-=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 1 of 19 Released Date December 31, 1992 Hello, ... Hello? yes we are still around, before anything else I would like to apologize for the incredible time it took us to produce this issue. As a result of the tremendous time between issue number six, and this issue, some of the articles in the UPi Underground Newsline may presently be quite ancient. We have no real excuse for this except that we had too many late night conferences with all our friends in australia. Right Anthony? However, let me now bring you up to date on what has been happening with the group. The Darkman, formerly NukE prezident applied to UPi the day of his retirement from nuke, he was accepted into the group. You will also see some other new names in the UPi members list. UPi magazine can now also be downloaded off five different anonymous FTP sites. When you venture further down the page you will come accross these addresses. The article from Black Flag on how to build the frequency modulator that was previously promised to be in this issue, will regretfully not be appearing. Black Flag apparrently did build a working modulator however once he was finished he never wrote the article! You can contact the editors of UPi at Voice Mail Box: 416-505-8636 Internet E-Mail: giac@gene02.med.utoronto.ca Ftp Sites: halycon.com in the /pub/mirror/cud/upi directory or kragar.eff.org in the /pub/cud/upi directory or mullian.ee.mu.oz.au in the /pub/text/CuD/upi or redspread.css.itd.umich.edu in the /cud/upi Article Article Name Writer(s) Size Number =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 6.1 Introduction To UPi Magazine Arch Bishop (4k) 6.2 Mad Matt's Introduction To Explosives Anonymous (27k) 6.3 The Lighter Side: Aggravating Your Forbidden Nostalgia (13k) Neighbourhood Geek's, Exgirlfriends, Etc. 6.4 An Introduction To Trace Utility Of Opticon (16k) Virtual Memory Operating System 6.5 Summer Trashing Volume 1 Silicon Phreaker (6k) 6.6 Pyrotechnica Genghis Khan (52k) 6.7 Network User Addresses Information The Darkman (6k) Numbers 6.8 The Hacker's Code Of Ethics The Darkman (7k) 6.9 Build A Emergency Telephone Dialer The Lost Avenger (29k) 6.10 Research Experiment #1 Screw You All Rainbow's Gravity (21k) 6.11 From Whom Bells Toll The Lost Avenger (23k) 6.12 The Hacker Hood The Lost Avenger (21k) 6.13 Pumpcon Busted Anonymous (11k) 6.14 How To Social Engineer Pizza Pizza Major Thrill (4k) For CNA 6.15 UPi Underground Newsline Part 1 Arch Bishop (90k) The Lost Avenger 6.16 UPi Underground Newsline Part 2 Arch Bishop (77k) The Lost Avenger 6.17 UPi Underground Newsline Part 3 Arch Bishop (88k) The Lost Avenger 6.18 Member & Site Application Form UPi Editorial Staff (2k) 6.19 Member & Site Listing UPi Editorial Staff (3k) ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 2 of 19 Mad Matt's Introduction To Explosives! (Editor's Note: The author of this articel wishes to stay anonymous.) Primary and High Explosives: Explosives are substances which go through rapid decomposition, and simultaneous release of energy, with some upon the application of heat but usually upon the application of a shockwave, (a sudden localized increase in mechanical pressure). Many High Explosives if ignited by flame will just burn, and a couple are not flammable at all. A stick of dynamite, if lit by a match will merely burn, but if placed on a metal anvil and struck with a hammer or blasted with a blasting cap, it will explode. The reaction is transmitted within the explosive, self-propagated by the pressure shockwave, not by flame. Explosives will detonate without any confinement, but are usually put into some sort of container to hold them in place for the shockwave, otherwise the first part of the explosion would just blow away the remainder of the explosive like dust in a wind storm, rather than detonating it. Other substances may be added to the explosive to increase or decrease its sensitivity to detonation, or to enhance its power. Detonating Cord, also called Fuze, (with a Z,) is a long tube (that looks like heavy wire,) that contains a Primary or High Explosive. It is used to transmit an explosive shockwave from the point of its detonation to the major explosive it in turn is to detonate. This is in contrast to Fuse, (with an S,) which is used to transmit flame. Detonating Cord is used professionally with explosives because of its much higher reliability in comparison with Fuse. Detonating Cord may occasionally be used to directly detonate a mass of High Explosive, though it is usually used to detonate a Blasting Cap of Primary Explosive with then detonates the High Explosive. Primary Explosive, (also known as Initiating Explosives,) are especially sensitive to shock, heat, flame and friction. Being so sensitive, they are extremely dangerous. They are sometimes more powerful than the High Explosives, and are typically more expensive to manufacture in quantity. Blasting Caps are mainly composed of Primary Explosives. Primary Explosives are used to convert the flame of a fuse or squib, or the shockwave of Detonating Cord into a very powerful shockwave to explode a mass of High Explosive. High Explosives are chemical compounds or mixtures similar in some ways to the Primary Explosives, but they are very much less sensitive to detonation. In small quantities most will just gently burn. For reliable detonation they should be exploded by a Primary Explosive (Blasting Cap). They are very much safer to handle, (from an explosion standpoint,) than the Primaries, and are usually much less expensive to manufacture in quantity. From a view to safety, High Explosives should make up the vast majority of any (but the smallest) explosive device you may decide to experiment with. Primary Explosives HMTD (Hexamethylenetriperoxidediamine) Materials Needed: 2 Containers (the smaller one should be glass) Hydrogen Peroxide Solution (3% or stronger -6% to 15% are best) Citric Acid Hexamethylenetetramine (see chemical synthesis section) Method: -Place a beaker or glass jar containing 60 ml (2 fluid ounces) of 6% Hydrogen Peroxide solution (twice as much if it is 3%) into a larger jar, containing crushed ice and a little water to cool the inner jar -Add 2 teaspoons (4 g) of Hexamethylenetetramine (Hexamine), and stir until dissolved -Add 3 teaspoons (6 g) of Citric Acid and stir until dissolved. -Do not add any more ice to the outside container. Allow the ice to melt. -Let the mixture sit for 24 hours and a white precipitate will have formed on the bottom of the jar. Pour this mixture through a filter paper and the white material will be left on the paper. Pour water through the filter to wash this white material. Throw away the liquid. Dry the white powder which is HMDT, Primary Explosive. This material will explode from a sharp blow or if quickly heated above 200xC (392xF). If heated over 70xC (158xF) for periods of time or if boiled in water it will harmlessly decompose. It is very flammable. HMTD is somewhat corrosive and is toxic. It is insoluble in water or alcohol. DDNP DDNP, diazodinitrophenol, is a primary explosive. It is extensively used in commercial blasting caps that are initiated by black powder safety fuse. It is superior to mercury fulminate in stability but is not as stable as lead azide. DDNP is desensitized by immersion in water. In Blasting Caps it can be used with a booster explosive such as RDX or Picric Acid (see the High Explosives section) Materials Needed: Picric Acid (see the High Explosives section) Sulfur Lye (Sodium Hydroxide) Sulfuric Acid, diluted Potassium Nitrite Water 2 Pyrex beakers Stirring Rod (glass or wood) Method: -In one of the beakers, mix 0.5 g of lye with 2 tablespoons (30 ml) of warm water. Dissolve 1 teaspoon (3.0 g) of Picric Acid in the water-lye solution. -Place 1/4 teaspoon (1 ml) of water in the other beaker. Add 1/2 teaspoon (2.5 g) of sulfur and 1/3 teaspoon (2.5 g) of lye to the water. Boil this second solution over heat until the colour turns dark red. Remove from the heat and allow this solution to cool. -In three portions, add this sulfur-lye solution to the Picric Acid- Lye solution; stir while pouring. Allow the new mixture to cool. -Filter the mixture through a paper towel into a container. Small red particles will collect on the paper. Discard the liquid -Dissolve the red particles in 1/4 cup (60 ml) of boiling water. Remove and filter the mixture through a paper towel (or filter paper) but this time discard the particles left on the paper and save the liquid. -Using an glass eyedropper, slowly add the sulfuric acid to the filtered solution until it turns orange-brown. Add 1/2 teaspoon (2.5 g) more of sulfuric acid to the solution. Allow the solution to cool to room temperature. -In a separate container, dissolve 1/4 teaspoon (1.8 g) of Potassium Nitrite, in 1/3 cup (80 ml) of water. Add this solution, while stirring, to the orange-brown solution. Allow the mixture to stand for 10 minutes. The mixture will turn light brown. [CAUTION: AT THIS POINT THE MIXTURE IS A PRIMARY EXPLOSIVE. KEEP IT AWAY FROM FLAME.] -Filter the mixture through a paper towel or filter paper. Wash the particles left on the paper with 4 teaspoons (20 ml) of water. -Allow the particles to dry (approximately 16 hours) [CAUTION: EXPLOSIVE IS SHOCK AND FLAME SENSITIVE. STORE THE EXPLOSIVE IN A CAPPED CONTAINER.] Lead Picrate Material Needed: Picric Acid (See the High Explosives preparation section) Litharge (See the chemical synthesis section) Methyl Hydrate (Methanol) Method: -Weigh out typically 2 g of Picric Acid and 2 g of Lead Monoxide -Add the Picric Acid to 2 teaspoons (10 ml) of methanol in a container and stir -Add the lead monoxide -Continue stirring and allow the methanol to evaporate. NOTE: The mixture will suddenly thicken -Carefully break up this mixture and stir occasionally until a powder is formed (a few lumps will remain). -Remove and spread out to air dry Lead Picrate is easily detonated by shock, spark or heat. Tetramminecopper (II) Chlorate Materials Needed: Sodium Chlorate (see chemical synthesis section) Copper Sulfate Ammonium Hydroxide (Household ammonia) Alcohol (Ethanol/Ethyl Alcohol 93% or better purity) Method: -Measure 1/3 teaspoons (2.5 g) of Sodium Chlorate in a wide mouth bottle and ass 10 teaspoons of the alcohol - Add 1 teaspoon (4 g) of Coper Sulfate and stir the mixture just under the boiling point for 30 minutes (heat can be supplied by a pan of hot water). The mixture will change colour. CAUTION: KEEP THE SOLUTION AWAY FROM FLAME -Keep the volume of the solution constant by adding additional alcohol about every 10 minutes. Remove solution and let cool. Filter through folded paper towels or filter paper into another wide mouth bottle or beaker. Keep the liquid. -Add 1 cup (250 ml) of ammonia to a narrow mouth bottle, (pop bottle, or a flask). Place tubing so that it extends about 4 cm inside the bottle, then seal the tubing to the bottle with wax (clay, gum, etc). -Place the other end of the tubing into the beaker (or wide mouthed bottle from the earlier step. Heat the sealed bottle containing the ammonia in a pan of hot water (not boiling) for about 10 minutes. -Bubble ammonia gas through the first solution (in the beaker) until the colour of the solution changes from a light green to a dark blue (approximately 10 minutes) and continue bubbling for another 10 minutes. CAUTION: AT THIS POINT THE SOLUTION CONTAINS A PRIMARY EXPLOSIVE. KEEP IT AWAY FROM FLAME. -Reduce the volume of the solution to about 1/3 of its original volume by evaporating it in the air or a stream of air. You may wish to speed up the evaporation by pouring the solution into a flat glass casserole pan. -Filter the solution through a paper coffee filter and wash the crystals that remain in the paper with 1 teaspoon of alcohol and set the crystals aside to dry (approximately 16 hours) CAUTION: THIS EXPLOSIVE IS SHOCK AND FLAME SENSITIVE. STORE IN A CAPPED CONTAINER. HIGH EXPLOSIVES: PICRIC ACID Materials Needed: Aspirin (20 tablets, preferably the no-name A.S.A. tablets) Alcohol (Ethanol/Ethyl Alcohol 93% pure or better) Concentrated Sulphuric Acid Potassium Nitrate (Saltpetre) Method: -Crush 20 tablets of aspirin in a glass container and work into a paste with a teaspoon or water. -Add approximately 1/3 to 1/2 cup (100 ml) of alcohol with stirring and filter through filter paper into another glass container -Discard the solid left on the paper and pour the liquid from the container into a flat dish or glass casserole pan. Let the alcohol and water evaporate, leaving a white powder. -Take some sulfuric acid and boil it in a beaker or heat resistant Pyrex container until the fumes change to white fumes and immediately remove the heat at this point. This boils off the water leaving you with Concentrated Sulfuric Acid. -Add the white powder to 1/3 cup (80 ml) of concentrated Sulfuric Acid in a glass jar -Heat the jar in a simmering hot water bath for 15 minutes and remove. -Stir; the solution will gradually turn to a yellow-orange colour. -Add 3 level teaspoons (15 g) of Potassium Nitrate in three portions with vigorous stirring. The solution will turn red, and then back to a yellow-orange colour. -Allow the solution to cool to room temperature while stirring occasionally. -Slowly pour the solution, while stirring, into 1 1/4 cups (300 ml) of cold water and allow to sit for a few minutes. -Filter the solution through filter paper into a glass container. Light Yellow particles will collect on the paper. This is Picric Acid. It might take considerable time to filter. -Let the filter paper and the Picric acid dry. It may take 16 hours or more, (or you can keep it at 70-90xC/160-200xF for two hours). The yield should be about 4 grams of Picric Acid. Picric acid has about the same power as TNT. RDX (Cyclonite) Materials Needed: Concentrated Nitric Acid (90 to 100% concentration) Hexamethylenetetramine (see the Chemical Synthesis section) a 1000 ml (1 Litre, 5 cup) beaker or glass coffee pot an ice water bath (large enough to hold the beaker listed above) a hot water bath (large enough to hold the beaker listed above) Method: -Prepare the large ice water bath. 1/2 cup (125 ml) of Concentrated Nitric Acid are cooled, if necessary, to 20xC (68xF) in the beaker or glass coffee pot. 1 1/2 ounces (40 g) of Hexamethylenetetramine are slowly added over 15 minutes, while stirring and carefully watching the temperature. You will soak the beaker in the ice water bath to keep the temperature of the Nitric Acid between 20xC and 30xC (68xF to 86xF). You will need a glass thermometer to keep track of the temperature. The glass thermometer may also be used to stir the solution. When all of the Hexamine has been dissolved, place your beaker in the hot water bath, to heat up the Nitric Acid to 55xC (131xF). Let this hot water bath and beaker of chemicals naturally cool to within 10xC (18xF) of room temperature. Add 2 to 3 cups (500 to 750 ml) of cold water to the beaker of chemicals. White particles will begin to appear in the solution. Filter off the liquid and wash the white powder several times with cold water. (If you have Acid/Base Indicator Paper, continue washing the RDX until the water registers a neutral pH of about 7). Discard the liquid. This white powder is RDX High Explosive. RDX will detonate from very strong impact. It will not detonate, even if heated to 360xC (680xF). It is very poisonous. It is not soluble in water but 1 part RDX will dissolve in 10 parts Acetone. RDX is 1+ times as powerful as TNT. Plastic Explosive made from RDX Method: Thoroughly mix 10 parts by weight of motor oil to 90 parts dry RDX, to make a variation of C-4 (Military) Plastic Explosive. Chemical Synthesis and Supplies Alcohol (Ethanol, Ethyl Alcohol): is available in 93% concentration from all Pharma Plus Drug stores (make sure you are getting the ethyl alcohol and NOT the isopropyl alcohol which is usually a 70% concentration. It is sometimes labelled as rubbing alcohol but make sure you are getting the correct type of alcohol.) Ammonia (Household Ammonia, Ammonia Water, Ammonium Hydroxide): is available at any grocery store Citric Acid: a white powder used in food preservation, available from drug stores and some food stores Copper Sulfate: Is available from school chemistry labs, hobby or science shops for plating items with copper, and at some farm and garden suppliers as an anti-fungicide. Formaldehyde: Farm and Gardening Suppliers as an anti-fungicide for seeds Hexamethylemetetramine (Hexamine): is an easily produced substance used in the manufacture of HMTD (primary explosive) and RDX (high explosive). This should be manufactured outside because of the smell. Add 1 volume of Formaldehyde (37% solution typically,) to 4 volumes of Household Ammonia. Mix thoroughly and let this smelly pair evaporate. You might want to do this in a flat container (like a glass casserole pan) to speed things up. You may also wish to put this container into a hot water bath to speed things up further. After several days of evaporation, you will be left with a fairly dry powder, which is Hexamethylenetetramine. Hydrogen Peroxide (Hair Bleach): A clear liquid, 3 to 6% solutions are available from drug stores, up to 15% concentrations are available from beauty supply shops. Lead Monoxide (Litharge): Is used in the manufacture of Lead Picrate primary explosive. To make this material see Potassium Nitrite. Lye (Sodium Hydroxide): Is available at most hardware stores Methyl Hydrate (Wood Alcohol, Methanol, Methyl Alcohol): Available at Hardware stores (it is poisonous, DO NOT DRINK IT) Nitric Acid: A Clear or Yellowish liquid, extremely corrosive, available from school chemistry labs, (can easily be stolen from the University of Toronto Chemistry building, Wallberg Building, 184 College Street, the basement labs and supply rooms are your best bet,) or you can manufacture as follows: Concentrated (95 to 100%) Nitric Acid may be produced from Concentrated Sulfuric Acid and Potassium Nitrate (Saltpetre). Add 100 g. (about 1+ volumes) of Potassium Nitrate to 35 ml (or 1 volume) of Concentrated Sulfuric Acid. If this mixture is gently heated it will boil off the Nitric Acid as fumes which can be condensed back into Concentrated Nitric Acid. Your final volume of Concentrated Nitric Acid should be about the same as the original volume of Concentrated Sulfuric Acid. Beware: Nitric Acid and its fumes are toxic and extremely corrosive. They will not affect Glass or Teflon but will eat through most other materials, including skin. Try to do these procedures out-of-doors. Many chemistry texts books give further information on the equipment needed to distil Nitric Acid. Potassium Nitrate (Saltpetre): Is available at most drug stores Potassium Nitrite: Used in the manufacture of DDNP primary explosive This can be manufactured (along with litharge/lead monoxide at the same time as needed for lead picrate) as follows: Materials needed: Lead metal (available as lead shot for rifle shot refills, or in hobby shops for stained glass work) Potassium Nitrate (Saltpetre) Methyl Hydrate Iron Pipe Method: -Mix 3 parts by weight of Lead with 1 part by weight Potassium Nitrate. Place the mixture in the iron pipe and heat in a hot bed of coals or by a blow torch for an hour -remove the container and allow to cool. Chip out the yellow solid with a screwdriver, put into a jar and add 1/2 cup (120 ml) of Methyl Hydrate, giving an orange-brown creamy colour. -Heat the container with the mixture in a hot water bath until it reacts giving a darker colour. -Filter the mixture through filter paper -The solid left on the paper is Lead Monoxide (Litharge). Take the paper and place it over a different (and empty) glass container wash it through the paper twice, using 1/2 cup (120 ml) of hot water each time, then air dry this Lead monoxide before using it to prepare Lead Picrate. -Place the jar with the original liquid (not the washing water) in a hot water bath until the Methyl Hydrate has evaporated. The remaining snowy white sludge is water and Potassium Nitrite. Keep this in a closed container as it has a tendency to absorb additional moisture from the air. Use this material in the manufacture of DDNP. Sodium Chlorate: An oxidizer for incendiaries, rocket propellants, and in the manufacture of Tetramminecopper Chlorate explosive. It can be obtained from school or manufactured as follows: Materials Needed: Two Carbon Rods Salt Water Sulfuric Acid (Diluted) 12 volt car battery charger (or a car battery while engine is running) Method: -Mix 1/2 cup of salt with 3 cups (3 litres) of water in a glass container. -Add 2 teaspoons of battery acid to the solution and stir vigorously for 5 minutes. -Connect the two carbon rods using heavy wires to the 12 volt power source. Make sure the two rods stay 4 to 5 cm (1+ to 2 inches) apart at all times. DO NOT ALLOW THE RODS TO SHORT OUT! -Submerge 5 to 15cm (2 to 6 inches) of length on the rods into the solution. Do not allow the copper wires to touch the solution. -Apply power for two hours then stop for two hours, then repeat for two days. -Filter this solution through filter paper and throw out the solid material captured in the filter paper. -Take the solution and place it in a flat pan and allow the water to evaporate. (Placing the pan in a hot water bath can dramatically speed up the evaporation.) The powder that remains is Sodium Nitrate. Sodium Nitrite: Can be used instead of Potassium Nitrite in the manufacture of DDNP primary explosive. It can be manufactured by heating Sodium Nitrate in a pyrex test tube or beaker over a flame for 10 to 15 minutes. It will give off oxygen, and Sodium Nitrite will remain. (Do not use this method for Potassium Nitrate as it will NOT give you Potassium Nitrite, but instead Potassium oxide.) Sulfuric Acid: can be bought from Jeweller, Chemical or Metal Plating Suppliers and is usually 98 to 100% pure (Concentrated). Car Battery Acid is available from Automotive Supply Shops (but not Canadian Tire,) and is only 40% Sulfuric acid and 60% water. Gently boil this in a Pyrex glass container, such as a beaker or a glass pyrex coffee pot, until the temperature rises above 120xC (248xF) and/or white fumes start to be given off. Let it cool and store it in its original glass container. This is now Concentrated Sulfuric Acid and is 98 to 100% pure. Filter Paper: You can get real filter paper from school, or use Paper Coffee filters available at any grocery store. You may also use a few layers of paper towelling but this usually doesn't filter very well. Blow up a Bank or school today . . . HAVE PHUN! SOME MORE PHUN INFORMATION TO USE ON YOUR PARENTS! A List of Plant Poisons Autumn Crocus: The bulbs cause vomiting and nervous excitement. Azaleas: All parts produce nausea, vomiting, respiratory distress, prostration and coma. Fatal. Be Still Tree: All parts produce lower blood pulse, vomiting and shock. Fatal. Bleeding Hearts: Foliage and roots, fatal in large amounts. Buttercups: All parts may severely injure the digestive system. Camara: Green berries affects lungs, kidneys, heart and nervous system. Fatal. Campanilla : Be Still Tree (q.v.) Camotillo: Deadly Toxic. (Solanine) Fatal. Castor Beans: Produces vomiting, purgation, delirioun and coma. Contains ricin. Fatal. Common Oleander: All parts toxicc attacks heart. Fatal. Cherries: Wild and domestic twigs and foliage. Releases cyanide when eaten. Shortness of breath, excitement and fainting within minutes. Fatal. China Berry Tree: Attacks nervous system via fruit. Narcotic. China Tree: China Berry Tree (q.v.) Crab's Eye: Seeds, subcutaneous emplacement. Fatal within four hours. Crow Fig: Seed produce convulsions. Contains strychnine and brucine. Daphne: Berries have killed children. Fatal. Diefenbachia: All parts produce burning and irritation to tongue and mouth. Swollen tongue may block throat death can occur. (Under circustances, fatal.) Divine Mushroom: Produces hyper sensitivity, hallucinations and melancholia for several hours. Deliriant. Dutchman's Breeches: Bleeding Hearts (q.v.) Dumb Cane: Diefenbachia (q.v.) East Indian Snakewood: Produces convulsions. Contains strychnine and brucine. (Death possible due to exhaustion.) Elderberry: All parts except berry produce vomiting and digestive distress. Elephant Ear: Diefenbachia (q.v.) False Upas Tree: All parts produce convulsions. Contains strychnine and brucine. (Death possibel due to exhaustion.) Fish Poison Tree: Excites nervous system, causes spasms followed by deep sleep. Contains piscidine. Foxglove: Leaves stimulate the heart. Contains digitalis. Produces circulation disorder and confusion; may be fatal. Gabon Arrow Poison: Produces incapacitation through vomiting and purgation. Contains strophanthin and incine. Gloriosa Superba: All parts contain narcotic superbine and deadly poison colchicine (fatal dose 3 grains). Golden Chain: Bean-like seed capsules induce staggering, convulsions and coma. May be fatal. Guiana Poison Tree: CURARE taken from bark. Contains curare, strychnine and brucine. Produces respiratory collapse. Fatal - 1 hour. Hyacinth: Bulbs produce vomiting and purgation. Exhaustion may be fatal. Ipecacuanha: Root is powerful emetic also depressant. Iris: Stems cause severe but not fatal digestive distress. Jack-in-the-Pulpit: Roots contain crystals of calcium oxalate that cause intense irritation to mouth and tongue (similar to dumbcane) Jamaican Dogwood: Fish Poison Tree (q.v.) Jasmine: The berries produce severe nervous and digestive upest. Can ve Fatal. Jequiritz Bean: Crav's Eye (q.v.) Jimson Weed: All parts cause delirium. Has proven fatal. Kachita: Crow Fig (q.v.) Lantana: Camara (q.v.) Larkspur: Seeds and young plants produce severe nervous and digestive upset. May be fatal. Laurels: Azaleas (q.v.) Mayapple: Roots contain 16 active toxic substances. Fruit may cause diarrhea. Mexican Tuber: Camotillo (q.v.) Mistletoe: Berries - Fatal. Monkshood: Roots produce digestive upset and nervous excitement. Moonseed: Berries may be fatal. Narcissus: Hyacinth (q.v.) Nightshade: Unrie berries produce intense digesive and nervous upset. Fatal. Nux Vomica Tree: Crow Fig (q.v.) Oaks: Foliage and acorns affect kidneys; symptoms delayed days or weeks. Pain and discomfort. Oleander: Leaves and branches produce upset and induce heart attacks. Fatal. Extremely poisonous. Ololiuqui: Jimson Weed (q.v.) Poinsettia: Leaves Fatal. (One leaf will kill a child.) Poison Hemlock: All parts. Used as an executionary plant in ancient times. Fatal. Poison Ivy: Milky sap is skin irritant. Contains toxicodendrol. Poison Nut: Crow Fig (q.v.) Poison Tanghin: Causes voniting purgation and paralysis a.k.a. Ordeal Tree for obvious reasons. Contains cerberin and tanghinine. May be fatal. Potato: Vines and foliage produce severe digestive and nervous disorers. Contains alkaloid poisons. Pride of India: China Berry Tree (q.v.) Psychic Nut: Raw seeds produce violent purgation; death caused by exhaustion. Red Sage: Camara (q.v.) Rhubarb: Leaf blade produces convulsions followed by coma. Fatal. (large amounts, raw or cooked) Rosary Pea: A single pea has caused death. Castor Bean (q.v.) St. Ignatius' Bean: Produces convulsions. Contains brucine. Star of Bethlehem: Bulbs cause vomiting and nervous excitement. Thorne Apple: Jimson Weed(q.v.) Common cause of poisoning. Tomato: Vines and foliage produce digestive upset and nervous disorder. Related to Nightshade (q.v.) Contains alkaloid poisons. Trailing Poison Oak: Poison Ivy (q.v.) Upas Tree: Milky sap produces vomiting purgation and paralysis. Contains antiarin and used as arrow poison (Malaya). Fatal. Water Hemlock: All parts produce violent and painful convulsions. Many have died from Water Hemlock poisoning. Fatal. White Wooly Kombe Bean: Gabon Arrow Poison (q.v.) Wisteria: Seeds, pods produce digestive upset Yellow Oleander: Be Still Tree (q.v.) Yew: Foliage. Death occurs without any preliminary symptoms. Fatal. HELP STOP THE POPULATION EXPLOSION . . . POISON SOME ASSHOLE TODAY! ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 3 of 19 =-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-= =-= United Phreakers Incorporated presents .... =-= =-= =-= =-= =-= =-= The Lighter Side: =-= =-= =-= =-= =-= =-= Aggravating Your Neighbourhood geek, =-= =-= Ex-girlfriends, etc =-= =-= =-= =-= =-= =-= Written by : Forbidden Nostalgia =-= =-= 7/21/92 =-= =-= =-= =-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-= UPi is a very serious H/P group but once in a while one needs a good laugh. Many of the satirical text files have been utter bullshit and just for a laugh. But I have come up with a few ideas of things you can do to aggravate your neighbourhood geeks, ex- girlfriends, etc. Most of these I have tried and all of them are realistic. This file is written for those who are not experienced in certain types of phreaking such as canning therefor if you can't figure this stuff out don't even bother reading UPi again. Of course this is just for information purposes and I do not support you doing this stuff in any shape, way or form. Phone Bills ------------ ------------------------------------------------------------ This would be best done when the parents are on vacation, or late at night to reduce being caught ------------------------------------------------------------ Step 1 Make a beige box. For those illiterates out there a beige box is just a handset basically. You can either steal one from a Bell van or just go to a Biway and buy the cheapest phone you can find that has a dialer on the handset (where you speak into). With that cheap phone cut off the wires connecting the handset to the rest of the phone and connect alligator clips to the end (Any further information can be found in countless Beige Box text files on a H/P/A/C/V board near you). One thing you might want to look for is a phone that lights up the dialer pad to a certain degree (reduces the need for a flashlight). There is one alternative. You can buy at Radio Shack a thing that emits DTMF through it. I bought a watch that did the same thing. This mean you can use any type of handset even without a dialer but hanging up will be made more difficult. You will have to disconnect the alligator clips or make a dift box. Anyways as I said before you can find more on beige boxing elsewhere. Step 2 Do a quick look over the victims house (exterior) during the day and locate his bell box (Make sure you have indeed found the bell box and not his electric meter or something). Now go back home and return at nightfall. Now move over to the box and hit it upwards (like hit the bottom of it on the edges). Now it will lift up and you will see a minimum of 2 wires (if this guy actually has a damn phone!). So you will have to fool around with the negative and positive clips on the wire but soon you will get either a dial tone or someone speaking. If someone is speaking just listen in (But if the person starts wandering where the noises of the cars are coming from hangup if you want to play it safe). If you get a dial tone continue to step 3. Step 3 Now the fun starts. If you want to be bland call up one of your LD friends(preferably in Australia or Europe) and just talk. This will give the guy a might big phone bill but with a certain degree of persuasion they will be able to get bell to drop the bill. Plus from recent news Bell has figured out a way to match numbers and shit so if you thing your own line might be under surveillance it isn't a good idea to call everyone you do on your own line. So fuck that and go onto step 4. Step 4 The best way to get there parents after them is by calling up Gay/Lesbian lines (1-800-Not-STR8 or whatever they are). Imagine there parents faces . It sure will take them a hell of persuasion. Of course you don't want to listen to this shit (Unless you are a flaming homosexual) so just keep the line open all night (if you are smart you can figure it out (and DON'T leave your handset). Step 5 Ordering features to ones phone has always been an interesting and fun thing to do. I recently got a book in the mail that showed all of the features that were offered. There are presently 10 or 11 features offered by Mother Bell and if you ordered all of them it would end up being anywhere from 30$-45$ a month (so if they are on holiday or something it will rack up). But that isn't the purpose of it since it is much easier to create a huge phone bill by starting up a conference (In Canada call the operator then ask for the tele-conference operator). The reason for this is to totally fuck them up. In general it will take a few days for Bell to set it up if that makes a difference to you. (Oh BTW don't call the operator to get services. I believe you must call Customer Service (look on your own phone bill on in the phone book for the number in your area)). After all is set up they won't be able to figure out what button does what on there phone any more. And if possible find out what features they have already (generally easy from your handset). There are many ways to use your beige box to screw people up but I figure chances are if you don't have one already you won't make one so the rest of the file is dedicated to those who don't know a thing about anything. Legal Trouble -------------------- Legal trouble is always the best way to screw your neighbourhood geek. Step 1 Go find yourself a credit card number (It isn't difficult if you leave close to a business/commercial district). If you can't figure out how to get a hold of a number read a text file on Trashing. Step 2 This is quite an awkward approach to carding but order to the guys house tonnes of stuff. Like everything the is possible to card. The more you card to his house the better. The best part about this is if the guy keeps the shit and gets nailed he can't say he didn't do it because he has the stuff in his house! And if the guy doesn't get nailed you can always steel it from him later. Step 3 Back to the beige box. Use it to call up RCMP/FBI/CIA/SCOTLAND YARD/RCMP whatever. Any legal organization. Then use your imagination. These numbers are a little harder to get a hold of but if all else fails there is always the local police. There are two things to watch for. Don't do any false calls. That will require a large amount of police/firemen. By doing this you might end up killing people who actually need it. But if you like killing innocent people go ahead. And the second thing is to make sure you get the hell out of there quickly. It would be a real pain if the cops come and you are seen on the side of the house with a phone in your hand. If you are a little horny you can always call up the operator and have a chat with her . Step 4 There is another way to get back at someone that wouldn't necessary bring them legal trouble but I suppose it could if you did it properly. What one does is order food to someone's house. I mean not a little but a lot. Like 3 pizza's from one place. Chinese from another, etc. The best way to do this is just call from a Pay Phone (Make sure that it will except incoming calls because some of the newer ones don't). Give them the Pay Phone number as call back. Now stick around for a few minutes incase they need to call back for verification (Don't stay for more the 5 minutes). Now go to your victim's house (The best person to do this to is the person across the street to your house since you can sit in the comfort of your living home to watch). This is one of the most humorous things I have done so far so if you are a little risk taker go for it. Otherwise continue to live you boring life. Scaring the shit out of people ------------------------------------------- Anyone can do a normal prank/threading call as anyone in a UPi run conference will have found out. The real trick is to scare the shit out of them. One way to do this is to connect your beige box (I think I should have dedicated this file to 101 things you can do with your beige box) to your enemy's phone line and while they are on the line just break into it and either threaten them (say you are in the house or something) or get a tape recording of some tonnes and make yourself seem like the operator and tell them you have an urgent phone call on the line. Now pass the handset to you friend and get him to act like a doctor and bullshit about there parents being killed in a car crash or something . Now of course they will believe who you say you are if you interrupt there call because 99% of the people out there don't even know they have an exterior telephone box. Ofcourse having a friend with you while doing all of this adds to the humour/excitement. However if you are a loner and need something to do on a Friday night there you go. I gave you something that will keep you busy for a few weekends. Vandalism ---------- There are many ways to vandalize someones property. But if you want to mix both vandalism with some pyrotechnics then here is something for you. I found this out by accident basically (Just felt like sticking some extra things into a bomb. Anyways included is a plan of the suggested layout for the bomb. I have found the best thing to use is a piece of PVC pipe (You can vary the length depending on the effect you want). Drill a hole the size of your fuse around the centre of the pipe). On one end stick a PVC cap and stuff some tissue paper (or newspaper which ever is easier to obtain). You only need a little bit of this and it is just to absorb a bit of the pressure and to prevent the powder from going where you don't want it to. For the powder you can use whatever you want. If you can't get ahold of anything one easy method of obtaining explosive powder is hardware stores sell shells for nail guns. There are many kinds depending on the force that one would want to drive the nail in (and depending on the material you stick it in). So if you are going use this method experiment with the burning rates,etc. The best is to stick the fastest burning near the wick if you want it to explode quickly). Anyways the problem with this method is that they are EXPENSIVE. Is you buy the ones in the shell just compress one end (the one that opens) slightly and the pry it open. This is a VERY stupid thing to do because enough friction can occur for it to ignite. So be careful if you do it. There are also ones that come in strips and have little round tablets of gunpowder. If you get this type you will have to crush them. Stick some time a fuse in a hole that you made in the centre of the tube (Atleast one inch in). Once you fill the tube up with fuel oxidizer use a pencil or something of that nature to pack it. Now fill the other end with blue chalk (This is used in chalk lines for construction and can be bought at a hardware store in 2 colours Blue and Red) If you combine the colours somehow i am sure you can do something interesting but I have yet to try 2 colours. Anyways squirt some of this powder on the other end and pack it once again. Now close this end up with some tape (Any type will be fine. Once again experiment since it will change the type of explosion you get) Here is what the finished product will look like Plastic Cap Tape 3 33 / ZDDDDDDDDBDDDDDDAADDDDDDDDDDBDDDDDDD? 3 Tissue Blue 3 3 Paper 3 Gun powder 3 Chalk 3 3 3 @DDDDDDDDADDDDDDDDDDDDDDDDDDADDDDDDDY That is it for now. If you have any comments/suggestions for this column of UPi please E-mail me on The Cathedral or through any other UPi member. Look in next's month issue of UPi for The Lighter Side. ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 4 of 19 --An introduction to the Trace Utility of the Virtual Memory Operating System-- by Opticon ...now why an "introduction" to a utility which is available on every VMS? Simply because you can use it ONLY if you have already system access.. So I assume that it won't be on every hacker's capability to do so. Of course any "intruder" can spend sometime on the System Manuals or use the on-line help but getting the manuals is really difficult for most people and, on the other hand, using help for a matter like that is not the best and most secure way to do it. Furthermore I have found A LOT of people not knowning even it's excistence. Please allow me here to copy someone elses words; " HOW TO BUILD AND USE A MAGENTA BOX. Designed and Written by Street Fighter. First of all I named this the Magenta Box because all of the fags that made boxes, whose only purpose is adding a hold button to your phone, used all of the fucking colors. I can afford a fucking piece of shit Radio Shack 2-line phone with hold. A box's purpose is to fuck with the Telco., not to add a fucking hold button to your phone. Anyway I will get on with this.... " Thank you Street Fighter ('thow i dont know u personally). Trace is an awesome utility which can really allow you to inflitrate the system you are already in (with system account) and let you hack even more cluster (...and not only) systems (ANY kind of system. And that includes UNIX or whatever you like, which are linked to your host using PSDN, ethernet, TCPIP..) The only trouble you will probably come out with, is a "clever" (...hehehe...) sysop or manager who has not "forget" the existence of "trace" and who uses it too. In that case an action of his/her's which looks like that may "raise some eyebrows" ; NETTRACE> SHOW TRACE %NETTRACE-I-CONNECTING, connecting to trace collector... Tracing on node MALATESTA on 4-AUG-1992 00:31:07 Collector Collecting to Tracepoints BAKUNIN$NETTRACE DUA3:[USERS.BAKUNIN]X25.DAT X25L3LINE. %NETTRACE-I-SHOW_DONE, SHOW command complete - press RETURN to continue NETTRACE> Warning: If you are NOT an an-archist (?! HOW STRANGE! WHY AND HOW A NON ANARCHIST READS THAT?) dont worry about the username and the nodename. But if you are (and that's what i'm expecting) and nothing comes to your mind when reading those names, then you'd better GO AND READ SOME THEORY AS SOON AS POSSIBLE! (back to our subject) He/she can even use trace for checking all the in-coming calls and see your actions...And dont forget that there are simple ways (like finger, show process /id=xxx or external programs like WATCH) for checking users processes. If u dont know already how and what to do with it, it wont be just bad luck if someone notices you phuckin' up with things you shouldnt even know about. There are three flags for Trace. 1) Trace /psi Allows you to monitor the flow of PACKETS -and thats IMPORTAND! I repeat: PACKETS,TO and OUT of your VAX's Packet Switching Interface. 2) Trace /router In that case you monitor the flow of data on your DEC router or X.25 router. 3) Trace /VOTS ...which invokes the vots trace utility. If you do not specify anything of the above u can run trace and enter commands at the NETTRACE> prompt. Now...A very good thing to start up with is this; NETTRACE>start /live/data=ascii/width=132 tracepoint (132 columns are REQUIRED if u want to see the flow of information without loosing anything) Where "tracepoint" u must put one of these, depending on what you want to monitor (taken directly from the on-line help utility); tracepoint You may specify one or more tracepoints, separated by commas. Tracepoints have the following formats: [node::]ETHERNET [node::]DDCMP.line-id [node::]NSP [node::]ROU_ETHERNET [node::]ROU_SYNC.circuit_name [node::]X25L2.dev-c-u [node::]X25L3LINE.dev-c-u [node::]X25L3CHANNEL.circuit_name [node::]X25GAP.channel X25GATEWAY.network.LC-n [node::]LLC2LINE.dev-c-u [node::]LLC2CHANNEL.channel TRANSPORT INTERNET MAC If you specify more than one tracepoint, they must all be on the same node. Note that you need not specify the tracepoint name in full. The second part of the tracepoint name may be shortened or omitted altogether. For example X25L3LINE.KMX will trace all KMX lines at level 3. The default tracepoint is X25L2, which traces all PSI lines at level 2. That may already have been what most people would like to do. I have rarely used other tracepoints than the X25L3LINE one. Continuing i give what help says about the tracepoints in specific. ETHERNET DDCMP NSP ROU_ETHERNET ROU_SYNC X25L2 X25L3LINE X25L3CHANNEL X25GAP X25GATEWAY LLC2LINE LLC2CHANNEL TRANSPORT INTERNET MAC ETHERNET This starts tracing the Ethernet line. There are no options for use with this tracepoint and only one channel can be traced. DDCMP DDCMP.line-id This starts tracing the synchronous lines on line line-id. If the line name is not specified, all currently defined lines are traced. NSP This starts tracing the NSP logical links. There are no options for use with this tracepoint. ROU_ETHERNET This starts the tracing of routing on the Ethernet circuit. There are no options for use with this tracepoint and only one channel can be traced. ROU_SYNC ROU_SYNC.circuit_name This starts the tracing of routing on the synchronous circuits. If the circuit name is not specified, all currently defined circuits are traced. X25L2 X25L2.dev-c-u This starts tracing at level 2 (Frame level) on line dev-c-u. Both level 2 and level 3 headers will be captured (but see START /CAPTURE_SIZE). X25L3LINE X25L3LINE.dev-c-u This starts tracing at level 3 (Packet Level) on line dev-c-u. X25L3CHANNEL X25L3CHANNEL.circuit_name This starts tracing at level 3 (Packet Level) on the named virtual circuit. circuit_name TRACE START tracepoint X25L3CHANNEL circuit_name The format of circuit_name depends on the type of circuit being traced. . For PVCs, circuit_name is the name of the PVC. . For outgoing SVCs, circuit_name is the NW: device unit number (for example, NWA23). . For incoming SVCs, circuit_name takes the format dev-c-u_lcn_nn, where: dev-c-u is the name of the line on which the call arrived, lcn is the logical channel number of this virtual circuit (in hexadecimal), nn is a 2-digit sequence number. X25GAP X25GAP.channel This starts tracing the Gateway Access Protocol (GAP). To trace on an Access system specify channel in the form HOSTnnn. To trace on a Multi-host machine specify channel in the form GATEWAYnnn. As with all tracepoints, the channel name can be shortened or omitted altogether. X25GATEWAY X25GATEWAY.network.LC-n This starts tracing on an X.25 Gateway. See the VAX P.S.I. Problem Solving Guide for full details. LLC2LINE LLC2LINE.dev-c-u This starts tracing at the Medium Access Control (IEEE 802.3) level for the LLC 2 (IEEE 802.2) line dev-c-u. Both the MAC and LLC 2 frame information will be captured. LLC2CHANNEL LLC2CHANNEL.channel This starts tracing at the LLC2 (IEEE 802.2) frame level. Both LLC 2 (IEEE 802.2) frame level and L3 packet level information will be captured. channel TRACE START tracepoint LLC2CHANNEL channel To trace a particular LLC 2 data-link connection, specify the corresponding DTE address as the channel name. TRANSPORT TRANSPORT This starts tracing at the OSI Transport (ISO 8073)* level. INTERNET INTERNET This starts tracing at the OSI Internet (ISO 8473)* level. *ISO Networks (just for an example and for informational purposes only) There are two parameters provided for use with an IS 8208 PSDN. (IS 8208 is the International Standards Organization's definition of the CCITT X.25 recommendations.) The two parameters are interface and interupt timer.Interface specifies if the PSI acts like a DTE, a DCE or BOTH. Interupt timer specifies how long an interupt may remain without confirmation. It is specified in seconds. If it gets no answer within this time the circuit resets. MAC MAC This starts tracing at the OSI Medium Access Control (IEEE 802.3) level. If you "start /live..." trace wont keep any records.Start /output=filename will record everything in a data file which then you can read by invoking the NETTRACE>analyze filename What WE wont to do is start a tracepoint, log-out of the system, come after sometime and analyze it. What you can see in there includes usernames, passwords, confidential information you would like to hack but never had an idea where the users has them,things you wouldn't like your mom to hear etc etc. The limitations are not many. If the system your in has a lot of users logging in from several sources or using it for a gateway, then you gonna get REALLY interresting stuff, even privileged accounts from other systems. BRILLIAND ! Isn't it?! But still pretty CONFUSING ! I will now try to explain most of the acronyms... ("most?! what do u mean MOST???") ACE - Access Control list Entry ACL - Access Control List ACP - Ancillary Control Process BCUG - Bilateral Closed User Group CPU - Central Processing Unit CSMA/CD - Carrier Sense Multiple Access with Collision Detect CUG - Closed User Group DCE - Data Circuit-terminating Equipment DCL - Digital Command Language DDCMP - Digital Data Communications Message Protocol DDN - Defense Data Network DECSA - Digital Ethernet Communications Server DLM - Data Link Mapping DNA - Digital Network Architecture DTE - Data Terminal Equipment FAL - File Access Listener FPU - Floating Point Unit FTP - File Transfer Protocol tFTP - trivial File Transfer Protocol TCP/IP - Transmition Control Protocol / Internet Protocol GAP - Gateway Access Protocol INTERNET - A collection of Networks.A subset of them is the DDN. ISO - Internation Standards Organization LAN - Local Area Network LAT - Local Area Transport LCN - Logical Channel Number LEF - Local Event Flag MOP - Maintenance Operation Protocol NCB - Network Connect Block NCP - Network Control Program NFS - Network File System NICE - Network Information and Control Exchange OPCOM - OPerator COmmunication Manager PAD - Packet Assembly/Disassembly PAK - Product Authorization Key PSDN - Packet Switching Data Network PSI - Packet Switching Interface PSIACP - Packet Switching Interface Ancillary Control Process PVC - Permenent Virtual Circuit RCF - Remote Console Facility SLD - Satelite LoaDer SVC - Switched Virtual Circuit SYSMAN - SYStem MANagement utility UAF - User Authorization File UETP - User Environment Test Package UFD - User File Directory UIC - User Identification Code USAAF - United States of America Air Force VMS - Virtual Memory System 'nough! More things you can do with trace include; o ANALYZE (a datafile) o ATTACH (to a process) o BACK (retypes the last screen of ANALYZED -and only- data) o CLEAR (clears the screen.Also as ctrl-L) o DEFINE (define/key keyname string) o DELETE (delete/key keyname) o EXIT (...obvious...Also as ctrl-Z) o NEXT (next screen of analyzed data) o REFRESH (refresh screen .Also as ctrl-W) o SHOW (many things...try "show key /all" , "show tracepoint" etc) o SPAWN (to a proccess) o START o STOP (stop a tracepoint ie NETTRACE>stop bakunin$nettrace) These are the default keys; NETTRACE> sh key/all Key Name Description DEFAULT Key CTRLL = "CLEAR" DEFAULT Key CTRLW = "REFRESH" DEFAULT Key PF1 = "" (state="GOLD") DEFAULT Key PF2 = "HELP KEYPAD DEFAULT" DEFAULT Key PF3 = "SHOW KEY/ALL" DEFAULT Key PF4 = "SHOW TRACE" DEFAULT Key KP0 = "NEXT" DEFAULT Key KP2 = "START " DEFAULT Key KP3 = "STOP" DEFAULT Key KP4 = "ANALYZE /DATA=ASCI/NOSELE/NODISP/NOTRUN" DEFAULT Key KP6 = "ANALYZE /DISP=ALL/WIDTH=132" DEFAULT Key KP7 = "ANALYZE/DATA=ASCII" DEFAULT Key KP8 = "ANALYZE/DATA=HEXADECIMAL" DEFAULT Key KP9 = "ANALYZE/DATA=OCTAL" DEFAULT Key MINUS = "ANALYZE/DATA=DECIMAL" DEFAULT Key COMMA = "ANALYZE /TRUNCATE" DEFAULT Key PERIOD = "BACK" DEFAULT Key HELP = "HELP" DEFAULT Key E5 = "BACK" DEFAULT Key E6 = "NEXT" GOLD Key PF4 = "SHOW TRACE/FULL" GOLD Key KP0 = "ANALYZE/SCROLL" GOLD Key KP2 = "START/LIVE " GOLD Key KP6 = "ANALYZE /NODISP" GOLD Key COMMA = "ANALYZE /NOTRUNCATE" GOLD Key E6 = "ANALYZE/SCROLL" The following is an example of what you should see in a live tracing or analyzing. -----------+----+-----+<--------Packet-------->+---------...---- ( 80 columns ) Time |Evnt|Data |Chn Q Type P P |Data hh mm ss cc| |Size | M R/S R/S | -----------+----+-----+<---------------------->+---------...---- ( 80 columns ) Sigh! And this the end! Flames to: o All the lamers worldwide who call themselves blue boxers only because their dad is rich enough to buy them a phucking sound card and claim that they dont make a Digital to Analog converter because "the quality is not as good" o To all the "anarchists" who dont seem to KNOW (they never read books) that anarchy is AGAINST racesism, the powerfull and the rich, the laws, the states and generally against ANY kind of exploitation. o And a last flame to digital underground dudes who "would like to find some time and write a book with their adventures" to increase their popularity and make some money. Respect & Greetings to: LOD/H, Dr Dissector, Black Flag, AiT, USi, CNT, iWA, FAi, iFA and all the anonymous (and not only) an-archists and phreaks out there. Thanks to: Laser_Brain, Basil Chesyr, Bayernpower, Direct, CHaOS, D'yer Mak'er, Tea_Cups, Machine, SaNDman, Gogol, Hackerberry Finn, to the sysops and all the friends on Pegasus BBS and to all those people who helped me on my way... BREAK DOWN THE WALL ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 5 of 19 Summer Thrashing Volume 1 ______________________________ Author : Silicon Phreaker This File is a Property of UPi ______________________________ Ok. This took me a long time to write because of the fact that I have tried everything in this file, and that I got into a fight (relating to a stunt described below) and got my wrist metal plated & screwed down. So take all this as a sequel to my other files. Remember: If you get arrested, decked, buttfucked in jail, I'm not responsible for anything. I wasn't there when you did it. So, on let's carry on with the file, and remember : You only live once, and we're not coming back ! PARTY !!!! ______________________________ Party Kick Start ______________________________ Ok... You arrived... If the party is Semi-Formal, you're probably dressed up like a pogo... Tie, Vests and shit like that... And mostly everybody looks like you... Time to fix that up a bit... You may shoot people off with your paintgun, which would get you into trouble... If it's an outside party, get a few friends to make a Drive-By shooting, with paintguns. Spike the punch with the vodka... Put it in a Plastic Bad, drop the bag in the punch bowl, and pierce it with a fork... The vodka will slowly disolve in the punch, makin' it stronger as it get sipped away. The party has already started to be more liveable ? Cool... Peoples are drunk like shit ? Lot Cooler that way... They puke ? MARVELOUS!! Here comes the time for the use of the firecrackers... Locate a big green spill of puke, jam a firecracker in it, light it off and run... Move on to the most occupied place of the house... The bathroom... Steal some ketchup envelopes, and fold them in two, place them carefully under the toilet lid... As soon as someone sits on it to have a dump, he'll get ketchup splashing in his pants. Put some mineral water on the seats... Will show up like the dude has pissed in his pants... Fill a dead rat with black powder, put a firecracker in his mouth, put it on the buffet table, and light it... One "Rat Flambe" on the way... Ok... Now you're pissed... Fine... Get a camera and hide it somewhere in the bedroom, from where you can see the bed pretty good. I bet you can see what I want you to do right ? Next time that two dweebs will want to fuck in the room, you will be able to look at it on tape afterwhile. You might want to send a tape to the PO's parent. For them to see what their bedroom was used for. Fire Up the swimming pool... Use some gas, drop it very carefully in the pool and light it up... Guaranteed pleasure... Make sure that someone is in the pool at the moment you do it... Hang the cat, dog or whatever animals which will be found inside the house. Steal the stereo system... Spill ketchup off everybody that's smaller then you... The party should be a total waste by now... So go to the owner and thank him for the radical night you had... Say you hope he invites you to his next party... And then, paintball him... ______________________________ Outside Tricks ______________________________ Now that you can thrash any party, let's move on to heavier shit. Your beloved neighborhood. Or someone else's ... - Car Bashing You want to get at someone ? Does he have a car ? Yes ? GOOD ! What better way to let him know you hate him then bash his car ? Raping his girl is cool too but a bit out of it. So lets stick to killing the car. Use a jack and lift the car off ground. Put cement block underneath it to hold it, and take the bolt off his tire, then steal them. You can even make some spending money by selling them if they're magnesium wheel. (BTW : Looking for (4) Dodge Caravan WHITE mag. Paying 400$ CDN for them.) Take a screwdriver and make a tiny hole in his gas tank, then, put a piece of Silly-Putty in the hole. Gas will eat it's way through the putty and he'll choke up on the highway. Ram a broomstick up the exhaust pipe. If it jams, use a hammer. Get inside the car, and open the hood. Now the real fun begins. You can steal the battery, or can do some cool stuff as : - Invert the flasher's so that Left = Right and Right = Left. Guaranteed accident. - Connect the High Intensity Beams to the horn. Nice Effects on a country road. - Shortcut the battery, and GET THE HELL OUTTA' THERE. - Put chewing gum in the fuel injectors. - Put some ethylic alcohol in the radiator. - Put some indian ink in the windshield washer tank. - Connect wipers to horn. - Disconnect wipers, and bypass the windshield washer pump's wire to be on permanently. - Mix sparkplugs wire within each other. On Some car, it'll completely de- phase it. Inside the car you can pull some nice tricks too. - Replace the dome light with a flashing light ($1.99 / RadioShack) and arrange it so it's always on. Real pain in the butt. - Arrange the radio so the volume is ALWAYS to the max level. And screw the bass so it's only going to pour tweeters in his poor motherfucking ears. - Pour some REALLY stinking substance in the A/C and Heater outputs. hopefully he'll be splashed with it when he turns it on, and it's gonna smell for ages in his car. - Smoke a bud in his car, and hide some marijuana in the glove compartment. When he'll get arrested for his car plate, he's in deep trouble. ____________________________________________________________________________ Ok, well. That is about it for this time. I wrote this for the deadline, and it's the best that I could think of. Anyway. It's better then some of my old article, which was a tad bit outdated. Have fun, party, smoke pot and don't get caught. ____________________________________________________________________________ ____ / /\ \ ( /--\ )NARCHY INC. IF IT GOT A PUSSY, WE'LL FUCK IT ! X____X ` ' ____________________________________________________________________________ ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 6 of 19 ZDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD? 3 3 [[3 3 [[3 Pyrotechnica 3 [[3 3 [[3 _ _ 3 [[3 Pyrotechnics (pi'ro tek 'niks), n. 1. The art of 3 [[3 making, or the manufacture and use of, fireworks 3 [[3 for display, military signaling, etc. 3 [[3 3 [[3 Disclaimer: This material is presented solely for 3 [[3 informative purposes, under protection of the first 3 [[3 amendment to the Constitution of the United States of 3 [[3 America. The actual use, construction or possession 3 [[3 of the articles described herein and/or the actual 3 [[3 implementation of the information contained herein or 3 [[3 techniques described herein may be in violation of 3 [[3 federal, state and/or local law! Furthermore, any 3 [[3 attempt to use the information herein may be 3 [[3 extremely dangerous and liable to result in serious 3 [[3 and/or permanent bodily injury or DEATH, even if the 3 [[3 instructions are followed exactly! The publisher 3 [[3 and any succeeding vendor(s) or distributors hereby 3 [[3 disclaim any responsibility for any harm resulting 3 [[3 from any such use of the information contained herein 3 [[@DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDY [[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ _______________________________________________________ (C) 1992 All Rights Reserved Written and Produced by Fireball & Genghis Khan. This file is a division of Genghis Khan Presents Unlimited (r). =-=-=-=-=-=-=-=-=-= W O R L D R E C O R D S =-=-=-=-=-=-=-=-=-=-=-= Fireworks: The largest firework ever produced was Universe I exploded for the Lake Toya Festival, Hokkaido, Japan on August 28, 1983. The 928-lb shell was 42.5 inches in diameter and burst to a diameter of 2,830 ft, with a 5-color display. Worst Accidents & Disasters In The World: Fireworks: More than 800 people died at Dauphine's wedding, Seine, Paris, May 16, 1770. Greatest Explosion: The greatest explosion (possibly since Santorini in the Aegean Sea c. 1470 BC) occurred c. 10:00 a.m. (local time), or 3:00 am G.M.T., on August 27, 1883 with an eruption of Krakatoa, an island (then 18 sq mi) in the Sunda Strait between Sumatra and Java, in Indonesia. A total of 163 villages were wiped out, and 36,380 people killed by the wave it caused. Rocks were thrown 34 miles high, and dust fell 10 days later at a distance of 3,313 miles. The explosion was recorded 4 hours later on the island of Rodrigues, 2,968 miles away, as "the roar of heavy guns" and was heard over 1/13th part of the surface of the globe. This explosion has been estimated to have had about 26 times the power of the greatest H-bomb test detonation, but was still only a fifth of the size of the Santorini cataclysm. Largest "Conventional" Explosion: The largest use of conventional explosive was for the demolition of the fortifications and U-Boat pens at Heligoland on April 18, 1947. A net charge of 4,253 tons was detonated by Commissioned Gunner E.C. Jellis of the Royal Navy team headed by Lt F.T. Woosnam aboard HMS Lasso lying 9 miles out to sea. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= In order to write a text file that will deal with pyrotechnics, it is first necessary to make distinctions between certain words. While a firework can be considered an explosive, in this file we will separate the two words. When the term explosive is used, it is referring to any substance which can decompose suddenly and produce large amounts of gaseous products and thermal energy (heat). While in retrospect, a firework will be known as any device containing explosives and other combustible material that, when ignited, produce light or loud noise. When the term incendiary is used it is referring to both explosives and fireworks. To produce an incendiary device, it is necessary to take proper precautions. The incendiary will not be much fun if you lose your limbs preparing it. Therefore, I am including a vast safety section. Do not skip this section, as it could very well save your life. This text file has been created by Genghis Khan. However, Fireball has given much information, and credit should be given equally to both parties. Fireball will soon be in the underground... On another note, this text file is the result of knowledge obtained from periodicals, books, and other reference material. There is a bibliography at the end. The material that is following is not plagiarized. All credit is given in full at the conclusion of this file. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= A Note To Government Employees The material in this text file is currently available through microfiche, magazines, chemistry books, and other reference material. The information in this file is not illegal, and is not intended for use. It is intended to further other people's knowledge of chemistry and the history of incendiaries. Under no means do I encourage the use or attempted use of any of the substances listed. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Table Of Contents Page DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Disclaimer 1 World Records 1-2 Purpose 2 A Note To Government Employees 2 Safety 3-4 Characteristics of Explosives 4-5 Home Production Method for Black Powder 5-7 Home Production Method for Nitroglycerine 8-9 Nitrocellulose/Smokeless Powder 9 Shell Fillers 9-10 Thermite 10 Nitric Acid 10-11 Sulfuric Acid 11-12 Where To Get Chemicals And Laboratory Supplies 12-14 Major Firework Companies In The United States 14-15 Bibliography 15 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Safety DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD The most important part of pyrotechnics and explosives is safety. The safety procedures for all explosives are nothing more than common sense and reasoning. Yes, smokeless powder is stable, but if you put it in the oven, it will explode. That may sound stupid, but a 14-year- old in Ohio did it and killed himself. Plastique is a very stable explosive compound, but it needs to be softened before use. Some guy in New Jersey softened his plastique with a hammer, and he is no more. TNT can be burned and it will not explode (most of the time) where gunpowder will ignite with the smallest spark. Moral: Each explosive has it's own characteristics. Make sure that you know of all the properties before the incendiary is produced. Read the following and take it into consideration. Explosives are intended to cause damage to something. Whether it be in a war zone, destroying bridges, and enemy fortifications, or in common everyday use, in mining, ditch digging, and more. Remember this when you are making it. If the explosive can destroy a bridge or enemy fortifications, you better believe it will destroy you. Always be paranoid. Being paranoid is only going to save you. If you think everything over and watch your back, everything will be fine. However, if you decide that no one cares about what you are doing, and that you know it all, you will either hurt yourself or someone else, or get busted. Keep away all sources of ignition. This means no cigarettes, no electricity, or other things that may be capable of igniting a fuse or mixture. By saying no electricity, I am talking about stray voltage or static electricity. That doesn't mean shut off your power. Generally, electricity is not a problem... so don't worry about it too much. Use common sense. It is a proven fact that men who are alert, who think out a situation, and who take correct precautions have fewer accidents than the careless and indifferent. It is important that work be planned and that instructions be followed to the letter; all work should be done in a neat and orderly manner. In the manufacture of incendiaries, equipment must be kept clean and such energy concentrations as sparks, friction, impact, hot objects, flame, chemical reactions, and excessive pressure should be avoided. Don't be erratic. Do not use or create explosives or pyrotechnics while drunk, falling asleep, angry, or any other strange mood that may hinder your ability to think. Try to make all explosives outside in a secluded area. Never, I repeat, NEVER try to make explosives in your house, unless it is somewhere where no one goes, or no ones cares about. Sometimes a garage may work well, but in the case that something would go off, your oxygen could be depleted quickly depending on what you are making. Try to find a place on your property, or in a wooded area that is near a residential area (in case of an emergency) but out of the sight of nosy neighbors, pigs, and other curious people. If you are making explosives in a wooded area, don't be an idiot and burn the forest down. Always have an idea how you will put something out if it happens to go off. Water is not always the best fire extinguisher. On a hot explosion or fire, the water will vaporize leaving oxygen and hydrogen, which will only add to the fire's wrath. Wet sand or a fire blanket will work, but if possible, use a carbon dioxide fire extinguisher. Know first aid. If something goes off in your hands, be prepared to treat it quickly. You can buy burn creams and other medical supplies for treating burns and abrasions. Use extra care when packing an explosive with shrapnel. Locate a unique and secure place for storing chemicals and explosives. You will want to choose a place close enough for you to watch, but not close enough, or important enough of place, to be a hazard. Take extra precaution in securing the area so that if someone was around they could not tamper with anything. Do not store blasting caps, electrical caps, detonators, or primers in the same containers with any other form of high or low explosives. If one thing goes off, you will be looking at a chain-reaction. Do not store fuses or fuse lighters in a wet or damp place, or near the storage of flammables such as oil, gasoline, cleaning solvents or paints. Fuses should also be kept away from radiators, steam pipes, stoves, or any other source of heat, because the very nature of non-electrical fuses is such that any one of these things could start a large fire. Metals should be kept absolutely away from explosives, meaning that metal tools should not be stored in the same container with explosives. These metals will kill if the explosives would go off. Spontaneous combustion is a real problem when storing explosives. For this reason, do not allow leaves, grasses, brush, or any debris to collect or accumulate around the explosives storage area. Certain types of explosives require certain types of storage, including temperature regulation and other controls. Be sure that you understand all aspects of the compound's nature before handling or storing it. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Characteristics of Explosives DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Most explosives are nitrogen compounds which may be set off by: 1. ignition; 2. slight shock; and 3: severe shock. Explosives are either solid or liquid, either mixtures or single compounds, and act by explosive chemical reaction, liberating at high speed, heat and gas, which causes tremendous pressure. According to speed of reaction they are classed as: 1. Low explosives, Propellant explosives or Propellants (as gunpowder, flash powder, and smokeless powders) 2. High explosives or Disruptives (as dynamite, amatol, picric acid, tetryl, and TNT). Permissible or Permitted explosives are those passed by public authority for use under prescribed conditions, especially those permitted for blasting in mines (sometimes called safety explosives). The chief classes of explosives are: (1) Mixtures of combustible but nonexplosive material with an oxidizing agent, especially a nitrate, a chlorate, or a perchlorate (ordinary gunpowder, blasting powder, etc.). (2) Organic nitrates, as nitroglycerine or guncotton; also, mixtures containing these, as dynamite. The smokeless powders contain cellulose nitrate as the sole or chief ingredient. (3) Nitro substitution products or mixtures containing these, as TNT and lyddite. (4) Fulminating powders, as mercury fulminate and lead azide, used as detonators. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Low Explosives - Low explosives generally fit into class one or two of the above table. They are commonly used as propellants in fireworks (such as bottle rockets). If detonated in the air it will simply burn or deflagrate. In order for any low explosive to have the ability to produce a blast wave (or shock wave in water) it is necessary to contain the explosive. This containment can be as simple as a cardboard container (such as firecrackers), to metal pipes (as pipe bombs). The stronger the container which holds the explosive, the larger the blast wave should be. In addition, say for instance, you create a pipe bomb with one quarter of the pipe filled with gunpowder. It will take a short period of time before this pipe fills with enough gas for it to explode. Generally low explosives are "fun" to play with, but, if used correctly, can be as powerful as some high explosives. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= High Explosives - High explosives fit into categories 2, 3, and 4 in the above table. Some high explosives can be detonated with a fuse, but it is more reliable to use a blasting cap. A blasting cap is simply a small explosive that is detonated to start the larger explosive on it's way. These generally contain mercury fulminate. If high explosives are to be used in a container, such as a pipe, use extreme caution. The explosion will be tremendous. Overall, if high explosives are to be used, make them in small quantities. Follow directions EXACTLY when making high explosives, and whatever you do, do not take short cuts. Even if you don't get hurt from an explosive, many are powerful enough to seriously hurt your hearing. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Black Powder aka Gunpowder - Low Explosive - Deflagrating - Class I DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD One of the oldest pyrotechnic compositions, black powder, serves as both the propellant and explosive charge in modern firework shells. The Chinese developed black powder (the original gunpowder) more than 1,000 years ago for use in crude missiles and firecrackers. Awareness of black powdered traveled west during the Middle Ages. The English monk Roger Bacon disclosed a formula for the explosive mixture in 1242 as part of his defense against accusations of witchcraft. He considered it such a dangerous material that he wrote about it in code. As the formula became more widely known, black powder revolutionized quarrying and construction. Weapons such as muskets and cannons, developed during the 14th century, exploited black powder as a propellant. The basic formula for black powder has persisted essentially unchanged throughout the centuries: an intimate blend of potassium nitrate (commonly known as saltpeter), charcoal and sulfur in a 75:13:12 ratio by WEIGHT. It may in fact be the only chemical product that is produced today using the same ingredients, the same proportions and the same manufacturing process as were used in the time of Columbus. This constancy reflects the fact that black powder is a nearly ideal pyrotechnic substance. It consists of abundant, inexpensive chemicals that are relatively nontoxic and environmentally safe. The mixture is so stable that it can be stored for decades without deteriorating, if kept dry. Black powder is easily ignited by means of a moderate jolt of energy, such as a spark or a small burning fuse. The ideal black powder burns very quickly. You may find that black powder in the 75:13:12 ratio may burn rather slowly. If this is the case, simply add more sulfur. Record the amounts of sulfur you put in, and continue to experiment with different amounts of sulfur until you have created your own perfect blend. The sulfur burns very hot and acts as sort of a catalyst. Because of it's extreme high temperature it makes the rest of the mixture burn much faster. While black powder is nice and dandy, it is more a firework. In order for it to have "explosive" power it must be in a container. Under pressure black powder can be very destructive. If put into a pipe and sealed it will explode with tremendous force. A CO2 cartridge works fine as well. The equation for black powder is: 2KNO + 3C + S -> K S + 3CO + N 3 2 2 2 202 + 36 + 32 = 270 202/270 = 75% KNO3; 36/270 = 13% C; 32/270 = 12% S Black powder can be made by simply adding the potassium nitrate, sulfur, and charcoal together, or by the process described below. Either works equally well. Improvised Black Powder Black powder can be prepared in a simple, safe manner. It may be used as blasting or gun powder Material Required: DDDDDDDDDDDDDDDDD Potassium nitrate, granulated, 3 cups (3/4 liter) Wood charcoal, powdered, 2 cups (1/2 liter) Sulfur, powdered, 1/2 cup (1/8 liter) Alcohol, 5 pints (2-1/2 liters) (rubbing alcohol, etc.) Water, 3 cups (3/4 liter) Heat source 2 Buckets - each 2 gallon (7-1/2 liters) capacity, at least one of which is heat resistant (metal, ceramic, etc.) Flat window screening, at least 1 foot (30 cm) square Large wooden stick Cloth, at least 2 feet (60 cm) square Procedure DDDDDDDDD 1. Place alcohol in one of the buckets. 2. Place potassium nitrate, charcoal, and sulfur in the heat resistant bucket. Add 1 cup water and mix thoroughly with wooden stick until all ingredients are dissolved. 3. Add remaining water (2 cups) to mixture. Place bucket on heat source and stir until small bubbles begin to form. VDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD7 : CAUTION: Do not boil mixture. Be sure ALL mixture stays : : wet. If any is dry, as on sides of pan, it may ignite. : SDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD= 4. Remove bucket from heat and pour mixture into alcohol while stirring vigorously. ________ / \ 3 3 3 ________ 3 3/********\3 3|********|3 3 \*******|3 \D\*****// // MixtureDDDDDDDD|****| // _|****|__ //-Wooden Stick / \**/ // 3\_________/3 3 ____ 3 3 / \ 3 3 \ / 3 3 /____\ 3 3 \_ __/ 3 \___3_____/ 3 3 \Alcohol 5. Let alcohol mixture stand about 5 minutes. Strain mixture through cloth to obtain black powder. Discard liquid. Wrap cloth around black powder and squeeze to remove all excess water. 6. Place screening over dry bucket. Place workable amount of damp powder on screen and granulate by rubbing solid through screen. VDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD7 :NOTE: If granulated particles appear to stick together and: : change shape, recombine entire batch of powder and repeat: : steps 5 and 6. : SDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD= 7. Spread granulated black powder on flat dry surface so that layer about 1/2 inch (1-1/4 cm) is formed. Allow to dry. Use radiator, or direct sunlight. This should be dried as soon as possible, preferably in one hour. The longer the drying period, the less effective the black powder. VDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD7 :CAUTION: Remove from heat AS SOON AS granules are dry.: : Black powder is now ready for use. : SDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD= =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Nitroglycerine - Dynamite - High Explosive - Detonating - Class 2 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Nitroglycerin (also nitroglycerine) is made by treating glycerol (glycerin) with a mixture of nitric and sulfuric acids. It is a dense, oily liquid that is extremely sensitive to shock. The slightest jarring may be sufficient to cause it to decompose with enormous force. Dynamite is a solid mixture made by absorbing nitroglycerin in wood flour mixed with sodium nitrate. The dynamite is usually encased in cardboard cylinders to form "sticks." In this way the hazardous property of nitroglycerin is lessened, while its usefulness is retained. The chemical equation for making nitroglycerin is: C H (OH) + 3HNO -> C H (NO ) + 3H O 3 5 3 3 3 5 3 3 2 At this point a measure of sulfuric acid is added which absorbs the water and makes the reaction go much quicker. This is more fully explained in the section about sulfuric acid. Nitroglycerine has a specific gravity at 15 degrees Celsius of 1.5931. Nitroglycerine is such an effective explosive because of the positive oxygen balance during detonation. This means that more than enough oxygen molecules are available to oxidize the carbon and hydrogen while the nitrogen is being liberated. Also because of the high nitrogen concentration. (18.5%) One pound of nitroglycerine produces 156.7 cubic feet of gas. The blast wave moves at 7700 meters/second. Nitroglycerine is extremely sensitive to shock and rapid heating; it begins to decompose between 50-60 degrees Celsius, becomes volatile at 120 degrees C and explodes at 218 degrees Celsius. A serious problem in the use of nitroglycerine as an explosive is its relatively high freezing temperature (13.2 degrees Celsius, 56 degrees F) A major problem with the manufacture of nitroglycerine is that the nitration produces a good deal of heat, and if the mixture is not kept cool, the temperature of the nitroglycerine could rise to extreme instability. Nitroglycerine, to be somewhat safe, should not go above 10 degrees C or 50 degrees F. Nitroglycerine is a VERY TREACHEROUS explosive. I highly recommend against making it. If you do decide to make it you do not value your life very much. If you make it make it in SMALL AMOUNTS! I recommend a blast shield of some sort. Be cautious on what you use. If the nitroglycerine is powerful enough it will make the blast shield into a sort of shrapnel. Materials Needed: 50 mL Kimax Beaker High School Chemistry Labs Small Pipette or Eye Dropper High School Chemistry Labs Glass Rod High School Chemistry Labs Celsius Thermometer High School Chemistry Labs Lab Supply Company Kitchen? (for making candy) Bowl (Must be larger than Mother's Kitchen the beaker) Ice Freezer Water Faucet 98%+ Sulfuric Acid High School Chemistry Labs Chemical Supply Houses Car Batteries 68%+ Nitric Acid High School Chemistry Labs Chemical Supply Houses Art Class (used to oxidize pewter) Fill the bowl with ice and COLD water. Put the beaker in the water. Make sure the beaker doesn't float around. You may have to hold the beaker. Put the thermometer in the ice water and read the temperature. Make sure it is well under 25 degrees Celsius. If it is not, then continue to add more ice until it is between 10-25 degrees. Wipe off the thermometer. ALL PROPORTIONS ARE FOR 100% PURITY 1. Put 3 parts Sulfuric Acid in beaker. 2. Add 1 part Nitric Acid. 3. With the pipette drop 1 drop of glycerin into the beaker. (ADD ONLY 1 DROP! See 3a below) 4. GENTLY stir the solution with the glass rod. 5. While stirring, insert the thermometer in the solution. Read the temperature. If the temperature is 50 degrees or more than the nitroglycerine is unstable and could detonate at any time. If the temperature is 40 degrees and is starting to rise, dump the solution in the water. Watch the temperature closely and if it gets to 30-35 degrees Celsius start adding ice. 6. Continue to stir for about 2 minutes or until you feel the glycerin has been exposed to most of the nitric acid. The longer you wait the better. If you don't give it enough time, and continue to add glycerin the mixture will become volatile and could detonate at any moment. 7. After you feel the first drop has had enough time, add another. Keep your eye on the temperature and be ready to dump the solution if temperatures become hazardous. 8. Once you have made enough nitroglycerine to please you, use it soon. DO NOT STORE IT! If you want to store it for a short period of time, then add sodium nitrate to it. About 2 parts sodium nitrate to 1 part nitroglycerine. Under no means should you store the finished nitroglycerine in your house, or anywhere for that matter. If circumstances were to occur which would inform the police or bomb squad that you have nitroglycerine in your house, the nitroglycerine could be detonated inside your house, along with an area wide evacuation. Don't fuck up your life... \ ZDDDDDDDDDDDDDDDDDDDThermometer \ \ ZDDDDDDDDDDDDDDDBeaker With Nitroglycerin Z Z \ ? ? 3OoOoOoO3////3oOoOoOo3 3oOoOoOo3////3OoOoOoO3 3OoOoOoO@DDDDYoOoOoOo3DDDDDBowl With Ice And Water @DDDDDDDDDDDDDDDDDDDDY Nitroglycerin is not something to play with. Many other explosives can be made that are more stable and can be just as exciting. You may not feel cautious now, but wait till you are the one who has to stir. Buahahahahahahahah =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Nitrocellulose/Smokeless Powder - Low Explosive - Deflagrating - Class I DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Smokeless powder, or Nitrocellulose, is made by treating cellulose with nitric and sulfuric acids. It differs from Nitrocellulose plastics in that the cellulose is more thoroughly nitrated. It is a low explosive and must be confined when detonated. When smokeless powder burns, the colorless products, carbon dioxide, carbon monoxide, water vapor, and nitrogen, are formed. Hence the name "smokeless" powder. I have never made nitrocellulose. However, the reaction should be quite similar to that of nitroglycerin. The sulfuric acid, H2SO4, is used to absorb the water vapor formed, which would dilute the reactants and slow the reaction. The nitric acid, HNO3, nitrates the cellulose, (C6H10O5)n. So if you are to try to make smokeless powder, read the section on nitroglycerin and instead of using glycerin, use cellulose. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Shell Fillers - Detonators - High Explosives - Class 4 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD The explosive used inside an artillery shell must be able to stand the shock of the propellant which starts it on its course. It must also be capable of exploding with great force when it reaches its target. Explosives of this type, requiring severe shock to set them off, are called shell-fillers. Trinitrotoluene (try-ny-troh-tol-you-een), usually abbreviated TNT, is the most commonly used shell filler for military purposes. Picric acid is also used as a shell filler. Detonators are extremely sensitive explosives which are set off by shock and which decompose with almost incredible rapidity. They are used in small amounts in cartridges and shells to start the main explosion. Mercury fulminate is a well-known detonator. It is a very treacherous explosive that may be set off by heat, friction, or shock. Lead azide is a detonator that is used in car airbags. Upon impact, this detonator decomposes rapidly and gives off an immense amount of gas. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Thermite - Class I DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD A mixture of coarsely powdered aluminum and iron oxide will react if it is raised to a high enough temperature to start the chemical change. A tremendous amount of heat is set free when the reaction occurs. Such a reaction between aluminum and the oxide of a less active metal is called the Thermite Reaction. 390 kilocalories of heat are set free during the formation of one mole of aluminum oxide. The heat of formation of ferric oxide is 191 kilocalories. When the Thermite reaction occurs, an amount of heat equal to the difference between these values is set free for each mole of aluminum oxide formed. The equation is: 2 Al + Fe O -> Al O + 2Fe + 199 Kilocalories 2 3 2 3 The liberation of such a large amount of heat so suddenly produces a very high temperature. The temperature of the Thermite reaction is estimated at 3500 degrees C. Reactions of this type are sometimes called aluminothermy or aluminothermics. ZDDDDDDDDDDDDD Magnesium Ribbon 3 3 | | Y | | | | | \ ^o^^o^^o / | |--------\ ^^o^o^ /--------| | \ ^o^/ | | \/ | | | o=Aluminum |____ ____| ^=Iron Oxide /| / \ |\ /____/ \____\ Thermite may be purchased commercially from the Frey Scientific Company with 1992-93 prices at 1 lb. - $9.75; 5 lb. - $31.50. The igniting mixture to start the Thermite reaction (instead of using a magnesium ribbon) is 8 oz. - $10.00. It is sold by the name Thermite in the catalog. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Nitric Acid DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Nitric Acid - HNO3 Molecular Weight - 63.01 Density - 1.5027 Melting Point - -42 degrees Celsius Boiling Point - 83 degrees Celsius Solubility, in grams per 100 cc Cold Water Hot Water Other Solvents Infinity Infinity Decomposes violently in alcohol; soluble in ether Pure HNO3 is a colorless liquid, about 1.5 times as dense as water. It fumes in moist air and boils at 83 degrees Celsius. The 100% HNO3 is unstable, and for that reason, the concentrated nitric acid of commerce is a 68% solution (42 degrees Baume') of HNO3 in water. Such a solution boils at 120 degrees Celsius. A more dilute solution boils at a lower temperature, losing water and becoming more concentrated. Chemical Properties of Nitric Acid 1. Stability. Nitric acid is not very stable. When boiled, or even when exposed to sunlight, it decomposes to some extent. Water and nitrogen dioxide, NO2, are two products of its decomposition. The deep yellow color of laboratory bottles of nitric acid is caused by small amounts of dissolved nitrogen dioxide which are formed when the acid is exposed to light. In water solution the acid is more stable. Fuming red nitric acid, a very corrosive liquid, has a red color due to considerable amounts of dissolved nitrogen dioxide. It fumes in moist air and burns the skin painfully. 2. Acid properties. When dilute, nitric acid has the usual properties of acids. It reacts with metals and the oxides of metals. It reacts with hydroxides, forming salts known as nitrates. Nitric acid stains the skin yellow, forming xanthoproteic (zan- thoh-proh-tee-ick) acid. It produces the same effect with any protein, and for that reason is used as a test for proteins. A drop of nitric acid added to a slice of hard-boiled egg white will show the test perfectly. The color deepens to a bright-orange when ammonia- water solution is added. Nitric acid may be prepared in the laboratory by the action of sulfuric acid on sodium nitrate. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Sulfuric Acid DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Sulfuric Acid - H2SO4 Molecular Weight - 98.08 Density - 1.841 Melting Point - 10.36 degrees Celsuis Boiling Point - 338 degrees Celsius Solubility, in grams per 100 cc Cold Water Hot Water Other Solvents Infinity; Infinity Decomposes in Alcohol Evolves heat Concentrated sulfuric acid is a dense, oily liquid which is sometimes called oil of vitriol. The concentrated acid, which contains about 2% water, has a specific gravity of about 1.84 and a boiling point of 338 degrees Celsuis. Pure sulfuric acid is colorless, but commercial acid may have a yellow color, or it may be brown or almost black because of the presence of impurities, especially organic matter. When sulfuric acid is added to water (you must never add water to sulfuric acid) a great deal of heat is evolved because of the formation of the hydrates H2SO4 . H2O and H2SO4 . 2H2O. Sulfuric Acid's dehydrating properties The strong affinity of sulfuric acid for water makes it an excellent dehydrating agent. Gases may be dried by bubbling them through concentrated sulfuric acid. Lumps of pumice stone soaked in sulfuric acid may be used in the lower part of a desiccator. In fact, sulfuric acid is such an active dehydrating agent that it will take hydrogen and oxygen, in the proportion needed to form water, from such substances as sugar, C12H22O11, or cellulose, (C6H10O5)n, leaving the carbon uncombined. C12H22O11 + 11 H2SO4 -> 12 C + 11 H2SO4 . H2O In the same manner, concentrated sulfuric acid chars wood, paper, cotton, starch, and other organic compounds. In making some products commercially, water is formed as a by- product. Let us illustrate this with the reaction for making nitroglycerine, C3H5(NO3)3 C3H5(OH3) + 3 HNO3 -> C3H5(NO3)3 + 3 H2O In the manufacture of this explosive, concentrated nitric acid is used. Since the nitric acid is reacting with a non-electrolyte, the reaction is slow. To prevent dilution of the acid, which cause the reaction to proceed more slowly, sulfuric acid is always mixed with the nitric acid. The sulfuric acid acts as a dehydrating agent. It absorbs the water as fast as it is formed and greatly speeds the rate of the reaction. This same principle takes place in nitrocellulose or smokeless powder. Dilute sulfuric acid may be obtained from some car batteries. Due to sulfuric acids high boiling point, it can be boiled to concentration without the use of a retort or other glassware. The boiling point will continue to drop the more dilute the acid is, until reaching 0% sulfuric acid, 100 degrees Celsuis, and retrospectively, 640.4 degrees F (338 degrees C) with 100% purity. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Where to get chemicals and laboratory supplies DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD The information I have just gave you is useless without a source to obtain the chemicals from. Here are just a few. Check your local library for more, and believe me, there are MORE! Frey Scientific 905 Hickory Lane, P.O. Box 81o1 Mansfield, Ohio 44905 8oo.225.FREY Specializes in Low, Low prices to schools. You must be a school to order from them. GFS Chemicals P.O. Box 23214 Columbus, Ohio 43223 8oo.858.9682; 614.881.55o1 Specializes in high quality reagent grade chemicals. Leading producer of Perchlorate chemicals in the country. GFS has a reputation for the quality of their goods, but they are quite expensive. Generally, for the pyrotechnic device, you do not need reagent quality chemicals. However, GFS sells some of those...hard to find chemicals like Cyanuric Acid, C3H3N3O3, (2,4,6-Trihydroxy-1,3,5-triazine), a convenient lab source for Hydrogen Cyanide gas, HCN. Look around in your library for chemical supply houses. Ones that pop into my head are Fisher Scientific, Nasco, and a load of others. Compare prices. And buy from the cheapest. Perhaps the best source for chemicals is from a local company. Look in your business white pages under chemicals and see if there is anything there. Then look in the yellow pages for chemicals. In big cities there are generally a few supply houses. From here on, I am going to tell a story of Fireball and my adventures with Pyrotechnica. I have a friend who has a Masters degree in Biology and a Bachelors degree in Chemistry. If you have any friends who are scientists, ask them where to get chemicals. Tell them you are doing a science experiment or that you are in a band or have been asked by a band to do stage effects. My friend directed me to a local chemical supply company, that he said would have all the chemicals I would need. I was really happy. So I called up this place, and told them a few chemicals that I needed. The man replied that he really didn't have any chemicals, and that mainly he sells pH indicators and other materials for industrial uses. Well, I knew that my friend wouldn't lie to me, so I told Fireball and we went down to the place. The signs were weathered, and it was someplace you wouldn't leave you door unlocked. There was a computer printout above the door that said the company's name. We finally found our way to it, and it was one room, about 20' by 50' and junked up immensely. We almost turned around and left. But we decided to check it out anyways. Once inside we told the old man that we needed chemicals and he immediately remembered the phone call and said that he didn't have any chemicals. Yeah right. I think it was more like he didn't think he had many chemicals, but he had to have AT LEAST 150 different chemicals and a bunch of assorted glassware and other products. There were 2.5kg bottles of potassium nitrate, KNO3, which he said he didn't have. Powdered zinc, about 300 mesh, which we bought for $12.00. Powdered iron, which we bought for $1.50. Potassium nitrate, technical grade, 95%, $1.50 a pound. We bought all he had...2 lbs. Potassium Permanganate, KMnO4, we bought a little bit, but it was expensive. We also bought 500g of Lampblack carbon (charcoal). 500 g of it is a lot! And it was only $1.50. We also purchased a flask, a beaker, a graduated cylinder, some filter paper, an alcohol burner, and some other things I can't remember. We also got our first bottle of nitric acid there, 42 degrees Baume, 68% concentration. Moral: Don't judge a book by it's cover. I wrote this text file in PFS: Professional Write. I only have 640k memory installed, and this is about as long as I can make one text file. So, look for my future text files. I'll be going straight from this one to a new one, with a complete analysis of Ammonia Tri-iodide, NH3NI3, physical constants of many pyrotechnics substances, a bit about the BATF, and other law enforcement agencies, purification of KNO3, formulae for colors, Mercuric Fulminate, and much, much more. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Major Firework Companies In The United States DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD American Pyrotechnics Association Chestertown, MD. 8o1.778.6825 Atlas Enterprises, Fort Worth, Texas. 817.237.3371 Fireworks by Grucci, Brookhaven, NY 516.286.oo88; 8oo.227.oo88 Performance Pyrotechnics Associates St. Louis, Missouri, 314.285.1500 Pyro Spectaculars, Rialto, CA. 714.874.1644 8oo.322.7732 Southern International Fireworks, Woodstock, GA. 8oo.327.1771 Vitale Fireworks Display Company, New Castle, Pennsylvania 412.654.9841; 8oo.245.o359 Zambelli Internationale Fireworks Manufacturing Company New Castle, Pennsylvania; 412.658.6611; 8oo.245.o397 Phantom Fireworks: Chicago/Indiana - 219-947-1984 3820 East Lincoln Highway (Route 30) Merrillville, Indiana, 40410 (Go wander) Take I-65 to Route 30 (East Lincoln Highway). Follow Route 30 East 1 1/2 miles. Showroom is on the left (North) hand side. Chicago - 20 miles; Milwaukee 110 miles Louisville - 812.285.o633 Located next to River Falls Mall 1421 Cedar Street Clarksville, Indiana Take I-65 to exit 4, at exit light make right (west) on to US 131. Go 2 blocks just past Bob Evans Restaurant. Make right onto Cedar Street. The showroom is 150 yards on the left hand side. Columbus, Indiana - 65 miles; Evansville, Indiana - 130 miles; Frankfort, Kentucky - 54 miles ; Indianapolis - 100 miles; Louisville, Kentucky - 4 miles; Lexington - 86 miles Cincinnati, Ohio - 812.537.4oo5 1400 US Highway 50 East Lawrenceburg, Indiana Take I-275 to Exit 16. Make a right onto Route 50 and go 100 yards and turn right into driveway. Go to the second building in driveway. Be sure to look for Phantom signs as they are not associated with the first building in driveway. Cincinnati - 20 miles ; Columbus, OH - 125 miles Covington, KY - 22 miles; Hamilton, OH - 28 miles Lexington, KY - 87 miles Ohio/West Virginia/Kentucky - 614.867.2222 Route 217 Scottown, Ohio 45678 Just across the Ohio River from Huntington, West Virginia. Travel route 775 North to Star Route 217 to the Ohio River ShowRoom. Charleston, WV - 85 miles; Huntington, WV - 20 miles; Parkersburg, WV - 130 miles =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Bibliography DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Modern Chemistry. (c) 1958. Henry Holt and Company, Incorporated. CRC Handbook of Chemistry and Physics. 55th Edition. 1975-76. Printed by the Chemical Rubber Company (CRC) NIOSH Pocket guide to Chemical Hazards. September 1985 Printed by U.S. Department of Health and Human Services Public Health Service, Centers for Disease Control, National Institue for Occupations Safety and Health. Scientific American Magazine. July 1990 Websters New International Dictionary - Second Edition Copyright 1934, G. & C. Merriam Co. The Anarchist's Cookbook. (c) 1971 - William Powell Improvised Munitions Handbook - U.S. Government Various Other Publications. Fireball's Psychotic Mind. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= THE END =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 7 of 19 Network User Addresses Information Numbers Note: This file was previously released in the NuKE InfoJournals: As it is my creation, I reserve the right to continue updating and releasing this file. v7.5 OD's ONLY @DDDDDDDDDY Baud ACN Rate OD Number CDDD4 CDDDD4 CDDDDDDDDDDDD4 201 2400 311020100022 202 2400 311020200117 203 2400 311020300120 206 2400 311020600021 212 2400 311021200412 213 2400 311021300023 214 2400 311021400022 215 2400 311021500022 216 2400 311021600120 217 2400 311031400020 301 2400 311020200117 303 2400 311030300021 305 2400 311030500112 312 2400 311031200024 313 2400 311031300024 314 2400 311031400020 403 ALL 302040300901 404 2400 311040400022 408 2400 311040800110 414 2400 311041400120 415 2400 311041500023 415 2400 311041500011 415 2400 311041500108 416 2400 302041600900 503 2400 311050300120 514 ALL 302051400903 602 2400 311060200026 612 2400 311061200022 617 2400 311061700026 703 2400 311020200117 713 2400 311071300024 714 2400 311071400124 714 2400 311071400121 714 2400 311071400024 718 2400 311021200412 801 2400 311080100012 813 2400 311081300124 815 2400 311031200024 817 300 311021400117 816 2400 311081600113 818 2400 311081800021 913 2400 311081600113 916 2400 311091600012 919 2400 311091900124 Global Out-Dial CDDDDDDDDDDDDDDD4 31106170002602 (Quite Busy) PAD CDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD4 311020100141: Switzerland, PW: PAD Chat and Game Systems @DDDDDDDDDDDDDDDDDDDDDY System Name NUA CDDDDDDDDDDDDDDDDDDDDDDDDDDDDD4 CDDDDDDDDDDDDDDDD4 SamNet1: Samantha 22222950098 SamNet2: Samantha ][ 302085700900 SamNet3: Giorgia 22228010133 SamNet4: Guilietta 22224510172 SamNet5: Unknown 22225190087 Lutzifer 26245400080177 Arthemys/ArtBrain 22226700381 Edicom's Vienna Chat-Board 23226181139 QSD/LOAD 208057040540 ItaPac: Xware Software Systems 22222950213 The Multi-User Island Adventure 23422020010700 Pegasus 228475212574 Node Lina 22222800173 Kanome: Japan 440881807401 Adonis: Russia 2502040600 Other Systems @DDDDDDDDDDDDDY System Name NUA CDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD4 CDDDDDDDDDDDDDDD4 Villa BBS: IceLand 274011991000 Teletex & Computers: Hamburg 26245400050570 MCOMM Internationnal BBS 208076020367 AusPac 505273720000 Auspac RMIT User Access Code 236023008 L.A. Times InfoLine 310600584410 BBB BBS: Norway 2422450134 Gandalf: PW= NRC 302085701427 CBCNet 22222600183 CoiNet 102030066 UniNet 655011101207 PrimeNet: PW= Login 30291600122 VicNet 50523602300 USSR Nat. Centre for Data Xchange 2502030300 I thank all those who helped me in compiling this list, and would like everyone who is willing to contribute to this list, to feel free to do so. I can be reached on my own system, The Nuclear Development Corporation, or on any reputable H/P system across North America Greets To: Matrix (207) Mechanix (514) The Lost Avenger (416) White Knight and PoT (604) DarkMan Productions, June 1992 ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 8 of 19 The Hacker's Code Of Ethics... By The DarkMan As one of the people on an Alliance once said, " We (the hackers) may be considered unethical to some people, but as a small and growing community, we have our own code of ethics." When he pointed this out, which I may say was greeted with much enthusiasm on the Alliance, I got the idea of releasing this file on exactly that: The Hacker's Code Of Ethics. We live in the age of computers. Everything is controlled by massive mainframes; Our water distribution system, rail-road control, airline control, electricity control, telephone companies, etc, etc, etc... Imagine the fun someone can have in one of those systems!!! Just the fact of getting in them can sometimes be a major accomplishment. But my point is, what people do once they are in... The one thing I hate, is the way some self-appointed hackers find there way into a system, and ruin the name of the rest of us by destroying everything they can find. Now that is pathetic. First of all, as I said, it ruins the name of the rest of us. The word "Hacker" has forever been tarnished because of those people. All you have to do is mention "Hacker!" to the computer manager of a company, and he'll keel over in an epileptic fit! Let me tell you what my fun is. This idea I got from my good friend Matrix, in the 207 NPA. What I do, is get in the system first of all... That's when the fun starts... I take care of all the security features, hiding my passage, and then leave the SysAdmin a little message, something like this: " Dear System Administrator. I find that the security of your system is somewhat neglected, which could bring a serious downfall of your data should one of my more destructive "brothers" find there way here. You should change or emphasize the importance of security in your office. I will call back in exactly one week to check out the changes. Signed, The Happy Hacker :) " I've pulled this trick off a few times, and it worked... But of course, by then, I had alreay created a few superuser accounts, so I had no trouble getting back in... I would just like to see the face ONCE of a system administrator that reads that message!!! My next point, is the attitude some hackers have towards each other. We are of a dying race. There are not many of us left that actually know what we are doing and most importantly why we do what we do. The importance of sticking together and protecting one another should not even be brought up. We should know it. But no... There will always be some asshole considering himself a hacker that will pull another hacker's CN/A... The one thing a hacker cherishes beyond all is his need for privacy... If one of us does not what to be hassled, bothered or otherwise harassed, it is his own right! We do not have the right nor is it to our advantage to betray that right. It will only aggravate that person, and make him aggressive towards the rest of us... Also, some hackers have this massive ego problem... I must name one here, for that problem, and he is Corporal Punishment... I have had numerous run-ins with this guy. He seems to think he is a God, constantly running everyone into the ground. He even went as far as saying "PHRACK sucks!" But he isn't the only one with that problem... Some feel that if they put others down, they will elevate to a higher level. Sorry to burst you bubble guys, but your only viewed as massive ego-maniacs that deserve nothing less than being run down yourselves... One other thing some "hackers" have loads of fun with, is pulling other hackers CBI Information, and posting it public. Now that is one of the most pathetic attempts at getting even I have ever seen. And what's worse, if the hacker in question is a minor, then the person wanting to pull the CBI will try and get the PARENTS credit info! The parents, who have absolutly nothing to do with this, will either: Turn in they're own child ( which has happened in many cases ), take away the entire computer set-up, or try a kamikaze attack on the whole computer underground ( if they're really frustrated ). The last thing I will mention, will be hackers turning in other hackers to federal crime agencies, or to the PhoneCorp security offices, or any other type of company that deals with computer related phraud. This activity, refered to as Narcing, is getting to be to popular for a hackers good... You may be saying, " Come on, no hacker in they're right mind would turn another on in ". And your right... It's once again those self proclaimed hackers, or the ones who think they are who will do this to get "Even"... Listen to this... Those who are familiar with the current events in our community will have heard of this little story. This 15 year old "hacker" uses Leech Z-modem every where he goes, then get's caught, and then leaves that BBS never to call back again. This other "hacker" who unfortunatly for him, used to be a respected person in the H/P community, decides to get even in an affair that never did concern him. He pulls the 15 year olds parent's CBI information, and posts it public. The 15 year old gets pissed off, so calls Patricia Sisson, of SprintNet security, whom the CBI puller had already had problems with. Thus, a Narc attack... Well, fortunatly for him, the CBI puller managed to lie and worm and wiggle himself out of trouble once more, but lost all the respect he had accumulated because of the CBI pulling... Like I said, I named not anyone, but people who keep in contact with the news know who it is... And one more thing I'd like to clear up... I'm sure some of you people have had trouble logging into some local wares boards, or something like that, because of the fact that your a hacker... The thing that goes through that SysOp's mind, is that your comming here to crash his system. Thus, once again, the "Destructive Computer User" Stereotype... A board crasher is no more a "hacker" than my grandmother is. We, of a dying comumunity, have an obligation towards those who follow in our footsteps. We must show them how a hacker acts, how a hacker goes about his activities, what a hacker is supposed to be! We must not try to kill each other off by reporting each other to the law, or by destroying our private life. We must stick together in times when doing what we do becomes difficult... We must also prove to the media, who seem to have the idea that all computer owners are hackers, and that hackers are all teenage under-achievers, that a hacker is much more, so very much more than they're stereotyped hacker is...And to those who think to themselves " But why do you hack? " I say, " Why in the hell are you reading this? " I believe I have said enough. If anyone wishes to comment on this file, or otherwise wants to get in contact with me, can reach me on my system, The Nuclear Development Corporation, or on any other reputable H/P system across North America. DarkMan Productions, June 1992 ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 9 of 19 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= = = = Build An Emergency Telephone Dialer = = = = By The Lost Avenger/UPi = = = =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Ok guys I saw this article in Popular Electronics in September 1992 originally published by Anthony J Caristi. This looks like a neat little circuit that relates to electronics and telephones. So I decided to type it up for the magazine. Well here it is, enjoy it and if you have any questions on it please e-mail me either on The Cathedral or on my Internet E-Mail address. Oh yeah by the way this article is re-published without permission. (Like I would really get waste my time to get permission anyways.) Safeguard you home or office with a security system that calls when there is a problem. Imagine having an electronic device that would guard your home or office while you're away, and automatically alert you by phone if there is a break-in or some other problem requiring your immediate attention. Well, imagine no longer; for Teleguard, which we'll show you how to build, will do just that. Teleguard accomplishes that task by monitoring an open-loop or closed-loop sensor switch located in the protected area. When the sensor detects a problem - such as a break-in, fire, heating-system failure, flood, etc. - Teleguard dials whatever telephone number has been programmed into its memory. When the phone is taken off hook, Teleguard emits an unusual tone to alert the party on the receiving end that something is amiss. The circuit is not hampered by busy signals when a call is placed; it automatically redials the number again and again (about once a minute) until it get through. In addition, Teleguard can also automatically dial a number in the event of a medical emergency; for instance, where a mobility-impaired person is unable to dial the telephone. That can be accomplished by adding a "panic" switch to the circuit. Programming the telephone number to be called is quick and easy, and the pre-programmed telephone number remains in the circuit's memory as long as it is connected to the telephone line. In spite of its ability to retain its programming, the number to be called can easily be changed whenever desired. Another feature of Teleguard is that it does not require an internal power supply; but instead derives its operating power directly from the telephone line. And the circuit, although telephone-line powered, won't interfere with normal telephone use, so it can be left activated at all times. Imagine the secure feeling you will have with Teleguard at you service! About The Circuit A schematic diagram of the Teleguard circuit is shown. At the heart of the circuit is an MC145412 pulse/tone repertory dialer (U5), which has a built-in, last-number-redial function. Integrated circuit U5, which generates dual-tone multi-frequency (DTMF) signals, is controlled by a common 3 x 4 matrix-type keypad. When ever a telephone number is keyed in, U5 retains that number in memory as long as power is uninterrupted. The circuit is connected to the telephone line through a fullwave-bridge rectifier, composed of D1-D4, making the circuit insensitive to telephone-line polarity. The output of the bridge rectifier is applied to R7, D5, and C3, which form a network that supplies power to the rest of the circuit as well as providing a memory-retention voltage to U5, ensuring that it will retain the programmed telephone number. That voltage is also used to maintain the logic levels of U2, U3, and U4 when the circuit is in the standby mode. Sensor switch SEN1 is an open-loop sensor switch that is used to monitor the protected area. The sensor switch is selected to suit your application. When the circuit is in the standby mode (has not been triggered), the output of U2-d is low. That low travels along two paths. In one path, that low is applied to U1 (a 555 oscillator/timer) at pin 4, keeping it off, and to pin 1 of U4-a. The output of U4-a is applied to pin 12 of U5. In the other path, the low output of U2-d is inverted by U2-b and applied to pin 15 of U3 (a 4017 decade counter/divider with decoded outputs), causing U3's 0 output at pin 3 to go high. Because there is nothing connected to that output, it has no affect on the circuit. When SEN1 is closed (by an intruder entering a protected area, for example), pins 12 and 13 of U2-d are pulled low, forcing its output to go high, enabling U1, while pin 12 of U5 goes low, placing U5 in the off-hook condition. At the same time, the output of U2-c is driven high. That high is applied to Q2, causing it to conduct. With Q2 conducting, Q1 is forward biased, causing it to conduct too. That causes LED1 to light, providing a visual indication that Teleguard has seized the telephone line. As U1 oscillates, U3 begins to count upward, and continues to count (repeating its 0-9 count) as long as SEN1 remains closed. The logic levels generated by U1 at pin 3 and U3 pins 4 and 7 pass through U4 (a-d), producing two output pulse trains; the on-hook/off-hook pulse train that is applied to pin 12 of U5, followed by a redial pulse train that is applied pin 2. The redial pulse occurs about a second after U5 goes off hook, to allow time for the telephone network to respond to Teleguard's connection and establish a dial tone. When pin 4 of U4-b goes high, Q3 and Q4 are forward biased, pulling pins 2 and 16 of U5 low. That's the redial logic required for U5 to output its stored telephone number. The circuit then remains dormant until the next on-hook/off-hook pulse is applied to pin 12 of U5. The cycle repeats (dialing the stored number) about once a minute. During the time between dialing, the called party has time to answer the telephone. Whether or not the call is answered, Teleguard will continue to redial the number about once a minute as long as SEN1 remains closed. That ensures that the call will eventually get through should the called number be busy, or if no one is immediately available to answer the call. Integrated circuit U6 (another 555 oscillator/timer), configured as an astable multivibrator operating at about 1 kHz is active only when Teleguard has made connection to the telephone line. The output of U6 is capacitively coupled to the phone line, alerting the called party that Teleguard has made its emergency call. Switch S1 is used to initialize the circuit with the preprogrammed emergency telephone number. When S1 is placed in the setup position, pin 12 of U5 is pulled low. That forces U5 to go off hook, and activates Q1 to seize the telephone line. The desired telephone number (including a "1" and area code if necessary) is then manually entered via the keypad. After entering the number, S1 is set to the arm position to deactivate the circuit while retaining the preprogrammed telephone number. Construction The majority of Teleguard was assembled on a printed circuit board, measuring 2 by 4 7/16 inches, with the remainder of the circuit (the keypad and two switches) connected to the circuit board through lengths of insulated wire. Once you've gathered the parts listed in the Parts List and prepared your circuit board, construction can begin. When assembling the circuit, it is recommended that sockets be provided for all of IC's. Begin assembling the circuit by installing sockets where IC's are indicated. Do not install any IC's until instructed to do so. Once the sockets are in place, install the jumper connections. Be careful during this operation; one misconnected jumper can render your circuit inoperative. After that, install the passive components (resistors, capacitors, etc.) followed by the active components (transistors and diodes), making sure that all polarized components (diodes, transistors, and electrolytic capacitors) are properly oriented. If a polarized component is installed backwards, the circuit will be inoperative and could possibly self-destruct, taking several other components along with it. Once all of the on-board components have been installed, connect a length of quad telephone line cord to the circuit board. For the line cord, you can use either a commercially available modular plug-to-plug telephone cord, or make your own. If you make your own you'll have to connect a modular plug to one end of the cord. If the commercial unit is used, cut it in half and strip the insulation from the free end of one piece. Then carefully tin the red and green wires of the cord and solder them to the points indicated. Next connect the keypad - a standard telephone 3-by-4 matrix type - to the board. The keypad can be salvaged from one of the many low-cost telephones that are available, or it can be purchased from one of the mail-order houses. In any event, the keypad has 4 row connections (identified as R1, R2, R3, and R4) and 3 column terminals (identified as C1, C2, and C3). Simply connect the row and column terminals of the keypad to like terminals on the circuit board; C1 to C1, R1 to R1, and so on. After connecting that task, check the wiring very carefully, especially between the keypad the circuit board. An error in wiring the keypad to the circuit will cause misdialed numbers! While you are at it, inspect the circuit carefully for the proper placement of all parts, cold solder joints (which appear as dull blobs of solder), and shorted or opened circuits. It is far easier to correct a problem at this stage of the game than to attempt to locate and correct a problem later. The circuit can be housed in any enclosure of suitable size. The keypad, S1, and LED1 should be mounted to the side of the enclosure for easy accessibility. Prepare the enclosure to accept the off-board components, but do not mount the circuit in its enclosure yet. You must first fins out if the circuit is functioning properly. Test Setup The operation of the circuit can be tested by connecting Teleguard to telephone line, or using a well-filtered 40 to 50-volt DC power supply to simulate the power that would otherwise be devired from the telephone line. The power supply is simply connected to your Teleguard with a 1k, 2-watt resistor connected in series with the positive output of the DC supply. The positive output of the power supply (with its series resistor) is then connected to the L1 terminal of the Teleguard circuit board. The negative power supply output is then connected to the L2 terminal. If the telephone line is used for test purposes, a resistor is unnecessary, and polarity is not important; simply connect the projects modular plug to the telephone line. A digital voltimeter or VOM with an input impedance at of least 10 megaohms with be needed to measure voltage levels within the circuit. A telephone and modular duplex adapter - which allows both Teleguard and the telephone to be plugged into the telephone line simultaneously - are also required for testing. The adapter allows the telephone to be used to verify that U5 generates a DTMF signal in response to each number keyed via Teleguard's keypad. At this point, all IC sockets should be empty; if not, remove all IC's from the board. Set S1 to the arm position and connect the project to the DC supply or telephone line. The LED should be unlit. Allow a minute or so for C3 to charge, then measure the voltage across that unit. You should get a reading of about 5 to 6-volts DC. If your reading is somewhere out in left field find and correct the problem before proceeding. If the voltage is within specifications, disconnect power and discharge 3. Then inset all IC's into their respective sockets. being very careful to properly orient and seat them in their sockets. Set S1 to the arm position. Apply power to the circuit, again allowing a minute or so for C3 to charge. Set S1 to the setup position; LED1 should light. Do not proceed with the final test if LED does not light when S1 is placed in the setup position. Continue the checkout by double-checking the orientation of LED1, Q1, Q2, D6, D7, and C5. Measure the voltage across C3, making sure that the voltage across it is at least 5-volts. Set S1 to arm position for a minute or so. Flip S1 to the setup position and press each key of the keypad (one at a time) while examining the waveforms generated at pin 18 of U5 using an oscilloscope. Each time a key is depressed, a DTMF signal (about 1 volt peak-to-peak) should be generated. Next test Teleguard's programmability and operation under program control. Program the circuit by momentarily setting S1 to the arm position, and then return it to setup. Key in any telephone number using the keypad. Then set S1 to the arm position, simulate a problem situation by shorting pins 12 and 13 of U2 to ground. Maintain the short while monitoring the oscilloscope. A few seconds after pins 12 and 13 are grounded, a series of DTMF bursts should appear at pin 18 of U5 in rapid succession. Allow the circuit to remain dormant for about a minute. The series of DTMF bursts should reappear. The cycle should repeat about once a minute as long as pins 12 and 13 of u2-d remain grounded. If Teleguard preforms as described, proceed to the final phase of testing; otherwise troubleshoot the circuit to locate and repair the fault. If U5 fails to generate DTMF signals in response to the keypad entry, carefully check the wiring between U5 and the keypad. Closure of any keypad switch must short one row to one column wire in accordance with the keypad matrix. If in doubt, disconnect power to the circuit, remove U5 from its socket, and use an ohmmeter to verify that each keypad button shorts the correct terminals of U5. If the keypad has been properly connected, verify that U5's crystal oscillator is functioning properly by holding down any key while examining the waveform at pins 8 and 9 of U5. You should get a 2 or 3-volt peak-to-peak, 3.58-MHz waveform only when a keypad key is depressed. If no oscillation is present, verify the presence of 5-volts at pin 1 (the supply input) of U5. Try a new IC and crystal if possible. Final Test Temporarily remove U6 from its socket to disable the 1-kHz oscillator. Using the duplex adapter, connect both Teleguard and a telephone to the telephone line. Leave the handset on hook, set S1 to arm, and allow a minute for C3 to charge. The LED should be unlit. Set S1 to setup; LED1 should light, indicating connection to the telephone line. Pick up the telephone handset and listen as you key in a number via the project's keypad; DTMF tones should be heard in the handset in response to the keystrokes. Place the telephone handset on hook, momentarily place S1 in the arm position, and then switch it back to setup. Then, with the telephone handset on hook, key in (via the Teleguard keypad) any key telephone number. If possible key in the telephone number of an associate who can then verify that the circuit is operating properly. Once Teleguard has dialed out, you can then use the telephone to engage in normal conversation. If that checks out, remove power from the circuit and reinstall U6 in its socket. Apply power to the circuit and reprogram Teleguard, as before, by switching S1 from arm to setup, keying in the desired telephone number, and then switching back to arm. The automatic redial function can be checked by shorting pins 12 and 13 of U2-d to ground to simulate an emergency condition. After a few seconds, the programmed number will be dialed. That can be verified by listening to the earpiece of the telephone handset. If an associate answers the call, he or she should hear the 1-kHz tone. If no DTMF signal is generated by the circuit, review the troubleshooting procedure to locate and repair the fault. If the automatic-redial feature is not functioning, carefully check U1 to U4, Q3, Q4, and their associated components. if the 1-kHz is absent, check U6 and its associated components. Using Teleguard Teleguard may be connected to any available telephone jack. A pair of wires must be run from the circuit to the sensor(s) at the protected door, window, etc. If you will be using the circuit to detect fire, flooding, or other emergencies, use appropriate sensors in your sensor loop. For normally open sensor loops, multiple sensors can be connected in parallel and tied to the circuit to allow detection of a breach at any number of entry points. If normally closed sensor switches are used, multiple sensors can be series connected to the circuit through an inverter to monitor several different areas. It is important that no part of the sensor loop be allowed to make contact with ground though pipes, electrical appliances, etc. The sensor-loop ground is derived from Teleguard's circuit board, so use insulated wire to connect the sensor loop to the board. A phone is not required for use with Teleguard. The circuit can be left connected to the telephone, without having any adverse affects on the normal operation of the phone system. Note that anytime the unit is disconnected from the line, the number programmed into U5 will be lost. Programming Teleguard With the sensor loop in the safe or dormant condition - normally open sensor switches open or normally closed sensor switched closed - and connected to the circuit, set S1 to the arm position and connect Teleguard to the telephone line. Allow about 1 minute charging time. Place S1 to the setup position. The LED should light, indicating connection to the telephone company central office. Key in the desired telephone number (including a 1 and area code if necessary). After keying the number, immediately set S1 to the arm position. The LED should go out. This completes the setup procedure and among of the circuit. To change the telephone number at any time, simply repeat the programming sequence. If a sensor is triggered after the circuit is armed, Teleguard will immediately go off-hook and call the programmed number. It will continue to do so, about once a minute, until the protective circuit is restored. When the call is answered, the 1-kHz tone will be heard in the handset at the receiving end, alerting the called party to a problem condition at the protected area. Of course, be sure to alert others who may pick up the phone about the special tone should Teleguard call. Schematic Diagram Sorry guys I tried to reproduce this schematic diagram as well as I possibly could. I had to split the schematic diagram into two parts as I couldn't fit it within the 80 column limit. So if you have any questions about this schematic or the article please e-mail me either on Internet or my The Cathedral. ZDDDDDDDoDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDoDDDDDDDDDDDDDDDDD> 3 3 3 3 3 3 ZDD> R2 100K 3 3 3 3 3 3 3 3 13 143 ZDDDDDDDDDDDDDDDDDDDDDEDDDDDDDDDDDDDDEDD> oDDDBDDDADD?11 3 ZDDDDDDoDDDD? 3 ZDDDDDDDDDDDDEDD> 3 123 U2-d oDDDDDDoDDo 3 3 3 3 3 3 Off ZDDDDoDDDADDDBDDY 3 34 63 R2 100K 3 3 3 3 o o On 3 73 CD4001B 3 ZADDDDDDDA?3 3 3 3 3 1 3 SEN1 C1 10 3 1/4 3 3 CDDDDDEDDDDEDEDoDDBDDDDDD? 3 o 3 3 3 3 U1 37 3 3 3 3 23 U2-a oDDoDD> @DDDDoDDDDDDDY 3 3 LM555CN CDDDDDo 3 3 @DDADDDDDDY 3 3 3 3 3 3 3 Cd4001B Ground 3 3 CD? R3 10K 3 3 1/4 3 @BDDDDDDDBY 3 3 3 3 3 31 2@DDoDDDY 3 3 ZDDDDDDDDDDDDD? 3 3 3 3 3 3 3 3 3 C2 47 3 3 3 3 3 3 3 3 3 3 3 3 oDDDDDDDDDDY 3 3 3 D1DDDDoDDDDD2 3 3 3 3 CD4001B 3 3 3 3Ground 3 3 5 1/4 3 3 3 @DDDDDDDDDDDDDDDDDDDDDDEDEDoDDBDDDDDD? 3 3 3 3 3 3 63 U2-b oDDDDD> 3 ZDDDDo oDDDDoDDDDD? ZDDDDDDDEDY @DDADDDDDDY 3 3 3 3 3 3 3 3 3 Ground 3 3 3 R7 1Meg 3 @DoDDDDDDoDDDDoDDDDD> 3 3 3 3 3 3 D7 3 34 63 3 D3DDDDoDDDDD4 3 oDDDDDDDDDDDoD1N4004DDo ZDADDDDAD?8 3 3 3 3 3 3 ZD4 C6 CDDD> 3 3 3 3 C3 300 3 333 LM55CN CDDD> 3 3 3 3 D5 3 3 3 @DBDDDDBDY7 o L1 o L2 3 @D1N52348DDDoDDD? 3 C6 31 32 To Telephone 3 6.2V 3 3 .1 3 @DDDDD> Line 3 Ground 3 3 3 oDDDDDDDDDDDDDDDDDDDDDDDDDDDEDDo 3 D1 to D4 = 1N4004 3 3 3 CDDDDDDDDDD> R8 3 3 Ground 220Ohms 3 @DDDDDDDDDDDDDD> 3 3 ZDDDDDDDDDoDDDDQ1 2N5401DDDDDDDDLED1DDoDDDDDDD? 3 3 3 3 D6 R9 D9 C5 2200 1N4758A 1.5K 1N52318 3 56V 3 5.1V 3 3 3 3 3 Ground 3 @DDDDDDDoDDDDD? 3 Ground @D? 8 Q2 10ZDDDDDDBDD? BS170DDR10 100KDDDo U2-c 39 3 3 @DDDDDDADDoDDDDDDD> Ground >DDDDDoDDDDDDDDDDDDDDDDDDDDDDDoDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD? 3 12 3 3 >DDDDDEDDDDDBDDDDDD?11 2 314 U4-a to U4-D = 4011B 1/4 3 3 133 U4-d oDDDDDBDDDDAD?3 3 3 ZDADDDDDDY 13 U4Da oDDDDDDDDDDD? 3 >DDDDDEDDDEDDDDDDDDDDDDDDADDDDDDY R11 3 >DDDDDEDDDEDDDDDDDBDDDDDD?10 ZDDBDDDDDD?4 10K 3 3 3 93 U4Dc oDDD4 53 U4Db oD? 3 ZDDDDDDDDDDDDDDDDo 163 43 7ZDDDADDDDDDY @DDADDDBDDY 3 3 3 3 ZADDDADDDA? 8 6 37 3 3 3 3 143 U3 3 Ground 3 3 3 ZDDD8 1N4004DDo >DDDD4 CD40178 3 ZDDDDDDDDDDDDDDDDDDDDY 3 3 3 3 @BDDDBDDDBY ZDEDDDDDDDDDDDDDDDDDDDDDDDo 3 3 3 153 133 83 3 3 3 3 oDDR6 100OhmsDY 3 oDDDY 3 oDR4 470KDDDQ3 BS170D? 3 3 3 3 3 3 3 3 3 3 3 3 3 Ground 3 3 Ground 3 3 3 3 3 ZDDDDDDY 3 3 3 3 oDDDDDDDDDD? 3 3 R5 3 3 3 3 3 3 3 470K 32 31231 318 3 3 3 3 ZADDADDADDAD? 3 3 3 @DQ4 BS170DBDDDD? 3 310 3 3 3 3 3 3 U5 CDDD? 3 3 3 Matrix Ground 3 3 MC145412P 36 3 3 >DDDDDY 3 Keypad 3 3 CDDDo 3 3 ZDDDDDDDDDDD? 3 163R1 3 3 3 R12 3 3 1 2 3 CDDDDDDDoDDD4 3 Ground 3 >DD47KDD? 3 3 3 153R2 3 3 3 3 3 4 5 6 CDDDDDDDDDDD4 3 3 3 3 3 3 143R3 3 3 >DDDDDDDo 3 3 7 8 9 CDDDDDDDDDDD4 3 3 >DDD? 3 3 3 3 133R4 3 3 3 R13 3 3 * 0 # CDDDDDDDDDDD4 3 3 3 22K 3 @DDBDDBDDBDDY 3 3 3 >DDDoDDDY 3 3 3 3 3 3 3 3 3 3 3 3 53C3 3 3 C7 .01 3 3 3 @DDDDDDDDDDDDDD4 3 3 >DDDY 3 3 3 43C2 3 3 3 3 @DDDDDDDDDDDDDDDDD4 3 3 >DDDDDDD? 3 3 33C1 3 3 3 3 @DDDDDDDDDDDDDDDDDDDD4 3 3 3 3 @BDDDDDDDDDBY 3 3 3 38 39 3 3 3 @DDXTAL1DDY 3 3 3 3.579MHz 3 3 3 3 @DDEDDDDDDDDDDDDDDDDDDDDDC4 10DDDDDDDDDDDDDDDDDDDDDDDY 3 3 Arm 3 o 3 S1 >DDDDDDDDDDoDDDDDDDDo oDDD? Setup Ground Parts List For The Teleguard Semiconductors U1, U6 LM555CN CMOS oscillator/time, integrated circuit U2 CD4001B quad 2-input NOR gate, integrated circuit U3 CD4017BE decade counter/divider, integrated circuit U4 CD4011B quad 2-input NAND gate, integrated circuit U5 MC145412P pulse/tone reportory dialer, integrated circuit U7 CD4001B or CD4011B quad 2-input NAND gate (optional see text), integrated circuit Q1 2N5401 PNP silicon transitor Q2-Q4 BS170 or equivalent enhancement FET D1-D4, D7, D8 1N4004 1-amp, 400-PIV (or similar) silicon rectifier diode D5 1N5234B 6.2-volt, 0.5-watt Zener diode D6 1N4758A 56-volt, 1-watt Zener diode D9 1N5231B 5.1 volt, 0.5-watt, Zener diode LED1 2-volt, 20-mA, red Light-emitting diode Resistors (All resistors are 1/4-watt, 5% units unless otherwise noted.) R1, R2, R10 100,000-ohm R3, R11 10,000-ohm R4, R5 470,000-ohm R6 100-ohm R7 1-megaohm R8 220-ohm R9 1500-ohm R12 47,000-ohm R13 22,000-ohm R14 1,000-ohm, 2 watt (used in testing only) R15 2.2-megaohms (optional, see text) Capacitors C1 10-fF, 10-WVDC, electrolytic C2 47-fF, 10-WVDC, electrolytic C3 330-fF, 10-WVDC, low-leakage electrolytic C4 10-fF, 50-WVDC, electrolytic C5 2200-fF, 6.3-WVDC, electrolytic C6 0.1-fF, ceramic-disc C7 0.01-fF, ceramic-disc C8 0.1-fF, ceramic-disc (optional, see text) Additional Parts and Materials S1 SPST toggle or slide switch SEN1 Normally open or normally closed sensor switch (see text) SEN2-SEN5 Sensor switch (optional, see text) XTAL1 3.578-MHz, color-burst crystal Printed circuit materials, enclosure, telephone-type 3 x 4 matrix keypad (see text), telephone line cord with modular plug, IC sockets, wire, solder, hardwire, etc. Note: The following parts are available from A. Caristi, 69 White Pond Road, Waldwick, NJ 07463. Etched and drilled PC board, $14.95; U5, $14.95; all other IC's, $2.00 each; Q1, $1.75; Q2, Q3, and Q4, $1.95 each. Please add $3.00 postage/handling. New Jersey residents, please add appropriate sales tax. ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 10 of 19 Research Experiment #1 Screw U All ----------- Purpose : How many systems one can infect while creating havoc in the BBS local bbs community (WWIV BBS's) Hypothsis : The above will happen.... Materials : 1: Computer 2: Phone line & modem 3: A good collection of virues and utilities 4: A shity local WWIV net 5: An ounce of sense (No pun intened!) Expirment #1: Log onto your local lame WWIV BBS and check out the network getting the numbers to the other bbs that are on the same beg for popularity list. Log onto the other bbs also using some far out cool name like (coff coff Gravity's Rainbow). Leave for validation a LD number most of the time 14 year old kids can't call to validate and they think it is koolaid, ummm no I mean K-Rad awesome have a LD user they can't brag about.. After getting access to the k-rad tranfers section start upload virues that have been Encrypted. May I suggest No-where mans utilities (tm NukE). Name the virues under K-Rad utilities that every lame WWIV sysop wants, I.E. Registration to WWIV, be creative, ususally they will run them. This expirment usually pisses off users also. Expirment #2: * When you finally figure out what the sysops bbsing hours, which by the way is 24 hourz a day cuz they have no life, log onto the BBS and upload "Coff Coff" to directory "gag gag" and hit "ack spu" .....now your in DOS. Look at the results at the end of this expirment list * Expirment #3: Upload under the sysop account a good virus that is not detectable by the current version of scan (Use should had fuck with that too!). Drop to DOS and run the virus. The sysop won't pick it up for awhile, then watch him bitch on the local elite WWIV sysop net. (Hey guys I have seen it ALL! "We must stop him!") Maybe if you are lucky other sysops will donwload stuff from each other and spread diffent viruses to each. For an example upload a good virus like Devils Dance to one sysop and maybe something like Dark Avenger to another and see if they can reinfect each other like homos! Observation: All the sysops in these expirment did all the ABOVE! Conclusion: The first time local lammer can be hit always. They do seem to get a little bit smart as time goes on. If you are a good decker (hacker) then you will always be one step infront of them with tricks. Study Question: 1) Should one run WWIV? NOT! 2) Should one crash a WWIV BBS if one sees one? ALL THE FUKN TIME! 3) Are local nets lame? YES! 4) What is Grim Reapers password on the COVEN? DPT009 5) What is the Ultimate ones password on Anarchy's BBS? WCSPEC 6) What is The LORD HIGH GONZOES voice number? 804-794-3099 7) What is GRIM REAPERS voice line? 804-741-0005 8) How many viruses has GR upload to area BBS's? 7! 9) What were the names of the viruses upload to area BBS's? Dir-2, Devils Dance, Dark Avenger, 1701 Mutantion Engine, 666-B, RNA, 1605 TSR 10) What were the names of trojan uploaded to area BBS's? Gulf 1991, Nice Girl, Ansi Pic's, Duploscan 11) What different handles did GR use to upload all this shit as? Sam Moore, Cold Steal, Lifeguard, The Lord High Warlock, The Ultimate One, Trey Meadows, Anarchy, Mr. Athletic, Biniaca, The Dark Night. True/False 1) WWIV BBS's are kool? FALSE 2) Anarnet is kool? FALSE 3) WWIV is a very secure BBS package? FALSE 4) Your systems are clean of virues? FALSE 5) Lord High Gonzo has a normal size nose? FALSE 6) It's all been fun? TRUE! 7) There are many back doors into WWIV? TRUE! 8) Lord HIgh Gonzo felt stupid when he saw me fucking up his BBS under his account? VERY TRUE! 9) Knowone knows who Gravity's Rainbow is? TRUE! 10) Gravity's Rainbow really fucked up BBS disneyland for Richmond? TRUE! ! -*-This is a very good example of what you can get when you drop to DOS! ! Thanx High Lord Gonzo for the donation of your bbs for this experiment LHW user list is also my GREETINGS!! Name: The Lord High Warlock #1 RN : God PH : 804-794-3099 Age : 16 M PW : STAFF SL : 255 DSL=255 SySu: 0 Exem: 255 AR : ABCDEFGHIJKLM OP DAR : ABCDEFGHIJKLMNOP Name: Gravity's Rainbow #1 1/2 <=--Thats me!! RN : William Gibson PH : 804-343-3227 Age : 7 N/A *** KEEP LOOKING DOWN! *** PW : LICKME Note: :) Hi! Just wanted an account here! ! ! SL : 255 DSL=255 ! SySu: 0 ! Exem: 255 ! AR : ABCDEFGHIJKLMNOP ! DAR : ABCDEFGHIJKLMNOP ! ! ! ! ! ! ! Name: Changeling #2 ! ! ! RN : Co-God ! ! ! PH : 804-323-0377 ! ! ! Age : 16 M ! ! ! PW : ELEKTRA !!! ! SL : 255 DSL=255 Exem: 255 AR : C MNOP DAR : ABCDEFGHIJKLMNOP Name: Vanguard #3 RN : Chris Refvik PH : 804-794-9419 Age : 16 M PW : CAPDT SL : 60 DSL=60 Exem: 255 AR : P DAR : P Name: Archangel #4 RN : Marc Godbolt PH : 804-741-2419 Age : 16 M PW : WARLOCK SL : 255 DSL=255 Exem: 255 AR : A M P DAR : ABCDEFGHIJKLM P Name: Thanatos #5 RN : john PH : 804-794-3099 Age : 14 M PW : DEATH SL : 150 DSL=150 Exem: 255 AR : ABCDEFGHIJKLMNOP DAR : ABCDEFGHIJKLMNOP Name: Anarchy #6 RN : stuart long PH : 804-353-8377 Age : 15 M PW : ACTOR Comp: IBM 80386 SL : 50 DSL=200 AR : P Name: Genghis Khan #7 RN : David Branch PH : 804-379-1958 Age : 15 M PW : GRANDAD SL : 30 DSL=30 Name: Ouroborus #8 RN : Ken Underwood PH : 804-794-2483 Age : 17 M PW : IAM GOD SL : 60 DSL=255 Exem: 255 DAR : ABCDEFGHIJKLMNOP Name: Reddevil #9 RN : fredrik astrom PH : 804-794-2679 Age : 17 M PW : ASSS Name: Bianca #10 RN : Jennifer McGrath PH : 804-272-2841 Age : 16 F PW : ROSE SL : 60 DSL=60 Name: The Immortal #11 RN : Brennan Maynard PH : 804-794-6460 Age : 14 M PW : 1QAZ SL : 50 DSL=30 AR : D Name: Yoho Yip #12 RN : Eric Wirt PH : 804-744-2176 Age : 15 M PW : REMEMBER SL : 255 DSL=255 Exem: 255 AR : M P DAR : ABCDEFGHIJKLM P Name: Darkling Lord #13 RN : Leon Mays PH : 804-739-2654 Age : 15 M PW : DRUID SL : 255 DSL=60 SySu: 0 AR : P DAR : P Name: Megadeath #14 RN : Brian PH : 804-739-4161 Age : 15 M PW : ???? SL : 40 DSL=40 AR : P DAR : P Name: Steel Viper #15 RN : Josh PH : 804-379-8980 Age : 15 M PW : DUDES SL : 50 DSL=50 Name: Cutter John #16 RN : Shawn Musick PH : 804-323-1041 Age : 19 M PW : RUNES SL : 100 DSL=100 Name: Shade #17 RN : Joe Grau PH : 804-794-6021 Age : 17 M PW : SNARF SL : 100 DSL=100 Name: Mr. Athletic #18 RN : Michael Sellers PH : 804-264-1432 Age : 26 M PW : MIAMI SL : 70 DSL=70 Name: Bladerunner #19 RN : Aaron Freeman PH : 804-598-4523 Age : 16 M PW : PENNY SL : 40 DSL=40 Name: Peter Martin #20 RN : peter martin PH : 804-794-3360 Age : 16 M PW : 4YDDIC SL : 80 DSL=80 Name: The Beast From The East #21 RN : Steven Manson PH : 804-598-2514 Age : 19 M PW : REVVER Comp: Commodore SL : 30 DSL=30 Name: Lazy Dragon #22 RN : David Caran PH : 804-272-0377 Age : 13 M PW : QAWSZZ SL : 40 DSL=40 Name: Ali #23 RN : Justin Toney PH : 804-285-7050 Age : 15 M PW : 87264 SL : 20 DSL=20 Name: The Messiah #24 RN : andrew PH : 804-285-4712 Age : 19 M PW : QUORUM SL : 110 DSL=110 AR : P DAR : P Name: Grim Reaper #25 RN : Seth Rosenthal PH : 804-741-0005 Age : 25 M PW : DPT009 SL : 90 DSL=90 Name: Michael Wallstreet #26 RN : Andy Brocato PH : 804-794-3853 Age : 16 M PW : HOGAN SL : 40 DSL=40 AR : P DAR : P Name: Universal Mind #27 RN : wells oliver PH : 804-379-6444 Age : 14 M PW : COVER SL : 30 DSL=20 Name: Wood Rat #28 RN : Charles Justice PH : 804-744-1647 Age : 44 M PW : KADY SL : 10 DSL=5 Name: Der Blitzkrieger #29 RN : peter hluchan PH : 804-379-1810 Age : 16 M PW : ANNE SL : 30 DSL=30 Name: Chester The Child Molester #30 -What a sick name!! **STOP**!! RN : STEVE NIXON PH : 804-323-1423 Age : 18 M PW : BITCHES SL : 251 DSL=250 Name: Shwoog #31 RN : walied mahmoud PH : 804-346-8571 Age : 24 M PW : SILVER SL : 110 DSL=60 AR : P DAR : P Name: Dragonbane #32 RN : Chris Box PH : 804-739-4931 Age : 15 M PW : HELLO SL : 30 DSL=30 Name: Josh Upton #33 RN : JOSH UPTON PH : 804-379-9330 Age : 13 M PW : FUCK SL : 30 DSL=30 Name: Ric Flair #34 RN : Richard Anderson PH : 804-794-9319 Age : 18 M PW : STORMBBS SL : 30 DSL=30 Name: Wok With Yan #35 RN : Allen Saunders PH : 804-739-0488 Age : 15 M PW : KUMQUAT SL : 20 DSL=10 Name: Trenchcoat #36 RN : Keith 'CPU505' Tims PH : 804-323-5813 Age : 23 M PW : BADGER SL : 120 DSL=30 Name: Seth #37 RN : seth PH : 804-741-0005 Age : 24 M PW : TEST SL : 10 DSL=5 Name: Mr. Private #38 RN : Derek Durkovic Call: KA5MLD PH : 804-379-9808 Age : 17 M PW : MANTRA SL : 90 DSL=90 AR : P DAR : P Name: Hawkeye #39 RN : Kyle Salus PH : 804-272-0736 Age : 16 M PW : CERIC SL : 60 DSL=30 Name: Richie Rich #40 RN : RICH FRIEDBERG PH : 804-378-8602 Age : 12 M PW : RICH SL : 30 DSL=30 Name: Punisher #41 RN : J.M. UPTON PH : 804-379-9330 Age : 11 M PW : RAD Comp: IBM 80386 SL : 30 DSL=10 Name: Harlequin #42 RN : Mike Carroll PH : 804-379-2739 Age : 16 M PW : DREAMER SL : 70 DSL=255 DAR : C *** HEY RIGHT HERE!! *** Name: The Avatar #43 RN : John Petty PH : 804-744-5822 Golly good chomp! Age : 15 M PW : GRAVE SL : 30 DSL=30 Name: Sean Braudrick #44 RN : Sean Braudrick PH : 804-598-3668 Age : 22 M PW : GOLF SL : 30 DSL=70 Name: Kal Zakath #45 RN : God part II PH : 804-794-3099 Age : 16 M PW : GARION SL : 255 DSL=255 <--- Come on SYSOP this is stupid!! **STOP** Name: Bill Mcintosh #46 RN : Bill McIntosh PH : 804-598-5581 Age : 35 M PW : R99959 SL : 30 DSL=30 Name: Troll #47 RN : Joe Blackburn Where did this guy come from! PH : 804-794-3261 Age : 17 M PW : PEACE SL : 40 DSL=40 Name: Baphomet #48 RN : kris norris PH : 804-739-6955 Age : 13 M PW : PRINCE SL : 5 DSL=0 Name: Davey Allison #49 RN : Kendall Biggs PH : 804-598-5426 Age : 15 M PW : Q94WRVQ SL : 30 DSL=30 Name: Sdasd #50 RN : Jonathan Youngblood PH : 804-323-6700 Age : 18 M PW : NCC-1701 SL : 30 DSL=30 Exem: 1 Name: Ted Bundy #51 RN : Michael Beaman PH : 804-378-0970 Age : 13 M PW : ACE SL : 40 DSL=40 AR : P DAR : P Name: Mike Dude #52 RN : MIKE MURPHEY PH : 804-794-3582 Age : 12 M PW : FUN Comp: IBM 80386 SL : 30 DSL=30 Name: Traveler #53 RN : james quigley PH : 804-744-7261 Age : 16 M PW : JFDK7B SL : 70 DSL=60 Name: Jeff Leach #54 RN : JEFF LEACH PH : 804-379-5959 Age : 12 M PW : JEFF SL : 30 DSL=30 Name: Berek Halfhand #55 RN : kenneth bader PH : 804-768-1257 Age : 37 M PW : 2315KB1 SL : 80 DSL=60 Name: J.L. #56 RN : J.L.HARRIS PH : 804-598-3234 Age : 34 M PW : LIGHT SL : 40 DSL=40 Name: Michelle Leach #57 RN : michelle leach Call: 379-59 PH : 804-379-5959 Age : 15 F PW : 8NDSET SL : 70 DSL=60 Name: Musicman #58 RN : Stephen Wright PH : 804-353-2550 Age : 19 M PW : CHORUS SL : 40 DSL=40 Name: Bman #59 RN : Brian Mueller PH : 804-580-4448 Age : 17 M PW : SIR1112 SL : 30 DSL=30 Name: A Shadow In The Darkness #60 RN : roger PH : 000-0012 Age : 91 M PW : FUCK123 SL : 0 DSL=0 Name: Dribble Warrior From Vaporlock #61 RN : David DeWell PH : 804-330-5762 Age : 18 M PW : DESTRUCT SL : 60 DSL=40 Name: David Lee #62 RN : david lee PH : 804-346-0214 Age : 15 M PW : TAIWAN SL : 40 DSL=40 Name: Ultimate One #63 RN : Mike Davis PH : 804-744-6045 Age : 13 M PW : WCSPEC <----------*** USES THIS PASSWORD EVERYWHERE *** SL : 50 DSL=30 Name: Payton #64 RN : payton Call: TURBO PH : 804-672-2727 Age : 12 M PW : OCNFVZ SL : 0 DSL=0 Name: Stocking Cap #65 RN : TOMMY STOVER PH : 804-744-5788 Age : 14 M PW : SK8R SL : 10 DSL=0 Name: Rad Wrecker #66 RN : keith PH : 804-379-2710 Age : 18 M PW : PUZZY SL : 90 DSL=90 AR : P DAR : P Name: Dream Weaver #67 <---- Like the handle! RN : George P. Medows III PH : 804-794-1524 Age : 21 M PW : ADMIRAL SL : 30 DSL=30 Name: Blue Lightning #68 RN : Jeff Ludden PH : 804-794-3220 Age : 13 M PW : 10-23-78 SL : 30 DSL=30 Name: The Destroyer #69 RN : David Ahn PH : 804-745-2862 Age : 22 M PW : DESTROY SL : 30 DSL=30 Name: Kai #70 RN : Steffen Rau PH : 804-276-4586 Age : 15 M PW : KDTUH5 SL : 30 DSL=30 Name: Tomboy #71 RN : Karen Derrick PH : 804-794-6424 Age : 14 F PW : TOMMY SL : 30 DSL=30 Name: Akira #72 RN : Steve Bryant PH : 804-282-7138 Age : 15 M PW : TRI SL : 30 DSL=30 Name: Thoth #73 RN : paul hunting PH : 804-744-2928 Age : 15 M PW : THOTH SL : 30 DSL=30 Name: Hannibal Lecter #74 RN : Joe Turfle PH : 804-379-0727 Age : 17 M PW : DEKOONIN SL : 100 DSL=200 Exem: 255 Name: The Sentinel #75 RN : David Ciampa PH : 804-744-2850 Age : 15 M PW : MEEKS SL : 50 DSL=50 Name: Ragin Cajun #76 RN : matt thomas PH : 804-644-8726 Age : 22 M PW : FVCG12A SL : 90 DSL=90 AR : P DAR : P Name: Z-Man #77 RN : michael reid PH : 804-674-5783 Age : 13 M PW : STEMPELT SL : 30 DSL=10 Name: Stormchild #78 RN : Jonn Hartford PH : 804-794-1908 Age : 16 M PW : NIRVANA SL : 0 DSL=0 Name: Zaphod #79 RN : Matt PH : 804-744-5215 Age : 15 M PW : SQUIGGLE SL : 30 DSL=30 Name: Michael Myers #80 RN : Bill Carter PH : 804-794-5172 Age : 15 M PW : BASEBALL SL : 30 DSL=30 Name: Lobo #81 RN : John Taylor PH : 703-694-3293 Age : 13 M PW : JLOB SL : 0 DSL=0 Name: Windsurfer #82 RN : seth vidal <--- Ur time is going to come MILO MEADOW!! PH : 804-744-7084 GODDAM how lame can this get!! Age : 15 M PW : HUH SL : 40 DSL=255 DAR : ABCDEFGHIJKLMNO Name: Zoltan Kocsis #83 RN : Fredrick Astrom PH : 804-794-2679 Age : 17 M PW : DMINOR SL : 30 DSL=30 Name: Blade #84 RN : Jim PH : 804-740-4106 Age : 17 M PW : LAUDERDA SL : 30 DSL=30 Name: Romulus #85 RN : Matt Grainger PH : 804-282-3731 Age : 15 M PW : NERO SL : 30 DSL=30 Name: Astro Man #86 <--- Anarnet doesn't like you pal! RN : Jody PH : 804-741-2956 Age : 15 M PW : DEATH SL : 0 DSL=0 Name: Damocles #87 RN : Daniel Broxon PH : 804-794-3063 Age : 16 M PW : RIFFRAFF SL : 60 DSL=60 Name: Black Dragon #88 RN : James Convy PH : 804-748-4930 Age : 17 M PW : MINE SL : 40 DSL=40 Name: St.Thomas #89 RN : Brent Robinson PH : 804-744-5579 Age : 14 M PW : SPRAY SL : 30 DSL=30 Name: Unicorn #90 RN : NICOLE GALLUB <---I ready for a ride Call: UNICOR PH : 804-739-1257 Age : 13 F PW : RONKONKA SL : 40 DSL=40 Name: Beethoven'S Son #91 RN : keith abbott PH : 804-272-9385 Age : 23 M PW : WOOF SL : 60 DSL=40 Exem: 255 Name: Enterprise #92 RN : David Meacham PH : 804-323-6700 Age : 15 M PW : NCC-1701 SL : 60 DSL=60 Name: The Outlaw #93 RN : Jennifer C. Outlaw PH : 804-748-7794 Age : 21 F PW : RUINS SL : 30 DSL=30 Name: Scott Parker #94 RN : scott parker PH : 804-320-0838 Age : 15 M PW : HEIDI SL : 30 DSL=30 Name: Heavy Metal #95 RN : Daniel PH : 804-744-3429 Age : 14 M PW : 00HLC3 SL : 30 DSL=30 Name: Worm Rider #96 RN : brad powell PH : 804-741-2958 Age : 20 M PW : BMW2002 SL : 30 DSL=30 Name: Terminator X #97 RN : Tommy Stover PH : 804-744-5788 Age : 15 M PW : HAVEPHUN SL : 30 DSL=60 Name: Cat Lover #98 RN : samantha winters PH : 804-740-4768 Age : 21 F PW : SCRUFFY SL : 40 DSL=40 Name: Cutter #99 RN : John Randel PH : 804-744-7554 Age : 16 M PW : PHREND SL : 60 DSL=60 Name: Fastjack #100 RN : Steve Williams PH : 804-730-1805 Age : 23 M PW : DRQHV6 SL : 60 DSL=60 Name: Voodoo Child #101 RN : Nathan DeBard. PH : 804-741-3292 (Good size butterball!) Age : 15 M PW : STONED SL : 60 DSL=60 Name: The Kayzzer #102 RN : Zach Wily PH : 804-744-3546 Age : 15 M PW : NP10 SL : 40 DSL=40 Name: Roy Mcleod #103 RN : Roy mcleod PH : 804-330-2500 Age : 27 M PW : URPBK1 SL : 30 DSL=30 Name: Slightly #104 RN : Dale Rutledge PH : 804-744-8194 Age : 13 M PW : WEATON SL : 30 DSL=30 Name: Scubaman #105 RN : Robert Alexander PH : 804-379-8338 Age : 18 M PW : SCUBA SL : 50 DSL=50 Name: Elorgphzx 137 #106 RN : david heise PH : 804-737-6036 Age : 15 M PW : MR. OG SL : 40 DSL=20 Name: Dancing Bear #107 RN : charlie robinson PH : 804-261-4521 Age : 39 M PW : 1211 SL : 40 DSL=30 Name: Lord Terminator #108 RN : Louis Nguyen PH : 804-745-9741 Age : 14 M PW : CRAZY SL : 50 DSL=50 Name: Brook Hughes #109 RN : brook hughes PH : 804-794-4141 Age : 16 M PW : VIKING SL : 10 DSL=0 Name: Aardvark #110 RN : Danny Freer PH : 804-285-7034 Age : 15 M PW : COVOPUS SL : 40 DSL=40 Name: Hitman #111 RN : Joe Wilkerson PH : 804-739-8358 Age : 13 M PW : RYAN SL : 40 DSL=40 Name: Mexican Seafood #112 RN : lillian lai PH : 804-794-1908 Age : 17 F PW : SEAFOOD <---------------------** HOW ORGINAL!! Lamers are like Viruses they mutliply! SL : 50 DSL=40 Name: Grimalkin #113 RN : Mike PH : 804-744-5254 Age : 16 M PW : MACBETH SL : 40 DSL=30 Name: Ka0sman #114 RN : ralph machioo PH : 804-794-4238 Age : 13 M PW : XXXXX SL : 0 DSL=0 Name: Dark Prophet #115 RN : David Ciampa PH : 804-744-2850 Age : 15 M PW : FLOOD SL : 60 DSL=40 Name: Darth Vader #116 RN : Brad Howell PH : 804-740-2958 Age : 20 M PW : CITATION SL : 0 DSL=0 Name: Crescendo Man #117 RN : Jeff Dean PH : 804-744-3087 Age : 15 M PW : WIERD SL : 50 DSL=50 Name: Floyd The Barber #118 <--Your not in acid pal!! RN : nick PH : 804-794-1908 Age : 15 M PW : LUSH SL : 30 DSL=30 Name: Blarney #119 RN : David DeWell PH : 804-560-4820 Age : 18 M PW : CHIQUITA SL : 40 DSL=30 Name: Merlin #120 RN : martin parece PH : 804-320-4772 Age : 14 M PW : HACK ME SL : 0 DSL=0 Name: Yin #121 RN : Katey Knox PH : 804-358-7579 Age : 22 F PW : ELEANOR SL : 40 DSL=30 Name: Snow Monkey #122 RN : Macon F. Furr PH : 804-745-8268 Age : 15 M PW : JESUS SL : 30 DSL=30 Name: Orion #123 RN : Kyle Salus PH : 804-272-0736 Age : 16 M PW : CERIC SL : 60 DSL=30 Name: Starsong #126 RN : Jim James PH : 804-458-0281 Age : 26 M PW : G2MJ80 SL : 40 DSL=20 Name: Teth Ikarin #127 RN : James Bryce Howell PH : 804-768-7645 Age : 17 M PW : 11ZULU SL : 50 DSL=30 Name: Lao-Tzu #128 RN : Brian Knox PH : 804-358-7579 Age : 21 M PW : WUWEI SL : 40 DSL=40 ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 11 of 19 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= From Whom The Bells Toll By The Lost Avenger/UPi =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Well guys I originally saw this article in the Forbes Magazine, August 3, 1992 edition. (Thanks go to Digital Justice for telling me about this article). Anyways I read through it and thought it was a total scream. Some of the things they said in it are so crazy I couldn't believe my eyes. Take a look for yourself and see what you think about it. This article pissed me off so much I think people should write this author of this article at Forbes Magazine and let him know how stupid the article really is. Anyways if you want to write Forbes Magazine here is the address: Forbes Incorporated, 60 Fifth Avenue, New York City, New York 10011. Oh yeah by the way this article is originally written by William G. Flanagan & Brigid McMenamin. This article was reproduced without permission (like you really give a flying fuck). "There are two kinds of (phone) customers: those who have been victims of tool fraud, and those who will be." -James Snyder, Secret Service Lawyer Turned MCI Lawyer. It's every executive's nightmare; One day you call your office and the phones don't work. In October it happened to Mario Ceste, president of Interplex Electronics, Inc. in New Haven. Interplex, like many companies today, lives by its 800 number, used by customers to make inquiries and place orders. Ceste was away in Dallas and called his home office on the 800 line. He got repeated busy signals. This was serious. Ceste called on another line to find out what was wrong. (TLA: Must be a cheap company, sounds like they only have one 800 line.) But the folks in sales insisted nobody was on the 800 line. At first neither AT&T nor the local company, Southern New England Telephone, could find anything wrong. Finally, a SNET repairman monitored the 800 line and heard people speaking Spanish and talking to faraway places. Interplex had been hacked. (TLA: No fucking kidding!) By the time the problem was fixed, the $6 million (revenues) company was struck with over $2,000 in bogus 800 calls and another $15,000 in long distance charges. (TLA: Serves these idiots right.) Worse, Ceste figures at least 100 customers couldn't reach the company with their orders. (TLA: Ah, poor baby.) He can't quantify how much business he lost. Interplex is hardly unique. The list of phone fraud victims includes giants customers like American Express, IBM, Procter & Gamble and large government agencies, right down to mom-and-pop businesses. Here are just a few recent victims; Avnet, Inc. (over $500,000), the Drug Enforcement Agency (reportably $2 million) and the U.N. ($1 million). And NASA confirms that it also fell victim to a toll fraud - outside estimates put the cost as high as $12 million - before it wised up to what was happening to taxpayers' money. What about recent reports that telephone toll fraud is now under control? The reports are at best premature. (TLA: You can say that again.) Telecommunications technologies are changing rapidly; every innovation creates new opportunities for the fraudsters. As Alfred C. Sikes, chairman of the Federal Communications Commission, said recently; "Without active work by all participants, the (toll fraud) problem can and will get worse as fraud migrates from one technology to another." Who are the culprits? Organized crime and drug dealers are the bug league telecrocks. (TLA: Not! These guys don't know the computer underground that well I guess. Oh well back to the article.) They cannot risk having their phone calls tapped or traced, so they use other people's numbers. Preferably numbers stolen from a major corporation or huge government agency, where it will take a while for the fraud to be noticed. The Drug Enforcement Agency still blushes over the fact that telecrooks got hold of its remote access number in Houston in 1989 and used it for almost 18 months. According to Toll Fraud and Telabuse, a study of the problem by John J. Haugh and others, the crooks rang up about $2 million in bogus charges, and a lot of those calls were made to drug exporting countries. The tab was paid by taxpayers. How does this pervasive and spreading racket work. Professional criminals swipe numbers in a variety of way. They bribe or intimidate telephone company employees or company insiders familiar with the phone system. In 1991 a Sprint supervisor in New York pleaded guiltily to selling up to 50 access codes a day to supplement his salary. The lucre is certainly tempting: The street price for a hot credit card number is $50 to $100. These numbers are good for only a day or so, before telephone company computers block additional calls. (TLA: Credit cards well don't they mean calling cards? The regular ones can last for only a couple days but it depends on how virgin the card is. The less people who have the card the longer it will last. But on the other hand the corporate cards can last anywhere from 2-3 months and maybe even longer but then again it depends on how many people have the card.) But the big money is in remote access number, which could have a shelf life of a month or more before shut down. Access codes can sell for as much as $10,000. Criminals also get numbers from "dumpsters divers," who root around in company garbage for buried treasure - such as 800 numbers and access codes. Organized crime is into technology, too, and pays technocrooks up to $10,000 per week to crack telephone systems with their computers, to pluck cellular telephone numbers from the airwaves or to alter the chips in cellular phones to charge illicit calls to unsuspecting customers. It's estimated that as many as one-third of all cellular phone calls place in the New York City area are fraudulent. Hackers will even sneak into voice-mail systems, where they can operate undetected for months and be as hard to get rid of as cockroaches. Meanwhile, fraud bills mount. At pay phones in cities like New York, Chicago and Los Angeles, you often see lines of immigrants at streetside pay phones. Is there a shortage of phones in these neighborhoods? No. The folks are queuing up to fork over $10 to $30 to call-sell operators, who will punch in a stolen access code or credit card number, (TLA: Calling card?) then dial the customer's overseas party. For the immigrants it's cut-rate telephoning, for the sellers of the numbers an illegal but lucrative business. In New York, a call-sell operator can rake in $1,000 a day. "There are neighborhoods in Brooklyn and the Bronx where the call-sell operator is the local phone company," notes John Haugh, a telecommunications lawyer and consultant based in Portland, Ore. Some immigrants know of no other way to call home. Perhaps the most daring call-sell operation on record was the so-called Coconut Connection case in 1988. Based in Honolulu, the operators sold long distance service at a discount to businesses and individuals throughout the US. The thieves claimed they were merely reselling "excess" long distance service purchased from other companies. The crooks sent out new access codes to their customers every few days. Unbeknownst to the customers, these numbers were stolen. (TLA: Yawn!) The Secret Service finally shut the operations down, arresting 20 people and seizing 12 computer systems and 3,500 stolen access codes. That operation alone accounted for $125 million in fraudulent call annually. Petty thieves get in the act, too. "Shoulder surfers" hang around bus, train and airline terminals in major cities and spy on people making long distance calls with credit cards or remote access numbers. With the help of binoculars or video cameras, or just good eyesight, they snatch the numbers and rapidly pass them along to call-sell operators or other crooks. There are now so many shoulder surfers and call-sell operators plying their trade in New York City bus and train stations that AT&T, Sprint, MCI and New York Telephone have blocked international calls from pay phones in the Port Authority Bus Terminal and from pay phones in other parts of the city where call-selling is commonplace. (TLA: Well up here in this part of Canada you can any international calls from any payphone no matter where you are. I am not sure how much of Canada has this restriction but I know this is true in Ontario and Quebec.) Shoulder surfing and call-selling are popular underworld pastimes not only because they are lucrative but also because apprehension is rare. Local police, the FBI and the Secret Service - which have jurisdiction over long distance telephone fraud - have other things to so. And under existing laws conviction is very difficult, anyways. The few perpetrators who are caught red-handed in expensive, time-consuming stings usually pay small fines and walk. But criminals, drug dealers and terrorists, who couldn't communicate without it, aren't the only ones committing telephone fraud. Computer hackers make their their bones - and get their sick jollies - doing it. They can do even more damage than professional telecrooks. (TLA: What a fucking joke. Yeah right I get my fucking jollies committing telephone fraud. I do it cause the fucking cost of calling long distance is so god damn expensive. If the price of long distance calling where much cheaper I sincerely believe their wouldn't be any telephone fraud committed.) Witness the horror show experience by International Data group, Inc., a $770 million (revenues) publisher and trade show operator. (Among its titles are Network World, PC World, GamePro and Computer World.) Once day in September 1990 virtually all 200 employees at IDG's Peterborough, NH office found that their voice mailboxes had been rifled. Their normal greeting had been replaced with funny voices or gibberish, and their messages had been erased and replaced with vulgar messages and even bomb threats. (TLA: Sounds like what I did to Logitech Mouse down in Southern California.) It took almost a full day to straighten out the mess. But it kept on happening for weeks. Some days IDG couldn't even use its voice mail at all. It estimates it lost $2.4 million in business. "It was an absolute nightmare," says Jane Creighton, corporate director of telecommunications at IDG. The culprits turned out to be a pair of teenage boys from New York's Staten Island, miffed at IDG because a poster they'd ordered through GamePro magazine had never arrived. They got slaps on the wrist from authorities. If your company has a plain vanilla PBX system, there are untold numbers of telecrooks out there who can easily crack your system. How? Most PBX systems offer direct inwards systems access (DISA), which enables travelling employees to call the home office, punch in a code and make long distance calls cheaper than with a credit card. Once you know the code, you can use the business telephones as if you were sitting in one of the company's executive offices. To figure out the codes, telecrooks use autodialers, widely available for $29. (TLA: Bullshit, you can get a autodialer from any underground BBS for virtually free and there are so many different ones to choose from. These people who wrote the article haven't a clue on what they are talking about.) Says Bob Fox, assistant vice president of corporate security for Sprint, "If your company has a remote access feature in your PBX, it is almost certain that someone, somewhere, at some time, will try to steal your service." Most PBX victims say they didn't even know they had remote access capability and had never used it themselves - until it was used to defraud them. That's what Salt Lake City-based Christensen Boyles Corp. days happened when the company was hit with $212,000 in toll fraud in 1991. Now the crooks are migrating into other area, learning how to swipe long distance service through automatic attendants and call diverters and also how to create mayhem via voice-mail systems. It's child's play for the computer-savvy. (TLA: Yup, I know the feeling of screwing a company over good.) The tab for all this fraud is horrendous - nearly $4 billion a year and building. AT&T, in its most recent annual report to the FCC, listed $1 billion in uncollectible charges, a substantial amount the result of fraud. Individuals, as distinct from businesses, are liable for only $50 worth of charges for illicit calling card calls, even if thousands of dollars' worth of calls are stolen. But businesses aren't so protected unless they are using calling cars. Business customers who are defrauded through their own switching equipment, such as the commonplace PBX systems, are held accountable for the calls. Once, before deregulation, AT&T then the only major long distance carrier, could simply eat fraud charges and then include them in its rate base - every customer simply paid a bit fraud charges and then include them in its rate base - every customer simply paid a bit more for service. Now business customers are expected to pay. Average fraud bill: $90,000 per hit, according to consultant Haugh. Local phone companies wash their hands of the problem completely. "If an armored car is robbed on the highway, you can't hold the highway department responsible," argues a Bell-South spokesman. So far, the courts and the Common Carrier Bureau of the Federal Communications Commission have backed the carriers in refusing to absorb the losses. How vulnerable is your own system? In all likelihood, very. "Most users aren't even aware of toll fraud, but the sad truth is that it's virtually certain that every large user either has been hit or will be hit sometime in the future," notes Haugh. "No system is 100% hacker-proof," warns Sprint's Fox. "Managers who think otherwise are frequently taught a costly lesson." When business customers get hit with the charges for fraudulent use of their PBX systems, they often balk at paying the bill. That usually means arguing with AT&T, which has about 63% of the long distance business in the US and, according to Haugh, bills about 80% of the PBX fraud. In some cases AT&T will offer some sort of compromise to ripped-off customers. But it continues to insist that the customer, not AT&T, is responsible. "The truth remains that the customer is the only one who can detect and eliminate all fraud, because the customer alone knows what calls are authorized or unauthorized," notes Richard F. Hope, senior attorney for AT&T. Right now all eyes are on a lawsuit brought by Mitsubishi against AT&T. Mitsubishi, which got hit with a bogus $430,000 bill in 1990, not only refused to pay the bill but also sued AT&T for $10 million, on the grounds that AT&T knew its PBX system was vulnerable to fraud but had failed to warn the customer or to move quickly once that fraud surfaced. If Mitsubishi wins, other victims of PBX fraud will doubtless hop on the bandwagon. In May Representative Barney Frank (D-Mass.) introduced a bill that would forbid long distance carriers to charge state and local governments for toll fraud unless users were negligent in the operation of their phone equipment. AT&T has finally steeped up security and has begun warning customers of the growing severity of the problem, in stern language: "Hackers. Phone phreaks. Petty criminals. Whatever you call them, they can cost your company big dollars in unauthorized long distance charges - and worse, in disruption of business operations," a recent AT&T brochure that preventing PBX fraud is the customers' problem. What about the other major carriers? Sprint has taken fraud seriously and has been able to slash its customers' PBX fraud charges by monitoring their systems more closely. MCI, too, is stepping up such efforts. Their problems are not as acute as AT&T's, of course. Unlike AT&T, they don't sell equipment and have fewer customers to monitor. Further, as new kids on the block reluctant to upset customers, they are more flexible about payment for fraudulent calls. So far Sprint has not sued to collect, and MCI offers customers a flat 30% off the cost of fraud calls for a first-time event. But the best strategy for long distance business customers, of course, is to make their own systems harder to crack. To make your system less vulnerable to PBX fraud: o Restrict long distance and international calling. (Especially if you seldom or never call the Caribbean or drug-exporting countries such as Pakistan and Colombia, for example.) o When installing or upgrading your PBX system, always ask the installer about its vulnerabilities and how to configure the system to best protect yourself. Don't accept risky features like Remote Access or External Call Forwarding unless you really need them. If you do, restrict or prohibit their use after hours and on weekends, when hackers attack and call-sell operators and telecrooks cash in on purloined numbers. o Don't rely on default passwords or default access numbers. Hackers know them. (TLA: No shit!) Use long, random numbers and change them often. o Explore ways to protect your remote maintenance port. Remote maintenance lets the serviceman monitor and fix your phone system without a trip to your office. But it also lets crooks disable and even take over your entire phone system. MCI special counsel James Snyder says this is "the number one problem facing business today." One possibility: Use a callback modem. o Monitor call detail records, and consider adding software that catches signs of hacking and alerts the systems operator right away. A few examples: Teltrol Systems' Fraud Finder, Phone Plus' Ultimate Fraud Detection Module and Moscom Corp.'s HackerTracker. o Read up on the subject. Two good sources: Toll Fraud and Telabuse, by John J. Haugh and others, $270 (call 1-800-435-7878); Voice Processing System Security, by Tom Fermazin and Marc Robins, $295 (call 212-614-9842). o Consider telefraud insurance, just introduced by Sprint and about to be introduced by AT&T. It's expensive and limited, and doesn't cover you against business losses if hackers paralyze your system. Only the bogus phone charges are covered. But it can save you from horrendous fraud charges. Sprint's plan limits your fraud liability to $25,000, provided your beef up your security. Cost? for a typical company with ten PBX locations, $1,000 to sign up and $1,000 a month after that. So far, roughly 40 major companies have inquired about the plan. AT&T recently responded with two similar plans. The first one limits your liability to $12,500 if you catch the fraud, $25,000 is AT&T catches it. A typical company with ten PBX locations would pay a $1,200 sign-up fee and $1,200 a month. If your company agrees to taken even tighter security measures, AT&T will relieve it of all liability for toll fraud. For that protection, the cost is a $2,250 sign-up free and $3,000 a month for a typical customer. But make no mistake about it: As the crooks become more expert in the rapidly changing telecommunications technologies, telephone toll fraud will get worse before it gets better. For sale: phone-phreaking tools From his remote outpost in Alamogordo, NM, John Williams makes a nice living telling hackers how to rip off phone and computer systems. Williams says he brings in about $200,000 a year in publishing books on everything from credit card scams and cracking automated teller machines to electronic shoplifting, cellular phone phreaking and voice mailbox hacking, each costing $29 to $39, and each complete with precise instructions. he even sells Robofones, which save hackers from doing a lot of dialing while they steal access codes. Isn't what he does illegal? Perhaps it should be, but it isn't Wrapping himself in the First Amendment, Williams is a member in good standing of the Alamogordo Chamber of Commerce and the New Mexico Better Business Bureau. He thumbs his nose at companies and authorities that would like to make him stop selling such secrets. "We don't promote fraud," he insists. "It's all sold for educational purposes only. If we didn't publish the information, it would still be out there." But last year Williams got a visit from the Secret Service, which was following up on a telephone fraud case in which one of his publications figured prominently. In Gainesville, Fla., in November 1990, two young men were locked up by police for hacking into voice-mail systems and then making calls to 900 numbers. One of the pair, known as the Shark, then 20, confessed to the crime but said he was on assignment for Williams' Consumertronics publication. The culprits could have been given five years on the fraud charge alone. But the victims didn't want any publicity, so the state them do 50 hours of community service instead. The Secret Service went to talk to Williams. Williams assured agent James Pollard that he'd never told the Shark to do anything illegal. nevertheless, says Williams, the agent implied that Williams and members of his gamily who work for him might be prosecuted for publishing voice-mail access codes. In the end, no charges were filed against Williams, who admits he has a thing against big business, especially the phone companies. "For decades, they financed right-wing regimes in Latin America," he rants. It's a crazy world, that of the telephone toll fraudsters. ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 12 of 19 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The Hacker Hood By The Lost Avenger/UPi =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Well guys it look's like Forbes Magazine has published another article about hacking & phreaking just recently. (Not sure exactly what the date that this article published on. But really I don't give a fuck and I don't think you would either). I read through it and it was just lame as the last article that was published, which made me decide to re-type it out for the magazine. So here it is. Take a look at it and check it out for yourself and decide for yourself if these two articles are really that lame. And once again this article was re-typed with permission. (Yeah, like I would really waste my tim in getting permission). Special thanks go out to Major Thrill for telling me about this article. Without him this article would have never been published. Computer crimes committed by a new generation of hacker hoods might cost anywhere from $500 million to $5 billion a year. (TLA: Really now? No fucking kidding.) Whatever the number, it's clear that a computer crime wave is reaching epidemic proportions. "The playground bullies are learning how to type" By William G. Flanagan and Brigid McMenamin Leonard Rose, a 33-year-old computer consultant and father of two, is also a felon. He recently completed 8 1/2 months in a federal prison camp in North Carolina, plus 2 months in a halfway house. His crime? Passing along by computer some software code filched from Bell Labs by an AT&T employee. Rose, who now lives in California, says he is still dazed by the harsh punishment he recieved. "The Secret Service," he says, "made an example of me." Maybe so. But if so, why are the cops suddenly cracking down on the hackers? Answer: because serious computer crime is beginning to reack epidemic proportions. (TLA: It took them this long to find that out?) The authorities are struggling to contain the crimes, or at least slow their rapid growth. Rose agrees the hacker world is rapidly changing for the worse. "You're getting a different sort of person now," he says of the hacker community. "You're seeing more and more criminals using computers." One well-known veteran hacker, who goes by the name Cheshire Catalyst, puts it more bluntly: "The playground bullies are coming infoors and learning how to type." Rose and the Cheshire Catalyst are talking about a new breed of computer hackers, These aren't just thrill-seeking, boastful kids, but serious (if boastful) cybercrooks. They use computers and telecommunications links partly for stunt hacking itself a potentially dangerous and costly game but also to steal valuable information, software, phone service, credit card numbers and cash. And they pass along and even sell their services and techniques to others including organized crime. Hacker hoods often extaggerate their escapades, but there is no doubt that their crimes are extensive and becoming more so at an alarming rate. Says Bruce Sterling, a notet cyberpunk novelist and author of the nonfiction *The Hacker Crackdown* (Bantam Books, 1992, $23): "Computer intrusion, as a nonprofit act of intellectual exploration and mastery, is in slow decline, at least in the United States; but electronic fraud, especially telecommunications crime is growing by leaps and bounds." Who are these hacker hoods and what do they do for a living? Take the 19 year-old kid who calls himself Kimble he is a very real person, but for reasons that will become clear, he asks us to mask his identity. Based in Germany, Kimble is the leader of an international hacker group called Dope. He is also one of the most celebrated hackers in his country. He has appeared on German TV (in disguise) and is featured in the December issue of the German magazine *Capital*. From his computer terminal, Kimble spends part of each day cracking PBX systems in the U.S., a lucrative form of computer crime. PBXs are the phone systems businesses own or lease. Hackers break into them to steal access numbers, which they then resell (TLA: Or trade?) to other hackers and, increasingly, to criminals who use the numbers to transact their business. Kimble, using a special program he has written, claims he can swipe six access codes a day. He says he escapes prosecution in Germany because the antihacking laws are more lax than in the U.S. "Every PBX is an open door for me," he brags, claming he has a total of 500 valid PBX codes. At Kimble's going price of $200 a number, that's quite an inventory, especially since numbers can be sold to more than one customer. Kimble works the legal side of the street, too. For example, he sometimes works for German banks, helping them to secure their systems against invasions. This might not be such a hot idea for the banks. "Would you hire a former burglar to install your burglar alarm?" asks Robert Kaine, president of Intrusion Detection, a New Your-based computer security consulting firm. (TLA: Well wouln't the former burglar know the ins and outs of bank security) Kimble has also devised an encrypted telephone that he says cannot be tapped. In just three months he says he has sold 100. Other hacker hoods Forbes spoke to in Europe say they steal access numbers and resell them for up to $500 to the Turkish mafia. A solid market. Like all organized crime groups, they need a constant supply of fresh, untraceable and untappable telephone numbers to conduct drug and other illicit business. Some crooked hackers will do a lot worse for hire. For example, one is reported to have stolen an East German Stasi secret bomb recipe in 1989 and sold it to the Turkish mafia. Another boasted to Forbes that he broke into a London police computer and, for $50,000 in Deutsche Marks, delivered its access codes to a young English criminal. According to one knowledgeable source, another hacker brags that he recently found a way to get into Citibank's computers. For three months he says he quietly skimmed off a penny or so from each account. Once he had $200,000, he quit. Citibank says it has no evidence of this incident and we cannot confirm the hacker's story. But, says computer crime expert Donn Parker of consultants SRI International: "Such a 'salami attack' is definately possible, especially for an insider." (TLA: Nice way to make easy cash!) The tales get wilder. According to another hacker hood who insists on anonymity, during the Gulf War an oil company hired one of his friends to invade a Pentagon computer and retrieve information from a spy satellite. How much was he paid? "Millions," he says. No one knows for sure just how much computer crime costs individuals, corporations and the government. When burned, most victims, especially businesses stay mum for fear of looking stupid or inviting copycats. According to *Law and Order* magazine, only an estimated 11% of all computer crimes are reported. Still, the FBI estimates annual losses from computer-related crime range from $500 million to $5 billion. The FBI is getting more and more evidence that the computer crime wave is building every day. Computer network intrusions one way of measuring attempted cracking of computer systems have risen rapidly. According to USA Research, which specializes in analyzing technology companies, hacker attacks on U.S. workplace computers increased from 339,000 in 1989 to 684,000 in 1991. It's estimated that by 1993, 60% of the personal computers in the U.S. will be networked, and therefore vunerable to intrusion. While companies dislike talking about being ripped off by hackers, details sometimes leak out. In 1988, for instance, seven men were indicted in U.S. Federal court in Chicago for using phony computer-generated transactions to steal $70 million from the accounts of Merril Lynch, United Airlines and Brown-Forman at First National bank of Chicago. Two plead guilty; the other five were tried and convicted on all counts. According to generally reliable press reports, here are some ways comouter criminals ply their trade: o In 1987 Volkswagen said it had been hit with computer-based foreign- exchange fraud that could cost nearly $260 million. o A scheme to electronically transfer $54 million in Swiss francs out of the London branch of the Union Bank of Switzerland without authorization was reported in 1988. It was foiled when a chance system failure prompted a manual check of payment instructions. o Also in 1988, over a three-day period, nearly $350,000 was stolen from customer accounts at Security Pacific National Bank, possibly by automated teller machine thieves armed with a pass key card. o In 1989 IRS agents arrested a Boston bookkeeper for electronically filing $325,000 worth of phony claims for tax refunds. o In 1990 it was reported that a Malaysin bank executive cracked his employer's security system and allegedly looted customer accounts of $1.5 million. o Last year members of a ring of travel agents in California got two to four years in prison for using a computer reservation terminal to cheat American Airlines of $1.3 million worth of frequent flier tickets. U.S. prosecutors say that members of a New York hacker group called MOD, sometimes known as Masters of Deception, took money for showing 21-year-old Morton Rosenfield how to get into the computers of TRW Information Services and Trans Union Corp. Caught with 176 credit reports, Rosenfeld admitted selling them to private investigators and others. In October he was sentance to eight months in prison. The newest form of cybercrime is extortion by computer give me money or I'll crash your system. "There is no doubt in my mind that things like that are happening," says Chuck Owens, chief of the FBI's economic crime unit. But Owens won't talk about ongoing cases. Many hackers are young, white, male computer jocks. They include genuinely curious kids who resent being denied access to the knowledge-rick computer networks that ring the globe, just because they can't affored the telephone access charges. (To satisfy their needs in a legitimate way, two smart New York young hackers, Bruce Fancher and Patrick Kroupa, this year started a widely praised new bulletin board called MindVox-modem: 212 988 5030. It's cheap and allows computer users to chat, as well as gain access to several international computer networks, among other things.) Then there are the stunt hackers. Basically these are small-time hoods who crash and occasionally trash supposedly secure computer networks for the sheer fun of it. They swap and sell stolen software over pirate bulletin boards. One of these hackers send Forbes an unsolicited copy of MS-DOS 6.0. (TLA: Oh whoopie do!) Microsoft Corp.'s newest operating system, which isn't even scheduled to be on the market until next year. (TLA: But has been ou in the pirate scene for ages.) It worked fine. (We first had it tested for viruses with Cyberlock Data Intelligence, Inc. In Philadelphia, an electronicdata security firm with a sophisticated new hardware-based system that's used to detect viruses.) The more malicious stunt hackers like to invade company voice mail systems and fool around with so-called Trojan horses, which can steal passwords and cause other mischief, as well as viruses and other computer generate smoke bombs, just to aise hell. This kind of hacking around can wreak tremendous damage. Remember Robert Tappan Morris. In 1988 Morris, then a 22-year-old Cornell University grad student, designed a worm computer program that could travel all over computer networks and reproduce itself indefinately. Morris says he meant no harm. But in November 1988 Morris released the worm on the giant Internet computer network and jammed an estimated 6,000 computers tied into Internet, including those of several universities, NASA and the Air Force, before it was stopped. Damages were estimaged as high as $185 million. That event was something of a watershed for the law enforcement people. In 1990 Morris was one of the first hackers to be convicted of violating the Computer Fraud and Abuse Act of 1986. He could have been sentanced to five years in prison and a $250,000 fine. Instead, Morrise got just three years' probation, a $10,000 fine, 400 hours of community service and had to pay his probation costs. Today he'd probably be thrown in the slammer. After the curious kids and the stund hackers, a third element in the hacker underworlds is made up of members of organized crime, hard-core cybercrooks, extortionists, shady private-investigators, credit card cheats, disgruntled ex-employees of banks, telephone, and other companies, and various computer- savvy miscreants. These are computer thugs who hack for serious dollars, or who buy other crooked hackers' services and wares. (TLA: Oh no warez d00ds.) One of the peculiarities of hackers is that many cannot keep their mouthes shut about their illegal exploits. They bost on their underground bulletin boards and in their publications about all the nasty things they can, and occasionally do, pull off. They brag to the press and even to the authorities. Witness Germany's Kimble and many of the other hacker hoods who talked to Forbes for this article. Over their own underground bulletin boards, hackers have brazenly broadcast all kinds of gossip, software and trophy files brought back like scalps from intrusions into other people's computers. The most famous example is the 911 file purloined from BellSouth, which prosecutors said had key information about the vital 911 emergency telephone network. The file turned out to be far less valuable than alleged. Nonetheless, its theft and, later, its mere possession got a whole raft of hackers including a group called the Legion of Doom in big trouble. Over the past three years, several of them have neem busted and their computer equiptment seized. A few drew stiff jail terms. The hackers even have their own above-ground magazines. One, *2600, the Hacker Quarterly*, is sold on newsstands. In the current issue, there is an article on how to crack COCOTS, customer-owned coin-operated telephones, and get free long distance service. While the publisher of *2600* advises readers not to try such schemes, the easy-to-follow instructions are right there, in black and white. The publisher of *2600*, Eric Corley (alias Emmanuel Goldstein), claims that he is protected by the First Ammendment. But readers who follow some of the instructions printed in *2600* magazine may find themselves in deep trouble with law enforcement. Notes senior investigator Donald Delaney, a well-known hacker tracker with the New York State Police: "He [Corley] hands copies out for free of charge to kids. Then they get arrested." An even bolder magazine, *Hack-Tic*, is published by Rop Gonggrijp in Amsterdam, a hacking hot-bed thanks in part to liberal Dutch laws. *Hack-Tic* is something like *2600*, bus with even more do-it-yourself hacking information. The hacker hoods stage their own well-publisized meetings and conventions, which are closely watched by the authorities. On the first Friday of every month, for example, at six cities in the U.S., *2600* magazine convenes meetings where hackers can, in the words of the magazine itself, "Come by, drop off articles, ask questions, find the undercover agents." Forbes dropped by *2600*'s Nov. 6 meeting in New York. It was held in the lobby of the Citicorp Center on Lexington Avenue, a sort of mini urban mall, with lots of pay phones-phones are to hackers what blood vessels are to Dracula. On this particular Friday the two or three dozen attendees consist mainly of teenage boys and young men wearing jeans and T shirts and zip-up jackets. Most are white, though there are some blacks and Asians. Most of these young people pretty much resemble the kids next door or the kids under your own roof. A few look furtive, almost desperate. (TLA: Yeah ok whatever you say.) Moving easily among the kids are a few veteran hackers and, watching them, some well-known hacker trackers, sometimes even New York State Police's Don Delaney. He might lurk on one of the upper levels of the Citicorp Center or stroll past the pay phones looking for a suspect wanted in New York. Don't the suspects stay away? Not necessarily. At one meeting Delaney walked right past three young men he had arrested, and not one of them even noticed him. "They're in their own world," he explains. On the edge of the crown stands a slight, intense young man wearing an earring and a neatly folded blue bandana around his head. Twenty-year-old Phiber Optik, as he calls himself, is currently under federal indictment in New York, charged with sudry computer crimes. According to federal authorities, he and other members of the hacker group called MOD sold access to credit reporting services and destroied via computer a television station's educational service, among other things. Phiber Optik claims that he's innocent. As the group grows, *2600* publisher Corley makes a dramatic enterance. He looks as if he's in his mid-30s and wears 1960s-style long black hair. A baby- faced assistant stands at his side, selling T shirts and back issues of *2600* magazine. Now and then Corley darts to the pay phones to take phone calls from other hacker meetings around the world. After taking one call he turns around with a worried look. He has just heard that the *2600* meeting at a mall in Arlington, Va. was busted by mall security and the Secret Service. Authorities there demanded the names of the two dozen or so attendees, confiscated their bags containing printouts and computer books, and booted them out of the mall. The group in Arlington was lucky compared with what happened to some hackers attending "PumpCon," a hacker convention held at the Courtyard by Marriott in Greenburgh, N.Y., over the recent Halloween weekend. Responding to a noise complaint, the police arrived, then got a search warrant and raided the hackers' rooms. The cops confiscated computer equiptment and arrested four conventioneers for computer crimes. Three were held in lieu of $1,000 bail. No bail was set for the fourth, a 22-year-old wanted for computer fraud and probation violation in Arizona. Around the country, computer users of every stripe are growing concerned that law enforcement officials, in their zeal to nail bigtime cybercrooks and computer terrorists, may be abusing the rights of other computer users. In come cases, users have been raided, had their equiptment confiscated, yet years later still have not been charged with any wrong doing nor had their equiptment returned. In 1990 Lotus Development founder Mitchell Kapoe and Grateful Dead lyricist John Perry Barlow, with help from Apple Computer co-founder Stephen Wozniak and John Gilmore, formerly of Sun Microsystems, started a nonprofit group called the Electronic Fronteir Foundation (EFF). Its aim is to defend the constitutional rights of all computer users. But if you know someone who likes to hack around, pass along this advice to her or him: While it is a common myth among hackers that the authorities will let them go if they reveal how they accomplished their mischief, the days of such benign treatment have dissappeared as the computer crime wave has built. "If it's a crime, it's a crime," warns the New Your State Police's Don Delaney, "The laws are for a good reason". (TLA: Ho hum...) For the most part, law enforcement is just reacting to the complaints from victims. ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 13 of 19 ********** PUMPCON BUSTED!!! *********** 10/31/92 written by someone who was there who wishes to remain anonymous NOTICE: The word "Hacker" is used frequently throughout this file - it is to be interpreted as "a computer literate person", and NOT as "someone who engages in illegal activities using a computer". Friday, October 30, Pumpcon began, at the Courtyard of the Marriott, in Greenburgh, NY. All in all, about 30 hackers showed up, and had a great time. At least until the evening of Oct. 31st, when 8-10 members of the Greenburgh police force showed up and raided the Con. At the time of the raid, there were between 20 and 25 hackers in the hotel. 3 of the 4 rooms rented by Con attendees were raided. All the occupants of these rooms were taken to a conference room, and then another hotel room (255) where they were held approximately 6-8 hours for questioning. The police all came in unmarked police cars, and parked on all 4 sides of the hotel. No one noticed they were there, until they were standing in the hall where all 4 rooms were located. The officers stood in the hall outside the doors, but did not enter the rooms right away. They waited about five minutes, for some unknown reason, which was just enough time for them to be noticed by the hackers in at least one of the rooms. Unfortunately, there was no way the hackers in one room could warn the other rooms - the fone lines were busy, and the cops in the hall kinda left the "walk down and tell 'em in person" option out. The police produced copies of a search warrant to search rooms 246, 233, and 237. Room 246 was the one where everyone was hanging out; it was pretty much THE room. It was where the computers were located, and where most of the Con attendees were 99% of the time. The other two rooms were rented by attendees of the con, and were simply used for sleeping quarters. Before too long, the police entered the rooms, and began rounding up people. My recollection of this time period is a bit faint, and I don't remember all the minute details. All I know is that we all ended up in a conference room, and then room 255. A few hackers who had been out driving around during the time of the bust returned a few hours later, and when they were seen by police, they were immediately taken to 255 and questioned. (They were walking down the hall, when a cop appeared, and told them to step into a room) The cops asked them if they were hackers, and when they didn't answer, one police officer reached into the coat pocket of one of the people, and produced an auto dialer. This in itself was enough to send the three to room 255, where the rest of the hackers were being held for questioning. My question to you - isn't that just a bit illegal? Bodily search without probable cause OR a warrant? Ooops - I'm forgetting - we're HACKERS! We're ALL BAD! We're ALWAYS breaking the law. We don't have RIGHTS! Room 255 was packed. No one was allowed to smoke, and everyone was nervous as hell. One by one people were called to be interviewed, with some interviews lasting 5 minutes, others lasting 30 or 45 minutes. Some people were sleeping, others were conversing, and still others were shaking, and looked like they were about to puke at any second. Even though the situation was quite serious, a few joked around, saying things like "So guys, I guess PumpCon '93 won't be held here, eh?". No one knew who was going to be arrested, or when they would be released. The 2 cops in the room with them were actually pretty cool, and answered any questions they could to the best of their knowledge. They weren't the guys in charge of the investigation; they were simply there to make sure we didn't leave. Of course, as friendly as they seemed, they were still cops... All the people who were detained were held until between 5:45 and 6:30 am. Four hackers were arrested, 1 because 2 of the rooms were registered in his name, a second because he signed for the rooms, and the others for previous crimes, apparently. No one knows as of yet. As of this message, no news on what will become of those arrested is known. They have not yet been arraigned. The other hackers were all searched, questioned, and then released pending further investigation. Those under the age of 18 had their parents notified. To my knowledge, there were no federal investigators there at the time of the bust. However, people kept mentioning the FBI and the Secret Service, and it is very possible that they will be called in to investigate. Actually, it's more than just possible, it's almost guaranteed. The police said that although most of those detained were released, there will most likely be more arrests in the near future, as more is learned about the alleged illegal doings. 3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along with anything which looked like it could have been involved in phone fraud. For some odd reason, although Auto Dialers were listed on the search warrant, not all of them were confiscated. I actually don't know if ANY were, I do know that not ALL were. ;) In one of the rooms, there were about 2 dozen computer magazines which were apparently confiscated, although the warrant did not specify that magazines could be taken. But, when you're busting HACKERS, I suppose you can take what you want. After all, hackers are evil geniuses, and don't have the same rights as NORMAL criminals do. As of yet, the actual charges against the hackers are not known. The raid apparently stemmed because the hackers were ALLEGEDLY using stolen calling card numbers and/or access codes to obtain free phone calls. One of these card numbers or codes was rumored to have tripped a flag at AT&T, which alerted security personnel that something was possibly wrong. This assumption about the calling card fraud is made because the police confiscated any calling card found during their searches, and some of the questions they asked the detained centered entirely around calling card theft and use. A few other questions asked me were "Do you know what computer systems were accessed?", "Do you refer to each other with handles?", "Who was primarily responsible for this meeting?", and "Where did you hear about this meeting?" My interview lasted only about 10 minutes, and it started at about 5:50 am. Everyone was dead tired, and the cops wanted to get everything over with as fast as possible so they could get some sleep. After the interviews were over, everyone left, to wait and see what the next few days will bring. I am releasing this file now, to prevent any rumors from starting, and to try to make the outside world aware of what happened during PumpCon. I have left out any specific incidences and references to specific people as a precaution, since the investigation is only beginning. We were hoping to write a file of all the attendees of PumpCon, to share with the world the names of those who were there. However, as you can obviously see, that would be highly stupid. For anyone who WAS there who is reading this, rest assured that the running list of names which was kept made a very tasteless dinner for the one who had it in his pocket. Oh, BTW, one of the cops who was apparently in charge made a comment to me... he said "You can post a message on the boards telling your friends to stay out of Greenburgh". Well boys, you heard him - PumpCon '93 will be held in Greenburgh, at the Courtyard Marriott.... *--------------* The following is a word for word copy of the search warrant issued to each person who was detained and questioned. No spelling errors were corrected, but I probably made a few when I typed this in. Oh well. TOWN of GREENBURGH POLICE DEPARTMENT WESTCHESTER COUNTY, NEW YORK ORDER OF SEARCH AND SEIZURE +----- ( signed here by Det. Hugh F. Gallagher #103) ---------------------------------------------- JUSTICE COURT, TOWN OF GREENBURGH WESTCHESTER COUNTY, NEW YORK ORDER ----- IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF: (Specify) Computers Diskettes Computer Printers Computer Terminals Auto Dialers Diskettes Calling Card Computer Systems & Wire Computer Printouts Disk Drives Modems Hand Written Notes About Credit Co. " " " " Computer Service. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK TO: ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT PROOF by affidavit having been made before me this day by Det.H.Gallagher #103 ___________(Affiant) of the Town of Greenburgh Police Department that certain property, which is (stolen/unlawfully possessed, used to commit an offense...) and which constitutes evidence and tends to demonstrate that an offense has been committed and that a particular person participated in the commission of an offense will be found at the location captioned above. YOU ARE THEREFORE COMMANDED, ** (Between the hours of 6:AM - 9:00 PM / AT ANY TIME OF DAY OR NIGHT) ** ** (WITHOUT GIVING NOTICE OF YOUR AUTHORITY AND PURPOSE)** TO MAKE A SEARCH of the above described (location/person)** for the following property: (describe fully) Room # 233, 237, & 246 of the West. Marriott Courtyard and all its occupants as listed on this attached affidavit. >><< Suspects name was written here >><< AND if any such property is found, you are hereby directed to seize the same and without unnecessary delay, return it to the court, together with this warrant and a written inventory of such property subscribed and sworn by you. THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1 day of NOV. 1992 is valid and must be executed no more than ten (10) days after the date of issuance. << illegible justice's name here >> ____________________________________ Justice Name Signature ** Strike if N/A UF91B ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 14 of 19 How To Social Engineer Pizza Pizza For CNA By Major Thrill -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- I am writing this file for numerous reasons, one being that 416 is dead of any new information. Two because one day this may come in handy when you for some reason MUST do a CNA and can't get the address out of the regular CNA numbers. Let me explain why we can use Pizza Pizza for this purpose. There is a 95 per cent chance that the number you are trying to check has ordered pizza from Pizza Pizza. (If they haven't, then maybe they couldn't remember the phone number.) Pizza Pizza keeps track of who orders pizza by using a computer program. Now, when you call Pizza Pizza to order a pizza, the ask for your phone number. This phone number then is matched with your home address, which is usually there if you have ordered pizza from them before. This method is used by them to prevent prank pizza orders, and undoubtably to speed up the process and get your pizza there in 30 minutes or whatever the guarantee is. Now the question you are asking is, how do I get my hot little hands on that info for a number? Simple. You are dealing with bored feebs. The trick is to amuse their small minds enough to casually slide in a request for CNA. Here is a typical scenerio of what we have experimented with and have found to work. 1. First, set up a 3-way of all your phriends, (try to get about 5 on as a minimum.) Conferance works even better, but this will do. 2. Call Pizza Pizza, (use a divertor if you are paranoid.) and hopefully you will get a female on who is extremely bored. 3. This gets even funnier, but it works. Now talk very loudly in an English accent and say "Hullo, Your're on conferance!" "Who's this?" 4. The trick is to get them thinking they are talking to people all over the world. (One I used 3 different types of accents with one other person on the line) This usually excites them, because it is no longer monotonous answering the phone. Now here is where you get them talking, be upbeat and entertain them a bit, all the while being courteous to them and including them in the conversation. Now if you are lucky, they will be enjoying the change of pace as opposed to answering telephones and asking if you want pepsi with your order. 5. Now, if all is going well, you should ask them about their computer (tell em your phone phreaks or hackers in the beginning.) system and is it really true they can tell what address your phone number is at. 6. This can go two ways, they will either oblidge you, or think they are working at the fucking pentagon. Now, if they tell you about it, casually bring up a number you'd like to check. 7. Hopefully at this point you will have got what you called for in the first place. I even had one of them tell me how many pizza's the person ordered. But in any case do not just hang up on them after you get the number. Get their name again if you forgot it, and ask them if it would be okay to call them again. There, you got yourself an in at Pizza Pizza. Don't treat them rudely and NEVER burn your bridges. Don't be afraid to try other methods of social engineering with these people, or anyone for that matter. Social engineering saves alot of time and trouble on your part. I suggest using a payphone when social engineering for more tough-to-get info or a divertor or PBX. BTW-At last check the regular CNA offices no longer give out address. As well I understand that 241 Pizza has also implemented this computer system. Hope you enjoyed this textfile. <<-MAJOR THRILL->> This textfile is for informational purposes only. The author claims no responsibilty for the actions of the reader. This file is dedicated to all my collegues in 416. Special Greets to Arch Bishop, Lost Soul, Soltan Griss. This has been a production of The Terminal Terrorists December 24th 1992 -Merry Cristmas 416 This file may not be altered in any manner. (C) 1992 TTT Prod. ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 15 of 19 The United Phreaker's Incorporated Underground Newsline Part 1 By Arch Bishop & The Lost Avenger U.S. Phone Companies Face Built-In Privacy Hole ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of 2600 Magazine Winter 1991-1992 ] Phone companies across the nation are cracking down on hacker explorations in the world of Busy Line Verification (BLV). By exploiting a weakness, it's possible to remotely listen in on phone conversations at a selected telephone number. While the phone companies can do this any time they want, this recently discovered self-serve monitoring feature has created a telco crisis of sorts. According to an internal Bellcore memo from 1991 and Bell Operating Company documents, a "significant and sophisticated vulnerability" exists that could affect the security and privacy of BLV. In addition, networks using a DMS-TOPS architecture are affected. According to this and other documents circulating within the Bell Operating Companies, an intruder who gains access to an OA&M port in an office that has a BLV trunk group and who is able to bypass port security and get "access to the switch at a craft shell level" would be able to exploit this vulnerability. The intruder can listen in on phone calls by following these four steps: 1. Query the switch to determine the Routing Class Code assigned to the BLV trunk group. 2. Find a vacant telephone number served by that switch. 3. Via recent change, assign the Routing Class Code of the BLV trunks to the Chart Column value of the DN (directory number) of the vacant telephone number. 4. Add call forwarding to the vacant telephone number (Remote Call Forwarding would allow remote definition of the target telephone number while Call Forwarding Fixed would only allow the specification of one target per recent change message or vacant line)." By calling the vacant phone number, the intruder would get routed to the BLV trunk group and would then be connected on a "no-test vertical" to the target phone line in a bridged connection. According to one of the documents, there is no proof that the hacker community knows about the vulnerability. The authors did express great concern over the publication of an article entitled "Central Office Operations - The End Office Environment" which appeared in the electronic newsletter Legion of Doom/Hackers Technical Journal. In this article, reference is made to the "No Test Trunk." The article says, "All of these testing systems have one thing in common: they access the line through a No Test Trunk. This is a switch which can drop in on a specific path or line and connect it to the testing device. It depends on the device connected to the trunk, but there is usually a noticeable click heard on the tested line when the No Test Trunk drops in. Also, the testing devices I have mentioned here will seize the line, busying it out. This will present problems when trying to monitor calls, as you would have to drop in during the call. The No Test Trunk is also the method in which operator consoles perform verifications and interrupts." In order to track down people who might be abusing this security hole, phone companies across the nation are being advised to perform the following four steps: 1. Refer to Chart Columns (or equivalent feature tables) and validate their integrity by checking against the corresponding office records. 2. Execute an appropriate command to extract the directory numbers to which features such as BLV and Call Forwarding have been assigned. 3. Extract the information on the directory number(s) from where the codes relating to BLV and Call Forwarding were assigned to vacant directory numbers. 4. Take appropriate action including on-line evidence gathering, if warranted." Since there are different vendors (OSPS from AT&T, TOPS from NTI, etc.) as well as different phone companies, each with their own architecture, the problem cannot go away overnight. And even if hackers are denied access to this "feature", BLV networks will still have the capability of being used to monitor phone lines. Who will be monitored and who will be listening are two forever unanswered questions. Hacker Is Charged With Espionage ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Belleville News Democrat December 11, 1992 ] San Jose Calif-(AP) A 28-year old computer whiz who reportedly once tested Departement of Defense computer security proceedures has become the first alleged computer hacker to be charged with espionage. The government says that Kevin Lee Poulson stole classified military secrets should go to prison. But his lawyer calls him,"an intellectually curious computer nerd.". Poulsen of Menlo Park,Calif., worked in the mid-1980's as a consultant testiing pentegon computer security. Because of prosecution delays, he was held without bail in a San Jose jail for 20 months before being charged this week. His attorney, Paul Metzer, said Thursday that Poulson did not knowingly possess classified information. The military information had been declassified by the time prosocuters by the time Poulson obtained it, Meltzer said. Poulson was arrested in 1988 on lesser, but related, hacking charges. He disappeared before he was indicted and was re-arrested in Los Angeles is April 1991. Under an amended indictment, he was charged will illegal possession of classified documents. CRTC Orders Free Per-Call Blocking ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Bell News May 18, 1992 ] The CRTC has ordered Bell and other telephone companies under its jurisdiction to offer free per-call blocking with Call Management Service (CMS). The companies have been asked to file proposed tariffs by June 1. Implementation dates have not yet been determined. The CRTC's May 4th decision refines the orginal decision made in 1990 that allowed CMS to be offered with a $0.75 operator-assisted blocking option. Bell and other companies under the CRTC's jurisdiction, have until June 1 to file trafiffs and an action plan for the following: o Automated free per-call blocking to customers who request it in all CMS area served by DMS technology (customers will have to dial a code before placing a call) o Free per-line blocking in those CMS areas served by old technology (until they switch to DMS technology) o Free pre-line blocking for shelters of victims for domestic violence, (Please note that shelters are already exempt from the $0.75 charge). This decision simply eliminates the intermediary when placing the free call o Call Trace "on demand". This would allow customers request their line be enabled with the service. (Call Trace is a monthly subsciption service. If it were offered on demand, customers would pay for the service only when they used it. A fee for Call Trace "on demand" will be proposed in the trafiff filing of June 1. Bell is presently assessing the implications of the CRTC's decision. AT&T Begins Direct-Dial Service To 15 Former Soviet Republics, With More Circuits Than Any Other Company ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Businesswire May 19, 1992 ] NEW YORK--(BUSINESS WIRE)--AT&T Tuesday began direct-dial service to all 11 members of the Commonwealth of Independent States, previously republics of the Soviet Union, and to the states of Georgia, Lithuania, Latvia, and Estonia. This will make it easy and economical for Americans - consumers and business people alike - to reach the largest land-mass in the world, which spans 11 time zones. With more than 400 circuits, AT&T has by far the largest direct-dialing capacity of any long-distance carrier now serving the region. Americans can make direct-dialed calls to all of the more than 2000 cities in this vast area. Callers who wish to reach the 15 states served by AT&T direct-dial long-distance service should dial 011, then 7, then a city or region code, and the local number. Rates can be as low as $1.55 per minute, depending on the time of day a call is made. AT&T provides service through a combination of cable, Intelsat, and Intersputnik satellites, and other countries' facilities. This diversity of call-routing helps ensure reliability of long-distance calling, AT&T said. The 11 members of the Commonwealth of Independent States are: Russia; Ukraine; Byelorussia; Moldova; Uzbekistan; Kazakhstan; Kyrgystan; Tajikistan; Turkmenistan; Azerbaijan; and Armenia. AT&T was the first long-distance company to provide direct-dial service to frequently called areas in the old Soviet Union. The company began direct-dial service to Moscow in 1984 and Armenia in 1991. In addition, AT&T became, in 1991, the only provider of direct-dial service to Sovintel, which operates a network linking hotels and business centers in Moscow. Provision of direct-dial service is the latest example of AT&T's nearly 50-year commitment to this region. The company installed its first circuits to the Soviet Union in 1943. Between 1978 and 1985, the year Mikhail Gorbachev took office, AT&T long-distance traffic between the United States and the Soviet Union increased 280 percent. Between 1985 and 1991, the increase was nearly a thousand percent. In addition, AT&T has formed important alliances to help bring the region's communications infrastructure into the 21st century. These include a joint venture in Ukraine that will build, operate, and own a long-distance network there, and a joint venture with Dalnya Sviaz (DALS), the Russian telecommunications company, to market, sell and service telecommunications equipment. Other initiatives include an agreement with the Moscow Local Telephone Network to distribute AT&T's Spirit (r) small business communications system in Moscow, and one to provide the Kazakhstan Ministry of Posts and Telecommunications with ATT's 5ESS switches during the next 10 years to help the state increase the size of its telecommunications network. AT&T provides long-distance service to more than 250 countries worldwide, with direct-dialing to more than 190. AT&T Direct-Dial rates to former Soviet Republics Economy (2 a.m. - 7 a.m.) 1st minute: $1.70 Addl. minute: $1.55 Discount (7 a.m. - 1 p.m.) 1st minute: $1.85 Addl. minute: $1.72 Standard (1 p.m. - 2 a.m.) 1st minute: $2.25 Addl. minute: $2.01 Callers only pay for the minutes they actually talk, and are billed in one-minute increments. There is no minimum charge. Selected City Codes State City City Code 1. Russia Moscow 095 2. Ukraine Kiev 044 3. Byelorussia Minsk 0172 4. Moldova Kishinev 0422 5. Uzbekistan Tashkent 3712 6. Kazakhstan Alma-Ata 3272 7. Kyrgystan Frunze 3312 8. Tajikistan Dushambe 3772 9. Turkmenistan Ashkhabad 36322 10. Azerbaijan Baku 8922 11. Armenia Yerevan 8872 12. Georgia Tbilisi 8832 13. Luthuania Uilnius 0122 14. Latvia Riga 0132 15. Estonia Tallin 0142 To make a direct-dial call from the United States, the caller dials 011, then 7, and the city code and local number. CONTACT: AT&T, Basking Ridge Mark Siegel, 908/221-8413 (office), 201/366-6863 (home) AT&T Has Record 11 Days; Over One Billion Calls Handled ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Businesswire June 08, 1992 ] NEW YORK--(BUSINESS WIRE)--Managers at the AT&T Network Operations Center in Bedminster, N.J., had to revise their volume records Saturday following the completion Friday night of the busiest 11-day calling period in the history of the communications and computer company. Spurred by price reductions by the nation's major airlines, the AT&T long distance network handled an unprecedented 1.6 billion calls during the period, about half of which were placed to 800 service numbers, the company reported. Monday, June 1, set the all-time record, with 177.4 million calls. In all, five days during the airline fare promotion surpassed the previous record day, December 2, 1991, the Monday following last Thanksgiving, when 157.8 million calls were placed. On an average business day, the AT&T Worldwide Intelligent Network handles 135 to 140 million calls. Call volume data for the 10 busiest days on the AT&T long distance network: Date Calls (in millions) Event 6/1/92 177.4 Air Fare Promotion 6/2/92 170.7 Air Fare Promotion 6/3/92 165.2 Air Fare Promotion 6/4/92 164.1 Air Fare Promotion 5/28/92 159.6 Air Fare Promotion 12/2/91 157.8 Monday after Thanksgiving 5/29/92 157.1 Air Fare Promotion 6/5/92 156.3 Air Fare Promotion 7/8/91 156.2 Monday after July 4 1/6/92 156.0 Monday after New Year's Day CONTACT: AT&T John Skalko, 908/234-5256 (Office) or 201-729-8202 (Home) Ron Bravo, 908/234-5257 (Office) or 908/560-0424 (Home) AT&T Network Systems Unveils 5ESS(a)-2000 Switch ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Businesswire June 09, 1992 ] CHICAGO--(BUSINESS WIRE)--AT&T Network Systems Tuesday announced plans for the next generation digital switching platform that will continue the evolution of the highly successful 5ESS central office switch. As the heart of AT&T's Service Net-2000 family of products, the 5ESS-2000 platform will enable telephone companies to upgrade network infrastructure and develop the advanced services they want to offer in the 90s, while taking full advantage of existing network equipment. Plans for the 5ESS-2000 Switch include a new SONET-compatible switching module that can grow to 30 times the network capacity of today's technology, and software that will continue to improve the reliability and cost performance of the 5ESS Switch. ``Distributed intelligence has always been the hallmark of the 5ESS Switch,'' said Joseph S. Colson Jr., AT&T Network Systems vice president - Switching Systems, U.S. ``In 10 years of rapid, real-world change, this design has proven its value time and again, by allowing us to transform the 5ESS Switch and to keep pace with customers' changing requirements,'' he said. ``And in the process, we have continuously improved its quality and reliability.'' Any existing 5ESS Switch can be upgraded to the 5ESS-2000 platform with the simple software and hardware additions normally associated with growth and retrofits. ``Customers can make the changeover incrementally, when they're ready,'' said Colson. ``The concept behind the 5ESS-2000 Switch is to ensure that our customers get the competitive edge and operational efficiencies they need to keep their business healthy,'' said Colson. Highlighting the evolution to the 5ESS-2000 platform will be a new switching module, the SM-2000, with a growable switching fabric up to 30 times the capacity of current technology. The SM-2000 processor will handle well over 10 times the number of calls as today's module. The SM-2000 will not immediately replace switching modules already in service. Instead, the SM-2000 works alongside existing modules within a single 5ESS Switch. AT&T will continue to fully support all 5ESS switching modules. ``We plan for today's switching modules to continue to serve as reliable network workhorses in the 5ESS-2000 platform for years to come,'' said Colson. ``That's just one example of how our Service Net-2000 evolution protects a customer's investment while enabling growth.'' The SM-2000 will feature a SONET-compatible trunk interface, the Digital Networking Unit - SONET, initially with an STS-le interface. The DNU-S, coupled with the SM-2000 switching fabric, will provide a platform for a variety of creative network options for telephone companies looking at new services at wideband speeds. AT&T plans to begin deploying the SM-2000 switching module in 1994. AT&T also announced plans to introduce 5E9 Software for the 5ESS Switch, which will begin the transition to the 5ESS-2000 platform. ``With the 5E9(1) software, the 5ESS Switch will handle wideband data switching on the ISDN Primary Rate Interface (PRI) with fractional DS1 capabilities,'' said Colson. ``Telephone customers will be able to order any number of DS0 channels to take advantage of Nx64Kbps applications -- especially video -- as they emerge.'' The 5E9(1) release, which is scheduled for first office application in late 1993, will include the capabilities of National ISDN-2, as previously announced. Other features to be added to the 5ESS Switch through 5E9(1) Software include support for the Bellcore-specified National Intelligent Network-1 (IN1) standards, expanded Automatic Call Distributor (ACD) capabilities and more economical operations, administration, maintenance and provisioning (OA&MP). In 1994, AT&T plans to deliver 5E9(2), which will further enhance the 5ESS-2000 platform. The 5E9(2) software will offer customers a new, optional inter-processor message fabric for SM-2000s, the Quad Link Packet Switch (QLPS). This improvement to the 5ESS Switch architecture will enable the switch to increase its capacity to 1 million ``POTS'' calls. ``The most exciting news about QLPS is the high capacity message network it will enable telephone companies to implement,'' said Colson. ``The QLPS message network will be able to grow right along with the increasingly message-oriented services telephone companies will be developing for advanced intelligent networking.'' This spring marked the 10th anniversary of the installation of the first 5ESS Switch, which was placed in service in Seneca, Ill., on March 25, 1982. Since then, 5ESS Switches have been delivered to over 2,000 host sites around the world and serve over 47 million subscriber lines. 5ESS Switches operate applications ranging from local/toll switching to international gateways, and private network hubs to operator services systems and ACDs. ``Our first decade of real-world applications has proven the 5ESS Switch's consistent superiority as the best platform for changing technology and customer needs,'' said Colson. ``Ten years ago, services such as voice and data, switched and non-switched, public and private were seen as unalterably separate in the digital public switching arena,'' he said. ``Today, our 5ESS Switch architecture, through the focus of Service Net-2000, is leading the way towards the increasing bandwidth and call capacity that will facilitate the integration of formerly separate services into the same network. ``In another decade, we'll be looking at the migration of intelligence from within the switching architecture to various locations within the network, based on customer needs,'' said Colson. ``And we fully expect the 5ESS Switch to still be operating at the ce nter of it all.'' (a) 5ESS is a registered trademark of AT&T. CONTACT: AT&T Network Systems Carl Blesch, 708/290-2194 (office) or 708/665-9807 (home) Rich Meyer, 201/606-2453 (office) or 201/822-1530 (home) NCR Installs Automated Teller Machines Aboard U.S. 100th Naval Ship ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Businesswire June 03, 1992 ] WASHINGTON--(BUSINESS WIRE)--June 3, 1992--NCR Corporation announced today that it has installed NCR automated teller machines (ATM) aboard 100 U.S. naval ships as part of a multi-year program called ``ATMs At Sea.'' The most recent addition to the naval fleet, the U.S.S. George Washington aircraft carrier based in Norfolk, Va., will be equipped with 8 NCR ATMs. The company was selected over several others when the Navy requested prototypes for a pilot test in 1985. Lowered by huge cranes through torpedo loading hatches, the ATMs are installed with special shock mounts and brackets to protect the computer equipment from the pitch and roll of the ship. Through standard ATM cards and personal identification numbers, the system allows crew members to withdraw money from their paychecks, which are automatically deposited twice each month. ``The program represents a complete departure from the Navy's previous payroll disbursement plan,'' said Roger Lintern, vice president of NCR's Federal Systems Division. ``Sailors now have the ability to withdraw a portion of a paycheck without standing in lines for hours.'' Unlike common ATM machines, the on-board models will not be linked to banks or credit unions and will be used only to disburse pay. However, the Navy is considering adding a split-pay option, which would allow sailors to have part of their check directly deposited into a bank account and part of it transferred to the ship's ATM. The installation also signifies an extension of the $13.5 million contract awarded by the U.S. Navy in 1988. The original agreement called for installation of ATMs aboard 118 ships, but was recently extended to 148 due to the popularity of the units. ``As the program matured, the Navy began realizing the benefits of the ATMs in terms of security. And it requires very little time to maintain the system, allowing crew members to concentrate on other duties,'' said Lintern. Each ship is equipped with from 2 to 8 NCR 5070 Interior ATMs, an NCR TOWER 32/400 and peripherals. ``This self-contained system is accessible 24 hours a day and helps the Navy increase productivity and improve customer service while controlling costs,'' said Lintern. NCR is initially installing the technology on larger ships, such as aircraft carriers, or those with 250 or more sailors. NCR systems analysts continue to perform all training and installation services necessary to use and maintain the system. NCR, the Networked Computing Resource of AT&T, develops, markets, supports and services enterprise-wide information systems for worldwide markets. CONTACT: NCR Corp., Dayton Jim Mazzola, 513/445-6148 or Mark Willis, 216/566-7019 Computer Blackmail Lecturer Fined 500 Pounds ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Daily Telegraph October 2, 1992 ] A computer specialist who threatened to put a virus in a program of a client company in an argument over a phone bill was fined 500 pounds and ordered to pay 500 pounds costs yesterday. A jury at Newcastle upon Type Crown Court took more than six hours to reach a 10-2 majority verdict in the case of Dr.Roy Booth, who had denied blackmail. The computer studies lecturer from Fieldhouse Road, Gateshead, Tyne and Wear [in NE England], said after the hearing that his job at Newcestle University was now in jeopardy. Dr. Booth had threatened to insert a virus into a computer game of Imec, a firm for which he had worked, when it refused to pay a 400 pound telephone bill he ran up while on a one week stay in America. Instead it was deducted from his fee. The lecturer said he had expected to be paid 900 pounds. The firm agreed to pay him 450 pounds which, with the telephone bill deducted, left him with just 50 pounds. He said he had threatened to insert a computer virus in an attempt to "shake up" the company and encourage it to pay him in full. He had no intention of damaging to the program. Judge Michael Cartlidge, sentencing him accepted that the lecturer was only trying to get back money which he felt was due to him. But, he added: "You employed illegal methods to do it and you should be thoroughly ashamed of what you did." MCI Communications Unveils New International Calling Plan ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Dow Jones/Wall Street Journal News June 2, 1992] WASHINGTON -DJ- MCI Communications Corp. unveiled a new international calling plan called "MCI Around the World" which offers lower fixed-plan rates to 53 countries and places during plan hours and 5% savings off MCI's regular international rates to remaining locations. In a press release, MCI said subscribers also will receive a 5% savings when using the plan's special calling card at any time. The plan has a monthly fee of $3. AT&T Gets License To Market Moscom's Fraud Detection Pdt ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Dow Jones News Service June 1, 1992 ] PITTSFORD, N.Y. -DJ- Moscom Corp. said it has signed a one-year license agreement with American Telephone & Telegraph Co. under which AT&T will market Moscom's HackerTracker telephone fraud detection software. A company spokeswoman said terms are not being disclosed. In a press release, the company said under the agreement, which has an initial term of one year, AT&T will market HackerTracker as an AT&T product and pay Moscom license fees. The HackerTracker software, which is available immediately, is a member of the new family of telephone fraud security products and services recently unveiled by AT&T. Moscom said AT&T's list price for HackerTracker will be $1,995 per copy. AT&T Network Systems Unveils New Products For 9-1-1 Service ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Dow Jones News Service June 8, 1992 ] ORLANDO, Fla. -DJ- American Telephone & Telegraph Co.'s AT&T Network Systems unit has introduced software and equipment that will allow local telephone companies and other network providers to give enhanced 9-1-1 emergency calling services to more people nationwide. In a press release, the company said seven new products are being offered to local telephone companies, private networks and the nation's public safety agencies. The goal is to strengthen enhanced 9-1-1 systems in metropolitan areas while extending the availability of enhanced 9-1-1 service to small towns, university campuses, military bases and airports. The software and equipment introduced today include: 5ESS Switch enhancements, Automatic Location Identification/Database Management System hardware and software, the ''ALIVE'' Database System, New Public Safety Answering Point Equipment, Intelligent Public Safety Answering Point Display, Computer-aided Dispatch System, and an ISDN public Safety Answering Point System. The company said the 5ESS Switch enhancements, ALIVE database system, small answering point system and computer-aided dispatch system are available now, while the new ALI/DMS database system, intelligent display and ISDN system will be available later this year. Executive TeleCard, Eurocard Iceland Sign Calling Agreement ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Dow Jones News Service May 19, 1992 ] NANUET, N.Y. -DJ- Executive TeleCard Ltd. said it has entered into a pact under which its direct-dial inter/intracountry calling service will be made available to Eurocard Iceland Kreditkort HF.'s 30,000 credit card customers. Terms of the agreement were not disclosed. Eurocard Iceland is the second largest credit card company in Iceland, the company said in a press release. MCI Cable Cut Blocks GTE California Out-Of-State Calls ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Dow Jones News Service June 5, 1992 ] THOUSAND OAKS, Calif. -DJ- MCI Communications Corp. said it experienced a major fiber-optic cable cut near Rialto, Calif., around noon Thursday. In a press release, MCI said the cable cut prevented GTE California customers who subscribe to MCI's long-distance service from making long-distance calls out of state and to points east of Rialto. Customers were also unable to receive calls from out of state or east of Rialto. Although the incident immediately impacted the Palm Springs, Calif. area, GTE received subsequent trouble reports about MCI long- distance service from customers in the Inland Empire. The event did not affect local calling. The company said the cable cut occurred when an unidentified person accidentally cut a major MCI fiber-optic cable, reportedly near Rialto. A spokesman for GTE said service was restored at about 5:15 p.m. yesterday. Cincinnati Bell Telephone To Offer Caller ID Service ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Erie Daily Times, August 7, 1992 ] COLUMBUS, Ohio (AP) - Cincinnati Bell Telephone Co. apparently will be the first telephone company in Ohio to offer Caller ID service, which allows customers to view the numbers of calling parties. The Public Utilities Commission of Ohio approved Cincinnati Bell's application Thursday. The commission also granted the company's request to offer several related service, including a costfree option that allows a caller to prevent his or her telephone number from being displayed to the called party. Caller ID would cost $6.40 a month for a residential customer while businesses would have to pay $8.50. Craig Glazer, PUCO chairman, said the decision includes a stipulation that telemarketing firms, often criticized for slaes solicitations at late or inconvenient hours, may not shield their numbers. "The commission took special steps to protect customers from telemarkets by denying them blocking services," he said. The decision also protects the privacy needs of police, domestic violence centers and other that have strategic, safety or other legitimate reasons for not wanting numbers disclosed. Various police and domestic violations, along with the Ohio Office od the Consumers' Counsel opposed Caller ID initially. At the time, the plan had no provision for call blocking. Beth Gianforcaro, spokeswoman for OCC, said the package approved for CIncinnati Bell addresses that concern. "It appears they recognized the consumer protection we wanted," she said. Thursday's decision requires Cincinnati Bell to educate its customers regarding the privacy options at least 60 days before offering the new services to regular customers and 90 days before offering them to subscribers with unlisted numbers. The commission also required the company to provide quarterly reports to the PUCO for a year for an evaluation of the new services in terms of effectivesness and benefits to the public. Other services authorized by the decision include call blocking. It allows the customer to divert calls from up to six numbers, placed on a screening list, to a recorded announcement. Bell Canada's Internal Networking Centre ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Graduate Computer World Fall, 1992 ] The network is controlled and managed by two command centres - once in Toronto, Ontario, and one in Dorval, Quebec. Each command centre manages the various locations and internal communications within its respective province. "In total, there are 30,000 people who have some kind of connectivity to the network," said Louise Roberge, Bell's director of network operations. Roberge says the network has evolved significantly from the says when it was primarily terminals accessing mainframes. "The first step in the evolution was putting all the controllers on a MUX (multiplexer) and linking our major sites to the data centre," said Ritch Lodge, a technical manager at Bell. "Like many large companies, we use a private T1 (dedicated to Bell Canada's data communication) megaroute facilities. Once you have a certain amount of traffic it pays to have dedicated facilites," says Lodge. He cautions that a distinction has to be made between public facilities and dedicated (private) facilites such as Bell's internal network. "It's kind of an internal affair." Lodge continues. "We in data operations have to ask phone operations to install a dedicated T1 for our own internal use. So in a way, we become our own client when we get a T1 link between Montreal and Toronto, or even between here and downtown." The T1 (1.544 Mbps) network allows for a great deal of flexibility in terms of growth, says Lodge. "A link might not be busy right now, but when you add components that we're planning to add, the flow of traffic will increase significantly. For example, there isn't much traffic between here and Barrie right now, but we're putting in Huntsville, which is going to go through Barrie to get to Huntsville," he said. "We build highways between systems," adds Roberge. "We're building the highways and keeping the highways clean and humming. And when they get congested, we add to them; we widen them or whatever. Bell's internal network consists of two different backbone networks. The first is token-ring/SNA which, according to Lodge, is in the mainframe world of Big Blue and Amdahl. This network supports large corporate applications such as big orders, and electronic mail (there are at least 20,000 employees using Bell's internal electronic office services). The company's other network technology is Ethernet which functions primarily for operational support systems (OSS). These are systems that help the internal functions of Bell Canada run smoothly. For example, Bell has a system, called the Mechanized Frame Administration System, which tells its technicians exactly where to run cable pairs. Interoperability between these networks is provided by routers which allows hosts on either technology to communicate using common protocols such as OSI or TCP/IP. "Each of these systems, or individual applications, on the Ethernet runs on a dedicated minicomputer base such as the VAX 8000 and 9000," Lodge said. "We distribute the minicomputers a little bit closer to the client community using those hosts. They're administered by their own client groups, however. THe people who are managing those systems are our clients." With such a large network, it's not suprising that the company has a large group to make sure the internal networks keep humming smoothly. The Bell network operations group is about 160 strong and falls under the auspices of systems operations. In addition to network operations, this group also consists of computer operations and client services. The computer operations group has been pared down significantly in recnet years, according to Lodge. "We've done a lot of what we call automated operations (auto ops), which means we use systems to run systems," he explains. "So a problem will be not detected by an operator, but by auto ops. It will detect a problem and even try to take some corrective action. Only as a final recourse will you need human intervention. It will monitor things like memory utilization - any hardware problems." There is also a section called Help Desk, which can be used by anyone who encounters problems when trying to use the internal network to access the mainframes in the data centre or any OSS. Once they determine the nature of the problem, the Help Desk staff can fix it through software commands or, if need be, by dispatching someone to fix it. "If the Help Desk can't help, a trouble ticket will be logged which is then channeled to technical groups for action. "We have pro-active trouble monitoring," Lodge says. "They'll see the link between Ottawa and Toronto go down and be able to tell before a client calls and says, "I just lost the connection to my computer." They'll be able to tell the client: "We've lost the T1 and we're working on it." "It's the network that's the problem we can help with. This is providing you with a pipe. Once you get in on this side, we want you to get to the far side with the right data. If you're not getting to the far side, we use these tools to find out why not. Is it the T1 that's bad? Is it the concentrator? Is it the bridge or end node that's bad? It's just standard troubleshooting techniques -- following the trouble from point A to point B." Federal Agents Raid Dorm, Seize Computer Equipment ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Houston Chronicle December 17, 1992 ] The Secret Service has raided a dorm room at Texas Tech University, seizing the computers of two Houston-area students who allegedly used an international computer network to steal computer software. Agents refused to release the names of the two area men and a third from Austin, who were not arrested in the late-morning raid Monday at the university in Lubbock. Their cases will be presented to a grand jury in January. They are expected to be charged with computer crime, interstate transport of stolen property and copyright infringement. "The university detected it," said Resident Agent R. David Freriks of the Secret Service office in Dallas, which handled the case. He said that Texas Tech computer system operators contacted the Secret Service when personal credit information was found mixed with the software mysteriously filling up their fixed-disk data storage devices. The raid is the first to fall under a much broader felony definition of computer software piracy that could affect many Americans. This October revision to the copyright law was hotly debated by computer experts, who contended that it sets the felony threshold far too low. Agents allege that the three used a chat system hosted on the Internet computer network, which connects up to 15 million people in more than 40 nations, to make contacts with whom they could trade pirated software. The software was transferred over the network, into Texas Tech's computers, and eventually into their personal computers. The Secret Service seized those three personal computers and associated peripherals which an agent valued at roughly $5,000. The software Publishers Association, a software industry group chartered to fight piracy, contends that the industry lost $1.2 billion in sales in 1991 to pirates. Although these figures are widely questioned for their accuracy, piracy is widespread among Houston's 450-plus computer bulletin boards, and even more so on the global Internet. "There are a lot of underground sites on the Internet run by university system administrators, and they have tons of pirated software available to download -- gigabytes of software," said Scott Chasin, a former computer hacker who is now a computer security consultant. "There's no way that one agency or authority can go through and try to sweep all the bad software off the Internet, because the Internet's too big." The mission of the Secret Service does not normally include the pursuit of software piracy, but rather the use of "electronic access devices" such as passwords in the commission of a crime. This gives the service purview over many computer and telecommunications crimes, which often go hand-in-hand, with occasional bleedover into other areas. Freriks said that the investigation falls under a revision of the copyright laws that allows felony charges to be brought against anyone who trades more than 10 pieces of copyrighted software -- a threshold that would cover many millions of Americans who may trade copies of computer programs with their friends. "The ink is barely dry on the amendment, and you've already got law enforcement in there, guns blazing, because somebody's got a dozen copies of stolen software," said Marc Rotenberg, director of Computer Professionals for Social Responsibility, in Washington, D.C. "That was a bad provision when it was passed, and was considered bad for precisely this reason, giving a justification for over-reaching by law enforcement." Freriks noted that the raid also involved one of the first uses of an expanded right to use forfeiture against computer crime, although he was unable to state from where this authority evolved after a civil rights lawyer questioned his assertion that it was contained in the copyright law revision. "One of our complaints has always been that you catch 'em, slap 'em on the wrist, and then hand back the smoking gun," he said. "Now all that equipment belongs to the government." AT&T's Fight Against Toll Fraud Continues ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Information Week June 19, 1992 ] AT&T is giving businesses a new way to fight telephone fraud and abuse. The long-distance carrier is offering a calling card that allows corporate customers to preselect specific phone numbers, area codes, or countries that can be called by the card's user. Non-designated calling areas cannot be accessed. The card, which allows managers to designate up to 50 possible calling combinations, will be available for free this year. Beginning next year, AT&T will charge a service fee for the card. Department Store Computer Fraud ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Information Week August 3, 1992 ] The US Attorney's Office in Sacramento, California has announced an indictment against a Fresno department store for using a 'special computer program' to alter its financial records. The store, Gottschalks, has pled guilty to three criminal counts and has agreed to pay 1.5 million dollars in fines for taking illegal tax deductions and violating securities exchange laws. The store reportedly developed the program to overstate sales, supposedly by nearly half a million dollars in one quarter, allowing it to claim a profit when it was really operating at a loss. Telcoms Ruling Sparks Legal Protest ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Network World July/August, 1992 ] The June 12 ruling of the Canadian Radio-telecision and Telecommunications Commission (the CRTC) opening up the long-distance telephone service market has touched off a flurry of action. Bell Canada and its allies have begun fighting the decision, Telecom Decision CRTC 92-12. Stentor Telecom Policy Inc., the national government relations arm of Canada's major telephone companies (telcos), is considering a petition to the Federal Cabinet. Meanwhile, Bell Canada has filed an application with the Federal Court of Appeal for leave to appeal the CRTC decision. And it has called for a freeze on parts of the decision. "While the Court can rule on the proper legal principles to be applied, Cabinet could take into account broader policy implications such as the harm caused to Canada's competitiveness by the impositiion of substantial additional costs," Bell Canada said in a press release. At press time, there were reports that another respondent in the hearings leading to the decision, British Columbia Telephone Co (BC Tel), planned to file a similar application to the Federal Court. Canada's largest union of telephone employees, the Communications and Electrical Workers Of Canada, has also announced plans to file an appeal with the Federal Cabinet against the decision. Its president, Fred Pomeroy, has blasted the CRTC ruling as "ireesponsible in the extreme." The union also plans to approach the Telecommunications Workers Union, which represents employees at BC Tel., and the Atlantic Communications Workers Union in Nova Scotia for their support. These actions are the latest moves by the telcos to prevent the opening up of the long-distance telephone market. In the nearly one year that the CRTC was deliberating the evidence presented to it on this issue, the telcos had stepped up their battle. They has announced rate cuts frequently - to the point where CRTC Chairman Keith Spicer said, in announcing the ruling, that the mere threat of competition had forced the telcos to reduce their rates. At the end of April, Bell Canada chairman and CEO Jean Monty warned employees that a decision unfavourable to Bell Could lead to layoffs such as those which the US telephone companies suffered after the 1984 court-ordered breakup of AT&T. And Raymond Sy Cyr, chairman of Bell Canada's parent company, Montreal, Quebec based BCE Inc., warned that competition in long-distance phone service could lead to the doubling of local residential rates, to $25 a month. According to him, Bell Canada loses $1.6 billion a year on local services but this is offset by revenues from long-distance calls. "For every $100 miilion (of long-distance revenue), we make $66 million profit," he was quoted as saying to the press. "If we eventually lost $1 billion a year to Unitel, the (local) rates would have to go up by $666 million. "Prior to that, executives from several telephone companies (telcos) had publicly blamed the CRTC for unduly restricitng them and for delaying long-sought price cuts. But the fur really began to fly after June 12. Prior to announcing its decision to appeal the decision, Bell Canada began taking out a series of advertisements in the media slamming the decision but saying it agrees to competition. "Competition in long distance should favour consumers. Not competitors", says it ads, which also claim that Bell is being hard done by because it has to bear most of the costs for modifying its network to allow competitors access. Unitel's response, which has tickled some users pink, has been a series of ads showing a baby in a bonnet wailing and pointing to another playing with a telephone. The headline reads, "It's tough when you've been an only child for all these years." Both sides are taking this latest battle seriously, preparing their cases. Bell would do well to remember, however, that the hearings saw what amounted to a nation-wide user revolt, with both business and residential users testifying in drives about the benefits of competition in the long-distance phone market. Unbreakable Network Security From Canadian Firm ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Network World July/August, 1992 ] An inexpensive hardware product claimed to provide unbeatable computer network communications security has been announced by Belleville, Ont. - based Quince Network Confidentiality Equipment Inc. This is SecurCom, a device which encypts and decrypts traffic to and from a computer. It plugs into your computer's network port, and does not require changes to you software or hardware. SecurCom's coding system is based on the principle of the "one time" pad. Here is how this works: the sender and receiver of a message each has the electronic equivalent of a writing pad. On each sheet of this pad are four billion numbers printed at random, each consisting of several digits to a particular order. These numbers are the keys. The keys are used to encode and decode your transmission. Once a page has been used, it is tron off and discarded. Or, in electronic terms, wiped. The pages are generated every seven seconds by SecurCom. The keys are taken from a universe of 18.5 thousand billion stored on a chipset built around a digital gate array and analog ASICS (application specific integrated circuits). Each of these 18.5 thousand billion keys is equally probable. What this means is that each of them has an equal chance of being selected. This ensures that the selection of the four billion keys is fully random. Statistically, the same key can reappear every 1,000 years with a probability of one in four billion. This security is of a very high level; the catch is that both the sender and receiver must use the same page. SecurCom solves this problem by ensuring that, every seven seconds, a new key is simultaneously adopted by all the SecurCom systems on the network. Computers joining the network have these seven seconds to synchronize to the correct encryption key. Synchronization involves the transmission of synchronizing data, which allows all the SecurComs on the network to calculate the correct key being used at the time. "It does not involve transmitting the key on the network," said Gregg A MacNaughton, marketing product manager at Quince. "If someone were to access the network, they would not be able to see the key." The domain concept is used - users in a particular department can build a domain of their own consisting of computers in that department. SecurCom lets corporations build multiple domains. Internal communications between computers in each domain are fully free, but communications with the outside can only be made through a defined intercommunications guard device. The guard device, a modified SecurCom device, allows or disallows communications between different domains based on various criteria set by the security manager, such as the address of a PC, on the network. THe use of the domain concept helps limit the spread of a computer virus on a network because the infection will be contained within the afected domain. "If data on an infected application is encryted, it can only be received by a computer which can accept that encrypted information," MacNaughton said. "So a virus on a non-encrypted form will not be able to pass through a domain." He added that this makes eradication of a virus easier. "Instead of having to look at the whole network, you just have to find out which computers are in the infected domain and which ones can communicate with that domain." Other features of SecurCom: o You can run protected and unprotected PCs on the same network; o Fault tolerance - a failed device does not send messages unencrypted; o Encryption is automatic and cannot be bypassed; o Tamper-resistance circuitry is used; o Encrypts at full LAN bandwidth; o Claimed to have no impact on performanace under normal operating conditions; o Software, hardware and protocol independent; and o Initiated on power-up. Alpha testing of the SecurCom device has been completed, and beta testing will begin this month (July). Beta test sites will be key banks in the UK, US and Switzerland. The first SecurCom devices, for Ethernet local area networks (LANs), will be available in Q4; Token-Rink versions will be rolled out in Q1, 1993, and an intercommunications guard, which is the modified SecurCom, will be out by the end of this year. The Ethernet products will be listed at less than $750 retail, MacNaughton said. AT&T Opens Network Management Group ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes, May 11, 1992 ] NEW YORK, NEW YORK, U.S.A., 1992 MAR 11 (NB) -- AT&T will take-on the TeleConnect joint venture and British Telecom's Synovus group as a manager of international computer networks. J.P. Morgan, the New York investment bank founded in the 19th century, will be among its first customers. Under the three-year Morgan contract, AT&T will install and manage a high-speed network that connects the bank's existing local computer networks on four continents. The value of the contract is about $8 million, AT&T said. Many of the services are being provided by Istel, a British company owned by AT&T. AT&T acknowledged that British Telecom signed a deal in January to manage another of Morgan's networks. AT&T said its managed network services in Europe offer data networking capability and include value-added services such as network design, provisioning, consolidated billing and network management. The services can link different communications standards and regulations, equipment and systems from more than one vendor. The services also offer multiple-vendor billing, and also address cultural, language and time-zone problems. They are based on enhanced versions of AT&T's Accunet data service, now available between 7 Western European countries and due to be expanded elsewhere in Europe, as well as AT&T's Accumaster Management Services. AT&T said it will also set up a global network management center in the Netherlands by the end of 1992. BellSouth Leads Earnings Parade ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes July 22, 1992 ] ATLANTA, GEORGIA, U.S.A., 1992 JULY 22 (NB) -- Proving it is possible to make good profits with a regulated utility, BellSouth reported that its earnings rose 25 percent for the quarter ending in June, the best performance among the regional Bell companies. The company posted profits of $458.5 million, up from $365.3 million a year ago, and Chairman John L. Clendenin gave credit to a strong performance in its basic telephone network. The Southeastern economy has grown faster than the rest of the country, but BellSouth remains under rate-of-return regulation in most states, and has only now begun pressing hard for price caps. The company's cellular phone business also showed gains. Elsewhere GTE, whose local networks are larger than any of the regional Bells, but more dispersed around the country, said its quarterly earnings rose 13.2 percent, to $446 million, for the quarter. This came despite what Chairman Charles Lee called a "soft economy." GTE is now the second-largest cellular operator in the US. US West, which serves the mountain states, saw a profit rise of just 12 percent, to $309.5 million. The states it serves have been hurt by the nationwide recession, which has depressed prices of basic commodities. The company's revenues were flat compared to a year ago, but Chairman Richard McCormick called the performance "a solid quarter." In other news involving US West, the company extended its Minitel services through a deal with Tribune Publishing of Idaho. That company will offer electronic access to its four western Washington newspapers over US West's Community Link service in Seattle. US West called this deal the first between a newspaper vendor and a regional Bell company, but in fact BellSouth and the Atlanta Newspapers also had a brief joint-venture, from which the newspaper broke away. The company's press statement noted that Community Link in Seattle is still in the test-market stage. British Telecom Helps Banks Combat Plastic Card Fraud ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes July 22, 1992 ] LONDON, ENGLAND, 1992 JUL 22 (NB) -- Barclays and Natwest Bank, two of the UK's "Big Five" banks, have teamed up with British Telecom (BT) to cut the cost of plastic card fraud, which last year cost the banks a total of UKP 65 million. With immediate effect, BT has cut pricing on its Global Network Services (GNS) Cardway technology, an online system that allow plastic card transactions to be validated in real time. Cardway units using the new charging system should be in use during the fall of this year. GNS Cardway works with an electronic funds transfer at point of sale (EFTPOS) unit sitting in the retailer's premises in place of the usual offline computer EFTPOS terminal. Every time a transaction is processed through the terminal, a call is placed over a quick-connect toll-free telephone line and the transaction given the go/no-go signal. The introduction of a new charging system for GNS Cardway, especially the use of a toll-free phone number, allows BT to set a flat-rate charging system for the service, without the unknown costs associated with a per-transaction phone call system. BT expects a lot of merchants will take the new GNS Cardway option through their bank -- the telecom giant is planning to install around 40,000 terminals next year alone. Announcing the low-cost GNS Cardway scheme, Peter Cook, BT GNS' product and marketing manager, said that the Cardway link will ensure a faster turnaround of data, which will benefit both retailers and their customers. "It will, of course, help reduce the incidence of fraud and its resulting costs which are inevitably passed on to the shopping public," he said. Computer Access Arrests In New York ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes November 3, 1992 ] GREENBURGH, NEW YORK, U.S.A., 1992 NOV 3 (NB) -- The Greenburgh, New York Police Department has announced the arrest of three individuals, Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18 for the alleged crimes of Unauthorized Use Of A computer and Attempted Computer Trespass, both misdemeanors. Also arrested was Jason A. Britain, 22 in satisfaction of a State of Arizona Fugitive From Justice warrant. The arrests took place in the midst of an "OctoberCon" or "PumpCon" party billed as a "hacker get-together" at the Marriott Courtyard Hotel in Greenburgh. . The arrests were made at approximately 4:00 AM on Sunday morning, November 1st. The three defendants arrested for computer crimes were granted $1,000 bail and will be arraigned on Friday, November 6th. Newsbytes sources said that the get together, which had attracted up to sixty people, had dwindled to approximately twenty-five when, at 10:00 Saturday night, the police, in response to noise complaints arrived and allegedly found computers in use accessing systems over telephone lines. The police held the twenty-five for questioning and called in Westchester County Assistant District Attorney Kenneth Citarella, a prosecutor versed in computer crime, for assistance. During the questioning period, the information on Britain as a fugitive from Arizona was obtained and at 4:00 the three alleged criminal trespassers and Britain were charged. Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes that the investigation is continuing and that no further information is available at this time. (Barbara E. McMullen & John F. McMullen/19921103) Conflicting Stories In 2600 Raid; CRSR Files FOIA ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes November 11, 1992 ] WASHINGTON, D.C., U.S.A., 1992 NOV 11 (NB) -- In the on-going investigation of possible Secret Service involvement in the Friday, November 6th ejection of attendees at a "2600 meeting" from the premises of the Pentagon City Mall, diametrically opposed statements have come from the same source. Al Johnson, chief of security for the Pentagon City Mall told Newsbytes on Monday, November 9th "No one said that we were acting on behalf of the Secret Service. We were merely enforcing our regulations. While the group was not disruptive, it had pulled tables together and was having a meeting in our food court area. The food court is for people eating and is not for meetings. We therefore asked the people to leave." On the same day, Johnson was quoted was quoted in a Communications Daily article by Brock Meeks as saying "As far as I'm concerned, we're out of this. The Secret Service, the FBI, they're the ones that ramrodded this whole thing." Newsbytes contacted Meeks to discuss the discrepancies in the stories and were informed that the conversation with Johnson had been taped and was available for review. The Newsbytes reporter listened to the tape (and reviewed a transcript). On the tape, Johnson was clearly heard to make the statement quoted by Meeks. He also said "maybe you outta call the Secret Service, they're handling this whole thing. We, we were just here", and, in response to a Meeks question about a Secret Service contact, "Ah.. you know, I don't have a contact person. These people were working on their own, undercover, we never got any names, but they definitely, we saw identification, they were here." Newsbytes contacted Johnson again on the morning of Wednesday, November 11 and asked him once again whether there was any Secret Service involvement in the action. Johnson said "No, I told you that they were not involved." When it was mentioned that there was a story in Communications Daily, quoting him to the contrary, Johnson said "I never told Meeks that. There was no Secret Service involvement" Informed of the possible existence of a tape quoting him to the contrary. Johnson said "Meeks taped me? He can't do that. I'll show him that I'm not fooling around. I'll have him arrested." Johnson also said "He asked me if the Secret Service was involved; I just told him that, if he thought they were, he should call them and ask them." Then Johnson again told Newsbytes that the incident was "just a mall problem. There were too many people congregating." [NOTE: Newsbytes stands by its accurate reporting of Johnson's statements. It also affirms that the story by Meeks accurately reflects the material taped during his interview] In a related matter, Marc Rotenberg, director of the Washington office of Computer Professionals For Social Responsibility (CPSR) has announced that CPSR has filed a Freedom of Information Act (FOIA) request with the Secret Service asking for information concerning Secret Service involvement in the incident. Rotenberg told Newsbytes that the Secret Service has 10 days to respond to the request. He also said that CPSR "is exploring other legal options in this matter." The Secret Service, in earlier conversations with Newsbytes, has denied that the mall security was working on its behalf. In the incident itself, a group attending the informal meeting was disbanded and, according to attendees, had property confiscated. They also contend that security guards took film from someone photographing the confiscation as well as a list that someone was making of the guard's names. In his November 9th conversation with Newsbytes, Johnson denied that security personnel took away any film or lists and further said "We did not confiscate any material. The group refused to own up to who owned material on the tables and in the vicinity so we collected it as lost material. If it turns out that anything did belong to any of those people, they are welcome to come in and, after making proper identification, take the material." 2600 meetings are promoted by 2600 Magazine: The Hacker Quarterly and are held on the evening of the first Friday of each month in public places and malls in New York City, Washington, Philadelphia, Cambridge, St. Louis, Chicago, Los Angeles and San Francisco. They are regularly attended by a variety of persons interested in telecommunications and so-called "hacker issues". (Barbara E. McMullen & John F. McMullen/19921111) Confusion About Secret Service Role D.C. "Raid" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes November 7, 1992 ] WASHINGTON, D.C., U.S.A., 1992 NOV 7 (NB) -- In the aftermath of an action on Friday, November 6th by members of the Pentagon City Mall Police and police from Arlington County, VA in which those attending a 2600 meeting at the mall were ordered from the premises, conflicting stories continue to appear. Attendees at the meeting have contended to Newsbytes that members of the mall police told them that they were "acting on behalf of the Secret Service.". They also maintain that the mall police confiscated material from knapsacks and took film from someone attempting to photograph the action and a list of the names of security officers that one attendee was attempting to compile. Al Johnson, chief of security for the mall, denied these allegations to Newsbytes, saying "No one said that we were acting on behalf of the Secret Service. We were merely enforcing our regulations. While the group was not disruptive, it had pulled tables together and was having a meeting in our food court area. The food court is for people eating and is not for meetings. We therefore asked the people to leave." Johnson denied that security personnel took away any film or lists and further said "We did not confiscate any material. The group refused to own up to who owned material on the tables and in the vicinity so we collected it as lost material. If it turns out that anything did belong to any of those people, they are welcome to come in and, after making proper identification, take the material." In a conversation early on November 9th, Robert Rasor, Secret Service agent-in-charge of computer crime investigations, told Newsbytes that having mall security forces represent the Secret Service is not something that was done and, that to his knowledge, the Secret Service had no involvement with any Pentagon City mall actions on the previous Friday. A Newsbytes call to the Arlington County police was returned by a Detective Nuneville who said that her instructions were to refer all questions concerning the matter to agent David Adams of the Secret Service. She told Newsbytes that Adams would be providing all information concerning the involvement of both the Arlington Police and the Secret Service in the incident. Adams told Newsbytes "The mall police were not acting as agents for the Secret Service. Beyond that, I can not confirm or deny that there is an ongoing investigation." Adams also told Newsbytes that "While I cannot speak for the Arlington police, I understand that their involvement was due to an incident unrelated to the investigation." Marc Rotenberg, director of the Washington office of Computer Professionals for Social Responsibility (CPSR), told Newsbytes "CPSR has reason to believe that the detention of people at the Pentagon City Mall last Friday was undertaken at the behest of the Secret Service, which is a federal agency. If that is the case, then there was an illegal search of people at the mall. There was no warrant and no indication of probable illegal activity. This raises constitutional issues. We have undertaken the filing of a Freedom of Information Act (FOIA) request to determine the scope, involvement and purpose of the Secret Service in this action." 2600 meetings are held on the evening of the first Friday of each month in public places and malls in New York City, Washington, Philadelphia, Cambridge, St. Louis, Chicago, Los Angeles and San Francisco. They are promoted by 2600 Magazine: The Hacker Quarterly and are attended by a variety of persons interested in telecommunications and so-called "hacker issues". The New York meeting, the oldest of its kind, is regularly attended by Eric Corley a/k/a Emmanuel Goldstein, editor and publisher of 2600, hackers, journalists, corporate communications professionals and other interested parties. It is known to have been the subject of surveillance at various times by law enforcement agencies conducting investigations into allegations of computer crime. Corley told Newsbytes "While I'm sure that meetings have been observed by law enforcement agencies, this is the only time that we have been harassed. It's definitely a freedom of speech issue." Corley also that he plans to be at the December meeting in Washington "to insure that it doesn't happen again." DELPHI Online Service Announces Full Access to the Internet ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes December 9, 1992 ] Cambridge MA, December 9, 1992 -- DELPHI, an international online service, today announced full access to the Internet including real-time electronic mail, file transfers with "FTP," and remote log-ins to other Internet hosts using "Telnet." With this announcement, DELPHI becomes the only leading consumer online service to offer such a wide variety of Internet features. Russell Williams, DELPHI's general manager, explains the significance of this announcement. "Prior to now, anyone interested in accessing the Internet had a very limited number of options. In most cases you had to be connected directly through your company or school. DELPHI is now an important low-cost access option available to home computer users. Anyone can connect to DELPHI with a local call from over 600 cities and towns throughout the US and in many other countries." The Internet is considered the world's largest computer network. It is comprised of thousands of companies, colleges, schools, government agencies, and other organizations. There are currently an estimated 4 million users. "This incredible collection of resources will mean better and more specialized services for all users" adds Mr. Williams. "For example, users can take electronic courses conducted by leading universities, access databases and reports from government agencies, and get product information and support directly from companies. There are also mailing lists and discussion groups for almost every special interest imaginable. Electronic mail can be used to send private messages to anyone on the Internet and even many commercial networks like Compuserve and MCI Mail." DELPHI's connection to the Internet works both ways: In addition to offering access out to other networks, DELPHI provides value-added services to people already on the Internet. Any user of the Internet can access DELPHI to use services such as Grolier's Academic American Encyclopedia, the Dictionary of Cultural Literacy, Reuters and UPI newswires, stock quotes, computer support, travel reservations, special interest groups, real-time conferencing, downloadable programs, and multi-player games. All these services can be reached through the Internet simply by joining DELPHI and then telnetting to the address "delphi.com" via the commercial Internet. In order to help new users with questions related to the Internet, DELPHI has an area online to provide support. The Internet Special Interest Group (SIG) includes an active message forum where members and staff can exchange useful information. Comprehensive guide books, downloadable software, and information files are also available. DELPHI has two membership plans: the 10/4 Plan is $10 per month and includes the first 4 hours of use; additional use is $4 per hour. The 20/20 Advantage Plan is $20 per month, includes 20 hours of use, and is only $1.80 per hour for additional time. The Internet service option is an extra $3 per month and includes a generous transfer allocation of 10 megabytes (the equivalent of about 3,000 type-written pages). Access during business hours via Sprintnet or Tymnet carries a surcharge. Through a special trial membership offer, anyone interested in learning more about DELPHI and the Internet can receive 5 hours of access for free. To join, dial by modem, 1-800-365-4636 (current Internet users should telnet to "delphi.com" instead). After connecting, press return once or twice. At the Username prompt, enter JOINDELPHI and at the password prompt, type INTERNETSIG. DELPHI Member Service Representatives can also be reached by voice at 1-800-695-4005. DELPHI is a service of General Videotex Corporation, a leading developer of interactive and online services based in Cambridge, Massachusetts. For more information, call either of the above numbers or send email to Walt Howe, Internet SIG manager at walthowe@delphi.com. Further Disclosures In 911/"Legion of Doom Case" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes October 20, 1992 ] NEW YORK, NEW YORK, U.S.A., 1992 OCT 20(NB) -- In a discussion with Newsbytes, Sgt. Kurt Leonard of the Chesterfield County, Virginia Police Department disclosed further information concerning the on-going investigation of alleged 911 disruption throughout the eastern seaboard of the United States by individuals purporting to be members of the hacker group "The Legion of Doom" (LOD). Leonard identified the individual arrested in Newark, New Jersey, previously referred to only as "Maverick", as Scott Maverick, 23. Maverick has been charged with terroristic threats, obstruction of a government function, and illegal access to a computer. He is presently out on bail. Leonard said that David Pluchino, 22 was charged to the same counts as Maverick and an additional count of the possession of burglar tools. Leonard said that Pluchino, the subject of a 1990 Secret Service "search and seizure" action under the still on-going "Operation SunDevil" investigation" possessed information linking him with members of the Legion of Doom. The Legion of Doom connection has become the subject of controversy within the online community. Although Maverick has been quoted as saying that he is a member of the group and that that the group's intent was "to attempt to penetrate the 911 computer systems and inflect them with viruses to cause havoc", members of the group have disavowed and connection with those arrested. "Lex Luthor", one of the original members of the group told Newsbytes when the initial report of the arrests became public "As far as I am concerned the LOD has been dead for a couple of years never to be revived. Maverick was never in LOD. There have been 2 lists of members (one in phrack and another in the lod tj) and those lists ar the final word on membership. We obviously cannot prevent copy-cats from saying they are in lod. When there was an LOD, our goals were to explore and leave systems as we found them. The goals were to expose security flaws so they could be fixed before REAL criminals and vandals such as this Maverick character could do damage. If this Maverick character did indeed disrupt E911 service he should be not only be charged with computer trespassing but also attempted murder. 911 is serious business." Lex Luthor's comments, made before the names of the arrested were released, were echoed by Chris Goggans, a/k/a "Erik Bloodaxe, and Mark Abene, a/k/a Phiber Optik, both ex-LOD members and by Craig Neidorf who chronicled the membership of LOD in his electronic publication Phrack. When the names of the arrested became public, Newsbytes again contacted Lex Luthor to see if the names were familiar. Luthor replied "Can't add anything, I never heard of them." Phiber Optik, a New York resident told Newsbytes that he remembered Pluchino as a person that ran a computer "chat" system called "Interchat" based in New Jersey. Phiber added "They never were LOD members and Pluchino was not known as a computer hacker. It sounds as though they were LOD wanabees who are now, by going to jail, going to get the attention they desire." A law enforcement official, familiar with the SunDevil investigation of Pluchino, agreed with Phiber, saying "there was no indication of any connection with the Legion of Doom." The official, speaking under the condition of anonymity, also told Newsbytes that the SunDevil investigation of Pluchino is still proceeding and, as such, cannot be commented on. Leonard also told Newsbytes that the investigation has been a joint effort of New Jersey, Maryland and Virginia police departments and said that, in conjunction with the October 9th 2:00 AM arrests of Pluchino and Maverick, a simultaneous "search and seizure" operation was carried out at the Hanover, Maryland home of Zohar Shif, a/k/a "Zeke", a 23 year-old who had also been the subject of a SunDevil search and seizure. Leonard also said that, in addition to computers taken from Pluchino, material was found "establishing a link to the Legion of Doom." Told of the comments by LOD members that the group did not exist anymore, Leonard said "While the original members may have gone on to other things, these people say they are the LOD and some of them have direct connection to LOD members and have LOD materials." Asked by Newsbytes to comment on Leonard's comments, Phiber Optik said "The material he's referring to is probably text files that have been floating around BBS's for years, Just because someone has downloaded the files certainly doesn't mean that they are or ever were connected with LOD." Group of "Computer Hackers" Indicted; First Use of Wiretaps in Such a Case ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [Courtesy of Newsbytes July 8, 1992 ] NEW YORK, July 8 /U.S. Newswire/ -- A group of five "computer hackers" has been indicted on charges of computer tampering, computer fraud, wire fraud, illegal wiretapping, and conspiracy, by a federal grand jury in Manhattan, resulting from the first investigative use of court-authorized wiretaps to obtain conversations and data transmissions of computer hackers. A computer hacker is someone who uses a computer or a telephone to obtain unauthorized access to other computers. The indictment, which was filed today, alleges that Julio Fernandez, a/k/a "Outlaw," John Lee, a/k/a "Corrupt," Mark Abene, a/k/a "Phiber Optik," Elias Ladopoulos, a/k/a "Acid Phreak," and Paul Stira, a/k/a "Scorpion," infiltrated a wide variety of computer systems, including systems operated by telephone companies, credit reporting services, and educational institutions. According to Otto G. Obermaier, United States Attorney for the Southern District of New York, James E. Heavey, special agent in charge, New York Field Division, United States Secret Service, William Y. Doran, special agent in charge, Criminal Division, New York Field Division, Federal Bureau of Investigation, and Scott Charney, chief of the Computer Crime Unit of the Department of Justice, the indictment charges that the defendants were part of a closely knit group of computer hackers self-styled "MOD," an acronym used variously for "Masters of Disaster" and "Masters of Deception" among other things. The indictment alleges that the defendants broke into computers "to enhance their image and prestige among other computer hackers; to harass and intimidate rival hackers and other people they did not like; to obtain telephone, credit, information and other services without paying for them; and to obtain passwords, account numbers and other things of value which they could sell to others." The defendants are also alleged to have used unauthorized passwords and billing codes to make long distance telephone calls and to be able to communicate with other computers for free. Some of the computers that the defendants allegedly broke into were telephone switching computers operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West and Martin Marietta Electronics Information and Missile Group. According to the indictment, such switching computers each control telephone service for tens of thousands of telephone lines. In some instances, the defendants allegedly tampered with the computers by adding and altering calling features. In some cases, the defendants allegedly call forwarded local numbers to long distance numbers and thereby obtained long distance services for the price of a local call. Southwestern Bell is alleged to have incurred losses of approximately $ 370,000 in 1991 as a result of computer tampering by defendants Fernandez, Lee, and Abene. The indictment also alleges that the defendants gained access to computers operated by BT North America, a company that operates the Tymnet data transfer ne twork. The defendants were allegedly able to use their access to Tymnet computers to intercept data communications while being transmitted through the network, including computer passwords of Tymnet employees. On one occasion, Fernandez and Lee allegedly intercepted data communications on a network operated by the Bank of America. The charges also allege that the defendants gained access to credit and information services including TRW, Trans Union and Information America. The defendants allegedly were able to obtain personal information on people including credit reports, telephone numbers, addresses, neighbor listings and social security numbers by virtue of their access to these services. On one occasion Lee and another member of the group are alleged to have discussed obtaining information from another hacker that would allow them to alter credit reports on TRW. As quoted in the indictment, Lee said that the information he wanted would permit them "to destroy people's lives... or make them look like saints." The indictment further charges that in November 1991, Fernandez and Lee sold information to Morton Rosenfeld concerning how to access credit services. The indictment further alleges that Fernandez later provided Rosenfeld's associates with a TRW account number and password that Rosenfeld and his associates used to obtain approximately 176 TRW credit reports on various individuals. (In a separate but related court action, Rosenfeld pleaded guilty to conspiracy to use and traffic in account numbers of TRW. See below). According to Stephen Fishbein, the assistant United States attorney in charge of the prosecution, the indictment also alleges that members of MOD wiped out almost all of the information contained within the Learning Link computer operated by the Educational Broadcasting Corp. (WNET Channel 13) in New York City. The Learning Link computer provided educational and instructional information to hundreds of schools and teachers in New York, New Jersey and Connecticut. Specifically, the indictment charges that on Nov. 28, 1989, the information on the Learning Link was destroyed and a message was left on the computer that said: "Happy Thanksgiving you turkeys, from all of us at MOD" and which was signed with the aliases "Acid Phreak," "Phiber Optik," and "Scorpion." During an NBC News broadcast on Nov. 14, 1990, two computer hackers identified only by the aliases "Acid Phreak" and "Phiber Optik" took responsibility for sending the "Happy Thanksgiving" message. Obermaier stated that the charges filed today resulted from a joint investigation by the United States Secret Service and the Federal Bureau of Investigation. "This is the first federal investigation ever to use court-authorized wiretaps to obtain conversations and data transmissions of computer hackers," said Obermaier. He praised both the Secret Service and the FBI for their extensive efforts in this case. Obermaier also thanked the Department of Justice Computer Crime Unit for their important assistance in the investigation. Additionally, Obermaier thanked the companies and institutions whose computer systems were affected by the defendants' activities, all of whom cooperated fully in the investigation. Fernandez, age 18, resides at 3448 Steenwick Ave., Bronx, New York. Lee (also known as John Farrington), age 21, resides at 64A Kosciusco St. Brooklyn, New York. Abene, age 20, resides at 94-42 Alstyne Ave., Queens, New York. Elias Ladopoulos, age 22, resides at 85-21 159th St., Queens, New York. Paul Stira, age 22 , resides at 114-90 227th St., Queens, New York. The defendants' arraignment has been scheduled for July 16, at 10 a.m. in Manhattan federal court. The charges contained in the indictment are accusations only and the defendants are presumed innocent unless and until proven guilty. Fishbein stated that if convicted, each of the defendants may be sentenced to a maximum of five years imprisonment on the conspiracy count. Each of the additional counts also carries a maximum of five years imprisonment, except for the count charging Fernandez with possession of access devices, which carries a maximum of ten years imprisonment. Additionally, each of the counts carries a maximum fine of the greater of $ 250,000, or twice the gross gain or loss incurred. In separate but related court actions, it was announced that Rosenfeld and Alfredo De La Fe have each pleaded guilty in Manhattan Federal District Court to conspiracy to use and to traffic in unauthorized access devices in connection with activities that also involved members of MOD. Rosenfeld pled guilty on June 24 before Shirley Wohl Kram, United States District Judge. At his guilty plea, Rosenfeld admitted that he purchased account numbers and passwords for TRW and other credit reporting services from computer hackers and then used the information to obtain credit reports, credit card numbers, social security numbers and other personal information which he sold to private investigators. Rosenfeld added in his guilty plea that on or about Nov. 25, 1991, he purchased information from persons named "Julio" and "John" concerning how to obtain unauthorized access to credit services. Rosenfeld stated that he and his associates later obtained additional information from "Julio" which they used to pull numerous credit reports. According to the information to which Rosenfeld pleaded guilty, he had approximately 176 TRW credit reports at his residence on Dec. 6, 1991. De La Fe pled guilty on June 19 before Kenneth Conboy, United States District Judge. At his guilty plea, De La Fe stated that he used and sold telephone numbers and codes for Private Branch Exchanges ("PBXs"). According to the information to which De La Fe pleaded guilty, a PBX is a privately operated computerized telephone system that routes calls, handles billing, and in some cases permits persons calling into the PBX to obtain outdial services by entering a code. De La Fe admitted that he sold PBX numbers belonging to Bugle Boy Industries and others to a co-conspirator who used the numbers in a call sell operation, in which the co-conspirator charged others to make long distance telephone calls using the PBX numbers. De La Fe further admitted that he and his associates used the PBX numbers to obtain free long distance services for themselves. De La Fe said that one of the people with whom he frequently made free long distance conference calls was a person named John Farrington, who he also knew as "Corrupt." Rosenfeld, age 21, resides at 2161 Bedford Ave., Brooklyn, N.Y. Alfredo De La Fe, age 18, resides at 17 West 90th St., N.Y. Rosenfeld and De La Fe each face maximum sentences of five years, imprisonment and maximum fines of the greater of $250,000, or twice the gross gain or loss incurred. Both defendants have been released pending sentence on $20,000 appearance bonds. Rosenfeld's sentencing is scheduled for Sept. 9, before Shirley Wohl Kram. De La Fe's sentencing is scheduled for Aug. 31, before Conboy. ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 16 of 19 The United Phreaker's Incorporated Underground Newsline Part 2 By Arch Bishop & The Lost Avenger Legion Of Doom Connection With 911 Attacks Denied ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes October 16, 1992 ] NEW YORK, NEW YORK, U.S.A., 1992 OCT 16(NB) -- Members of the well publicized group of computer hackers, The Legion of Doom, have denied any connection with the recent alleged tampering with US and Canadian 911 emergency systems. They have also told Newsbytes that the Legion Of Doom (LOD) group has been defunct for a number of years. The recent publicized quote by an arrested 23 year old New Jersey man, identified only as Maverick, that he was a member of the Legion of Doom and that the group's intent was "to attempt to penetrate the 911 computer systems and inflect them with viruses to cause havoc" has infuriated many of the original group. "Lex Luthor", one of the founders of LOD, told Newsbytes "As far as I am concerned the LOD has been dead for a couple of years never to be revived. Maverick was never in LOD. There have been 2 lists of members (one in phrack and another in the lod tj) and those lists are the final word on membership. There has been no revival of lod by me nor other ex- members. We obviously cannot prevent copy-cats from saying they are in lod. When there was an LOD, our goals were to explore and leave systems as we found them. The goals were to expose security flaws so they could be fixed before REAL criminals and vandals such as this Maverick character could do damage. If this Maverick character did indeed disrupt E911 service he should be not only be charged with computer trespassing but also attempted murder. 911 is serious business." Lex continued "I am obviously not affiliated with any type of illegal activities whatever especially those concerning computer systems. However, I do try to keep up with what's going on and have 2 articles on computer security being prepared to be published. I won't say where or what name I am using because if the editors know an ex-hacker is trying to help society and help secure computer systems they probably would not accept the article." Captain James Bourque of the Chesterfield County, Virginia police and the person who had quoted Maverick to the press, told Newsbytes that Lex's comments were probably correct. He said "I don't think that there is a connection with the original group. I think that this group sort of took on the Legion of Doom Name and the causes that they think the Legion of Doom might have been involved in." Bourque also said "This group tried to publicize their activities by calling the local ABC station here as well as ABC in New York. It was not unusual for four or five of these individuals to set up a telephone conference and then to try to bring down our local 911 system here by monopolizing the system -- it never worked but they continued to try." Bourgue told Newsbytes that the continuing investigation is being carried out by local law enforcement agencies and that an investigator from his organization was in Newark reviewing the evidence against Maverick. He said "It's possible that the Secret Service will become involved after the presidential election is over. They are very busy now." Mike Godwin , in-house counsel of the Electronic Frontier Foundation. (EFF), an organization that has been involved in a number of cases involving admitted LOD members, commented to Newsbytes "I don't believe for a minute that this has anything to do with the real Legion of Doom." Phiber Optic, another ex-LOD member, told Newsbytes that he was disturbed that the media accepted the designation of Maverick as LOD, saying "If he said that he was a Martian, would they have put in the paper that he was a Martian?" Phiber had previously posted a comment on the Whole Earth 'Lectronic Link (WELL) on the LOD announcement and it is reprinted with his permission: 1) Kids prank 911. 2) Kids get caught for being jackasses. 3) One kid just happens to have a computer. 4) Now it's suddenly a 'hacker crime'. 5) Kid foolishly decides he's in the 'Legion of Doom' when he's questioned, because he probably always wanted to be (his heroes!). 6) Media pukes on itself. ("This is a HEADLINE!!!") There. Can we all grow up and move along now? Emmanuel Goldstein, publisher of 2600 Magazine: The Hacker Quarterly, also took issued with the designation of those arrested in New Jersey and Canada as "hackers", telling Newsbytes "No where have I seen any indication that these people were inside of a telephone company computer. They were allegedly making vocal calls to the 911 services and trying to disrupt them. You certainly don't have to be a genius to do that. Let's not demean hackers by associating them with the kind of behavior that is alleged." News Reports Of 911 Attacks ~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes October 12, 1992 ] NEW YORK, NEW YORK, U.S.A., 1992 OCT 12(NB) -- United Press International and the Toronto Sun have reported arrests related to alleged "hacker" attacks on 911 systems. The law enforcement personnel quoted in the stories were not available for comment due to the observance of Columbus Day and the Canadian Thanksgiving, respectively. The UPI story reports the arrest of a 23 year-old Newark, New Jersey individual, identified only as "Maverick" for allegedly attempting to cause havoc through the disruption of 911 service. The story also said that arrests were expected to be forthcoming in two Maryland locations. The Toronto story, written by Kevin Hann, described the arrest of a 15 year old high school student accused of misdirecting emergency services crews and reporting false medical emergencies. He, according to quotes attributed to Toronto police officials, used a home computer to route calls through the United States back to Toronto in an attempt to confuse security systems. The New Jersey man arrested was said to be part of a loose network of computer "hackers" known as the Legion of Doom (LOD) which, according to the story, engages in telephone fraud by using corporate Private Branch Exchanges (PBX) systems to illegally place their calls It was alleged that the group made caused over $100,000 of charges to be incurred by a Minnesota company within a single month. The name Legion of Doom has been used repeatedly in recent years by both law enforcement personnel and others in the last few years. Robert Riggs, Adam Grant and Franklin Darden, convicted in 1990 for intrusion in to BellSouth's computer systems were identified by law enforcement officials as members of the Legion of Doom as was Len Rose, sentenced in 1991 for "receiving misappropriated UNIX source code." Additionally, other persons have identified themselves as members or ex-members of the Legion of Doom. In June 1991, Chris Goggans, Scott Chasin and Ken Shulman, announcing the formation of ComSec, a computer security firm, identified themselves as former LOD-ers "Erik Bloodaxe", "Doc Holiday", and "Malefactor" (the firm has since gone out of business). In January 1992, announcing the commercial bulletin board system Phantom Access, the system owners, Patrick Kroupa and Bruce Fancher, described themselves as "two former East-Coast Legion of Doom members" ("Lord Digital" and "Dead Lord"). Fancher told Newsbytes "The Legion of Doom is not and never was an organization with criminal intent. Any criminal activity that might have happened was the result of inadvertent actions while exploring. I never head of Maverick and doubt that he was a member of the group known as the Legion of Doom. I also doubt that anyone that I knew in the group would have considered malicious acts involving 911 systems." (Barbara E. McMullen & John F. McMullen/19921012) New York Computer Crime Indictments ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes July 9, 1992 ] NEW YORK, N.Y., U.S.A., 1992 JULY 9 (NB) -- Otto G. Obermaier, United States Attorney for the Southern District of New York, has announced the indictment of five "computer hackers" on charges of computer tampering, computer fraud, wire fraud, illegal wiretapping and conspiracy. The announcement was made at a press conference at 2:00 PM on Wednesday, July 8th at the Federal Court hose in Manhattan Named in the indictment were Julio Fernandez, 18, known as the "Outlaw"; John Lee, 21, a/k/a "Corrupt"; Mark Abene, 20, a/k/a "Phiber Optik"; Elias Ladopoulos, 22, a/k/a "Acid Phreak"; and "Paul Stira, 22, a/k/a "Scorpion". In addition to alleged specific illegal acts involving computers, the five individuals were also charged with conspiracy. According to the indictment, the five were members of a group known as MOD (standing for either "Masters of Disaster" or "Masters of Deception") and the goal of the conspiracy was "that the members of MOD would gain access to and control of computer systems in order to enhance their image and prestige among other computer hackers; to harass and intimidate rival hackers and people they did not like; to obtain telephone, credit, information, and other services without paying for them; and to obtain. passwords, account numbers and other things of value which they could sell to others." The indictment defines computer hacker as "someone who uses a computer or a telephone to obtain unauthorized access to other computers." Obermaier stated that this investigation was "the first investigative use of court-authorized wiretaps to obtain conversations and data transmissions of computer hackers." He said that this procedure was essential to the investigation and that "It demonstrates, I think, the federal government's ability to deal with criminal conduct as it moves into new technological areas." He added that the interception of data was possible only because the material was in analog form and added "Most of the new technology is in digital form and there is a pending statute in the Congress which seeks the support of telecommunications companies to allow the federal government, under court authorization, to intercept digital transmission. Many of you may have read the newspaper about the laser transmission which go through fiber optics as ernment needs the help of Congress and, indeed, the telecommunications companies to able to intercept digital While all of those indicted were charged with some type of unlawful access to one or more of computer systems belonging to the following: Southwestern Bell, BT North America, New York Telephone, ITT, Information America, TRW, Trans Union, Pacific Bell, the University of Washington, New York University, U.S. West, Learning Link, Tymnet and Martin Marietta Electronics Information and Missile Group, Fernandez and Lee were also charged with selling illegally obtained credit information to a person that later re-sold the information to private detectives. Assistant United States Attorney Stephen Fishbein announced that Morton Rosenfeld has been indicted and pled guilty to purchasing credit information and access codes from persons named "Julio" and "John". Fishbein said that Rosenfeld, at the time of his arrest on December 6, 1991, has approximately 176 TRW credit reports in his possession. Rosenfeld, 21, pled guilty on June 24, 1992 and is scheduled to be sentenced on September 9th. He faces a maximum of five years imprisonment and a fine of the greater of $250,000 or twice the gross gain or loss incurred. Fishbein also announced the outcome of a "separate but related court action, Alfredo De La Fe, 18, pled guilty on June 19, 1992 to the use and sale of telephone numbers and codes for Private Branch Exchanges (PBX's). De La Fe said that he had sold PBX numbers belonging to Bugle Boy Industries to a co-conspirator who used the numbers in a call-selling operation. He also said that he and a person that he knew as "Corrupt" had made illegal long difference conference calls. De La Fe faces the same maximum penalty as Rosenfeld and is scheduled for sentencing on August 31st. Among the charges against the five charged as conspirators is the allegation that Fernandez, Lee, Abene and "others whom they aided and abetted" performed various computer activities "that caused losses to Southwestern Bell of approximately $370,000. When asked by Newsbytes how the losses were calculated, Fishbein said that there was no breakdown beyond that stated in the indictment -- "expenses to locate and replace computer programs and other information that had been modified or otherwise corrupted, expenses to determine the source of the unauthorized intrusions, and expenses for new computers and security devices that were necessary to prevent continued unauthorized access by the defendants and others whom they aided and abetted." In answer to a Newsbytes question concerning the appropriateness of making an intruder into a computer system totally responsible for the cost of adding security features "which possibly should have been there to begin with", Obermaier said "That theory would make the burglar the safety expert since one can't have people going around fooling around with other people's relatively private information and then claiming that I'm doing it for their good." Paul Tough of Harper's Magazine followed up on the same topic by saying "In the Craig Neidorf case a regional telephone company claimed that a document was worth over $100,000. When it was found to be worth only $12, the case was thrown out. In view of that, are you concerned that they (Southwestern Bell) may have overreported? In response, Obermaier "No, we are not concerned. It's a matter of proof and, if the accused stand trial and have a similar experience to as happened the case you cite, not in this district, then the results predictably will be the same." Fishbein said that the conspiracy change carries a maximum sentence of five years imprisonment while each of the other counts (there are 10 additional counts) carries a maximum of five years imprisonment and a fine of the greater of $250,000 or twice the gross gain or loss incurred. A single exception is a count charging Fernandez with possessing fifteen or more unauthorized access devices. That count carries a maximum penalty of ten years imprisonment. In response to a statement by Alex Michelini of the New York Daily News that "What you've outlined, basically, except for the sales of credit information, this sounds like a big prank, most of it", Obermaier said "Really, Well, I suppose, if you can characterize that as a prank but it's really a federal crime allowing people without authorization to rummage through the data of other people to which they do not have access and, as I point out to you again, the burglar cannot be your safety expert. He may be inside and laugh at you when you come home and say that your lock is not particularly good but I think you, if you were affected by that contact, would be somewhat miffed" Obermaier also said that "The message that ought to be delivered with this indictment is that such conduct will not be tolerated, irrespective of tensible purpose." Obermaier also said that "The message that ought to be delivered with this indictment is that such conduct will not be tolerated, irrespective of the ag of the particular accused or their ostensible purpose." Others participating in the news conference were Raymond Shaddick, United States Secret Service assistant director - Office of Investigations; William Y. Doran, FBI special agent in charge, New York criminal division; Scott Charney, United States Dept. of Justice chief of computer crime unit. All stressed the cooperation that had gone on between the various law enforcement agencies during the investigation. Charney told Newsbytes that, in spite of the fact that the search warrants executed on Stira and Ladopoulos preceded those executed on Lee and Fernandez by almost two years and that the last specific allegation against Stira proceeds the first against Lee by 16 months and the first against Fernandez by 21 months, there is evidence that links them together in the conspiracy. Charney also told Newsbytes that the counts against Abene were not related to a misdemeanor conviction in early 1991 for which he served community service. Those indicted have been asked to present themselves at New York Service Services headquarters at 9:00 AM on July 8th for fingerprinting. Arraignment for the indicted is scheduled for Thursday, July 16th. Abene told Newsbytes that while he couldn't comment on anything related to the indictment until he obtained legal counsel, "I've been participating i conferences with law enforcement personnel and guest lecturing to college classes for the last year and a half. In every case, I have said how those responsible for information about us have the responsibility to protect that data. I have also tried to explain the great difference between a true hacker and a person who uses computers for criminal profit. I hope that I have increased understanding with these efforts." New York Hackers Plead Not Guilty ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes Week July 17, 1992 ] NEW YORK, N.Y., U.S.A., 1992 JULY 17 (NB) --At an arraignment in New York Federal Court on Thursday, July 16th, the five New York "hackers", recently indicted on charges relating to alleged computer intrusion, all entered pleas of not guilty and were released after each signed a personal recognizance (PRB) bond of $15,000 to guarantee continued appearances in court. The accused, Mark Abene also known as"Phiber Optik"; Julio Fernandez a/k/a "Outlaw"; Elias Ladopoulos a/k/a "Acid Phreak"; John Lee a/k/a "Corrupt"; and Paul Stira a/k/a "Scorpion", were indicted on July 8th on 11 counts alleging various computer and communications related crimes --although all five were indicted together, each in not named in all eleven counts and the maximum penalties possible under the charges vary from 5 years imprisonment and a $250,000 fine (Stira) to 40 years imprisonment and a $2 million fine (Lee). As part of the arraignment process, United States District Judge Richard Owen was assigned as the case's presiding judge and a pre-trial meeting between the judge and the parties involved. Charles Ross, attorney for John Lee, told Newsbytes "John Lee entered a not guilty plea and we intend to energetically and aggressively defend against the charges made against him." Ross also explained the procedures that will be in effect in the case, saying "We will meet with the judge and he will set a schedule for discovery and the filing of motions. The defense will have to review the evidence that the government has amassed before it can file intelligent motions and the first meeting is simply a scheduling one." Marjorie Peerce, attorney for Stira, told Newsbytes "Mr. Stira has pleaded not guilty and will continue to plead not guilty. I am sorry to see the government indict a 22 year old college student for acts that he allegedly committed as a 19 year old." The terms of the PRB signed by the accused require them to remain within the continental United States. In requesting the bond arrangement, Assistant United States Attorney Stephen Fishbein referred to the allegations as serious and requested the $15,000 bond with the stipulation that the accused have their bonds co-signed by parents. Abene, Fernandez and Lee, through their attorneys, agreed to the bond as stipulated while the attorneys for Ladopoulos and Stira requested no bail or bond for their clients, citing the fact that their clients have been available, when requested by authorities, for over a year. After consideration by the judge, the same $15,000 bond was set for Ladopoulos and Stira but no co-signature was required. New York Police Responds To Blockage Of International Phone Calls ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes Week June 18, 1992 ] WASHINGTON, D.C., U.S.A., 1992 JUN 18 (NB) -- New York State Police Special Investigator Donald Delaney, in a conversation with Newsbytes, strongly supported the move by New York Telephone Company, blocking calls to foreign countries from pay phones in New York City's Times Square, Port Authority Bus Terminal and other midtown locations with a history of high credit card calling fraud, as reported elsewhere by Newsbytes. Delaney said: "I think that it is about time that such action was taken. Telephone fraud in New York City is out of control and that is why that New York Telephone took the action" Delaney continued: "I think that this should be just the beginning. It is not only in midtown Manhattan that we find this fraud. From one end of Broadway to another, there is heavy incidence of fraudulent calls through pay phones. You will also find neighborhoods that have high incidence of the same type of crime. I would like to see the same type of blockage on all pay phones." The Port Authority Bus Terminal has long been identified as a major scene of telecommunications fraud encompassing not only call selling by the collection of valid credit card numbers from unsuspecting users so that numbers may, in turn, be used for fraudulent calls. The numbers are generally taken through "shoulder-surfing", a term for simply looking over the shoulder of an unsuspecting caller and recording the keystrokes made while entering the credit card number. According to Delaney, shoulder-surfing in the Port Authority takes in a whole new dimension with people using binoculars and telescopes from positions in Port Authority's balcony to see the numbers and voice-activated tape recorder to record them. (Barbara E. McMullen & John F. McMullen/19920617) New York State Police Decriminalize the word "Hacker" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes October 21, 1992 ] ALBANY, NEW YORK, U.S.A., 1992 OCT 21(NB) -- Senior investigator Ron Stevens of the New York State Police Computer Unit has told Newsbytes that it will be the practice of his unit to avoid the use of the term "hacker" in describing those alleged to have committed computer crimes. Stevens told Newsbytes "We use the term computer criminal to describe those who break the law using computers. While the lay person may have come to understand the meaning of hacker as a computer criminal, the term isn't accurate. The people in the early days of the computer industry considered themselves hackers and they made the computer what it is today. There are those today who consider themselves hackers and do not commit illegal acts." Stevens had made similar comments in a recent conversation with Albany BBS operator Marty Winter. Winter told Newsbytes ""Hacker" is, unfortunately an example of the media taking what used to be an honorable term, and using it to describe an activity because they (the media) are too damned lazy or stupid to come up with something else. Who knows, maybe one day "computer delinquent" WILL be used, but I sure ain't gonna hold my breath. Stevens, together with investigator Dick Lynch and senior investigator Donald Delaney, attended the March 1993 Computers, Freedom and Privacy Conference (CFP-2) in Washington, DC and met such industry figures as Glenn Tenney, congressional candidate and chairman of the WELL's annual "Hacker Conference"; Craig Neidorf, founding editor and publisher of Phrack; Steven Levy, author of "Hackers" and the recently published "Artificial Life"; Bruce Sterling, author of the recently published "The Hacker Crackdown"; Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly and a number of well-known "hackers". Stevens said "When I came home, I read as much of the literature about the subject that I could and came to the conclusion that a hacker is not necessarily a computer criminal." The use of the term "hacker' to describe those alleged to have committed computer crimes has long been an irritant to many in the on-line community. When the the July 8th federal indictment of 5 New York City individuals contained the definition of computer hacker as "someone who uses a computer or a telephone to obtain unauthorized access to other computers.", there was an outcry on such electronic conferencing system as the WELL (Whole Earth 'Lectronic Link). Many of the same people reacted quite favorably to the Stevens statement when it was posted on the WELL. (Barbara E. McMullen & John F. McMullen/19921021) New York Telephone Cuts International Service At Some Pay Phones ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes Week June 18, 1992 ] NEW YORK, NEW YORK, U.S.A., 1992 JUN 18 (NB) -- As part of its effort to fight phone fraud with stolen calling card numbers, New York Telephone is blocking international calls from most of its public phones inside the Port Authority Bus Terminal and at surrounding sidewalk locations. The company said it would also target other high-fraud areas throughout New York City. New York Telephone will rely on technology developed by Mars Electronics International, based in Pennsylvania, which blocks international calls attempted through any long distance carrier or private business phone system. New York Telephone said it would implement the program at selected public phones so as not to inconvenience legitimate callers. This is the second time that phone companies have limited service at pay phones as an anti-crime move. A few years ago, some phones were switched from touchtone to rotary dial service, to keep people using them from reaching beepers allegedly used by drug dealers. Now the problem is "sidewalk surfing," where thieves listen to callers giving their card numbers to operators, or peer over their shoulders when they take out calling cards. The numbers are then taken to a pay phone, where services using them are sold to all comers. Frequently, the services are sold to drug dealers, who can then make untraceable calls to their overseas contacts. Some observers claim that the numbers are also used by illegal immigrants calling their families back home. Telephone fraud is estimated at more than $1 billion a year nationwide. New York Telephone operates more than 57,000 public phones in New York City. (Dana Blankenhorn/19920618/Press Contact: Maureen Flanagan, New York Telephone, 212-395-0500) Reports Of "Raid" On 2600 Washington Meeting ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes November 7, 1992 ] WASHINGTON, D.C., U.S.A., 1992 NOV 7 (NB) -- Eric Corley, a/k/a "Emmanuel Goldstein", editor and publisher of 2600 Magazine: The Hacker Quarterly has told Newsbytes that the Friday, November November 6th 2600 meeting held in the Pentagon City Mall, outside of Washington, DC. was disrupted by threats of arrest by mall security officers and Arlington, VA police. 2600 Magazine promotes monthly meetings of hackers, press and other interested parties throughout the country. The meetings are held in public locations on the first Friday evening of the month and the groups often contact each other by telephone during the meetings. Corley told Newsbytes that meetings were held that evening in New York, Washington, Philadelphia, Cambridge, St. Louis, Chicago, Los Angeles and San Francisco. Corley said "While I am sure that meetings have been observed by law enforcement agencies, this is the only time that we have been harassed. It is definitely a freedom of speech issue." According to Craig Neidorf, who was present at the meeting handing out applications for Computer Professionals For Social Responsibility (CPSR), "I saw the security officers focusing on us. Then they started to come toward us from a number of directions under what seemed to be the direction of a person with a walkie-talkie on a balcony. When they approached, I left the group and observed the security personnel encircling the group of about 30 gatherers. The group was mainly composed of high school and college students. The guards demanded to search the knapsacks and bags of the gatherers. They confiscated material, including CPSR applications, a copy of Mondo 2000 (a magazine) and other material. They also confiscated film from a person trying to take pictures of the guards and, when a hacker called "HackRat" attempted to copy down the names of the guards, they took his pencil and paper." Neidorf continued, "I left to go outside and rejoined the group when they were ejected from the mall. The guards continued challenging the group and told them that they would be arrested if they returned. When one of the people began to take pictures of the guards, the apparent supervisor became excited and threatening but did not confiscate the film." Neidorf also said "I think that the raid was planned. They hit right about 6:00 and they identified our group as "hackers" and said that they knew that this group met every month." Neidorf's story was supported by a Washington "hacker" called "Inhuman", who told Newsbytes "I arrived at the meeting late and saw the group being detained by the guards. I walked along with the group as they were being ushered out and when I asked a person who seemed to be in authority his name, he pointed at a badge with his name written in script on it. I couldn't make out the name and, when I mentioned that to the person, he said 'If you can't read it, too bad.' I did read his name, 'C. Thomas', from another badge." Inhuman also told Newsbytes that, while he did not hear it said, he was told by a number of people that the guards said that they were 'acting on behalf of the Secret Service. "I was also told that there were two police officers there from the Arlington County Police present but I did not see them." Another attendee, Doug Luce posted an account of his on an NY BBS and gave Newsbytes permission to quote Luce wrote "I also got to the DC meeting very late; 7:45 or so. It seemed like a coordinated harassment episode, not geared toward busting anyone, but designed to get people riled up, and maybe not come back to the mall. A couple of the things I overheard: someone had brought a keyboard to sell, and the cops had harassed him about it, saying 'You aren't selling anything in my mall without a vendors permit!' Blaize (another attendee) says that maybe his handcuffing Hack Rat might have set the cops off; or maybe it was the Whisper 2000 that the cops were convinced was a stun gun. The word is that there was stuff taken and not given back, wires and soldering tools. There is also the rumor that the cops were going through everyone's bags and belongings, and that some people were detained. While the thrust of the effort seemed to be mall security, there are conflicting reports about supporting personnel. Some people said that the SS (Secret Service) might have been there, others thought the FBI or plainclothes city officers were assisting (or coordinating). Supposedly, several of them had removed their name tags before moving in." Luce's reference to possible Secret Service involvement was supported by a 19 year-old college student known as the "Lithium Bandit", who told Newsbytes "I got to the mall about 6:15 and saw the group being detained by approximately 5 Arlington County police and 5 security guards. When I walked over to see what was going on, a security guard asked me for an ID and I refused to show it saying that I was about to leave. The guard said that I couldn't leave and told me that I had to see a police officer. When I did, the officer demanded ID and, when I once again refused, informed me that I could be detained for up to 10 hours for refusing to produce identification. I gave in and produced my school ID which the police gave to the security people who copied down my name and social security number." Lithium Bandit continued "When I asked the police what was behind this action, I was told that they couldn't answer but that "the Secret Service is involved and we are within our rights doing this. I and some others later went to the Arlington police station to attempt to get more information. I was told only that there was a report of the use of a stolen credit card and 2 officers sent to investigate -- they later admitted that it was 5. While I was detained, I heard no mention of a credit card and there was no one arrested." Marc Rotenberg, director of CPSR's Washington office, told Newsbytes "I have really no details on the incident yet but I am very concerned about the reports and confiscation of CPSR applications, if true, is outrageous. I will find out more facts on Monday. Newsbytes was told by the Pentagon City Mall office that any information concerning the action would have to come from the director of security, Al Johnson, who will not be available until Monday. The Arlington Country Police referred Newsbytes to a "press briefing recording" which had not been updated since the morning before the incident. Corley told Newsbytes "there have been no reports of misbehavior by any of these people. They were obviously singled out because they were hackers. It's as if they were being singled out as an ethnic group. I admire the way the group responded -- in a courteous fashion but it is inexcusable that it happened. I will be at the next Washington meeting to insure that it doesn't happen again." The manager of one of New York state's largest malls provided background information to Newsbytes on the rights of malls to police those on mall property, saying "The primary purpose of a mall is to sell. The interior of the mall is private property and is subject to the regulations of the mall. The only requirement is that the regulations be enforced in an even-handed manner. I do not allow political activities in my mall so I could not make an exception for Democrats. We do allow community groups to meet but they must request space at least two weeks before the meeting and must have proper insurance. Our regulations also say that groups of more than 4 may not congregate in the mall. We would ask groups larger than that to disperse. We would also ask for identification from those who violate our regulations so that we may bar them from the mall for a period of 6 months." She added "Some people feel that mall atriums and food courts are public space. They are not and the industry is united on this. If the malls were to receive tax benefits for the common space and public service in snow removal and the like, it could possibly be a public area but malls are taxed on the entire space and are totally private property, subject to their own regulations. If a group of 20 or more congregated in my mall, they would be asked to leave." Trial Date Set In New York "Hacker" Case ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes October 6, 1992 ] NEW YORK, N.Y., U.S.A., 1992 Oct. 6 (NB) -- At a conference held in United States Federal Court, Southern District, Judge Richard Owen set April 12, 1993 as the date of the trial of five New York City "hackers" indicted on Wednesday, July 8th for various alleged telecommunications illegalities (in the initial indictment, the word "hacker" was defined as "someone who uses a computer or a telephone to obtain unauthorized access to other computers."). The accused, Mark Abene, also known as "Phiber Optik"; Julio Fernandez a/k/a "Outlaw"; Elias Lapodolous a/k/a "Acid Phreak"; John Lee a/k/a "Corrupt"; and Paul Stiva a/k/a "Scorpion", were charged at the original indictment with being part of a conspiracy intended to allow "the members of MOD (the name of the group) would gain access to and control of computer systems in order to enhance their image and prestige among other computer hackers; to harass and intimidate rival hackers and people they did not like; to obtain telephone, credit, information, and other services without paying for them; and to obtain. passwords, account numbers and other things of value which they could sell to others." Additionally,individuals of the group were charged with specific crimes including the illegal accessing of computers belonging to Southwestern Bell. Since the indictment, attorneys for the defendants have been reviewing evidence obtained by the Secret Service and the FBI through court-authorized wiretapping that is purported to substantiate the allegations. At the most recent court appearance, the attorneys requested an extended period of time for the discovery process because they had only recently been furnished diskettes containing information obtained through the inception of computer communications and, according to a defense attorney, the material "runs somewhere between 20 and 50 megabytes." When asked by Judge Owen for a definition of a megabyte, United States Assistant Attorney General Stephen Fishbein informed him that a megabyte is a million bytes and that a "byte is a piece of information." Owen then asked if Fishbein was really going to present all that information to a jury, saying "That would really byte the jury." Fishbein said that only that portion of the material that actually showed the existence of illegal activity would have to be shown but that the defense attorneys might wish to examine all of the intercepted material. Owen then scheduled January 3rd as the date for filing of defense motions, a date in February for government response and April 12th as the actual trial date. Marjorie Peerce, attorney for Paul Stira, told Newsbytes "I can't comment on the details of the case but Mr. Stira looks forward to the date he can tell his story in court." (Barbara E. McMullen & John F. McMullen/19921006) Computer Criminals Are After Your Credit-Card Numbers -- To Steal With, Sell And Swap ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of New York Newsday May 26, 1992 ] THE KID, from Springfield Gardens, Queens, was a carder, of course. He was doing what carders do: trying to talk a salesman into overnight - expressing him a $4,000 computer system -- and using a stolen credit-card number for payment. The salesman was playing right along on the phone; he had also notified a co-worker to alert the New York State Police, said William Murphy, a customer service manager at Creative Computers, who described the event as it was unfolding on a recent Tuesday morning. Murphy said that on a typical day, as many as a dozen times, carders would call and try to buy everything from modems to whole computer systems. Murphy said that these days, the security people at Creative Computers are able to stop virtually all of them, either by not delivering the goods, or by delivering them UPS -- that's United Police Service. He sighed: "It's amazing that they even try." But try they do. And at other places, they're successful. Where once hacking into a credit bureau was a kind of rite of passage for computer intruders, who generally did little more than look up credit histories on people like Mike Dukakis, now computer criminals are mining national credit bureaus and mail-order houses, coming away with credit-card numbers to sell, swap or use for mail-order purchases. Underground electronic bulletin board systems help spread not only the passwords, but the techniques used to tap into different systems. In San Diego on April 30, for instance, police raided a bulletin board called Scantronics, which offered among other things, step-by-step manuals on how to hack into Equifax Credit Information Services and TRW Information Services, the largest credit bureaus in the nation, the San Diego Tribune reported. "The potential for fraud is enormous, it's almost limitless," said Joel Lisker, Mastercard International's vice president of security and risk management, who noted that computer intruders accessed "thousands" of credit-card account numbers in another recent case. MASTERCARD is putting together a task force of its bank members to address the problem, and is considering inviting hackers in to learn what they can do to tighten up computer access to credit bureaus, he said. Mastercard estimates it lost $57 million to counterfeit scams last year; Lisker said it is impossible to say how much carders contributed. But based on the volume of arrests lately, he figures carding has become a big problem. "It's kind of like a farmer that sees a rat," Lisker said. "If he sees one, he knows he has several. And if he sees several he knows he has a major infestation. This is a major infestation." "It's clearly something we should be concerned about," agreed Scott Charney, chief of the U.S. Justice Department's new Computer Crime Unit. Charney said that roughly 20 percent of the unit's current caseload involves credit-card fraud, a number that, if nothing else, colors the notion that all hackers are misunderstood kids, innocently exploring the world of computer networks. "Whether such noble hackers exist, the fact of the matter is we're seeing people out there whose motives are not that pure," he said. On May 11, New York State Police arrested three teenagers in Springfield Gardens when one of them went to pick up what he hoped was an Amiga 3000 computer system from Creative Computers, at a local UPS depot. "What he wanted was a computer, monitor and modem. What he got was arrested," said John Kearey, a state police investigator who frequently handles computer and telecommunications crimes. Police posed as UPS personnel and arrested the youth, who led them to his accomplices. Kearey said the teens said they got the stolen credit-card number from a "hacker who they met on a bridge, they couldn't remember his name" -- an interesting coincidence because the account number was for a next-door neighbor of one of the youths. Police suspect that the teens, who claimed to belong to a small hacking group called the MOB (for Men of Business) either hacked into a credit bureau for the number, got someone else to do it, or went the low-tech route -- "dumpster diving" for used carbon copies of credit receipts. Indeed, most credit-card fraud has nothing to do with computer abusers. Boiler-room operations, in which fast-talking con men get cardholders to divulge their account numbers and expiration dates in exchange for the promise of greatly discounted vacations or other too-good-to-be-true deals, are far and away the most common scams, said Gregory Holmes, a spokesman for Visa. But carders have an advantage over traditional credit-card cheats: By using their PCs to invade credit bureaus, they can find credit-card numbers for virtually anyone. This is useful to carders who pick specific credit-card numbers based on location -- a neighbor is out of town for a week, which means all you have to do is get his account number, stake out his porch and sign for the package when the mail comes. Another advantage is address and ZIP code verifications, once a routine way of double-checking a card's validity, are no longer useful because carders can get that information from an account record. "It's tough," Holmes said. "Where it becomes a major problem is following the activity of actually getting the credit-card number; it's sent out on the black market to a vast group of people" generally over bulletin boards. From there, a large number of purchases can be racked up in a short period of time, well before the cardholder is aware of the situation. While the cardholder is not liable, the victims usually are businesses like Creative Computers, or the credit-card company. Murphy said his company used to get burned, although he would not divulge the extent of its losses. "It happened until we got wise enough to their ways," he said. Now, with arrangements among various law enforcement agencies, telephone companies and mail carriers, as well as a combination of call-tracing routines and other verification methods, carders "rarely" succeed, he said. Also, a dozen employees work on credit-card verification now, he said. "I feel sorry for the companies that don't have the resources to devote departments to filter these out. They're the ones that are getting hit hard." In New York, federal, state and local police have been actively investigating carder cases. Computers were seized and search warrants served on a number of locations in December, as part of an ongoing federal investigation into carding. City police arrested two youths in Queens in April after attempting to card a $1,500 computer system from Creative Computers. They were arrested when they tried to accept delivery. "It's a legitimate way to make money. I know people who say they do it," claimed a 16-year-old Long Island hacker who uses the name JJ Flash. While he says he eschews carding in favor of more traditional, non-malicious hacking, JJ Flash said using a computer to break into a credit bureau is as easy as following a recipe. He gave a keystroke-by-keystroke description of how it's done, a fairly simple routine that involved disguising the carder's calling location by looping through a series of packet networks and a Canadian bank's data network, before accessing the credit bureau computer. Once connected to the credit bureau computer, JJ Flash said a password was needed -- no problem, if you know what underground bulletin boards to check. "It's really easy to do. I learned to do it in about thirty seconds. If you put enough time and energy into protecting yourself, you'll never get caught," he said. For instance, an expert carder knows how to check his own phone line to see if the telephone company is monitoring it, he claimed. By changing the location of a delivery at the last minute, he said carders have evaded capture. J J FLASH said that while most carders buy computers and equipment for themselves, many buy televisions, videocassette recorders and other goods that are easy to sell. "You can usually line up a buyer before its done," he said. "If you have a $600 TV and you're selling it for $200, you will find a buyer." He said that while TRW has tightened up security during the past year, Equifax was still an easy target. But John Ford, an Equifax spokesman, said he believes that hackers greatly exaggerate their exploits. He said that in the recent San Diego case, only 12 records were accessed. "It seems to me the notion that anybody who has a PC and a modem can sit down and break in to a system is patently untrue," he said. "We don't have any evidence that suggests this is a frequent daily occurrence." Regardless, Ford said his company is taking additional steps to minimize the risk of intrusion. "If one is successful in breaking into the system, then we are instituting some procedures that would render the information that the hacker receives virtually useless." Also, by frequently altering customers' passwords, truncating account information so that entire credit-card numbers were not displayed, and possibly encrypting other information, the system will become more secure. "We take very seriously our responsibility to be the stewards of consumer information," Ford said. But others say that the credit bureaus aren't doing enough. Craig Neidorf, publisher of Phrack, an underground electronic publication "geared to computer and telecommunications enthusiasts," said that hacking into credit bureaus has been going on, and has been easy to do "as long as I've been around." Neidorf said that although he doesn't do it, associates tell him that hacking into credit bureau's is "child's play" -- something the credit bureaus have been careless about. "For them not to take some basic security steps to my mind makes them negligent," Neidorf said. "Sure you can go ahead and have the kids arrested and yell at them, but why isn't Equifax or any of the other credit bureaus not stopping the crime from happening in the first place? It's obvious to me that whatever they're doing probably isn't enough." A Recent History Of Carding September 6, 1991: An 18-year-old American emigre, living in Israel, was arrested there for entering military, bank and credit bureau computers. Police said he distributed credit-card numbers to hackers in Canada and the United States who used them to make unknown amounts of cash withdrawals. January 13, 1992: Four university students in San Luis Obispo, California, were arrested after charging $250,000 in merchandise to Mastercard and Visa accounts. The computer intruders got access to some 1,600 credit-card accounts, and used the numbers to buy, among other things: Four pairs of $130 sneakers; a $3,500 stereo; two gas barbecues and a $3,000 day at Disneyland. February 13, 1992: Two teenagers were arrested when one of them went to pick up two computer systems in Bellevue, Wash., using stolen credit-card numbers. One told police that another associate had hacked into the computer system of a mail-order house and circulated a list of 14,000 credit-card numbers through a bulletin board. April 17, 1992: Acting on a tip from San Diego police, two teenagers in Ohio were arrested in connection with an investigation into a nationwide computer hacking scheme involving credit-card fraud. Police allege "as many as a thousand hackers" have been sharing information for four years on how to use their computers to tap into credit bureau databases. Equifax, a credit bureau that was penetrated, admits that a dozen records were accessed. $16,000 Fine For False Distress And Unlicensed Operation ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications August, 1992] The Commission notified Richard E. Mattice, of Zion, IL., that he is apparently liable for a monetary forefeiture of $!6,000 for transmitting flase distress signals using an unlicensed station. On June 7, 1991, Lake County Marine Units 676 and 675 (Lake County Sheriff's Office) and Coast Guard Station Kenosha (Wisconsin) vessel CG 41325 responded to a "MAYDAY" on Marine Channel 16 by a vessel reporting taking on water on Lake Michigan near North Point Harbour. Lake County Marine Unit 676 ("Unit 676") identified the source of the transmissions, through radio direction finding, to be the vessel "It'l Do." As Unit 676 approached the vessel the "It'l Do." got under way. Unit 676 followed and stopped the vessel. Unit 675 and CG 41325 also intercepted the vessel. The "It'l Do." was escorted to Lake Point by Unit 676 and the Coast Guard where it was boarded by both the Lake County Sheriff's Office and The Coast Guard. The Coast Guard interrogated Richard E. Mattice and determined that he was the operator who transmitted the "MAYDAY." The Coast Guard determined that there had been no distress situation. As there was evidence of alchohol consumption by Mattice, he was given a field sobriety test, which he passed. The Coast Guard also determined at inspection that the station was not licensed. CB Station Shut Down; Equipment Seized ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications August, 1992] US Marshals, with the assistance of engineers from the Federal Communications Commission's Philadelphia Office, confiscated the radio equipment of CB operators Gary Bond (aka Gary Finkelstein)at his home in Wilmington, Delaware. The seized equipment included linear amplifiers capable of boosting transmitter power to 2,000 watts whichi is far above the legal 4 watt limit. The use, sale of manufacture of linear amplifiers or other devices that boost CB radio power is illegal. THese devices can cause severe interference to licensed radio services. The FCC had recieved a petition, signed by area residents, which stated that CB radio transmissions could be heard on theeir televisions sets and telephones. Based upon that information, the Commission's Philadelphia Office opened an invesitgation centered around the unauthorized use of linear amplifier equipment. Staff from that office performed on-scene monitoring in the Wilmington area. From the monitored transmissions, FCC investigators determined that Mr. Bond was operating illegal equipment. The seizure took place under federal civil forfeiture proceedings initiated by the US Attorney for the District Of Deleware. Carolyn Greene, Assistant US Attorney, is handling the case for the government. Further administrative sanctions are pending against Mr. Bond with the FCC. The Commission will continue to enforce its CB rules by prosecuting violators. Fined For Operating An Unlicensed Station ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications August, 1992] The Commission notified David Plourde of Lewiston, Maine, of an apparent liability for a forfeiture of $10,000 for operating an unlicensed station. Onn October 9, 1991, Plourde operated a CB Radio Station on 27.215 Mhz using a non-type-accepted transmitter and a linear amplifier. Use of non-type-accepted transmitting apparatus voided Plourde's authorization to operate a CB station. Plourde has been the subject of complaints of 12 persons in four cases handled by the Field Operations Bureau since moving to his present address. There is a history of complaints converning Plourde's CB operation at his previous address. Plourde has not been cooperative in addressing these complaints. The base forfeiture for this type of violation is $8,000. However, pursuant to the Policy Statement, Standards for Assessing Forfeitures, it is appropriate to increase the amount of forfeiture when the conduct is intentional. In light of the history of complaints, it appears that Plourde's violation was intentional. The Commisson, therefore, increases the amount to $10,000. Illegal CB Equipment Seized ~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications September, 1992] US Marshalls, with the assistance of staff from the FCC's New York Office, seized radio equipment in the Flatbush section of Brooklyn, NY. The equipment was used to operatr an unlicensed radio station on 1260 kHz. The Seizure of "Radio Guinan" took place under Federal civil forfeiture provisions initiated by Assistance US Attorney, Christopher Lehmann, Of Brooklyn, NY. Engineers from the FC's New York Office located the station using mobile radio direction finding equipment. The pirate station was managed by Jean Lucien Borges of the Guinan Community Information Center and was the subject of a previous FCC invesitgation November, 1991. This investigation was initiated by complaints from radio stations WADO and WFME. The station was inspected by FCC engineers and was subsequently issued a written warning. The FCC referred the case to the US Attorney, Civil Division, after the station ignored the warning and went back on the air. Unlicensed radio operation is a violation of Section 301 of the Communications Act of 1934, as amended. Penalties for unlicensed operation included include fines of up to $100,000 and/or one year in prison. The US Department of Justice is proceeding with civil action against the equipment. Christopher Lehmann, Assistant US Attorney, is a handling the case. "We hope that this action sends a message to future would-be pirate radio operators. Unlicensed radio operators cannot disregard Federal Authority," said Alexander Zimmy, Engineer-in-Charge of the New York Office. New York Pirate Shut Down, Equipment Seized ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications September, 1992] US Marshals, with the assistance of agents from the Federal Communications Commission's San Francisco Office, confiscated illegal radio equipment from the Yak Yak Shack in Corning, California. Twenty-seven pieces of illegal radio equpment were seized. These included twenty CB linear amplifiers (capable of operating at power levels in excess of the limits set by the FCC Rules) and seven CB transceivers modified to operate on unauthorized frequencies. The use of such equipment can cause harmful interference to communications of safety-of-life (such as law enforcement, aviation, or marine), as well as to lawful CB users and home electronic entertainment equipment. The marketing, manufacture, and use of illegal radio equipment violates Section 302(b) of the Communications Act of 1934, as amended. Violators face potential criminal penalties of up to $100,000 in fines and/or up to one year in prison. Ordered To Pay $750 For Transmitting On An Unauthroized Frequency ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications August, 1992] The Commission ordered Gerald A Kawalec Of Fulton, TX, to pay a forteiture of $750 for unlicensed radio transmissions on a frequency assigned to the fixed aviation and international fixed public radio communications services. In his request for review, Kawalec stated that he was not aware that the frequency was not available for marine use. He was told to use this frequency by other radio operators or remembered an incorrect frequency, he stated, his radio should not have been able to transmit on this frequency. The FCC noted Kawalec was knowledgeable regarding radio transmitters, used the frequency at prearranged times to communicate with freind, used the frequency for the stated reason that it had clear reception, and used the frequency over a period of time. A person using a radio is respnsible for transmitting only on frequencies for which he is licensed, and misunderstanding or unfamiliarity regarding an FCC rule of license requirement does not exucse a violation. By Letter Of January 30, 1991, Kawalec indicated that he could not afford to pay the monetary forfeiture. The Field Operations Bureau requested documentation to support Kawalec's claim of inability to pay. In a letter to Kawalec, the Bureau stated "If you do not submit this evidence, the FCC will resume its review of your monetary forfeiture penalty assuming that you do not wish to maintain your claim of inability to pay." No documentation was provided. Pirate Radio Station Shut Down, Equipment Seized ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications August, 1992] A Clark, NJ Pirate Radio station was shut down, and its equipment was seized by the US Government, the FCC said. The seizure of "RADIO KAOS" took place under Federal civil forfeiture provisions initiated by the US Attorney, Micheal Chertoff, of Newark, NJ. US Marshals, with the assistance of FCC invesitgators from New York and Philadelphia and offices of the Clark Police Department, conducted the seizure. The station was located by an FCC engineer from Philadelphia, using mobile radio direction finding equipment. The unlicensed station operated on 7420 and 7415 kHz from a single family residence. The pirate station called itself "RADIO KAOS" and played rock and roll music. The operator of the station was also the subject of a previous FCC invesitgation concerning complaints of interference to home electronic entertainment equipment submitted by local residents to the FCC New York Office. Unlicensed radio operation is a violation of Section 301 of the Communications Act of 1934, as amended. Penalties for unlicensed radio operators include finces of up to $100,000 and/or one year in prison. The US Department of Justice is proceeding with civil action against the equipment and unlicensed radio operator. Peter Gaeta, Assistant US Attorney, Civil Division, is handling the case for the Government. "We hope that this action sends a message to future world-be pirate radio operators. Unllicensed radio operators cannot disregard Federal Authority," said John Rahres, Engineer-in-Charge of the FCC Philadelphia Office. Two Fines For $8,000-$10,000 Each For Unlicensed Operations Of Stations ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications August, 1992] The Commission notified two individuals that they are apparently liable for a monetary forfeiture of $8,000-$10,000 each for unlicensed operation of stations. The two individuals are: Robert Pizano, Tampa, Florida-$8,000 Donald W. Bishop, Overland Park, Kansas-$10,000 Illegal CB Equipment Seized ~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications September, 1992] US Marshals, with the assistance of agents from the Federal Communications Commission's San Francisco Office, confiscated illegal radio equipment from the Yak Yak Shack in Corning, California. Twenty-seven pieces of illegal radio equipment were seized. These including twenty CB linear amplifiers (cabable of operating at power levels in excess of the limits set by the FCC Rules) and seven CB transceivers modified to operate on unauthorized frequencies. The use of such illegal radio equipment can cause harmful interference to communications of safety-of-life services (such as law enforcement, aviation, or marine), as well as to lawful CB users and home electronic entertainment equipment. The marketing, manufacture, and use of illegal radio equipment violates Section 302(b) of the Communications Act of 1934, as amended. Violators face potential criminal penalties of up to $100,000 in fines and/or up to one year in prison. New York Pirate Shut Down, Equipment Seized ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Popular Communications September, 1992] US Marshals, with the assistance of staff from the FCC's New York Office, seized radio equipment in the Flatbush section of Brooklyn, NY. The equipment was used to operate an unlicensed radio station of 1260 kHz. The seizure of "RADIO GUINAN" took place under Federal civil forfeiture provisions initiated by Assistant US Attorney, Christopher Lehmann, of Brooklyn, NY. Engineers from the FCC's New York Office located the station using mobile radio direction finding equipment. The pirate station was managed by Jean Lucien Borges of the Guinan Community Information center and was the subject of a previous FCC investigation in November, 1991. This investigation was initiated by complaints from radio radio WADO and WFME. The station was inspected by FCC engineers and was subsequently issued a written warning. The FCC referred the case to the US Attorney, Civil Division, after the station ignored the warning and went back on the air. Unlicensed radio operation is a violation of Section 301 of the Communications Act of 1934, as amended. Penalties for unlicensed operation include fines of up to $100,000 and/or one year in prison. The US Department of Justice is proceeding with civil action against the equipment. Christopher Lehmann, Assistant US Atorney, is handling the case. "We hope that this action sends a message to future would-be pirate radio operators. Unlicensed radio operators cannot disregard Federal Authority." said Alexander Zimny, Engineer-in-Charge of the New York Office. AT&T Universal Card Services Selects Digital Systems, Voicelink ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of PR Newswire June 9, 1992 ] SEATTLE, June 9 /PRNewswire/ -- AT&T Universal Card Services (UCS) Corp. has entered into a business partnership and agreement with Digital Systems International Inc. (NASDAQ: DGTL) to purchase the company's Voicelink(R) Intelligent Call Management(TM) systems, Digital Systems announced today. Digital Systems designs, manufactures, markets and supports inbound and outbound telephone call management systems. Its flagship product, Voicelink, enhances the productivity, efficiency and revenue- generating capabilities of organizations that use the telephone to contact current and potential customers. UCS, which has more than 9 million accounts, will initially install a Voicelink system for use in its collections calling campaigns. By third quarter 1992, the company plans to install additional workstations and add fraud detection to its calling campaigns. Its calling center in Jacksonville, Fla., also will serve as a test site for new Digital Systems products. "We chose Digital Systems as a business partner because of our confidence in their existing technology and future products development," said John Dobosz, customer assistance manager for AT&T Universal Card Services Corp. Dobosz cited several reasons for selecting Voicelink over its competitors, including productivity, service and support, future product research and development, financial stability and the quality of Digital Systems' personnel. AT&T now ranks among the top three bank credit-card programs. Its Universal Card generated $13.2 billion in transaction volume in 1991, with $3.2 billion of that incurring interest charges. A relatively new card, the Universal Card has a 1.7-percent delinquency rate, compared to 4 percent to 5 percent for other issuers. "Increased delinquencies and fraud are the primary reasons behind higher interest charges," said Dobosz. "If we can keep these rates down, we can keep our interest charges to customers down." Digital Systems International Inc. is a publicly held company based in Redmond, Wash. It employs more than 400 people, and has been recognized as one of the country's fastest-growing small companies. /CONTACT: Jeanne Miller of Digital Systems, 206-869-4592; or Bruce Reid of AT&T Universal Card Services, 904-443-8894/ Sprint Adds To Sprint Clarity ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of PR Newsline May 19 1992 ] KANSAS CITY, Mo., May 19 /PRNewswire/ -- Sprint (NYSE: FON) today announced a new 800 calling option and other significant enhancements to the Sprint Clarity business communications offering announced in January. The latest options, available June 3, offer Sprint customers greater choice, flexibility and functionality that may be easily tailored to their individual requirements. Through these enhancements to the Clarity platform, Sprint will be the first to offer a fully integrated communications solution to the small to middle business market -- customers who spend between $100 and $75,000 per month on combined outbound and 800 services. The new Sprint Clarity options, part of an ongoing commitment to further enhance the product, include: -- Sprint Clarity 800 -- Feature-rich 800 calling option combines 800 and outbound services for greater volume discounts. -- Targeted Calling Options -- Lets customers tailor service in one integrated package versus competitors' multiple products or pricing programs. -- Clarity Maximum Value Plan (MVP) -- Rewards customers with greater discounts in return for a one, two or three-year commitment to Sprint. Sprint Clarity is an adaptable integrated solution that includes customer-defined invoicing and reporting, a variety of standard and enhanced call management tools and multiple access options. It also offers a variety of fax options, conferencing options, and a PC-based, menu-driven software product for generation of management reports and invoices. Sprint Clarity surpasses any other communications offering for the small and medium business owner today by providing the industry's first feature rich, fully integrated offering that combines all of a customer's switched and dedicated outbound, 800, card, cellular and international usage from all customer locations and applies this combined usage for greater volume discounts. Sprint Clarity enables customers to leverage their total purchasing power to provide a business advantage not available through Sprint's competitors. Sprint Clarity's "customer defined invoicing" enables customers to get invoice and reporting information for all locations and calling options, including 800, on one invoice, or individual site-by-site invoices, or any other way the customer prefers. Sprint Clarity customers may custom design their 800 and outbound service through a menu of advanced features for 800 call routing and call control services. "Sprint Clarity 800 positions Sprint for 800 number portability (in March 1993) when customers may move their 800 service to Sprint without changing their 800 number," said Gerry Euston, vice president of Sprint's Business Product Marketing. Targeted Calling Options enable Sprint customers to tailor their service based on specific intrastate, interstate and international calling patterns for each location. Options include In-state, Worldwide, Europe, Pacific, North America and South/Central America. This Clarity enhancement allows Sprint customers to modify service quickly and easily as calling patterns change, ensuring the best value for their telecommunications expenditure and eliminating uncertainty of selecting the best product. Clarity MVP rewards business customers who sign up with Sprint for one, two or three years with larger discounts on all their long distance calling including 800, card, cellular and international usage. One contract covers all services. "No one offers choice without confusion quite like Clarity," said Euston. "Sprint will design the optimal access arrangement and calling options for each customer. Customers simply select the desired billing arrangement and features for each of their locations from the Clarity Options Menu. Sprint does the rest. Customers may add to or modify their current selection at any time." Sprint is a diversified international telecommunications company with $8.8 billion in annual revenues and the United States' only nationwide all-digital, fiber-optic network. Its divisions provide global long distance voice, data and video products and services, and local telephone services to more than 4 million subscriber lines in 17 states. /CONTACT: Janis Langley, 202-828-7427 or, after hours, 703-533-3322, or Vince Hovanec, 202-828-7423 or, after hours, 202-387-1496, both of Sprint/ States, Phone Carriers Adopt Procedures To Address 900-Number Fraud ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of PR Newswire June 20, 1992 ] HARRISBURG, Pa., May 20 /PRNewswire/ -- More than 30 states, including Pennsylvania, and the nation's three major long-distance phone carriers have adopted formal voluntary procedures to help eliminate consumer fraud schemes that utilize 900-number services, Attorney General Ernie Preate Jr. said today. Preate said the procedures are similar to those his office has been using on an informal basis with the carriers for more than a year. "The procedures announced today spell out the steps to be taken by AT&T, MCI and Sprint when they receive complaints from participating states about potentially fraudulent 900-number promotions," the attorney general said. "Here in Pennsylvania, my Public Protection Division and the Office of Consumer Advocate have been using similar procedures for some time to deal with businesses that attempt to rip off consumers through deceptive 900-number schemes. "I'm pleased that these procedures have been formally adopted by more than 30 states because they provide a method for attorneys general and the carriers to effectively address unlawful practices and preserve funds for potential consumer restitution." Businesses nationwide offer a wide range of pay-per-call services -- such as sports scores, vacation deals and contests -- through 900 numbers. The calls generally are carried by long-distance companies that do the billing under contract with the service provider. "Thousands of consumers have been victimized by 900 numbers that provide fraudulent or worthless services or that fail to adequately inform callers of the cost of the 900-number call," Preate said. The attorney general served on a national task force which concluded last year that 900-number services "have emerged as one of the most significant vehicles for consumer fraud in recent history." Preate said he has called for comprehensive federal legislation to regulate 900-number service and noted that he created a 900-Number Task Force in Pennsylvania to investigate and deal with complaints about pay- per-call services. "We've had considerable success in working with the carriers to shut down deceptive 900-number solicitations," the attorney general said. He noted that at his urging, AT&T, MCI and Sprint all agreed last October to block illegal 900-number services that claim to help consumers find jobs. Such services are illegal, Preate said, because they charge consumers a fee prior to the caller actually securing employment -- a violation of the state's Employment Agency Law. "I still believe legislation is needed to eliminate fraud in the booming 900-number industry, but the voluntary procedures formally adopted today are a step in the right direction," Preate said. When an attorney general contacts a carrier about a 900-number promotion carried on its lines, the procedures provide that the carrier will: -- Review and investigate the 900 promotion. -- Consider exercising it right to terminate billing and collection services. -- Consider withholding funds that are due to the service provider to the extent allowed under its contract with the provider. -- Upon formal legal request, provide detailed information about calls to the 900 promotion in question. In addition, the carriers will continue reasonable efforts to review scripts and advertisements of 900 numbers operated through their lines. Formal adoption of the voluntary procedures was announced today in Washington by Tennessee Attorney General Charles W. Burson, chairman of the National Association of Attorneys General (NAAG) Consumer Protection Committee, and New Jersey Attorney General Robert J. Del Tufo, chairman of NAAG's 900 Number Subcommittee. /CONTACT: Jack J. Lewis of the Office of Attorney General, 717-787-5211, or at home, 717-657-9840/ ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 17 of 19 The United Phreaker's Incorporated Underground Newsline Part 3 By Arch Bishop & The Lost Avenger Suspect Arrested In Ring That's Disrupting 911 Services ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Richmond Times Dispatch October 10, 1992 ] A loose network of computer hackers bent on disrupting emergency 911 services in several parts of the nation - including Chesterfield County - was penetrated early yesterday. A Newark, NJ man arrested, Chesterfield police said. The hackers call themselves the Legion of Doom, said Capt James P Bourque, commander of investigations for county police. For the past three mounths the group has been tying up some 911 lines in Chesterfield - usually late on weekend nights, he said. Bourque said the arrested suspect a 23 year old man with several alaises and the last name of Maverick told authorities that the mission of the group is "to attempt to penetrate 911 computer systems and infect them with virues to cause havoc." "obviously," Bourque said, "there's a real potential for disastrous consequences." A team of investigators and prosecutors from Chesterfield, New Jersey and Maryland - in concert with investigators from American Telephone & Telegraph Co. and Chesapeake and Potamac Telephone Company of Virgina - traced some of the hackers and the net closed on three resideneces in two states at 2:am yesterday, Bourque said. Maverick was the only one arrested but other arrests are likely in two Maryland locations. Bourque said. Maverick faces several charges, including fraud, he added. Also during the Newark arrest, authorities seized "Computers, 200 pieces of software and three computer devices which being used to penetrate phone systems belonging to large businessess across the nation." He said the investigation is just the beginning. "Quite honestly, I think it's only the tip of the iceberg." He said the hackers first penetrated the phone lines of large companys or pay phones, then use those connections to call 911 lines. To complicate matters, the hackers usually make confrence calls to other 911 services in other cities, tying up communication in several locations at the same time. "One time we were linked up with Toronto and Los Angeles jurisdictions." Bourque explained, "And none of use could disconnect." Bourque said there would some $100,000 worth of phone calls" generated by the hackers, Bourque said. "I'm sure there are a multitude of other jurisdictions across the country having the same problems," Said Bourque. People Identifying themselves as members of the Legion of Doom have called WRIC-TV in Richmond and ABC in New York in attempt to get publicity Borque said. So far, he said , Chesterfield 911 phone system hasn't been billed for any long-distance confrences calls. "We have safe guards built into the system to prevent that, and so far, he added, the calls haven;t tied up enough lines to underminded public safety. But he conceded that investigators are up against some "very computer literate" criminals. Maverick, for example, formaly worked for a computer firm, Bourque said. "Another employee is a former telephone [company] employee." Bourque said the lead investigator on the case for Chesterfield - Detective Duncan Beasly - decribed how difficult it has been to sort out the mess. "It's sort of like working a crime that you didn't know what (criminal) code it comes under. PIN Money for Thieves ~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Risks Forum Digest July 8, 1992 ] Italian thieves have managed to pull off the world's most ingenious cash card fraud. A perfect replica of a bank cash dispenser was glued on top of the real thing and swallowed cards inserted by unsuspecting customers when they tried to withdraw money. Police say that the thieves collected 104 cards before staff at the bank, in Busto Arsizio, near Milan, were alerted. Normally a stolen bank card is useless without the owner's Personal Identification Number. But the thieves programmed their fake machine to request the customers' PIN numbers before telling them the card had been accidentally demagnetized and was being retained. After collecting the cards, the thieves then spent the night withdrawing money from genuine cash dispensers. A police spokesman said: "The thieves have been having a spree, withdrawing money with the credit cards and the right PIN numbers. They were obviously electronics experts." Virus Consumes Clerks At Sears ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Risks Forum Digest July 8, 1992 ] My mother-in-law is a sales clerk at a Sears store in Everett Washington. I saw 25 new CompuAdd point-of-sale terminals in the back room. They're super techie, with a small CRT, ASCII keyboard, fancy strip printer, and mag card stripe reader. They were supposed to be installed months ago, but apparently they have a dose of the Michaelangelo virus. "Michaelangelo? On a terminal? Are you sure?" I asked. Needless to say, the answer was not too specific. She said it might also have been on a PC that configures the terminals, rather than the terminals themselves. Doesn't Michaelangelo only strike on one day of the year? All she knew was that they were "full of viruses" and could not be installed. Sears has its share of troubles these days, and apparently it is running so lean and mean that there is no one in the store with enough computer smarts to get things cleared up in the intervening months. So there they sit, depreciating. But they'll *sell* you a computer...If you dare...bwah ha ha! And you thought people who knew what viruses are were scared... World's First Voting By Phone: June 20 In Nova Scotia ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Risks Forum Digest July 8, 1992 ] After an initial failure on June 6, the Liberal Party of Nova Scotia held a primary June 20 to elect its next leader: 94% of the 7416 delegates voted, all with touch-tone phones. Typical turnout for Canadian elections is 60-70%. The Liberals were issued Personal Identification Numbers by mail. For each of 2 ballots, voters called one of five 900 numbers corresponding to their choice of leader, and then keyed in their "PIN number". The computer then checked their number off so they couldn't vote again. John Savage won on the second ballot with almost 53% of the vote. The service was provided by Maritime Telephone & Telegraph and cost each voter 50 cents. The eight-digit PIN numbers enabled one to vote from any billable touch-tone phone: if you did't have touch- tone, you'd borrow your neighbor's. Absentee voting was as simple as picking up the phone, wherever you were. With this success, the Canadian government is considering a national referendum by phone on the results of their Constitutional Convention, within 6 months. The Federal Voter Assistance Program of the Pentagon is now considering voting by phone for servicemen, who had voting by fax from the Persian Gulf. But a $300 fax machine is overkill when a $10 touch-tone phone will do. The Program called the Voting by Phone Foundation of Boulder for their initial information. The Voting by Phone Foundation is now in a petition drive to put a charter amendment on November's Boulder City ballot. If passed Boulder would become the first city in the U.S. to offer the option of phone voting. Please call [Evan at] (303)444-3596 to help. The Foundation is holding a demonstration of voting by phone from now until the Noveber 3rd election. Anyone may call (303)444-3596, 24 hours a day. If you are registered to vote in Boulder, you will be asked to enter your last name and birth date for identification. This limits you to one vote, although not as effectively as the random PIN number to be used for real elections. A different question will be asked every 2 weeks, and presidential [... rest truncated by Evan's mailer?] Hacker Hits Cincinnati Phones ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of STReport Issue 8.38 ] A computer hacker apparently in the New York area broke the code into one of the Cincinnati, Ohio, phone trunk lines, building up a $65,000 phone bill. Cincinnati city officials say the unknown invader racked up the charges last winter and spring by placing calls around the world. David Chapman, the city's assistant superintendent for telecommunica-tions, said that investigators think the tap originated in the New York-New Jersey area, but they have no suspects and the investigation is considered closed. Chapman added, "Apparently these people were pretty darn slick, but talking to the Secret Service, we were small potatoes. I understand there have been some major companies hit." Time Magazine Computer Analyst Arrested for Alleged Fraud ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of STReport Issue 8.29 ] A computer analyst, Thomas Ferguson, 44, who worked at Time magazine's Tampa, Fla., customer service headquarters has been arrested after allegations he sold thousands of subscribers' credit card numbers for $1 apiece. Ferguson has been with the magazine for 18 months, faces four counts of trafficking in credit cards, authorities said. Police found computer disks containing the credit card numbers of about 80,000 subscribers at Ferguson's Clearwater, Fla., home. Authorities said they met Ferguson four times to buy about 3,000 credit card numbers since being tipped off to the scheme in June. Time executives say that all credit card customers should examine their credit card bills closely. If unauthorized purchases show up, they should call the financial institution that issued the card. Canadian Regulators Approve Long-Distance Competition ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Computer Paper August 1992 ] OTTAWA, Ontario, Jun 15 (NB) - Canada's federal telecommunications regulators have ended a century-old monopoly on long-distance telephone service across most of the country, approving two applications to offer long-distance service in competition with established telephone companies. Within about a year, telephone subscribes in seven of Canada's 10 provinces will have at least one will have at least one alternative to the provincial and regional phone phone companies that until now have controlled all long-distance traffic. Competition in at least one of the remaining three provinces is probably not far behind. Major telecommunications users are pleased. "We're delightfully surprised," said George Horhota, president of the Canada Business Telecommunications Alliance (CBTA), a group of major companies using telecommications services. "No, that's proably too mild - I guess we're really ecstatic." Others are not so sure. Philippa Lawson of the Public Interest Advocacy Centre in Ottawa expressed concern that while the CRTC said it did not expect the ruling to result in an increase in local rates, it did not other guarantees. The Canadian Radio-television and Telecommunications Commission (CRTC) approved an application by Unitel, a Toronto-based provider of data communications services, to compete with telephone companies in British Columbia, Ontario, QUebec, New Brunswick, Prince Edward Island, Nova Scotia, and Newfoundland. When Unitel filed its application in May, 1990, telephone companies in ALberta, Saskatchewan, and Manitoba were provincially regulated and thus not subject to CRTC jurisdiction. Since then, Alberta has come under federal regulation, and a Unitel spokesman said the company plans to apply almost at once to have its mandate extended to that province. The CRTC also approved a second application from Lightel, a Toronto reseller of communications service, and BC Rail Telecommunications of Vancouver. This partnership wants to offer competitive long-distance service in British Columbia, Ontario, and Quebec - Canada'a three most populus provinces. In granting these two applications, the regulators also sent strong signals that their vision for long-distance competition in Canada follows the American model, with a market open to an unlimited number of players, rather than the present British model, where only two companies operate. In the CRTC statement announcing the decision, Louis (Bud) Sherman, who chaired the hearings, said the regulators had decided that a "policy of open entry would be the best way to stimulate the benefits of competition. Conqequently, we will be favorably disposed to future applications filed under similar circumstances to provide long-distance service if applicants abide by the terms and conditions established in this decision." Horhota praised this aspect of the decision in particular, saying an open-ended market is needed to encourage all competitors to provide the best possible service. "The worst thing that could have happened was that they authorized a duopoly," he said. "We don't want just market sharing." The CRTC also liberalized the rules governing the resale and sharing of telecommuications services allowing resellers to offer Wide-Area Telephone Service (WATS) in all federally regulated provinces and extended the rules that have governed other federal jurisdictions to Newfoundland, Nova Scotia, Prince Edward Island, and New Brunswick (which came under federal regulation more recently). Peter Janecek, a spokeman for Unitel, said his company will be able to offer long-distance services to business customers on a limited basis almost immediately. The company plans to begin a general rollout of service in about a year, he said, and within a year from that time hopes to make long-distance service available to about 65 percent of the people in the provinces it will serve. By the end of the second year of service, he added, about 85 percent of telephone subscribers in the affected provinces should have access to Unitel service. At first, those who want to use competitive services will have to dial extra digits to tell the telephone systems to route their calls over the Unitel or BC Rail/Lightel network. Within a couple of years, Janecek said, telephone switched will be modified so that subscribers can choose any long-distance provider and have their calls routed to that network automatically, as happens now in the United States. Lawson questioned the benefits of the decision for residential customers and those in rural areas. Most residential customers don't use long-distance service enough to make a change of service providers worthwhile, she said. She added that all competitors will probably concentrate on winning as much as possible of the long-hual traffic between major urban centres, meaning new services and discount offerings are unlikely to be made available to those in smaller towns and rural areas. Bell Canada, the largest Canadian phone company with service in Ontario and Quebec, responded to the announcement with complaints that the rules gave an unfair advantage to its new competitors. While the decision requires Unitel and BC Rail/Lightel to make payments to the regional phone companies to support local service, Bell said, it does not make them pay their fair share. However, a position statement from the office of Bell Canada Chairman and Chief Executive Jean Monty indicated Bell has no plans to contest the decision. "I feel like a card player who's been dealt a hand of cards," Monty said in the statement. "Now let's play." Bell Canada did not respond to a request for further comment by Newsbytes' deadline. Contact: Bell Canada, 613-781-2443; CRTC, 819-997-0313, fax 819-994-0218; Unitel, 416-345-2483 GEnie Now Available On Canada's Datapac ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Computer Paper September 1992 ] General Electric's GEnie online information service can now be access through the national Canadian Datapac packet switching system. It means that GEnie can now be dialed into directly as a local telephone call in more thatn 200 Canadian cities - including Toronto, Calgary, Edmonton, Vancouver, and Winnipeg. These are, of course, in addition to GEnie's fourteen exisitng Canadian nodes. To use the Datapac access, dial the local Datapac number in your city and enter 95700517 as a network user address if live in Eastern Canada, and 84400312 if you live in Western Canada. King County DA Goes After Alleged Canadian Virus Author ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Computer Paper October 1992 ] SEATTLE, WASHINGTON (NB) - Alleged computer virus author Richard Brandow is one of four people against whom the King County, Washington district attorney's office has filed charges. Brandow is reportedly a former Canadian computer-magazine publisher who know writes for the television series "Star Trek" but who is accused of writing a Macintosh virus which infected software disks distributed by commercial software company Aldus. The infection of the Aldus software disks occurred in 1988 and Brandow is charged with malicious mischief as the alleged author of the virus software program that infected the disks. While the Associated Press reported Brandow received an award from the Canadian Software Association, who said his virus encouraged people to stop making pirated copies of software and buy it instead, Aldus doesn't seem to appreciate Brandow's reported efforts. Aldus filed a complaint with the King County DA's office four years ago when the infection occurred. The company said it had to recall five to seven thousand copies of its FreeHand software, which cost it $7,800, but more importantly it incurred intangible losses in its reputation. Mark Cantor, former president of Macromind, was allegedly the direct source of the Aldus infection, King County Assistant Prosecutor, Ivan Orton, told Newsbytes. When asked what the DA's office could do if Brandow refuses to show up for a hearing to be held next Friday, Orton said the next step is to request a warrant for his arrest and contact the state department to see if the U.S. agreement with Canada allows extradition for malicious mischief. If not, Brandow's information will be place into the National Crime Information computer network and if he enters the U.S. and is apprehended he can be held and delivered to Washington, Oroton said. Orton said Brandow seems to be quite vocal and he is welcome to use the trial as a stage from which to speak. However, the downside is if the audience in a trial disagrees with you, you can go to jail, Orton quipped. When asked why wait four years, Orton said the King County prosecutors office has filed criminal charges against four individuals in four separate cases, three of which involve employers and employees. The hope here was to take the emphasis off computer viruses and place it on computer crime, where it belongs, Orton added. The other three cases include an ex-employee who allegedly place a date bomb in his employer's computer system; a government employee who allegedly got into area of the Washington State computer system where he could have issued checks and fixed traffic tickets; and an employee of Asymmetrix who after being terminated, allegedly copied the engine for some multimedia software under development and tried to start her own software company. Contact: Brad Stevens, Aldus, tel 206-628-2361; Ivan Orton, King County DA, tel 206-296-9010, fax 206-296-9009. Northern Telecom's Mac & PC-based Videoconferencing Tools ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Computer Paper August 1992 ] MISSISSAUGA, Ontario, Jun 15 (NB) - Northern Telecom has entered the videoconferencing market with Vist Cideo, a desktop videoconferencing product for Apple Macintosh and DOS machines. Northern also unveiled Visit Voice, call-management software that it will offer as part of Visit Video as well as separately. Visit Video will permit two-way desktop videoconferencing over 56-kilobit-per-second lines linking Apple Macintosh computers and/or IBM and compatible PCs running the DOS operating systems and Microsoft Windows 3.0 or later. For the future, Northern is promising a version of Visit Video for IBm's OS/2 operating system and support for color videoconferences. Multipoint conferncing is also "a future possibility," company spokeswoman MaryLynn Hillier told Newsbytes. Vist Video will let participants in a videoconference see each other on their computer screens. FUll screen-sharing and file-reansfer capabilities will be added early 1993, Northern said. The software conforms to Intergrated Services Digital Network (ISDN) standards, expected to be implemented across North America later this year, Northern said. It also works with private branch exchanges and switching equipment from Northern Telecom and other vendors. The Macintosh version of Visit Video is available now to a limited extent, Hillier said. The DOS version is due to be available in September. The complete package, including software, video board, and cabling, will cost C$3,750. Visit Vioce, a call-management tool that lets users dial, set up directories, log phone calls, and track usage, will be available separately for less that $300, Hillier said. Quebec Dealer Convicted Of Software Piracy ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Computer Paper October 1992 ] QUEBEC CITY, QUEBEC (NB) - Centre d'ordinateurs Microbec, a chain of four computer stores, has been handed the largest software-copyright fine in the province's history. The company was fined C$63,000 for selling computers loaded with illegal copies of the MS-DOS operating system. The fine is not the worst of it for Microbec. When the Royal Canadian Mounted Police raided the company last October, they seized about 140 computers carrying the illegal software as evidence. Since the company was convicted, the seized hardware will not be returned, said Allan Reynolds, manager of the Canadian Alliance Against Software Theft (CAAST), a Toronto-based group of major software vendors set up to fight software piracy. Reynolds said the value of the seized computers is "more than double the fine amount in terms of revenue value." It could have been worse, though: the Copyright Act allows for fines of as much as $1 million or imprisonment for up to five years in cases of this type. Charges against the mangers of three Microbec stores have been dropped, and charges against the company's owner, Guy Painchaud, will be dropped as long as the fine is paid by January 18, 1995, CAAST said. CAAST's members are Autodesk Canada, Borland Canada, Lotus Development Canada, Microsoft Canada, Novell Canada, and Quarterdeck Canada. Reynolds said the group hopes to announce the signing of another major software vendor in the next couple of months. Contact: CAAST, 416-598-8988. Bottom-End Ticklers In BT Rip-Off ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Daily Mirror July 28, 1992 ] Phone box cheats known as "bottom-end ticklers" are ripping off thousands of punds from BT. They use a six-inch wire with a hook on the end - similar to a metal coathangar - to dial the world for free. One of the fiddlers, a man called Abdul who lives in Birmingham, boasted yesterday: "I ring my family back home in the Middle East nearly every day. All my friends do it to make free call, too. "I don't know anybody who actually pays for phone calls any more. "This must be costing BT tens of thousands a year." Angry Callers Help Convict Man Behind Beeper Scheme ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Milwaukee Mirror August 16, 1992 ] NEW YORK, N.Y. - A Manhattan man has been convicted of leaving messages on thousands of beepers for a telephone number that cost $55 to call. While the defendant, Michael Brown, 23, never made a dime, prosecutors said he stood to make millions before he was caught last year. They said he tried to defraud thousand of potential victims. US Atty. Otto Obermaier said Brown hooked up two computers in his apartment and then attached them to two telephone lines. On one line, the computer placed more than 4,000 calls a day to pagers that people carry with them. A message said that a return call for telephone-based informational services should be made to a special 540 number on Brown's second line tied to the second computer. What the unsuspecting people who returned the calls were not advised is that it would cost them $55 a call, in violation of a New York State Public Service Commission regulation requiring operators of toll numbers to advise incoming callers of the cost so they can hang up before being charged. But Brown devised a scheme in which the computer kept callers on the line for at least 20 seconds, the time required so they could be billed for $55 by the telephone company. In a six-day period in February 1991, the first computer spewed out a total of 26,000 calls. But the fraud did not last long because irate subscribers inundated New York Telephone with complaints of the $55 charge. By the time the company notified federal prosecutors and disconnected Brown's two lines, he had billed a total of $198,000. But prosecutors said that he never collected a dime, and that New York Telephone made no efforts to collect the bills. After his conviction last week, Brown faces up to five years in prison and a fine of $250,000 when he is sentenced on Oct. 28. He is free on $30,000 bail. The '087' service is like the 900 service in the USA -- mainly sleezy numbers for lonely people ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Pretoria News July 23, 1992 ] One of beleagured Telkom's main problems appears to be a lack of the high technology needed to support the controversial 087 service,. Consumers, faced with ever increasing phone bills, continue to demand detailed billing in order to establish exact charges on their bills. The discontinuation of a subscriber's telephone service due to non-payment of the 087 charges is also a bone of contention. There is legislation in the US preventing telephone companies from disconnecting a customer's basic telephone service for failure to pay 087 service charges. However, South African consumers are not so lucky. Telkom, at this stage, lacks the ability to separate 087 calls and other telephone charges. This means if a consumer disputes charges on a telephone bill, he does not have the option of paying only for normal telephone calls without losing his telephone line. Neither do comsumers have the right to dispute charges for 087 calls and to have these charges removed from the telephone bill. Telkom also pays 087 service providers before collecting from the consumers, so Telkom carries all bad debt arising if consumers fail to pay high telehone bills. Testimony in a Senate Committee hearing in the US last year again indicated there was almost universal support for the requirement that consumers have the right to block 087 services (in the USA = 900). This service is provided free of charge at least once on request. South Africans will soon be able to block 087 calls on their service -- but at a price. It will cost people on an electro-mechanical exchange R20 (about $8) to block the service. A Telkom spokesman said the older electro-mechanical exchanges were not capable of recording details of calls made. Furthermore, the computer network needed for detailed billing was not available. New Ads Heat up AT&T-MCI Rivalry ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Washington Times July 21, 1992 ] AT&T and MCI's war of words is getting personal. The newest TV commercials for AT&T's long distance rates attack the ethics behind MCI's recent spots promoting a new international calling plan. American Telephone & Telegraph Co. says MCI used unfair comparisons to claim savings of 45 percent or more off AT&T's rates. MCI Communications Corp matched its "Around the World" discount rates against AT&T's basic rates, rather than its cheaper "Reach Out World" discount plan for international calls. "Blatantly deceptive," said AT&T spokesman Jim McGann on behalf of the nation's biggest long-distance company. "Fair," countered Debra Shriver of Washington-based MCI, the No. 2 carrier. Most AT&T customers make their international calls on the company's basic plan, not "Reach Out World," Ms. Shriver insisted. Besides, she said, most of AT&T's advertised discounts compare with AT&T's basic rates. "If they've been comparing their own rates to [basic] dial-1 rates, why can't we do it?" she said. "How can that be fair?" Mr. McGann said of the MCI ads. "You've got to compare comparable plan to comparable plan. If someone makes a lot of international calls, it would make sense for them to sign up for 'Reach Out World'. For example, an MCI spot claims a call to France on its new plan would save 57 percent against AT&T's basic rate. Part of that savings comes from designating one foreign number as part of MCI's "Friends & Family" plan. For any other numbers in France, AT&T says, the savings against its international discount plan would be 1.6 percent. Stoking the fires, Mr. McGann called reporters yesterday about his company's ads, which first aired over the weekend. AT&T also provided videotapes and transcripts. AT&T and MCI have never hidden their mutual dislike. MCI helped hasten the breakup of the telephone monopoly with antitrust lawsuits in the 1970s. And in 1989 the two companies sued each other with claims of unfair advertising. They settled out of court. MCI has always compared its rates with AT&T's, even erecting electronic toteboards to show the supposed savings MCI's customers have enjoyed over AT&T users. The latter's commercials have jabbed at MCI's popular "Friends & Family" plan, in which MCI callers get extra savings if they sign up other customers. Sprint, No. 3 in the long-distance market, has taken on both rivals. But the new AT&T ads aim squarely at MCI's credibility. "Do you judge a company's ethics by their advertising?" an off-camera voice asks a man in an antique restoration shop in one spot. Answering more questions, the man says the MCI ads promise 50 percent savings through "Friends Around the World" but says he did not realize the savings wer off AT&T's basic rate. Why doesn't the MCI advertising compare discount plans? "I think the answer is obvious," the man replies. In another commercial, a woman says the advertising would change her opinion about the advertiser. Ms. Shriver said MCI stands by its ads and has no plans to change them or lob an attack back at AT&T. Sprint Announces A Commercial Data Internet Service ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of The Washington Times July 21, 1992 ] WASHINGTON, D.C., July 22, 1992 -- Sprint today announced commercial availability of SprintLink(sm), the first commercial Transmission Control Protocol/Internet Protocol (TCP/IP)-based data transmission service offered by a national long distance carrier. SprintLink is a router-based network supporting the TCP/IP protocol suite for data communications. SprintLink is part of the company's expanding service to the business, scientific and research communities. It complements Sprint's frame relay and SprintNet(R) (X.25) services for computer and local area network (LAN) interconnection. SprintLink also provides access to the Internet, a group of about 8,000 interconnected data networks in more than 80 countries serving government, academic and research organizations. "SprintLink demonstrates the benefits of technological collaboration between government and industry," said Chris Rooney, president, Government Systems Division. "The extension of this new service will generate commercial applications and will help American business and government be more productive and creative." SprintLink grew from Sprint's expertise in TCP/IP and international networking. In early 1991, Sprint began providing and managing a network to link the National Science Foundation's U.S. computer communications network (NSFnet) with the French scientific and research network, INRIA, at Sophia-Antipoles in southern France, and the Scandinavian scientific and research network, NORDUNet, in Stockholm. Sprint has since added to its NSFnet interconnections links to Japan and the United Kingdom. Additional connections are currently planned to South Africa and to numerous Latin American and Caribbean countries. In February, Sprint introduced SprintLink to government agencies. Since that introduction, SprintLink has attracted more than a half-dozen major customers. During the next year, Sprint plans to add gateways to Sprint's X.25 public data network, SprintNet, to allow SprintNet users to access SprintLink, both nationally and internationally. Sprint will also connect its frame relay service to SprintLink thus allowing Sprint's frame relay customers access to the global Internet and to enable management of routers connected to Sprint's frame relay in an integrated manner. Sprint plans to offer SprintLink on a dial-up basis. SprintLink is accessible via dedicated lines from all of the company's 270-plus domestic points-of-presence. Customers can access the service at speeds ranging from 9.6 kbps to T1 (1.5 mbps). Customers also can maximize use of a T1 line by combining multiple voice and data services, including SprintLink, on that line, a feature available only through Sprint. SprintLink is priced at a flat monthly rate according to port speed for each location. Sprint is a member of the board of directors of the Commercial Internet Exchange (CIX) Association, a cooperative effort among public data internetwork (PDI) service providers to promote the fair, open and competitive operations of IP-based networking. Other members include General Atomics, which operates CERFnet; Performance Systems International, Inc., which operates PSINet; and UUNET Technologies, Inc., which operates AlterNET. Sprint is a diversified international telecommunications company with $8.9 billion in annual revenues and the United States' only nationwide all-digital, fiber-optic network. Its divisions provide global long distance voice, data and video products and services, and local telephone services to more than 4 million subscriber lines in 17 states. Controversial Telemarketer Woos MP ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Toronto Computes July, 1992] Bell Canada is trying to put the squeeze on a Toronto telemarketer who has allied himself with a local Member of Parliament. Responding to a barrage of complaints from customers, Bell has asked the Canadian Radio-television and Telecommunications Commission (CRTC) for rules restricting those who conduct ad campaigns through massive telephone autodialing. Automatic dialing is controlled by a series of PCs linked to hundreds of phone lines. The target of the complaints is Marvin Fine, an engineer who calls himself the King of Auto-dialing. Through his company DFD Telebroadcasting, Fine has inundated the Toronto area with recorded messages--hundreds of thousands of calls a day--promising high-paying jobs, credit cards for those with no credit rating, books that teach you how to make money by watching TV and other unusual offerings. Fine earns $1 million a year from his various businesses. His auto-dialing blitz has prompted numerous complaints to members of Parliament, the Better Business Bureau, Bell Canada, the CRTC and the Canadian Direct Marketing Association. Toronto Computes! has learned that Bell made the proposal to the CRTC largely because of complaints about Fine. In June the Globe and Mail quoted a Bell vice president that "an unnamed Toronto telemarketer was a particular nuisance, prompting 'thousands' of calls." A person who asked not to be identified confirmed that Fine is the unnamed telemarketer. Last winter Fine's operations were characterized as a "con job" by noted writer Pierre Berton in two columns in the Toronto Star. Now Fine has extended his operations to politics, donating his technology to help raise money and support for Liberal Dennis Mills, MP for Broadview-Greenwood. Mills is promoting a flat-tax scheme similar to that of former California Governor Jerry Brown, an unsuccessful candidate for the Democratic presidential nomination. Fine's activities may soon be severely curtailed if Bell gets the CRTC to adopt its plan. Bell wants to give any customer the right to join a "do not call" list. Bell would disconnect the lines of any telemarketer who persisted in calling people on the list. A decision from the CRTC is expected toward the end of August. In February Bell responded to customer complaints by disconnecting more than 300 phone lines from Fine's offices. However, some of Fine's phone lines remained in operation just outside Metro Toronto. As well, he still has ten lines in North York spewing out faxes for his various promotions. One fax reads, "100 drivers needed, earn up to $18.50 per hour, good command of the English language not required." Anyone interested is asked to call 1-416-976-2273. The bottom corner of the fax reads, "$2.00 min./5 min. minimum". The fax features an illustration with sketches of people resembling sketches in an ad for Computer Fest (see accompanying article in box). The 976 exchange allows Fine to charge $10 to anyone phoning for information. The $10 is deducted from the caller's phone bill, of which Bell remits about $9 to Fine, while Bell keeps the rest. For the $10, the caller gets to use a push-button phone to choose one of a menu of messages. One message tells you how to earn up to $18.50 an hour handing out pamphlets. In fact, said a source, those who hand out pamphlets seldom earn half that much. Only those who can distribute pamphlets at a superhuman speed can earn $18.50 an hour, she said. Another message tells the caller about a book that can teach you how to get a credit card, even if you're bankrupt or have a bad credit rating. The credit-card pamphlet costs an additional $10, and is a thin photocopied document that looks hand-stapled. The pamphlet, bearing the name Marvin Fine, explains why some people can't get credit cards. It advises those who are unemployed to get a job or get a credit guarantee from someone who has a good credit rating. Another offering from Fine is a "Vista Gold Credit card" (that's Vista, not Visa), a promotion savaged in the Toronto Star by Pierre Berton. "It isn't a credit card at all, it's an invitation to order from a catalogue full of merchandise. It costs $10 to order the card, and another $40 to order the catalogue. Marvin can't lose." MP not bothered The torrent of complaints and criticisms don't bother MP Dennis Mills. "I know that there's lot of stories out there about Marvin Fine but I'm not involved in his business," he told Toronto Computes! "Some of his work has been closed down, sure, but there's lots of people that have been shut down." In an earlier interview Mills said he was happy to be the first politician in Canada to use auto-dialing. Mills's recorded message on the flat-tax scheme is short and invites the recipient to hang up if they don't want to listen to his ideas. In a flat-tax system, all taxpayers would pay the same rate, say 25 per cent, regardless of income. The tax reform message goes out daily over 82 lines. Mills had hoped to place about 100,000 calls a day. However, he's only been getting out about 30,000 to 60,000, but he said that's good. "It means people are listening to the whole message without hanging up." Mills was approached with the idea by Fine who sympathized with Mills's tax reform crusade and offered his calling system for free. "It would cost Dennis $18,000 a month if he was paying for it," Fine said in an earlier interview. Mills said that Fine told him he could talk to a million people a week through autodialing. "Can you imagine saying that to a politician? Geez, if I can talk to 50 people at a town hall meeting, that's pretty good." Fine and his brother Ed spent seven years and $1.5 million developing the system, called Power Calling, which runs under DOS and contains about 200,000 lines of programming code. According to a DFD spokesperson, if you don't want to receive recorded calls, you can phone DFD and have your number removed from the company's database. But DFD does not adhere to a large do-not-call list compiled by the Canadian Direct Marketing Association which represents 700 telemarketers in Canada. All members of the CDMA refrain from calling the 115,000 people who have had their names entered on the list. DFD is not a member of the CDMA which is backing Bell's proposal to the CRTC. CDMA spokesperson Christina Sears said the CDMA is "very aware" of Fine because it has had "a number of complaints about him. We've had a number of discussions with Bell Canada on exactly what to do about him." Sears said most telemarketers are honest. "The vast majority of telemarketing is above board, and people don't have a problem with it. But one or two operators cause all the problems for everybody and gives the industry a bad name." She said 75 per cent of telemarketing is company-to-company or involves an existing relationship, such as a bank calling a customer to remind them it's RSP time. Nova Scotia Tele-Voting Has Chaotic Debut ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Toronto Computes July, 1992] After a few weeks of chaos, the Nova Scotia Liberal party elected a new leader--by phone. Using a 1-900 number, 7,000 Nova Scotia Liberals stayed at home and chose Dartmouth mayor John Savage who won by 300 votes on the second ballot. All Nova Scotia Liberals were entitled to vote. During the first vote on June 6, the main computer crashed, forcing embarrassed party leaders to suspend the tele-convention. It's the first time a political leader has been chosen by remote control. Maritime Telegraph and Telephone Company calls it "tele-democracy". Colin Latham, MT&T vice president of business services, says the first vote failed because there were too many phone lines doing too much at once, and not enough memory to handle the task. When all 216 input ports roared at once, the computer "crashed virtually instantaneously." In the successful run two weeks later, the phone ports were cut to 100, prevnting overload. As well, memory capacity was doubled. Tele-voting is not new, but it's never before been used for politics. In the past it's helped canvass the viewing public on a variety of opinions--which b-movie to run on pay TV, whether Eric Lindros should be forced to play in Quebec City or whether Sunday shopping will mark the end of civilization. Televoting usually costs each participant a 50-cent surcharge on the phone bill. Tele-democracy phone-ins involve Personal Identification Numbers, or PINs. The voter calls in, listens to a message and when prompted, punches in an eight-digit PIN. When the vote is registered by the computer, it deletes the PIN and the voter rushes back to TV screen to see whether the electoral tide has turned. If Ontario political parties are eyeing the Nova Scotia experiment, they'll have to wait. Bell Canada doesn't have the capabilities for it, nor does it have any plans to develop them in the near future, said Wendy Neuberg, an associate director of product management with Bell. In Nova Scotia, the idea was hatched by a couple of Latham's employees who had some ties with the Nova Scotia Liberal association. They knew the party convention was approaching and saw it as a chance to put the package together. "We felt this was an exciting opportunity to go ahead with and promote the idea of tele-democracy," Latham says. "It's definitely a pioneering effort." Many futurists hail computers and the phone network as modern society's ultimate method of democratic empowerment, a way to achieve Athenian democracy on a massive scale. Long-Distance Competition Here to Stay, Regulator Says ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Toronto Star July 14, 1992 ] Canada's major telephone companies must continue preparing for long-distance competition even while they're fighting the move in the courts, the industry's regulator says. Four telephone companies, including Bell Canada, had asked the Canadian Radio-television and Telecommunications Commission for more time to file certain information with the federal agency. But the commission yesterday said no. "As far as the commission is concerned, its decision is in force until the courts or federal cabinet say otherwise," said Bill Allen, CRTC director-general of information. In a landmark ruling last month, the CRTC ended the telephone companies' historic monopoly on the lucrative long-distance business in seven provinces by granting two competitors the rights to enter the market. Contrary to the telephone companies' position, the move would reduce long-distance rates without boosting local telephones bills, the commission ruled. Five of the telephones companies affected have appealed to the Federal Court of Canada to alter some of the terms and conditions for the competitors' entry into the market. The dispute is over how much the competitors should pay the telephone companies to subsidize the money-losing local service, and how much of the the cost of interconnection should be borne by the big utilites. Along with Bell Canada, they include BC Tel, Maritime Tel, Island Tel and Newfoundland Tel. As well, three unions representing telephone company employees have said they will appeal the decision to the federal cabinet. The federal court is expected to rule next week whether to hear the appeal. If granted, the appeal itself could take several months. In the meantime, the telephone companies argued, they should be spared the effort and expense of provising the industry regulator with certain information about the cost and method of linking up with their new competitors. Their main competitor, meanwhile, is forging ahead with its plans to offer a long-distance alternative within 12 months. Police Say They've Got Hackers' Numbers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Toronto Star October 8, 1992 ] Hackers, take note. Metro police and Ma Bell are going to get you. A yound North York computer freak accused of launching 10 false medical alerts to 911 this summer may have learned - the hard way - that his telephone tricks weren't beating the pros. Police arrived with a serach warrant at the home of the 15-year-old on Monday, arrested him and carted away his computer. He's charged with 10 counts of conveying false messages, 24 counts of mischief, and theft of telecommunications. Inspector Bill Holdridge, of 911 emergency services, said the false alarms in July and August never posed any technical problem to his switch board but resulted in wild goose chases for the police, fire and ambulance services. "Those resources weren't available for real alarms, which could have been a serious problem," Holdridge said. The 911 service, quarted at 590 Javis St., gets about 7,000 calls a day, of which 30 per cent warrant some kind of emergency response. Normally, a computerized tracing system takes only seconds to provide the address and number of the telephone from which a calls through several US networks before bringing them back to Toronto. Detective Willie Johnston said the boy's parents were stunned when police arrived. "They really didn't have a clue what was going on," said Johnston. The false emergencies reported were nowhere near the accused boy's home. "Without condoning it, you could understand it if were sitting around the corner watching the flashing lights," said Johnston. "But they weere miles away. It defies logic." Neither Johnston nor Holdridge would explain how they and Bell security finally traced the false alarms. Teen Hacker Causes Havoc In 911 Service ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Toronto Star October 7, 1992 ] A 15-year old computer hacker has been arrested for pulling computer pranks that paralyzed Metro's emergency 911 service. Police with Metro's major crime unit investigated the origin of countless phony calls placed to the 911 service in July from somewhere in west Metro. On one occasion the computer hacker managed to tie up the entire 911 service in Metro - making it unavailable for true emergencies. Bell Canada investigators helped police to trace the origin of the calls and officers yesterday charged a North York boy, who cannot be named under the Yound Offenders Act, with 24 counts of mischief and 10 counts of converying false messages. Unitel Sees Huge Loss If Phone Bid Delayed ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Toronto Star July 18, 1992 ] OTTAWA (CP) - Unitel Communications Inc, says it world lose $588 million in revenues if its entry into the long-distance telephone market is delayed by six months. The company makes the claim in court documents filed in opposition to Bell Canada's application for a stay of an order requiring Bell and five other phone companies to provide interconnection to their public long-distance networks. The Federal Court of Appeal will hear arguments Tuesday and Wednesday on whether to grant Bell's application. A stay would delay implementation of a June 12 ruling by the Canadian Radio-television and Telecommunications Communications Commission that ended the phone companies' century-old, long-distance monopoly. Unitel needs access to phone companies' local networks to reach telephone subscribers so it can provide competitive long-distance service. Unitel fears even a six-month delay in getting connected to local- networks will leave it at a competitive disadvantage that will last for years. US Phone Furms Win Rights to Deliver Cable TV Signals ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Toronto Star July 17, 1992 ] WASHINGTON (Reuter) - In a move that could transform the television industry, the Federal Communications Commission voted yesterday to allow regional telephone companies to use their lines to bring cable TV into consumers' homes. The decision, along with another vote allowing the phone companies to own a portion of the programs they would deliver, is likely to provide powerful new competition to existing cable operators, most of which hold effective monopolies in the areas they serve. It also opens a huge business sector to the regional phone companies. In a separate action, the commission also took the first steps towards setting rules for licensing of high definition television and personal communications devices such as pocket telephones and wireless fax machines. Commission chairman Alfred Sikes said the potentially landmark votes "constitute truly critical components . . . of what futurists have called a 'glittering communications mosaic.'" The commission voted 5 to 0 to allow phone companies to provide cable service, and 3 to 2 to allow them to own as much as 5 per center of the programming. AT&T Launches Program To Combat Long-Distance Theft ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of United Press International May 13, 1992 ] Citing the mushrooming cost of long-distance telephone fraud, American Telephone & Telegraph Co. announced plans to combat theft of long-distance telephone services from customers. AT&T's program, dubbed NetProtect, is an array of software, consulting, customer education and monitoring services for businesses. One program limits customer liability to the first $25,000 of theft, while another ends customer liability entirely under certain circumstances. By law, companies are liable for the cost of calls made on their systems, authorized or not. Jerre Stead, president of AT&T's Business Communications unit, said, "The program not only offers financial relief to victims of long-distance fraud. It also gives our customers new products and services specifically designed to prevent and detect fraud." Long-distance calling fraud ranges from a few dollars to the undreds of thousands of dollars for victims. The Communications Fraud Control Association, an industry group, estimates long- distance calling fraud costs more than $1 billion a year, said Peggy Snyder, an association spokeswoman. NetProtect Basic Service, offered free with long-distance and domestic 800 service, consists of ongoing monitoring around the clock for unusual activity. The company will start this service this week. NetProtect Enhanced and Premium services offer more customized monitoring and limit customer liability to $25,000 per incident or none at all, depending on the program selected. Pricing and permission to provide the Enhanced and Premium services are dependent on Federal Communication Commission approval. AT&T expects to offer these programs beginning August 1. Other offerings are a $1,995 computer software package called "Hacker Tracker," consulting services and the AT&T Fraud Intervention Service, a swat team of specialists who will detect and stop fraud while it is in progress. The company also will provide a Security Audit Service that will consult with customers on possible security risks. Pricing will be calculated on a case-by-case basis, depending on complexity. The least expensive option for customers is AT&T's Security Handbook and Training, a self-paced publication available for $65 which trains users on security features for AT&T's PBX, or private branch exchanges, and voice mail systems. Fraud occurs through PBX systems, which are used to direct the external telephone calls of a business. Company employees use access codes and passwords to gain entry to their PBX system. A typical use, the industry fraud group's Snyder said, would be a sales force on the road calling into their home offices for an open line to call other customers nationally or worldwide. These access codes can be stolen and used to send international calls through the company's network, billable to the company. Unauthorized access to PBXs occur when thieves use an automatic dialing feature in home computers to dial hundreds of combinations of phone numbers until they gain access to a company's PBX system. These thieves, also known as hackers, phone freaks or phrackers, then make their own calls through the PBX system or sell the number to a third party to make calls. Others use automatic dialing to break into PBX systems through voice mail systems because such systems have remote access features. Calls from cellular phones also are at risk if they are remotely accessed to a PBX. Electronic mail systems for intracompany calls are not affected because they don't require PBX systems. According to Bob Neresian of AT&T, most fraud involves long-distance calls to certain South American and Asian countries, especially Columbia and Pakistan. There is no profile of a typical company at risk for telephone fraud, said Snyder. "Any company of any size with long-distance service is at risk," she said. "Criminals don't care who the long distance provider is or how big the company they're stealing from is." She said the industry recognized the dimensions of telephone theft in 1985, when the Communications Fraud Control Association was formed in Washington D.C. The group consists of providers of long-distance service, operator services, private payphones, end-users of PBX systems, federal, state and local law enforcement agencies and prosecutors. Janice Langley, a spokeswoman for US Sprint Corp. in Kansas City, Mo., called AT&T's announcement similar to a program her company announced March 31. That service, SprintGuard Plus, is available to companies with a call volume of $30,000 a month. Sprint also offers basic monitoring program to customers without charge. "We don't have minimum billing requirements for any of these services or systems," responded AT&T's Neresian. "All the carriers have seen the problem and have been working on their own approaches," he said. Jim Collins, a spokesman for MCI Communications in Washington, said his company had been conducting phone fraud workshops free of charge for customers for four years. Group of "Computer Hackers" Indicted; First Use of Wiretaps in Such a Case ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of United Press International July 8, 1992 ] Contact: Federico E. Virella Jr., 212-791-1955, or Stephen Fishbein, 212-791-1978, of the Office of the U.S. Attorney, Southern District of New York; or Betty Conkling of the U.S. Secret Service, 212-466-4400; or Joseph Valiquette Jr. of the Federal Bureau of Investigation, 212-335-2715 NEW YORK, July 8 /U.S. Newswire/ -- A group of five "computer hackers" has been indicted on charges of computer tampering, computer fraud, wire fraud, illegal wiretapping, and conspiracy, by a federal grand jury in Manhattan, resulting from the first investigative use of court-authorized wiretaps to obtain conversations and data transmissions of computer hackers. A computer hacker is someone who uses a computer or a telephone to obtain unauthorized access to other computers. The indictment, which was filed today, alleges that Julio Fernandez, a/k/a "Outlaw," John Lee, a/k/a "Corrupt," Mark Abene, a/k/a "Phiber Optik," Elias Ladopoulos, a/k/a "Acid Phreak," and Paul Stira, a/k/a "Scorpion," infiltrated a wide variety of computer systems, including systems operated by telephone companies, credit reporting services, and educational institutions. According to Otto G. Obermaier, United States Attorney for the Southern District of New York, James E. Heavey, special agent in charge, New York Field Division, United States Secret Service, William Y. Doran, special agent in charge, Criminal Division, New York Field Division, Federal Bureau of Investigation, and Scott Charney, chief of the Computer Crime Unit of the Department of Justice, the indictment charges that the defendants were part of a closely knit group of computer hackers self-styled "MOD," an acronym used variously for "Masters of Disaster" and "Masters of Deception" among other things. The indictment alleges that the defendants broke into computers "to enhance their image and prestige among other computer hackers; to harass and intimidate rival hackers and other people they did not like; to obtain telephone, credit, information and other services without paying for them; and to obtain passwords, account numbers and other things of value which they could sell to others." The defendants are also alleged to have used unauthorized passwords and billing codes to make long distance telephone calls and to be able to communicate with other computers for free. Some of the computers that the defendants allegedly broke into were telephone switching computers operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West and Martin Marietta Electronics Information and Missile Group. According to the indictment, such switching computers each control telephone service for tens of thousands of telephone lines. In some instances, the defendants allegedly tampered with the computers by adding and altering calling features. In some cases, the defendants allegedly call forwarded local numbers to long distance numbers and thereby obtained long distance services for the price of a local call. Southwestern Bell is alleged to have incurred losses of approximately $370,000 in 1991 as a result of computer tampering by defendants Fernandez, Lee, and Abene. The indictment also alleges that the defendants gained access to computers operated by BT North America, a company that operates the Tymnet data transfer network. The defendants were allegedly able to use their access to Tymnet computers to intercept data communications while being transmitted through the network, including computer passwords of Tymnet employees. On one occasion, Fernandez and Lee allegedly intercepted data communications on a network operated by the Bank of America. The charges also allege that the defendants gained access to credit and information services including TRW, Trans Union and Information America. The defendants allegedly were able to obtain personal information on people including credit reports, telephone numbers, addresses, neighbor listings and social security numbers by virtue of their access to these services. On one occasion Lee and another member of the group are alleged to have discussed obtaining information from another hacker that would allow them to alter credit reports on TRW. As quoted in the indictment, Lee said that the information he wanted would permit them "to destroy people's lives ... or make them look like saints." The indictment further charges that in November 1991, Fernandez and Lee sold information to Morton Rosenfeld concerning how to access credit services. The indictment further alleges that Fernandez later provided Rosenfeld's associates with a TRW account number and password that Rosenfeld and his associates used to obtain approximately 176 TRW credit reports on various individuals. (In a separate but related court action, Rosenfeld pleaded guilty to conspiracy to use and traffic in account numbers of TRW. See below). According to Stephen Fishbein, the assistant United States attorney in charge of the prosecution, the indictment also alleges that members of MOD wiped out almost all of the information contained within the Learning Link computer operated by the Educational Broadcasting Corp. (WNET Channel 13) in New York City. The Learning Link computer provided educational and instructional information to hundreds of schools and teachers in New York, New Jersey and Connecticut. Specifically, the indictment charges that on Nov. 28, 1989, the information on the Learning Link was destroyed and a message was left on the computer that said: "Happy Thanksgiving you turkeys, from all of us at MOD" and which was signed with the aliases "Acid Phreak," "Phiber Optik," and "Scorpion." During an NBC News broadcast on Nov. 14, 1990, two computer hackers identified only by the aliases "Acid Phreak" and "Phiber Optik" took responsibility for sending the "Happy Thanksgiving" message. Obermaier stated that the charges filed today resulted from a joint investigation by the United States Secret Service and the Federal Bureau of Investigation. "This is the first federal investigation ever to use court-authorized wiretaps to obtain conversations and data transmissions of computer hackers," said Obermaier. He praised both the Secret Service and the FBI for their extensive efforts in this case. Obermaier also thanked the Department of Justice Computer Crime Unit for their important assistance in the investigation. Additionally, Obermaier thanked the companies and institutions whose computer systems were affected by the defendants' activities, all of whom cooperated fully in the investigation. Fernandez, age 18, resides at 3448 Steenwick Ave., Bronx, New York. Lee (also known as John Farrington), age 21, resides at 64A Kosciusco St. Brooklyn, New York. Abene, age 20, resides at 94-42 Alstyne Ave., Queens, New York. Elias Ladopoulos, age 22, resides at 85-21 159th St., Queens, New York. Paul Stira, age 22, resides at 114-90 227th St., Queens, New York. The defendants' arraignment has been scheduled for July 16, at 10 a.m. in Manhattan federal court. The charges contained in the indictment are accusations only and the defendants are presumed innocent unless and until proven guilty. Fishbein stated that if convicted, each of the defendants may be sentenced to a maximum of five years imprisonment on the conspiracy count. Each of the additional counts also carries a maximum of five years imprisonment, except for the count charging Fernandez with possession of access devices, which carries a maximum of ten years imprisonment. Additionally, each of the counts carries a maximum fine of the greater of $250,000, or twice the gross gain or loss incurred. In separate but related court actions, it was announced that Rosenfeld and Alfredo De La Fe have each pleaded guilty in Manhattan Federal District Court to conspiracy to use and to traffic in unauthorized access devices in connection with activities that also involved members of MOD. Rosenfeld pled guilty on June 24 before the Shirley Wohl Kram, United States District Judge. At his guilty plea, Rosenfeld admitted that he purchased account numbers and passwords for TRW and other credit reporting services from computer hackers and then used the information to obtain credit reports, credit card numbers, social security numbers and other personal information which he sold to private investigators. Rosenfeld added in his guilty plea that on or about Nov. 25, 1991, he purchased information from persons named "Julio" and "John" concerning how to obtain unauthorized access to credit services. Rosenfeld stated that he and his associates later obtained additional information from "Julio" which they used to pull numerous credit reports. According to the information to which Rosenfeld pleaded guilty, he had approximately 176 TRW credit reports at his residence on Dec. 6, 1991. De La Fe pled guilty on June 19 before Kenneth Conboy, United States Distt Judge. At his guilty plea, De La Fe stated that he used and sold telephone numbers and codes for Private Branch Exchanges ("PBXs"). According to the information to which De La Fe pleaded guilty, a PBX is a privately operated computerized telephone system that routes calls, handles billing, and in some cases permits persons calling into the PBX to obtain outdial services by entering a code. De La Fe admitted that he sold PBX numbers belonging to Bugle Boy Industries and others to a co-conspirator who used the numbers in a call sell operation, in which the co-conspirator charged others to make long distance telephone calls using the PBX numbers. De La Fe further admitted that he and his associates used the PBX numbers to obtain free long distance services for themselves. De La Fe said that one of the people with whom he frequently made free long distance conference calls was a person named John Farrington, who he also knew as "Corrupt." Rosenfeld, age 21, resides at 2161 Bedford Ave., Brooklyn, N.Y. Alfredo De La Fe, age 18, resides at 17 West 90th St., N.Y. Rosenfeld and De La Fe each face maximum sentences of five years, imprisonment and maximum fines of the greater of $250,000, or twice the gross gain or loss incurred. Both defendants have been released pending sentence on $20,000 appearance bonds. Rosenfeld's sentencing is scheduled for Sept. 9, before Shirley Wohl Kram. De La Fe's sentencing is scheduled for Aug. 31, before Conboy. Intruder Cracks Cincinnati Phones ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of United Press International September 16, 1992 ] A computer intruder apparently in the New York area broke the code into one of the Cincinnati, Ohio, phone trunk lines, building up a $65,000 phone bill. United Press International quotes Cincinnati city officials saying the unknown invader racked up the charges last winter and spring by placing calls around the world. "An investigation into the calls was wrapped up months ago," UPI says, "but details on the case came to light only recently after a brief reference to the probe appeared in memos to council members and was repeated in a report from the city manager to staff managers." David Chapman, the city's assistant superintendent for telecommunications, told the wire service investigators think the tap originated in the New York-New Jersey area, but they have no suspects and the investigation is considered closed. Chapman added, "Apparently these people were pretty darn slick, but talking to the Secret Service, we were small potatoes. I understand there have been some major companies hit." LA Teen Charged With Phone Fraud ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of United Press International September 16, 1992 ] Kenner, La., police have arrested a 16-year-old computerist on charges he used his system for the theft of more than $10,000 worth of long-distance phone service. If convicted on all three counts, he faces up to $22,000 in fines and 12 years in jail. United Press International says police did not make public the suspect's name because he is a minor. Police Sgt. James Gallagher told the wire service authorities contend the boy used a home computer to break into a long-distance phone company system and charged calls to customers' private access codes. The boy also is a suspect in several other computer intrusions, "including one in which the Detroit free Press newspaper's personal message codes in its voice mail box were rearranged as a hoax," UPI said. Gallagher alleged the suspect, in addition to ringing up more than $10,000 in illegal phone calls in nine days, also posted the long-distance codes on computer bulletin board systems so others could use them. UPI reports Kenner police were contacted Aug. 31 by LDDS Communications Inc. investigators who had detected irregularities in their computer system that caused them to suspect that someone had wrongfully gained access to long-distance codes. UPI reports that, according to Gallagher said, the boy "was found to have used readily available software designed to gain access to such calling codes." Somebody Gets Access To Freeway Callbox Codes, Runs Up Bill ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of United Press International October 23, 1992 ] GARDEN GROVE, Calif. (UPI) -- Somebody apparently got hold of the serial number and telephone number of a Southern California freeway callbox, and used them to rack up nearly $2,000 in phone bills. The Orange County Transportation Authority is trying to determine just how the phone thief used the electronic serial number and telephone number of the freeway emergency callbox to make 11,733 calls totaling 25,875 minutes, and who will foot the bill. OCTA Executive Director Stan Oftelie said they got suspicious because calls charged to the callboxes' supposedly secret numbers average fewer than 100 a month. Oftelie said OCTA officials also are trying to determine how the freeway box could be used for in-state and out-of-state calls since the boxes connect directly to California Highway Patrol dispatch headquarters. "We're concerned about it," Oftelie said. "They shouldn't be able to call anywhere but Highway Patrol headquarters." OCTA said it has tightened security measures, and is talking with GTE Cellular and L.A. Cellular to determine who will pay the bill. The callbox is one of 1,100 solar cellular phone boxes in the county. Most average 10 to 100 calls per month from motorists in trouble. Women Calls For Help, Lands In Jail ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy Of Ventura County Star/Free Press Jul 17, 1992 ] Oxnard, CA resident Helene Golemon called 911 to report (twice) a loud teenage street party in the wee hours. Later, at 6:00am, an officer arrived and arrested her on a (subsequently learned-to-be) erroneous misdemeanor traffic warrant. Golemon expressed outrage at the 911 records check, and that the warrant even existed at all. "Those kids were out there drinking and driving drunk. Nothing happened to them and I got arrested." After booking, including fingerprints and mug shots, she was detained in a holding cell until her husband posted $188 bond later that morning. Assistant police chief William Cady claimed that dispatchers often check available records, even on a reporting person, to know as much as possible about the people involved when responding to 911 calls. "Procedurally, our people did nothing wrong" he said. The arrest warrant, dated from an illegal left turn from May, 1988. Golemon fought the ticket and lost, then attended state-sponsored driver's education (a CA alternative to fines available for first-time offenders) in August 1988. The court has a copy of Golemon's driver education certificate on file, and Linda Finn, deputy executive officer for Ventura County Superior and Municipal Courts, couldn't explain why a warrant was later issued in 1989. Golemon was never notified of the warrant. Goleman felt the incident was vindictive, because the dispatcher was annoyed with her. "When I tried to explain the continuing problems we're having, she was very short with me," she said. Golemon then asked for the dispatchers name, and the dispatcher in turn demanded Golemon's full name. After Golemon complied, the dispatcher only told Golemon her badge number. The dispatcher remains unidentified in the news report, and an Oxnard police sergeant who reviewed the tape said the dispatcher was "absolutely professional." The privacy and computer risk concerns here seems to me three fold. First, the police often act with inappropriate gravity on erroneous, and apparently unverifiable, data. Under what circumstances does a misdemeanor warrant demand a 6:00am public arrest? Certainly more time could have been expended verifying the data, as an at-large illegal left-turner hardly threatens public safety. Second, apparently innocuous -- even beneficial -- contacts with government can result in record searches for unrelated information. Not only may this result in egregious seizures, as in this case, but such an atmosphere can only stultify public/government relations. Crime and corruption thrive in such an environment. Third, although individuals have the right to know most information the government retains on them (FOIA), that right becomes meaningless if the government can, at any time, decided to integrate facts from disjoint data bases and then act without notice on resulting conclusions. One cannot submit an FOI request on the union of multiple far-flung data sets! Staff Threatened, Files Ruined As Teen Computer Whiz Strikes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Winnipeg Free News November 26, 1992 ] A teen hacker uncovered a hole in a downtown software shop's computer system and went on a rampage, destroying every file and threatening employees. "It's an ego thing. 'Boy look what i've accomplished,' " said Sgt. Dennis Loupin of the Winnipeg police fraud unit. "He's very, very intelligent. He's got a tremendous future in the computer world." An 18 year-old, who can't be named because he's charged under the Young Offender's Act, faces fraud charges. Police say a hacker discovered a "hole" - an opening that allows a user to circumvent a computer system's passwords - in the bulletin board program at Adventure Software Ltd., a Hargrave Street software shop. The computer whiz unlocked the program several times, at one point destroying every file. Bulletin Board The hacking is believed to have been carried out with an IBM-style computer from a home. Adventure Software offers a computer bulletin board where customers can communicate, read about news products, or leave messages from their home systems. The system has about 400 users, police say. An Adventure Software employee, who asked not to be identified, said threatening messages were left in the system, some suggesting that selling software was immoral. Some messages attacked a store employee. The system was out of operation at one point for 3 1/2 weeks, he said. But the employee said police are overstating the hacker's skills. "It doesn't take a genius to hear about a 'hole' in the program," said the man. The system was infiltrated four to six times, he said. "It's not crippling. It's just extremely annoying, " the employee said. By breaking into the system the computer bandit found home phone numbers and addresses, he said. Police say they are also investigating the teen in connection with break-ins at other systems across North America. Mischief "He's now going to have to face the consequences of something he thought was just a challenge but it's more than that - it's a crime, " said Loupin. A Victor Street teenager was arrested Tuesday night and charged with using a computer service to commit mischief, an offence that carries a maximum 10-year sentence. The teen is now 18, but police say he was 17 when the alleged crimes occured. Editorial: Bring Back the Operator ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes May 29, 1992 ] ATLANTA, GEORGIA, 1992 MAY 29 (NB) -- By Dana Blankenhorn. For the last few years, you and I have been descending into Voice Mail Hell. You know the drill. You want to reach Person X in a real big hurry, so you call their direct line. You get their voice mail, and maybe (when they get around to it) they call back. By which time you have forgotten why you called. It's even worse when you're calling a company for information and don't know exactly who you need to talk with. The main number's recording simply tells you to enter the 4-digit code of the person you want to talk with, or 0 for an operator. After an interminable wait, you get someone in a back-room somewhere who passes you to the wrong department, and their voice mail box. After returning to the operator, you get the right department, and another voice mail box. When that person finally returns your call, they say, oh, you need someone else, and you get yet another voice mail box. This can go on for weeks. No fun if you're on a deadline. And it's going to get worse before it gets better. AT&T is planning to replace many of its operators with automated systems, and the regional Bell companies are expected to follow suit. Oddly, the voice mail industry which started this mess didn't intend it. Voice mail was created as an adjunct, or aid, to experienced operators and secretaries. The trouble was, corporate leaders saw this as a good excuse to get rid of those valued people and we've all been suffering as a result. I learned this anew recently when, working on a book project, I hired someone to come in and straighten up my files. Not only did I get my files organized, but I also got my mind straightened out, my messages taken, and important calls made. Every top executive has a secretary, or administrative aide, whether they're running IBM or the Joint Chiefs of Staff. I wonder how many of them could keep their heads screwed-on without these people to take care of them. Secretaries make sure their bosses return important calls. Operators make sure calls are directed to the right people, and that messages are received and responded to. Without such handlers, executives lose accounts. And their companies lose respect. Look, the telephone system is your company's front door. What sense would it make for a customer to walk into your shop's door, be led to a robot who kicked them out, to dust themselves off and get the same treatment again and again. Eventually, they'll go to another shop where they're treated like a human being, by human beings. And that's the lesson. Technology should help people, not replace them. Only when top management learns this lesson, and brings back those operators (maybe with a nice raise) will we coming out of Voice Mail Hell. Editorial: Keep the Bells Out of PCN ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ Courtesy of Newsbytes June 19, 1992 ] ATLANTA, GEORGIA, U.S.A., 1992 JUN 19 (NB) -- By Dana Blankenhorn. The seven regional Bell companies have a problem. Wall Street doesn't respect them. Their attempts to raise stock prices through unregulated adventures have failed, mainly because the weight of their capital tilts toward plain old telephone service. POTS, as it's called, is a widows-and-orphans business. The profits are reliable, but they're low. This doesn't sit well with the Bells' self-image. The main thing the Bells have done to counter this image is to take over the cellular telephone market. Originally, there were to be two licensees in each city: one Bell, one non-Bell. But the US government later allowed Bells to buy "non-Bell" licensees outside their regions. And they did. Now you usually have a "choice" for cellular service between two Bell companies. That's no choice. Prices remain high, true competition nil. The FCC has a problem with this. Chairman Alfred Sikes claims competition will solve all problems. But there is no competition in the cellular business. Prices and levels of service are nearly identical in every region. His solution is to quickly license microwave-based cellular networks, called Personal Communications Networks or PCN. PCN uses shorter wavelengths than regular cellular systems, so antennae must be closer together, but lower- power phones can be used which fit easily in your pocket. To solve their problem, the Bells want to permanently prevent the FCC from solving its problem. Bell Alantic, the Bell for the mid- Atlantic states, has unveiled its "wireless vision" to financial analysts, a "strategic mandate" to invest $400 million in tiny microcells and dominate this new market before it gets started by tying the new demand to its existing cellular network. Ameritech, the Bell company for the Midwest, is conducting the first market test of PCN phones and services in downtown Chicago. US West, the Bell company for the mountain states, wants a "pioneer preference" (it wants to be first in line for a license) on PCN because its UK cable operations already handle the wired link in PCN networks there. If Al Sikes is to ever solve his problem, he needs to put a stop to all this right now. As Bell Atlantic makes clear, the Bells already have everything they need to compete in the PCN market, maybe even to dominate it, using smaller cells on their existing frequencies. If competitors are to emerge, the Bells must be prevented from taking any PCN licenses, either inside or outside their markets, now and forever. They must also be prevented from using discriminatory pricing to limit the new PCN carriers' access to the wired networks, which will handle most of the calling distance in any event. If Sikes doesn't do this, all his talk about competition will come to nothing. The Bells will dominate all future wireless markets, just as they dominate the wired world. There will be no competition for consumers, only monopoly profits for the Bells. And ironically, the Bells' stock prices still won't be helped, because the capital needs of their slow-growing wired business will always dominate their balance sheets. What's ironic is there is a way for the Bells to solve their stock-price problems. They should consider what Pacific Telesis is considering, do what AT&T did under Charles Brown a decade ago. Split-up. Separate in two, into local phone companies under strict regulation, and unregulated businesses with wireless, international, and information service arms. Stop trying to have it both ways, a guaranteed pool of profit on one hand which can be used to dominate new markets on the other. Stop this schizophrenic double-game of being competitive businessmen when it suits you and monopolists when it suits you. Be one or the other. Wall Street will love you for it. ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 18 of 19 Member & Site Application Form UPI has once more returned and it is no longer the shit group it used to be. We are looking for quality members that are willing to contribute to the group. We are especially looking for people who are experienced in electronics and chemistry, and any other P/H/C/A topic. If you would like to join UPi please fill out the application below then rename the application form to your alais and zip it up and upload it privately to The Cathedral or you can send it to us in ascii form via our internet e-mail address (which is listed in the main introduction). What is your handle? : What is your first And last name? : What is your voice phone number? : What is your data phone number? : What city do you live in? : What province/state do you live in? : What country do you live in? : How old are you? : How many years of experience do you have in the underground? : What are you specialities in the underground? : : : : : What do you have to offer UPi? : : : : : Are you/or have been a member of any other groups? : List anything else below that you want to say about yourself that would convince us to let you become a member? : : : : : If you run a board and would like you board to become a site for UPi please fill out the following information. What is the name of board? : What is the phone number? : How many megs does the board have? : What baud rate is supported? : What bbs program do you run? : How does you board support the underground? : Is the anything special about your board? : : : : : List anything else below that you want to say about your board that will convince us to let you become a site? : : : : : ------------------------------------------------------------------------------- -=- United Phreaker's Incorporated Magazine -=- Volume Two, Issue Seven, File 19 of 19 [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$] !! !! !! U P i - U N I T E D P H R E A K E R ' S I N C O R P O R A T E D !! !! !! [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$] Founder And President: The Lost Avenger (Ontario) - Editorial Staff Vice President: Arch Bishop (Ontario) - Editorial Staff Virus Researchers: Digital Justice (Virginia) Firecracker (Virginia) Writers: Black Flag (Ontario) Genghis Khan (Ohio) Hardwire (Ontario) Master Of Gold (Argentina) Opticon (Greece) Silcon Phreaker (Quebec) The Darkman (Quebec) Truth Assasin (Ontario) VC Hacker (Manitoba) Site Listing: ------------------------------------------------------------------------------ Node BBS Name Location Baud BBS Sysop Number Rate Program ------------------------------------------------------------------------------ WHQ The Cathedral Ontario 14.4 Telegard Arch Bishop Node #1 Pango Israel 2400 SuperBBS Basil Chesyr Node #2 Devil's Guild Brazil 2400 Vision/X Sandman Node #3 Chiba City Blues Virginia 14.4 Celerity Firecracker Node #4 The Nuclear Holocaust Maryland 2400 XTC Flaming Chaos Node #5 Virus Syndicate Virginia 14.4 Celerity Digitial Justice Node #6 Eye Of The Pyramid Pennslyvannia 14.4 Telegard Illuminati Primus ------------------------------------------------------------------------------ Freelance writers are always welcome to write articles for future UPi Issues. If you would like to submit an article please send then to The Lost Avenger or Arch Bishop via The Cathedral or send them to The Lost Avenger via Internet E-mail. If the article is not accepted you will be notified and let known the reason why or why not, your article was not acceptable. But don't be discouraged if your article wasn't acceptable, you may submit more articles even though one of your other submissions were not accepted. New members from anywhere in the world will always be welcome. If you wish to join the group, you must logon to The Cathedral and acquire an account. Once that's done, you need to ask TLA or AB for the UPi questionnaire to be used to evaluate you. Once you pass, an email of congratulations will be sent to you and you will be able to participate fully in the group in addition to getting your name on this elegant introduction screen. Impress chicks with how you're a member of a premier international organization of freelance anarchists with the capability to reach out and touch a globe. [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$] !! !! !! U P i - U N I T E D P H R E A K E R ' S I N C O R P O R A T E D !! !! !! [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]