots.
Down in the manhole, you might find some equipment or manuals. Go
ahead and take them if you want; you deserve it! There should be
some very large ABS plastic tubes going across the "room" you're
in. The phone lines are inside these tubes. Attached to this
tubing there will be some short, wide plastic cylinders. There'll
be screws holding these cylinders on to the tubing. You'll need
either a screwdriver or a ratchet to open a cylinder. If you happen
to get a cylinder open, congratulations! You now have access to
countless phone lines! We'll leave it to you to figure out what to
do with all of those wires. Surely you'll figure something out!
[snip, snip!]
Exploring Telco Building Sites:
===============================
One of the best ways to get information about telco is by going to
a Central Office near you, exploring the trucks in a Plant
Department, or "visiting" other telco buildings. The phone company
is careless in many ways. They leave important, yet unshredded
documents and computer printouts in their open DUMPSTERS.
- 223 -
Their cars, vans, and repair vehicles are almost always left
unlocked. Inside their vehicles one can usually find manuals,
test phones, computer cards [usually for mainframes, almost never
for personal comuters], nice tool sets, etc.! It's almost as if
they *want* to be ripped off! They deserve bad treatment just for
their negligence. If possible, we like to be courteous to
individual employees of telco. Most employees are fairly amiable
and don't deserve trouble. It's the beuracracy of telco that
deserves to be manhandled. Cheap practices such as monopolizing
and the overpricing of services is the general reason why we phreaks
do what we do with such determination. On with the show.
Exploring Dumpters: Looking inside telco dumpters is probably the
easiest way to acquire useful information. Typycally, dumpters
will be found outside a Central Office. They are usually left open
for the world to see. It's a good idea to check a dumpster near
you every day or two. You want to get your printouts and such
before they go to the garbage dump. Make sure that you aren't
pulling stuff out of the dumpster when the employees get out for
the day! If possible, check the dumpster after closing hours just
to be safe. But it's usually ok to get stuff out of it during
working hours. You should find a lot of useful information,
including computer numbers, if you consistently check the dumpsters.
Exploring Plant Departments: Plant Department is just a strange
name telco made for a truckyard. You might need your 'ol wire
cutters for this job. Plan to stay up late for this mission, too.
Around here, at least, the Plant Department doesn't close until
11:30 to 11:45 p.m. If your local Plant Department isn't bound by
barbed-wire fences, you're lucky. If, unfortunately, it's like
ours, you'll have to find a way to get in. First, try to find
breaks in the fence where you might be able to slip through. If
this isn't possible, and you can't climb over the fence because
there's barbed-wire at the top, get out the [gasp!] wire cutters.
Cut the barbed-wire and climb over the fence. Quietly move around
the truck yard, opening various trucks, taking whatever you want.
Although it might be hard, try to control yourself. Only take one
item per truck so that the fools don't get suspicious. You don't
ever want them to get suspicious, or you'll never be able to go
back without fearing that they might be watching the truckyard for
intruders. Just take a testphone and a few handy manuals. The
testphone is usually in the back behind the passenger's seat.
Manuals should be in the glove compartment or between the two front
seats. The rest of the gadgets in the trucks have little or no
practical uses for phreaks. Too bad. Be cool and don't take
anything you don't need. Correction: Don't take anything you don't
*really* want. Have phun with this, and please let us know if you
find any useful gadgets in a telco truck. We'd like to hear from
you! Look for a Field Phreaking II file soon. It should be
Manuscript III.
- 224 -
The Telephone Works: by Egghead Dude
Welcome to CHiNA Educational InfoFile Series II, # 3.
Once again, be looking for new files weekly for the next few weeks
until school starts again. And contrary to Megaton Man's belief,
we are still very much alive and in production. If he tells you
otherwise, kindly call him a peasant and tell him to fuck
himself...if you want. Enjoy!
Here are the standards in Telephone Color Coding:
Telephone circuits are paired as 'tip' and 'ring' wires. On POTS
(plain old telephone service) tip is 0 volts and ring is -48 volts
(tip is not 'ground' though as it is a blanced line). The pairs
must be distinguishable from one another easily so they are colour
coded. The colour of the wire indicates whether it is tip or ring.
In a quad wire green and black are tip while red and yellow are
ring.
pair# tip colour ring colour
_____ __________ ___________
1 white blue
2 white orange
3 white green
4 white brown
5 white slate (silver)
6 red blue
7 red orange
8 red green
9 red brown
10 red slate
11 black blue
12 black orange
13 black green
14 black brown
15 black slate
16 yellow blue
17 yellow orange
18 yellow green
19 yellow brown
20 yellow slate
21 violet (purple) blue
22 violet orange
23 violet green
24 violet brown
25 violet slate
An individual wire is identified by it's colour and the
colour of it's stripe. The main colour determines whether it is
tip or ring while the stripe identifies it's pair (i.e. a black
- 225 -
wire with a blue stripe is tip of pair 11). In many cables the
stripe is missing in which case the pairs are distinguished by the
way they are twisted, by pulling back the sheath pairs are more
obvious.
As you can see there are only 5 tip colors and 5 ring
colours (5 x 5 = 25). a 100 pair cable is made up of four of these
25 pair bundles. The first bundle is wrapped by a white/blue binder
string, the second by a white/orange binder, the third by a
white/green and the fourth by a white/brown. This scheme can be
extended infinitum.
Some folks think that the order is:
Pair Tip Ring
1 RED GRN
2 YEL BLK
3 BLU WHT,
and that the 1st pair was backwards in a modular connector
compared to the rest.
Wrong. The polarity is off. Modular connectors reverse
the polarity so they make the issue pretty confusing. A modular
line cord (that is a properly made _telephone_ line cord) has a
flat topology such that when laid on a table the top of both
connectors is up. This means that a reversal (polarity wise) takes
place. Tip becomes ring on all pairs (the wire is a ribbon in
theory). the top of both connectors is up. A 'set' jack (the one
inside the telephone) is wired backwards to compensate.
In addition, the system employed throughout the
(used-to-be) Bell System was actually very simple. There wer five
colors assigned to "tip" and five colors assigned to "ring". This
gives a total combination of twenty-five pairs (very convenient!).
The colors assigned to the "tip" are;
white wt
red rd
black bk
yellow yl
violet vi
The colors assigned to the "ring" are;
blue bl
orange or
green gr
brown br
slate sl (sometimes mistakenly called gray)
- 226 -
Standard phone convention is to identify the "tip" first and
then the "ring" when referring to a pair. Thus, the first five
pairs of a telephone cable are the "white" pairs;
white/blue wt/bl
white/orange wt/or
white/green wt/gr
white/brown wt/bn
white/slate wt/sl
The next five are the "red" pairs:
red/blue rd/bl
red/orange rd/or
red/green rd/gr
red/brown rd/bn
red/slate rd/sl
And so on, until all twenty five pairs are identified.
What happens when there are more than twenty-five pairs in a cable?
Simple, enclose each twenty-five pair group in a color coded
binder. And guess what the color coding is for the binder. Yep, the
same as the wires in the binder. The first binder group is the
"white/blue" binder the second is the "white/orange" binder, and so
on. If it is necessary to refer to the twenty-sixth pair of a
fifty pair cable it is referred to as "two white/blue" or 2-wt/bl.
The seventy-ninth pair in a one-hundred pair cable is called "four
white/brown" or 4-wt/bn. This all holds true for the first twenty-four
binders in a cable. The twenty-fifth binder is a little different,
and my recollection is a little hazy but I believe the binder colors
are white-white-blue. Yes that's two whites and a blue. It might be
two blues and a white. It's been a long time since I was in a
cable over six hundred pairs. One thing I know for sure is that
they double up on one of the binder colors after the twenty-fourth
binder group.
There is also a convention for the positioning the pairs
on connecting blocks. The Ring is usually on the Right and the Tip
is usually on the Top. As you can see there is a pattern here,
Ring-Red-Right and Tip-Top. I guess this was done to make it
easier for us dumbinstallers to remember! |-)
The only difference in the color coding between telephone
cable (the stuff used outside and strung along poles or underground
in conduit) and telephone inside wiring (the gray colored stuff in
the walls and up in the ceiling) is that the inside wire has each
pair traced with the color of its mate. That is, the first pair is
a white wire with a blue tracer and its mate is blue with a white
tracer. This is done to avoid "splitting" a pair. Splitting is
getting the ring of one pair and the tip of another. In outside
phone cable each pair is twisted with its mate and the chances
- 227 -
of splitting a pair are not as great (although it's been known to
happen ;-)).
With wiring done inside a house, a little history is in
order. Back when we had party-lines,(I know, we still do, but very
few still in service and none available for new service) three
wires were necessary because a ground was required to make the bell
ring. So, the original phone wiring had three conductors, red,
green and yellow. Red and green were ring and tip respectively and
yellow was the ground. Then people started getting away from party
lines and into princess and trimline phones with lights in the
dial. The yellow was no longer the ground and a black wire was
added and the yellow and black were used to supply power for the
lamps from a small transformer. Time marches on, and now people
are getting second lines installed in their homes. Since the new
phones get the power for their lamps from the phone line directly,
the yellow and black are now "spare". The yellow is usually the
ring and black is the tip. Of course, houses that have been
pre-wired with six-pair inside wire would normally have line 1 on
the white/blue pair and line 2 on the white/orange pair. In many
pre-wire installations I have found that the sixth pair (red/blue)
was used for transformer power, although I don't believe that was
ever an official practice.
- 228 -
<20>Ŀ ڿ <20><><EFBFBD><EFBFBD>¿ ڿ ڿ <20>Ŀ
ڳ <20><> <20><> <20><> <20><><EFBFBD> <20><> <20><> ڳ <20><>
ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>Ĵ<EFBFBD> ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD>
ڳ<> <20><><EFBFBD> <20><>ڿ <20><>ڿ <20><> <20><>ڿڳ<DABF> <20><><EFBFBD>
<20><> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
-----------------------------------------
= The End Was Bound To Come! =
-----------------------------------------
= By Captain Kidd February 02, 1992 =
-----------------------------------------
After several months of thinking about the group I have
decided to let Al.P.H.A total die out! Al.P.H.A started in late
90 and was a very small group of people that wanted to make Utah
a better place.. The group was started by Doc Silicon and
myself.. We were known as Utah most elite hackers and phreakers..
The glory was nice and you couldn't beat the fame.. Well we added
a few members to our ranks such as Christopher Columbus, Black
Beard, Jester (AKA Cyberdeamon) and Falcon not to even talk about
our LD contacts, which will remain nameless to protect them..
Well back in late 90, early 1991 Black Beard as well as Chris
left the modem world as well as the group. Then in early 1991
Falcon got busted for Anarchy, so he also left the group.. Well
this left Doc, Jester and myself, then jester got involved with
women and cars and also bailed out of the group.. Well now we
were back to the two founding members of Al.P.H.A.. We were still
passing codez and systems left and right, then back in march of
1991 I got busted for phreaking, I couldn't believe that Captain
Kidd went down for phreaking.. I should of never trusted a system
I got from a beginner (Dr. L0GiX).. I got fined and a slap on the
hand and a lot of bull shit threats, but that was about it..
Still the fines were enough for me to stop phreaking for life..
- 229 -
Then came to Doc Silicon leaving for School and that would
cut the members by 50%, so we decided to let in 2 Utah users, and
I'm sure you all remember them as Quicksilver and Raven.. Well
after Doc left for school the group came to a stand still.. We
were still hacking but that was about it.. Now Quicksilver is in
Boot Camp and I don't talk to Raven much anymore so It's time for
the Al.P.H.A to lay down and rest..
I just want to take a few and thank some of the people that
made Al.P.H.A and Utah what it is today..
Doc Silicon: My Partner in Crime and co founder of Al.P.H.A.
Clint, we did have a lot of fun and made some
killer free call's as well as everything else we
did.. Dude, keep the spirit and be careful.. Getting
busted was what made me wake up and smell the
coffee. Maybe when you get home we can try another
FBI call aye?
Space Ace: Dude I'm sure you'll never see this, but it was you
that got me into this game we played.. You also got
popped for phreaking and I should of listened then
and stopped while I was ahead..
Black Beard: Geoff, we did have a lot of fun with the warz
between our boards aye? Hope to see you back in the
pirating world soon..
Jester: Billy, you came and went so often no one could keep track
of you.. I hope to see you and meet your ass someday..
- 230 -
The Doctor: J. I remember when you first started pirating, man
you were such a lamer and all the fucking warz we
had were great.. I'm glad we got our shit together
and became friends.. Take care and I'll see you in
the pirate world..
Well I'm sure I missed several people.. I just wanted to
touch on a few of Utah greater modemers...
This is not my goodbye, but I must wake up and finely grow
up.. I will no longer be phreaking and hacking... I've giving it
up for good... I'll still be in the pirate world, but I just
wanted to let the world know that Al.P.H.A has tuned in there
keyboard and is no longer around.. Take care all and keep in
touch...
- 231 -
<20>Ŀ ڿ <20><><EFBFBD><EFBFBD>¿ ڿ ڿ <20>Ŀ
ڳ <20><> <20><> <20><> <20><><EFBFBD> <20><> <20><> ڳ <20><>
ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>Ĵ<EFBFBD> ڳ<><DAB3><EFBFBD><EFBFBD><EFBFBD>
ڳ<> <20><><EFBFBD> <20><>ڿ <20><>ڿ <20><> <20><>ڿڳ<DABF> <20><><EFBFBD>
<20><> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
-----------------------------------------
= Computer Crimes Past and Present =
-----------------------------------------
= By Captain Kidd November 27, 1990 =
-----------------------------------------
There is a great deal of Computer Crimes going on in the world
today. We have had several groups taking down, as well as several
boards. Maybe evenyou had a friend that was busted. This file will
deal with Computer crimes in it's fullest. Some of the information
will be current and some past.
PIRATING
--------
The Cracking, Passing, Coping of Copy Righted Software must be
one of the major computer crimes in the world. We have several
groups know as CRACKERS that will get a game when it first comes
out and crack it (Break the Copy Protection) and have the Slave or
Couriers, The Person that Distribute the software to the major
boards across the nation and then other users will download and
upload this software to a number of BBS's (Bulletin Boards
Systems). The art of pirating software cost the manufactures
millions of dollars in sales each and every year.
A few Quoits.
-------------
Mary Jan Saunders (Source of SPA (Software Publishers Association)
in Washington)
"Trading or Reselling Software without authorization from The
Developer (A Copy Right Validation) results in $1.2 Billion to $2.0
Billion in lost sales."
David Bradford (Senior Counsel at Novel Inc. Prove Utah)
"It's fair to say we lose Millions of Dollars each year because
of Piracy.
Some may ask what the fine for pirating is. Well according to
Mrs Saunders it could result in a $50,000 fine and or 5 year in
Jail. This is a high price to pay for the newest version of Turbo
C++ or the newest release from Data-East. I'm not putting Piracy
down nor am I building it up. I just thought I few people might
like to know a little more about the penalties of Pirating Copy
Righted Software.
- 232 -
A System Operator (SysOp) has the most to lose. He/She in the
source in this crime. I have seen a few good boards go down due to
computer related crimes. The SysOp is kind of like the Drug Dealer,
with out him the major part of Pirating would be history. My source
tell me 90% of the bust on the pirates are due to the fact they
have high Price Business Software on Line, or high price
Programming Languages. You hardly ever hear of a strictly wares
board going down due to a bust, if the SysOp get busted with Copy
Righted files on there board, thay can have there computer taking
away and also may be cheaged fines and or a Jail term. Running a
Pirated board is a very dangerious thing to do. Even if a few
boards drop someone else will take there place. You can never stop
Pirating, it's here to stay.
The next section of this file will talk about Hacking, Phreaking
and Carding.
Hacking, Phreaking, Carding.
----------------------------
First off I'm not going to go into detail on any of the above
subjects. This file is written to enplane the crimes involved with
these subjects.
I remember when the term hacking was meant as software hacking,
now it's a whole other ledge. Hacking is where you break into other
systems and change or delete information. Or even add a virus to
there system.
TWR is one of the largest targerts for hackers. They like to
play with others info and change it, or just get the Credit Card
Numbers and use them for there own use, Hacking TRW is Hacking and
Carding combine, for the most part. When you are hacking something
like TRW, you have a very short time to be on lime, befor they
start tracing.
Phreaking is where you still other peoples LD operating Codes
(or Phone Cards is you prefer) and make FREE ld calls. This is very
dangerous and you can get caught very easy. I personal know 2
people that get BUSTED phreaking. Both had there computer seized.
One was a local user and the other was a major LD user. I'm going
to leave both users nameless.
People obtain thess illegal access codez via VMBs (Voice Message
Boxes) or via BBSs. A large number of boards have a Phreaking
section and will have Codez and Cardz on line for the users to
play with.
This is the main reason I ran Hacking, Phreaking and Carding
together, in a small way they are all one in the same. Meny text
files have been done on all the above crimes, saome are how to's
and others are like this one, just totaly information.
- 233 -
Operation Sun-Devil
-------------------
On May 9th and 10th of 1990, 30 Search warrants were enforced
in 13 cities. Some say this is not the END of it. I fell we will
have some more bust of the same in the near future. The 13 city
were. Chicago, Cincinnati, Detroit, Newark, New York, Phoenix,
Pittsburgh, Plano, Richmond, San Diego and San Jose.
Several boards got busted and a lot of others went down, most
of them to return a few months later, but taking on a whole new
look. I will leave all the boards that got busted as well as he
ones that went down and back up nameless. I fell you can research
this info for your self. I don't want any SysOp or user for that
fact getting pissed at me for this Information file,
due to the fact I mentioned there name.
All of the above boards that got busted, were involved in
Pirating, Phreaking and Hacking. It was a day to remember when all
this happended, 100's of people were scard shitless thats why so
meny boards droped. It make the National News as well of the Local
News and the papers. Operation Sun-Devel will go down as one of the
biggest computers crime busts in history. It's to my understanding
they are still working to take down several others
that are involved in thess Crimes.
Now I guess it's time to talk about the lowest form of
computer crime there is, and that's Carding (Users stolen Credit
Cards to buy stuff for your self). This is not just a computer
crime, but several boards have Credit Cards on there system. If not
posted, a few users will be willing to trade several items for
Cards. I have never had any dealing with CC's other than a
Utah user/lamer by the name of Matt Goldsberry aka Lord Dread aka
Sid Viscous. The one and only reason I mention this ASS HOLE, is
due to the fact he's a fucking lamer and we all should rag on his
ass. Operation Sun Devil also dealt with Credit Card Fraud. As well
as the LoD bust back in 1988. LoD stood for Legion of Doom, a 150
Member group that ran strong for 6 years, back in 1988 several
members were busted, for tampering with 911, phreaking and Carding.
To date as far as I can tell LoD is no longer. Carding is the one
computer crime, that I fell no one should every play with.
Carding is one of thoss subjects you can talk about for hours,
the person mention above got busted for carding. He never served a
day in jail, just probation, he was a minor, so he got off pretty
easy.
Closing Note
-------------
I've taking about Pirating, Phreaking, Hacking, and Carding.
Some people fell they are one in the same. In a way I suppose they
are right. Swiping Software via Pirating, is just as bad as
- 234 -
Calling LD for free, and hacking in TRW and chancing data is just
as bad a carding a HST. This file was done to let all users now a
little more about the computer crimes that go on today. I'm not
praising or putting down, any or all of these crimes. It's up to
the people if they want to deal with either one of this crimes.
It's a free world, do as you please, but my advice to all would be
stay out of carding, because when you play with fire your gonna get
bured.
Special Thanks.
---------------
Doc Sillions - My Painter in Crime - Keep up the good work
Doc.
Phrack World News - Operation Sun Devil - Now one does it like
Phrack
The Shattered Image - LoD Bust Phile - Lost of good Info about
the LoD Bust.
- 235 -
HOW TO GET $30 A DAY FROM AT&T - By: Tesla
-------------------------------------------
You can earn $30 per day from the local BELL payphone and AT&T will
be the ones paying it. AND even if you get caught, which you
won't, there is nothing that can be done, thanks to the FCC and
AT&T's current ILLEGAL monopoly on DIAL-1 calls from BELL PAY
TELEPHONES
-----------------------------------------------------------------
This article was written in retaliation for FEDERAL CRIMINAL COURT
CASE #93-133 in the US DISTRICT COURT of WESTERN PENNSYLVANIA
titled, "USA vs KEITH MAYDAK ET AL" This case is based on
fraudulent and false claims by AT&T. We will not tolerate this.
Be advised, Keith Maydak does not condone stealing from AT&T nor
has he authorized this notation. We have taken it upon ourselves to
spread the word that AT&T is a giant rip-off.
It's all part of the I-SCAM! The AT&T I-SCAM. I is for IDIOT.
Idiot=anyone who has AT&T for dial-1 long distance.
====================================================
Okay, I don't know if you know this, but AT&T is the long-distance
carrier at all GTE, BELL, and ALLTEL pay telephones when it comes
to DIAL-1 CALLS. Even if you dial 10222(MCI)+1+ACN, AT&T gets paid
for the call. EVEN IF THE PHONE SAYS MCI, IT'S STILL AT&T. This
is due to, "technical limitations on coin telephones"
HELLO!!!!!!! AT&T BUILT THE GODDAM SYSTEM, WHY CAN'T THEY CHANGE
IT?
They could, they won't, why should they? They build the ESS
SWITCH! WHY SHOULD THEY MAKE IT SO DIAL 1 CAN BE ACCESSED BY ALL.
ENOUGH, let's learn how to get money.
-------------------------
Okay, dial this from your local pay station: 011-871-1101101# The
Operator will come on confused and say something like, "$32.70
please" or "what are you calling" If she doesn't tell you the
rate, ask her.
It's usually anywhere from $28.50 to $33.00 depending on where you
are. Why so much? It's a boat. And this is the rate.
NOW HANG UP!
Now, call 10288-0 wait for the operator. Ask for a supervisor.
(NOTE: YOU DON'T HAVE TO, BUT the regular operator will just
listen to your story and put her supervisor on, so just do it this
way.)
AT&T: Service assistant, may I help you?
- 236 -
YOU: Yes, this is absurd. I called this number and the AT&T
operator said it was $32.00 (or whatever the rate is).
She made me put $3.00 in at a time and then connected the
call. Right after the call answered the party was
disconnected. I didn't get my money back.
AT&T: Umm, yeah, right. What number did you dial
YOU: 011-871-1101-101 Check the rate.
AT&T: <<Shocked>> Okay sir, we'll mail you a refund, what is your
name and address?
YOU: NAME & ADDRESS (go ahead, don't be shy, they'll mail your
money, they have to, FCC RULES SECTION 47 of US CODE)
Do this daily from different pay stations.
PROBLEMS:
Okay, AT&T operators are all mean and will give you shit. You
need to be prepared to answer some questions.
AT&T: We don't have a call that much, are you sure it was AT&T?
YOU: Yes, it says, "AT&T" they operator said, "AT&T may I help
you."
AT&T: I can't make a check that high. (she's right)
YOU: Can you send two checks for $15 each (that she can do)
AT&T: Where did you get all the change?
YOU: I don't like being called a liar, what was your name again?
The store here had no problem giving it to me! This is
absurd.
AT&T: I talked to you yesterday.
YOU: Yes, it happened yesterday too.
AT&T: We'll send a man out to check the payphone.
YOU: Good. That's a good idea. In the mean time, can you put
in for my refund? (they can't send a man, it ain't there
phone)
AT&T: I requested a refund, but they will look into it.
YOU: I hope they do. (they won't)
NOTES: ALWAYS GET HER OPERATOR NUMBER
If you don't get your $30.00 bitch. Even go to the FCC.
Some operators just don't put in for it. We have done
this over 300 times for a profit of $10,000. Nearly 90%
send your money especially if you are pissed.
AT&T issues over 10,000 refunds per week and it's all
automatic. Do not worry about them adding this all up.
There's nothing they can do. They can't accuse you of
lying, they could be sued. IT's never happened, but if
it does, remember:
- 237 -
1. They have no clue how much money is in the payphone
2. It ain't there phone
3. They are required to send the refund by law
4. The only people who ever get busted are those who
admit shit; why do you think Feds and cops always
tell you they have evidence you better talk. If they
had enough to convict you, they wouldn't want you to
talk.
HOWEVER, THIS WORKS FINE EVERYTIME
And, don't feel bad. AT&T does not deserve to profit from
payphones. They are theives. Scamming crooks. THEY HAVE AN
ILLEGAL MONOPOLY ON PAY TELEPHONES!
Give this to all your phriends as it's just another part of AT&T's
way to rip off the world: THE I SCAM. I FOR IDIOT.
--------------------
ATTN: AT&T EMPLOYEES: GO AHEAD GIVE THIS TO CORPORATE SECURITY.
BETTER YET, WE'LL FAX IT TO THEM FOR YOU! I HATE TO TELL YOU
PEOPLE, BUT CORPORATE SECURITY GESTAPO ARE NOT POLICE THEY HAVE NO
AUTHORITY. NO-ONE IS AFRAID OF THEM. ALSO, REMEMBER, OUR GOOD
ARTICLES AREN'T OUT YET. THEY WILL BE. COMING SOON FROM TESLA,
THANKS TO AT&T. WE'LL SEE YOU IN BANKRUPTCY COURT. BASTARDS.
- 238 -
Pirates Bust. By Time Bandit
-------------
Let me start off by introduce myself. My name is Time Bandit.
I'm part of the BOM (Brotherhood of Modemers). We founded ourself
in the early part of 93. We Have a lot of connections, both in
Canada, The US, a few in Switzerland and The Netherlands. Our gaol
is to look out for all out fellow Modemers. When we hear of a major
bust that is going to take place Myself as well as Net Runner will
try and call a few boards and pass the info along.
The main problem is. 90% of the sysops will not take us
serious. I know of a few boards that got busted because the sysop
would not listen to us. I also know of several that are still
striving due to a good tip from us.
In the next 2 weeks we will try and contact one or two boards
in each of the states listen and pass this info along. If you are
one of the boards we call please take the time to read this letter
and pass the information along to your fellow sysops.
The Targeted States.
-------------------
Several Boards around the world have been getting busted. I
know for a fact that the FBI as well as SPA are on the look out for
several boards. Here is a list of some of the States that they are
going to be targeting.
Arizona
Georgia
Kentucky
New Jersey
New York
Missouri
Ohio
Ontario (Canada)
Pennsylvania
Quebec (Canada)
San Francisco
Utah
What you should look out for.
-----------------------------
Now sit down, shut up and listen. Our Informant with the SPA
(I doubt you'll believe me, but we do have one), Tells us the
people that will try to get access to your boards will used the
Handel Blue, Black or Green something (IE: Blue Diamond, Black
Hawk, Green Hornet) He'll say he is calling from Kentucky, New York
or Utah, doubtful he'll use the state he is calling, but you never
know. His name will be Fred, Bill, Jeff, something (IE:
- 239 -
Fred Williams, Bill Tucker, Jeff Smith), and his phone number will
be AC-968-XXXX (IE: 606-968-1111, 212-968-1111, 801-968-1111).
Now if I were any of you sysops I'd be keeping an eye out for
this person or persons. To our understanding they want to make 1993
the best year for boards getting busted. They are looking for
boards that support HPCA as well as pirating software. Word Perfect
and Microsoft are really getting pissed that they software is being
spread. I know Word Perfect is paying rewards for any information
leading to a bust of a board with there software on it. Now listen
Utah People, don't go and get greedy and turn in your local pirate
board for a quick cash fix.
The Code
--------
When I first starting pirating almost 5 years ago, there was
a code among pirates. You never turned in your brother no mater if
your ass was on the line or not. You would never trash talk another
board, you would always be there to lend a helping hand if your
bother went down. We here at BOM still fell the same way. We get
very pissed off at all the so called cracking groups. I know PHUCK
was a well know crashing group as well as SWAT. Now there were
others groups that got off by uploading V&T's to your board. No
mater how pissed off a sysop or user makes you it makes little to
no sense to crash his board.
The Brotherhood
---------------
We are a small group of pirates. There are 4 of us right now.
Time Bandit, Net Runner, Star Rider and XTC. We are always on the
lookout for fellow Modemers that are willing to live up to our
code. We don't want Fame and Glory, we just want the warez to stay
alive. We do not phreak, well 3 of us don't. We spend out hard
earned cash to call boards and pass this info along. You may thing
this is just a bunch of shit. Most people have never heard of us,
but I'd be at least one or two people from each and ever state has
heard of the brother hood. If you think you have what it takes to
belong to the Brotherhood, contact one of us.
12/15/93
Time Bandit
- 240 -
==========================================
>>>>>>>>>>>>>>HOPEFULLY KIMBLES' LAST TRY!
HE WILL TRY TO BUST THE WHOLE AMIGA SCENE!
DONT LAUGH BUT BETTER READ THIS DAMN FAST!
READ THIS AND GET THE INFORMATIONS YERSELF
==========================================
>>>>>>> BUSTS WILL FOLLOW <<<<<<<<<
READ THIS!
TWO MESSAGES FROM KIMBLES BOARD HOUSE OF COOLNESS:
Date : Fri Nov 19 21:52:16 1993 Number: 3106
To : Cxnsorxd (ALL) Recv'd: No
From : BITBUG Status: Public Message
Subject: NUPS AND NUMBERS!
hello, i need the newuserpasswords and numbers of following boards,
every working number and pw will be homored with a working cc.....
the ghetto
nirvana
house of pain
danse macabre
pirate haven
skull buggery
the edge
end of the world
sanctuary
mirage
gates of assgard
sanctuary
lithium
ice station
road to nowhere
the first who gives me working nup and number will be honored!!!
it must look like this:
THE GHETTO...........510-682-2342......NUP: ?????
and make 100% sure that the stuff you post me works, otherwise
forget it!
Date : Sat Nov 20 13:21:02 1993 Number: 3140
To : Cxnsorxd (ALL) Recv'd: No
From : BITBUG Status: Public Message
Subject: the megaoffer!!
- 241 -
i am in a big need of all kinds of accounts in the usa!!!
if you have an account on any usa bbs that is still working but you
never use it ,then give it to me....for every valid account you get
3 virgin at&t make accounts, get me accounts, accounts accounts
accounts...... write the accounts like this:
BBSNAME..........NUMBER............ACCOUNT........PASSWORD
not important how good the bbs is, gimme your accounts for valid
cards!
!IMPORTANT! READ THIS!
KIMBLE (ALIAS TOAYAX/BITBUG/ETC.) IS WORKING ON A BIG THING WITH
SOME DUDES FROM THE GRAVENREUTH TEAM AND SOME SOFTWAREFIRMS.. (AND
ALSO THE POLICE I THINK) I DONT KNOW MUCH ABOUT THIS BUT I KNOW
THAT THEY WILL TRY TO BUST THE WHOLE PIRATE SCENE IN A BIG MOVE!
THEY WANT TO CLOSE ALL BOADS WHICH THEY CAN GET! THEY ARE TIRED OF
JUST GETTING ONE BOARD OF HUNDRETS TO BUST.. >>>>>THEY WANT THE
WHOLE AMIGA PIRATE SCENE DOWN! AS YOU READ ABOVE KIMBLE (KIM
SCHMITZ) IS SEARCHIN' FOR ACCOUNTS ON PIRATE BBS TO GET ALL
INFORMATIONS OUT OF THAT BBS AND TO HAVE THE POSSIBILITIES TO
CLOSE IT THEN!!!!
....
I CAN JUST WARN YOU ALL OUT THERE! BE SURE THAT YOU DONT LET
EVERYONE ON YER BBS WHO CLAIMS TO BE SOMEONE HE ISNT.. AND BETTER
C-H-A-N-G-E THE NUPS NOW OR EVEN DONT LET ANY NEW USERS ON.. AND
CHECK THE OLD ONES!
AND AS YOU HAVE A BRAIN YOURSELF MAKE THE RIGHT DECISION FOR YOU!
I AM NOT THE ONE TO DO THIS FOR YOU..
.....JUST HERE FOR A BETTER FUTURE......
AMIGA #1 --- PIRATES NEVER GIVE UP ---
- 242 -
Wrap Up - Time Bandit
Well you'll have to say this is one of the biggest H/P/C/A mags
you have ever seen. I have put a lot of time and effort into this
very large file. As you know I made four parts to this awesome
file. We were going to add more to the end of this, but it's getting
so damn hugh, we thought we'd ednd it here.
Well anyways, I have some of you people will enjoy the hell out
of this, I know you'll never see one this good again.
Happy reading.......!......