1213 lines
58 KiB
Plaintext
1213 lines
58 KiB
Plaintext
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 1 of 10
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
% %
|
||
% _ _ _______ %
|
||
% | \/ | / _____/ %
|
||
% |_||_|etal/ /hop %
|
||
% _________/ / %
|
||
% /__________/ %
|
||
% %
|
||
% Proudly Presents %
|
||
% %
|
||
% Phrack Inc. Issue Three %
|
||
% %
|
||
% Released Feb 1, 1986 %
|
||
% %
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
The files contained in this issue of Phrack Inc. are as follows:
|
||
|
||
1: Index written by Cheap Shades
|
||
2: Rolm systems written by Monty Python
|
||
3: Making shell bombs written by Man-Tooth
|
||
4: Signalling systems around the world by Data Line
|
||
5: Private audience written by Overlord
|
||
6: Fortell systems written by Phantom Phreaker
|
||
7: Eavesdropping written by Circle Lord
|
||
8: Building a Shock Rod written by Circle Lord
|
||
9: Introduction to PBX's written by Knight Lightning
|
||
10: Phreak World News II written by Knight Lightning
|
||
|
||
If you have an original file that you would like published in a future
|
||
issue of Phrack Inc. Leave E-Mail to Taran King, Knight Lightning, or Myself on
|
||
any system that we are on. If you cannot find us try and contact some member
|
||
of Metal Shop to get into touch with us.
|
||
|
||
Later,
|
||
________________
|
||
\Cheap/ \Shades/
|
||
\___/ \____/
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 2 of 10
|
||
|
||
The purpose of this file is to tell you what you would be dealing with if
|
||
you stumble across this system, or if you know of a company that is using this
|
||
system. It doesn't go into incredible detail, and is lacking in areas. It is
|
||
not a guide to hacking into it, just letting you know what you would be dealing
|
||
with. This is to pique your interest in the system.
|
||
|
||
So What the Hell is ROLM?
|
||
-------------------------
|
||
ROLM is a "Business Communications System" bought by IBM a few months ago,
|
||
in an effort to compete effectively with AT&T, and get a larger share of the
|
||
market, in a grand master plan to become "Big Daddy Blue" as opposed to "Ma
|
||
Bell". It is a very complex system, with features such as PhoneMail, A
|
||
Super-PBX, Local Area Networks, Public and Private Data Networks, Desktop
|
||
Communications, and Call Management.
|
||
The heart of the system is the Controller, called the CBX <Computerized
|
||
Business Exchange>. This controls the entire network accessible through ROLM.
|
||
Since 1983, the CBX was redesigned and upgraded to the CBX II. It is a PBX with
|
||
much much more <See 'Introduction to PBX's' available on your local bbs> to
|
||
offer, and that is ROLM's claim to fame. It is light years ahead of the regular
|
||
PBX system.
|
||
|
||
|
||
The CBX II
|
||
----------
|
||
|
||
The CBX II is the core of the ROLM network. It is computer driven and
|
||
expandable from one node, with 165 channels, to 15 nodes providing 11,5200
|
||
2-way channels. The smaller business could have a model with a 16 user maximum
|
||
limit, but it can go up to 10,000 users, though this would be quite rare <and
|
||
quite God Damn expensive!>. It can be accessed from outside lines <like you> as
|
||
well as HardWired units, with a switching system to prevent busy signals on a
|
||
port. Speed depends on the system in place, either the newer, faster ROLMbus
|
||
295, or the older standard ROLMbus 74. <see Service manuals for exact details>
|
||
The larger the system, the faster as well. It is adjustable to accept different
|
||
bandwidths for the various components, such as Telex, Voice, Data, Mainframe,
|
||
LAN, Video <ta-da! Picturefones in reality!>, and anything hooked up to the
|
||
system. Similar tasks can be bunched onto one channel as well, at high or low
|
||
speeds. If multiplexing is used <above>, the maximum speed is 192,000 bps, and
|
||
if using a single interface, the top possible rate is a mindboggling 37,000,000
|
||
bps, which if you ask me, if just fluff and not too practical, so they are
|
||
usually multiplexed. <Now, what a difference that is from 300 baud!>. Using
|
||
the CBX II network, you might find just about any kind of mainframe, from HP,
|
||
to DEC, to VAX, to the IBM 327 series.
|
||
Note : There is a smaller version of this called the VSCBX.
|
||
|
||
|
||
Phone Mail
|
||
----------
|
||
|
||
This is one of the little beauties of the system, something truly fun to
|
||
fuck with. I called ROLM Headquarters in California to ask specific questions
|
||
about ROLM, posing as a researcher, and I got the big runaround, transferred
|
||
from department to department. Maybe you can get further than I. Their is
|
||
408-986-1000. The to PhoneMail from the outside is 800-345-7355. A nice
|
||
computer-generated voice comes on asking you to enter your Extension number
|
||
<which each employee has>, and then enter the "" sign. Then enter your
|
||
password. If you make around 3 or 4 bad attempts at an Extension of Password,
|
||
it will automatically ring another number, assistance I assume, to find out why
|
||
there has been an unsuccessful entry attempt. I haven't played around with this
|
||
that much, so leave mail to Monty Python with whatever you find. Once entering
|
||
an authorization with correct password, you will be presented with more
|
||
options, leave messages to other people, and whatnot. You can hear your
|
||
messages, forward them to another person, leave the same message to more than
|
||
one person, change your welcome message, etcetera. The service is for those
|
||
business-type pigs who never sit still for one minute, like they are
|
||
permanently on speed.
|
||
|
||
A Phone Mail Scenario
|
||
---------------------
|
||
|
||
Let's say if Mr. Greed goes out to meet his secretary at a motel, but
|
||
definitely has to get that important message from Mr. Rasta, who's bringing in
|
||
$3 mil in Flake, and can't trust it to the person who would handle it <ie: the
|
||
person filling in for his sec with the tremendous tits who is getting balled by
|
||
the dirty old fat man>. Mr. Greed would have given Mr. Rasta his phone and he
|
||
would be forwarded to the Phone Mail network, where he would hear a message
|
||
left my Mr. Greed, to anyone who would call. Mr. Rasta would leave his message
|
||
and hang up. Then Mr. Greed could call up the 800-345-7355 , punch in his
|
||
extension authorization number, and password. Or, if he was back at the office,
|
||
he could get it there through DeskTop communications. Messages can be delivered
|
||
without error, in the person's own voice, without other people knowing about
|
||
it. Therefore, someone with enough knowledge could use an unused account and
|
||
use it as his own service, without the knowledge of others.
|
||
|
||
DeskTop communications
|
||
----------------------
|
||
|
||
ROLM has developed a Computer/Telephone integrated device for use with the
|
||
Desktop communications. It is linked with the CBX II through fone lines, thus
|
||
accessible by you and me from the outside. It is not hardwired, though it can
|
||
approach hardwired speed. If you could get your hands on one of these
|
||
computer/fones then I think you would have found something very useful at home,
|
||
in your general life. But you could access the network without the special
|
||
features of the fone, like one touch dialing, which is designed for the stupid
|
||
lazy businessman. You can access company databases through the network,
|
||
mainframes, other people, just about anything as if you were right there and
|
||
told your secretary to do it for you. There is special software used by the
|
||
computers or computer/fone but it can be improvised and is just an aid. It uses
|
||
a special protocol <Don't know what, try to get your hands on one by trashing a
|
||
sales office>. What is great is that everything is tied together through
|
||
telefone lines, and not RS-232C! Thus, there is an access port....somewhere.
|
||
Scan the 's around the office using ROLM. How do you know if it is using
|
||
ROLM one way or the other. Compile a list of local businesses, call them up
|
||
saying "This is ROLM Customer Support. We have a report of a complaint in your
|
||
CBX II network, let me speak to your supervisor please." If they say "ROLM? CBX
|
||
II? We don't use that" then just apologize and go elsewhere. Or say that you
|
||
are from ROLM corp and would like to know if the company is interested in using
|
||
it to network its system. Like, if they have it already, they would say that
|
||
they had it. And if they didn't, you would just give them a fake <or if
|
||
you're nice the for the local sales office obtainable in the list below>.
|
||
|
||
But you know what's REALLY Great? They have made the network link in mind
|
||
for the person with a Computer IQ of about 0. Commands are in plain English.
|
||
Here is a demonstration screen as seen in their brochure:
|
||
CALL, DISPLAY or MODIFY
|
||
|
||
Display groups
|
||
|
||
ACCESSIBLE GROUPS:
|
||
[00] PAYROLL [01] MODEM [02] IBMHOST
|
||
[03] DOWJONES [04] DECSYSTM [05] MIS-SYSTM
|
||
[06] DALLAS [07] SALES
|
||
|
||
CALL, DISPLAY OR MODIFY?
|
||
Call Payroll
|
||
|
||
CALLING 7717 <which would be the ID code for the PAYROLL file>
|
||
CALL COMPLETE
|
||
|
||
**PAYROLL SYSTEM** <or whatever they want to call it>
|
||
ENTER ACCOUNT CODE:
|
||
|
||
See, nothing is confusing, everything pretty self-explanatory. There may be
|
||
more than one person wanting to do the same thing you are, so if there is, you
|
||
would be put on a queue for the task. It seems that those with an IBM would be
|
||
best suited for ROLM hacking, because ROLM is owned by IBM, and the PC's used
|
||
by the network are IBM. A person with a simpler fone/Terminal couldn't access
|
||
something like their DEC mainframe, or something like that. By calling in, you
|
||
could not run an application, unless you had a special interface, but you could
|
||
access the database, which any dumb terminal could do.
|
||
However, there are security levels. Thus one with a privileged account
|
||
could access more things than one without it. Like Joe Schmoe in Sales couldn't
|
||
get to Payroll . It seems that for non-IBM's to access some of the parts of the
|
||
network, you would need an interface to become the same thing as a RolmPhone.
|
||
Excessive 's of bad logon attempts, which would be construed as a linking
|
||
error would notify the network manager, And if they saw that there was no
|
||
hardware error, eventually, they would think of if they were somewhat
|
||
experienced, you guessed it, hackers.
|
||
|
||
The PBX
|
||
-------
|
||
|
||
ROLM has something called Integrated Call Management <from here on known as
|
||
ICM>. Now, when designing ICM, they must have taken into account the abuse
|
||
possible in plain ol' PBX's. So they put in something called Call Screening.
|
||
This will enable the company to restrict calls to certain 's and prefixes.
|
||
Calls to non-business 's or certain areas can be screened out <"No personal
|
||
calls on my time, Johnson!">, with the exception of 1 specific that you want.
|
||
There is a choice of having a codeless, screened PBX, or a PBX where
|
||
accounts are assigned to each employee, and the 's they call get recorded to
|
||
that account. There can be privileged accounts where a large volume of calls
|
||
would go relatively un-noticed. But I don't think that large-scale abuse of
|
||
this system would be easy or practical. Calls are routed AUTOMATICALLY through
|
||
the service where the rates are cheaper to the location dialed, which is pretty
|
||
fucking cool. And, the PBX is accessible from the outside, using Direct Inward
|
||
System Access, making it AB-useable.
|
||
But what about if there is Equal Access in that area? It doesn't matter,
|
||
the CBX will automatically access the service without you having to worry about
|
||
it <hell, this is totally unnecessary for a hack/phreak, cause we ain't paying
|
||
for the damn call anyhow!>
|
||
BUT!: There is a use of Call Detail Recording, where information on all
|
||
ingoing and outgoing calls are recorded.
|
||
|
||
Conclusion
|
||
----------
|
||
|
||
Not a lot of research went into this file, but it did take a little while
|
||
to type up, and all of the information is correct, to my knowledge. Anyone is
|
||
free to expand on this file into a Part II. It was written to enlighten people
|
||
about this system, and I hope this has helped a little bit.
|
||
Sysops: You are free to put this file up as long as NONE of the credits
|
||
are changed! <this means the Phrack, Inc. AND Personal credits>. Please give us
|
||
a chance.
|
||
|
||
Coming soon, to a telephone near you: The Return of The Flying Circus. Look
|
||
for it.
|
||
--Later On
|
||
Monty Python <01/11/86>
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 3 of 10
|
||
|
||
|
||
////////////////////\\\\\\\\\\\\\\\\\\\\
|
||
:::: ::::
|
||
:::: "SHOTGUN SHELL BOMBS" ::::
|
||
:::: from ::::
|
||
:::: The Poor Man's James Bond ::::
|
||
:::: by Kurt Saxon ::::
|
||
:::: ::::
|
||
:::: typed in by --] Man-Tooth [-- ::::
|
||
:::: ::::
|
||
\\\\\\\\\\\\\\\\\\\\////////////////////
|
||
|
||
|
||
These little goodies are affectionately known as "nut busters." They are
|
||
simply shotgun shells enclosed in cardboard rolls with cardboard fins put on.
|
||
On the primer end of the shell is glued a small cork with a hole drilled
|
||
through it. A roofing nail fits in the hole snugly enough to stay in, but
|
||
loose enough to plunge into the primer upon impact.
|
||
|
||
Since the shell is not confined in the chamber of the gun, it will
|
||
naturally not cause the same amount of damage. But if it goes off between a
|
||
fellow's legs he can look forward to becoming a soprano.
|
||
|
||
These bombs are thrown singly or by the handful into the air over milling
|
||
crowds. The weight of the shell and stabilization by the fins causes the nut
|
||
buster to head straight downward.
|
||
|
||
It has tremendous effect as its presence is usually a suprise. The threat
|
||
of more coming is guaranteed to route any mob.
|
||
|
||
Not only does it go off on the pavement but it will also explode on
|
||
contact with a person's head or shoulder. At night it is impossible to trace
|
||
its point of origin.
|
||
|
||
-----
|
||
! \
|
||
/> ! \ /- Cork
|
||
Fins ! ! v
|
||
--------------------!\
|
||
! \ ! !-----! ! \ !
|
||
! \> !------ ! ! !---! <-- Roofing nail
|
||
! ! !-----! ! / !
|
||
\ --------------------!/
|
||
\ ! ! ^
|
||
\-> ! / ^ \
|
||
! / ! \
|
||
----- ! Shell
|
||
!
|
||
!
|
||
Close fitting 3-1/2 inch Aluminum Tubing Glued on Shell.
|
||
|
||
SHOTGUN SHELL BOMB
|
||
|
||
|
||
A clever use for a plain shotgun shell is as a muffler bomb. The shell is
|
||
simply shoved up a car's exhaust pipe with a length of stiff wire until it
|
||
drops into the muffler. After a few minutes on the road the shell explodes,
|
||
totalling out the muffler and treating the driver to a sick kind of panic.
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 4 of 10
|
||
|
||
Signalling Systems Around the World
|
||
|
||
|
||
For those of you who have the desire to make international calls, this info may
|
||
be of interest. Thanks to TAP and Nick Haflinger.
|
||
|
||
CCITT 1. An old international system, now deceased. Used a 500 Hz tone
|
||
interrupted at 20 Hz (Ring) for 1-way line signals.
|
||
|
||
CCITT 2. Proposed "International Standard" that never caught on much.
|
||
Used 600 Hz interrupted by 750 Hz. Still used in Australia,
|
||
New Zealand and South Africa.
|
||
|
||
CCITT 3. An early in-band system that uses 2280 for both line and
|
||
register (!!). Used in France, Austria, Poland and Hungary.
|
||
|
||
CCITT 4 A variation of 3, but uses 2040 and 2400 for end to end Tx of
|
||
line and register. Used for international Traffic in Europe,
|
||
but cannot be used with TASI (AKA Multiplex or "that dammed
|
||
clipping").
|
||
|
||
CCITT 5 This is the most popular, and the one used in the US. 2400 and
|
||
the infamous 2600 are used for link to link (not merely end to
|
||
end line signals. Registers are handled via DTMF (Touchtones).
|
||
Anyone know what 2400 does??
|
||
|
||
CCITT 5 bis. Just like above, but a 1850 Hz tone is used for TASI locking
|
||
and transmission of line signals.
|
||
|
||
CCITT 6 The newest and worst for phreaks. It uses digital data sent
|
||
out-of-band to control the connection. In other words, the
|
||
connection is made and billing started BEFORE you can get
|
||
control.
|
||
|
||
CCITT 5R1 A regional system like 5, but doesn't use the mysterious 2400
|
||
and can't use the multiplexer.
|
||
|
||
CCITT 5R2 Probably the interface to AUTOVON, as it uses 120 Hz spaced
|
||
tones for DTMF instead of 200. Also 3825 Hz is the blow-off
|
||
tone instead of 2600.
|
||
|
||
|
||
The "Extra" tones
|
||
|
||
1700 + 700 = Inward Operator
|
||
1700 + 900 = Delay operator, also, in TSPS,STP (a "Zero Plus" call from a coin
|
||
phone)
|
||
1700 + 1100= KP1 (Start recognition of special tones)
|
||
1300 + 1700= KP2 (End recognition of special tones)
|
||
|
||
12-85 Data Line. CIS 72767,3207: TWX 650-240-6356
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 5 of 10
|
||
|
||
|
||
* PRIVATE AUDIENCE *
|
||
|
||
(A BASIC LESSON IN THE ART OF LISTENING IN)
|
||
|
||
BROUGHT TO YOU BY
|
||
|
||
-[ THE OVERLORD ]-
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
|
||
PART I: THE LAW
|
||
|
||
|
||
Federal law:
|
||
Section 605 of title 47 of the U.S code, forbids interception of
|
||
communication, or divulagance of intercepted communication except by persons
|
||
outlined in section 119 of title 18 (a portion of the Omnibus crime control and
|
||
safe streets act of 1968). This act states that "It shall not be unlawful under
|
||
this act for an operator of a switchboard, or an officer, employee, or agent of
|
||
any communication common carrier who's switching system is used in the
|
||
transmission of a wire communication to intercept or disclose intercepted
|
||
communication."
|
||
|
||
What all this legal bullshit is saying is that if you don't work for a phone
|
||
company then you can't go around tapping people's lines. If you decide to
|
||
anyway, and get caught, it could cost you up to 5 years of your life and
|
||
$10,000. This, you are all assuming, means that if you tap someone else's line,
|
||
you will be punished....wrong! You can't tap your own line either. The
|
||
punishment for this is probably no more than a slap on the hand, that is if
|
||
they actually catch you, but it's a good thing to know..............now on to
|
||
the fun.....
|
||
|
||
PART II: TAPPING
|
||
|
||
Everyone has at some time wanted to hear what a friend, the principal, the prom
|
||
queen, or a neighbor has to say on the phone. There are several easy ways to
|
||
tap into a phone line. None of the methods that I present will involve actually
|
||
entering the house. You can do everything from the backyard. I will discuss
|
||
four methods of tapping a line. They go in order of increasing difficulty.
|
||
|
||
1. The "beige box": a beige box (or bud box) is actually better known as a
|
||
"lineman" phone. They are terribly simple to construct, and are basically the
|
||
easiest method to use. They consist of nothing more than a phone with the
|
||
modular plug that goes into the wall cut off, and two alligator clips attached
|
||
to the red and green wires. The way to use this box, is to venture into the
|
||
yard of the person you want to tap, and put it onto his line. This is best done
|
||
at the bell phone box that is usually next to the gas meter. It should only
|
||
have one screw holding it shut, and is very easily opened. Once you are in, you
|
||
should see 4 screws with wires attached to them. If the house has one line,
|
||
then clip the red lead to the first screw, and the green to the second. You are
|
||
then on the "tappee's" phone. You will hear any conversation going on. I
|
||
strongly recommend that you remove the speaker from the phone that you're using
|
||
so the "tappee" can't hear every sound you make. If the house has two lines,
|
||
then the second line is on screws three and four. If you connect everything
|
||
right, but you don't get on the line, then you probably have the wires
|
||
backward. Switch the red to the second screw and the green to the first. If no
|
||
conversation is going on, you may realize that you can't tap the phone very
|
||
well because you don't want to sit there all night, and if you are on the
|
||
phone, then the poor tappee can't dial out, and that could be bad...so.......
|
||
method two.
|
||
|
||
2. The recorder: This method is probably the most widespread, and you still
|
||
don't have to be a genius to do it. There are LOTS of ways to tape
|
||
conversations. The two easiest are either to put a "telephone induction pickup"
|
||
(Radio Shack $1.99) on the beige box you were using, then plugging it into the
|
||
microphone jack of a small tape recorder, and leaving it on record. Or plugging
|
||
the recorder right into the line. This can be done by taking a walkman plug,
|
||
and cutting off the earphones, then pick one of the two earphone wires, and
|
||
strip it. There should be another wire inside the one you just stripped. Strip
|
||
that one too, and attach alligators to them. Then follow the beige box
|
||
instructions to tape the conversation. In order to save tape, you may want to
|
||
use a voice activated recorder (Radio Shack $59), or if your recorder has a
|
||
"remote" jack, you can get a "telephone recorder control" at Radio shack shack
|
||
for $19 that turns the recorder on when the phone is on, and off when the phone
|
||
is off. This little box plugs right into the wall (modularly of course), so it
|
||
is best NOT to remove the modular plug for it. Work around it if you can. If
|
||
not, then just do you best to get a good connection. When recording, it is good
|
||
to keep your recorder hidden from sight (in the Bell box if possible), but in a
|
||
place easy enough to change tapes from.
|
||
|
||
3. The wireless microphone: this is the BUG. It transmits a signal from the
|
||
phone to the radio (FM band). You may remember Mr. Microphone (from Kaytel
|
||
fame); these wireless microphones are available from Radio Shack for $19. They
|
||
are easy to build and easy to hook up. There are so many different models, that
|
||
is is almost impossible to tell you exactly what to do. The most common thing
|
||
to do is to cut off the microphone element, and attach these two wires to
|
||
screws one and two. The line MIGHT, depending on the brand, be "permanently off
|
||
hook". This is bad, but by phucking around with it for a while, you should get
|
||
it working. There are two drawbacks to using this method. One, is that the poor
|
||
asshole who is getting his phone tapped might hear himself on "FM 88, the
|
||
principal connection". The second problem is the range. The store bought
|
||
transmitters have a VERY short range. I suggest that you build the customized
|
||
version I will present in part four (it's cheaper too). Now on to the best of
|
||
all the methods....
|
||
|
||
4. The "easy-talks": This method combines all the best aspects of all the the
|
||
other methods. It only has one drawback... You need a set of "Easy-talk" walkie
|
||
talkies. They are voice activated, and cost about $59. You can find 'em at toy
|
||
stores, and "hi-tech" catalogs. I think that any voice activated walkie talkies
|
||
will work, but I have only tried the easy-talks. First, you have to decide on
|
||
one for the "transmitter" and one for the "receiver". It is best to use the one
|
||
with the strongest transmission to transmit, even though it may receive better
|
||
also. De-solder the speaker of the "transmitter", and the microphone of the
|
||
"receiver". Now, go to the box. put the walkie talkie on "VOX" and hook the
|
||
microphone leads (as in method three) to the first and second screws in the
|
||
box. Now go home, and listen on your walkie talkie. If nothing happens, then
|
||
the phone signal wasn't strong enough to "activate" the transmission. If this
|
||
happens, there are two things you can do. One, add some ground lines to the
|
||
microphone plugs. This is the most inconspicuous, but if it doesn't work then
|
||
you need an amplifier, like a walkman with two earphone plugs. Put the first
|
||
plug on the line, and then into one of the jacks. Then turn the volume all the
|
||
way up (w/out pressing play). Next connect the second earphone plug to the mice
|
||
wires, and into the second earphone outlet on the walkman. Now put the whole
|
||
mess in the box, and lock it up. This should do the trick. It gives you a
|
||
private radio station to listen to them on: you can turn it off when something
|
||
boring comes on, and you can tape off the walkie talkie speaker that you have!
|
||
|
||
PART IV: WIRELESS TRANSMITTER PLANZ
|
||
|
||
This is a tiny transmitter that consists on a one colpitts oscillator that
|
||
derives it's power from the phone line. Since the resistance it puts on the
|
||
line is less than 100 ohms, it has no effect on the telephone performance, and
|
||
can not be detected by the phone company, or the tappee. Since it is a
|
||
low-powered device using no antenna for radiation, it is legal to the FCC.
|
||
(That is it complies with part 15 of the FCC rules and regulations). It,
|
||
however is still illegal to do, it's just that what you're using to do it is
|
||
legal. This is explained later in part 15... "no person shall use such a device
|
||
for eavesdropping unless authorized by all parties of the conversation" (then
|
||
it's not eavesdropping is it?). What this thing does, is use four diodes to
|
||
form a "bridge rectifier". It produces a varying dc voltage varying with the
|
||
auto-signals on the line. That voltage is used to supply the the voltage for
|
||
the oscillator transistor. Which is connected to a radio circuit. From there,
|
||
you can tune it to any channel you want. The rest will all be explained in a
|
||
minute....
|
||
|
||
|
||
|
||
|
||
|
||
PARTS LIST
|
||
item | description
|
||
-----------------------------------------------------------------
|
||
C1 | 47-Pf ceramic disk capacitor
|
||
C2,C3 | 27-Pf mica capacitor
|
||
CR1,CR2,CR3,CR4 | germanium diode 1n90 or equivalent
|
||
R1 | 100 ohm, 1/4 watt 10% composition resistor
|
||
R2 | 10k, 1/4 watt 10% composition resistor
|
||
R3 | .7k, 1/4 watt 10% composition resistor
|
||
L1 | 2 uH radio frequency choke (see text)
|
||
L2 | 5 turns No.20 wire (see text)
|
||
Q1 | Npn rf transistor 2N5179 or equivalent
|
||
-----------------------------------------------------------------
|
||
|
||
L1 may be constructed by winding approximately 40 turns of No. 36
|
||
enamel wire on a mega-ohm, 1/2 watt resistor. The value of L1 is
|
||
not critical. L2 can be made by wrapping 5 turns of No. 20 wire
|
||
around a 1/4 inch form. After the wire is wrapped, the form can
|
||
be removed. Just solder it into place on the circuit board. It
|
||
should hold quite nicely. Also be sure to position Q1 so that the
|
||
emitter, base, and collector are in the proper holes. The
|
||
schematic should be pretty easy to follow. Although it has an
|
||
unusual number of grounds, it still works.
|
||
|
||
|
||
|
||
|
||
|------------------L1----------------|
|
||
-- |
|
||
CR1 / \ CR2 |----------------|
|
||
A--------------/ \ --| ----| | |
|
||
| \ / | | | C2 L2
|
||
| CR3 \ /CR4 | C1 R2 |----| |
|
||
R1 -- | | | gnd C3 |
|
||
| | | ----| |-----|
|
||
| gnd | | |
|
||
| | |-----|----Base collector
|
||
| | R3 \ /
|
||
B-----------------------| | \/\ <- Q1
|
||
gnd \/
|
||
|
|
||
|
|
||
emitter(gnd)
|
||
|
||
|
||
|
||
The odd thing about this bug that we haven't encountered yet, is that it is put
|
||
on only one wire (either red or green) so go to the box, remove the red wire
|
||
that was ALREADY on screw
|
||
1 and attach it to wire 'A' of the bug. Then attach
|
||
wire 'B' to the screw itself. You can adjust the frequency which it comes out
|
||
on the FM channel by either smooshing, or widening the coils of L2. It takes a
|
||
few minutes to get to work right, but it is also very versatile. You can change
|
||
the frequency at will, and you can easily record off your radio.
|
||
|
||
PART FIVE: HELPFUL HINTS
|
||
|
||
|
||
First of all, With method one, the beige box, you may notice that you can also
|
||
dial out on the phone you use. I don't recommend that you do this. If you
|
||
decide to anyway, and do something conspicuous like set up a 30 person
|
||
conference for three hours, then I suggest that you make sure the people are
|
||
either out of town or dead. In general, when you tap a line, you must be
|
||
careful. I test everything I make on my line first, then install it late at
|
||
night. I would not recommend that you leave a recorder on all day. Put it on
|
||
when you want it going, and take it off when you're done. As far as recording
|
||
goes, I think that if there is a recorder on the line it sends a sporadic beep
|
||
back to the phone co. I know that if you don't record directly off the line
|
||
(i.e off your radio) then even the most sophisticated equipment can't tell that
|
||
you're recording. Also, make sure that when you install something, the people
|
||
are NOT on the line. Installation tends to make lots of scratchy sounds, clicks
|
||
and static. It is generally a good thing to avoid. It doesn't take too much
|
||
intelligence to just make a call to the house before you go to install the
|
||
thing. If it's busy then wait a while. (This of course does not apply if you
|
||
are making a "midnight run").
|
||
|
||
All in all, if you use common sense, and are *VERY* careful, chances are you
|
||
won't get caught. Never think that you're unstoppable, and don't broadcast what
|
||
you're doing. Keep it to yourself, and you can have a great time.
|
||
|
||
-[ OVERLORD ]-
|
||
|
||
THANKS TO:
|
||
|
||
The CircleLord
|
||
TARAN KING
|
||
Knight Lightning
|
||
The Forest Ranger
|
||
P-80 systems
|
||
|
||
Watch for more advanced tapping, how they catch you, and verification in the
|
||
near future.
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 6 of 10
|
||
|
||
Fortell Systems
|
||
Written by Phantom Phreaker
|
||
|
||
Call The Alliance at 618-667-3825
|
||
|
||
Fortell systems seem to be a system to monitor lines. They can only be used to
|
||
monitor lines within their own NPA.
|
||
A Fortell system is at 716-955-7750. Whene you call, you will hear:
|
||
|
||
'Hello. This is the Taradyne Fortell system. Please enter ID code'
|
||
|
||
The ID for this system is 722877*. After you type that in (DTMF) it will ask
|
||
'please enter line number' where you then type the PRE+SUFF of the number you
|
||
wish to check within the NPA of the Fortell.
|
||
After you enter a number, it will repeat the number you entered. Now it will
|
||
ask you to 'please enter mode'.
|
||
|
||
The modes are:
|
||
|
||
1-Calling on other line
|
||
2-Calling on test line
|
||
3-Line test results
|
||
|
||
If you enter mode 1, you will have these commands available:
|
||
|
||
1-Fault location
|
||
2-Other testing
|
||
7-Test ok, Monitor
|
||
8-Hang up
|
||
9-Enter next line number
|
||
|
||
If you enter 7 here, it will repeat what you selected, and ask for an ID code
|
||
which can be any 6 digit number followed by a *.
|
||
|
||
Now it will dial and tell you:
|
||
'Subscriber busy-busy-monitor test in progress conversation on line-short on
|
||
line'
|
||
|
||
2-Monitor test
|
||
3-Overide and test
|
||
4-Wait for idle
|
||
|
||
If you enter 2, (Monitor Test) it will tell you the busy status again.
|
||
|
||
If you enter 3, it will override, or tell you 'Not available in this CO'.
|
||
|
||
If you enter 4, (Wait for idle) it will wait until the line is idle.
|
||
|
||
|
||
If you enter 1 (Fault Location) at the main list you will get these options:
|
||
|
||
1-Open location
|
||
3-Short location
|
||
4-Cross location
|
||
5-Ground location
|
||
8-Hang up
|
||
|
||
If you enter 2 (Other testing) here, you will have these commands:
|
||
|
||
2-Loop Ground OHMS
|
||
3-Dial tone test
|
||
5-Pair ID
|
||
8-Hang up
|
||
|
||
If you enter Mode 2, you will have these options:(Other testing)
|
||
|
||
2-Other testing
|
||
7-Test ok, Monitor
|
||
8-Hang up
|
||
9-Enter next line number
|
||
|
||
It will repeat what you selected. If you select 2 here, you will now have
|
||
these commands:
|
||
|
||
2-Loop Ground Omhs
|
||
8-Hang up
|
||
|
||
If you select 7 at the main list after mode 2, it will ask for an ID which is
|
||
any 6 digit number followed by a *. Now it will dial and check the number. If
|
||
the number is busy, it will say 'Subcriber busy-monitor-test in progress-
|
||
conversation on line-short on line-please hang up-waiting for idle' Now you can
|
||
just type * to go back to the main list of commands.
|
||
|
||
If you enter MODE 3, if you have done a test before, it will give you the
|
||
results of the test. If you haven't done a test, it will tell you so with 'No
|
||
test results available'
|
||
|
||
You can abort back to the main commands list by typing a *.
|
||
|
||
By typing a 9 at several places you will be taken back to the beginning where
|
||
it asks you to 'enter line number'
|
||
|
||
|
||
PP-01/06/86
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 7 of 10
|
||
|
||
***************************************************************
|
||
* *
|
||
* Electronic Eavesdropper *
|
||
* *
|
||
* by *
|
||
* *
|
||
* Circle Lord *
|
||
* *
|
||
***************************************************************
|
||
|
||
|
||
Have you ever considered buying one of those hi powered microphones often
|
||
seen in eletronics magazines, but thought it was to much to buy and to small to
|
||
card? The circuit shown in this file will provide you with the information to
|
||
build one for a lot less money.
|
||
These audio eavesdropping devices are probably one of the hottest items in
|
||
the underground due to their ability to pick up voices through thick walls.
|
||
You can also attach the speaker wires to a tape recorder and save all the
|
||
conversation. As one can see these are great for blackmailing a teacher,
|
||
classmate, principal, neighbor, or whoever you seek services from...
|
||
|
||
|
||
|
||
Parts list:
|
||
|
||
-=EM--------------------------
|
||
M1 Amplifier Module. (Lafayette 99C9037 or equiv.)
|
||
M2 9-VDC battery.
|
||
M3 Microphone
|
||
R1 20K poteniometer with spst switch.
|
||
S1 Spst switch on R1
|
||
SP1 8-ohm speaker
|
||
T1 Audio transformer (Radio Crap part 273-1380)
|
||
|
||
|
||
|
||
Schematics
|
||
+------+--------M1
|
||
1 1 1
|
||
1 1red 1blu
|
||
1 1 1
|
||
1 transformer
|
||
1 1 1
|
||
1 1yel 1grn
|
||
+------+ 1
|
||
1 +-----+ +-----+
|
||
1 1 1 1
|
||
b1 b1 r+M2+b o+S1+o 1
|
||
l1 l1 e1 1l r1 1r 1
|
||
k1 u1 d1 1k g1 1g 1
|
||
********************** 1
|
||
* yel>*-+ ++
|
||
* * R 1
|
||
* M1 * 1-+ 1
|
||
* red>*-+ 1 1
|
||
* * 1<<
|
||
********************** 1
|
||
b1 1g y1 1
|
||
l1 1r e1 1
|
||
k1 1y l1 1
|
||
1 1 +----------+
|
||
+SP1+
|
||
|
||
|
||
S1 here is on the potentiometer
|
||
M3 can be an earphone earpiece
|
||
|
||
|
||
|
||
|
||
---- /
|
||
/ /
|
||
/ /
|
||
/ ircle / ord
|
||
---- ----
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 8 of 10
|
||
|
||
***************************************************************
|
||
* *
|
||
* Making a Shock Rod *
|
||
* *
|
||
* By *
|
||
* *
|
||
* Circle Lord *
|
||
* *
|
||
***************************************************************
|
||
|
||
|
||
This handy little circuit is the key to generating THOUSANDS of volts of
|
||
electricity for warding off attackers (notice the plural). It generates it
|
||
all from a hefty 6-volt source and is easily fit into a tubular casing.
|
||
Originally used as a fence charger, this circuit can be put to other uses such
|
||
as: charging a whole row of lockers at school, a row of theater seats, or a
|
||
metal bleacher set in the gym. More on this later.
|
||
|
||
To build this, all you need is a GE-3 transistor, a 6.3-volt transformer, and a
|
||
handful of spare parts from old radios. The ammount of shock you wish to
|
||
generate is determined by the setting of potentiometer R1, a 15,000 ohm
|
||
variable resistor. Hint: for maximum shock, set R1 at maximum!
|
||
|
||
|
||
***************************************************************
|
||
Item * Description
|
||
***************************************************************
|
||
C1 * 500uF, 10-WVDC electrolytic capacitor
|
||
C2 * 2000uF, 15-WVDC electrolytic capacitor
|
||
M1 * 6-VDC battery
|
||
M2,M3 * Leads
|
||
Q1 * GE-3 transistor (2n555 will also do)
|
||
R1 * 15K potentiometer
|
||
R2 * 160-ohm resistor
|
||
S1 * Spst switch
|
||
T1 * 6.3-VAC filament transformer (Triad F-14x or equiv.)
|
||
X1 * 1N540 diode
|
||
|
||
***************************************************************
|
||
|
||
|
||
Schematics:
|
||
|
||
+---C1--------------+
|
||
1 1 HOT
|
||
1 +-----+ 1 LEAD
|
||
+---1<Q1 1 )(-->
|
||
R1* + 1 +--->)(
|
||
+-->* 1 1 1 )(
|
||
1 * +--+ 1 1 )(-->
|
||
1 1 1 1 1 1 1 TO
|
||
1 1 1 1 1 1 1 GND
|
||
1 * C2 1 +---1----+
|
||
1 R2 1 1 1 1
|
||
1 * 1 1 1 X1 1
|
||
+---+--+--1---------1-->-+
|
||
1 +/- 1 1
|
||
+*M1*-*S1*+ GND -
|
||
|
||
|
||
---- /
|
||
/ /
|
||
/ /
|
||
/ ircle / ord
|
||
---- ----
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 9 of 10
|
||
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@ _ _ _______ @
|
||
@ | \/ | / _____/ @
|
||
@ |_||_|etal / /hop @
|
||
@ __________/ / @
|
||
@ /___________/ @
|
||
@ PRIVATE @
|
||
@ @
|
||
@ Presents... @
|
||
@ @
|
||
@ \\\\\=-{ Knight Lightning's }-=///// @
|
||
@ @
|
||
@ "Introduction to PBXs" @
|
||
@ @
|
||
@ @
|
||
@ Written on January 3, 1986 @
|
||
@ @
|
||
@ @
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
||
This file is a personal continuation of the PBX entry in the MCI
|
||
Telecommunications Glossary.
|
||
_______________________________________________________________________________
|
||
|
||
A telephone exchange serving an individual organization and having connections
|
||
to a public telephone exchange is called a Private Branch Exchange (PBX). The
|
||
PBX performs a switching function by connecting any extension in the private
|
||
organization to an outside line. A PBX is actually a private switch that
|
||
connects a group of telephones within an individual organization. Calls placed
|
||
outside this individual group are connected to a telephone company's central
|
||
office switch through trunks. A PBX may be operated by an attendant from the
|
||
private organization or the switching system may be done automatically. Other
|
||
terms that are commonly used interchangeably with PBX are: Private Automatic
|
||
Branch Exchange (PABX), Private Automatic Exchange (PAX), and Computerized
|
||
Branch Exchange (CBX). Although these terms were originally used to identify
|
||
specific switch structures, today they are often used as synonyms.
|
||
|
||
PBXs can use any of three basic switching methods: step-by-step (SxS),
|
||
Cross-bar (X-bar), and computer controlled, to perform the basic function of
|
||
switching. However, in addition to detecting calls and establishing a
|
||
transmission link between two telephones, PBXs can do much more.
|
||
|
||
The common control, often called a central processing unit (CPU), controls the
|
||
switching matrix that connects the stations and trunks. The switching matrix
|
||
of a PBX performs the same job as does an operator at a manual switchboard or a
|
||
common control central office switch. The CPU, however, gets its instructions
|
||
from the "stored program", which contains directions for activities, such as
|
||
detecting calls, sending them over the best available route, and recording
|
||
billing information. These computerized electronic switches are used to
|
||
perform routine, as well as unique, functions that simply weren't practical or
|
||
even possible with electromechanical switches.
|
||
|
||
Just as in the public switched network, PBX switches make connection between
|
||
instruments, or "key telephone sets". We're all familiar with key telephone
|
||
sets, whether we know them by name or not. They're the business telephones
|
||
that have six push-button keys lined up below the dial--a red button marked
|
||
"hold" and five buttons or lines with flashing lights.
|
||
|
||
Systems with PBXs and key sets have a great deal of flexability in planning for
|
||
their needs because they can set up their codes to accomplish the functions
|
||
needed in their particular situations. In fact, the PBX can be programmed so
|
||
that each individual extension within a system can take advantage of features
|
||
applicable to its own business needs.
|
||
|
||
Some of the features that are availiable with PBXs and key systems are: call
|
||
transfer, which allows internal or external calls to be transferred from one
|
||
telephone to any other phone in the system; automatic push-button signaling,
|
||
which indicates the status of all phones in the system with display lights and
|
||
buttons; one-way voice paging, which can be answered by dialing the operator
|
||
from the nearest telephone in the system; camp-on, in which a call made to a
|
||
busy phone automatically waits until the line is idle; and internal and
|
||
external conference capabilities, which enables outside callers to conference
|
||
with several inside users.
|
||
|
||
Some features automatically handle incoming telephone calls. Automatic call
|
||
waiting not only holds calls made to a busy extension until the extension is
|
||
free, but also signals the person being called that a call is waiting and
|
||
informs the caller that he is on hold. Automatic call forwarding will send
|
||
calls to employees who are temporarily in locations other than their offices,
|
||
provided they "inform" the PBX where they can be found. Automatic call
|
||
distribution automatically send an incoming call to the first extension that's
|
||
not busy--a useful feature for situations in which any one of a group of
|
||
persons in the organization can adequately respond to incoming calls. Another
|
||
example is automatic call back, which allows a caller who reaches a busy line
|
||
to ask the PBX to return his or her call when the line is free.
|
||
|
||
Still other features provide services such as night telelphone answering,
|
||
telephone traffic monitoring, and network or hot-line connection. These
|
||
examples are but a sample from the features possible with computerized PBXs.
|
||
|
||
===============================================================================
|
||
This is a very brief description of how to use and what to expect on a PBX.
|
||
-------------------------------------------------------------------------------
|
||
Basically, you call the PBX and you will have to enter a code that can be
|
||
anywhere from 4 to 6 digits (Note: some PBXs do not require codes). Then you
|
||
will hear a dial tone. From here you would under normal circumstances dial:
|
||
9 + 1 (or 0) + NPA-PRE-SUFF, for long distance dialing or dial 8 for local
|
||
dialing.
|
||
|
||
The most common use of the PBX is to call Alliance Teleconferencing,
|
||
a teleconference service offered by AT&T. To do this dial:
|
||
0700-456-1000,1002,1003,2000,2001,2002.
|
||
|
||
Note: PBX codes are usually very simple and usually 4 digits.
|
||
EX: 0000, 1111, 1234, etc
|
||
===============================================================================
|
||
Look for a file on Alliance Teleconferencing coming soon...
|
||
_______________________________________________________________________________
|
||
|
||
This has been a Knight Lightning presentation...
|
||
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue Three, Phile 10 of 10
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Phreak World News II
|
||
Compiled by
|
||
\\\\\=-{ Knight Lightning }-=/////
|
||
_______________________________________________________________________________
|
||
|
||
Retraction
|
||
----------
|
||
We at Phrack Inc, respectfully retract all statements made in last issue
|
||
concerning Stronghold East Elite and the LOD. We are sorry for any
|
||
inconvenience this may have caused you.
|
||
_______________________________________________________________________________
|
||
|
||
Phreaks Against Geeks
|
||
---------------------
|
||
This group was formed as a joke by The W(hack)o Cracko Brothers Inc. on a
|
||
conference in December of 1985. The charter members were TWCB, taRfruS, Blue
|
||
Adept, The Clashmaster, and a few others. Since then, Catcher in the Rye and
|
||
the Slovak have tried to join.
|
||
|
||
Later that month, Boston Strangler and Micro Man formed PAP, which stands for
|
||
Phreaks Against Phreaks Against Geeks. Other opposers of PAG include:
|
||
Hack Attack, The Detective, Kleptic Wizard and The Overlord 313. It is not
|
||
known if these others are now in PAP or not.
|
||
|
||
All of this nonsense was really started on the Dartmouth System and is mainly
|
||
a local feud of phreaks in the Boston (617 NPA) area.
|
||
_______________________________________________________________________________
|
||
|
||
Brainstorm Gets 10 Megs
|
||
-----------------------
|
||
Finally, after several months of promises, Brainstorm (ELITE) now has a 10 Meg
|
||
Hard-drive. As of January 1, 1986 Modern Mutant cleared the userlog of
|
||
Brainstorm and a membership drive was started. Note: To become a member of
|
||
Brainstorm, you will have to take a small (and more or less easy) filter.
|
||
Some other new features on Brainstorm are online games; Karate, Football, and a
|
||
hacking simulation.
|
||
_______________________________________________________________________________
|
||
|
||
Anarchy Inc. Disbanded
|
||
----------------------
|
||
Anarchy Inc., a once very famous g-phile writing organization, has been
|
||
disbanded. Basically because most of its membership are now attending college.
|
||
_______________________________________________________________________________
|
||
|
||
Dartmouth Conferences To Be Abolished?
|
||
--------------------------------------
|
||
This message was given on January 9, 1986 when a user would try to join a
|
||
conference.
|
||
|
||
XCaliber, Fantasie, Spectre, etc are not available until tomorrow. Due to
|
||
pressure from Kiewit and some users, conferences have been disabled for one
|
||
day. Hopefully this will remind some people that the conferences are a public
|
||
service on the part of a few people and are not a "right". Recent abuse of the
|
||
conferences has made caring for these conferences almost more trouble than they
|
||
are worth. These abuses have also caused some users to complain to Kiewit. Too
|
||
many complaints and they might vanish altogether. If everyone will work at
|
||
keeping the conferences reasonably clean and free of abuse life will be much
|
||
easier. Thank you for your time and appologies for the lack of conferences.
|
||
|
||
You are no longer connected to conference "XYZ".
|
||
|
||
Later, Corwin got pissed off by the password abuse that was going on and killed
|
||
almost all non-Dartmouth student passwords. It is also rumored that he took
|
||
down the DUNE bbs, however Apollo Phoebus says that it is a temporary thing and
|
||
that DUNE will be going back up soon.
|
||
_______________________________________________________________________________
|
||
|
||
MCI Employee Bust
|
||
-----------------
|
||
Employees at MCI were creating fake accounts and then running up massive bills.
|
||
Then later they would either credit the accounts or say that the subscriber
|
||
reported code abuse. Any employee found doing this was fired.
|
||
|
||
Another way these employees were cheating the company was by reporting code
|
||
abuse on their own accounts, however MCI Security using CNA quickly caught
|
||
these employees.
|
||
|
||
Note: MCI Security has stated that the only real way that they can catch
|
||
abusers of the phone company is by calling the numbers that the abusers
|
||
call and asking them who they know making these calls.
|
||
|
||
Information has been provided through MCI Security
|
||
_______________________________________________________________________________
|
||
|
||
MCI/IBM Merge
|
||
-------------
|
||
MCI Telecommunications company has merged with IBM and their phone industry
|
||
SBS. This was an effort to join the two as strong allies against AT&T.
|
||
|
||
IBM computers Vs. AT&T computers
|
||
|
||
MCI Telecommunications Vs. AT&T Telecommunications
|
||
|
||
Changes arising from this merger (if any) are not known, but none are expected
|
||
for some years.
|
||
_______________________________________________________________________________
|
||
|
||
The Life And Crimes of the W(hack)o Cracko Brothers
|
||
---------------------------------------------------
|
||
The date is somewhere in December of 1984. Peter writes a code hacker for the
|
||
Hayes and tells Tim NOT to use it on Sprint because they trace. Sometime later
|
||
that night Tim received a call from Scan Man, sysop of P-80.
|
||
|
||
Scan Man said he needed TWCB to hack him some Sprint codes cause he didn't have
|
||
the time or a Hayes. Tim did it for him on the 314-342-8900 Sprint extender.
|
||
|
||
He left it on all night and the next day while he was in school. Sprint traced
|
||
him. At 9:00 AM the next morning agents from the FBI, AT&T, Western Union,
|
||
GTE, and Southwestern Bell, arrived at TWCB's house.
|
||
|
||
They were let in, bringing with them cameras and tape recorders among other
|
||
equipment. Upon seeing this Peter blew into an upstairs extension and
|
||
cancelled the dialing program, but not before the agents made sure it was the
|
||
right place.
|
||
|
||
All of TWCB's computer equipment was confiscated and Tim was taken downtown
|
||
shortly after being picked up at school. Peter was sick and left home. Tim
|
||
was later released in his mother's custody.
|
||
|
||
They each received probation and 100 hours of county service.
|
||
|
||
That was then...
|
||
|
||
Recently TWCB has come under investigation for the following: Drug use and
|
||
dealing, burglary, forgery, and fraudulent use of a credit card.
|
||
|
||
Peter: 8 Class A Felony charges
|
||
1 Class A Misdemeanor charge
|
||
1 Class B Misdemeanor charge
|
||
|
||
Tim: 6 Class A Felony charges
|
||
2 Class B Misdemeanor charges
|
||
|
||
Note: Some of these misdemeanors are for not returning library books.
|
||
|
||
Also it has been said that Tim has been in jail 11 times. Both members of TWCB
|
||
are now enrolled in a reform school.
|
||
|
||
The information in this article has been provided by TWCB, directly and/or
|
||
indirectly.
|
||
_______________________________________________________________________________
|
||
|
||
Blue Adept: Gone For Good
|
||
-------------------------
|
||
Blue Adept, known for being an all around loser and Dartmouth impersonator,
|
||
decided to try blue boxing. For some reason he decided to call an out-of-state
|
||
trunk direct.
|
||
|
||
Later that month Blue Adept and his parents received a phone bill with a
|
||
charge around $386.00. This led to his being restricted from using the phone.
|
||
|
||
Sometime after this incident Blue Adept received an invitation to join on a
|
||
conference. He wasn't home but his parents decided to stay on and listen in.
|
||
|
||
Blue Adept is not allowed on conferences anymore and all calls to him are now
|
||
screened.
|
||
_______________________________________________________________________________
|
||
|
||
Overlord 313 Busted: Step dad turns him in
|
||
------------------------------------------
|
||
Overlord's step-dad always would be checking his computer to see what was on it
|
||
and what was nearby. Last week he noticed the credits in Overlord's file on
|
||
Wiretapping, which can be seen in this issue of Phrack.
|
||
|
||
He reported his findings to Overlord's mom. She had a talk with him and he
|
||
promised to stop his evil ways. His step-dad didn't believe him for a second.
|
||
|
||
1/11/86
|
||
|
||
Step-dad goes on business trip, where he meets Ma Bell executive Don Mitchell.
|
||
Step-dad asks all sorts of different questions regarding use of MCI dialups and
|
||
Alliance Teleconferencing, and talks about how his step-son does all these
|
||
things and more. Don strongly suggests that he reports this to the phone
|
||
company...
|
||
|
||
1-13-86
|
||
|
||
HE DOES
|
||
-------
|
||
No legal action against Overlord has taken place as of now.
|
||
|
||
Information Provided by The Overlord of 313
|
||
_______________________________________________________________________________
|
||
|
||
Maelstrom 305 Busted
|
||
--------------------
|
||
While I am not at liberty to revel all the information concerning this bust I
|
||
will mention the bare facts.
|
||
|
||
Maelstrom hacked into the Southern Bell Data Network (SBDN). This system
|
||
happened to be local to him so he did not bother to use an extender.
|
||
Unfortunately this system also had ANI (Automatic Number Identification). His
|
||
computer and other equipment as well as all his files were confiscated as
|
||
evidence.
|
||
|
||
Information provided by the Maelstrom of 305
|
||
_______________________________________________________________________________
|
||
|
||
Whackoland BBS
|
||
--------------
|
||
This bbs is now up and running strong. Its sysops are of course...TWCB Inc.
|
||
300/1200 Baud, and 40 Megs. It has unique features and great mods as well as
|
||
Elite Sections. Call today... 314-256-8220. Note: Only 100 users will be
|
||
kept so if you are just a beginner please don't bother to call.
|
||
_______________________________________________________________________________
|
||
|
||
R.I.P. Broadway Show
|
||
--------------------
|
||
The Broadway Show BBS in New York is now down, and Broadway Hacker will soon be
|
||
in Washington DC. This C-64 run bbs, was one of the best in its time, but
|
||
later it became a hangout for rodents.
|
||
|
||
>From its ashes rises a new bbs, however its name has not been released as of
|
||
this writing. Broadway Hacker will sysop this bbs for about a week and then
|
||
turn it over to the new sysop. His name is not yet know, probably since he
|
||
hasn't a handle yet.
|
||
|
||
Although this new bbs will appear legal and have some legal sections it is
|
||
indeed a phreak bbs, and should be checked out.
|
||
|
||
718-615-0580
|
||
_______________________________________________________________________________
|
||
|
||
Speed Demon Elite Down?
|
||
-----------------------
|
||
This bbs sysoped by Radical Rocker has suddenly disappeared leaving the caller
|
||
with a message of the line being disconnected. No other information is
|
||
available.
|
||
_______________________________________________________________________________
|
||
|
||
Well that's all for this issue's Phreak World News. If you have anything of news
|
||
|
||
Knight Lightning/Taran King/Cheap Shades
|
||
_______________________________________________________________________________
|
||
|
||
|